C. Reichert, Stefan Durschmid, H. Hinrichs, R. Kruse
{"title":"Efficient recognition of event-related potentials in high-density MEG recordings","authors":"C. Reichert, Stefan Durschmid, H. Hinrichs, R. Kruse","doi":"10.1109/CEEC.2015.7332704","DOIUrl":"https://doi.org/10.1109/CEEC.2015.7332704","url":null,"abstract":"In brain-computer interfacing (BCI), the recognition of task-specific event-related potentials such as P300 responses is an established approach to regaining communication in severely paralyzed people. However, a reliable detection of single trial potentials is challenging, because they are strongly affected by noise. Furthermore, potentials with their subcomponents are often distributed over several channels. With high density sensor arrays, a hypothesis-driven selection of channels, as often performed in BCIs based on electroencephalography (EEG), is challenging. We present a new data-driven approach that constructs spatio-temporal filters, considerably reducing the number of channels, reducing noise, and simultaneously determining the underlying brain dynamics. The extracted signals can be easily used to recognize the event sequence on which users focus their attention, without applying multivariate classification. We evaluated the approach using high density magnetoencephalography (MEG) data, recorded during a BCI experiment based on P300 responses. Compared to the subject's performance achieved with the initial decoding approach, the recognition rate increased significantly from 74.1% (std: 14.8%) to 95.1% (std: 4.9%) correct detections, which implies an information transfer rate improvement from 6.9 bit/min to 13.1 bit/min on average over 17 subjects.","PeriodicalId":294036,"journal":{"name":"2015 7th Computer Science and Electronic Engineering Conference (CEEC)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134477776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Elastic-net constrained multiple kernel learning using a majorization-minimization approach","authors":"L. Citi","doi":"10.1109/CEEC.2015.7332695","DOIUrl":"https://doi.org/10.1109/CEEC.2015.7332695","url":null,"abstract":"This papers introduces an algorithm for the solution of multiple kernel learning (MKL) problems with elastic-net constraints on the kernel weights. While efficient algorithms exist for MKL problems with L1- and Lp-norm (p > 1) constraints, a similar algorithm was lacking in the case of MKL under elastic-net constraints. For example, algorithms based on the cutting plane method require large and/or commercial libraries. The algorithm presented here can solve elastic-net constrained MKL problems very efficiently with simple code that does not rely on external libraries (except a conventional SVM solver). Based on majorization-minimization (MM), at each step it optimizes the kernel weights by minimizing a carefully designed surrogate function, called a majorizer, which can be solved in closed form. This improved efficiency and applicability facilitates the inclusion of elastic-net constrained MKL in existing open-source machine learning libraries.","PeriodicalId":294036,"journal":{"name":"2015 7th Computer Science and Electronic Engineering Conference (CEEC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114870839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Khattab M. Ali Alheeti, A. Gruebler, K. Mcdonald-Maier
{"title":"On the detection of grey hole and rushing attacks in self-driving vehicular networks","authors":"Khattab M. Ali Alheeti, A. Gruebler, K. Mcdonald-Maier","doi":"10.1109/CEEC.2015.7332730","DOIUrl":"https://doi.org/10.1109/CEEC.2015.7332730","url":null,"abstract":"Vehicular ad hoc networks play an important role in the success of a new class of vehicles, i.e. self-driving and semi self-driving vehicles. These networks provide safety and comfort to passengers, drivers and vehicles themselves. These vehicles depend heavily on external communication to predicate the surrounding environment through the exchange of cooperative awareness messages (CAMs) and control data. VANETs are exposed to many types of attacks such as black hole, grey hole and rushing attacks. In this paper, we present an intelligent Intrusion Detection System (IDS) which relies on anomaly detection to protect external communications from grey hole and rushing attacks. Many researchers agree that grey hole attacks in VANETs are a substantial challenge due to them having their distinct types of behaviour: normal and abnormal. These attacks try to prevent transmission between vehicles and roadside units and have a direct and negative impact on the wide acceptance of this new class of vehicles. The proposed IDS is based on features that have been extracted from a trace file generated in a network simulator. In our paper, we used a feed-forward neural network and a support vector machine for the design of the intelligent IDS. The proposed system uses only significant features extracted from the trace file. Our research, concludes that a reduction in the number of features leads to a higher detection rate and a decrease in false alarms.","PeriodicalId":294036,"journal":{"name":"2015 7th Computer Science and Electronic Engineering Conference (CEEC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131156619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Producing