This paper applies a hybrid approach to design a fault diagnoser for controlled continuous systems under actuator saturation. The discrete system is associated to fault tolerant states, non fault-tolerant states and fault events, and the discrete dynamic is modelled by using a Hybrid Finite State Automaton (HFSA). The discrete dynamic is extended by defining new events that are identified from the residuals associated to the continuous dynamics which is controlled by using a model matching strategy. The hybrid language is obtained for the controlled system and the HFSA is extended with observable events in order to propose the discrete diagnoser to identify the non-fault tolerant modes and the faults that exist in the system. This approach aims to propose real-time diagnostic systems for industrial processes.
{"title":"Fault Diagnosis for Controlled Continuous Systems from a Hybrid Approach: A Case Study","authors":"M. Cerrada, Joffre Ortiz, Réne-Vinicio Sánchez","doi":"10.1109/APCASE.2015.60","DOIUrl":"https://doi.org/10.1109/APCASE.2015.60","url":null,"abstract":"This paper applies a hybrid approach to design a fault diagnoser for controlled continuous systems under actuator saturation. The discrete system is associated to fault tolerant states, non fault-tolerant states and fault events, and the discrete dynamic is modelled by using a Hybrid Finite State Automaton (HFSA). The discrete dynamic is extended by defining new events that are identified from the residuals associated to the continuous dynamics which is controlled by using a model matching strategy. The hybrid language is obtained for the controlled system and the HFSA is extended with observable events in order to propose the discrete diagnoser to identify the non-fault tolerant modes and the faults that exist in the system. This approach aims to propose real-time diagnostic systems for industrial processes.","PeriodicalId":235698,"journal":{"name":"2015 Asia-Pacific Conference on Computer Aided System Engineering","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134070826","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The research using computational intelligence methods to improve bad debt recovery is imperative due to the rapid increase in the cost of healthcare in the U.S. This study explores effectiveness of using cost-sensitive learning methods to classify the unknown cases in imbalanced bad debt datasets and compares the results with those of two other methods: undersampling and oversampling, often used in processing imbalanced datasets. The study also analyzes the function of a semi-supervised learning algorithm in different circumstances. The results show that although the predictive accuracy rates with oversampling in balanced testing datasets is the best, it is unpractical due to the existence of imbalanced classes in real healthcare situations. The models constructed by undersampling have high classification accuracy rates of the minority class in imbalanced datasets, but they tend to make the overall classification accuracy rates of the majority class worse. The results show that cost-sensitive learning methods can improve the classification accuracy rates of the minority class in imbalanced datasets while achieving considerably good overall classification accuracy rates and classification accuracy rates of majority class. The results and analysis in this study show that cost-sensitive learning methods provide a potentially viable approach to classify the unknown cases in imbalanced bad debt datasets. At last, more practical predictive results are obtained by using the models to predict the unlabeled cases. Although oversampling and the cost-sensitive learning methods with the semi-supervised learning can improve the overall and majority class classification accuracy rates, the minority class classification accuracy rates are still relatively low. The semi-supervised learning algorithms need to be improved to adapt to the imbalanced bad debt datasets.
{"title":"Cost-Sensitive Learning for Imbalanced Bad Debt Datasets in Healthcare Industry","authors":"Donghui Shi, J. Guan, Jozef Zurada","doi":"10.1109/APCASE.2015.13","DOIUrl":"https://doi.org/10.1109/APCASE.2015.13","url":null,"abstract":"The research using computational intelligence methods to improve bad debt recovery is imperative due to the rapid increase in the cost of healthcare in the U.S. This study explores effectiveness of using cost-sensitive learning methods to classify the unknown cases in imbalanced bad debt datasets and compares the results with those of two other methods: undersampling and oversampling, often used in processing imbalanced datasets. The study also analyzes the function of a semi-supervised learning algorithm in different circumstances. The results show that although the predictive accuracy rates with oversampling in balanced testing datasets is the best, it is unpractical due to the existence of imbalanced classes in real healthcare situations. The models constructed by undersampling have high classification accuracy rates of the minority class in imbalanced datasets, but they tend to make the overall classification accuracy rates of the majority class worse. The results show that cost-sensitive learning methods can improve the classification accuracy rates of the minority class in imbalanced datasets while achieving considerably good overall classification accuracy rates and classification accuracy rates of majority class. The results and analysis in this study show that cost-sensitive learning methods provide a potentially viable approach to classify the unknown cases in imbalanced bad debt datasets. At last, more practical predictive results are obtained by using the models to predict the unlabeled cases. Although oversampling and the cost-sensitive learning methods with the semi-supervised learning can improve the overall and majority class classification accuracy rates, the minority class classification accuracy rates are still relatively low. The semi-supervised learning algorithms need to be improved to adapt to the imbalanced bad debt datasets.","PeriodicalId":235698,"journal":{"name":"2015 Asia-Pacific Conference on Computer Aided System Engineering","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132756092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This document describes the relevant aspects of the design of a Systemic Protection System - SPS (Remedial Action Scheme - RAS) implemented in the Ecuadorian Power System. The SPS is an automatic protection system designed to maintain power system reliability by detecting abnormal or predetermined system conditions and taking corrective actions in order to avoid a grid collapse in Ecuador. In this connection, CENACE studied n-2 contingencies of some 230 kV transmission lines of the trunk transmission system during heavy load conditions, which might trigger undesirable problems such as area separation and even possible blackouts. The study results have led to tables of mitigation actions that must present a quick response in real time (less than 200 ms) in order to mitigate the possible consequences. The mitigation actions comprise tripping of computed quantities of generation and load shedding at previously specified locations or regions. The main functional components of the SPS include: field devices, central controller systems (CCS), and communication networks. The mitigation of any specific condition will be carried out via SPS a central controller programming that allows sending monitoring and tripping signals to IEDs placed at suitable locations.
