Search results

Filters

  • Journals
  • Authors
  • Keywords
  • Date
  • Type

Search results

Number of results: 7
items per page: 25 50 75
Sort by:
Download PDF Download RIS Download Bibtex

Abstract

This paper presents the results of diagnostic examinations conducted on the coils of super-heaters made of 10CrMo9‒10 steel that were operated in industrial conditions at 480°C for 130 thousand hours. The tube was exposed in a coal-fired boiler. The chemical and phase composition of the oxide/deposit layers formed on both sides of the tube walls (outside – flue-gas side and inside – steam side) and their sequence was examined using optical microscopy, scanning electron microscopy with electron backscatter diffraction and energy-dispersive X-ray spectroscopy, and X-ray diffraction. The changes in the mechanical properties caused by corrosion and aging processes were concluded from the hardness measurements. In addition, the nature of cracks in the oxide layers caused by pressing a Vickers indenter was determined. The results of these examinations have shown a high degradation of steel on the flue-gas inflow side and identified the main corrosion products and mechanisms.
Go to article

Bibliography

  1.  S. Frangini, A. Masci, and F. Zaza, “Molten salt synthesis of perovskite conversion coatings: A novel approach for corrosion protection of stainless steels in molten carbonate fuel cells,” Corros. Sci. vol. 53, no. 8, pp. 2539–2548, 2011, doi: 10.1016/j.corsci.2011.04.011.
  2.  M. Gwoździk, “Analysis of crystallite size changes in an oxide layer formed on steel used in the power industry”, Acta Phys. Pol. A. vol. 130, no. 4, pp. 935–938, 2016, doi: 10.12693/APhysPolA.130.935.
  3.  M. Gwoździk and Z. Nitkiewicz, “Texturing of magnetite forming during long-term operation of a pipeline of 10CrMo9‒10 steel,” Solid State Phenomena, vol. 203‒204, pp. 121–124, 2013, doi: 10.4028/www.scientific.net/SSP.203-204.121.
  4.  J. Priss, H. Rojacz, I. Klevtsov, A. Dedov, H. Winkelmann, and E. Badisch, “High temperature corrosion of boiler steels in hydrochloric atmosphere under oil shale ashes,” Corros. Sci. vol. 82, pp. 36–44, 2014, doi: 10.1016/j.corsci.2013.12.016.
  5.  J. Lehmusto, P. Yrjas, and L. Hupa, “Pre-oxidation as a means to increase corrosion resistance of commercial superheater steels,” Oxid Met, vol. 91, pp. 311–326, 2019, doi: 10.1007/s11085-019-09898-x.
  6.  X. Montero and M.C. Galetz, “Effect of different vanadate salt composition on oil ash corrosion of boilers,” Oxid Met, vol. 89, pp. 395–414, 2018, doi: 10.1007/s11085-017-9795-4.
  7.  J. Lehmusto, D. Lindberg, P. Yrjas, and L. Hupa, “The effect of temperature on the formation of oxide scales regarding commercial superheater steels. Oxid Met, vol. 89, pp. 251–278, 2018, doi: 10.1007/s11085-017-9785-6.
  8.  M. Gwoździk and Z. Nitkiewicz, “Studies on the adhesion of oxide layer formed on X10CrMoVNb9‒1 steel,” Arch. Civ. Mech. Eng., vol. 14, pp. 335–341, 2014, doi: 10.1016/j.acme.2013.10.005.
  9.  P. Gawron and S. Danisz, “Dostosowanie zakresu badań diagnostycznych wybranych elementów kotłów pracujących w warunkach współspalania biomasy,” Energetyka, vol. 702, pp. 843–853, 2012 [in Polish].
  10.  F. Klepacki and D. Wywrot, “Trwałość wężownicprzegrzewaczy wtórnych w warunkach niskoemisyjnego spalania,” 12th Informative and Training Symposium: Maintenance of Thermo-Mechanical Power Equipment. Upgrading power equipment to extend its operating period beyond 300 000 hours. Wisła, Poland 2010, pp. 29–35 [in Polish].
  11.  J. Cheng, Y.P. Wu, L.Y. Chen, S. Hong, L. Qiao, and Z. Wei, “Hot corrosion behavior and mechanism of highvelocity arc-sprayed Ni-Cr alloy coatings,” J. Therm. Spray Technol., vol. 28, no. 6, pp. 1263–1274, 2019, doi: 10.1007/s11666-019-00890-0.
  12.  A.K. Pramanick, G. Das, and S.K. Das, “Ghosh Failure investigation of super heater tubes of coalfired power plant,” Case Stud. Eng. Fail. Anal., vol. 9, pp. 17–26, 2017, doi: 10.1016/j.csefa.2017.06.001.
  13.  M. Gwoździk, S. Kulesza, M. Bramowicz, “Application of the fractal geometry methods for analysis of oxide layer”. 26th International Conference on Metallurgy and Materials (METAL 2017), Brno, Czech Republic, 2017, pp. 789- 794.
  14.  P. Monivarman, V.A. Nagarajan, and F.M. Raj, “Mechanical and morphological characterization of discarded fishnet/glass fiber reinforced polyester composite,” Bull. Pol. Acad. Sci. Tech. Sci., vol. 68, no. 6, pp. 1385–1391, 2020, doi: 10.24425/bpasts.2020.134646.
  15.  J. Iwaszko, “Laser surface remelting of powder metallurgy high-speed steel,” Bull. Pol. Acad. Sci. Tech. Sci., vol. 68, no. 6, pp. 1425–1432, 2020, doi: 10.24425/bpasts.2020.135385.
  16.  C. Bhargava, J. Aggarwal, and P.K. Sharma, “Residual life estimation of fabricated humidity sensors using different artificial intelligence techniques,” Bull. Pol. Acad. Sci. Tech. Sci., vol. 67, no. 1, pp. 147–154, 2019, doi: 10.24425/bpas.2019.127344.
  17.  M. Gwoździk, M. Motylenko, and D. Rafaja, “Microstructure changes responsible for the degradation of the 10CrMo9‒10 and 13CrMo4‒5 steels during long-term operation,” Mater. Res. Express, vol. 7, no. 1, p. 016515, 2020, doi: 10.1088/2053-1591/ab5fc8.
  18.  C. Hao, F.M. Deng, Z.H. Guo, X. Bo, S. Wang, and X. Zhao, “Fractal dimension of decobalt surface on PDC with different acid corrosion reagents at room temperature,” Diam. Relat. Mat., vol. 105, p. 107699, 2020, doi: 10.1016/j.diamond.2020.107699.
  19.  F.M. Mwema, E.T. Akinlabi, and O.P. Oladijo, “Effect of substrate type on the fractal characteristics of AFM images of sputtered aluminium thin films,” Mater. Sci.-Medzg., vol. 26, pp. 49–57, 2020, doi: 10.5755/j01.ms.26.1.22769.
  20.  H. Aminirastabi, H. Xue, V.V. Miti´c, G. Lazovi´c, G. Ji, and D. Peng, “Novel fractal analysis of nanograin growth in BaTiO3 thin film,” Mater Chem Phys, vol. 239, p. 122261, 2020, doi: 10.1016/j.matchemphys.2019.122261.
  21.  W.P. Dong, P.J. Sullivan, and K.J. Stout, “Comprehensive study of parameters for characterizing 3-dimensional surface-topography. 4. Parameters for characterizing spatial and hybrid properties,” Wear, vol. 178, no. 1–2, pp. 45–60, 1994, doi: 10.1016/0043-1648(94)90128- 7.
  22.  T.R. Thomas, B.-G. Rosén, and N. Amini, “Fractal characterisation of the anisotropy of rough surfaces,” Wear, vol. 232, no. 1, pp. 41–50, 1999, doi: 10.1016/S0043-1648(99)00128-3.
  23.  R.X. Fischer et al., “A new mineral from the Bellerberg, Eifel, Germany, intermediate between mullite and sillimanite,” Am. Miner., vol. 100, pp. 1493–1501, 2015, doi: 10.2138/am-2015-4966.
  24.  Z. Liang, M. Yu, and Q. Zhao, “Investigation of fireside corrosion of austenitic heat-resistant steel 10Cr18Ni9Cu3NbN in ultra-supercritical power plants,” Eng. Fail. Anal., vol. 100, pp. 180–191, 2019, doi: 10.1016/j.engfailanal.2019.02.048.
  25.  M.F. Ashby and D.R.H. Jones, Engineering Materials 1 An Introduction to Properties, Applications and Design, Elsevier, 2012.
  26.  J. Fernández, F. González, C. Pesquera, A. Neves Junior, M Mendes Viana and J. Dweck, “Qualitative and quantitative characterization of a coal power plant waste by TG/DSC/MS, XRF and XRD,” J. Therm. Anal. Calorim., vol. 125, no. 2, pp. 703–710, 2016, doi: 10.1007/ s10973-016-5270-8.
  27.  P. Viklund, A. Hjörnhede, P. Henderson, A. Stålenheim, and R. Pettersson, “Corrosion of superheater materials in a waste-to-energy plant,” Fuel Process. Technol., vol. 105, pp. 106–112, 2013, doi: 10.1016/j.fuproc.2011.06.017.
  28.  Y. Wang, J. Jin, D. Liu, H. Yang, and X. Kou, “Understanding ash deposition for Zhundong coal combustion in 330 MW utility boiler: focusing on surface temperature effects,” Fuel, vol. 216, pp. 697–706, 2018, doi: 10.1016/j.fuel.2017.08.112.
  29.  Y. Xie, W. Xie, W-P. Pan, A. Riga, and K. Anderson, “A study of ash deposits on the heat exchange tubes using SDT/MS and XRD techniques,” Thermochim. Acta, vol. 324, pp. 123–133, 1998, doi: 10.1016/S0040-6031(98)00529-2.
  30.  P.J. Ennis and W.J. Quadakkers, “Mechanisms of steam oxidation in high strength martensitic steels,” Int. J. Pressure Vessels Pip., vol. 84, pp. 75–81, 2007, doi: 10.1016/j.ijpvp.2006.09.007.
  31.  R. Abang, A. Findeisen, and H.J. Krautz, “Corrosion behaviour of selected Power plant materials under oxyfuel combustion conditions,” Górnictwo i Geoinżynieria, vol. 35, no. 3/1, pp. 23–42, 2011.
  32.  T. Aleksandrov Fabijanic’, D. Ćorić, M. Šnajdar Musa, and M. Sakoman, “Vickers Indentation Fracture Toughness of Near-Nano and Nanostructured WC-Co Cemented Carbides,” Metals, vol. 7, 143, 2017, doi: 10.3390/met7040143.
  33.  M. Gwoździk and Z. Nitkiewicz, “Scratch resistance characteristic of oxide layer formed on P91 steel,” Inżynieria Materiałowa, vol. 182, no. 4, pp. 435–438, 2011.
Go to article