domain-specific languages from strategy patterns","authors":"Ludvig Kihlman","doi":"10.1109/CEEC.2015.7332691","DOIUrl":"https://doi.org/10.1109/CEEC.2015.7332691","url":null,"abstract":"This paper describes initial work into the production of Domain-Specific Language (DSL) from Strategy Patterns. The work is exploring how a DSL can be generated from a specification of an Abstract Strategy and of the data-types and operations that the Abstract Strategy may use. The generated DSL is then be able to specify instances of Concrete Strategies, aiding the implementation by providing a language specifically constructed for the implementation of the Strategies. The method for producing these DSL is described and a case study using patience games as a domain is presented.","PeriodicalId":294036,"journal":{"name":"2015 7th Computer Science and Electronic Engineering Conference (CEEC)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116790569","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Development of magnetic adhesion based climbing robot for non-destructive testing","authors":"O. Howlader, Traiq Pervez Sattar","doi":"10.1109/CEEC.2015.7332708","DOIUrl":"https://doi.org/10.1109/CEEC.2015.7332708","url":null,"abstract":"This paper investigates the effect of key design parameters involved in optimizing the adhesion force achieved from rare earth neodymium magnets. In order to generate high adhesion force by using minimum number of permanent magnets, criteria such as distance between multiple magnets, thickness of flux concentrator have been evaluated by implementing Finite Element Analysis (FEA). Results show that adhesion force increases with increased distance between magnets and by using thick magnetic flux concentrator. A prototype robot has been designed to validate the simulation results. Experiment vs simulation study presents similar results. The robot is controlled remotely via Bluetooth communication protocol and provides umbilical free access to the robot operator.","PeriodicalId":294036,"journal":{"name":"2015 7th Computer Science and Electronic Engineering Conference (CEEC)","volume":"482 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133433325","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Student modelling and classification rules learning for educational resource prediction in a multiagent system","authors":"Kennedy E. Ehimwenma, M. Beer, P. Crowther","doi":"10.1109/CEEC.2015.7332700","DOIUrl":"https://doi.org/10.1109/CEEC.2015.7332700","url":null,"abstract":"To model support for human learning, rules (i.e. triggering event-conditions-actions) can be classified to encompass any state of student learning activity enroute to appropriate learning material prediction. In an agent based system, each component of an adaptive multiagent system can be represented as agents having individual autonomy and responsibility to realise the overall goal of the system. In this paper, we present an extended work on a multiagent based Pre-assessment System in which a modelling agent employs the technique of One v All Multiple Classification rules to make predictions for learning materials after some prerequisite assessment facts to a desired concept or topic are communicated by the pre-assessment agent. Using SQL ontology tree structure as the domain of learning content, a learning algorithm is described as a process for estimating the total number of classified rules required for the pre-assessment system. This estimate is proven to be dependent on: 1) two binary state values, 2) the number of leaf-nodes in the ontology tree, and 3) the number of prerequisite concept(s) to a desired concept. In addition, is the learning algorithm with which a modelling agent can increment or decrement its classified number of rules.","PeriodicalId":294036,"journal":{"name":"2015 7th Computer Science and Electronic Engineering Conference (CEEC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122954221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Development of a universal design for Learning-Based Teaching Collaborative System (UDL-BTCS) to support accessible learning","authors":"Ahmed Al-Azawei, Karsten Øster Lundqvist","doi":"10.1109/CEEC.2015.7332712","DOIUrl":"https://doi.org/10.1109/CEEC.2015.7332712","url":null,"abstract":"Educational environments should flexibly be designed to serve all learners irrespective of their individual differences, needs, and abilities. However, preparation of qualified instructors is a mainstay for developing inclusive learning. Academic staffs, more specifically, in developing countries need special training programs and efficient interaction environments to improve their teaching abilities. This research aims to develop a Universal Design for Learning-Based Teaching Collaborative System (UDL-BTCS) to support accessible learning. The proposed application represents a network between academic staff and educational institutions allowing them to embrace UDL principles in post k-12. A similar disciplinary approach will be adopted to recommend the best peers in a particular subject. The distributed pre-survey to 156 academic staff in Iraq indicates the need for such a collaborative system. It will assist addressing