Swarm Robots in Agriculture

Agricultural tractors have increased their powers by 3,300% in 100 years . This has resulted in an exponential increase in the field capacity of such machines . A comparison of costs and field capacity between a 270 kWtractor and a swarm of ten swarm tractors of 24 kW each was carried out.…

Adaptive Control for Flow and Volume Regulation in Multi Producer District Heating Systems

Flow and storage volume regulation is essential for the adequate transport and management of energy resources in district heating systems . In this paper, we propose a novel and suitably tailored — decentralized — adaptive controlscheme addressing this problem . We focus on a system configuration comprising multiple heatproducers, consumers and storage tanks exchanging energy through a commondistribution network, which are features of modern and prospective district heating installations .…

Nesterov Acceleration for Equality Constrained Convex Optimization via Continuously Differentiable Penalty Functions

We propose a framework to use Nesterov’s accelerated method for constrainedconvex optimization problems . Our approach consists of reformulating the original problem as an unconstrained optimization problem using a continuouslydifferentiable exact penalty function . This reformulation is based on replacing Lagrange multipliers in the augmented Lagrangian byLagrange multiplier functions .…

Chaotic Logistic Map Forecast using Fuzzy Time Series

This paper deals with the problem of forecast the Logistic Chaotic Map usingFuzzy Times Series (FTS) Chaotic Systems are very sensible to changes in itsparameters and in the initial conditions, turning them into hard systems to forecast . In this case, we relay in the robustness of Fuzzy TimeSeries to model and forecast the logistic map .…

Do e scooters fill mobility gaps and promote equity before and during COVID 19 A spatiotemporal analysis using open big data

The growing popularity of e-scooters and their rapid expansion across urbanstreets has attracted widespread attention . A major policy question is whethere-scooter substitute existing mobility options or fill the service gaps leftby them . A study addresses this question by analyzing the spatiotemporalpatterns of service availability and use in Washington DC, focusing on their spatial relationships with public transit and bikesharing .…

An ns 3 implementation of a battery less node for energy harvesting Internet of Things

In the Internet of Things (IoT) thousands of devices can be deployed to acquire data from the environment and provide service to several applications . In many cases, it is desirable that devices are self-sustainable in terms of energy . In this work, we propose an ns-3 model of a (super) capacitor, which can be used as the storage of the harvested energy in a battery-less IoT device .…

After 100 Years Can We Finally Crack Post s Problem of Tag A Story of Computational Irreducibility and More

Empirical, theoretical and historical aspects of Emil Post’s “problem of tag” from 2121 are explored . Evidence of strong computational irreducibility is found . All 10^25 smallest initial conditions are found to eventually halt, although sometimes in 6*10*10^11 steps . There is also discussion of the history ofEmil Post and of tag systems in the context of ideas about the foundations of mathematics and computation .…

Hardness of Token Swapping on Trees

Given a graph where every graph has exactly one labeled token, how can we most quickly execute a given permutation on the tokens? We prove that both of these problems remain NP-hard when the graph is restricted to be a tree .…

Explicit topology optimization through moving node approach beam elements recognition

Structural optimization (topology, shapes, sizing) is an important tool for facilitating the emergence of new concepts in structural design . This paper aims at presenting an adaptation of aflow-inspired approach so-called Moving Node Approach (MNA) in topologyoptimization . In this approach, the discretization is decoupled from thematerial distribution and the final objective is to recognize the best beamassembly while minimizing compliance .…

Compression of volume surface integral equation matrices via Tucker decomposition for magnetic resonance applications

In this work, we propose a method for the compression of the coupling matrix in volume\hyp surface integral equation (VSIE) formulations . VSIE methods are used for electromagnetic analysis in magnetic resonance imaging (MRI) applications . We demonstrated that our compression approaches can enable theuse of VSIE matrices of prohibitive memory requirements, by allowing theeffective use of modern graphical processing units (GPUs) to accelerate thearising matrix\hyp vector products .…

Polygon Universal Graphs

We study a fundamental question from graph drawing: given a pair of agraph $G$ and a cycle $C$ together with a simple polygon $P$ . We say that sucha drawing of $(G,C)$ respects $P$. We fully characterize those instances$(G)$ which are polygon-universal, that is .…

Geometric Approaches on Persistent Homology

We introduce several geometric notions, including thick-thin decompositions, to the theory of persistent homology . Theseideas provide geometric interpretations of persistence diagrams . As a case study, we analyze the power filtration onunweighted graphs . We provide explicit bounds for the life spans of homology classes in persistence diagrams in all dimensions .…

Learning Policies for Multilingual Training of Neural Machine Translation Systems

Low-resource Multilingual Neural Machine Translation (MNMT) is typically tasked with improving the translation performance on one or more language pairswith the aid of high-resource language pairs . In this paper, we propose twosimple search based curricula — orderings of the multilingual training data — which help improve translation performance in conjunction with existing techniques such as fine-tuning .…

