-
A State of the Art on Recent Progress and Emerging Challenges on Energy Transfer Between Vibrating Modes Under an External Mechanical Force With Time-Varying Frequency From 2020 to 2025
Authors:
Jose Manoel Balthazar,
Jorge Luis Palacios Felix,
Mauricio A. Ribeiro,
Angelo Marcelo Tusset,
Jeferson Jose de Lima,
Vinicius Piccirillo,
Julijana Simonovic,
Nikola D. Nevsic,
Marcos Varanis,
Clivaldo de Oliveira,
Raphaela C. Machado,
Gabriella O M Oliveira
Abstract:
In this paper, we discuss an example of current importance with a future perspective in engineering, in which excitation sources always have limited power, limited inertia, and their frequencies vary according to the instantaneous state of the vibrating system. Practical examples of non-ideal systems are considered. The most common phenomenon for this kind of system is discussed. The period consid…
▽ More
In this paper, we discuss an example of current importance with a future perspective in engineering, in which excitation sources always have limited power, limited inertia, and their frequencies vary according to the instantaneous state of the vibrating system. Practical examples of non-ideal systems are considered. The most common phenomenon for this kind of system is discussed. The period considered is from 2020 to 2025. The specific properties of various models are also discussed. Directions for future investigations are provided. In this paper, the authors revisited some publications based on the assumption that the external excitations are produced by non-ideal sources (RNIS), that is, with limited power supply. Among these applications, nonlinear phenomena such as the Sommerfeld effect and saturation phenomenon were observed, considering fractional damping. Energy harvesters and the Jacobi-Anger expansion were used in the governing equations of motion. We also used the Jacobi-Anger expansion in the case of energy transfer between vibrating modes under an external force with time-varying frequency, which represents one of the future directions of research on non-ideal vibrating systems (RNIS).
△ Less
Submitted 2 June, 2025;
originally announced June 2025.
-
Covert Attacks in Cyber-Physical Control Systems
Authors:
A. O. Sa,
L. F. R. C. Carmo,
R. C. S. Machado
Abstract:
The advantages of using communication networks to interconnect controllers and physical plants motivate the increasing number of Networked Control Systems, in industrial and critical infrastructure facilities. However, this integration also exposes such control systems to new threats, typical of the cyber domain. In this context, studies have been conduced, aiming to explore vulnerabilities and pr…
▽ More
The advantages of using communication networks to interconnect controllers and physical plants motivate the increasing number of Networked Control Systems, in industrial and critical infrastructure facilities. However, this integration also exposes such control systems to new threats, typical of the cyber domain. In this context, studies have been conduced, aiming to explore vulnerabilities and propose security solutions for cyber-physical systems. In this paper, it is proposed a covert attack for service degradation, which is planned based on the intelligence gathered by another attack, herein proposed, referred as System Identification attack. The simulation results demonstrate that the joint operation of the two attacks is capable to affect, in a covert and accurate way, the physical behavior of a system.
△ Less
Submitted 3 April, 2017; v1 submitted 29 September, 2016;
originally announced September 2016.
-
Dijkstra Graphs
Authors:
Lucila M. S. Bento,
Davidson R. Boccardo,
Raphael C. S. Machado,
Flávio K. Miyazawa,
Vinícius G. Pereira de Sá,
Jayme L. Szwarcfiter
Abstract:
We revisit a concept that has been central in some early stages of computer science, that of structured programming: a set of rules that an algorithm must follow in order to acquire a structure that is desirable in many aspects. While much has been written about structured programming, an important issue has been left unanswered: given an arbitrary, compiled program, describe an algorithm to decid…
▽ More
We revisit a concept that has been central in some early stages of computer science, that of structured programming: a set of rules that an algorithm must follow in order to acquire a structure that is desirable in many aspects. While much has been written about structured programming, an important issue has been left unanswered: given an arbitrary, compiled program, describe an algorithm to decide whether or not it is structured, that is, whether it conforms to the stated principles of structured programming. We refer to the classical concept of structured programming, as described by Dijkstra. By employing a graph model and graph-theoretic techniques, we formulate an efficient algorithm for answering this question. To do so, we first introduce the class of graphs which correspond to structured programs, which we call Dijkstra Graphs. Our problem then becomes the recognition of such graphs, for which we present a greedy $O(n)$-time algorithm. Furthermore, we describe an isomorphism algorithm for Dijkstra graphs, whose complexity is also linear in the number of vertices of the graph. Both the recognition and isomorphism algorithms have potential important applications, such as in code similarity analysis.
