Information Technology And Control
Latest Publications


TOTAL DOCUMENTS

499
(FIVE YEARS 148)

H-INDEX

10
(FIVE YEARS 3)

Published By Publishing House Technologija

2335-884x, 1392-124x

2021 ◽  
Vol 50 (4) ◽  
pp. 736-751
Author(s):  
Ludmila Vesjolaja ◽  
Bjørn Glemmestad ◽  
Bernt Lie

Granulation is a particle enlargement process during which fine particles or atomizable liquids are converted into granules via a series of complex granulation mechanisms. In this paper, two feedback control strategies are implemented to make granulation loop processes more steady to operate, i.e., to suppress oscillatory behavior in the produced granule sizes. In the first control strategy, a classical proportional-integral (PI) controller is used, while in the second, a double-loop control strategy is used to control the median diameter of the granules leaving the granulator. The simulation results showed that using the proposed control design for the granulation loop can eliminate the oscillatory behaviour in the produced granule median diameter and make granulation loop processes more steady to operate. A comparison between the two proposed control strategies showed that it is preferable to use the double-loop control strategy.


2021 ◽  
Vol 50 (4) ◽  
pp. 786-807
Author(s):  
Alen Salkanovic ◽  
Sandi Ljubic ◽  
Ljubisa Stankovic ◽  
Jonatan Lerga

This paper evaluates the performances of numerous encryption algorithms on mobile devices running the Android operating system. The primary objective of our research was to measure and compare the relative performances of tested algorithm implementations (Data Encryption Standard (DES), 3DES, Advanced Encryption Standard (AES), ChaCha20, Blowfish, and Rivest Cipher 4 (RC4)) on the Android platform. The algorithms were compared in terms of CPU utilization by measuring the time required to encrypt and decrypt variable size text files. Besides evaluating the six common symmetric encryption ciphers, a comparison has been conducted for several Password-Based Encryption (PBE) algorithms. Diverse cipher transformations were evaluated for each algorithm by utilizing various feedback modes and padding schemes. Two smartphone devices were used for testing, with different versions of the Android operating system and hardware specifications. The summarized performance outcomes for various cipher transformations are presented to demonstrate the effectiveness of each algorithm.


2021 ◽  
Vol 50 (4) ◽  
pp. 607-626
Author(s):  
Egidijus Rytas Vaidogas

Two alternative Bayesian approaches are proposed for the prediction of fragmentation of pressure vessels triggered off by accidental explosions (bursts) of these containment structures. It is shown how to carry out this prediction with post-mortem data on fragment numbers counted after past explosion accidents. Results of the prediction are estimates of probabilities of individual fragment numbers. These estimates are expressed by means of Bayesian prior or posterior distributions. It is demonstrated how to elicit the prior distributions from relatively scarce post-mortem data on vessel fragmentations. Specifically, it is suggested to develop priors with two Bayesian models known as compound Poisson-gamma and multinomial-Dirichlet probability distributions. The available data is used to specify non-informative prior for Poisson parameter that is subsequently transformed into priors of individual fragment number probabilities. Alternatively, the data is applied to a specification of Dirichlet concentration parameters. The latter priors directly express epistemic uncertainty in the fragment number probabilities. Example calculations presented in the study demonstrate that the suggested non-informative prior distributions are responsive to updates with scarce data on vessel explosions. It is shown that priors specified with Poisson-gamma and multinomial-Dirichlet models differ tangibly; however, this difference decreases with increasing amount of new data. For the sake of brevity and concreteness, the study was limited to fire induced vessel bursts known as boiling liquid expanding vapour explosions (BLEVEs).


