卷 23, 编号 5 (2024)

Artificial intelligence, knowledge and data engineering

Scheduling as a Constraint Satisfaction Problem (Using the Example of Open-Pit Minе Production Scheduling Problem)

Zuenko A., Oleynik Y.

摘要

The research described in the work is aimed at developing methods for Scheduling. The fundamental disadvantage of the existing methods of Mixed-Integer Linear Programming in application to the problems under consideration is the fact that they are too demanding on the amount of RAM. The difficulty of applying local search procedures to such high-dimensional problems is to develop an effective way to find an acceptable initial approximation and determine the neighboring state transition function, which would allow achieving the optimum fast enough. In the Operations Research Theory, adding additional conditions to a problem can lead to a fundamental change in the problem-solving scheme. The methods proposed in the study are implemented within the framework of the Constraint Programming Paradigm which makes it possible to represent the subject domain dependencies saving RAM, as well as to provide the ability to step-by-step take into account heterogeneous problem conditions without essentially changing the scheme of finding solutions. A significant part of the research deals with methods of logical inference on constraints to reduce the search space and speed up the computational process. The approach to scheduling is illustrated by the Open-Pit Mine Production Scheduling Problem, which was first proposed to be solved as a Constraint Satisfaction Problem. In order to find the first feasible solution, a «greedy» search method is proposed, the result of which can be improved using the developed hybrid method. Both methods rely on original procedures of inference on constraints. The proposed approach has proven its efficiency for block models with sizes of tens and hundreds of thousands of blocks.
Informatics and Automation. 2024;23(5):1290-1310
pages 1290-1310 views

Using Ontology to Analyze English Comments on Social Networks

Viet Hung N., Tan N., Thi Thuy Nga N., Huyen Trang L., Thuy Hang T.

摘要

Chatbots have become interesting for many users as technology becomes more and more advanced. The need for information exchange among people through computer systems is increasing daily, raising the preference for using chatbots in most countries. Since Vietnam is such a developing country with a variety of ethnic groups, it requires much attention to the proliferation of social networks and the expansion of the cooperative economy. Regarding social networks, the inappropriate use of words in everyday life has become a significant issue. There are mixed reviews of praise and criticism on social networks; and we try to reduce the negative language use and improve the quality of using social networks language. We aim to meet users’ needs on social networks, promote economic development, and address social issues more effectively. To achieve these goals, in this paper we propose a deep learning technique using ontology knowledge mining to collect and process comments on social networks. This approach aims to enhance the user experience and facilitate the exchange of information among people by mining opinions in comments. Experimental results demonstrate that our method outperforms the conventional approach.

Informatics and Automation. 2024;23(5):1311-1338
pages 1311-1338 views

An Approach to a Priori Assessment of Fuzzy Classification Models in Monitoring Tasks

Potyupkin A., Pilkevich S., Zaytsev V.

摘要

The article addresses the problems of using automation tools to perform monitoring and management tasks applicable to assessing the quality of fuzzy classification models, where the classification procedure is implemented on the basis of knowledge (rules) in the absence of the training set. An approach is proposed to obtain a priori assessments of the classification quality based on the study of the used model sensitivity to changes in the values of internal parameters during the corresponding modeling. The interpretation of the modeling results in the form of risk assessment caused by the self-imperfection of the classification models is obtained. The article provides an example of a fuzzy classification model based on a comparison of the current state of a monitoring object described using fuzzy features with a set of predefined typical states, which form corresponding fuzzy equal (close) states (monitoring situations). The comparison is carried out using the fuzzy implication operation provided that the required reliability is met. The example of this model demonstrates how the type of implication operation, as well as the internal features of the model, affect the results of classification, and appropriate indicators are proposed, which are both an interpretation of generally accepted indicators for assessing the classification quality, and unique, inherent in the considered model. Computational experiments were carried out, which made it possible to obtain graphs of changes in classification quality assessment indicators for the considered model and its modification and visualize the influence of internal parameters of the model on the results of its application. A number of indicators are proposed that allow for an a priori assessment of the risks arising from the application of the model before its actual application.
Informatics and Automation. 2024;23(5):1339-1366
pages 1339-1366 views

Clustering of Networks Using the Fish School Search Algorithm

Ibrahim A., Boudref M., Badis L.

