2019 IEEE 17th International Symposium on Intelligent Systems and Informatics (SISY)最新文献

筛选
英文 中文
Evolving Fuzzy Models of Mechatronics Applications : Plenary Talk 机电一体化应用的演化模糊模型:全体会议报告
2019 IEEE 17th International Symposium on Intelligent Systems and Informatics (SISY) Pub Date : 2019-09-01 DOI: 10.1109/SISY47553.2019.9111595
R. Precup
{"title":"Evolving Fuzzy Models of Mechatronics Applications : Plenary Talk","authors":"R. Precup","doi":"10.1109/SISY47553.2019.9111595","DOIUrl":"https://doi.org/10.1109/SISY47553.2019.9111595","url":null,"abstract":"Evolving fuzzy models are characterized by the continuous online rule base learning. The structure and parameters of these fuzzy models in their Takagi–Sugeno or Takagi–Sugeno–Kang (TSK) forms are obtained by several online identification algorithms. The online identification algorithms continuously evolve the parameters of the fuzzy models, which are built online by adding new or removing old local models; this process is referred to as the adding mechanism.According to the classification proposed by Dovžan, Logar and Škrjanc in 2015, three categories of online identification algorithms are considered, (1), (2) and (3), and they have specific features described as follows. (1) Adaptive algorithms start with the initial TS fuzzy model structure given by other algorithms or by user experience; the number of space partitions/clusters does not change over time, and these algorithms adapt just the parameters of the membership functions and the local models. (2) Incremental algorithms implement only adding mechanisms. (3) Evolving algorithms, which besides the adding mechanism they also implement removing and a part of them merging and splitting mechanisms as well.The presentation is organized to highlight a part of the recent results obtained by the Process Control group of the Politehnica University of Timisoara, Romania, related to the application of incremental online identification algorithms that belong to the category (2) mentioned above. A convenient implementation of these algorithms is given in two versions that depend on how the estimation of parameters in TS fuzzy model rule consequents is performed. The identification algorithms produce sets of TS fuzzy models of some representative mechatronics applications in the laboratories of the Process Control group, where the experimental validation is guaranteed in order to next enable the development of model–based fuzzy control system structures: pendulum-crane systems, twin rotor aerodynamic systems, magnetic levitation systems, and anti-lock braking systems.","PeriodicalId":256922,"journal":{"name":"2019 IEEE 17th International Symposium on Intelligent Systems and Informatics (SISY)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133448623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluation of Configurations in Nonholonomic Motion Planning, 2D Case Study 非完整运动规划中构型的评估,二维案例研究
2019 IEEE 17th International Symposium on Intelligent Systems and Informatics (SISY) Pub Date : 2019-09-01 DOI: 10.1109/SISY47553.2019.9111628
I. Dulęba, I. Karcz-Dulęba
{"title":"Evaluation of Configurations in Nonholonomic Motion Planning, 2D Case Study","authors":"I. Dulęba, I. Karcz-Dulęba","doi":"10.1109/SISY47553.2019.9111628","DOIUrl":"https://doi.org/10.1109/SISY47553.2019.9111628","url":null,"abstract":"In this paper evaluation of an efficiency of motion for nonholonomic systems in a plane spanned by two non colinear versors is examined when energy costs of motion along each versor differ. It appears that an orthogonal setting of versors is preferable in general but at some situations even a potentially bad setting appears to be acceptable. The observations are important in a nonholonomic motion planning while designing a path to follow that joins given initial and final configurations.","PeriodicalId":256922,"journal":{"name":"2019 IEEE 17th International Symposium on Intelligent Systems and Informatics (SISY)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133432014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Classification Tree with Hybrid Splitting Mechanism 混合分裂机制的分类树
2019 IEEE 17th International Symposium on Intelligent Systems and Informatics (SISY) Pub Date : 2019-09-01 DOI: 10.1109/SISY47553.2019.9111639
Huanze Zeng, Argon Chen
{"title":"Classification Tree with Hybrid Splitting Mechanism","authors":"Huanze Zeng, Argon Chen","doi":"10.1109/SISY47553.2019.9111639","DOIUrl":"https://doi.org/10.1109/SISY47553.2019.9111639","url":null,"abstract":"Binary Decision Trees (BDT), such as CART and C4.5, is one of the most commonly used classifiers, where each node of the tree can be split into a new layer with two child nodes. An alternative classification tree, Multi-Layer Classifier (MLC) has been proposed to take advantage of the underlying data structure. The MLC splits the parent node into 1 or 2 classified child node and an unclassified child node at each layer. Unlike BDT, MLC only allows the unclassified child node to be split into a new layer until a stop criterion is reached. In this study, an algorithm that switches between the two splitting mechanisms in the tree construction process is proposed. In the experiments of real cases, the proposed classifier has better performance than BDT and MLC in terms of the out-of-sample accuracy and Youden’s Index.","PeriodicalId":256922,"journal":{"name":"2019 IEEE 17th International Symposium on Intelligent Systems and Informatics (SISY)","volume":"10 7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125007590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Fuzzy Failure Modes and Effects Analysis with Different Defuzzification Methods – A Case Study for Bearing Manufacturing Process 不同去模糊化方法的模糊失效模式及影响分析——以轴承制造过程为例