Authors and Affiliations

Monika Gwoździk
1
Christiane Ullrich
2
Christian Schimpf
2
David Rafaja
2
Sławomir Kulesza
3
Mirosław Bramowicz
3

  1. Czestochowa University of Technology, ul. Dabrowskiego 69, 42-201 Czestochowa, Poland
  2. TU Bergakademie Freiberg, Akademiestraße 6, 09599 Freiberg, Germany
  3. University of Warmia and Mazury in Olsztyn, ul. Michała Oczapowskiego 2, 10-719 Olsztyn, Poland
Download PDF Download RIS Download Bibtex

Abstract

User authentication is an essential element of any communication system. The paper investigates the vulnerability of the recently published first semiquantum identity authentication protocol (Quantum Information Processing 18: 197, 2019) to the introduced herein multisession attacks. The impersonation of the legitimate parties by a proper combination of phishing techniques is demonstrated. The improved version that closes the identified loophole is also introduced
Go to article

Bibliography

  1.  M.M. Wilde, Quantum Information Theory. Cambridge University Press, 2013, doi: 10.1017/CBO9781139525343.
  2.  S. Wiesner, “Conjugate coding,” SIGACT News, vol. 15, no. 1, pp. 78–88, 1983, doi: 10.1145/1008908.1008920.
  3.  P. Benioff, “The computer as a physical system: A microscopic quantum mechanical Hamiltonian model of computers as represented by Turing machines,” J. Stat. Phys., vol. 22, no. 5, pp. 563–591, 1980, doi: 10.1007/BF01011339.
  4.  C.H. Bennett and G. Brassard, “Quantum cryptography: Public key distribution and coin tossing,” in Proceedings of International Conference on Computers, Systems and Signal Processing, Bangalore, India, 1984, pp. 175–179.
  5.  C.H. Bennett and G. Brassard, “Quantum cryptography: Public key distribution and coin tossing,” Theor. Comput. Sci., vol. 560, pp. 7–11, 2014, doi: 10.1016/j.tcs.2014.05.025.
  6.  P.W. Shor, “Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer,” SIAM J. Comput., vol. 26, no. 5, pp. 1484–1509, 1997, doi: 10.1137/S0097539795293172.
  7.  A. Shenoy-Hejamadi, A. Pathak, and S. Radhakrishna, “Quantum cryptography: Key distribution and beyond,” Quanta, vol. 6, no. 1, pp. 1–47, 2017, doi: 10.12743/quanta.v6i1.57.
  8.  F. Xu, X. Ma, Q. Zhang, H.-K. Lo, and J.-W. Pan, “Secure quantum key distribution with realistic devices,” Rev. Mod. Phys., vol. 92, p. 025002, 2020, doi: 10.1103/RevModPhys.92.025002.
  9.  D. Pan, K. Li, D. Ruan, S.X. Ng, and L. Hanzo, “Singlephoton- memory two-step quantum secure direct communication relying on Einstein-Podolsky-Rosen pairs,” IEEE Access, vol. 8, pp. 121 146–121 161, 2020, doi: 10.1109/ACCESS.2020.3006136.
  10.  P. Zawadzki, “Advances in quantum secure direct communication,” IET Quant. Comm., vol. 2, no. 2, pp. 54–62, 2021, doi: 10.1049/ qtc2.12009.
  11.  A. Pljonkin and P.K. Singh, “The review of the commercial quantum key distribution system,” in 2018 Fifth International Conference on Parallel, Distributed and Grid Computing (PDGC), 2018, pp. 795–799, doi: 10.1109/PDGC.2018.8745822.
  12.  R. Qi, Z. Sun, Z. Lin, P. Niu, W. Hao, L. Song, Q. Huang, J. Gao, L. Yin, and G. Long, “Implementation and security analysis of practical quantum secure direct communication,” vol. 8, p. 22, 2019, doi: 10.1038/s41377-019-0132-3.
  13.  X. Li and D. Zhang, “Quantum authentication protocol using entangled states,” in Proceedings of the 5th WSEAS International Conference on Applied Computer Science, Hangzhou, China, 2006, pp. 1004–1009. [Online]. Available: https://www.researchgate.net/ publication/242080451_Quantum_authentication_protocol_using_entangled_states.
  14.  G. Zeng and W. Zhang, “Identity verification in quantum key distribution,” Phys. Rev. A, vol. 61, p. 022303, 2000, doi: 10.1103/ PhysRevA.61.022303.
  15.  Y. Kanamori, S.-M. Yoo, D.A. Gregory, and F.T. Sheldon, “On quantum authentication protocols,” in GLOBECOM ’05. IEEE Global Telecommunications Conference, 2005., vol. 3, 2005, pp. 1650–1654, doi: 10.1109/GLOCOM.2005.1577930.
  16.  P. Zawadzki, “Quantum identity authentication without entanglement,” Quantum Inf. Process., vol. 18, no. 1, p. 7, 2019, doi: 10.1007/ s11128-018-2124-2.
  17.  M. Boyer, D. Kenigsberg, and T. Mor, “Quantum key distribution with classical Bob,” Phys. Rev. Lett., vol. 99, p. 140501, 2007, doi: 10.1103/PhysRevLett.99.140501.
  18.  M. Boyer, R. Gelles, D. Kenigsberg, and T. Mor, “Semiquantum key distribution,” Phys. Rev. A, vol. 79, no. 3, p. 032341, 2009, doi: 10.1103/PhysRevA.79.032341.
  19.  W.O. Krawec, “Security of a semi-quantum protocol where reflections contribute to the secret key,” Quantum Inf. Process., vol. 15, no. 5, pp. 2067–2090, 2016, doi: 10.1007/s11128-016-1266-3.
  20.  Z.-R. Liu and T. Hwang, “Mediated semi-quantum key distribution without invoking quantum measurement,” Ann. Phys., vol. 530, no. 4, p. 1700206, 2018, doi: 10.1002/andp.201700206.
  21.  C.-W. Tsai and C.-W. Yang, “Cryptanalysis and improvement of the semi-quantum key distribution robust against combined collective noise,” Int. J. Theor. Phys., vol. 58, no. 7, pp. 2244–2250, 2019, doi: 10.1007/s10773-019-04116-5.
  22.  W.O. Krawec, “Security proof of a semi-quantum key distribution protocol,” in 2015 IEEE International Symposium on Information Theory (ISIT), 2015, pp. 686–690, doi: 10.1109/ISIT.2015.7282542.
  23.  Y.-P. Luo and T. Hwang, “Authenticated semi-quantum direct communication protocols using Bell states,” Quantum Inf. Process., vol. 15, no. 2, pp. 947–958, 2016, doi: 10.1007/s11128-015-1182-y.
  24.  J. Gu, P.-h. Lin, and T. Hwang, “Double C-NOT attack and counterattack on ‘Three-step semi-quantum secure direct communication protocol’,” Quantum Inf. Process., vol. 17, no. 7, p. 182, 2018, doi: 10.1007/s11128-018-1953-3.
  25.  M.-H. Zhang, H.-F. Li, Z.-Q. Xia, X.-Y. Feng, and J.-Y. Peng, “Semiquantum secure direct communication using EPR pairs,” Quantum Inf. Process., vol. 16, no. 5, p. 117, 2017, doi: 10.1007/s11128-017-1573-3.
  26.  L.-L. Yan, Y.-H. Sun, Y. Chang, S.-B. Zhang, G.-G. Wan, and Z.-W. Sheng, “Semi-quantum protocol for deterministic secure quantum communication using Bell states,” Quantum Inf. Process., vol. 17, no. 11, p. 315, 2018, doi: 10.1007/s11128-018-2086-4.
  27.  C. Xie, L. Li, and D. Qiu, “A novel semi-quantum secret sharing scheme of specific bits,” Int. J. Theor. Phys., vol. 54, no. 10, pp. 3819– 3824, 2015, doi: 10.1007/s10773-015-2622-2.
  28.  A. Yin and F. Fu, “Eavesdropping on semi-quantum secret sharing scheme of specific bits,” Int. J. Theor. Phys., vol. 55, no. 9, pp. 4027– 4035, 2016, doi: 10.1007/s10773-016-3031-x.
  29.  K.-F. Yu, J. Gu, T. Hwang, and P. Gope, “Multi-party semi-quantum key distribution-convertible multi-party semi- quantum secret sharing,” Quantum Inf. Process., vol. 16, no. 8, p. 194, 2017, doi: 10.1007/s11128-017-1631-x.
  30.  X. Gao, S. Zhang, and Y. Chang, “Cryptanalysis and improvement of the semi-quantum secret sharing protocol,” Int. J. Theor. Phys., vol. 56, no. 8, pp. 2512–2520, 2017, doi: 10.1007/s10773-017-3404-9.
  31.  Z. Li, Q. Li, C. Liu, Y. Peng, W. H. Chan, and L. Li, “Limited resource semiquantum secret sharing,” Quantum Inf. Process., vol. 17, no. 10, p. 285, 2018, doi: 10.1007/s11128-018-2058-8.
  32.  K. Sutradhar and H. Om, “Efficient quantum secret sharing without a trusted player,” Quantum Inf. Process., vol. 19, no. 2, p. 73, 2020, doi: 10.1007/s11128-019-2571-4.
  33.  H. Iqbal and W.O. Krawec, “Semi-quantum cryptography,” Quantum Inf. Process., vol. 19, no. 3, p. 97, 2020, doi: 10.1007/s11128-020- 2595-9.
  34.  N.-R. Zhou, K.-N. Zhu, W. Bi, and L.-H. Gong, “Semi-quantum identification,” Quantum Inf. Process., vol. 18, no. 6, p. 197, 2019, doi: 10.1007/s11128-019-2308-4.
  35.  K. Moriarty, B. Kaliski, and A. Rusch, “Pkcs #5: Password-based cryptography specification version 2.1,” Internet Requests for Comments, RFC Editor, RFC 8018, January 2017. [Online]. Available: https://www.rfc-editor.org/rfc/rfc8018.html.
  36.  A. Biryukov, D. Dinu, D. Khovratovich, and S. Josefsson, “The memory-hard Argon2 password hash and proof-of-work function,” Working Draft, IETF Secretariat, Internet-Draft draft-irtf-cfrg-argon2-12, 2020. [Online]. Available: https://tools.ietf.org/id/draft-irtf-cfrg-argon2-03. html.
  37.  P.-H. Lin, T. Hwang, and C.-W. Tsai, “Double CNOT attack on ‘Quantum key distribution with limited classical Bob’,” Int. J. Quantum Inf., vol. 17, no. 02, p. 1975001, 2019, doi: 10.1142/S0219749919750017.
  38.  D. Moody, L. Chen, S. Jordan, Y.-K. Liu, D. Smith, R. Perlner, and R. Peralta, “Nist report on post-quantum cryptography,” National Institute of Standards and Technology, U.S. Department of Commerce, Tech. Rep., 2016, doi: 10.6028/NIST.IR.8105.
  39.  P. Wang, S. Tian, Z. Sun, and N. Xie, “Quantum algorithms for hash preimage attacks,” Quantum Eng., vol. 2, no. 2, p. e36, 2020, doi: 10.1002/que2.36.
Go to article