摘要

A network is an aggregation of nodes joined by edges, representing entities and their relationships. In social network clustering, nodes are organized into clusters according to their connectivity patterns, with the goal of community detection. The detection of community structures in networks is essential. However, existing techniques for community detection have not yet utilized the potential of the Fish School Search (FSS) algorithm and modularity principles. We have proposed a novel method, clustering with the Fish School Search algorithm and modularity function (FSC), that enhances modularity in network clustering by iteratively partitioning the network and optimizing the modularity function using the Fish School Search Algorithm. This approach facilitates the discovery of highly modular community structures, improving the resolution and effectiveness of network clustering. We tested FSC on well-known and unknown network structures. Also, we tested it on a network generated using the LFR model to test its performance on networks with different community structures. Our methodology demonstrates strong performance in identifying community structures, indicating its effectiveness in capturing cohesive communities and accurately identifying actual community structures.

Informatics and Automation. 2024;23(5):1367-1397
pages 1367-1397 views

Efficient Implementation of Gammatone Filters Based on Warped Cosine Modulated Filter Bank

Porhun M., Vashkevich M.

摘要

The paper presents an effective implementation of a gammatone filter bank (GFB) based on a warped cosine modulated filter bank (WCMFB) using an all-pass transform. Examples of practical tasks in which a GFB is used are considered, and its main features and disadvantages are analyzed. A description of a uniform cosine-modulated filter bank is given, and the process of synthesis of a WCMFB using all-pass transform is shown. An optimization method for designing a WCMFB prototype filter to approximate the frequency characteristics of GFB has been developed. The method is based on a multiplicative model of the impulse response of the prototype filter using logistic sigmoid functions. The essence of the proposed method is to optimize the prototype filter in order to minimize the RMS error between the frequency response of the GFB and WCMFB for each channel. A software implementation in Python using the PyTorch library has been performed. Experimental studies of the proposed method have been carried out. The experimental results showed that the WCMFB can be used to approximate the frequency characteristics of the GFB, and the resulting frequency response has monotonic declines due to the use of logistic sigmoid functions. The resulting GFB frequency characteristics approximation error dependence on the number of sigmoids used in the prototype filter is analyzed. The analysis of the computational complexity of the WCMFB is performed, and it is shown how the number of addition and multiplication operations depends on the length of the impulse response of the prototype filter and the number of channels of the filter bank. It is concluded that the use of the WCMFB for the implementation of the GFB can significantly reduce the computational costs of implementing gammatone filters compared with direct implementation.
Informatics and Automation. 2024;23(5):1398-1422
pages 1398-1422 views

Rivest-Shamir-Adleman Algorithm Optimized to Protect IoT Devices from Specific Attacks

Jenifer R., Prakash V.

摘要

IoT devices are crucial in this modern world in many ways, as they provide support for environmental sensing, automation, and responsible resource conservation. The immense presence of IoT devices in everyday life is inevitable in the smart world. The predominant usage of IoT devices lurks the prying eyes of intentional hackers. Though there are several precautionary security systems and protocols available for generic wireless networks, it is observed that there is a need to formulate a state-of-the-art security mechanism exclusively for IoT network environments. This work is submitted here for the betterment of IoT network security. Three dedicated contributions are integrated in this work to achieve higher security scores in IoT network environments. Fast Fuzzy Anomaly Detector, Legacy Naïve Bayes Attack Classifiers, and Variable Security Schemer of Rivest-Shamir-Adleman algorithm are the novel modules introduced in this work abbreviated as ASORI. Captivating the advantages of the onboard IoT certification mechanism and selecting a dynamic security strategy are the novelties introduced in this work. ASORI model is tested with industrial standard network simulator OPNET to ensure the improved security along with vital network performance parameter betterments.

Informatics and Automation. 2024;23(5):1423-1453
pages 1423-1453 views

Robotics, automation and control systems

The Use of Hybrid Communication Architecture in Underwater Wireless Sensor Networks to Enhance Their Lifetime and Efficiency

Fedorova T., Ryzhov V., Safronov K.

