The discrete gradient evolutionary strategy method for global optimization
- Abbas, Hussein, Bagirov, Adil, Zhang, Jiapu
- Authors: Abbas, Hussein , Bagirov, Adil , Zhang, Jiapu
- Date: 2003
- Type: Text , Conference paper
- Relation: Paper presented at the Congress on Evolutionary Computation CEC 2003, Canberra : 8th December, 2003
- Full Text:
- Reviewed:
- Description: Global optimization problems continue to be a challenge in computational mathematics. The field is progressing in two streams: deterministic and heuristic approaches. In this paper, we present a hybrid method that uses the discrete gradient method, which is a derivative free local search method, and evolutionary strategies. We show that the hybridization of the two methods is better than each of them in isolation.
- Description: E1
- Description: 2003000440
- Authors: Abbas, Hussein , Bagirov, Adil , Zhang, Jiapu
- Date: 2003
- Type: Text , Conference paper
- Relation: Paper presented at the Congress on Evolutionary Computation CEC 2003, Canberra : 8th December, 2003
- Full Text:
- Reviewed:
- Description: Global optimization problems continue to be a challenge in computational mathematics. The field is progressing in two streams: deterministic and heuristic approaches. In this paper, we present a hybrid method that uses the discrete gradient method, which is a derivative free local search method, and evolutionary strategies. We show that the hybridization of the two methods is better than each of them in isolation.
- Description: E1
- Description: 2003000440
A review on chemical diagnosis techniques for transformer paper insulation degradation
- Abu Bakar, Norazhar, Abu Siada, Ahmed, Islam, Syed
- Authors: Abu Bakar, Norazhar , Abu Siada, Ahmed , Islam, Syed
- Date: 2013
- Type: Text , Conference proceedings , Conference paper
- Relation: 2013 Australasian Universities Power Engineering Conference, AUPEC 2013; Hobart, Australia; 29th September-3rd October 2013 p. 1-6
- Full Text:
- Reviewed:
- Description: Energized parts within power transformer are isolated using paper insulation and are immersed in insulating oil. Hence, transformer oil and paper insulation are essential sources to detect incipient and fast developing power transformer faults. Several chemical diagnoses techniques are developed to examine the condition of paper insulation such as degree of polymerization, carbon oxides, furanic compounds and methanol. The principle and limitation of these diagnoses are discussed and compared in this paper.
- Authors: Abu Bakar, Norazhar , Abu Siada, Ahmed , Islam, Syed
- Date: 2013
- Type: Text , Conference proceedings , Conference paper
- Relation: 2013 Australasian Universities Power Engineering Conference, AUPEC 2013; Hobart, Australia; 29th September-3rd October 2013 p. 1-6
- Full Text:
- Reviewed:
- Description: Energized parts within power transformer are isolated using paper insulation and are immersed in insulating oil. Hence, transformer oil and paper insulation are essential sources to detect incipient and fast developing power transformer faults. Several chemical diagnoses techniques are developed to examine the condition of paper insulation such as degree of polymerization, carbon oxides, furanic compounds and methanol. The principle and limitation of these diagnoses are discussed and compared in this paper.
Image processing-based on-line technique to detect power transformer winding faults
- Abu-Siada, Ahmed, Islam, Syed
- Authors: Abu-Siada, Ahmed , Islam, Syed
- Date: 2013
- Type: Text , Conference proceedings , Conference paper
- Relation: 39th Annual Conference of the IEEE Industrial Electronics Society, IECON 2013; Vienna, Austria; 10th-14th November 2013 p. 1-6
- Full Text:
- Reviewed:
- Description: Frequency Response Analysis (FRA) has been growing in popularity in recent times as a tool to detect mechanical deformation within power transformers. To conduct the test, the transformer has to be taken out of service which may cause interruption to the electricity grid. Moreover, because FRA relies on graphical analysis, it calls for an expert person to analyse the results as so far, there is no standard code for FRA interpretation worldwide. In this paper an online technique is introduced to detect the internal faults within a power transformer by constructing the voltage-current (V-I) locus diagram to provide a current state of the transformer health condition. The technique does not call for any special equipment as it uses the existing metering devices attached to any power transformer to monitor the input voltage, output voltage and the input current at the power frequency and hence online monitoring can be realised. Various types of faults have been simulated to assess its impact on the proposed locus. A Matlab code based on digital image processing is developed to calculate any deviation of the V-I locus with respect to the reference one and to identify the type of fault.
- Authors: Abu-Siada, Ahmed , Islam, Syed
- Date: 2013
- Type: Text , Conference proceedings , Conference paper
- Relation: 39th Annual Conference of the IEEE Industrial Electronics Society, IECON 2013; Vienna, Austria; 10th-14th November 2013 p. 1-6
- Full Text:
- Reviewed:
- Description: Frequency Response Analysis (FRA) has been growing in popularity in recent times as a tool to detect mechanical deformation within power transformers. To conduct the test, the transformer has to be taken out of service which may cause interruption to the electricity grid. Moreover, because FRA relies on graphical analysis, it calls for an expert person to analyse the results as so far, there is no standard code for FRA interpretation worldwide. In this paper an online technique is introduced to detect the internal faults within a power transformer by constructing the voltage-current (V-I) locus diagram to provide a current state of the transformer health condition. The technique does not call for any special equipment as it uses the existing metering devices attached to any power transformer to monitor the input voltage, output voltage and the input current at the power frequency and hence online monitoring can be realised. Various types of faults have been simulated to assess its impact on the proposed locus. A Matlab code based on digital image processing is developed to calculate any deviation of the V-I locus with respect to the reference one and to identify the type of fault.
