A journal of IEEE and CAA , publishes high-quality papers in English on original theoretical/experimental research and development in all areas of automation

## Early Access

Display Type:

, Available online
Abstract:
The UCR Time Series Archive - introduced in 2002, has become an important resource in the time series data mining community, with at least one thousand published papers making use of at least one data set from the archive. The original incarnation of the archive had sixteen data sets but since that time, it has gone through periodic expansions. The last expansion took place in the summer of 2015 when the archive grew from 45 to 85 data sets. This paper introduces and will focus on the new data expansion from 85 to 128 data sets. Beyond expanding this valuable resource, this paper offers pragmatic advice to anyone who may wish to evaluate a new algorithm on the archive. Finally, this paper makes a novel and yet actionable claim: of the hundreds of papers that show an improvement over the standard baseline (1-nearest neighbor classification), a fraction might be mis-attributing the reasons for their improvement. Moreover, the improvements claimed by these papers might have been achievable with a much simpler modification, requiring just a few lines of code.
, Available online
Abstract:
This paper proposes a tube-based method for the asynchronous observation problem of discrete-time switched linear systems in the presence of amplitude-bounded disturbances. Sufficient stability conditions of the nominal observer error system under mode-dependent persistent dwell-time (MPDT) switching are first established. Taking the disturbances into account, a novel asynchronous MPDT robust positive invariant (RPI) set and an asynchronous MPDT generalized RPI (GRPI) set are determined for the difference system between the nominal and disturbed observer error systems. Further, the global uniform asymptotical stability of the observer error system is established in the sense of converging to the asynchronous MPDT GRPI set, i.e., the cross section of the tube of the observer error system. Finally, the proposed results are validated on a space robot manipulator example.
, Available online
Abstract:
Providing autonomous systems with an effective quantity and quality of information from a desired task is challenging. In particular, autonomous vehicles, must have a reliable vision of their workspace to robustly accomplish driving functions. Speaking of machine vision, deep learning techniques, and specifically convolutional neural networks, have been proven to be the state of the art technology in the field. As these networks typically involve millions of parameters and elements, designing an optimal architecture for deep learning structures is a difficult task which is globally under investigation by researchers. This study experimentally evaluates the impact of three major architectural properties of convolutional networks, including the number of layers, filters, and filter size on their performance. In this study, several models with different properties are developed, equally trained, and then applied to an autonomous car in a realistic simulation environment. A new ensemble approach is also proposed to calculate and update weights for the models regarding their mean squared error values. Based on design properties, performance results are reported and compared for further investigations. Surprisingly, the number of filters itself does not largely affect the performance efficiency. As a result, proper allocation of filters with different kernel sizes through the layers introduces a considerable improvement in the performance. Achievements of this study will provide the researchers with a clear clue and direction in designing optimal network architectures for deep learning purposes.
, Available online  , doi: 10.1109/JAS.2019.1911666 doi: 10.1109/JAS.2019.1911666
Abstract:
Present day power scenarios demand a high quality uninterrupted power supply and needs environmental issues to be addressed. Both concerns can be dealt with by the introduction of the renewable sources to the existing power system. Thus, automatic generation control (AGC) with diverse renewable sources and a modified-cascaded controller are presented in the paper. Also, a new hybrid scheme of the improved teaching learning based optimization-differential evolution (hITLBO-DE) algorithm is applied for providing optimization of controller parameters. A study of the system with a technique such as TLBO applied to a proportional integral derivative (PID), integral double derivative (IDD) and PIDD is compared to hITLBO-DE tuned cascaded controller with dynamic load change.The suggested methodology has been extensively applied to a 2-area system with a diverse source power system with various operation time non-linearities such as dead-band of, generation rate constraint and reheat thermal units. The multi-area system with reheat thermal plants, hydel plants and a unit of a wind-diesel combination is tested with the cascaded controller scheme with a different controller setting for each area. The variation of the load is taken within 1% to 5% of the connected load and robustness analysis is shown by modifying essential factors simultaneously by ± 30%. Finally, the proposed scheme of controller and optimization technique is also tested with a 5-equal area thermal system with non-linearities. The simulation results demonstrate the superiority of the proposed controller and algorithm under a dynamically changing load.
, Available online
Abstract:
A novel learning-based attack detection and estimation scheme is proposed for linear networked control systems (NCS), wherein the attacks on the communication network in the feedback loop are expected to increase network induced delays and packet losses, thus changing the physical system dynamics. First, the network traffic flow is modeled as a linear system with uncertain state matrix and an optimal Q-learning based control scheme over finite-horizon is utilized to stabilize the flow. Next, an adaptive observer is proposed to generate the detection residual, which is subsequently used to determine the onset of an attack when it exceeds a predefined threshold, followed by an estimation scheme for the signal injected by the attacker. A stochastic linear system after incorporating network-induced random delays and packet losses is considered as the uncertain physical system dynamics. The attack detection scheme at the physical system uses the magnitude of the state vector to detect attacks both on the sensor and the actuator. The maximum tolerable delay that the physical system can tolerate due to networked induced delays and packet losses is also derived. Simulations have been performed to demonstrate the effectiveness of the proposed schemes.
, Available online
Abstract:
Clustering is used to gain an intuition of the structures in the data. Most of the current clustering algorithms produce a clustering structure even on data that do not possess such structure. In these cases, the algorithms force a structure in the data instead of discovering one. To avoid false structures in the relations of data, a novel clusterability assessment method called density-based clusterability measure is proposed in this paper. It measures the prominence of clustering structure in the data to evaluate whether a cluster analysis could produce a meaningful insight to the relationships in the data. This is especially useful in time-series data since visualizing the structure in time-series data is hard. The performance of the clusterability measure is evaluated against several synthetic data sets and time-series data sets, which illustrate that the density-based clusterability measure can successfully indicate clustering structure of time-series data.
, Available online
Abstract:
In this paper, a method to posture maintenance control of 2-link object by nonprehensile two-cooperative-arm robot without compensating friction is proposed. In details, a mathematical model of the 2-link object is firstly built. Based on the model, stable regions for holding motion of nonprehensile two-cooperative-arm robot are obtained while the 2-link object is kept stable on the robot arms with static friction. Among the obtained stable regions, the robust pairs of orientation angles of the 2-link object are found. Under the robust orientation angles, a feedback control system is designed to control the arms to maintain the 2-link object’s posture while it is being held or lifted up. Finally, experimental results are shown to verify the effectiveness of the proposed method.
