{"title":"Combining nearest neighbour classifiers based on small subsamples for big data analytics","authors":"B. Krawczyk, Michal Wozniak","doi":"10.1109/CYBConf.2015.7175952","DOIUrl":"https://doi.org/10.1109/CYBConf.2015.7175952","url":null,"abstract":"Contemporary machine learning systems must be able to deal with ever-growing volumes of data. However, most of the canonical classifiers are not well-suited for big data analytics. This is especially vivid in case of distance-based classifiers, where their classification time is prohibitive. Recently, many methods for adapting nearest neighbour classifier for big data were proposed. We investigate simple, yet efficient technique based on random under-sampling of the dataset. As we deal with stationary data, one may assume that a subset of objects will sufficiently capture the properties of given dataset. We propose to build distance-based classifiers on the basis of very small subsamples and then combine them into an ensemble. With this, one does not need to aggregate datasets, only local decisions of classifiers. On the basis of experimental results we show that such an approach can return comparable results to nearest neighbour classifier over the entire dataset, but with a significantly reduced classification time. We investigate the number of sub-samples (ensemble members), that are required for capturing the properties of each dataset. Finally, we propose to apply our sub-sampling based ensemble in a distributed environment, which allows for a further reduction of the computational complexity of nearest neighbour rule for big data.","PeriodicalId":177233,"journal":{"name":"2015 IEEE 2nd International Conference on Cybernetics (CYBCONF)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127064253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Set of experience and decisional DNA: Toward brains for cyber-physical systems and industry of the future","authors":"E. Szczerbicki, C. Sanín, S. Shafiq","doi":"10.1109/CYBConf.2015.7175898","DOIUrl":"https://doi.org/10.1109/CYBConf.2015.7175898","url":null,"abstract":"The concept of Decisional DNA is decade old. This article introduces the initial idea of Set of Experience Knowledge Structure, its advancement into Decisional DNA, and its potential for real life applications in divers domains. The most current and future research steps into Industry 4.0 are also presented and discussed.","PeriodicalId":177233,"journal":{"name":"2015 IEEE 2nd International Conference on Cybernetics (CYBCONF)","volume":"129 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133787932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
V. Rodríguez-Fernández, Héctor D. Menéndez, David Camacho
{"title":"Design and development of a lightweight multi-UAV simulator","authors":"V. Rodríguez-Fernández, Héctor D. Menéndez, David Camacho","doi":"10.1109/CYBConf.2015.7175942","DOIUrl":"https://doi.org/10.1109/CYBConf.2015.7175942","url":null,"abstract":"UAVs have become enormously popular over the last few years. These new systems could make a remarkable improvement in public safety and have many applications in a variety of fields such as agriculture or postage of packages. In order to test UAV capacities and train UAV mission operators, several simulators are used, and the use of them usually entails high costs. This work presents a low-cost and easily distributable simulator, focused on simulating missions carried out by multiple UAVs and extracting data from them. To evaluate its effectiveness, it has been subjected to stress testing with thousands of virtual users, proving to have a potentially competitive response.","PeriodicalId":177233,"journal":{"name":"2015 IEEE 2nd International Conference on Cybernetics (CYBCONF)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125972701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. D. Sparrow, A. A. Adekunle, R. J. Berry, R. Farnish
{"title":"Balancing throughput and latency for an aerial robot over a wireless secure communication link","authors":"R. D. Sparrow, A. A. Adekunle, R. J. Berry, R. Farnish","doi":"10.1109/CYBConf.2015.7175929","DOIUrl":"https://doi.org/10.1109/CYBConf.2015.7175929","url":null,"abstract":"With the requirement for remote control of unmanned aerial vehicles (UAV) becoming more frequent in scenarios where the environment is inaccessible or hazardous to human beings (e.g. disaster recovery); remote functionality of a UAV is generally implemented over wireless networked control systems (WNCS). The nature of the wireless broadcast allows attackers to exploit security vulnerabilities through passive and active attacks; consequently, cryptography is often selected as a countermeasure to the aforementioned attacks. This paper analyses simulation undertaken and proposes a model to balance the relationship between throughput and latency for a secure multi-hop communication link. Results obtained indicate that throughput is more influential up to two hops from the initial transmitting device; conversely, latency is the determining factor after two hops.","PeriodicalId":177233,"journal":{"name":"2015 IEEE 2nd International Conference on Cybernetics (CYBCONF)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128745909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Study on time-dependent departure process in a finite-buffer queueing model with BMAP-type input stream","authors":"W. Kempa","doi":"10.1109/CYBConf.2015.7175940","DOIUrl":"https://doi.org/10.1109/CYBConf.2015.7175940","url":null,"abstract":"Transient departure process of outgoing packets in a finite-buffer queueing model with the BMAP-type input stream and generally distributed processing times is investigated. Applying the paradigm of embedded Markov chain and the total probability law, a system of integral equations for the distribution function of the number of packets successfully processed up to fixed time t; conditioned by the initial level of buffer saturation and the state of the underlying Markov chain, is obtained. The solution of the corresponding system written for the mixed double transforms is found in a compact form by utilizing the approach based on linear and matrix algebra. Remarks on numerical treatment of analytical results and computational example are attached as well.","PeriodicalId":177233,"journal":{"name":"2015 IEEE 2nd International Conference on Cybernetics (CYBCONF)","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127292114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Swarm