Theoretical study and empirical investigation of sentence analogies
- Afantenos, Stergos, Lim, Suryani, Prade, Henri, Richard, Gilles
- Authors: Afantenos, Stergos , Lim, Suryani , Prade, Henri , Richard, Gilles
- Date: 2022
- Type: Text , Conference paper
- Relation: 1st Workshop on the Interactions between Analogical Reasoning and Machine Learning at 31st International Joint Conference on Artificial Intelligence - 25th European Conference on Artificial Intelligence, IARML@IJCAI-ECAI 2022, Vienna, Austria, 23 July 2022, CEUR Workshop Proceedings Vol. 3174, p. 15-28
- Full Text:
- Reviewed:
- Description: Analogies between 4 sentences, “a is to b as c is to d”, are usually defined between two pairs of sentences (a, b) and (c, d) by constraining a relation R holding between the sentences of the first pair, to hold for the second pair. From a theoretical perspective, three postulates define an analogy - one of which is the “central permutation” postulate which allows the permutation of central elements b and c. This postulate is no longer appropriate in sentence analogies since the existence of R offers no guarantee in general for the existence of some relation S such that S also holds for the pairs (a, c) and (b, d). In this paper, the “central permutation” postulate is replaced by a weaker “internal reversal” postulate to provide an appropriate definition of sentence analogies. To empirically validate the aforementioned postulate, we build a LSTM as well as baseline Random Forest models capable of learning analogies based on quadruplets. We use the Penn Discourse Treebank (PDTB), the Stanford Natural Language Inference (SNLI) and the Microsoft Research Paraphrase (MSRP) corpora. Our experiments show that our models trained on samples of analogies between (a, b) and (c, d), recognize analogies between (b, a) and (d, c) when the underlying relation is symmetrical, validating thus the formal model of sentence analogies using “internal reversal” postulate. © 2022 Copyright for this paper by its authors. Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0).
- Authors: Afantenos, Stergos , Lim, Suryani , Prade, Henri , Richard, Gilles
- Date: 2022
- Type: Text , Conference paper
- Relation: 1st Workshop on the Interactions between Analogical Reasoning and Machine Learning at 31st International Joint Conference on Artificial Intelligence - 25th European Conference on Artificial Intelligence, IARML@IJCAI-ECAI 2022, Vienna, Austria, 23 July 2022, CEUR Workshop Proceedings Vol. 3174, p. 15-28
- Full Text:
- Reviewed:
- Description: Analogies between 4 sentences, “a is to b as c is to d”, are usually defined between two pairs of sentences (a, b) and (c, d) by constraining a relation R holding between the sentences of the first pair, to hold for the second pair. From a theoretical perspective, three postulates define an analogy - one of which is the “central permutation” postulate which allows the permutation of central elements b and c. This postulate is no longer appropriate in sentence analogies since the existence of R offers no guarantee in general for the existence of some relation S such that S also holds for the pairs (a, c) and (b, d). In this paper, the “central permutation” postulate is replaced by a weaker “internal reversal” postulate to provide an appropriate definition of sentence analogies. To empirically validate the aforementioned postulate, we build a LSTM as well as baseline Random Forest models capable of learning analogies based on quadruplets. We use the Penn Discourse Treebank (PDTB), the Stanford Natural Language Inference (SNLI) and the Microsoft Research Paraphrase (MSRP) corpora. Our experiments show that our models trained on samples of analogies between (a, b) and (c, d), recognize analogies between (b, a) and (d, c) when the underlying relation is symmetrical, validating thus the formal model of sentence analogies using “internal reversal” postulate. © 2022 Copyright for this paper by its authors. Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0).
Analogies between sentences : theoretical aspects - preliminary experiments
- Afantenos, Stergos, Kunze, Tarek, Lim, Suryani, Prade, Henri, Richard, Gilles
- Authors: Afantenos, Stergos , Kunze, Tarek , Lim, Suryani , Prade, Henri , Richard, Gilles
- Date: 2021
- Type: Text , Conference paper
- Relation: 16th European Conference on Symbolic and Quantitative Approaches to Reasoning with Uncertainty, ECSQARU 2021 Vol. 12897 LNAI, p. 3-18
- Full Text:
- Reviewed:
- Description: Analogical proportions hold between 4 items a, b, c, d insofar as we can consider that “a is to b as c is to d”. Such proportions are supposed to obey postulates, from which one can derive Boolean or numerical models that relate vector-based representations of items making a proportion. One basic postulate is the preservation of the proportion by permuting the central elements b and c. However this postulate becomes debatable in many cases when items are words or sentences. This paper proposes a weaker set of postulates based on internal reversal, from which new Boolean and numerical models are derived. The new system of postulates is used to extend a finite set of examples in a machine learning perspective. By embedding a whole sentence into a real-valued vector space, we tested the potential of these weaker postulates for classifying analogical sentences into valid and non-valid proportions. It is advocated that identifying analogical proportions between sentences may be of interest especially for checking discourse coherence, question-answering, argumentation and computational creativity. The proposed theoretical setting backed with promising preliminary experimental results also suggests the possibility of crossing a real-valued embedding with an ontology-based representation of words. This hybrid approach might provide some insights to automatically extract analogical proportions in natural language corpora. © 2021, Springer Nature Switzerland AG.
- Authors: Afantenos, Stergos , Kunze, Tarek , Lim, Suryani , Prade, Henri , Richard, Gilles
- Date: 2021
- Type: Text , Conference paper
- Relation: 16th European Conference on Symbolic and Quantitative Approaches to Reasoning with Uncertainty, ECSQARU 2021 Vol. 12897 LNAI, p. 3-18
- Full Text:
- Reviewed:
- Description: Analogical proportions hold between 4 items a, b, c, d insofar as we can consider that “a is to b as c is to d”. Such proportions are supposed to obey postulates, from which one can derive Boolean or numerical models that relate vector-based representations of items making a proportion. One basic postulate is the preservation of the proportion by permuting the central elements b and c. However this postulate becomes debatable in many cases when items are words or sentences. This paper proposes a weaker set of postulates based on internal reversal, from which new Boolean and numerical models are derived. The new system of postulates is used to extend a finite set of examples in a machine learning perspective. By embedding a whole sentence into a real-valued vector space, we tested the potential of these weaker postulates for classifying analogical sentences into valid and non-valid proportions. It is advocated that identifying analogical proportions between sentences may be of interest especially for checking discourse coherence, question-answering, argumentation and computational creativity. The proposed theoretical setting backed with promising preliminary experimental results also suggests the possibility of crossing a real-valued embedding with an ontology-based representation of words. This hybrid approach might provide some insights to automatically extract analogical proportions in natural language corpora. © 2021, Springer Nature Switzerland AG.