, Available online  , doi: 10.1109/JAS.2019.1911621 doi: 10.1109/JAS.2019.1911621
Abstract:
This paper investigates the robust relative pose control for spacecraft rendezvous and docking with constrained relative pose and saturated control inputs. A barrier Lyapunov function is used to ensure the constraints of states, so that the computational singularity of the inverse matrix in control command can be avoided, while a linear auxiliary system is introduced to handle with the adverse effect of actuator saturation. The tuning rules for designing parameters in control command and auxiliary system are derived based on the stability analysis of the closed-loop system. It is proved that all closed-loop signals always keep bounded, the prescribed constraints of relative pose tracking errors are never violated, and the pose tracking errors ultimately converge to small neighborhoods of zero. Simulation experiments validate the performance of the proposed robust saturated control strategy.
, Available online  , doi: 10.1109/JAS.2017.7510442 doi: 10.1109/JAS.2017.7510442
Abstract:
In this paper, a novel statistical manifold algorithm is proposed for position estimation of sensor nodes in a wireless network, making full use of distance information available among unknown nodes and simultaneous localization of multiple unknown nodes. To begin, a ranging model including the distance information among unknown nodes is established. With the reparameterization of the natural parameter and natural statistic, the solution problem of the ranging model is transformed into a parameter estimation problem of the curved exponential family. Then, a natural gradient method is adopted to deal with the parameter estimation problem of the curved exponential family. To ensure the convergence of the proposed algorithm, a particle swarm optimization method is utilized to obtain initial values of the unknown nodes. Experimental results indicate that the proposed algorithm can improve the positioning accuracy, compared with the traditional algorithm.
, Available online
Abstract:
In this paper, we focus on the scenario of using Unmanned Aerial Vehicles base stations (UAV-BSs) to serve cellular users. In particular, we focus on finding the minimum number of UAV-BSs as well as their deployment. We propose an optimization model which minimizes the number of UAV-BSs and optimize their positions such that the UE covered ratio is no less than the expectation of network suppliers, the UEs receive acceptable downlink rates, and the UAV-BSs can work in a sustainable manner. We show the NP-hardness of this problem and then propose a method to address it. The method first estimates the range of the number of UAV-BSs and then converts the original problem to one which maximizes the UE served ratio, given the number of UAV-BSs within that range. We present a maximizing algorithm to solve it with the proof of convergence. Extensive simulations based on a realistic dataset have been conducted to demonstrate the effectiveness of the proposed method.
, Available online
Abstract:
This paper focuses on the problem of adaptive finitetime fault-tolerant control for a class of non-lower-triangular nonlinear systems. The faults encountered in the control system include the actuator faults and the abrupt system fault. By applying backstepping design and neural networks approximation, an adaptive finite-time fault-tolerant control scheme is developed. It is shown that the proposed controller ensures that all signals in the closed-loop system are semi-globally practically finite-time stable and the track-ing error converges to a small neighborhood around the origin within finite time. The simulation is carried out to explain the validity of the developed strategy.
, Available online  , doi: 10.1109/JAS.2019.1911657 doi: 10.1109/JAS.2019.1911657
Abstract:
In recent years, the number of Web services has increased significantly. Web service discovery has drawn much attention with the development of Web service applications and big data analysis. Under this circumstance, traditional Web service discovery strategies cannot adequately meet high user requirements due to the efficiency and precision of service discovery is low. In order to improve the accuracy and efficiency of service discovery, a user requirement oriented Web service discovery approach based on Petri nets is proposed in this study. A data preprocessing strategy of Web service is first designed. Then, a service clustering method is proposed based on Petri nets, which can conduct service cluster head generation, service cluster composition, and service discovery. The proposed method utilizes a superior data preprocessing method. Using simulation experiments, the efficiency and precision of Web service discovery are illustrated. Finally, the application value of the approach on real Web service is discussed.
, Available online
Abstract:
This paper proposes an artificial neural network (ANN) based software reliability model trained by novel particle swarm optimization (PSO) algorithm for enhanced forecasting of the reliability of software. The proposed ANN is developed considering the fault generation phenomenon during software testing with the fault complexity of different levels. We demonstrate the proposed model considering three types of faults residing in the software. We propose a neighborhood based fuzzy PSO algorithm for competent learning of the proposed ANN using software failure data. Fitting and prediction performances of the neighborhood fuzzy PSO based proposed neural network model are compared with the standard PSO based proposed neural network model and existing ANN based software reliability models in the literature through three real software failure data sets. We also compare the performance of the proposed PSO algorithm with the standard PSO algorithm through learning of the proposed ANN. Statistical analysis shows that the neighborhood fuzzy PSO based proposed neural network model has comparatively better fitting and predictive ability than the standard PSO based proposed neural network model and other ANN based software reliability models. Faster release of software is achievable by applying the proposed PSO based neural network model during the testing period.
, Available online
Abstract:
In many traditional non-rigid structure from motion (NRSFM) approaches, the estimation results of part feature points may significantly deviate from their true values because only the overall estimation error is considered in their models. Aimed at solving this issue, a local deviation-constrained-based column-space-fitting approach is proposed in this paper to alleviate estimation deviation. In our work, an effective model is first constructed with two terms: the overall estimation error, which is computed by a linear subspace representation, and a constraint term, which is based on the variance of the reconstruction error for each frame. Furthermore, an Augmented Lagrange Multipliers (ALM) iterative algorithm is presented to optimize the proposed model. Moreover, a convergence analysis is performed with three steps for the optimization process. As both the overall estimation error and the local deviation are utilized, the proposed method can achieve a good estimation performance and a relatively uniform estimation error distribution for different feature points. Experimental results on several widely used synthetic sequences and real sequences demonstrate the effectiveness and feasibility of the proposed algorithm.
, Available online
Abstract:
These days’ smart buildings have high intensive information and massive operational parameters, not only extensive power consumption. With the development of computation capability and future 5G, the ACP theory (i.e., artificial systems, computational experiments, and parallel computing) will play a much more crucial role in modeling and control of complex systems like commercial and academic buildings. The necessity of making accurate predictions of energy consumption out of a large number of operational parameters has become a crucial problem in smart buildings. Previous attempts have been made to seek energy consumption predictions based on historical data in buildings. However, there are still questions about parallel building consumption prediction mechanism using a large number of operational parameters. This article proposes a novel hybrid deep learning prediction approach that utilizes long short-term memory as an encoder and gated recurrent unit as a decoder in conjunction with ACP theory. The proposed approach is tested and validated by real-world dataset, and the results outperformed traditional predictive models compared in this paper.
, Available online
Abstract:
Business processes described by formal or semi-formal models are realized via information systems. Event logs generated from these systems are probably not consistent with the existing models due to insufficient design of the information system or the system upgrade. By comparing an existing process model with event logs, we can detect inconsistencies called deviations, verify and extend the business process model, and accordingly improve the business process. In this paper, some abnormal activities in business processes are formally defined based on Petri nets. An efficient approach to detect deviations between the process model and event logs is proposed. Then, business process models are revised when abnormal activities exist. A clinical process in a healthcare information system is used as a case study to illustrate our work. Experimental results show the effectiveness and efficiency of the proposed approach.