Authors and Affiliations

Piotr Zawadzki
1
ORCID: ORCID

  1. Department of Telecommunications and Teleinformatics, Silesian University of Technology, ul. Akademicka 2A, 44-100 Gliwice, Poland
Download PDF Download RIS Download Bibtex

Abstract

The continuing efforts for reduction of the torque and flux ripples using Finite Set Model Predictive Direct Torque Control methods (FS-MPDTC) have been currently drowning a great attention from the academic communities and industrial applications in the field of electrical drives. The major problem of high torque and flux ripples refers to the consideration of just one active voltage vector at the whole control period. Implementation of two or more voltage vectors at each sampling time has recently been adopted as one of the practical techniques to reduce both the torque and flux ripples. Apart from the calculating challenge of the effort control, the parameter dependency and complexity of the duty ratio relationships lead to reduction of the system robustness. those are two outstanding drawbacks of these methods. In this paper, a finite set of the voltage vectors with a finite set of duty cycles are employed to implement the FS-MPDTC of induction motor. Based on so-called Discrete Duty Cycle- based FS-MPDTC (DDC-FS-MPDTC), a base duty ratio is firstly determined based on the equivalent reference voltage. This duty ratio is certainly calculated using the command values of the control system, while the motor parameters are not used in this algorithm. Then, two sets of duty ratios with limit members are constructed for two adjacent active voltage vectors supposed to apply at each control period. Finally, the prediction and the cost function evaluation are performed for all of the preselected voltage vectors and duty ratios. However, the prediction and the optimization operations are performed for only 12 states of inverter. Meanwhile, time consuming calculations related to SVM has been eliminated. So, the robustness and complexity of the control system have been respectively decreased and increased, and both the flux and torque ripples are reduced in all speed ranges. The simulation results have verified the damping performance of the proposed method to reduce the ripples of both the torque and flux, and accordingly the experimental results have strongly validated the aforementioned statement.
Go to article

Bibliography

  1.  J.P. Wach, “Maximum Torque Control of 3-phase induction motor drives,” Bull. Pol. Acad. Sci. Tech. Sci., vol. 67, no. 2, pp. 433–445, 2018.
  2.  A. Sikorski, K. Kulikowski, and M. Korzeniewski, “Modern Direct Torque and Flux Control methods of an induction machine supplied by three-level inverter,” Bull. Pol. Acad. Sci. Tech. Sci., vol. 61, no. 4, pp. 771–778, 2013.
  3.  D. Stando and M.P. Kazmierkowski, “Constant switching frequency predictive control scheme for three-level inverter-fed sensorless induction motor drive,” Bull. Pol. Acad. Sci. Tech. Sci., vol. 68, no. 5, pp. 1057–1068, 2020.
  4.  V. Talavat, S. Galvani, and M. Hajibeigy, “Direct predictive control of asynchronous machine torque using matrix converter,” Bull. Pol. Acad. Sci. Tech. Sci., vol. 67, no. 4, pp. 773–788, 2018.
  5.  I. Takahashi and T. Noguchi, “A new quick response and high efficiency control strategy of an induction motor,” IEEE Trans. Power App., vol. IA-22, no. 5, pp. 820–827, Sept. 1986, doi: 10.1109/TIA.1986.4504799.
  6.  M. Depenbrock, “Direct self-control (DSC) of a inverter fed induction machine,” IEEE Trans. Power Electron., vol. 3, no. 4, pp. 420–429, Oct. 1988.
  7.  Y.-S. Lai and J.-H. Chen, “A new approach to direct torque control of induction motor drives for constant inverter switching frequency and torque ripple reduction,” IEEE Trans. Energy. Convers., vol., 16, no. 3, pp. 220–227, Sep. 2001.
  8.  C. Lascu, I. Boldea, and F. Blaabjerb, “A modified direct torque control for induction motor sensorless drive,” IEEE Trans. Ind. Appl., vol. 36, no. 1, pp. 122–130, Jan/Feb. 2000.
  9.  L. Tang, L. Zhong, M. Rahman, and Y. Hu, “A novel direct torque controlled interior permanent magnet synchronous machine drive with low ripple in flux and torque and fixed switching frequency,” IEEE Trans. Ind. Appl., vol. 19, no. 2, pp. 346–354, Mar. 2004.
  10.  R. Narayan and D.B. Subudhi, “Stator inter-turn fault detection of an induction motor using neuro-fuzzy techniques,” Bull. Pol. Acad. Sci. Tech. Sci., vol. 20, no.3, pp. 363–376, 2010.
  11.  I. Bakhti, S. Chaouch, and A. Maakouf, “High performance backstepping control of induction motor with adaptive sliding mode observer,” Bull. Pol. Acad. Sci. Tech. Sci., vol. 21, no.3, pp. 331–344, 2011.
  12.  B. Kenny and R. Lorenz, “Stator- and rotor-flux-based deadbeat direct torque control of induction machines,” IEEE Trans. Ind. Appl., vol. 39, no. 4, pp. 1093–1101, Jul/Aug. 2003.
  13.  J. Rodriguez, M.P. Kazmierkowski, J. Espinoza, P. Zanchetta, H. Abu-Rub, H. Young, and C.A. Rojas, “State of the art of finite control set model predictive control in power electronics,” IEEE Trans. Ind. Inform., vol. 9, no. 2, pp. 1003–1016, May. 2013.
  14.  Y. Zhang, Y. Bai, H. Yang and B. Zhang “Low switching frequency model predictive control of three-level inverter-fed im drives with speed-sensorless and field weakening operations,” IEEE Trans. Ind. Electron., vol. 66, no. 6, pp. 4262–4272, 2019, doi: 10.1109/ TIE.2018.2868014.
  15.  S.A. Davari, D.A. Khaburi, and R. Kennel, “An improved FCS-MPC algorithm for an induction motor with an imposed optimized weighting factor,” IEEE Trans. Power Electron., vol. 27, no. 3, pp. 1540–1551, 2012.
  16.  L. Yan, M. Dou, H. Zhang, and Z. Hua, “Speed sensorless dual reference frame predictive torque control for induction machines,” IEEE Trans. Power. Electron., vol. 34, no. 12, pp. 12285–12295, 2019, doi: 10.1109/TPEL.2019.2904542.
  17.  C.S. Vazquez, J. Rodriguez, M. Rivera, L.G. Franquelo, and M. Norambuena, “Model predictive control for power converters and drives: advanced and trends,” IEEE Trans. Ind. Electron., vol. 64, no. 2, pp. 935–947, 2017.
  18.  W. Xie et al., “Finite control set-model predictive torque control with a deadbeat solution for pmsm drives,” IEEE Trans. Ind. Electron., vol. 62, no. 9, pp. 5402–5410, Sept. 2015, doi: 10.1109/TIE.2015.2410767.
  19.  Y. Zhang, B. Yang, H. Yang, and M. Nurambuena, “Generalized sequential model predictive control of im drives with field-weakening ability,” IEEE Trans. Power Elecron., vol. 34, no. 9, pp. 8944–8955, 2019, doi: 10.1109/TPEL.2018.2886206.
  20.  M. Norambuena, J. Rodrigez, Z. Zhang, F. Wang, C. Garcia, R. Kenel, and G.-D. Andreescu, “A very simple strategy for high-quality performance of AC machines using model predictive control,” IEEE Trans. Power Electron., vol. 34, no. 1, pp. 794–800, Jan. 2019.
  21.  J. Rodriguez, R.M. Kennel, J.R. Espinoza, M. Trincado, C.A. Silva, and C.A. Rojas, “High performance control strategies for electrical drives: An experimental assessment,” IEEE Trans. Ind. Electron., vol.29, no. 2, pp. 812– 820, Jan/Feb. 2012.
  22.  T. Geyer, “Tuning guidelines for model predictive torque and flux control,” IEEE Trans. Ind. Appl., vol. 54, no. 5, pp. 4464–4475, Oct. 2018.
  23.  F. Wang, G. Lin, and Y. He, “Passivity-based model predictive control of three-level inverter-fed induction motor,” IEEE Trans. Power. Electron., vol. 36, no. 2, pp. 1984–1993, Feb. 2021, doi: 10.1109/TPEL.2020.3008915.
  24.  M. Pacas and J. Weber, “Predictive direct torque control for the PM synchronous machine,” IEEE Trans. Ind. Electron., vol. 52, no. 5, pp. 1350–1356, Oct. 2005.
  25.  F. Niu, F. Niu, K. Li, and Y. Wang, “Direct torque control for permanent-magnet synchronous machines based on duty ratio modulation,” IEEE Trans. Ind Electron., vol. 62, no. 10, pp. 6160–6170, Oct. 2015.
  26.  Y. Zhang and J. Zhu, “Direct torque control of permanent magnet synchronous motor with a reduced torque ripple and commutation frequency,” IEEE Trans. Power Electron., vol. 26, no. 1, pp. 235–248, Jan. 2011.
  27.  J.-K. Kang and S.-K. Sul, “New direct torque control of induction motor for minimum torque ripple and constant switching frequency,” IEEE Trans. Ind. Appl., vol. 35, no. 5, pp. 1076–1082, Sep/Oct. 1999.
  28.  K.K. Shyu, J.K. Lin, V.T. Pham, M.J. Yang, and T.W. Wang, “Global minimum torque ripple design for direct torque control of induction motor drives,” IEEE Trans. Ind Electron., vol. 57, no. 9, pp. 3148–3156, Sep. 2010.
  29.  Y. Ren, Z.Q. Zhu, and J. Liu, “Direct torque control of permanent-magnet synchronous machine drives with a simple duty ratio regulator,” IEEE Trans. Ind. Electron., vol. 61, no. 10, pp. 5249–5259, Oct. 2014.
  30.  Q. Liu and K. Hameyer, “Torque ripple minimization for direct torque control of pmsm with modified FSMPC,” IEEE Trans. Ind. Electron., vol. 52, no. 6, pp. 4855–4864, Aug. 2016.
  31.  Y. Zhang and H. Yang, “Torque ripple reduction of model predictive torque control of induction motor drives,” in Proc. Energy Convers. Congr. Expo., 2013, pp. 1176–1183.
  32.  Y. Zhang, H. Yang, and B. Xia, “Model predictive torque control of induction motor drives with reduced torque ripple,” IET Electr. Power Appl., vol. 9, no. 9, pp. 595–604, 2015.
  33.  Y. Zhang and H. Yang, “Model predictive torque control of induction motor drives with optimal duty cycle control,” IEEE Trans. Power Elecron., vol. 29, no. 12, pp. 6593–6603, Dec. 2014.
  34.  Y. Zhang and H. Yang, “Generalized two-vector-based Model-predictive torque control of induction motor drives,” IEEE Trans. Power Elecron., vol. 30, no. 7, pp. 6593–6603, Jul. 2015.
  35.  Y. Zhang, J. Zhu, and B. Xia, “A novel duty cycle control strategy to reduce both the torque and stator flux ripples for DTC of permanent- magnet synchronous motor drives with switching frequency reduction,” IEEE Trans. Power Electron., vol. 31, no. 5, pp. 3738–3753, May 2016.
  36.  C. Lascu and G.-D. Andreescu, “Sliding mode observer and improved integrator with dc-offset compensation for flux estimation in sensorless controlled induction motors,” IEEE Trans. Ind. Electron., vol. 53, no. 3, pp. 785–794, Jun. 2006.
  37.  P.H. Cortes, S. Kouro, B. La Rocca, R. Vargas, J. Rodrigues, J. Leon, S. Vazquez, and L. Franquelo, “Guidelines for weighting factors design in model predictive control of power converters and drives,” in Proc. IEEE ICIT, 2009, pp. 1–7.
Go to article