摘要

The paper presents a comparative analysis of the main functional characteristics of underwater wireless sensor networks (UWSNs) with stationary and hybrid communication architectures. The UWSNs consist of sensor nodes located on the seabed and intermodal gateways facilitating the transmission of information packets between the underwater and above-water segments of the network. In the stationary UWSNs, anchored buoys serve as gateways, while in the hybrid UWSNs, mobile transport platforms fulfill this role. Using a mathematical framework based on a probabilistic approach, an evaluation of the functional characteristics of alternative communication architectures for UWSNs is performed from an energy perspective. The overall energy consumption of the network for message transmission and the sensor network's lifespan are determined. or the numerical analysis of the functional characteristics of UWSNs, a wide range of design parameters is considered, such as the size of the water area, the required number and placement options of sensor nodes, and the packet delivery probability in the water area (physical parameters of the environment). The search for "optimal" solutions from an energy standpoint is conducted within these parameter ranges. The conducted research demonstrates that mobility plays a crucial role in improving the functioning of underwater networks in terms of coverage (ensuring connectivity), energy efficiency, and lifetime. The mobile element, represented by the wave glider acting as an intermodal gateway, is capable of sustained operation in the water area for an extended period, indicating its potential for practical tasks such as data collection, storage, and information relay within the context of the Internet of Underwater Things.
Informatics and Automation. 2024;23(5):1532-1570
pages 1532-1570 views

Synthesis of a Fuzzy Controller by a Second-Order Object with Delay

Shilin A., Pham Trong H., Nguyen Vuong V.

摘要

The paper proposes a method for using Fuzzy controller tools to synthesize optimal control of a second-order dynamic object with a delay. The idea is to construct a phase surface that combines optimal relay control away from the equilibrium state region and linear control in the region itself. This approach made it possible to avoid self-oscillations in a steady state while maintaining the properties of optimal control in terms of speed. The switching trajectory in phase space, corresponding to the solution of the optimal control problem according to the Maximum principle, is determined by the method of inverse time calculation of the second-order difference equation of the plant. The region near the equilibrium state, where the linear controller is used, is determined from the results of modeling the motion of a point in phase space with optimal control for an object with a delay. This region is represented by an ellipse that describes motion in phase space in a self-oscillatory mode. To further eliminate self-oscillations in this area, a linear controller is used, tuned by means of solving the variational optimal control problem. It is proposed to use a tool for the synthesis of Fuzzy controllers, where the switching surface and calculation of the control value can be set arbitrarily. As a result, a variable controller structure is proposed to combine these two approaches. The resulting Fuzzy controller model is represented by a standard FLS structure, which was implemented in Python on the Orange Pi embedded computer. To connect to the current control object, an industrial controller FX3U-24MR is used, connected to a computer via a Modbus network. Full-scale tests are presented on a hot water supply temperature control object, which corresponds as closely as possible to the object model under study. The method, idea and results obtained in the work can be applied and investigated in the synthesis of control of dynamic objects in sliding mode to solve current problems related to eliminating the unwanted Chattering effect.
Informatics and Automation. 2024;23(5):1505-1531
pages 1505-1531 views

Implicit Understanding: Decoding Swarm Behaviors in Robots through Deep Inverse Reinforcement Learning

Iskandar A., Hammoud A., Kovács B.

摘要

Using reinforcement learning to generate the collective behavior of swarm robots is a common approach. Yet, formulating an appropriate reward function that aligns with specific objectives remains a significant challenge, particularly as the complexity of tasks increases. In this paper, we develop a deep inverse reinforcement learning model to uncover the reward structures that guide autonomous robots in achieving tasks by demonstrations. Deep inverse reinforcement learning models are particularly well-suited for complex and dynamic environments where predefined reward functions may be difficult to specify. Our model can generate different collective behaviors according to the required objectives and effectively copes with continuous state and action spaces, ensuring a nuanced recovery of reward structures. We tested the model using E-puck robots in the Webots simulator to solve two tasks: searching for dispersed boxes and navigation to a predefined position. Receiving rewards depends on demonstrations collected by an intelligent pre-trained swarm using reinforcement learning act as an expert. The results show successful recovery of rewards in both segmented and continuous demonstrations for two behaviors – searching and navigation. By observing the learned behaviors of the swarm by the expert and proposed model, it is noticeable that the model does not merely clone the expert behavior but generates its own strategies to achieve the system’s objectives.

Informatics and Automation. 2024;23(5):1485-1504
pages 1485-1504 views

Development of a Linear Control System for a Throttle of a UAV Propeller-Motor Group

Voevoda A., Filiushov Y., Filiushov V.