, Available online
Abstract:
Ribonucleic acid (RNA) hybridization is widely used in popular RNA simulation software in bioinformatics. However, limited by the exponential computational complexity of combinatorial problems, it is challenging to decide, within an acceptable time, whether a specific RNA hybridization is effective. We hereby introduce a machine learning based technique to address this problem. Sample machine learning (ML) models tested in the training phase include algorithms based on the boosted tree (BT), random forest (RF), decision tree (DT) and logistic regression (LR), and the corresponding models are obtained. Given the RNA molecular coding training and testing sets, the trained machine learning models are applied to predict the classification of RNA hybridization results. The experiment results show that the optimal predictive accuracies are 96.2%, 96.6%, 96.0% and 69.8% for the RF, BT, DT and LR-based approaches, respectively, under the strong constraint condition, compared with traditional representative methods. Furthermore, the average computation efficiency of the RF, BT, DT and LR-based approaches are 208 679, 269 756, 184 333 and 187 458 times higher than that of existing approach, respectively. Given an RNA design, the BT-based approach demonstrates high computational efficiency and better predictive accuracy in determining the biological effectiveness of molecular hybridization.
, Available online  , doi: 10.1109/JAS.2019.1911723 doi: 10.1109/JAS.2019.1911723
Abstract:
This paper uses Gaussian interval type-2 fuzzy set theory on historical traffic volume data processing to obtain a 24- hour prediction of traffic volume with high precision. A K-means clustering method is used in this paper to get 5 minutes traffic volume variation as input data for the Gaussian interval type-2 fuzzy sets which can reflect the distribution of historical traffic volume in one statistical period. Moreover, the cluster with the largest collection of data obtained by K-means clustering method is calculated to get the key parameters of type-2 fuzzy sets, mean and standard deviation of the Gaussian membership function. Using the range of data as the input of Gaussian interval type-2 fuzzy sets leads to the range of traffic volume forecasting output with the ability of describing the possible range of the traffic volume as well as the traffic volume prediction data with high accuracy. The simulation results show that the average relative error is reduced to 8% based on the combined K-means Gaussian interval type-2 fuzzy sets forecasting method. The fluctuation range in terms of an upper and a lower forecasting traffic volume completely envelopes the actual traffic volume and reproduces the fluctuation range of traffic flow.
, Available online  , doi: 10.1109/JAS.2019.1911732 doi: 10.1109/JAS.2019.1911732
Abstract:
Path planning and obstacle avoidance are two challenging problems in the study of intelligent robots. In this paper, we develop a new method to alleviate these problems based on deep Q-learning with experience replay and heuristic knowledge. In this method, a neural network has been used to resolve the " curse of dimensionality” issue of the Q-table in reinforcement learning. When a robot is walking in an unknown environment, it collects experience data which is used for training a neural network; such a process is called experience replay. Heuristic knowledge helps the robot avoid blind exploration and provides more effective data for training the neural network. The simulation results show that in comparison with the existing methods, our method can converge to an optimal action strategy with less time and can explore a path in an unknown environment with fewer steps and larger average reward.
, Available online  , doi: 10.1109/JAS.2019.1911720 doi: 10.1109/JAS.2019.1911720
Abstract:
In a passive ultra-high frequency (UHF) radio frequency identification (RFID) system, the recovery of collided tag signals on a physical layer can enhance identification efficiency. However, frequency drift is very common in UHF RFID systems, and will have an influence on the recovery on the physical layer. To address the problem of recovery with the frequency drift, this paper adopts a radial basis function (RBF) network to separate the collision signals, and decode the signals via FM0 to recovery collided RFID tags. Numerical results show that the method in this paper has better performance of symbol error rate (SER) and separation efficiency compared to conventional methods when frequency drift occurs.
, Available online
Abstract:
In this paper, an adaptive backstepping control scheme is proposed for attitude tracking of non-rigid spacecraft in the presence of input quantization, inertial uncertainty and external disturbance. The control signal for each actuator is quantized by sector-bounded quantizers, including the logarithmic quantizer and the hysteresis quantizer. By describing the impact of quantization in a new affine model and introducing a smooth function and a novel form of the control signal, the influence caused by input quantization and external disturbance is properly compensated for. Moreover, with the aid of the adaptive control technique, our approach can achieve attitude tracking without the explicit knowledge of inertial parameters. Unlike existing attitude control schemes for spacecraft, in this paper, the quantization parameters can be unknown, and the bounds of inertial parameters and disturbance are also not needed. In addition to proving the stability of the closed-loop system, the relationship between the control performance and design parameters is analyzed. Simulation results are presented to illustrate the effectiveness of the proposed scheme.
, Available online  , doi: 10.1109/JAS.2019.1911726 doi: 10.1109/JAS.2019.1911726
Abstract:
In order to increase the capacity of encrypted information and reduce the loss of information transmission, a three-dimensional scene encryption algorithm based on the phase iteration of the angular spectrum domain is proposed in this paper. The algorithm, which adopts the layer-oriented method, generates the computer generated hologram by encoding the three-dimensional scene. Then the computer generated hologram is encoded into three pure phase functions by adopting the phase iterative algorithm based on angular spectrum domain, and the encryption process is completed. The three-dimensional scene encryption can improve the capacity of the information, and the three-phase iterative algorithm can guarantee the security of the encryption information. The numerical simulation results show that the algorithm proposed in this paper realized the encryption and decryption of three-dimensional scene. At the same time, it can ensure the safety of the encrypted information and increase the capacity of the encrypted information.
, Available online  , doi: 10.1109/JAS.2019.1911738 doi: 10.1109/JAS.2019.1911738
Abstract:
In networked robot manipulators that deeply integrate control, communication and computation, the controller design needs to take into consideration the limited or costly system resources and the presence of disturbances/uncertainties. To cope with these requirements, this paper proposes a novel dynamic event-triggered robust tracking control method for a one-degree of freedom (DOF) link manipulator with external disturbance and system uncertainties via a reduced-order generalized proportional-integral observer (GPIO). By only using the sampled-data position signal, a new sampled-data robust output feedback tracking controller is proposed based on a reduced-order GPIO to attenuate the undesirable influence of the external disturbance and the system uncertainties. To save the communication resources, we propose a discrete-time dynamic event-triggering mechanism (DETM), where the estimates and the control signal are transmitted and computed only when the proposed discrete-time DETM is violated. It is shown that with the proposed control method, both tracking control properties and communication properties can be significantly improved. Finally, simulation results are shown to demonstrate the feasibility and efficacy of the proposed control approach.