Authors and Affiliations

Babak Kiani
1
Babak Mozafari
1
Soodabeh Soleymani
1
Hosein Mohammadnezhad Shourkaei
1

  1. Department of Electrical Engineering, Science and research Branch, Islamic Azad University, Tehran, IRAN
Download PDF Download RIS Download Bibtex

Abstract

The ongoing period of the pandemic makes everybody focused on the matters related to fighting this immense problem posed to the societies worldwide. The governments deal with the threat by publishing regulations which should allow to mitigate the pandemic, walking on thin ice as the decision makers do not always know how to properly respond to the threat in order to save people. Computer-based simulations of e.g. parts of the city or rural area should provide significant help, however, there are some requirements to fulfill. The simulation should be verifiable, supported by the urban research and it should be possible to run it in appropriate scale. Thus in this paper we present an interdisciplinary work of urban researchers and computer scientists, proposing a scalable, HPC-grade model of simulation, which was tested in a real scenario and may be further used to extend our knowledge about epidemic spread and the results of its counteracting methods. The paper shows the relevant state of the art, discusses the micro-scale simulation model, sketches out the elements of its implementation and provides tangible results gathered for a part of the city of Krakow, Poland.
Go to article

Bibliography

  1.  I. Mironowicz, Modele transformacji miast. Wrocław: Oficyna Wydawnicza Politechniki Wrocławskiej, 2016.
  2.  A. Matusik, K. Racoń-Leja, M. Gyurkovich, and K. Dudzic-Gyurkovich, “Hydrourban spatial development model for a resilient inner-city. the example of gdańsk,” Archit. City Environ., vol. 15, no. 43, pp. 1–2, 2020.
  3.  J.L. Kriken, P. Enquist, and R. Rapaport, City building: nine planning principles for the twenty-first century. Princeton Architectural Press, 2011.
  4.  W. Kosiński, Paradigm of the City of the 21st Century. Between the Past of the Polis and the Future of the Metropolis, J. Gyurkovich, Ed. Kraków: Wydaw. PK, 2016.
  5.  J.F.P. Rose, The well-tempered city: what modern science, ancient civilizations, and human nature teach us about the future of urban life. Harper Wave, 2017.
  6.  E. Rewers, Post-Polis. Wstęp do filozofii ponowoczesnego miasta. Kraków: Universitas, 2005, [in Polish].
  7.  M. Dymnicka, Przestrzeń publiczna, a przemiany miasta. Warszawa: Wydawnictwo Naukowe Scholar, 2013, [in Polish].
  8.  M. Gyurkovich et al., Hybrid Urban Structures, M. Gyurkovich, Ed. Kraków: Wydaw. PK, 2016.
  9.  S. Kostof, The City Shaped.Urban Patterns and Meanings through History. London – New York: Thames & Hudson, 1999.
  10.  A.A. Kantarek, Tkanka urbanistyczna.Wybrane zagadnienia, J. Gyurkovich, Ed. Kraków: Wydaw. PK, 2019, [in Polish].
  11.  A. Noworól, “Functional urban area as the city of the future,” Tech. Trans., vol. 111, no. 1-A, 2014.
  12.  K. Racoń-Leja, Miasto i wojna: wpływ II wojny światowej na przekształcenia struktury przestrzennej i współczesną kondycję urbanistyczną wybranych miast europejskich, J. Gyurkovich, Ed. Kraków: Wydaw. PK, 2019, [in Polish].
  13.  J. Teller, “Urban density and covid-19: towards an adaptive approach,” Build. Cities, vol. 2, no. 1, pp. 150–165, 2021.
  14.  C. at Johns Hopkins University, “Covid-19 dashboard by the center for systems science and engineering,” 2021, [Online] Available: https:// coronavirus.jhu.edu/map.html.
  15.  M. Castells, “Communication, power and counter-power in the network society,” Int. J. Commun., vol. 1, no. 1, p. 29, 2007.
  16.  R. Sennet, “How should we live? density in postpandemic cities,” Domus, no. 1046, 2020, [Online]. Available: https://www.domusweb. it/en/architecture/2020/05/09/how-should-we-live-density-in-post-pandemic-cities.html.
  17.  M. Kowicki, Rozproszenie zabudowy na obszarach Małopolski, a kryzys kreatywności opracowań planistyczno-przestrzennych. Kraków: Wydaw. PK, 2014, [in Polish].
  18.  G. Korzeniak et al., Małe i średnie miasta w policentrycznym rozwoju Polski. Kraków: Instytut Rozwoju Miast, 2014, [in Polish].
  19.  GUS, “Demographic Yearbook of Poland,” 2019.
  20.  N.A. Salingaros, “Eight city types and their interactions: the “eight-fold” model,” Techn. Trans., vol. 2, pp. 5–70, 2017.
  21.  J. Busquets and M. Corominas, Cerda and the Barcelona of the future: reality versus project. Centre de Cultura Contemporania de Barcelona, 2009.
  22.  A.A. Kantarek, K. Kwiatkowski, and I. Samuels, “From rural plots to urban superblocks,” Urban Morphology: journal of the International Seminar on Urban Form, vol. 22, no. 2, pp. 155–157, 2018.
  23.  M. Gyurkovich and A. Sotoca, “Towards the Cracow Metropolis – a dream or a reality? A selected issues,” Tech. Trans., vol. 115, no. 2, pp. 5–25, 2018.
  24.  P. Lorens, Równoważenie rozwoju przestrzennego miast polskich. Gdańsk: Wydaw. PG, 2013, [in Polish].
  25. Back to the Sense of the City: 11th VCT International monograph book, Year 2016, July, Krakow. Barcelona: Centre of Land Policy and Valuations (CPSV), 2016.
  26.  A. Zwoliński, “Geometrical structure of public spaces in virtual city models. exploring urban morphology by hierarchy of open spaces,” Space Form, vol. 2019, no. 37, pp. 235–243, 2019.
  27.  K. Lynch, Good city form. MIT Press, 2001.
  28.  D.C. Duives, W. Daamen, and S.P. Hoogendoorn, “State-ofthe-art crowd motion simulation models,” Transp. Res. Part C Emerging Technol., vol. 37, pp. 193–209, 2013.
  29.  E.D. Kuligowski, “Computer evacuation models for buildings,” in SFPE Handbook of Fire Protection Engineering. Springer, 2016, pp. 2152–2180.
  30.  B. Zhan, D.N. Monekosso, P. Remagnino, S.A. Velastin, and L.-Q.Xu, “Crowd analysis: a survey,” Mach. Vision Appl., vol. 19, no. 5‒6, pp. 345–357, 2008.
  31.  K. Teknomo, Y. Takeyama, and H. Inamura, “Review on microscopic pedestrian simulation model,” CoRR, vol. abs/1609.01808, 2016. [Online]. Available: http://arxiv.org/abs/1609.01808.
  32.  M. Paciorek, A. Bogacz, and W. Turek, “Scalable signal-based simulation of autonomous beings in complex environments,” in Computational Science – ICCS 2020. Cham: Springer International Publishing, 2020, pp. 144–157.
  33.  J. Wąs and R. Lubaś, “Towards realistic and effective agentbased models of crowd dynamics,” Neurocomputing, vol. 146, pp. 199–209, 2014.
  34.  P. Wittek and X. Rubio-Campillo, “Scalable agent-based modelling with cloud hpc resources for social simulations,” in 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings. IEEE, 2012, pp. 355–362.
  35.  J. Bujas, D. Dworak, W. Turek, and A. Byrski, “Highperformance computing framework with desynchronized information propagation for large-scale simulations,” J. Comput. Sci, vol. 32, pp. 70–86, 2019.
  36.  Y. Mohamadou, A. Halidou, and P.T. Kapen, “A review of mathematical modeling, artificial intelligence and datasets used in the study, prediction and management of covid-19,” Appl. Intell, vol. 50, no. 11, pp. 3913–3925, 2020.
  37.  M. Fuentes and M. Kuperman, “Cellular automata and epidemiological models with spatial dependence,” Physica A, vol. 267, no. 3, pp. 471‒486, 1999.
  38.  I. Tiwari, P. Sarin, and P. Parmananda, “Predictive modeling of disease propagation in a mobile, connected community using cellular automata,” Chaos: Interdiscip. J. Nonlinear Sci., vol. 30, no. 8, p. 081103, 2020.
  39.  M. Dascalu, M. Malita, A. Barbilian, E. Franti, and G.M. Stefan, “Enhanced cellular automata with autonomous agents for covid-19 pandemic modeling,” Rom. J. Inf. Sci. Technol, vol. 23, pp. S15–S27, 2020.
  40.  Y. Xiao, M. Yang, Z. Zhu, H. Yang, L. Zhang, and S. Ghader, “Modeling indoor-level non-pharmaceutical interventions during the covid-19 pandemic: a pedestrian dynamics-based microscopic simulation approach,” Transp. Policy, vol. 109, pp. 12–23, 2021.
  41.  T. Kapecki, “Elements of sustainable development in the context of the environmental and financial crisis and the covid-19 pandemic,” Sustainability, vol. 12, no. 15, pp. 1–12, 2020.
  42.  A. Jasiński, “Public space or safe space–remarks during the covid-19 pandemic,” Tech. Trans., vol. 117, no. 1, 2020.
  43.  S. Gzell, “Urban design and the sense of the city,” Tech. Trans., vol. 113, no. 2-A, pp. 15–19, 2016.
  44.  M. Hanzl, “Urban forms and green infrastructure–the implications for public health during the covid-19 pandemic,” Cities Health, pp. 1–5, 2020, doi: 10.1080/23748834.2020.1791441.
  45.  M.D. Pinheiro and N.C. Luís, “Covid-19 could leverage a sustainable built environment,” Sustainability, vol. 12, no. 14, p. 5863, 2020.
  46.  M.R. Fatmi, “Covid-19 impact on urban mobility,” J. Urban Manage., vol. 9, no. 3, pp. 270–275, 2020.
  47.  A. Porębska, P. Rizzi, S. Otsuki, and M. Shirotsuki, “Walkability and resilience: A qualitative approach to design for risk reduction,” Sustainability, vol. 11, no. 10, p. 2878, 2019.
  48.  F. Vergara Perucich, J. Correa Parra, and C. Aguirre-Nuñez, Atlas de indicadores espaciales de vulnerabilidad ante el covid-19 en Chile, F. Vergara, Ed. Centro Producción del Espacio, 2020.
  49.  W.H. Whyte et al., The social life of small urban spaces. Conservation Foundation Washington, DC, 1980.
  50.  A. Białkiewicz, B. Stelmach, and M.J. Żychowska, “Dobra kultury współczesnej. zarys problemu ochrony,” Wiadomości Konserwatorskie – J. Heritage Conserv., no. 63, pp. 152–162, 2020, [in Polish].
  51.  E. Szczerek, Rewitalizacja osiedli wielkopłytowych a ciągłośc´ i komplementarność przestrzeni publicznej miasta, A. Franta, Ed. Kraków: Wydaw. PK, 2018, [in Polish].
  52.  B. Malinowska-Petelenz, Sacrum in civitas: wybrane zagadnienia, A.A. Kantarek, Ed. Kraków: Wydaw. PK, 2018, [in Polish].
  53.  J. Gehl and B. Svarre, How to study public life. Washington, DC: Island press, 2013.
Go to article

Authors and Affiliations

Mateusz Paciorek
1
ORCID: ORCID
Damian Poklewski-Koziełł
2
ORCID: ORCID
Kinga Racoń-Leja
2
ORCID: ORCID
Aleksander Byrski
1
ORCID: ORCID
Mateusz Gyurkovich
2
ORCID: ORCID
Wojciech Turek
1
ORCID: ORCID

  1. AGH University of Science and Technology, al. Adama Mickiewicza 30, 30-059 Krakow, Poland
  2. Cracow University of Technology, ul. Warszawska 24, 31-155 Krakow, Poland
Download PDF Download RIS Download Bibtex

Abstract

Workflow Scheduling is the major problem in Cloud Computing consists of a set of interdependent tasks which is used to solve the various scientific and healthcare issues. In this research work, the cloud based workflow scheduling between different tasks in medical imaging datasets using Machine Learning (ML) and Deep Learning (DL) methods (hybrid classification approach) is proposed for healthcare applications. The main objective of this research work is to develop a system which is used for both workflow computing and scheduling in order to minimize the makespan, execution cost and to segment the cancer region in the classified abnormal images. The workflow computing is performed using different Machine Learning classifiers and the workflow scheduling is carried out using Deep Learning algorithm. The conventional AlexNet Convolutional Neural Networks (CNN) architecture is modified and used for workflow scheduling between different tasks in order to improve the accuracy level. The AlexNet architecture is analyzed and tested on different cloud services Amazon Elastic Compute Cloud- EC2 and Amazon Lightsail with respect to Makespan (MS) and Execution Cost (EC).
Go to article