△ Less
Submitted 18 June, 2016; v1 submitted 27 February, 2016;
originally announced February 2016.
-
Evaluating software-based fingerprint liveness detection using Convolutional Networks and Local Binary Patterns
Authors:
Rodrigo Frassetto Nogueira,
Roberto de Alencar Lotufo,
Rubens Campos Machado
Abstract:
With the growing use of biometric authentication systems in the past years, spoof fingerprint detection has become increasingly important. In this work, we implement and evaluate two different feature extraction techniques for software-based fingerprint liveness detection: Convolutional Networks with random weights and Local Binary Patterns. Both techniques were used in conjunction with a Support…
▽ More
With the growing use of biometric authentication systems in the past years, spoof fingerprint detection has become increasingly important. In this work, we implement and evaluate two different feature extraction techniques for software-based fingerprint liveness detection: Convolutional Networks with random weights and Local Binary Patterns. Both techniques were used in conjunction with a Support Vector Machine (SVM) classifier. Dataset Augmentation was used to increase classifier's performance and a variety of preprocessing operations were tested, such as frequency filtering, contrast equalization, and region of interest filtering. The experiments were made on the datasets used in The Liveness Detection Competition of years 2009, 2011 and 2013, which comprise almost 50,000 real and fake fingerprints' images. Our best method achieves an overall rate of 95.2% of correctly classified samples - an improvement of 35% in test error when compared with the best previously published results.
△ Less
Submitted 3 August, 2015;
originally announced August 2015.
-
Hierarchical complexity of 2-clique-colouring weakly chordal graphs and perfect graphs having cliques of size at least 3
Authors:
Hélio B. Macêdo Filho,
Raphael C. S. Machado,
Celina M. H. de Figueiredo
Abstract:
A clique of a graph is a maximal set of vertices of size at least 2 that induces a complete graph. A $k$-clique-colouring of a graph is a colouring of the vertices with at most $k$ colours such that no clique is monochromatic. Défossez proved that the 2-clique-colouring of perfect graphs is a $Σ_2^P$-complete problem [J. Graph Theory 62 (2009) 139--156]. We strengthen this result by showing that i…
▽ More
A clique of a graph is a maximal set of vertices of size at least 2 that induces a complete graph. A $k$-clique-colouring of a graph is a colouring of the vertices with at most $k$ colours such that no clique is monochromatic. Défossez proved that the 2-clique-colouring of perfect graphs is a $Σ_2^P$-complete problem [J. Graph Theory 62 (2009) 139--156]. We strengthen this result by showing that it is still $Σ_2^P$-complete for weakly chordal graphs. We then determine a hierarchy of nested subclasses of weakly chordal graphs whereby each graph class is in a distinct complexity class, namely $Σ_2^P$-complete, $\mathcal{NP}$-complete, and $\mathcal{P}$. We solve an open problem posed by Kratochvíl and Tuza to determine the complexity of 2-clique-colouring of perfect graphs with all cliques having size at least 3 [J. Algorithms 45 (2002), 40--54], proving that it is a $Σ_2^P$-complete problem. We then determine a hierarchy of nested subclasses of perfect graphs with all cliques having size at least 3 whereby each graph class is in a distinct complexity class, namely $Σ_2^P$-complete, $\mathcal{NP}$-complete, and $\mathcal{P}$.
△ Less
Submitted 11 December, 2013; v1 submitted 7 December, 2013;
originally announced December 2013.
-
Complexity of colouring problems restricted to unichord-free and \{square,unichord\}-free graphs
Authors:
Raphael C. S. Machado,
Celina M. H. de Figueiredo,
Nicolas Trotignon
Abstract:
A \emph{unichord} in a graph is an edge that is the unique chord of a cycle. A \emph{square} is an induced cycle on four vertices. A graph is \emph{unichord-free} if none of its edges is a unichord. We give a slight restatement of a known structure theorem for unichord-free graphs and use it to show that, with the only exception of the complete graph $K_4$, every square-free, unichord-free graph o…
▽ More
A \emph{unichord} in a graph is an edge that is the unique chord of a cycle. A \emph{square} is an induced cycle on four vertices. A graph is \emph{unichord-free} if none of its edges is a unichord. We give a slight restatement of a known structure theorem for unichord-free graphs and use it to show that, with the only exception of the complete graph $K_4$, every square-free, unichord-free graph of maximum degree~3 can be total-coloured with four colours. Our proof can be turned into a polynomial time algorithm that actually outputs the colouring. This settles the class of square-free, unichord-free graphs as a class for which edge-colouring is NP-complete but total-colouring is polynomial.