, Available online  , doi: 10.1109/JAS.2019.1911729 doi: 10.1109/JAS.2019.1911729
Abstract:
In this paper, a kind of lateral stability control strategy is put forward about the four wheel independent drive electric vehicle. The design of control system adopts hierarchical structure. Unlike the previous control strategy, this paper introduces a method which is the combination of sliding mode control and optimal allocation algorithm. According to the driver's operation commands (steering angle and speed), the steady state responses of the sideslip angle and yaw rate are obtained. Based on this, the reference model is built. Upper controller adopts the sliding mode control principle to obtain the desired yawing moment demand. Lower controller is designed to satisfy the desired yawing moment demand by optimal allocation of the tire longitudinal forces. Firstly, the optimization goal is built to minimize the actuator cost. Secondly, the weighted least-square method is used to design the tire longitudinal forces optimization distribution strategy under the constraint conditions of actuator and the friction oval. Beyond that, when the optimal allocation algorithm is not applied, a method of axial load ratio distribution is adopted. Finally, CarSim associated with Simulink simulation experiments are designed under the conditions of different velocities and different pavements. The simulation results show that the control strategy designed in this paper has a good following effect comparing with the reference model and the sideslip angle \begin{document}$\beta$\end{document} is controlled within a small rang at the same time. Beyond that, based on the optimal distribution mode, the electromagnetic torque phase of each wheel can follow the trend of the vertical force of the tire, which shows the effectiveness of the optimal distribution algorithm.
, Available online
Abstract:
Embedded systems have numerous applications in everyday life. Petri-net-based Representation for Embedded Systems (PRES+) is an important methodology for the modeling and analysis of these embedded systems. For a large complex embedded system, the state space explosion is a difficult problem for PRES+ to model and analyze. The Petri net synthesis method allows one to bypass the state space explosion issue. To solve this problem, as well as model and analyze large complex systems, two synthesis methods for PRES+ are presented in this paper. First, the property preservation of the synthesis shared transition set method is investigated. The property preservation of the synthesis shared transition subnet set method is then studied. An abstraction-synthesis-refinement representation method is proposed. Through this representation method, the synthesis shared transition set approach is used to investigate the property preservation of the synthesis shared transition subnet set operation. Under certain conditions, several important properties of these synthetic nets are preserved, namely reachability, timing, functionality, and liveness. An embedded control system model is used as an example to illustrate the effectiveness of these synthesis methods for PRES+.
, Available online
Abstract:
Fault and delay accommodating simultaneously for a class of linear systems subject to state delays, actuator faults and disturbances is investigated in this work. A matrix norm minimization technique is applied to minimize the norms of coefficient matrix on time delay terms of the system in consideration. Compared with the matrix inequality scaling technique, the minimization technique can relax substantially the obtained stability conditions for state delay systems, especially, when the coefficient matrices of time delay terms have a large order of magnitudes. An output feedback adaptive fault-delay tolerant controller (AFDTC) is designed subsequently to stabilize the plant with state delays and actuator faults. Compared with the conventional fault tolerant controller (FTC), the designed output feedback AFDTC can be updated on-line to compensate the effect of both faults and delays on systems. Simulation results under two numerical examples exhibit the effectiveness and merits of the proposed method.
, Available online  , doi: 10.1109/JAS.2019.1911669 doi: 10.1109/JAS.2019.1911669
Abstract:
This article proposes a new distributed formation flight protocol for unmanned aerial vehicles (UAVs) to perform coordinated circular tracking around a set of circles on a target sphere. Different from the previous results limited in bidirectional networks and disturbance-free motions, this paper handles the circular formation flight control problem with both directed network and spatiotemporal disturbance with the knowledge of its upper bound. Distinguishing from the design of a common Lyaponov function for bidirectional cases, we separately design the control for the circular tracking subsystem and the formation keeping subsystem with the circular tracking error as input. Then the whole control system is regarded as a cascade connection of these two subsystems, which is proved to be stable by input-to-state stability (ISS) theory. For the purpose of encountering the external disturbance, the backstepping technology is introduced to design the control inputs of each UAV pointing to North and Down along the special sphere (say, the circular tracking control algorithm) with the help of the switching function. Meanwhile, the distributed linear consensus protocol integrated with anther switching anti-interference item is developed to construct the control input of each UAV pointing to east along the special sphere (say, the formation keeping control law) for formation keeping. The validity of the proposed control law is proved both in the rigorous theory and through numerical simulations.
, Available online
Abstract:
A robust delay compensator has been developed for a class of uncertain nonlinear systems with an unknown constant input delay. The control law consists of feedback terms based on the integral of past control values and a novel filtered tracking error, capable of compensating for input delays. Suitable Lyapunov-Krasovskii functionals are used to prove global uniformly ultimately bounded (GUUB) tracking, provided certain sufficient gain conditions, dependent on the bound of the delay, are satisfied. Simulation results illustrate the performance and robustness of the controller for different values of input delay.
, Available online
Abstract:
To overcome the shortcomings of 1D and 2D Otsu’s thresholding techniques, the 3D Otsu method has been developed. Among all Otsu’s methods, 3D-Otsu technique provides the best threshold values for the multi-level thresholding processes. In this paper, to improve the quality of segmented images, a simple and effective multilevel thresholding method is introduced. The proposed approach focuses on preserving edge detail by computing the 3D Otsu along the fusion phenomena. The advantages of the presented scheme include higher quality outcomes, better preservation of tiny details and boundaries and reduced execution time with rising threshold levels. The fusion approach depends upon the differences between pixel intensity values within a small local space of an image; it aims to improve localized information after the thresholding process. The fusion of images based on local contrast can improve image segmentation performance by minimizing the loss of local contrast, loss of details and gray-level distributions. Results show that the proposed method yields more promising segmentation results when compared to conventional 1D Otsu, 2D Otsu and 3D Otsu methods, as evident from the objective and subjective evaluations.
, Available online
Abstract:
In this paper, a Large Dynamic Range Floating Memristor Emulator (LDRFME) with equal port current restriction is proposed to be achieved by a large dynamic range floating Voltage-Controlled Linear Resistor (VCLR). Since real memristors have not been largely commercialized until now, the application of a LDRFME to memristive systems is reasonable. Motivated by this need, this paper proposes an achievement of a LDRFME based on a feasible transistor model. A first circuit extends the voltage range of the triode region of an ordinary Junction Field Effect Transistor (JFET). The idea is to use this JFET transistor as a tunable linear resistor. A second memristive non-linear circuit is used to drive the resistance of the first JFET transistor. Then those two circuits are connected together and, under certain conditions, the obtained " resistor” presents a hysteretic behavior, which is considered as a memristive effect. The electrical characteristics of a LDRFME are validated by software simulation and real measurement, respectively.