Bibliography

  1. A.M. Manasrah and H. Ba Ali, “Workflow scheduling using hybrid GA-PSO algorithm in cloud computing,” Wireless Commun. Mob. Comput., vol. 15, no. 3, pp. 1–16, 2018, doi: 10.1155/2018/1934784.
  2.  S.G. Ahmad, C.S. Liew, E.U. Munir, A.T. Fong, and S.U. Khan, “A hybrid genetic algorithm for optimization of scheduling workflow applications in heterogeneous computing systems,” J. Parallel Distrib. Comput., vol. 87, no. 2, pp. 80–90, 2016, doi: 10.1016/j. jpdc.2015.10.001.
  3.  H. Alaskar, A. Hussain, N. Al-Aseem, P. Liatsis, and D. Al-Jumeily, “Application of convolutional neural networks for automated ulcer detection in wireless capsule endoscopy images,” Sensors., vol. 19, no. 6, pp. 1265–1281, 2019, doi: 10.3390/s19061265.
  4.  L. Teylo, L. Arantes, P. Sens, and L.M.A. Drummond, “A dynamic task scheduler tolerant to multiple hibernations in cloud environments,” J. Cluster Comput., vol. 21, no. 5, pp. 1–23, 2020, doi: 10.1007/s10586-020-03175-2.
  5.  M. Sardaraz and M. Tahir, “A parallel multi-objective genetic algorithm for scheduling scientific workflows in cloud computing,” Int. J. Distri. Sensor Net., vol. 16, no. 8, pp. 1–10, 2020, doi: 10.1177/1550147720949142.
  6.  M. Hosseinzadeh, M.Y. Ghafour, and H.K. Hama, “Multi-objective task and workflow scheduling approaches in cloud computing: a comprehensive review,” J. Grid Comput., vol. 18, no. 3, pp. 327–356, 2020, doi: 10.1007/s10723-020-09533-z.
  7.  C.L. Chen, M.L. Chiang, and C.B. Lin, “The high performance of a task scheduling algorithm using reference queues for cloud- computing data centers,” Electronics, . vol. 9, no. 1, pp. 371–379, 2020, doi: 10.3390/electronics9020371.
  8.  Y. Hu, H. Wang, and W. Ma, “Intelligent Cloud workflow management and scheduling method for big data applications,” J. Cloud Comp, vol. 9, no. 1, pp. 1–13, 2020, doi: 10.1186/s13677-020-00177-8.
  9.  M. Grochowski, A. Kwasigroch, and A. Mikołajczyk,” Selected technical issues of deep neural networks for image classification purposes,” Bull. Polish Acad. Sci. Tech. Sci., vol. 67, no. 2, pp. 363–376, 2019, doi: 10.24425/bpas.2019.128485.
  10.  A.A. Nasr, N.A. El-Bahnasawy, and G. Attiya, “Cost-effective algorithm for workflow scheduling in cloud computing under deadline constraint,” Arab. J. Sci. Eng., vol.44, no. 4, pp. 3765–3780, 2019, doi: 10.1007/s13369-018-3664-6.
  11.  Z. Swiderska-Chadaj, T. Markiewicz, J. Gallego, G. Bueno, B. Grala, and M. Lorent, “Deep learning for damaged tissue detection and segmentation in Ki-67 brain tumor specimens based on the U-net model,” Bull. Polish Acad. Sci. Tech. Sci., vol. 66, no. 6, pp. 849–856, 2018, doi: 10.24425/bpas.2018.125932.
  12.  Y. Cui and Z. Xiaoqing, “Workflow tasks scheduling optimization based on genetic algorithm in Clouds,” in IEEE 3rd Int. Conf. on Cloud Computing and Big Data Analysis (ICCCBDA), Chengdu, 2018, pp. 6–10, doi: 10.1109/ICCCBDA.2018.8386458.
  13.  T. Wang, Z. Liu, Y. Chen, Y. Xu, and X. Dai, “Load balancing task scheduling based on Genetic algorithm in Cloud Computing,” in IEEE 12th Int. Conf. on Dependable, Autonomic and Secure Computing, Dalian, 2014, pp. 146–152, doi: 10.1109/DASC.2014.35.
  14.  X. Zhao, Y. Wu, G. Song, Z. Li, Y. Zhang, and Y. Fan, “A deep learning model integrating FCNNs and CRFs for brain tumor segmentation,” Med. Imag. Anal., vol. 43, no. 4, pp.  98–111, 2018, doi: 10.1016/j.media.2017.10.002.
  15.  C. Liu, R. Zhao, W. Xie, and M. Pang, “Pathological lung segmentation based on random forest combined with deep model and multi- scale superpixels,” Neu. Proc, Let., vol. 52, no. 2, pp. 1631–1649, 2020, doi: 10.1007/s11063-020-10330-8.
  16.  C. Zhang, J. Zhao, Ji. Niu, and D. Li, “New convolutional neural network model for screening and diagnosis of mammograms,” PLoS One., vol. 15, no. 8, pp. 67–80, 2020, doi: 10.1371/journal.pone.0237674.
  17.  L.D. Nicanor, H.R. Orozco Aguirre, and V.M. Landassuri Moreno, “An assessment model to establish the use of services resources in a cloud computing scenario,” J. High Perf. Vis. Int., vol. 12, no. 5, pp. 83–100, 2020, doi: 10.1007/978-981-15-6844-2_7.
  18.  V. Magudeeswaran and J. Fenshia Singh, “Contrast limited fuzzy adaptive histogram equalization for enhancement of brain images,” Int. J. Imag. Sys. and Tech., vol. 27, no. 1, pp. 98–103, 2017, doi: 10.1002/ima.22214.
  19.  S.P. Cleary and J.S. Prell, “Liberating native mass spectrometry from dependence on volatile salt buffers by use of Gábor transform,” Int. J. Imag. Syst. Tech., vol. 20, no. 4, pp. 519–523, 2019, doi: 10.1002/cphc.201900022.
  20.  V. Srivastava, R.K. Purwar, and A. Jain, “A dynamic threshold‐based local mesh ternary pattern technique for biomedical image retrieval,” Int. J. Imag. Sysy. Tech., vol.29, no. 2, pp. 168–179, 2019, doi: 10.1002/ima.22296.
  21.  J.H. Johnpeter and T. Ponnuchamy, “Computer aided automated detection and classification of brain tumors using CANFIS classification method,” Int. J. Imag. Sysy. Tech., vol.29, no. 4, pp. 431–438, 2019, doi: 10.1002/ima.22318.
  22.  N. Kumar and D. Kumar, “Classification using artificial neural network optimized with bat algorithm”, Int. J. Innovative Tech. Exploring Eng. (IJITEE), vol. 9, no. 3, pp.  696–700, 2020, doi: 10.35940/ijitee.C8378.019320.
  23.  A.S. Mahboob and S.H. Zahiri, “Automatic and heuristic complete design for ANFIS classifier, network: computation in neural systems,” J. Net. Comput. Neu. Syst., vol. 30, no. 4, pp. 31–57, 2019, doi: 10.1080/0954898X.2019.1637953.
  24.  C. Shorten and T.M. Khoshgoftaar, “A survey on image data augmentation for deep learning,” J. Big. Data., vol.  60, no. 6, pp. 1–48, 2019, doi: 10.1186/s40537-019-0197-0.
Go to article

Authors and Affiliations

P. Tharani
1