2021 ◽  
Vol 50 (4) ◽  
pp. 674-685
Author(s):  
Bora Aslan ◽  
Kerem Ataşen

COVID-19 is a disease caused by a novel coronavirus originated in Wuhan, China. The virus rapidly spread over more than 200 countries around the world and caused deaths of more than 690.000 of people. To prevent rapid spreading of this disease, the information sharing related to the findings about the COVID-19 disease must be fast and secure between countries. Since the COVID-19 related health data such as the symptoms and private patient records are confidential, such information requires privacy protection. The blockchain and smart contracts are well-suited solutions for speed, privacy, and security needs of dissemination the COVID-19 related information. Blockchain based e-health solutions have been discussed for years. However, a pandemic is more important than the regular health problems. Thus, this study proposes how critical pandemic related information should be shared between the participating countries and can be accessed by health data actors such as researchers, doctors, laboratory staff, authorized institutions of different countries as well as the World Health Organization.


2021 ◽  
Vol 50 (4) ◽  
pp. 645-655
Author(s):  
George Klington ◽  
K Ramesh ◽  
Seifedine Kadry

This paper presents a cost-effective watermarking scheme for the authentication of healthcare data management. The digital fundus images are one particular class of medical images and it is widely used for screening mass population, identifying early symptoms of various diseases in healthcare. The mass volume of such data and its management requires an effective authentication scheme, while it is exchanged on an open network. The proposed scheme uses a watermarking technique to authenticate the digital fundus images. The watermark is generated concerning the portions of the original image using Singular value decomposition (SVD) and the remaining portions are used for embedding. The embedding process uses interleaving concepts across the red and blue planes of the original images to make the number of embedding as constant. The constant number of embedding is fixed for the original size of the given image to make the scheme as computationally cost-effective. The experiment showed the maximum capacity of the proposed scheme is 329960 bits for an image of size 565x584x3. It modifies 43% of the total number of embedded pixels against jittering attacks at an average. Comparative analysis showed that the proposed scheme uses only 1/3 of the original image size for embedding by retaining good imperceptibility of 54 dB. The net performance of the proposed scheme is found to be constant and it makes a scheme as cost-effective.


2021 ◽  
Vol 50 (4) ◽  
pp. 656-673
Author(s):  
Chhayarani Ram Kinkar ◽  
Yogendra Kumar Jain

The presented paper proposes a new speech command recognition model for novel engineering applications with limited resources. We built the proposed model with the help of a Convolutional Recurrent Neural Network (CRNN). The use of CRNN instead of Convolutional Neural Network (CNN) helps us to reduce the model parameters and memory requirement as per resource constraints. Furthermore, we insert transmute and curtailment layer between the layers of CRNN. By doing this we further reduce model parameters and float number of operations to half of the CRNN requirement. The proposed model is tested on Google’s speech command dataset. The obtained result shows that the proposed CRNN model requires 1/3 parameters as compared to the CNN model. The number of parameters of the CRNN model is further reduced by 45% and the float numbers of operations between 2% to 12 % in different recognition tasks. The recognition accuracy of the proposed model is 96% on Google’s speech command dataset, and on laboratory recording, its recognition accuracy is 89%.


2021 ◽  
Vol 50 (4) ◽  
pp. 627-644
Author(s):  
Shariq Bashir ◽  
Daphne Teck Ching Lai

Approximate frequent itemsets (AFI) mining from noisy databases are computationally more expensive than traditional frequent itemset mining. This is because the AFI mining algorithms generate large number of candidate itemsets. This article proposes an algorithm to mine AFIs using pattern growth approach. The major contribution of the proposed approach is it mines core patterns and examines approximate conditions of candidate AFIs directly with single phase and two full scans of database. Related algorithms apply Apriori-based candidate generation and test approach and require multiple phases to obtain complete AFIs. First phase generates core patterns, and second phase examines approximate conditions of core patterns. Specifically, the article proposes novel techniques that how to map transactions on approximate FP-tree, and how to mine AFIs from the conditional patterns of approximate FP-tree. The approximate FP-tree maps transactions on shared branches when the transactions share a similar set of items. This reduces the size of databases and helps to efficiently compute the approximate conditions of candidate itemsets. We compare the performance of our algorithm with the state of the art AFI mining algorithms on benchmark databases. The experiments are analyzed by comparing the processing time of algorithms and scalability of algorithms on varying database size and transaction length. The results show pattern growth approach mines AFIs in less processing time than related Apriori-based algorithms.