2019 IEEE 17th International Symposium on Intelligent Systems and Informatics (SISY) Pub Date : 2019-09-01 DOI: 10.1109/SISY47553.2019.9111602
S. Koçak, E. Tóth-Laufer, L. Pokorádi
{"title":"Fuzzy Failure Modes and Effects Analysis with Different Defuzzification Methods – A Case Study for Bearing Manufacturing Process","authors":"S. Koçak, E. Tóth-Laufer, L. Pokorádi","doi":"10.1109/SISY47553.2019.9111602","DOIUrl":"https://doi.org/10.1109/SISY47553.2019.9111602","url":null,"abstract":"In the global competitive manufacturing sector, the management of quality and reliability in product design and manufacturing becomes a major challenge for firms to survive. The Failure Modes and Effects Analysis (FMEA) method is a widely used reliability estimation technique to identify possible failures on the manufacturing process. The bearing Fuzzy Failure Modes and Effects (FFMEA) purpose is to prevent repetition of damage and additional costs. In order to obtain a good result, the existing information and data collection should be carefully analysed. The Risk Priority Number (RPN) is calculated by three criteria – considering the Probability of Failure (PoF), Consequence of Failure (CoF), and Detectability of Failure (DoF).","PeriodicalId":256922,"journal":{"name":"2019 IEEE 17th International Symposium on Intelligent Systems and Informatics (SISY)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130386642","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Determination of Critical Fault Tree Components Based on Mixed Fuzzy Top Event 基于混合模糊顶事件的关键故障树成分确定
2019 IEEE 17th International Symposium on Intelligent Systems and Informatics (SISY) Pub Date : 2019-09-01 DOI: 10.1109/SISY47553.2019.9111482
J. Z. Szabó, P. Bakucz
{"title":"Determination of Critical Fault Tree Components Based on Mixed Fuzzy Top Event","authors":"J. Z. Szabó, P. Bakucz","doi":"10.1109/SISY47553.2019.9111482","DOIUrl":"https://doi.org/10.1109/SISY47553.2019.9111482","url":null,"abstract":"In this work to be introduced a real time algorithm to identify basic events criticality from the top layer of autonomous driving redundant system, using the inverse of the modified (fuzzyfied) fault tree method in embedded environment.","PeriodicalId":256922,"journal":{"name":"2019 IEEE 17th International Symposium on Intelligent Systems and Informatics (SISY)","volume":"18 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120872254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Seq2seq Deep Learning Method for Summary Generation by LSTM with Two-way Encoder and Beam Search Decoder 基于双向编码器和波束搜索解码器的LSTM摘要生成深度学习方法
2019 IEEE 17th International Symposium on Intelligent Systems and Informatics (SISY) Pub Date : 2019-09-01 DOI: 10.1109/SISY47553.2019.9111502
G. Szücs, Dorottya Huszti
{"title":"Seq2seq Deep Learning Method for Summary Generation by LSTM with Two-way Encoder and Beam Search Decoder","authors":"G. Szücs, Dorottya Huszti","doi":"10.1109/SISY47553.2019.9111502","DOIUrl":"https://doi.org/10.1109/SISY47553.2019.9111502","url":null,"abstract":"In this paper a deep neural network architecture is proposed for abstractive summarization, which aims generating brief summaries from long text documents. Unlike default sequence-to-sequence model with one-way encoder, the proposed solution has a two-way encoder with state-of-the-art recurrent neural networks type, LSTM (Long Short-Term Memory). One of the LSTMs starts from the beginning of the series, and the other from the end, so the final state is created by combining the inner states of them. Furthermore, two types of decoder were used, one for training, and an extended one for inferencing. The extended decoder is based on the beam search idea, which retains more than one candidate when generating sequence elements. The final prediction of the decoder will be the sequence with the highest probability. In the system the attention mechanism and appropriate embedding layer also help with text generation. Experiments are presented on the Newsroom dataset with relational article and summary pairs.","PeriodicalId":256922,"journal":{"name":"2019 IEEE 17th International Symposium on Intelligent Systems and Informatics (SISY)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122613541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Event-driven Fuzzy Inference System Implementation in Node-RED 事件驱动模糊推理系统在Node-RED中的实现
2019 IEEE 17th International Symposium on Intelligent Systems and Informatics (SISY) Pub Date : 2019-09-01 DOI: 10.1109/SISY47553.2019.9111512