{"title":"Architecture of a Systemic Protection System for the Interconnected National System of Ecuador","authors":"M. Flores, D. Echeverria, R. Barba, G. Arguello","doi":"10.1109/APCASE.2015.80","DOIUrl":"https://doi.org/10.1109/APCASE.2015.80","url":null,"abstract":"This document describes the relevant aspects of the design of a Systemic Protection System - SPS (Remedial Action Scheme - RAS) implemented in the Ecuadorian Power System. The SPS is an automatic protection system designed to maintain power system reliability by detecting abnormal or predetermined system conditions and taking corrective actions in order to avoid a grid collapse in Ecuador. In this connection, CENACE studied n-2 contingencies of some 230 kV transmission lines of the trunk transmission system during heavy load conditions, which might trigger undesirable problems such as area separation and even possible blackouts. The study results have led to tables of mitigation actions that must present a quick response in real time (less than 200 ms) in order to mitigate the possible consequences. The mitigation actions comprise tripping of computed quantities of generation and load shedding at previously specified locations or regions. The main functional components of the SPS include: field devices, central controller systems (CCS), and communication networks. The mitigation of any specific condition will be carried out via SPS a central controller programming that allows sending monitoring and tripping signals to IEDs placed at suitable locations.","PeriodicalId":235698,"journal":{"name":"2015 Asia-Pacific Conference on Computer Aided System Engineering","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134381755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The aim of paper to presents the contain problem in automatic tunneling. Automatic tunneling has three main components to encapsulate IPv6 packets into IPv4 packets. The components called Teredo, ISATAP, and 6to4. In some cases, these components related problems such as source routing, neighbor discovery and NAT holes. This paper present key issues related to the Teredo tunneling called "Teredo NAT Holes" that increases the attack surface. And thus causes the NAT service to become more vulnerable.
{"title":"Securing Teredo Client from Nat Holes Vulnerability","authors":"S. Slehat, Z. Chaczko, Anup Kale","doi":"10.1109/APCASE.2015.71","DOIUrl":"https://doi.org/10.1109/APCASE.2015.71","url":null,"abstract":"The aim of paper to presents the contain problem in automatic tunneling. Automatic tunneling has three main components to encapsulate IPv6 packets into IPv4 packets. The components called Teredo, ISATAP, and 6to4. In some cases, these components related problems such as source routing, neighbor discovery and NAT holes. This paper present key issues related to the Teredo tunneling called \"Teredo NAT Holes\" that increases the attack surface. And thus causes the NAT service to become more vulnerable.","PeriodicalId":235698,"journal":{"name":"2015 Asia-Pacific Conference on Computer Aided System Engineering","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133745064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. Avila, X. Riofrio, K. Palacio-Baus, M. Espinoza-Mejía, Víctor Saquicela
Compared to analog transmissions, Digital Television (DTV) standards allows a higher number of available TV stations and consequently, a larger entertainment offer. In this context, Recommender Systems (RS) support users in choosing entertainment content by narrowing their options to a reduced set based on their preferences an interests. However, new users or those having incomplete profiles prevent the system to produce accurate recommendations, which is more noticeable in early stages of the RS. This paper proposes the use of a demographic stereotyping approach based on minimal user attributes acquired during user registration. Furthermore, we propose an experimental procedure that can be used to compare the system accuracy for the created stereotypes and for users making extensive use of the system.