Investigation of microgrid instability caused by time delay
- Aghanoori, Navid, Masoum, Mohammad, Islam, Syed, Nethery, Steven
- Authors: Aghanoori, Navid , Masoum, Mohammad , Islam, Syed , Nethery, Steven
- Date: 2017
- Type: Text , Conference proceedings , Conference paper
- Relation: 10th International Conference on Electrical and Electronics Engineering, ELECO 2017; Bursa, Turkey; 29th-2nd December 2017 Vol. 2018, p. 105-110
- Full Text:
- Reviewed:
- Description: This paper investigates the impact of time delay in the control of a grid-connected microgrid with renewable energy resources. The considered microgrid has a critical load that needs to be powered and protected in the event of grid voltage disturbance while the microgrid maintains connection to the grid. Three case studies are performed considering three different time delays to indicate the advantages of fast communication system in the performance of renewable microgrids. Detailed simulation results illustrate that the proposed communication system using IEC 61850 substation automation standard provides better voltage and current quality to the critical local load with larger phase and gain margins while keeping the microgid connected to main grid.
- Authors: Aghanoori, Navid , Masoum, Mohammad , Islam, Syed , Nethery, Steven
- Date: 2017
- Type: Text , Conference proceedings , Conference paper
- Relation: 10th International Conference on Electrical and Electronics Engineering, ELECO 2017; Bursa, Turkey; 29th-2nd December 2017 Vol. 2018, p. 105-110
- Full Text:
- Reviewed:
- Description: This paper investigates the impact of time delay in the control of a grid-connected microgrid with renewable energy resources. The considered microgrid has a critical load that needs to be powered and protected in the event of grid voltage disturbance while the microgrid maintains connection to the grid. Three case studies are performed considering three different time delays to indicate the advantages of fast communication system in the performance of renewable microgrids. Detailed simulation results illustrate that the proposed communication system using IEC 61850 substation automation standard provides better voltage and current quality to the critical local load with larger phase and gain margins while keeping the microgid connected to main grid.
Process performance evaluation using evolutionary algorithm
- Ahmad, S., Huda, Shamsul, Bakir, S., Abdollahian, Mali, Zeephongsekul, P.
- Authors: Ahmad, S. , Huda, Shamsul , Bakir, S. , Abdollahian, Mali , Zeephongsekul, P.
- Date: 2009
- Type: Text , Conference paper
- Relation: Paper presented at 2009 International Conference on Information & Knowledge Engineering, IKE 2009, Las Vegas, Nevada, U.S.A. : 13th-16th July 2009 p. 731-737
- Full Text:
- Description: Nowadays every business is using different quantitative measures and techniques to assess performance of their products / services. It is well known that different manufacturing processes very often manufacture products with quality characteristics that do not follow normal distribution. In such cases, fitting a known non-normal distribution to these quality characteristics would lead to erroneous results. Furthermore, there is always more than one characteristic Critical to Quality (CTQ) in the process outcomes and very often these quality characteristics are correlated with each other. In this paper, we assess performance of such a bivariate process data which is non-normal as well as correlated. We will use the geometric distance approach to reduce the dimension of the correlated non-normal bivariate data and then fit Burr distribution to the geometric distance variable. The optimal parameters of the fitted Burr distribution are estimated using Evolutionary Algorithm (EA). The results are compared with those using Simulated Annealing (SA) algorithm. The proportion of nonconformance (PNC) for process measurements is then obtained by using the fitted Burr distributions based on the two methods. The results based on both search algorithms are then compared with the exact proportion of nonconformance of the data. Finally, a case study using real data is presented.
- Description: 2003008140
- Authors: Ahmad, S. , Huda, Shamsul , Bakir, S. , Abdollahian, Mali , Zeephongsekul, P.
- Date: 2009
- Type: Text , Conference paper
- Relation: Paper presented at 2009 International Conference on Information & Knowledge Engineering, IKE 2009, Las Vegas, Nevada, U.S.A. : 13th-16th July 2009 p. 731-737
- Full Text:
- Description: Nowadays every business is using different quantitative measures and techniques to assess performance of their products / services. It is well known that different manufacturing processes very often manufacture products with quality characteristics that do not follow normal distribution. In such cases, fitting a known non-normal distribution to these quality characteristics would lead to erroneous results. Furthermore, there is always more than one characteristic Critical to Quality (CTQ) in the process outcomes and very often these quality characteristics are correlated with each other. In this paper, we assess performance of such a bivariate process data which is non-normal as well as correlated. We will use the geometric distance approach to reduce the dimension of the correlated non-normal bivariate data and then fit Burr distribution to the geometric distance variable. The optimal parameters of the fitted Burr distribution are estimated using Evolutionary Algorithm (EA). The results are compared with those using Simulated Annealing (SA) algorithm. The proportion of nonconformance (PNC) for process measurements is then obtained by using the fitted Burr distributions based on the two methods. The results based on both search algorithms are then compared with the exact proportion of nonconformance of the data. Finally, a case study using real data is presented.
- Description: 2003008140
A coarse representation of frames oriented video coding by leveraging cuboidal partitioning of image data
- Ahmmed, Ashe, Paul, Manoranjan, Murshed, Manzur, Taubman, David
- Authors: Ahmmed, Ashe , Paul, Manoranjan , Murshed, Manzur , Taubman, David
- Date: 2020
- Type: Text , Conference paper
- Relation: 22nd IEEE International Workshop on Multimedia Signal Processing, MMSP 2020, Virtual Tampere, Finland 21-24 September 2020
- Full Text:
- Reviewed:
- Description: Video coding algorithms attempt to minimize the significant commonality that exists within a video sequence. Each new video coding standard contains tools that can perform this task more efficiently compared to its predecessors. In this work, we form a coarse representation of the current frame by minimizing commonality within that frame while preserving important structural properties of the frame. The building blocks of this coarse representation are rectangular regions called cuboids, which are computationally simple and has a compact description. Then we propose to employ the coarse frame as an additional source for predictive coding of the current frame. Experimental results show an improvement in bit rate savings over a reference codec for HEVC, with minor increase in the codec computational complexity. © 2020 IEEE.