A.M. Kalpana
1

  1. Department of Computer Science and Engineering, Government College of Engineering, Salem-636011, Tamil Nadu, India
Download PDF Download RIS Download Bibtex

Abstract

Time invariant linear operators are the building blocks of signal processing. Weighted circular convolution and signal processing framework in a generalized Fourier domain are introduced by Jorge Martinez. In this paper, we prove that under this new signal processing framework, weighted circular convolution also has a generalized time invariant property. We also give an application of this property to algorithm of continuous wavelet transform (CWT). Specifically, we have previously studied the algorithm of CWT based on generalized Fourier transform with parameter 1. In this paper, we prove that the parameter can take any complex number. Numerical experiments are presented to further demonstrate our analyses.
Go to article

Bibliography

  1.  N. Holighaus, G. Koliander, Z. Průša, and L.D. Abreu, “Characterization of Analytic Wavelet Transforms and a New Phaseless Reconstruction Algorithm,” IEEE Trans. Signal Process., vol. 67, no. 15, pp. 3894–3908, 2019.
  2.  M. Rayeezuddin, B. Krishna Reddy, and D. Sudheer Reddy, “Performance of reconstruction factors for a class of new complex continuous wavelets,” Int. J. Wavelets Multiresolution Inf. Process., vol. 19, no. 02, p. 2050067, 2021, doi: 10.1142/S0219691320500678.
  3.  Y. Guo, B.-Z. Li, and L.-D. Yang, “Novel fractional wavelet transform: Principles, MRA and application,” Digital Signal Process., vol. 110, p. 102937, 2021. [Online]. Available: doi: 10.1016/j.dsp.2020.102937.
  4.  V.K. Patel, S. Singh, and V.K. Singh, “Numerical wavelets scheme to complex partial differential equation arising from Morlet continuous wavelet transform,” Numer. Methods Partial Differ. Equations, vol. 37, no. 2, pp. 1163–1199, mar 2021.
  5.  C.K. Chui, Q. Jiang, L. Li, and J. Lu, “Signal separation based on adaptive continuous wavelet-like transform and analysis,” Appl. Comput. Harmon. Anal., vol. 53, pp. 151‒179, 2021.
  6.  O. Erkaymaz, I.S. Yapici, and R.U. Arslan, “Effects of obesity on time-frequency components of electroretinogram signal using continuous wavelet transform,” Biomed. Signal Process. Control, vol. 66, p. 102398, 2021.
  7.  Z. Yan, P. Chao, J. Ma, D. Cheng, and C. Liu, “Discrete convolution wavelet transform of signal and its application on BEV accident data analysis,” Mech. Syst. Signal Process., vol. 159, 2021.
  8.  R. Bardenet and A. Hardy, “Time-frequency transforms of white noises and Gaussian analytic functions,” Appl. Comput. Harmon. Anal., vol. 50, pp. 73–104, 2021, doi: 10.1016/j.acha.2019.07.003.
  9.  M.X. Cohen, “A better way to define and describe Morlet wavelets for time-frequency analysis,” NeuroImage, vol. 199, pp. 81–86, 2019. doi: 10.1016/j.neuroimage.2019.05.048.
  10.  H. Yi and H. Shu, “The improvement of the Morlet wavelet for multi-period analysis of climate data,” C.R. Geosci., vol. 344, no. 10, pp. 483–497, 2012.
  11.  S.G. Mallat, A Wavelet Tour of Signal Processing: The Sparse Way. Academic Press, 2009.
  12.  H. Yi, P. Ouyang, T. Yu, and T. Zhang, “An algorithm for Morlet wavelet transform based on generalized discrete Fourier transform,” Int. J. Wavelets Multiresolution Inf. Process., vol. 17, no. 05, p. 1950030, 2019, doi: 10.1142/S0219691319500309.
  13.  R. Tolimieri, M. An, and C. Lu, Algorithms for Discrete Fourier Transform and Convolution. Springer, 1997.
  14.  J.-M. Attendu and A. Ross, “Method for finding optimal exponential decay coefficient in numerical Laplace transform for application to linear convolution,” Signal Process., vol. 130, pp. 47–56, 2017.
  15.  W. Li and A.M. Peterson, “FIR Filtering by the Modified Fermat Number Transform,” IEEE Trans. Acoust. Speech Signal Process., vol. 38, no. 9, pp. 1641–1645, 1990.
  16.  M.J. Narasimha, “Linear Convolution Using Skew-Cyclic Convolutions,” Signal Process. Lett., vol. 14, no. 3, pp. 173–176, 2007.
  17.  J. Martinez, R. Heusdens, and R.C. Hendriks, “A Generalized Poisson Summation Formula and its Application to Fast Linear Convolution,” IEEE Signal Process Lett., vol. 18, no. 9, pp. 501–504, 2011.
  18.  R.C. Guido, F. Pedroso, A. Furlan, R.C. Contreras, L.G. Caobianco, and J.S. Neto, “CWT×DWT×DTWT×SDTWT: Clarifying terminologies and roles of different types of wavelet transforms,” Int. J. Wavelets Multiresolution Inf. Process., vol. 18, no. 06, p. 2030001, 2020, doi: 10.1142/S0219691320300017.
  19.  P. Kapler, “An application of continuous wavelet transform and wavelet coherence for residential power consumer load profiles analysis,” Bull. Pol. Acad. Sci. Tech. Sci., vol. 69, no. 1, p. e136216, 2021, doi: 10.24425/bpasts.2020.136216.
  20.  J. Martinez, R. Heusdens, and R.C. Hendriks, “A generalized Fourier domain: Signal processing framework and applications,” Signal Process., vol. 93, no. 5, pp. 1259‒1267, 2013.
  21.  S. Hui and S.H. Żak, “Discrete Fourier transform and permutations,” Bull. Pol. Acad. Sci. Tech. Sci., vol. 67, no. 6, pp. 995–1005, 2019.
  22.  Z. Babic and D.P. Mandic, “A fast algorithm for linear convolution of discrete time signals,” in 5th International Conference on Telecommunications in Modern Satellite, Cable and Broadcasting Service. TELSIKS 2001. Proceedings of Papers (Cat. No.01EX517), vol. 2, 2001, pp. 595–598.
  23.  H. Yi, S. Y. Xin, and J. F. Yin, “A Class of Algorithms for ContinuousWavelet Transform Based on the Circulant Matrix,” Algorithms, vol. 11, no. 3, p. 24, 2018.
  24.  D. Spałek, “Two relations for generalized discrete Fourier transform coefficients,” Bull. Pol. Acad. Sci. Tech. Sci., vol. 66, no. 3, pp. 275– 281, 2018, doi: 10.24425/123433.
Go to article