摘要

Orientation and positioning control of an unmanned aerial vehicle (UAV) vertical take-off and landing multi-rotor type in space is inextricably linked with the formation of a motion control vector, consisting of a combination of thrusts and aerodynamic moments of each propeller-motor group. The accuracy and speed of formation of the motion control vector greatly affect the positioning and orientation errors of the UAV. Most works devoted to the synthesis of UAV control systems use a motion control vector without taking into account the dynamics of the rotor-motor groups, which in some cases forces the control system to reduce its performance. The performance of the UAV control system can be increased by increasing the speed of generation of the thrust of the propeller-motor groups, for which a system for controlling the thrust of the propeller-motor group has been proposed. The propeller-motor group in its composition has a nonlinear internal connection in the aerodynamic torque and an output signal – thrust, that nonlinearly depends on the square of the propeller rotation speed. Typically, the propeller group is controlled like an electric motor – the internal coupling of the aerodynamic torque is considered an external disturbance, and the thrust is controlled by changing the speed of rotation of the propeller which is calculated based on the required motion control vector. It is proposed to consider thrust and aerodynamic torque an integral part of the propeller-engine group, for which to build a linear thrust control system. For this purpose, we carried out feedback linearization of the rotor-motor group system, connecting the voltage supplied to the motors with the motion control vector, which is the output value. The linearization process is divided into two stages: at the first stage feedback linearization is performed for an electric motor with internal nonlinear coupling by aerodynamic torque; at the second stage, linearization is performed with feedback on the output obtained at the first stage of the system with a nonlinear output signal – thrust. In accordance with the principles of subordinate control, motor control is formed for linearized feedback of the propeller group. Simulation was completed. An important issue when using feedback linearization is the preservation of the quality characteristics of the control system in the event of a mismatch between the parameters of the object and the model, the parameters of which are used to calculate the linearizing feedback. In this work, modeling was carried out with a discrepancy of some parameters up to 50%.
Informatics and Automation. 2024;23(5):1454-1484
pages 1454-1484 views

Согласие на обработку персональных данных с помощью сервиса «Яндекс.Метрика»

1. Я (далее – «Пользователь» или «Субъект персональных данных»), осуществляя использование сайта https://journals.rcsi.science/ (далее – «Сайт»), подтверждая свою полную дееспособность даю согласие на обработку персональных данных с использованием средств автоматизации Оператору - федеральному государственному бюджетному учреждению «Российский центр научной информации» (РЦНИ), далее – «Оператор», расположенному по адресу: 119991, г. Москва, Ленинский просп., д.32А, со следующими условиями.

2. Категории обрабатываемых данных: файлы «cookies» (куки-файлы). Файлы «cookie» – это небольшой текстовый файл, который веб-сервер может хранить в браузере Пользователя. Данные файлы веб-сервер загружает на устройство Пользователя при посещении им Сайта. При каждом следующем посещении Пользователем Сайта «cookie» файлы отправляются на Сайт Оператора. Данные файлы позволяют Сайту распознавать устройство Пользователя. Содержимое такого файла может как относиться, так и не относиться к персональным данным, в зависимости от того, содержит ли такой файл персональные данные или содержит обезличенные технические данные.

3. Цель обработки персональных данных: анализ пользовательской активности с помощью сервиса «Яндекс.Метрика».

4. Категории субъектов персональных данных: все Пользователи Сайта, которые дали согласие на обработку файлов «cookie».

5. Способы обработки: сбор, запись, систематизация, накопление, хранение, уточнение (обновление, изменение), извлечение, использование, передача (доступ, предоставление), блокирование, удаление, уничтожение персональных данных.

6. Срок обработки и хранения: до получения от Субъекта персональных данных требования о прекращении обработки/отзыва согласия.

7. Способ отзыва: заявление об отзыве в письменном виде путём его направления на адрес электронной почты Оператора: info@rcsi.science или путем письменного обращения по юридическому адресу: 119991, г. Москва, Ленинский просп., д.32А

8. Субъект персональных данных вправе запретить своему оборудованию прием этих данных или ограничить прием этих данных. При отказе от получения таких данных или при ограничении приема данных некоторые функции Сайта могут работать некорректно. Субъект персональных данных обязуется сам настроить свое оборудование таким способом, чтобы оно обеспечивало адекватный его желаниям режим работы и уровень защиты данных файлов «cookie», Оператор не предоставляет технологических и правовых консультаций на темы подобного характера.

9. Порядок уничтожения персональных данных при достижении цели их обработки или при наступлении иных законных оснований определяется Оператором в соответствии с законодательством Российской Федерации.

10. Я согласен/согласна квалифицировать в качестве своей простой электронной подписи под настоящим Согласием и под Политикой обработки персональных данных выполнение мною следующего действия на сайте: https://journals.rcsi.science/ нажатие мною на интерфейсе с текстом: «Сайт использует сервис «Яндекс.Метрика» (который использует файлы «cookie») на элемент с текстом «Принять и продолжить».