{"title":"Semantic Recommender Systems for Digital TV: From Demographic Stereotyping to Personalized Recommendations","authors":"J. Avila, X. Riofrio, K. Palacio-Baus, M. Espinoza-Mejía, Víctor Saquicela","doi":"10.1109/APCASE.2015.76","DOIUrl":"https://doi.org/10.1109/APCASE.2015.76","url":null,"abstract":"Compared to analog transmissions, Digital Television (DTV) standards allows a higher number of available TV stations and consequently, a larger entertainment offer. In this context, Recommender Systems (RS) support users in choosing entertainment content by narrowing their options to a reduced set based on their preferences an interests. However, new users or those having incomplete profiles prevent the system to produce accurate recommendations, which is more noticeable in early stages of the RS. This paper proposes the use of a demographic stereotyping approach based on minimal user attributes acquired during user registration. Furthermore, we propose an experimental procedure that can be used to compare the system accuracy for the created stereotypes and for users making extensive use of the system.","PeriodicalId":235698,"journal":{"name":"2015 Asia-Pacific Conference on Computer Aided System Engineering","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131359874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Emiro J. Ibarra, R. Medina, Villie Morocho, Pablo Vanegas
A sparse based algorithm for optical flow estimation is presented and compared with several classical optical flow estimation algorithms. The comparison is performed using several video sequences available from the Middlebury benchmark where the ground truth optical flow is known. The sparse algorithm attains competitive results with average angular errors as low as 2.09° and average magnitude errors as low as 0.100. The algorithms are also tested using a 4-D cardiac Magnetic Resonance Image (MRI) sequence. The sparse algorithm estimates an optical flow field that represents the motion of contraction during the systole interval.
{"title":"Optical Flow as a Tool for Cardiac Motion Estimation","authors":"Emiro J. Ibarra, R. Medina, Villie Morocho, Pablo Vanegas","doi":"10.1109/APCASE.2015.38","DOIUrl":"https://doi.org/10.1109/APCASE.2015.38","url":null,"abstract":"A sparse based algorithm for optical flow estimation is presented and compared with several classical optical flow estimation algorithms. The comparison is performed using several video sequences available from the Middlebury benchmark where the ground truth optical flow is known. The sparse algorithm attains competitive results with average angular errors as low as 2.09° and average magnitude errors as low as 0.100. The algorithms are also tested using a 4-D cardiac Magnetic Resonance Image (MRI) sequence. The sparse algorithm estimates an optical flow field that represents the motion of contraction during the systole interval.","PeriodicalId":235698,"journal":{"name":"2015 Asia-Pacific Conference on Computer Aided System Engineering","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116617963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper explains the importance of Information Security (IS) in the field of Information and Communication Technologies(ICT) as well as the use of concepts, standards and specialized tools, the application has become increasingly relevant for the organizations. Research and training in Information Security has an important role, since the preparation, defense and response to events that arise, strengthens the proper administration of the assets in the information environment. Likewise, the application of the appropriate roles of each user and the analysis of risks that lead to having more secure systems policies, hence the importance of certain introductory concepts such as Computer Security Incident Respone Team (CSIRT), which allow you the proper management of the Information Security and its corresponding implementation in this field.
{"title":"Technologies' Application, Rules, and Challenges of Information Security on Information and Communication Technologies","authors":"Cumbal Renato, N. Maria","doi":"10.1109/APCASE.2015.74","DOIUrl":"https://doi.org/10.1109/APCASE.2015.74","url":null,"abstract":"This paper explains the importance of Information Security (IS) in the field of Information and Communication Technologies(ICT) as well as the use of concepts, standards and specialized tools, the application has become increasingly relevant for the organizations. Research and training in Information Security has an important role, since the preparation, defense and response to events that arise, strengthens the proper administration of the assets in the information environment. Likewise, the application of the appropriate roles of each user and the analysis of risks that lead to having more secure systems policies, hence the importance of certain introductory concepts such as Computer Security Incident Respone Team (CSIRT), which allow you the proper management of the Information Security and its corresponding implementation in this field.","PeriodicalId":235698,"journal":{"name":"2015 Asia-Pacific Conference on Computer Aided System Engineering","volume":"152 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129744911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Roger Granda, Vanessa Echeverría, K. Chiluiza, Marisol Wong-Villacrés
The present study describes a proposed multitable top system for supporting collaborative database design activities in the classroom. Additionally, two experiments were conducted to evaluate students' and teachers' perceptions of the proposed system potential on aspects of group work assessment such as: ease of grading individuals as well as groups, equality of students' participation, and, capability to accurately reflect individual contributions. Ten educators and 22 students from a Computer Science program participated in the experiments. The findings of this work show that the use of the proposed system impacted positively on the educators' perception about the ease of grading individuals and groups. In addition, distinguishing users in collaborative group work is key for decreasing social-loafing. The results suggest that the proposed system does have potential to support a better group work assessment.