- Authors: Ahmmed, Ashe , Paul, Manoranjan , Murshed, Manzur , Taubman, David
- Date: 2020
- Type: Text , Conference paper
- Relation: 22nd IEEE International Workshop on Multimedia Signal Processing, MMSP 2020, Virtual Tampere, Finland 21-24 September 2020
- Full Text:
- Reviewed:
- Description: Video coding algorithms attempt to minimize the significant commonality that exists within a video sequence. Each new video coding standard contains tools that can perform this task more efficiently compared to its predecessors. In this work, we form a coarse representation of the current frame by minimizing commonality within that frame while preserving important structural properties of the frame. The building blocks of this coarse representation are rectangular regions called cuboids, which are computationally simple and has a compact description. Then we propose to employ the coarse frame as an additional source for predictive coding of the current frame. Experimental results show an improvement in bit rate savings over a reference codec for HEVC, with minor increase in the codec computational complexity. © 2020 IEEE.
Human-machine collaborative video coding through cuboidal partitioning
- Ahmmed, Ashek, Paul, Manoranjan, Murshed, Manzur, Taubman, David
- Authors: Ahmmed, Ashek , Paul, Manoranjan , Murshed, Manzur , Taubman, David
- Date: 2021
- Type: Text , Conference paper
- Relation: 2021 IEEE International Conference on Image Processing, ICIP 2021, Anchorage, USA 19-22 September 2021, Proceedings - International Conference on Image Processing, ICIP Vol. 2021-September, p. 2074-2078
- Full Text:
- Reviewed:
- Description: Video coding algorithms encode and decode an entire video frame while feature coding techniques only preserve and communicate the most critical information needed for a given application. This is because video coding targets human perception, while feature coding aims for machine vision tasks. Recently, attempts are being made to bridge the gap between these two domains. In this work, we propose a video coding framework by leveraging on to the commonality that exists between human vision and machine vision applications using cuboids. This is because cuboids, estimated rectangular regions over a video frame, are computationally efficient, has a compact representation and object centric. Such properties are already shown to add value to traditional video coding systems. Herein cuboidal feature descriptors are extracted from the current frame and then employed for accomplishing a machine vision task in the form of object detection. Experimental results show that a trained classifier yields superior average precision when equipped with cuboidal features oriented representation of the current test frame. Additionally, this representation costs 7% less in bit rate if the captured frames are need be communicated to a receiver. © 2021 IEEE.
- Authors: Ahmmed, Ashek , Paul, Manoranjan , Murshed, Manzur , Taubman, David
- Date: 2021
- Type: Text , Conference paper
- Relation: 2021 IEEE International Conference on Image Processing, ICIP 2021, Anchorage, USA 19-22 September 2021, Proceedings - International Conference on Image Processing, ICIP Vol. 2021-September, p. 2074-2078
- Full Text:
- Reviewed:
- Description: Video coding algorithms encode and decode an entire video frame while feature coding techniques only preserve and communicate the most critical information needed for a given application. This is because video coding targets human perception, while feature coding aims for machine vision tasks. Recently, attempts are being made to bridge the gap between these two domains. In this work, we propose a video coding framework by leveraging on to the commonality that exists between human vision and machine vision applications using cuboids. This is because cuboids, estimated rectangular regions over a video frame, are computationally efficient, has a compact representation and object centric. Such properties are already shown to add value to traditional video coding systems. Herein cuboidal feature descriptors are extracted from the current frame and then employed for accomplishing a machine vision task in the form of object detection. Experimental results show that a trained classifier yields superior average precision when equipped with cuboidal features oriented representation of the current test frame. Additionally, this representation costs 7% less in bit rate if the captured frames are need be communicated to a receiver. © 2021 IEEE.
Aerodynamic drag measurements of FIFA-approved footballs
- Alam, Firoz, Chowdhury, Harun, George, Steven, Mustary, Israt, Zimmer, Gary
- Authors: Alam, Firoz , Chowdhury, Harun , George, Steven , Mustary, Israt , Zimmer, Gary
- Date: 2014
- Type: Text , Conference paper
- Relation: 2014 Conference of the International Sports Engineering Association p. 703-708
- Full Text:
- Reviewed:
- Description: Increasing technological advancements and demand for performance compel the ball manufacturers to introduce new designs. Construction of spherical footballs has been significantly changed over the years since 1970 from 32-panel leather stitched ball to 8-panel synthetic thermally bonded modern football. Despite being most popular game in the world, no data is available on aerodynamic properties of recently FIFA approved balls such as Adidas Cafusa (thermally bonded 32-panel), Nike Maxim (32- panel stitched), Umbro Neo (14-panel stitched, and Mitre Ultimax (26-panel stitched) footballs. Hence, the primary objective of this study was to determine aerodynamic drag of these balls and compare the findings with other balls introduced in late 2000. The aerodynamic forces were measured experimentally for a range of wind speeds in wind tunnel environment and their nondimensional coefficients were determined and compared. Additionally, a field test was also carried out to understand the perception of professional footballers.
- Authors: Alam, Firoz , Chowdhury, Harun , George, Steven , Mustary, Israt , Zimmer, Gary
- Date: 2014
- Type: Text , Conference paper
- Relation: 2014 Conference of the International Sports Engineering Association p. 703-708
- Full Text:
- Reviewed:
- Description: Increasing technological advancements and demand for performance compel the ball manufacturers to introduce new designs. Construction of spherical footballs has been significantly changed over the years since 1970 from 32-panel leather stitched ball to 8-panel synthetic thermally bonded modern football. Despite being most popular game in the world, no data is available on aerodynamic properties of recently FIFA approved balls such as Adidas Cafusa (thermally bonded 32-panel), Nike Maxim (32- panel stitched), Umbro Neo (14-panel stitched, and Mitre Ultimax (26-panel stitched) footballs. Hence, the primary objective of this study was to determine aerodynamic drag of these balls and compare the findings with other balls introduced in late 2000. The aerodynamic forces were measured experimentally for a range of wind speeds in wind tunnel environment and their nondimensional coefficients were determined and compared. Additionally, a field test was also carried out to understand the perception of professional footballers.