learner differences and responding to their individual needs. The core contribution of the proposed framework is delivering accessible teacher training courses to develop their individual skills and this, in turn, can promote the educational system in developing countries. A case study is chosen from Iraq because this country has experienced a series of conflicts that duplicated the number of people with special learning needs.","PeriodicalId":294036,"journal":{"name":"2015 7th Computer Science and Electronic Engineering Conference (CEEC)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116039240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Low-cost programmable battery dischargers and application in battery model identification","authors":"K. Propp, A. Fotouhi, D. Auger","doi":"10.1109/CEEC.2015.7332729","DOIUrl":"https://doi.org/10.1109/CEEC.2015.7332729","url":null,"abstract":"This paper describes a study where a low-cost programmable battery discharger was built from basic electronic components, the popular MATLAB programming environment, and an low-cost Arduino microcontroller board. After its components and their function are explained in detail, a case study is performed to evaluate the discharger's performance. The setup is principally suitable for any type of battery cell or small packs. Here a 7.2 V NiMH battery pack including six cells is used. Consecutive discharge current pulses are applied and the terminal voltage is measured as the output. With the measured data, battery model identification is performed using a simple equivalent circuit model containing the open circuit voltage and the internal resistance. The identification results are then tested by repeating similar tests. Consistent results demonstrate accuracy of the identified battery parameters, which also confirms the quality of the measurement. Furthermore, it is demonstrated that the identification method is fast enough to be used in real-time applications.","PeriodicalId":294036,"journal":{"name":"2015 7th Computer Science and Electronic Engineering Conference (CEEC)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117347624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Electric vehicle battery model identification and state of charge estimation in real world driving cycles","authors":"A. Fotouhi, K. Propp, D. Auger","doi":"10.1109/CEEC.2015.7332732","DOIUrl":"https://doi.org/10.1109/CEEC.2015.7332732","url":null,"abstract":"This paper describes a study demonstrating a new method of state-of-charge (SoC) estimation for batteries in real-world electric vehicle applications. This method combines realtime model identification with an adaptive neuro-fuzzy inference system (ANFIS). In the study, investigations were carried down on a small-scale battery pack. An equivalent circuit network model of the pack was developed and validated using pulse-discharge experiments. The pack was then subjected to demands representing realistic WLTP and UDDS driving cycles obtained from a model of a representative electric vehicle, scaled match the size of the battery pack. A fast system identification technique was then used to estimate battery parameter values. One of these, open circuit voltage, was selected as suitable for SoC estimation, and this was used as the input to an ANFIS system which estimated the SoC. The results were verified by comparison to a theoretical Coulomb-counting method, and the new method was judged to be effective. The case study used a small 7.2 V NiMH battery pack, but the method described is applicable to packs of any size or chemistry.","PeriodicalId":294036,"journal":{"name":"2015 7th Computer Science and Electronic Engineering Conference (CEEC)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123723501","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On association rules mining in the context of wireless networks","authors":"R. Kwan, D. Lake","doi":"10.1109/CEEC.2015.7332709","DOIUrl":"https://doi.org/10.1109/CEEC.2015.7332709","url":null,"abstract":"To assess the performance of a cellular wireless network such as GSM, UMTS and LTE etc., performance counters are logged and maintained by the network management system (NMS). Due to the complexity of a network, the number of these performance counters is typically very large, and the analysis of these data is very difficult. In a typical situation, only a few number of key performance indicators (KPIs) are used to represent the performance status of the network. As a result, the vast amount of data contained in the NMS database is not fully utilized. If the network operator can exploit such data more fully, more insights regarding the network behaviours can be obtained and extracted. These insights are also very helpful in diagnosing network problems. This paper proposes applying what is known as the market basket analysis to analyse the network KPIs. The bridging of these two seemingly unrelated domains is done via the use of association rules mining. An example is presented to illustrate the usefulness of this approach.","PeriodicalId":294036,"journal":{"name":"2015 7th Computer Science and Electronic Engineering Conference (CEEC)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124070567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}