intelligence applied to identification of nonlinear ship steering model","authors":"M. Tomera","doi":"10.1109/CYBConf.2015.7175920","DOIUrl":"https://doi.org/10.1109/CYBConf.2015.7175920","url":null,"abstract":"The paper presents optimization of parameters of nonlinear dynamic ship steering model with one degree of freedom, in which the input is the commanded rudder angle and the output is the ship course. Optimization of parameters concerned the Bech and Wagner-Smith model for which the nonlinearity was determined from a standard Bech's reverse spiral test, whilst the parameters describing dynamic properties of the ship were determined based on the Kempf's zigzag maneuver. Optimal parameters of the searched ship model were found using swarm intelligence algorithms, including: ant colony optimization, artificial bee colony, and particle swarm optimization. Rate tests were conducted to find the optimal solution, and a comparative analysis of the results was made.","PeriodicalId":177233,"journal":{"name":"2015 IEEE 2nd International Conference on Cybernetics (CYBCONF)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116656079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Printed steganography applied for the authentication of identity photos in face verification","authors":"Włodzimierz Kasprzak, M. Stefanczyk, A. Wilkowski","doi":"10.1109/CYBConf.2015.7175987","DOIUrl":"https://doi.org/10.1109/CYBConf.2015.7175987","url":null,"abstract":"Steganography methods are proposed for the authentication of the holder's photo in an ICAO-consistent (travel) document. The embedded message is heavily influenced by the print-scan process, as the electronic image is first printed to be included into the document (or identity card) and is scanned next to constitute the reference template in an automatic face verification procedure. Two sufficiently robust steganography methods are designed, modifications of the “Fujitsu method” and the “triangle net” method. A third method, a commercial Digimarc tool is also applied. The methods are tested w.r.t. to face image authentication ability in a face verification procedure, using two commercial biometric SDK-s. Test results demonstrate the feasibility in biometric verification and high authentication quality of proposed approach.","PeriodicalId":177233,"journal":{"name":"2015 IEEE 2nd International Conference on Cybernetics (CYBCONF)","volume":"2011 12","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132678574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Application of an internal model Speed Control for PMSM with variable mechanical paremeters","authors":"Pajchrowski Tomasz","doi":"10.1109/CYBCONF.2015.7175970","DOIUrl":"https://doi.org/10.1109/CYBCONF.2015.7175970","url":null,"abstract":"In the paper an application of IMC structure for electric drive with variable mechanical parameters is presented. The mechanical parameters changing as a function of motor shaft angle. The control system was used a neural inverse model trained on line by the modified algorithm RPROP. The collected results of simulation and experiment confirm the proper operation of the control system.","PeriodicalId":177233,"journal":{"name":"2015 IEEE 2nd International Conference on Cybernetics (CYBCONF)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114255194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Indoor microlocation with BLE beacons and incremental rule learning","authors":"Szymon Bobek, Olgierd Grodzki, G. J. Nalepa","doi":"10.1109/CYBConf.2015.7175912","DOIUrl":"https://doi.org/10.1109/CYBConf.2015.7175912","url":null,"abstract":"Location is one of the most valuable and extensively used information in mobile context-aware systems. Its understanding may vary from geolocation that uses GPS infrastructure to locate objects on Earth, up to microlocation, which aims at locating users and objects inside closed areas. Although geolocation can be considered as a mature field, there is an ongoing research in the area of microlocation. Despite that, microlocation techniques do not offer satisfactory level of accuracy and implementation flexibility to be practically incorporated into commercial solutions. This is mainly because of high workload that needs to be done in terms of maps preparation and algorithms tuning. In this paper we present a method that can overcome this issue by providing incremental rule learning algorithm for automated discovery of user location on a room-level accuracy. We also show a method of augmenting semantic annotations on physical objects with a use of Bluetooth Low Energy beacons.","PeriodicalId":177233,"journal":{"name":"2015 IEEE 2nd International Conference on Cybernetics (CYBCONF)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114590686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Join Gabor and scattering transform for urine sediment particle texture analysis","authors":"Chunli Li, Yuanyan Tang, Huiwu Luo, Xianwei Zheng","doi":"10.1109/CYBConf.2015.7175969","DOIUrl":"https://doi.org/10.1109/CYBConf.2015.7175969","url":null,"abstract":"There are many kinds of corporeal ingredients in urinary sediment which must be identified to confirm the diagnosis of an abnormality. In this paper, we refine a method which integrates both Gabor filter and scattering transform for texture analysis in urinary sediment images. The proposed scheme is based on the conventional Gabor filter and the recently developed scattering transform. The Gabor filter bank has the ability to capture the filtering responses according to the scale and orientation of texture. Besides, the scattering transformation provides a distinctive property of robust description, which is invariant to rotations and stable to spatial deformation. The excellent representation of Gabor filter and scattering transform has been severally studied in recent work, yet they have not been used in urinary sediment images. In this work, we propose to use both Gabor filter and scattering transformation to extract the texture feature of urinary sediment images. Coupling with an efficient support vector machine (SVM) classifier, the proposed scheme tends to shown superiority as compared to other single descriptive alternatives in real urinary sediment experiments.","PeriodicalId":177233,"journal":{"name":"2015 IEEE 2nd International Conference on Cybernetics (CYBCONF)","volume":"1018 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123117655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}