Authors and Affiliations

Hua Yi
1
ORCID: ORCID
Yu-Le Ru
1
Yin-Yun Dai
1

  1. School of Mathematics and Physics, Jinggangshan University, Ji’an, 343009, P.R. China
Download PDF Download RIS Download Bibtex

Abstract

The COVID-19 pandemic has influenced virtually all aspects of our lives. Across the world, countries have applied various mitigation strategies, based on social, political, and technological instruments. We postulate that multi-agent systems can provide a common platform to study (and balance) their essential properties. We also show how to obtain a comprehensive list of the properties by “distilling” them from media snippets. Finally, we present a preliminary take on their formal specification, using ideas from multi-agent logics.
Go to article

Bibliography

  1.  A. Soltani, R. Calo, and C. Bergstrom, “Contacttracing apps are not a solution to the COVID-19 crisis,” Brookings Tech Stream, 27 April 2020. [Online]. Available: https://www.brookings.edu/techstream/inaccurate-and-insecure-why-contact-tracing-apps-could-be-a-disaster/.
  2.  J. Morley, J. Cowls, M. Taddeo, and L. Floridi, “Ethical guidelines for COVID-19 tracing apps,” Nat. Comment, pp. 29–31, 4 June 2020. [Online]. Available: https://www.nature.com/articles/d41586-020-01578-0.
  3.  A. Stollmeyer, M. Schaake, and F. Dignum, “The Dutch tracing app ’soap opera’ – lessons for Europe,” euobserver, 7 May 2020. [Online]. Available: https://euobserver.com/opinion/148265.
  4.  G. Weiss, Ed., Multiagent Systems. A Modern Approach to Distributed Artificial Intelligence. MIT Press: Cambridge, Mass, 1999.
  5.  Y. Shoham and K. Leyton-Brown, Multiagent Systems – Algorithmic, Game-Theoretic, and Logical Foundations. Cambridge University Press, 2009.
  6.  A. Rao and M. Georgeff, “Modeling rational agents within a BDI-architecture,” in Proceedings of KR, 1991, pp. 473–484.
  7.  M.Wooldridge, Reasoning about Rational Agents. MIT Press : Cambridge, Mass, 2000.
  8.  M. Dastani, K. Hindriks, and J. Meyer, Eds., Specification and Verification of Multi-Agent Systems. Springer, 2010.
  9.  W. Jamroga, Logical Methods for Specification and Verification of Multi-Agent Systems. ICS PAS, 2015.
  10.  W. Jamroga, D. Mestel, P.B. Rønne, P.Y.A. Ryan, and M. Skrobot, “A survey of requirements for COVID-19 mitigation strategies. Part I: newspaper clips,” CoRR, vol. abs/2011.07887, 2020.
  11.  A. Lomuscio, H. Qu, and F. Raimondi, “MCMAS: An open-source model checker for the verification of multiagent systems,” Int. J. Software Tools Technol. Trans., vol. 19, no. 1, pp. 9–30, 2017.
  12.  G. Behrmann, A. David, and K. Larsen, “A tutorial on UPPAAL,” in Formal Methods for the Design of Real-Time Systems: SFM-RT, ser. LNCS, no. 3185. Springer, 2004, pp. 200–236.
  13.  G. Kant, A. Laarman, J. Meijer, J. van de Pol, S. Blom, and T. van Dijk, “LTSmin: High-performance languageindependent model checking,” in Proceedings of TACAS, ser. Lecture Notes in Computer Science, vol. 9035. Springer, 2015, pp. 692–707.
  14.  D. Kurpiewski, W. Jamroga, and M. Knapik, “STV: Model checking for strategies under imperfect information,” in Proceedings of AAMAS. IFAAMAS, 2019, pp. 2372–2374.
  15.  S. Woodhams, “COVID-19 digital rights tracker,” Top10VPN, 10 June 2020. [Online]. Available: https://www.top10vpn.com/research/ covid-19-digital-rights-tracker/.
  16.  AFP, “Major finding: Lockdowns averted 3 million deaths in 11 European nations: study,” RTL Today, 9 June 2020. [Online]. Available: https://today.rtl.lu/news/science-and-environment/a/ 1530963.html.
  17.  I. Ilves, “Why are Google and Apple dictating how European democracies fight coronavirus?” The Guardian, 16 June 2020. [Online]. Available: https://www.theguardian.com/commentisfree/2020/jun/16/google-apple-dictating-european-democracies-coronavirus.
  18.  “NHS COVID-19: the new contact-tracing app from the NHS,” NCSC, 14 May 2020. [Online]. Available: https://www.ncsc.gov.uk/ information/nhs-covid-19-app-explainer.
  19.  J. Steinhauer and A. Goodnough, “Contact tracing is failing in many states. Here’s why.” New York Times, 5 October 2020. [Online]. Available: https://www.nytimes.com/2020/07/31/health/covid-contact-tracing-tests.html.
  20.  S. Bicheno, “Unlike France, Germany decides to do smartphone contact tracing the Apple/Google way,” telecoms.com, 27 April 2020. [Online]. Available: https://telecoms.com/503931/unlike-france-germany-de cides-to-do-smartphone-contact-tracing-the-apple-goo gle- way/.
  21.  “Together we can fight coronavirus — Smittestopp,” helsenorge, 28 April 2020. [Online]. Available: https://helsenorge.no/coronavirus/ smittestopp?redirect=false.
  22.  P.H. O’Neill, T. Ryan-Mosley, and B. Johnson, “A flood of coronavirus apps are tracking us. now it’s time to keep track of them,” MIT Technol. Rev., 7 May 2020. [Online]. Available: https://www.technologyreview.com/2020/05/07/1000961/launching-mittr-covid-tracing- tracker/.
  23.  M. Zastrow, “Coronavirus contact-tracing apps: can they slow the spread of COVID-19?” Nature (Technol. Feature), 19 May 2020. [Online]. Available: https://www.nature.com/articles/d41586-020-01514-2.
  24.  J. Taylor, “How did the Covidsafe app go from being vital to almost irrelevant?” The Guardian, 23 May 2020. [Online]. Available: https://www.theguardian.com/world/2020/may/24/how-did-the-covidsafe-app-go-from-being-vital-to-almost-irrelevant.
  25.  D. Robertson, “Transparency key to uptake of coronavirus tracing app,” RMIT news, 27-April 2020. [Online]. Available: https://www. rmit.edu.au/news/all-news/2020/april/transparency-key-to-uptake-of-coronavirus-traci ng-app.
  26.  D. Tahir and C. Lima, “Google and Apple’s rules for virus tracking apps sow division among states,” Politico, 10 June 2020. [Online]. Available: https://www.politico.com/news/2020/06/10/google-and-apples-rules-for-virus-tracking-apps-sow-division-among-states-312199.
  27.  A. Clarance, “Aarogya Setu: Why India’s Covid-19 contact tracing app is controversial,” BBC News, 15 May 2020. [Online]. Available: https://www.bbc.com/news/world-asia-india-52659520.
  28.  J. Davies, “UK snubs Google and Apple privacy warning for contact tracing app,” telecoms.com, 28 April 2020. [Online]. Available: https://telecoms.com/503967/uk-s nubs-google-and-apple-privacy-warning-for-contact-tr acing-app/.
  29.  A. Eisenberg, “Privacy fears threaten New York City’s coronavirus tracing efforts,” Politico, 4 June 2020. [Online]. Available: https:// www.politico.com/states/new-york/albany/story/2020/06/04/privacy-fears-threaten-new-york-citys-coronavirus-tracing-efforts-1290657.
  30.  C. Timberg, “Most Americans are not willing or able to use an app tracking coronavirus infections. that’s a problem for Big Tech’s plan to slow the pandemic,” Washington Post, 29 April 2020. [Online]. Available: https://www.washingtonpost.com/technology/2020/04/ 29/ most-americans-are-not-willing-or-able-use-an-app-tracking-coronavirus-infections-thats-problem-big-tec hs-plan-slow-pandemic/.
  31.  M. Burgess, “Just how anonymous is the NHS Covid-19 contact tracing app?” Wired, 12 May 2020. [Online]. Available: https://www. wired.co.uk/article/nhs-covid-app-data-anonymous.
  32.  “Getting it right: States struggle with contact tracing push,” Politico, 17 May 2020. [Online]. Available: https://www.politico.com/ news/2020/05/17/privacy-coronavirus-tracing-261369.
  33.  S.L. Frasier, “Coronavirus antibody tests have a mathematical pitfall,” Sci. Am., 1 July 2020. [Online]. Available: https://www. scientificamerican.com/article/coronavirus-antibody-tests- have-a-mathematical-pitfall/.
