Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Item TypeItem Type
-
SubjectSubject
-
YearFrom:-To:
-
More FiltersMore FiltersSourceLanguage
Done
Filters
Reset
2,091
result(s) for
"Theory and Formal Methods"
Sort by:
Design of a robust active fuzzy parallel distributed compensation anti-vibration controller for a hand-glove system
by
Selamat, Hazlina
,
Fadzli Haniff, Mohamad
,
Rajabpour, Leila
in
Active control
,
Active vibration controller
,
Actuators
2021
Undesirable vibrations resulting from the use of vibrating hand-held tools decrease the tool performance and user productivity. In addition, prolonged exposure to the vibration can cause ergonomic injuries known as the hand-arm vibration syndrome (HVAS). Therefore, it is very important to design a vibration suppression mechanism that can isolate or suppress the vibration transmission to the users’ hands to protect them from HAVS. While viscoelastic materials in anti-vibration gloves are used as the passive control approach, an active vibration control has shown to be more effective but requires the use of sensors, actuators and controllers. In this paper, the design of a controller for an anti-vibration glove is presented. The aim is to keep the level of vibrations transferred from the tool to the hands within a healthy zone. The paper also describes the formulation of the hand-glove system’s mathematical model and the design of a fuzzy parallel distributed compensation (PDC) controller that can cater for different hand masses. The performances of the proposed controller are evaluated through simulations and the results are benchmarked with two other active vibration control techniques-proportional integral derivative (PID) controller and active force controller (AFC). The simulation results show a superior performance of the proposed controller over the benchmark controllers. The designed PDC controller is able to suppress the vibration transferred to the user’s hand 93% and 85% better than the PID controller and the AFC, respectively.
Journal Article
Survey on graph embeddings and their applications to machine learning problems on graphs
by
Subelj, Lovro
,
Nikitinsky, Nikita
,
Makarov, Ilya
in
Algorithms
,
Artificial Intelligence
,
Classification
2021
Dealing with relational data always required significant computational resources, domain expertise and task-dependent feature engineering to incorporate structural information into a predictive model. Nowadays, a family of automated graph feature engineering techniques has been proposed in different streams of literature. So-called graph embeddings provide a powerful tool to construct vectorized feature spaces for graphs and their components, such as nodes, edges and subgraphs under preserving inner graph properties. Using the constructed feature spaces, many machine learning problems on graphs can be solved via standard frameworks suitable for vectorized feature representation. Our survey aims to describe the core concepts of graph embeddings and provide several taxonomies for their description. First, we start with the methodological approach and extract three types of graph embedding models based on matrix factorization, random-walks and deep learning approaches. Next, we describe how different types of networks impact the ability of models to incorporate structural and attributed data into a unified embedding. Going further, we perform a thorough evaluation of graph embedding applications to machine learning problems on graphs, among which are node classification, link prediction, clustering, visualization, compression, and a family of the whole graph embedding algorithms suitable for graph classification, similarity and alignment problems. Finally, we overview the existing applications of graph embeddings to computer science domains, formulate open problems and provide experiment results, explaining how different networks properties result in graph embeddings quality in the four classic machine learning problems on graphs, such as node classification, link prediction, clustering and graph visualization. As a result, our survey covers a new rapidly growing field of network feature engineering, presents an in-depth analysis of models based on network types, and overviews a wide range of applications to machine learning problems on graphs.
Journal Article
Researching COVID-19 tracing app acceptance: incorporating theory from the technological acceptance model
by
Cabrera-Sanchez, Juan-Pedro
,
Velicia-Martin, Felix
,
Gil-Cordero, Eloy
in
Analysis
,
Applications programs
,
Contact potentials
2021
The expansion of the coronavirus pandemic and the extraordinary confinement measures imposed by governments have caused an unprecedented intense and rapid contraction of the global economy. In order to revive the economy, people must be able to move safely, which means that governments must be able to quickly detect positive cases and track their potential contacts. Different alternatives have been suggested for carrying out this tracking process, one of which uses a mobile APP which has already been shown to be an effective method in some countries.
Use an extended Technology Acceptance Model (TAM) model to investigate whether citizens would be willing to accept and adopt a mobile application that indicates if they have been in contact with people infected with COVID-19. Research Methodology: A survey method was used and the information from 482 of these questionnaires was analyzed using Partial Least Squares-Structural Equation Modelling.
The results show that the Intention to Use this app would be determined by the Perceived Utility of the app and that any user apprehension about possible loss of privacy would not be a significant handicap. When having to choose between health and privacy, users choose health.