, Available online  , doi: 10.1109/JAS.2019.1911660 doi: 10.1109/JAS.2019.1911660
Abstract:
In minimally invasive surgery, one of the main objectives is to ensure safety and target reaching accuracy during needle steering inside the target organ. In this research work, the needle steering approach is determined using a robust control algorithm namely the Integral sliding mode control (ISMC) strategy to eliminate the chattering problem associated with the general clinical scenario. In general, the discontinuity component of feedback control input is not appropriate for the needle steering methodology due to the practical limitations of the driving actuators. Thus in ISMC, we have incorporated the replacement of the discontinuous component using a super twisting control (STC) input due to its unique features of chattering elimination and disturbance observation characteristics. In our study, the kinematic model of an asymmetric flexible bevel-tip needle in a soft-tissue phantom is used to evaluate stability analysis. A comparative study based on the analysis of chattering elimination is executed to determine the performance of the proposed control strategy in real-time needle steering with conventional sliding mode control using vision feedback through simulation and experimental results. This validates the efficacy of the proposed control strategy for clinical needle steering.
, Available online
Abstract:
Integrated circuit chips are produced on silicon wafers. Robotic cluster tools are widely used since they provide a reconfigurable and efficient environment for most wafer fabrication processes. Recent advances in new semiconductor materials bring about new functionality for integrated circuits. After a wafer is processed in a processing chamber, the wafer should be removed there as fast as possible to guarantee its high-quality integrated circuits. Meanwhile, maximization of the throughput of robotic cluster tools is desired. This work aims to perform post-processing time-aware scheduling for such tools subject to wafer residency time constraints. To do so, closed-form expression algorithms are derived to compute robot waiting time accurately upon the analysis of particular events of robots waiting for single-arm cluster tools. Examples are given to show the application and effectiveness of our proposed algorithms.
, Available online
Abstract:
Many effective optimization algorithms require partial derivatives of objective functions, while some optimization problems' objective functions have no derivatives. According to former research studies, search direction is obtained using the quadratic hypothesis of objective functions. Based on derivatives, quadratic function assumptions, and directional derivatives, the computational commonalities of numerical first-order partial derivatives, second-order partial derivatives, and numerical second-order mixed partial derivatives were constructed. Based on the coordinate transformation relation, a set of orthogonal vectors in the fixed coordinate system was established according to the optimization direction. A numerical algorithm was proposed, taking the second order approximation direction as an example. A large stepsize numerical algorithm based on coordinate transformation was proposed. Several algorithms were validated by an unconstrained optimization of the two-dimensional Rosenbrock objective function. The numerical second order approximation direction with the numerical mixed partial derivatives showed good results. The calculated amount accounts for 0.2843% of the calculated value of the second-order mixed partial derivative. In the process of rotating the local coordinate system 360°, because the objective function is more complex than the quadratic function, if the numerical direction derivative is used instead of the analytic partial derivative, the optimization direction varies with a range of 103.05°. Because theoretical error is in the numerical negative gradient direction, the calculation with the coordinate transformation is 94.71% less than the calculation without coordinate transformation. If there is no theoretical error in the numerical negative gradient direction or in the large-stepsize numerical optimization algorithm based on the coordinate transformation, the sawtooth phenomenon occurs. When each numerical mixed partial derivative takes more than one point, the optimization results cannot be improved. The numerical direction based on the quadratic hypothesis only requires the objective function to be obtained, but does not require derivability and does not take into account truncation error and rounding error. Thus, the application scopes of many optimization methods are extended.
, Available online
Abstract:
By virtue of alternating direction method of multipliers (ADMM), Newton-Raphson method, ratio consensus approach and running sum method, two distributed iterative strategies are presented in this paper to address the economic dispatch problem (EDP) in power systems. Different from most of the existing distributed ED approaches which neglect the effects of packet drops or/and time delays, this paper takes into account both packet drops and time delays which frequently occur in communication networks. Moreover, directed and possibly unbalanced graphs are considered in our algorithms, over which many distributed approaches fail to converge. Furthermore, the proposed schemes can address the EDP with local constraints of generators and nonquadratic convex cost functions, not just quadratic ones required in some existing ED approaches. Both theoretical analyses and simulation studies are provided to demonstrate the effectiveness of the proposed schemes.
, Available online  , doi: 10.1109/JAS.2019.1911651 doi: 10.1109/JAS.2019.1911651
Abstract:
Networked control systems are spatially distributed systems in which the communication between sensors, actuators, and controllers occurs through a shared band-limited digital communication network. Several advantages of the network architectures include reduced system wiring, plug and play devices, increased system agility, and ease of system diagnosis and maintenance. Consequently, networked control is the current trend for industrial automation and has ever-increasing applications in a wide range of areas, such as smart grids, manufacturing systems, process control, automobiles, automated highway systems, and unmanned aerial vehicles. The modelling, analysis, and control of networked control systems have received considerable attention in the last two decades. The ‘control over networks’ is one of the key research directions for networked control systems. This paper aims at presenting a survey of trends and techniques in networked control systems from the perspective of ‘control over networks’, providing a snapshot of five control issues: sampled-data control, quantization control, networked control, event-triggered control, and security control. Some challenging issues are suggested to direct the future research.
, Available online
Abstract:
The stabilization problem of distributed proportional-integral-derivative (PID) controllers for general first-order multi-agent systems with time delay is investigated in the paper. The closed-loop multi-input multi-output (MIMO) framework in frequency domain is firstly introduced for the multi-agent system. Based on the matrix theory, the whole system is decoupled into several subsystems with respect to the eigenvalues of the Laplacian matrix. Considering that the eigenvalues may be complex numbers, the consensus problem of the multi-agent system is transformed into the stabilizing problem of all the subsystems with complex coefficients. For each subsystem with complex coefficients, the range of admissible proportional gains \begin{document}${k_{\rm{P}}}$\end{document} is analytically determined. Then, the stabilizing region in the space of integral gain (\begin{document}${k_{\rm{I}}}$\end{document}) and derivative gain (\begin{document}${k_{\rm{D}}}$\end{document}) for a given \begin{document}${k_{\rm{P}}}$\end{document} value is also obtained in an analytical form. The entire stabilizing set can be determined by sweeping \begin{document}${k_{\rm{P}}}$\end{document} in the allowable range. The proposed method is conducted for general first-order multi-agent systems under arbitrary topology including undirected and directed graph topology. Besides, the results in the paper provide the basis for the design of distributed PID controllers satisfying different performance criteria. The simulation examples are presented to check the validity of the proposed control strategy
, Available online
Abstract:
The Möller algorithm is a self-stabilizing minor component analysis algorithm. This research document involves the study of the convergence and dynamic characteristics of the Möller algorithm using the deterministic discrete time (DDT) methodology. Unlike other analysis methodologies, the DDT methodology is capable of serving the distinct time characteristic and having no constraint conditions. Through analyzing the dynamic characteristics of the weight vector, several convergence conditions are drawn, which are beneficial for its application. The performing computer simulations and real applications demonstrate the correctness of the analysis’s conclusions.