Quantifying the Efficacy of Logic Locking Methods

The outsourced manufacturing of integrated circuits has increased the risk of intellectual property theft . Logic locking techniques have been developed for protecting designs by adding programmable elements to the circuit . These techniques differ significantly in both overhead and resistance, leaving designers unable to discern their efficacy .…

TAG Transformer Attack from Gradient

We have no systematic understanding of the gradient leakagemechanism on the Transformer based language models . We propose a gradient attack algorithm, TAG, to reconstruct the local training data . TAG can obtain up to 90$\%$ data by attacking gradients in CoLAdataset .…

On Medical Device Cybersecurity Compliance in EU

Medical device products at the European Union market must be safe and effective . Medical device manufacturers must comply to the new regulatory requirements brought by the Medical Device Regulation (MDR) and the IVDR . In this paper, we review the newcybersecurity requirements in the light of currently available guidancedocuments, and pinpoint four core concepts around which cybersecuritycompliance can be built .…

Mobile Access Control System Based on RFID Tags And Facial Information

RFID tags see a widespread use in modern security systems, including homeintercoms, access control cards, etc. Here we focus on access control systems . The proposed modelRFID tags are mounted near a turnstile or a smart door . Tag reading andprogramming is done via NFC chip directly on an Android or iOS mobile device, which allows for a significant price cut for such a system implementation .…

Practical Encrypted Computing for IoT Clients

Homomorphic Encryption enables offload processing of encrypted data . CHOCO uses 37% less energy than local (unencrypted) computation . With hardwaresupport, client-side encryption/decryption is faster by 1094x and uses 648xless energy . In our end-to-end implementation of a large-scale DNN (VGG16),CHOCO used 37% more energy than unencrypted computation .…

Differentially Private Query Release Through Adaptive Projection

We propose, implement, and evaluate a new algorithm for releasing answers to large numbers of statistical queries like $k$-way marginals . Our algorithm makes adaptive use of a continuousrelaxation of the Projection Mechanism, which answers queries on the privatedataset using simple perturbation, and then attempts to find the syntheticdataset that most closely matches the noisy answers .…

Scaling a Blockchain based Railway Control System Prototype for Mainline Railways a Progress Report

Railway operations require control systems to ensure safety and efficiency . Ablockchain-based approach has been proposed, with the intent to build a moreresilient, integrated and cost-efficient system . The developed blockchain-based architecture enables to run safety-relevant and security-focused business logic on off-the-shelf platforms such as cloud, rather than on specialized (and expensive) secure hardware .…

Towards Determining the Effect of Age and Educational Level on Cyber Hygiene

Poorcyber-hygiene among internet users is a critical issue undermining the general acceptance and adoption of internet technology . Virusattack, poor authentication technique, improper file backups have serious negative implications on the industries andorganisations, including educational institutions . The findings show wideadoption of internet in institution of higher learning, whereas, significantnumber of internet users do not have good cyber hygiene knowledge andbehaviour.…

Fair Mixup Fairness via Interpolation

Training classifiers under fairness constraints such as group fairness,regularizes disparities of predictions between the groups . But even though the constraints are satisfied during training, they might not generalize at evaluation time . To improve the generalizability of fairclassifiers, we propose fair mixup, a new data augmentation strategy for imposing the fairness constraint .…

Extracting candidate factors affecting long term trends of student abilities across subjects

Few studies have focused on long-term data on student achievement data . We propose novel approach to extract candidate factors affecting academic ability across subjects . The approach formulates a hypothesis and turns archivedachievement data into useful information . We then conducted evaluation experiments with data from five public elementary schools and four public junior high schools in Japan.…

Designing and Implementing e justice Systems An Information Systems Approach to Regional Trial Court Case Docket Management in Northern Mindanao Philippines

Computer-based information systems for case management are still at an early stage of adoption in many trial courts in the Philippines . One such case is the Regional Trial Court Branch 23 of Cagayan de OroCity in Northern Mindanao, Philippines. A project named Web-based Case DocketInformation System (WCDIS) has been designed and developed for the courtbranch.…

FRI Miner Fuzzy Rare Itemset Mining

Interesting itemset mining plays an important role in many real-life applications, such as market, e-commerce, finance, and medical treatment . The FRI-Miner algorithm significantly outperforms state-of-the-artalgorithms in terms of effectiveness (wr.r.t. different types of derivedpatterns) and efficiency (w.r . running time and memory usage) In some cases, infrequent or rare itemsets andrare association rules also play an important .…

Stochastic Package Queries in Probabilistic Databases

Many important decision problems correspond to selecting a package(bag of tuples in a database) that jointly satisfy a set of constraints while minimizing some overall cost function . In most real-world problems, the data is uncertain . We provide methods for specifying — via a SQLextension — and processing stochastic package queries (SPQs), in order to solve optimization problems over uncertain data, right where the data resides.…

Dynamic Database Embeddings with FoRWaRD

We study the problem of computing an embedding of the tuples of a relational database in a manner that is extensible to dynamic changes of the database . We show that FoRWaRD is comparable and sometimes superior to state-of-the-artembeddings in the static (traditional) setting, using a collection of downstream tasks of column prediction over geographical and biological domains .…