This study shows that the extended TAM model which was used has a high explanatory power. Users believe that the APP is useful (especially users who studied in higher education), that it is easy to use, and that it is not a cause of concern for privacy. The highest acceptance of the app is found in over 35 years old's, which is the group that is most aware of the possibility of being affected by COVID-19. The information is unbelievably valuable for developers and governments as users would be willing to use the APP.
Journal Article
Proposal for an objective binary benchmarking framework that validates each other for comparing MCDM methods through data analytics
by
Parlakkaya, Raif
,
Baydaş, Mahmut
,
Stević, Željko
in
Benchmarks
,
Comparative analysis
,
Data analytics
2023
When it comes to choosing the best option among multiple alternatives with criteria of different importance, it makes sense to use multi criteria decision making (MCDM) methods with more than 200 variations. However, because the algorithms of MCDM methods are different, they do not always produce the same best option or the same hierarchical ranking. At this point, it is important how and according to which MCDM methods will be compared, and the lack of an objective evaluation framework still continues. The mathematical robustness of the computational procedures, which are the inputs of MCDM methods, is of course important. But their output dimensions, such as their capacity to generate well-established real-life relationships and rank reversal (RR) performance, must also be taken into account. In this study, we propose for the first time two criteria that confirm each other. For this purpose, the financial performance (FP) of 140 listed manufacturing companies was calculated using nine different MCDM methods integrated with step-wise weight assessment ratio analysis (SWARA). İn the next stage, the statistical relationship between the MCDM-based FP final results and the simultaneous stock returns of the same companies in the stock market was compared. Finally, for the first time, the RR performance of MCDM methods was revealed with a statistical procedure proposed in this study. According to the findings obtained entirely through data analytics, Faire Un Choix Adéquat (FUCA) and (which is a fairly new method) the compromise ranking of alternatives from distance to ideal solution (CRADIS) were determined as the most appropriate methods by the joint agreement of both criteria.
Journal Article
Faster numeric static analyses with unconstrained variable oracles
by
Arceri, Vincenzo
,
Bianchi, Filippo
,
Dolcetti, Greta
in
Abstract compilation
,
Abstract interpretation
,
Static analysis
2025
In the context of static analysis based on abstract interpretation, we propose a lightweight pre-analysis step which is meant to suggest, at each program point, which program variables are likely to be unconstrained for a specific class of numeric abstract properties. Using the outcome of this pre-analysis step as an oracle, we simplify the statements of the program being analyzed by propagating this lack of information, aiming at fine-tuning the precision/efficiency trade-off of the target static analysis. A thorough experimental evaluation considering real world programs shows that the idea underlying the approach is promising. We first discuss and evaluate several variants of the pre-analysis step, measuring their accuracy at predicting unconstrained variables, so as to identify the most effective ones. Then we evaluate how these pre-analyses affect the target static analysis, showing that they can improve the efficiency of the more costly analysis while having a limited effect on its precision.
Journal Article
A measurement framework to assess software maturity models
by
Mahmood, Sajjad
,
Alshayeb, Mohammad
,
Niazi, Mahmood
in
A measurement framework
,
Analysis
,
Security and Privacy
2025
Software maturity models can be utilized by organizations to evaluate and enhance their development processes. Established and recognized models such as the Capability Maturity Model Integrated (CMMI) and ISO/IEC 15504 (Software Process Improvement and Capability Determination (SPICE)) have proven their value. However, many new software maturity models exist, and their quality and potential value remain questionable until they are properly assessed before adoption. Without such an assessment, organizations can implement poor or ineffective models, resulting in wasted resources and failed improvement initiatives. Our research aims to address this challenge by developing a measurement framework based on ISO/IEC 15504-3 standards to assess the quality of developed software maturity models. We derived our quality assessment criteria through literature analysis, analyzing four main categories: basic model information, structural design, assessment methods, and implementation support. After developing this framework, we validated it with expert reviews to assess its design and usability and through a series of case studies. Feedback from academics and industry practitioners confirmed the framework’s utility, especially recognizing its clear structure and comprehensiveness of evaluation criteria. Case studies also revealed the framework’s effectiveness in identifying strengths and areas of improvement, finding that evaluated models had quality scores ranging from 83.3% to 93.2%. Our study enhances software maturity models’ practical utility and adoption across different software contexts, providing professionals and academics with a structured way to evaluate and enhance maturity models.