, Available online
Abstract:
The monitoring of flue gas of the thermal power plants is of great significance in energy conservation and environmental protection. Spectral technique has been widely used in the gas monitoring system for predicting the concentrations of specific gas components. This paper proposes flue gas monitoring system with empirically-trained dictionary (ETD) to deal with the complexity and biases brought by the uninformative spectral data. Firstly, ETD is extracted from the raw spectral data by an alternative optimization between the sparse coding stage and the dictionary update stage to minimize the error of sparse representation. D1, D2 and D3 are three types of ETD obtained by different methods. Then, the predictive model of component concentration is constructed on the ETD. In the experiments, two real flue gas spectral datasets are collected and the proposed method combined with the partial least squares, the background propagation neural network and the support vector machines are performed. Moreover, the optimal parameters are chosen according to the 10-fold rootmean-square error of cross validation. The experimental results demonstrate that the proposed method can be used for quantitative analysis effectively and ETD can be applied to the gas monitoring systems. Note to Practitioners—The monitoring of the flue gas of the thermal power plants is very important and spectral technique has been widely used in the gas monitoring system for predicting the concentrations of specific gas components. However, the redundant and unrelated information of spectra lower the precision of the predictive model. This paper proposes flue gas monitoring system with ETD to deal with the complexity and biases brought by the uninformative spectral data. The predictive model of component concentration is constructed on the ETD instead of the original spectral space. The proposed method can be used for quantitative analysis effectively and ETD can be applied to the gas monitoring systems.
, Available online
Abstract:
In this paper, an open-loop PD-type iterative learning control (ILC) scheme is first proposed for two kinds of distributed parameter systems (DPSs) which are described by parabolic partial differential equations using non-collocated sensors and actuators. Then, a closed-loop PD-type ILC algorithm is extended to a class of distributed parameter systems with a non-collocated single sensor and \begin{document}$m$\end{document} actuators when the initial states of the system exist some errors. Under some given assumptions, the convergence conditions of output errors for the systems can be obtained in the sense of the \begin{document}$\lambda$\end{document}-norm. Finally, one numerical example for a distributed parameter system with a single sensor and two actuators is presented to illustrate the effectiveness of the proposed ILC schemes.
, Available online  , doi: 10.1109/JAS.2019.1911648 doi: 10.1109/JAS.2019.1911648
Abstract:
The passwords for unlocking the mobile devices are relatively simple, easier to be stolen, which causes serious potential security problems. An important research direction of identity authentication is to establish user behavior models to authenticate users. In this paper, a mobile terminal APP browsing behavioral authentication system architecture which synthesizes multiple factors is designed. This architecture is suitable for users using the mobile terminal APP in the daily life. The architecture includes data acquisition, data processing, feature extraction, and sub model training. We can use this architecture for continuous authentication when the user uses APP at the mobile terminal.
, Available online  , doi: 10.1109/JAS.2019.1911645 doi: 10.1109/JAS.2019.1911645
Abstract:
Prediction intervals (PIs) for industrial time series can provide useful guidance for workers. Given that the failure of industrial sensors may cause the missing point in inputs, the existing kernel dynamic Bayesian networks (KDBN), serving as an effective method for PIs construction, suffer from high computational load using the stochastic algorithm for inference. This study proposes a variational inference method for the KDBN for the purpose of fast inference, which avoids the time-consuming stochastic sampling. The proposed algorithm contains two stages. The first stage involves the inference of the missing inputs by using a local linearization based variational inference, and based on the computed posterior distributions over the missing inputs the second stage sees a Gaussian approximation for probability over the nodes in future time slices. To verify the effectiveness of the proposed method, a synthetic dataset and a practical dataset of generation flow of blast furnace gas (BFG) are employed with different ratios of missing inputs. The experimental results indicate that the proposed method can provide reliable PIs for the generation flow of BFG and it exhibits shorter computing time than the stochastic based one.
, Available online  , doi: 10.1109/JAS.2019.1911528 doi: 10.1109/JAS.2019.1911528
Abstract:
Structure reconstruction of 3D anatomy from bi-planar X-ray images is a challenging topic. Traditionally, the elastic-model-based method was used to reconstruct 3D shapes by deforming the control points on the elastic mesh. However, the reconstructed shape is not smooth because the limited control points are only distributed on the edge of the elastic mesh. Alternatively, statistical-model-based methods, which include shape-model-based and intensity-model-based methods, are introduced due to their smooth reconstruction. However, both suffer from limitations. With the shape-model-based method, only the boundary profile is considered, leading to the loss of valid intensity information. For the intensity-based-method, the computation speed is slow because it needs to calculate the intensity distribution in each iteration. To address these issues, we propose a new reconstruction method using X-ray images and a specimen’s CT data. Specifically, the CT data provides both the shape mesh and the intensity model of the vertebra. Intensity model is used to generate the deformation field from X-ray images, while the shape model is used to generate the patient specific model by applying the calculated deformation field. Experiments on the public synthetic dataset and clinical dataset show that the average reconstruction errors are 1.1 mm and 1.2 mm, separately. The average reconstruction time is 3 minutes.
, Available online  , doi: 10.1109/JAS.2019.1911624 doi: 10.1109/JAS.2019.1911624
Abstract:
This paper investigates the stability of switched systems with time-varying delay and all unstable subsystems. According to the stable convex combination, we design a state-dependent switching rule. By employing wirtinger integral inequality and Leibniz-Newton formula, the stability results of nonlinear delayed switched systems whose nonlinear terms satisfy Lipschitz condition under the designed state-dependent switching rule are established for different assumptions on time delay. Moreover, some new stability results for linear delayed switched systems are also presented. The effectiveness of the proposed results is validated by two typical numerical examples.
, Available online  , doi: 10.1109/JAS.2019.1911639 doi: 10.1109/JAS.2019.1911639
Abstract:
In this paper, a kind of lateral stability control strategy is put forward about the four wheel independent drive electric vehicle. The design of control system adopts hierarchical structure. Unlike the previous control strategy, this paper introduces a method which is the combination of sliding mode control and optimal allocation algorithm. According to the driver's operation commands (steering angle and speed), the steady state responses of the sideslip angle and yaw rate are obtained. Based on this, the reference model is built. Upper controller adopts the sliding mode control principle to obtain the desired yawing moment demand. Lower controller is designed to satisfy the desired yawing moment demand by optimal allocation of the tire longitudinal forces. Firstly, the optimization goal is built to minimize the actuator cost. Secondly, the weighted least-square method is used to design the tire longitudinal forces optimization distribution strategy under the constraint conditions of actuator and the friction oval. Beyond that, when the optimal allocation algorithm is not applied, a method of axial load ratio distribution is adopted. Finally, CarSim associated with Simulink simulation experiments are designed under the conditions of different velocities and different pavements. The simulation results show that the control strategy designed in this paper has a good following effect comparing with the reference model and the sideslip angle \begin{document}$\beta$\end{document} is controlled within a small rang at the same time. Beyond that, based on the optimal distribution mode, the electromagnetic torque phase of each wheel can follow the trend of the vertical force of the tire, which shows the effectiveness of the optimal distribution algorithm.