  34.  M. Scott and Z. Wanat, “Poland’s coronavirus app offers playbook for other governments,” Politico, 2 April 2020. [Online]. Available: https://www.politico.eu/article/poland-coronavirus-app-offers-playbook-for-other-governments/.
  35.  K. McCarthy, “UK finds itself almost alone with centralized virus contact-tracing app that probably won’t work well, asks for your location, may be illegal,” The Register, 5 May 2020. [Online]. Available: https://www.theregister.com/2020/05/05/uk_coronavirus_app/.
  36.  “Legal advice on smartphone contact tracing published,” matrix chambers, 3 May 2020. [Online]. Available: https://www.matrixlaw.co.uk/ news/legal-advice-on-smartphone-contact-tracing-published/.
  37.  A. Hern, “UK abandons contact-tracing app for Apple and Google model,” The Guardian, 18 June 2020. [Online]. Available: https://www. theguardian.com/world/2020/jun/18/uk-poised-to-abandon-coronavirus-app-in-favour-of-apple-and-google-models.
  38.  “Coronavirus: Member States agree on an interoperability solution for mobile tracing and warning apps,” European Commission – Press release, 16 June 2020. [Online]. Available: https://digital-strategy.ec.europa.eu/en/news/coronavirus-member-states-agree-interoperability- solution-mobile-tracing-and-warning-apps.
  39.  A. Oslo, “Norway suspends virus-tracing app due to privacy concerns,” The Guardian, 15 June 2020. [Online]. Available: https://www. theguardian.com/world/2020/jun/15/norway-suspends-virus-tracing-app-due-to-privacy-concerns.
  40.  S. Wodinsky, “The UK’s contact-tracing app breaks the UK’s own privacy laws (and is just plain broken),” Gizmodo, 13 May 2020. [Online]. Available: https://gizmodo.com/the-uk-s-contact-tracing-app-breaks-the-uk-s-own-privac-1843439962.
  41.  R. Garthwaite and I. Anderson, “Coronavirus: Alarm over ’invasive’ Kuwait and Bahrain contact-tracing apps,” BBC News, 16 June 2020. [Online]. Available: https://www.bbc.com/news/world-middle-east-53052395.
  42.  “Coronavirus privacy: Are South Korea’s alerts too revealing?” BBC News, 5 March 2020. [Online]. Available: https://www.bbc.com/ news/amp/world-asia-51733145.
  43.  K. Szymielewicz, A. Obem, and T. Zieliński, “Jak Polska walczy z koronawirusem i dlaczego aplikacja nas przed nim nie ochroni [How Poland fights the corona, and why the app won’t protect us]?” Panoptykon, 5 May 2020. [Online]. Available: https://panoptykon.org/ protego-safe-ryzyka.
  44.  J.-M. Bezat, “L’application StopCovid, activée seulement par 2% de la population, connaît des débuts décevants,” Le Monde, 10 June 2020. [Online]. Available: https://www.lemonde.fr/pixels/article/2020/06/10/l-application-stopcovid-connait-des-debuts- decevants_6042404_4408996.html.
  45.  P.H. O’Neill, “No, coronavirus apps don’t need 60% adoption to be effective,” MIT Technol. Rev., 5 June 2020. [Online]. Available: https:// www.technologyreview.com/2020/06/05/1002775/covid-apps-effective-at-less-than-60-percent-download/.
  46.  R. Hinch et al., “Effective configurations of a digital contact tracing app: A report to NHSX,” Oxford University, Tech. Rep., 2020. [Online]. Available: https://github.com/BDI-pathogens/covid-19_instant_tracing/blob/master/Report-EffectiveConfigurationsofaDigitalC ontactTracingApp.pdf.
  47.  “Corona-app soll open source werden,” Süddeutsche Zeitung, 6 May 2020. [Online]. Available: https://www.sueddeutsche.de/digital/ corona-app-tracing-open-source-1.4899711.
  48.  “Cybernetica proposes privacy-preserving decentralised architecture for COVID-19 mobile application for Estonia,” Cybernetica, 6 May 2020. [Online]. Available: https://cyber.ee/news/2020/05-06/.
  49.  E. Emerson, “Temporal and modal logic,” in Handbook of Theoretical Computer Science, J. van Leeuwen, Ed. Elsevier, 1990, vol. B, pp. 995–1072.
  50.  R. Fagin, J.Y. Halpern, Y. Moses, and M.Y. Vardi, Reasoning about Knowledge. MIT Press, 1995.
  51.  J. Broersen, M. Dastani, Z. Huang, and L. van der Torre, “The BOID architecture: conflicts between beliefs, obligations, intentions and desires,” in Proceedings of the Fifth International Conference on Autonomous Agents. ACM Press, 2001, pp. 9–16.
  52.  R. Alur, T.A. Henzinger, and O. Kupferman, “Alternating-time Temporal Logic,” J. ACM, vol. 49, pp. 672–713, 2002.
  53.  N. Bulling, V. Goranko, andW. Jamroga, “Logics for reasoning about strategic abilities in multi-player games,” in Models of Strategic Reasoning. Logics, Games, and Communities, ser. Lecture Notes in Computer Science. Springer, 2015, vol. 8972, pp. 93–136.
  54.  F. Laroussinie and P. Schnoebelen, “A hierarchy of temporal logics with past,” Theoretical Computer Science, vol. 148, no. 2, pp. 303–324, 1995.
  55.  W. Penczek and A. Polrola, Advances in Verification of Time Petri Nets and Timed Automata: A Temporal Logic Approach, ser. Studies in Computational Intelligence. Springer, 2006, vol. 20.
  56.  M. Knapik, É. André, L. Petrucci, W. Jamroga, and W. Penczek, “Timed ATL: forget memory, just count,” J. Artif. Intell., vol. 66, pp. 197–223, 2019.
  57.  W. Jamroga, V. Malvone, and A. Murano, “Natural strategic ability,” Artif. Intell., vol. 277, 2019.
  58.  N. Alechina, B. Logan, H. Nguyen, and A. Rakib, “Resource-bounded alternating-time temporal logic,” in Proceedings of International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS), 2010, pp. 481–488.
  59.  N. Bulling and B. Farwer, “Expressing properties of resource-bounded systems: The logics RTL* and RTL,” in Proceedings of CLIMA, ser. Lecture Notes in Computer Science, vol. 6214, 2010, pp. 22–45.
  60.  C. Baier and M. Z. Kwiatkowska, “Model checking for a probabilistic branching time logic with fairness,” Distributed Comput., vol. 11, no. 3, pp. 125–155, 1998.
  61.  T. Chen, V. Forejt, M. Kwiatkowska, D. Parker, and A. Simaitis, “PRISM-games: A model checker for stochastic multi-player games,” in Proceedings of TACAS, ser. Lecture Notes in Computer Science, vol. 7795. Springer, 2013, pp. 185–191.
  62.  M. Kwiatkowska, G. Norman, and D. Parker, “PRISM: probabilistic symbolic model checker,” in Proceedings of TOOLS, ser. Lecture Notes in Computer Science, vol. 2324. Springer, 2002, pp. 200–204.
  63.  N.M. Ferguson et al., “Impact of non-pharmaceutical interventions (NPIs) to reduce COVID-19 mortality and healthcare demand,” Imperial College London, Tech. Rep. 9 (16‒03‒2020), 2020.
  64.  B. Adamik et al., “Estimation of the severeness rate, death rate, household attack rate and the total number of COVID-19 cases based on 16 115 Polish surveillance records,” Prepr. Lancet, 2020.
  65.  W. Bock et al., “Mitigation and herd immunity strategy for COVID-19 is likely to fail,” medRxiv, 2020.
  66.  R. McCabe et al., “Modelling ICU capacity under different epidemiological scenarios of the COVID-19 pandemic in three western European countries,” Imperial College London, Tech. Rep. 36 (16‒11‒2020), 2020.
  67.  S. Zionts, “A multiple criteria method for choosing among discrete alternatives,” Eur. J. Oper. Res., vol. 7, no. 2, pp. 143–147, 1981, fourth EURO III Special Issue.
  68.  Y. Collette and P. Siarry, Multiobjective Optimization: Principles and Case Studies. Springer, 2004.
  69.  R. Radulescu, P. Mannion, D. M. Roijers, and A. Nowé, “Multi-objective multi-agent decision making: a utilitybased analysis and survey,” Auton. Agents Multi-Agent Syst., vol. 34, no. 1, p. 10, 2020.
Go to article

Authors and Affiliations

Wojciech Jamroga
1 2
David Mestel
1
Peter B. Roenne
1
Peter Y.A. Ryan
1
Marjan Skrobot
1

  1. Interdisciplinary Centre on Security, Reliability and Trust, SnT, University of Luxembourg
  2. Institute of Computer Science, Polish Academy of Sciences, ul. Jana Kazimierza 5, 01-248 Warsaw, Poland

This page uses 'cookies'. Learn more