QoS support in event detection in WSN through optimal k-coverage
- Alam, Kh Mahmudul, Kamruzzaman, Joarder, Karmakar, Gour, Murhsed, Manzur, Azad, Arman
- Authors: Alam, Kh Mahmudul , Kamruzzaman, Joarder , Karmakar, Gour , Murhsed, Manzur , Azad, Arman
- Date: 2011
- Type: Text , Conference paper
- Relation: 11th International Conference on Computational Science, ICCS 2011; Singapore, Singapore; 1st-3rd June 2011; published in Procedia Computer Science Vol. 4, p. 499-507
- Full Text:
- Reviewed:
- Description: Wireless sensor networks promise to guarantee accurate, fault tolerant and timely detection of events in large scale sensor fields. To achieve this the notion of k-coverage is widely employed in WSNs where significant redundancy is introduced in deployment as an event is expected to be sensed by at least k sensors in the neighborhood. As sensor density increases significantly with k, it is imperative to find the optimal k for the underlying event detection system. In this work, we consider the detection probability, fault tolerance and latency as the Quality of Service (QoS) metrics of an event detection system employing k-coverage and present a probabilistic model to guarantee given QoS support with the minimum degree of coverage taking into account the noise related measurement error, communication interference and sensor fault probability. This work eventually resolves the problem of over or under deployment of sensors, increases scalability and provides a well defined mechanism to tune the degree of coverage according to performance needs.
- Authors: Alam, Kh Mahmudul , Kamruzzaman, Joarder , Karmakar, Gour , Murhsed, Manzur , Azad, Arman
- Date: 2011
- Type: Text , Conference paper
- Relation: 11th International Conference on Computational Science, ICCS 2011; Singapore, Singapore; 1st-3rd June 2011; published in Procedia Computer Science Vol. 4, p. 499-507
- Full Text:
- Reviewed:
- Description: Wireless sensor networks promise to guarantee accurate, fault tolerant and timely detection of events in large scale sensor fields. To achieve this the notion of k-coverage is widely employed in WSNs where significant redundancy is introduced in deployment as an event is expected to be sensed by at least k sensors in the neighborhood. As sensor density increases significantly with k, it is imperative to find the optimal k for the underlying event detection system. In this work, we consider the detection probability, fault tolerance and latency as the Quality of Service (QoS) metrics of an event detection system employing k-coverage and present a probabilistic model to guarantee given QoS support with the minimum degree of coverage taking into account the noise related measurement error, communication interference and sensor fault probability. This work eventually resolves the problem of over or under deployment of sensors, increases scalability and provides a well defined mechanism to tune the degree of coverage according to performance needs.
Assessing transformer oil quality using deep convolutional networks
- Alam, Mohammad, Karmakar, Gour, Islam, Syed, Kamruzzaman, Joarder, Chetty, Madhu, Lim, Suryani, Appuhamillage, Gayan, Chattopadhyay, Gopi, Wilcox, Steve, Verheyen, Vincent
- Authors: Alam, Mohammad , Karmakar, Gour , Islam, Syed , Kamruzzaman, Joarder , Chetty, Madhu , Lim, Suryani , Appuhamillage, Gayan , Chattopadhyay, Gopi , Wilcox, Steve , Verheyen, Vincent
- Date: 2019
- Type: Text , Conference proceedings , Conference paper
- Relation: 29th Australasian Universities Power Engineering Conference, AUPEC 2019
- Full Text:
- Reviewed:
- Description: Electrical power grids comprise a significantly large number of transformers that interconnect power generation, transmission and distribution. These transformers having different MVA ratings are critical assets that require proper maintenance to provide long and uninterrupted electrical service. The mineral oil, an essential component of any transformer, not only provides cooling but also acts as an insulating medium within the transformer. The quality and the key dissolved properties of insulating mineral oil for the transformer are critical with its proper and reliable operation. However, traditional chemical diagnostic methods are expensive and time-consuming. A transformer oil image analysis approach, based on the entropy value of oil, which is inexpensive, effective and quick. However, the inability of entropy to estimate the vital transformer oil properties such as equivalent age, Neutralization Number (NN), dissipation factor (tanδ) and power factor (PF); and many intuitively derived constants usage limit its estimation accuracy. To address this issue, in this paper, we introduce an innovative transformer oil analysis using two deep convolutional learning techniques such as Convolutional Neural Network (ConvNet) and Residual Neural Network (ResNet). These two deep neural networks are chosen for this project as they have superior performance in computer vision. After estimating the equivalent aging year of transformer oil from its image by our proposed method, NN, tanδ and PF are computed using that estimated age. Our deep learning based techniques can accurately predict the transformer oil equivalent age, leading to calculate NN, tanδ and PF more accurately. The root means square error of estimated equivalent age produced by entropy, ConvNet and ResNet based methods are 0.718, 0.122 and 0.065, respectively. ConvNet and ResNet based methods have reduced the error of the oil age estimation by 83% and 91%, respectively compared to that of the entropy method. Our proposed oil image analysis can calculate the equivalent age that is very close to the actual age for all images used in the experiment. © 2019 IEEE.