, Available online
Abstract:
The conventional Kalman filter is based on the assumption of non-delayed measurements. Several modifications appear to address this problem, but they are constrained by two crucial assumptions: i) the delay is an integer multiple of the sampling interval, and ii) a stochastic model representing the relationship between delayed measurements and a sequence of possible non-delayed measurements is known. Practical problems often fail to satisfy these assumptions, leading to poor estimation accuracy and frequent track-failure. This paper introduces a new variant of the Kalman filter, which is free from the stochastic model requirement and addresses the problem of fractional delay. The proposed algorithm fixes the maximum delay (problem specific), which can be tuned by the practitioners for varying delay possibilities. A sequence of hypothetically defined intermediate instants characterizes fractional delays while maximum likelihood based delay identification could preclude the stochastic model requirement. Fractional delay realization could help in improving estimation accuracy. Moreover, precluding the need of a stochastic model could enhance the practical applicability. A comparative analysis with ordinary Kalman filter shows the high estimation accuracy of the proposed method in the presence of delay.
, Available online
Abstract:
In this paper, an event-triggered sliding mode control approach for trajectory tracking problem of nonlinear input affine system with disturbance has been proposed. A second order robotic manipulator system has been modeled into a general nonlinear input affine system. Initially, the global asymptotic stability is ensured with conventional periodic sampling approach for reference trajectory tracking. Then the proposed approach of event-triggered sliding mode control is discussed which guarantees semi-global uniform ultimate boundedness. The proposed control approach guarantees non-accumulation of control updates ensuring lower bounds on inter-event triggering instants avoiding Zeno behavior in presence of the disturbance. The system shows better performance in terms of reduced control updates, ensures system stability which further guarantees optimization of resource usage and cost. The simulation results are provided for validation of proposed methodology for tracking problem by a robotic manipulator. The number of aperiodic control updates is found to be approximately 44% and 61% in the presence of constant and time-varying disturbances respectively.
, Available online  , doi: 10.1109/JAS.2019.1911534 doi: 10.1109/JAS.2019.1911534
Abstract:
Hand gesture recognition is a popular topic in computer vision and makes human-computer interaction more flexible and convenient. The representation of hand gestures is critical for recognition. In this paper, we propose a new method to measure the similarity between hand gestures and exploit it for hand gesture recognition. The depth maps of hand gestures captured via the Kinect sensors are used in our method, where the 3D hand shapes can be segmented from the cluttered backgrounds. To extract the pattern of salient 3D shape features, we propose a new descriptor–3D Shape Context, for 3D hand gesture representation. The 3D Shape Context information of each 3D point is obtained in multiple scales because both local shape context and global shape distribution are necessary for recognition. The description of all the 3D points constructs the hand gesture representation, and hand gesture recognition is explored via dynamic time warping algorithm. Extensive experiments are conducted on multiple benchmark datasets. The experimental results verify that the proposed method is robust to noise, articulated variations, and rigid transformations. Our method outperforms state-of-the-art methods in the comparisons of accuracy and efficiency.
, Available online
Abstract:
For the complex batch process with characteristics of unequal batch data length, a novel data-driven batch process monitoring method is proposed based on mixed data features analysis and multi-way kernel entropy component analysis (MDFA-MKECA) in this paper. Combining the mechanistic knowledge, different mixed data features of each batch including statistical and thermodynamics entropy features, are extracted to finish data pre-processing. After that, MKECA is applied to reduce data dimensionality and finally establish a monitoring model. The proposed method is applied to a reheating furnace industry process, and the experimental results demonstrate that the MDFA-MKECA method can reduce the calculated amount and effectively provide on-line monitoring of the batch process.
, Available online
Abstract:
In this paper, a delay-dependent anti-windup compensator is designed for wide-area power systems to enhance the damping of inter-area low-frequency oscillations in the presence of time-varying delays and actuator saturation using an indirect approach. In this approach, first, a conventional wide-area damping controller is designed by using \begin{document}$H_{\infty}$\end{document} output feedback with regional pole placement approach without considering time-varying delays and actuator saturation. Then to mitigate the effect of both time-varying delays and actuator saturation, an add-on delay-dependent anti-windup compensator is designed. Based on generalized sector conditions, less conservative delay-dependent sufficient conditions are derived in the form of a linear matrix inequality (LMI) to guarantee the asymptotic stability of the closed-loop system in the presence of time-varying delays and actuator saturation by using Lyapunov-Krasovskii functional and Jensen integral inequality. Based on sufficient conditions, the LMI-based optimization problem is formulated and solved to obtain the compensator gain which maximizes the estimation of the region of attraction and minimizes the upper bound of \begin{document}$L_{2}$\end{document}-gain. Nonlinear simulations are performed first using MATLAB/Simulink on a two-area four-machine power system to evaluate the performance of the proposed controller for two operating conditions, e.g., 3-phase to ground fault and generator 1 terminal voltage variation. Then the proposed controller is implemented in real-time on an OPAL-RT digital simulator. From the results obtained it is verified that the proposed controller provides sufficient damping to the inter-area oscillations in the presence of time-varying delays and actuator saturation and maximizes the estimation of the region of attraction.
, Available online
Abstract:
In this paper, a video fire detection method is proposed, which demonstrated good performance in indoor environment. Three main novel ideas have been introduced. Firstly, a flame color model in RGB and HIS color space is used to extract pre-detected regions instead of traditional motion differential method, as it’s more suitable for fire detection in indoor environment. Secondly, according to the flicker characteristic of the flame, similarity and two main values of centroid motion are proposed. At the same time, a simple but effective method for tracking the same regions in consecutive frames is established. Thirdly, a multi-expert system consisting of color component dispersion, similarity and centroid motion is established to identify flames. The proposed method has been tested on a very large dataset of fire videos acquired both in real indoor environment tests and from the Internet. The experimental results show that the proposed approach achieved a balance between the false positive rate and the false negative rate, and demonstrated a better performance in terms of overall accuracy and F standard with respect to other similar fire detection methods in indoor environment.
, Available online
Abstract:
Miss distance is a critical parameter of assessing the performance for highly maneuvering targets interception (HMTI). In a realistic terminal guidance system, the control of pursuer \begin{document}$u$\end{document} depends on the estimate of unknown state, thus the miss distance becomes a random variable with a prior unknown distribution. Currently, such a distribution is mainly evaluated by the method of Monte Carlo simulation. In this paper, by integrating the estimation error model of zero-effort miss distance (ZEM) obtained by our previous work, an analytic method for solving the distribution of miss distance is proposed, in which the system is presumed to use a bang-bang control strategy. By comparing with the results of Monte Carlo simulations under four different types of disturbances (maneuvers), the correctness of the proposed method is validated. Results of this paper provide a powerful tool for the design, analysis and performance evaluation of guidance system.