2021 ◽  
Vol 50 (4) ◽  
pp. 722-735
Author(s):  
W. Wang ◽  
F. Berholm ◽  
K. Hu ◽  
L. Zhao ◽  
S. Feng ◽  
...  

To accurately detect lane lines in road traffic images at raining weather, a edge detection based method is studied, which mainly includes four algorithms. (1) Firstly an image is enhanced by an improved Retinex algorithm; (2) Then, an algorithm based on the Hessian matrix is applied to strengthen lane lines; (3) To extract the feature points of a lane line, a ridge edge detection algorithm based on five line detection in four directions is proposed, in which, in light on the possible positions of lane lines in the image, it detects the maximum gray level points in the local area of the detecting point within the pre-set valid detection region; and (4) After the noise removal based on the minimum circumscribed rectangles, the candidate points of lane lines are connected as segments, and for the gap filling between segments, in order to make connection correctly, the algorithm makes the filling in two steps, short gap and long gap fillings, and the long gap filling is made on the combination of segment angle difference and gap distance and gap angle. By testing hundreds of images of the lane lines at raining weather and by comparing several traditional image enhancement and segmentation algorithms, the new method of the lane line detection can produce the satisfactory results.


2021 ◽  
Vol 50 (4) ◽  
pp. 808-826
Author(s):  
Đorđe Stakić ◽  
Miodrag Živković ◽  
Ana Anokić

The two-dimensional heterogeneous vector bin packing problem (2DHet-VBPP) consists of packing the set of items into the set of various type bins, respecting their two resource limits. The problem is to minimize the total cost of all bins. The problem, known to be NP-hard, can be formulated as a pure integer linear program, but optimal solutions can be obtained by the CPLEX Optimizer engine only for small instances. This paper proposes a metaheuristic approach to the 2DHet-VBPP, based on Reduced variable neighborhood search (RVNS). All RVNS elements are adapted to the considered problem and many procedures are designed to improve efficiency of the method. As the Two-dimensional Homogeneous-VBPP (2DHom-VBPP) is more often treated, we considered also a special version of the RVNS algorithm to solve the 2DHom-VBPP. The results obtained and compared to both CPLEX results and results on benchmark instances from literature, justify the use of the RVNS algorithm to solve large instances of these optimization problems.


2021 ◽  
Vol 50 (4) ◽  
pp. 752-768
Author(s):  
Muchao Chen ◽  
Yanxiang He

Due to the complexity of the interference operation environment of wire rope, the detection signals are usually weak and coupled in time-frequency domain, which makes the defect difficult to recognize, while the signal characterizations in phase space are also needed to be studied. Combining the nonlinear dynamic feature identification theories, phase space characteristics and chaotic features of wire rope defect detection signals are mainly investigated in this paper. First, principles of phase space reconstruction method for wire rope detection signals are presented by the chaotic dynamic indexes calculation of embedded dimension and delay time. Second, the change trends of the correlation dimension, approximate entropy and Lyapunov index of different phase space reconstructed wire rope defect detection signals are studied through the nonlinear simulation and analysis. Finally, a phase space reconstruction algorithm based on improved SVD is proposed, and the new algorithm is also compared with traditional signal processing methods. These results obtained by 6 groups of experiments were also evaluated and compared by the parameters of signal-to-noise ratio (SNR) and phase space trajectory chart, which manifests that the improved algorithm not only can increase the weak detection signal SNR to about 2.3dB of wire rope effectively, but also demonstrate the feasibility of the proposed methods in application.


Sign in / Sign up

Export Citation Format

Share Document