- Description: E1
- Authors: Alam, Mohammad , Karmakar, Gour , Islam, Syed , Kamruzzaman, Joarder , Chetty, Madhu , Lim, Suryani , Appuhamillage, Gayan , Chattopadhyay, Gopi , Wilcox, Steve , Verheyen, Vincent
- Date: 2019
- Type: Text , Conference proceedings , Conference paper
- Relation: 29th Australasian Universities Power Engineering Conference, AUPEC 2019
- Full Text:
- Reviewed:
- Description: Electrical power grids comprise a significantly large number of transformers that interconnect power generation, transmission and distribution. These transformers having different MVA ratings are critical assets that require proper maintenance to provide long and uninterrupted electrical service. The mineral oil, an essential component of any transformer, not only provides cooling but also acts as an insulating medium within the transformer. The quality and the key dissolved properties of insulating mineral oil for the transformer are critical with its proper and reliable operation. However, traditional chemical diagnostic methods are expensive and time-consuming. A transformer oil image analysis approach, based on the entropy value of oil, which is inexpensive, effective and quick. However, the inability of entropy to estimate the vital transformer oil properties such as equivalent age, Neutralization Number (NN), dissipation factor (tanδ) and power factor (PF); and many intuitively derived constants usage limit its estimation accuracy. To address this issue, in this paper, we introduce an innovative transformer oil analysis using two deep convolutional learning techniques such as Convolutional Neural Network (ConvNet) and Residual Neural Network (ResNet). These two deep neural networks are chosen for this project as they have superior performance in computer vision. After estimating the equivalent aging year of transformer oil from its image by our proposed method, NN, tanδ and PF are computed using that estimated age. Our deep learning based techniques can accurately predict the transformer oil equivalent age, leading to calculate NN, tanδ and PF more accurately. The root means square error of estimated equivalent age produced by entropy, ConvNet and ResNet based methods are 0.718, 0.122 and 0.065, respectively. ConvNet and ResNet based methods have reduced the error of the oil age estimation by 83% and 91%, respectively compared to that of the entropy method. Our proposed oil image analysis can calculate the equivalent age that is very close to the actual age for all images used in the experiment. © 2019 IEEE.
- Description: E1
Digital forensic techniques for static analysis of NTFS images
- Alazab, Mamoun, Venkatraman, Sitalakshmi, Watters, Paul
- Authors: Alazab, Mamoun , Venkatraman, Sitalakshmi , Watters, Paul
- Date: 2009
- Type: Text , Conference paper
- Relation: Paper presented at 4th International Conference of Information Technology, ICIT 2009, AL-Zaytoonah University, Amman, Jordan : 3rd-5th June 2009
- Full Text:
- Description: Static analysis of the Windows NTS File System (NTFS) which is the standard and most commonly used file system could provide useful information for digital forensics. However, since the NFTS disk image records every event in the system, forensic tools need to process an enormous amount of information related to user / kernel environment, buffer overflows, trace conditions, network stack and other related subsystems. This leads to imperfect forensic tools that are practical for implementation but not comprehensive and effective. This research discusses the analysis technique to detect data hidden based on the internal structure of the NTFS file system in the boot sector. Further, it attempts to unearth the vulnerabilities of NTFS disk image and weaknesses of the current forensic techniques. The paper argues that a comprehensive tool with improved techniques is warranted for a successful forensic analysis.
- Description: 2003007524
- Authors: Alazab, Mamoun , Venkatraman, Sitalakshmi , Watters, Paul
- Date: 2009
- Type: Text , Conference paper
- Relation: Paper presented at 4th International Conference of Information Technology, ICIT 2009, AL-Zaytoonah University, Amman, Jordan : 3rd-5th June 2009
- Full Text:
- Description: Static analysis of the Windows NTS File System (NTFS) which is the standard and most commonly used file system could provide useful information for digital forensics. However, since the NFTS disk image records every event in the system, forensic tools need to process an enormous amount of information related to user / kernel environment, buffer overflows, trace conditions, network stack and other related subsystems. This leads to imperfect forensic tools that are practical for implementation but not comprehensive and effective. This research discusses the analysis technique to detect data hidden based on the internal structure of the NTFS file system in the boot sector. Further, it attempts to unearth the vulnerabilities of NTFS disk image and weaknesses of the current forensic techniques. The paper argues that a comprehensive tool with improved techniques is warranted for a successful forensic analysis.
- Description: 2003007524
Fitting Voronoi diagrams to planar tesselations
- Aloupis, Greg, Pérez-Rosés, Hebert, Pineda-Villavicencio, Guillermo, Taslakian, Perouz, Trinchet-Almaguer, Dannier
- Authors: Aloupis, Greg , Pérez-Rosés, Hebert , Pineda-Villavicencio, Guillermo , Taslakian, Perouz , Trinchet-Almaguer, Dannier
- Date: 2013
- Type: Text , Conference paper
- Relation: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) Vol. 8288 LNCS, p. 349-361
- Full Text:
- Reviewed:
- Description: Given a tesselation of the plane, defined by a planar straight-line graph G, we want to find a minimal set S of points in the plane, such that the Voronoi diagram associated with S 'fits' G. This is the Generalized Inverse Voronoi Problem (GIVP), defined in [12] and rediscovered recently in [3]. Here we give an algorithm that solves this problem with a number of points that is linear in the size of G, assuming that the smallest angle in G is constant. © 2013 Springer-Verlag.
- Authors: Aloupis, Greg , Pérez-Rosés, Hebert , Pineda-Villavicencio, Guillermo , Taslakian, Perouz , Trinchet-Almaguer, Dannier
- Date: 2013
- Type: Text , Conference paper
- Relation: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) Vol. 8288 LNCS, p. 349-361
- Full Text:
- Reviewed:
- Description: Given a tesselation of the plane, defined by a planar straight-line graph G, we want to find a minimal set S of points in the plane, such that the Voronoi diagram associated with S 'fits' G. This is the Generalized Inverse Voronoi Problem (GIVP), defined in [12] and rediscovered recently in [3]. Here we give an algorithm that solves this problem with a number of points that is linear in the size of G, assuming that the smallest angle in G is constant. © 2013 Springer-Verlag.