{"title":"Supporting the Assessment of Collaborative Design Activities in Multi-tabletop Classrooms","authors":"Roger Granda, Vanessa Echeverría, K. Chiluiza, Marisol Wong-Villacrés","doi":"10.1109/APCASE.2015.54","DOIUrl":"https://doi.org/10.1109/APCASE.2015.54","url":null,"abstract":"The present study describes a proposed multitable top system for supporting collaborative database design activities in the classroom. Additionally, two experiments were conducted to evaluate students' and teachers' perceptions of the proposed system potential on aspects of group work assessment such as: ease of grading individuals as well as groups, equality of students' participation, and, capability to accurately reflect individual contributions. Ten educators and 22 students from a Computer Science program participated in the experiments. The findings of this work show that the use of the proposed system impacted positively on the educators' perception about the ease of grading individuals and groups. In addition, distinguishing users in collaborative group work is key for decreasing social-loafing. The results suggest that the proposed system does have potential to support a better group work assessment.","PeriodicalId":235698,"journal":{"name":"2015 Asia-Pacific Conference on Computer Aided System Engineering","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129582029","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
E. Tusa, A. Akbarinia, Raquel Gil Rodríguez, Corina Barbalata
The first requisite of a robot to succeed in social interactions is accurate human localisation, i.e. Subject detection and tracking. Later, it is estimated whether an interaction partner seeks attention, for example by interpreting the position and orientation of the body. In computer vision, these cues usually are obtained in colour images, whose qualities are degraded in ill illuminated social scenes. In these scenarios depth sensors offer a richer representation. Therefore, it is important to combine colour and depth information. The second aspect that plays a fundamental role in the acceptance of social robots is their real-time-ability. Processing colour and depth images is computationally demanding. To overcome this we propose a parallelisation strategy of face detection and tracking based on two different architectures: message passing and shared memory. Our results demonstrate high accuracy in low computational time, processing nine times more number of frames in a parallel implementation. This provides a real-time social robot interaction.
{"title":"Real-Time Face Detection and Tracking Utilising OpenMP and ROS","authors":"E. Tusa, A. Akbarinia, Raquel Gil Rodríguez, Corina Barbalata","doi":"10.1109/APCASE.2015.39","DOIUrl":"https://doi.org/10.1109/APCASE.2015.39","url":null,"abstract":"The first requisite of a robot to succeed in social interactions is accurate human localisation, i.e. Subject detection and tracking. Later, it is estimated whether an interaction partner seeks attention, for example by interpreting the position and orientation of the body. In computer vision, these cues usually are obtained in colour images, whose qualities are degraded in ill illuminated social scenes. In these scenarios depth sensors offer a richer representation. Therefore, it is important to combine colour and depth information. The second aspect that plays a fundamental role in the acceptance of social robots is their real-time-ability. Processing colour and depth images is computationally demanding. To overcome this we propose a parallelisation strategy of face detection and tracking based on two different architectures: message passing and shared memory. Our results demonstrate high accuracy in low computational time, processing nine times more number of frames in a parallel implementation. This provides a real-time social robot interaction.","PeriodicalId":235698,"journal":{"name":"2015 Asia-Pacific Conference on Computer Aided System Engineering","volume":"08 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127457183","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In the paper, comparative studies of three projection systems was carried out, i.e., With a cylindrical screen, with rear projection on foil placed on car windows -- "on screen", and with a collimation system. The purpose of the study was to assess the performance characteristics of visualization systems and the susceptibility of trainees to symptoms of simulator sickness. The results indicated that none of the drivers displayed an increased tendency to individual's symptoms of the disease and, from the perspective of trainees, the optimal solution for projection systems in car simulators is the collimated system.
{"title":"Application of Collimated Projection Systems for the Purpose of Driving Simulators","authors":"G. Gudzbeler, M. Dąbrowski, G. Borowik","doi":"10.1109/APCASE.2015.51","DOIUrl":"https://doi.org/10.1109/APCASE.2015.51","url":null,"abstract":"In the paper, comparative studies of three projection systems was carried out, i.e., With a cylindrical screen, with rear projection on foil placed on car windows -- \"on screen\", and with a collimation system. The purpose of the study was to assess the performance characteristics of visualization systems and the susceptibility of trainees to symptoms of simulator sickness. The results indicated that none of the drivers displayed an increased tendency to individual's symptoms of the disease and, from the perspective of trainees, the optimal solution for projection systems in car simulators is the collimated system.","PeriodicalId":235698,"journal":{"name":"2015 Asia-Pacific Conference on Computer Aided System Engineering","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129966605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}