Journal Article
Symbolic model checking quantum circuits in Maude
2024
This article presents a symbolic approach to model checking quantum circuits using a set of laws from quantum mechanics and basic matrix operations with Dirac notation. We use Maude, a high-level specification/programming language based on rewriting logic, to implement our symbolic approach. As case studies, we use the approach to formally specify several quantum communication protocols in the early work of quantum communication and formally verify their correctness: Superdense Coding, Quantum Teleportation, Quantum Secret Sharing, Entanglement Swapping, Quantum Gate Teleportation, Two Mirror-image Teleportation, and Quantum Network Coding. We demonstrate that our approach/implementation can be a first step toward a general framework to formally specify and verify quantum circuits in Maude. The proposed way to formally specify a quantum circuit makes it possible to describe the quantum circuit in Maude such that the formal specification can be regarded as a series of quantum gate/measurement applications. Once a quantum circuit has been formally specified in the proposed way together with an initial state and a desired property expressed in linear temporal logic (LTL), the proposed model checking technique utilizes a built-in Maude LTL model checker to automatically conduct formal verification that the quantum circuit enjoys the property starting from the initial state.
Journal Article
MPV: a density-peak-based method for automated cluster number detection
2025
Unsupervised clustering algorithms have been extensively applied in various research fields. In cluster analysis, determining the best cluster number k is significant. At present, many cluster validity indices (CVIs) have been proposed, including the Calinski-Harabaz index, silhouette index, and Dunn index. However, these CVIs are not effective in determining k for ring, semi-ring, and manifold data sets. We propose MPV (minimum distance and peak variation), a density-peak-based method for automated k detection. It constructs a separation measure through a dual mechanism: (1) distances between density peaks and (2) minimum distances between clusters, while using the maximum intra-cluster minimum distance to model compactness. The optimal for ring, semi-ring, and flow datasets is determined by detecting the largest change in the separation measure sequence. Experiments on 28 synthetic and real-world datasets demonstrate MPV’s accuracy in determining k for complex structures.
Journal Article
Risk assessment based on a new decision-making approach with fermatean fuzzy sets
by
Biderci, Hilal
,
Guneri, Ali F.
in
Algorithms and Analysis of Algorithms
,
Analytic hierarchy process (AHP)
,
Artificial Intelligence
2025
This study presents a new approach to decision-making based on the selection of decision-makers according to evaluated criteria in multi-criteria decision-making (MCDM) methods. Therefore, sub-decision-maker groups (SDMGs) are created for each evaluated criterion. The SDMG approach, which is created according to the criteria, offers a more flexible and dynamic structure than the existing approaches. This approach aims to use the expertise and knowledge of decision-makers more effectively. The decision-making approach presented in this study offers an innovative model and adds a new dimension to decision-making processes. This decision-making approach is applied to the plastic injection moulding machine risk assessment, as it involves different criteria. In addition to classical risk parameters such as probability, severity, frequency, and detectability, new parameters such as human error, machine error, and existing safety measures are also used in the risk assessment.
The integration of the analytic hierarchy process (AHP) and the technique for order preference by similarity to ideal solution (TOPSIS) methods into the interval valued fermatean fuzzy set (IVFFS) environment makes an important contribution to a more comprehensive consideration of risks and uncertainties in the risk assessment process. The IVFF-AHP method is used to weight the risk parameters and determine the hazard scores, and the TOPSIS method is used to rank the hazards. A holistic and systematic approach to risk assessment has been achieved by integrating these two methods. Modelling of these methods is carried out using MATLAB_R2024a software.
According to the evaluated criteria, it was concluded that the determination of the decision makers separately is applicable to the decision-making process. Identifying the existing safety measures parameter as the most important risk parameter emphasizes the central role of this factor in risk assessment. In addition, machine error and human error parameters are also found to be important in risk assessment. These parameters, which are used for the first time in the literature, offer a broader perspective than traditional methods and provide significant advantages in risk assessment. According to the evaluations, electricity, asphyxiating and toxic gases, and hot water use are determined as the most risky hazards. The sensitivity and comparative analysis performed in the study confirm that the proposed methodology produces consistent and reasonable results.
Journal Article
An efficient gradient-based algorithm with descent direction for unconstrained optimization with applications to image restoration and robotic motion control
by
Malik, Maulana
,
Ibrahim, Sulaiman Mohammed
,
Khalid, Ruzelan
in
Algorithms
,
Algorithms and Analysis of Algorithms
,
Computer science
2025
This study presents a novel gradient-based algorithm designed to enhance the performance of optimization models, particularly in computer science applications such as image restoration and robotic motion control. The proposed algorithm introduces a modified conjugate gradient (CG) method, ensuring the CG coefficient, β κ, remains integral to the search direction, thereby maintaining the descent property under appropriate line search conditions. Leveraging the strong Wolfe conditions and assuming Lipschitz continuity, we establish the global convergence of the algorithm. Computational experiments demonstrate the algorithm’s superior performance across a range of test problems, including its ability to restore corrupted images with high precision and effectively manage motion control in a 3DOF robotic arm model. These results underscore the algorithm’s potential in addressing key challenges in image processing and robotics.
Journal Article