△ Less
Submitted 11 September, 2013;
originally announced September 2013.
-
Edge-colouring and total-colouring chordless graphs
Authors:
Raphael C. S. Machado,
Celina M. H. de Figueiredo,
Nicolas Trotignon
Abstract:
A graph $G$ is \emph{chordless} if no cycle in $G$ has a chord. In the present work we investigate the chromatic index and total chromatic number of chordless graphs. We describe a known decomposition result for chordless graphs and use it to establish that every chordless graph of maximum degree $Δ\geq 3$ has chromatic index $Δ$ and total chromatic number $Δ+ 1$. The proofs are algorithmic in the…
▽ More
A graph $G$ is \emph{chordless} if no cycle in $G$ has a chord. In the present work we investigate the chromatic index and total chromatic number of chordless graphs. We describe a known decomposition result for chordless graphs and use it to establish that every chordless graph of maximum degree $Δ\geq 3$ has chromatic index $Δ$ and total chromatic number $Δ+ 1$. The proofs are algorithmic in the sense that we actually output an optimal colouring of a graph instance in polynomial time.
△ Less
Submitted 7 September, 2013;
originally announced September 2013.
-
Towards a provably resilient scheme for graph-based watermarking
Authors:
Lucila M. S. Bento,
Davidson Boccardo,
Raphael C. S. Machado,
Vinícius G. Pereira de Sá,
Jayme L. Szwarcfiter
Abstract:
Digital watermarks have been considered a promising way to fight software piracy. Graph-based watermarking schemes encode authorship/ownership data as control-flow graph of dummy code. In 2012, Chroni and Nikolopoulos developed an ingenious such scheme which was claimed to withstand attacks in the form of a single edge removal. We extend the work of those authors in various aspects. First, we give…
▽ More
Digital watermarks have been considered a promising way to fight software piracy. Graph-based watermarking schemes encode authorship/ownership data as control-flow graph of dummy code. In 2012, Chroni and Nikolopoulos developed an ingenious such scheme which was claimed to withstand attacks in the form of a single edge removal. We extend the work of those authors in various aspects. First, we give a formal characterization of the class of graphs generated by their encoding function. Then, we formulate a linear-time algorithm which recovers from ill-intentioned removals of $k \leq 2$ edges, therefore proving their claim. Furthermore, we provide a simpler decoding function and an algorithm to restore watermarks with an arbitrary number of missing edges whenever at all possible. By disclosing and improving upon the resilience of Chroni and Nikolopoulos's watermark, our results reinforce the interest in regarding it as a possible solution to numerous applications.
△ Less
Submitted 4 January, 2014; v1 submitted 28 February, 2013;
originally announced February 2013.
-
Biclique-colouring verification complexity and biclique-colouring power graphs
Authors:
Hélio B. Macêdo Filho,
Simone Dantas,
Raphael C. S. Machado,
Celina M. H. de Figueiredo
Abstract:
Biclique-colouring is a colouring of the vertices of a graph in such a way that no maximal complete bipartite subgraph with at least one edge is monochromatic. We show that it is coNP-complete to check whether a given function that associates a colour to each vertex is a biclique-colouring, a result that justifies the search for structured classes where the biclique-colouring problem could be effi…
▽ More
Biclique-colouring is a colouring of the vertices of a graph in such a way that no maximal complete bipartite subgraph with at least one edge is monochromatic. We show that it is coNP-complete to check whether a given function that associates a colour to each vertex is a biclique-colouring, a result that justifies the search for structured classes where the biclique-colouring problem could be efficiently solved. We consider biclique-colouring restricted to powers of paths and powers of cycles. We determine the biclique-chromatic number of powers of paths and powers of cycles. The biclique-chromatic number of a power of a path P_{n}^{k} is max(2k + 2 - n, 2) if n >= k + 1 and exactly n otherwise. The biclique-chromatic number of a power of a cycle C_n^k is at most 3 if n >= 2k + 2 and exactly n otherwise; we additionally determine the powers of cycles that are 2-biclique-colourable. All proofs are algorithmic and provide polynomial-time biclique-colouring algorithms for graphs in the investigated classes.
△ Less
Submitted 2 April, 2013; v1 submitted 12 March, 2012;
originally announced March 2012.