HLA security through real-time compliance testing
- Andrews, David, Smith, Philip, Stratton, David, Wharington, John
- Authors: Andrews, David , Smith, Philip , Stratton, David , Wharington, John
- Date: 2006
- Type: Text , Conference paper
- Relation: Paper presented at 2006 European Simulation Interoperability Workshop, Stockholm, Sweden : 19th June, 2006 p. 1-7
- Full Text:
- Reviewed:
- Description: The HLA community currently utilizes federate compliance testing to give federate users confidence that the way in which a federate operates is correct. This compliance testing currently involves a series of manually organized software-based tests and is performed prior to run-time. This does not cover the possibility of noncompliance-tested modifications before actual deployment. Addressing these issues could see the development of compliance testing for HLA federates which is automatically performed during federate execution. The goal of compliance testing---to ensure that HLA federates conform to the HLA standards---has strong similarities with the goals of computer security. This paper critically discusses the concept of automated federate compliance testing, its ability to cover multiple federate versions, and its application to HLA security
- Description: E1
- Description: 2003002042
- Authors: Andrews, David , Smith, Philip , Stratton, David , Wharington, John
- Date: 2006
- Type: Text , Conference paper
- Relation: Paper presented at 2006 European Simulation Interoperability Workshop, Stockholm, Sweden : 19th June, 2006 p. 1-7
- Full Text:
- Reviewed:
- Description: The HLA community currently utilizes federate compliance testing to give federate users confidence that the way in which a federate operates is correct. This compliance testing currently involves a series of manually organized software-based tests and is performed prior to run-time. This does not cover the possibility of noncompliance-tested modifications before actual deployment. Addressing these issues could see the development of compliance testing for HLA federates which is automatically performed during federate execution. The goal of compliance testing---to ensure that HLA federates conform to the HLA standards---has strong similarities with the goals of computer security. This paper critically discusses the concept of automated federate compliance testing, its ability to cover multiple federate versions, and its application to HLA security
- Description: E1
- Description: 2003002042
Using digital image analysis to accurately determine the thousand kernel weight of randomly distributed barley, malt and wheat samples
- Armstrong, Bruce, Weiss, M., Greig, Robert, Aldred, Peter
- Authors: Armstrong, Bruce , Weiss, M. , Greig, Robert , Aldred, Peter
- Date: 2002
- Type: Text , Conference paper
- Relation: Paper presented at Cereals Conference 2001, Sydney : 9th September, 2001
- Full Text:
- Reviewed:
- Description: Rapid, accurate and non-subjective grain tests help growers and processors agree on a fair price and ensure that the grain is used for the most appropriate purpose. Common tests include protein, moisture, test (hectolitre) weight, screenings and dockages for pests, disease and foreign matter (Vicgrain, 2000). Each test contributes to a more comprehensive assessment of the grain. The tests assist breeders when selecting promising new cultivars. Plant breeders and maltsters also use the thousand kernel weight (TKW) test, which provides additional information on seed morphology. The test indicates the average kernel weight, with the units expressed as grams per thousand seeds. TKWs are valuable to maltsters and millers as high TKW kernels are plumper, malt and/or mill more evenly and have a higher proportion of endosperm than small kernels. The high TKW grains also produce more attractive malt (Stuart, 1998). TKWs assist breeders in selecting large kernel cultivars and permit growers to calculate their optimum sowing rates (Schwarz and Horsley, 1995).
- Description: E1
- Description: 2003000159
- Authors: Armstrong, Bruce , Weiss, M. , Greig, Robert , Aldred, Peter
- Date: 2002
- Type: Text , Conference paper
- Relation: Paper presented at Cereals Conference 2001, Sydney : 9th September, 2001
- Full Text:
- Reviewed:
- Description: Rapid, accurate and non-subjective grain tests help growers and processors agree on a fair price and ensure that the grain is used for the most appropriate purpose. Common tests include protein, moisture, test (hectolitre) weight, screenings and dockages for pests, disease and foreign matter (Vicgrain, 2000). Each test contributes to a more comprehensive assessment of the grain. The tests assist breeders when selecting promising new cultivars. Plant breeders and maltsters also use the thousand kernel weight (TKW) test, which provides additional information on seed morphology. The test indicates the average kernel weight, with the units expressed as grams per thousand seeds. TKWs are valuable to maltsters and millers as high TKW kernels are plumper, malt and/or mill more evenly and have a higher proportion of endosperm than small kernels. The high TKW grains also produce more attractive malt (Stuart, 1998). TKWs assist breeders in selecting large kernel cultivars and permit growers to calculate their optimum sowing rates (Schwarz and Horsley, 1995).
- Description: E1
- Description: 2003000159
Missing health data pattern matching technique for continuous remote patient monitoring
- Arora, Teena, Balasubramanian, Venki, Stranieri, Andrew
- Authors: Arora, Teena , Balasubramanian, Venki , Stranieri, Andrew
- Date: 2023
- Type: Text , Conference paper
- Relation: 20th International Conference on Smart Living and Public Health, ICOST 2023, Wonju, Korea, 7-8 July 2023, Digital Health Transformation, Smart Ageing, and Managing Disability, 20th International Conference, ICOST 2023, Wonju, South Korea, July 7–8, 2023, Proceedings Vol. 14237 LNCS, p. 130-143
- Full Text:
- Reviewed:
- Description: Remote patient monitoring (RPM) has been gaining popularity recently. However, health data acquisition is a significant challenge associated with patient monitoring. In continuous RPM, health data acquisition may miss health data during transmission. Missing data compromises the quality and reliability of patient risk assessment. Several studies suggested techniques for analyzing missing data; however, many are unsuitable for RPM. These techniques neglect the variability of missing data and provide biased results with imputation. Therefore, a holistic approach must consider the correlation and variability of the various vitals and avoid biased imputation. This paper proposes a coherent computation pattern-matching technique to identify and predict missing data patterns. The performance of the proposed approach is evaluated using data collected from a field trial. Results show that the technique can effectively identify and predict missing patterns. © 2023, The Author(s).