, Available online
Abstract:
, Available online  , doi: 10.1109/JAS.2019.1911531 doi: 10.1109/JAS.2019.1911531
Abstract:
This paper investigates the sliding mode control problem for a class of discrete-time nonlinear networked Markovian jump systems in the presence of probabilistic Denial-of-Service attacks. The communication network via which the data is propagated is unsafe and the malicious adversary can attack the system during state feedback. By considering random Denial-of-Service attacks, a new sliding mode variable is designed, which takes into account the distribution information of the probabilistic attacks. Then, by resorting to Lyapunov theory and stochastic analysis methods, sufficient conditions are established for the existence of the desired sliding mode controller, guaranteeing both reachability of the designed sliding surface and stability of the resulting sliding motion. Finally, a simulation example is given to demonstrate the effectiveness of the proposed sliding mode control algorithm.
, Available online
Abstract:
Based on ACP (Artificial Systems, Computing Experiments, and Parallel Execution) methodology, parallel control and management has become a popularly systematic and complete solution for the control and management of complex systems. This paper focuses on summarizing comprehensive review of the research literature of parallel control and management achieved in the recent years including the theoretical framework, core technologies, and the application demonstration. The future research, application directions, and suggestions are also discussed.
, Available online
Abstract:
The phenomenon of mixed-mode is one of the most important characteristic of a switched delay system. If an networked control system (NCS) with network induced delays and packed dropouts (NIDs & PDs) is recast as a switched delay system, considering the effect of mixed-modes to the stability analysis is essential for an NCS. In this paper, with the help of interpolatory quadrature formula and by the average dwell time method, stabilization of NCSs using a mixed-mode based switched delay system method is investigated based on a novel constructed Lyapunov-Krasovskii functional. With Finsler's Lemma, new exponential stabilizability conditions with less conservativeness are given for the NCS. Finally, an illustrative example is provided to verify the effectiveness of the developed results.
, Available online  , doi: 10.1109/JAS.2019.1911516 doi: 10.1109/JAS.2019.1911516
Abstract:
This paper presents the development of a new robust optimal decentralized PI controller based on nonlinear optimization for liquid level control in a coupled tank system. The proposed controller maximizes the closed-loop bandwidth for specified gain and phase margins, with constraints on the overshoot ratio to achieve both closed-loop performance and robustness. In the proposed work, a frequency response fitting model reduction technique is initially employed to obtain a First Order Plus Dead Time (FOPDT) model of each higher order subsystem. Furthermore, based on the reduced order model, a proposed controller is designed. The stability and performance of the proposed controller are verified by considering multiplicative input and output uncertainties. The performance of the proposed optimal robust decentralized control scheme has been compared with that of a decentralized PI controller. The proposed controller is implemented in real-time on a coupled tank system. From the obtained results, it is shown that the proposed optimal decentralized PI controller exhibits superior control performance to maintain the desired level, for both the nominal as well as the perturbed case as compared to a decentralized PI controller.
, Available online  , doi: 10.1109/JAS.2019.1911519 doi: 10.1109/JAS.2019.1911519
Abstract:
This paper is concerned with a control problem of a diffusion process with the help of static mesh sensor networks in a certain region of interest and a team of networked mobile actuators carrying chemical neutralizers. The major contribution of this paper can be divided into three parts: the first is the construction of a cyber-physical system framework based on Centroidal Voronoi Tessellations (CVTs), the second is the convergence analysis of the actuators location, and the last is a novel proportional integral (PI) control method for actuator motion planning and neutralizing control (e.g. spraying) of a diffusion process with a moving or static pollution source, which is more effective than a proportional (P) control method. An optimal spraying control cost function is constructed. Then, the minimization problem of the spraying amount is addressed. Moreover, a new CVT algorithm based on the novel PI control method, henceforth called PI-CVT algorithm, is introduced together with the convergence analysis of the actuators location via a PI control law. Finally, a modified simulation platform called Diffusion-Mobile-Actuators-Sensors-2-Dimension-Proportional Integral Derivative (Diff-MAS2D-PID) is illustrated. In addition, a numerical simulation example for the diffusion process is presented to verify the effectiveness of our proposed controllers.
, Available online  , doi: 10.1109/JAS.2019.1911522 doi: 10.1109/JAS.2019.1911522
Abstract:
Linguistic single-valued neutrosophic set (LSVNS) is a more reliable tool, which is designed to handle the uncertainties of the situations involving the qualitative data. In the present manuscript, we introduce some power aggregation operators (AOs) for the LSVNSs, whose purpose is to diminish the influence of inevitable arguments about the decision-making process. For it, first we develop some averaging power operators, namely, linguistic single-valued neutrosophic (LSVN) power averaging, weighted average, ordered weighted average, and hybrid averaging AOs along with their desirable properties. Further, we extend it to the geometric power AOs for LSVNSs. Based on the proposed work; an approach to solve the group decision-making problems is given along with the numerical example. Finally, a comparative study and the validity tests are present to discuss the reliability of the proposed operators.
, Available online
Abstract:
This paper focuses on facilitating state-of-the-art applications of Big Data Analytics (BDA) architectures and infrastructures to Telecommunications (telecom) industrial sector. Telecom companies are dealing with terabytes to petabytes of data on a daily basis. IoT applications in telecom are further contributing to this data deluge. Recent advances in BDA have exposed new opportunities to get actionable insights from telecom big data. These benefits and the fast-changing BDA technology landscape make it important to investigate existing BDA applications to telecom sector. For this, we initially determine published research on BDA applications to telecom through a systematic literature review through which we filter 38 articles and categorize them in frameworks, use cases, literature reviews, white papers and experimental validations. We also discuss the benefits and challenges mentioned in these articles. We find that experiments are all Proof of Concepts (POC) on a severely limited BDA technology stack (as compared to the available technology stack), i.e., we didn't find any work focusing on full-fledged BDA implementation in an operational telecom environment. To facilitate these applications at research-level, we propose a state-of-the-art lambda architecture for BDA pipeline implementation (called LambdaTel) based completely on open source BDA technologies and the standard Python language, along with relevant guidelines. We discovered only one research paper which presented a relatively-limited lambda architecture using the proprietary AWS cloud infrastructure. We believe LambdaTel presents a clear roadmap for telecom industry practitioners to implement and enhance BDA applications in their enterprises.

IEEE/CAA Journal of Automatica Sinica

• CiteScore 2018: 5.31
Rank：Top 9% (Category of Control and Systems Engineering), Top 10% (Categories of Information System and Artificial Intelligence)