J. Kopják, Gergely Sebestyen
{"title":"Event-driven Fuzzy Inference System Implementation in Node-RED","authors":"J. Kopják, Gergely Sebestyen","doi":"10.1109/SISY47553.2019.9111512","DOIUrl":"https://doi.org/10.1109/SISY47553.2019.9111512","url":null,"abstract":"Fuzzy Inference System can be applied in the Internet of Things solutions. Wireless devices in Internet of Things (IoT) solutions are communicating with messages. The message based communication in these systems can be represented as event-driven control network. In event-driven control networks the input values of the system not available at the same time. The aim of this paper is to show a possible solution to describe Takagi-Sugeno Fuzzy Inference System (FIS) as an event-driven network. This paper describes the implementation and validation of event-driven control network based Takagi-Sugeno FIS in Node-RED programming tool.","PeriodicalId":256922,"journal":{"name":"2019 IEEE 17th International Symposium on Intelligent Systems and Informatics (SISY)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115258646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Influence of block size on JPEG compression performance 块大小对JPEG压缩性能的影响
2019 IEEE 17th International Symposium on Intelligent Systems and Informatics (SISY) Pub Date : 2019-09-01 DOI: 10.1109/SISY47553.2019.9111506
P. Miklós, Z. Trpovski
{"title":"Influence of block size on JPEG compression performance","authors":"P. Miklós, Z. Trpovski","doi":"10.1109/SISY47553.2019.9111506","DOIUrl":"https://doi.org/10.1109/SISY47553.2019.9111506","url":null,"abstract":"This paper focuses on investigating the block size influence on the performance of the JPEG compression process. Apart from 8x8 blocks, 4x4,16x16 and 32x32 block sizes are also tested. A variable size block division is also investigated. As a quality measure, peak signal-to-noise ratio (PSNR) and structural similarity index (SSIM) are calculated. The compression ratios (CR) for each case are compared also.","PeriodicalId":256922,"journal":{"name":"2019 IEEE 17th International Symposium on Intelligent Systems and Informatics (SISY)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125691728","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The Information Security Risks of the BYOD, From Theoretical Point of View 个人自带设备的信息安全风险——从理论角度看
2019 IEEE 17th International Symposium on Intelligent Systems and Informatics (SISY) Pub Date : 2019-09-01 DOI: 10.1109/SISY47553.2019.9111514
P. Feher-Polgar, P. Michelberger
{"title":"The Information Security Risks of the BYOD, From Theoretical Point of View","authors":"P. Feher-Polgar, P. Michelberger","doi":"10.1109/SISY47553.2019.9111514","DOIUrl":"https://doi.org/10.1109/SISY47553.2019.9111514","url":null,"abstract":"Nowadays a vast of the working people cannot live their life without smart devices. A part of them use these smart phones and tablets for work. Even a part of them are using their self-owned devices for business, beside their private usage. This practice is commonly referred as “Bring your own device” (BYOD). For example, people tend to use these devices for accessing their e-mail inboxes. Or even to analyze crucial business data via reaching the network of their firm, while commuting, just after they checked in their favorite social app. In this paper, we analyze the IT risks of the firm arisen by the BYOD. After the theoretical point of view, we will continue this","PeriodicalId":256922,"journal":{"name":"2019 IEEE 17th International Symposium on Intelligent Systems and Informatics (SISY)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116916364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Evaluation of Digitalized Handwriting for Dysgraphia Detection Using Random Forest Classification Method 用随机森林分类方法评价数字化笔迹对书写障碍的检测效果
2019 IEEE 17th International Symposium on Intelligent Systems and Informatics (SISY) Pub Date : 2019-09-01 DOI: 10.1109/SISY47553.2019.9111567
Zuzana Dankovičová, J. Hurtuk, P. Fecilak
{"title":"Evaluation of Digitalized Handwriting for Dysgraphia Detection Using Random Forest Classification Method","authors":"Zuzana Dankovičová, J. Hurtuk, P. Fecilak","doi":"10.1109/SISY47553.2019.9111567","DOIUrl":"https://doi.org/10.1109/SISY47553.2019.9111567","url":null,"abstract":"The paper deals with the issue of impaired hand-writing, particularly dysgraphia, and the recognition and the processing of attributes extraction. Several machine learning methods, such as random forest, support vector machine and adaptive boosting were used for this purpose. There has been 52 extracted handwriting attributes (e.g., velocity, acceleration, jerk, duration, pen lifts, etc.) from 78 handwriting samples. Only subjects aged 10–13 (inclusive 10 and 13) were included. Principal component analysis was then used in order to visualize attributes from handwriting, in two-dimensional space.","PeriodicalId":256922,"journal":{"name":"2019 IEEE 17th International Symposium on Intelligent Systems and Informatics (SISY)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115671747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信