- Authors: Arora, Teena , Balasubramanian, Venki , Stranieri, Andrew
- Date: 2023
- Type: Text , Conference paper
- Relation: 20th International Conference on Smart Living and Public Health, ICOST 2023, Wonju, Korea, 7-8 July 2023, Digital Health Transformation, Smart Ageing, and Managing Disability, 20th International Conference, ICOST 2023, Wonju, South Korea, July 7–8, 2023, Proceedings Vol. 14237 LNCS, p. 130-143
- Full Text:
- Reviewed:
- Description: Remote patient monitoring (RPM) has been gaining popularity recently. However, health data acquisition is a significant challenge associated with patient monitoring. In continuous RPM, health data acquisition may miss health data during transmission. Missing data compromises the quality and reliability of patient risk assessment. Several studies suggested techniques for analyzing missing data; however, many are unsuitable for RPM. These techniques neglect the variability of missing data and provide biased results with imputation. Therefore, a holistic approach must consider the correlation and variability of the various vitals and avoid biased imputation. This paper proposes a coherent computation pattern-matching technique to identify and predict missing data patterns. The performance of the proposed approach is evaluated using data collected from a field trial. Results show that the technique can effectively identify and predict missing patterns. © 2023, The Author(s).
A preliminary profiling of internet money mules : An Australian perspective
- Aston, Manny, McCombie, Stephen, Reardon, Ben, Watters, Paul
- Authors: Aston, Manny , McCombie, Stephen , Reardon, Ben , Watters, Paul
- Date: 2009
- Type: Text , Conference paper
- Relation: Paper presented at 2009 Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing, UIC-ATC '09, Brisbane, Queensland : 7th-9th July 2009 p. 482-487
- Full Text:
- Description: Along with the massive growth in Internet commerce over the last ten years there has been a corresponding boom in Internet related crime, or cybercrime. According to research recently released by the Australian Bureau of Statistics in 2006 57,000 Australians aged 15 years and over fell victim to phishing and related Internet scams. Of all the victims of cybercrime, only one group is potentially subject to criminal prosecution: `Internet money mules'-those who, either knowingly or unknowingly, launder money. This paper examines the demographic profile-specifically age, gender and postcode-related to 660 confirmed money mule incidents recorded during the calendar year 2007, for a major Australian financial institution. This data is compared to ABS statistics of Internet usage in 2006. There is clear evidence of a strong gender bias towards males, particularly in the older age group. This is directly relevant when considering education and training programs for both corporations and the community on the issues surrounding Internet money mule scams and in ultimately understanding the problem of Internet banking fraud.
- Description: 2003007858
- Authors: Aston, Manny , McCombie, Stephen , Reardon, Ben , Watters, Paul
- Date: 2009
- Type: Text , Conference paper
- Relation: Paper presented at 2009 Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing, UIC-ATC '09, Brisbane, Queensland : 7th-9th July 2009 p. 482-487
- Full Text:
- Description: Along with the massive growth in Internet commerce over the last ten years there has been a corresponding boom in Internet related crime, or cybercrime. According to research recently released by the Australian Bureau of Statistics in 2006 57,000 Australians aged 15 years and over fell victim to phishing and related Internet scams. Of all the victims of cybercrime, only one group is potentially subject to criminal prosecution: `Internet money mules'-those who, either knowingly or unknowingly, launder money. This paper examines the demographic profile-specifically age, gender and postcode-related to 660 confirmed money mule incidents recorded during the calendar year 2007, for a major Australian financial institution. This data is compared to ABS statistics of Internet usage in 2006. There is clear evidence of a strong gender bias towards males, particularly in the older age group. This is directly relevant when considering education and training programs for both corporations and the community on the issues surrounding Internet money mule scams and in ultimately understanding the problem of Internet banking fraud.
- Description: 2003007858
DOWL : A dynamic ontology language
- Authors: Avery, John , Yearwood, John
- Date: 2003
- Type: Text , Conference paper
- Relation: Paper presented at IADIS International Conference WWW/Internet 2003, Algarve, Portugal : 5th August, 2003
- Full Text:
- Reviewed:
- Description: Abstract: Ontologies in a web setting, particularly those used in a group context (such as a virtual community), need to be flexible and open to changes that reflect the evolution of knowledge. OWL the ontology language of the semantic web provides very little for facilitating the description of evolutionary changes in an ontology. We propose a dynamic web ontology language (dOWL), an extension to OWL, which consists of a set of elements that can be used to model these evolutionary changes in an ontology.
- Description: E1
- Description: 2003000552
- Authors: Avery, John , Yearwood, John
- Date: 2003
- Type: Text , Conference paper
- Relation: Paper presented at IADIS International Conference WWW/Internet 2003, Algarve, Portugal : 5th August, 2003
- Full Text:
- Reviewed:
- Description: Abstract: Ontologies in a web setting, particularly those used in a group context (such as a virtual community), need to be flexible and open to changes that reflect the evolution of knowledge. OWL the ontology language of the semantic web provides very little for facilitating the description of evolutionary changes in an ontology. We propose a dynamic web ontology language (dOWL), an extension to OWL, which consists of a set of elements that can be used to model these evolutionary changes in an ontology.
- Description: E1
- Description: 2003000552
A formal description of ontology change in OWL
- Authors: Avery, John , Yearwood, John
- Date: 2005
- Type: Text , Conference paper
- Relation: Paper presented at the Third International Conference on Information Technology and Applications, ICITA 2005, Sydney : 4th - 7th July, 2005
- Full Text:
- Reviewed:
- Description: There are three main activities involved in managing ontology change. Firstly we need to identify changes, secondly describe these identified changes, and finally describe and handle the ramifications of the changes. In previous work we have presented a language (DOWL) for describing ontology change and in this paper we demonstrate how changes described in this language can be represented in the RDF abstract syntax which enables us to describe the ramifications of a change in a formal manner. This formalism can provide the basis for an automated ontology change management system.
- Description: E1
- Description: 2003001448
- Authors: Avery, John , Yearwood, John
- Date: 2005
- Type: Text , Conference paper
- Relation: Paper presented at the Third International Conference on Information Technology and Applications, ICITA 2005, Sydney : 4th - 7th July, 2005
- Full Text:
- Reviewed:
- Description: There are three main activities involved in managing ontology change. Firstly we need to identify changes, secondly describe these identified changes, and finally describe and handle the ramifications of the changes. In previous work we have presented a language (DOWL) for describing ontology change and in this paper we demonstrate how changes described in this language can be represented in the RDF abstract syntax which enables us to describe the ramifications of a change in a formal manner. This formalism can provide the basis for an automated ontology change management system.
- Description: E1
- Description: 2003001448