-
Crossing Borders Without Crossing Boundaries: How Sociolinguistic Awareness Can Optimize User Engagement with Localized Spanish AI Models Across Hispanophone Countries
Authors:
Martin Capdevila,
Esteban Villa Turek,
Ellen Karina Chumbe Fernandez,
Luis Felipe Polo Galvez,
Luis Cadavid,
Andrea Marroquin,
Rebeca Vargas Quesada,
Johanna Crew,
Nicole Vallejo Galarraga,
Christopher Rodriguez,
Diego Gutierrez,
Radhi Datla
Abstract:
Large language models are, by definition, based on language. In an effort to underscore the critical need for regional localized models, this paper examines primary differences between variants of written Spanish across Latin America and Spain, with an in-depth sociocultural and linguistic contextualization therein. We argue that these differences effectively constitute significant gaps in the quo…
▽ More
Large language models are, by definition, based on language. In an effort to underscore the critical need for regional localized models, this paper examines primary differences between variants of written Spanish across Latin America and Spain, with an in-depth sociocultural and linguistic contextualization therein. We argue that these differences effectively constitute significant gaps in the quotidian use of Spanish among dialectal groups by creating sociolinguistic dissonances, to the extent that locale-sensitive AI models would play a pivotal role in bridging these divides. In doing so, this approach informs better and more efficient localization strategies that also serve to more adequately meet inclusivity goals, while securing sustainable active daily user growth in a major low-risk investment geographic area. Therefore, implementing at least the proposed five sub variants of Spanish addresses two lines of action: to foment user trust and reliance on AI language models while also demonstrating a level of cultural, historical, and sociolinguistic awareness that reflects positively on any internationalization strategy.
△ Less
Submitted 14 May, 2025;
originally announced May 2025.
-
Digital Video Manipulation Detection Technique Based on Compression Algorithms
Authors:
Edgar Gonzalez Fernandez,
Ana Lucila Sandoval Orozco,
Luis Javier Garcia Villalba
Abstract:
Digital images and videos play a very important role in everyday life. Nowadays, people have access the affordable mobile devices equipped with advanced integrated cameras and powerful image processing applications. Technological development facilitates not only the generation of multimedia content, but also the intentional modification of it, either with recreational or malicious purposes. This i…
▽ More
Digital images and videos play a very important role in everyday life. Nowadays, people have access the affordable mobile devices equipped with advanced integrated cameras and powerful image processing applications. Technological development facilitates not only the generation of multimedia content, but also the intentional modification of it, either with recreational or malicious purposes. This is where forensic techniques to detect manipulation of images and videos become essential. This paper proposes a forensic technique by analysing compression algorithms used by the H.264 coding. The presence of recompression uses information of macroblocks, a characteristic of the H.264-MPEG4 standard, and motion vectors. A Vector Support Machine is used to create the model that allows to accurately detect if a video has been recompressed.
△ Less
Submitted 3 February, 2024;
originally announced March 2024.
-
Outsourcing policies for the Facility Location Problem with Bernoulli Demand
Authors:
Maria Albareda-Sambola,
Elena Fernández,
Francisco Saldanha-da-Gama
Abstract:
This paper focuses on the Facility Location Problem with Bernoulli Demand, a discrete facility location problem with uncertainty where the joint distribution of the customers' demands is expressed by means of a set of possible scenarios. A two-stage stochastic program with recourse is used to select the facility locations and the a priori assignments of customers to open plants, together with the…
▽ More
This paper focuses on the Facility Location Problem with Bernoulli Demand, a discrete facility location problem with uncertainty where the joint distribution of the customers' demands is expressed by means of a set of possible scenarios. A two-stage stochastic program with recourse is used to select the facility locations and the a priori assignments of customers to open plants, together with the a posteriori strategy to apply in those realizations where the a priori solution is not feasible. Four alternative outsourcing policies are studied for the recourse action, and a mathematical programming formulation is presented for each of them. Extensive computational experiments have been carried-out to analyze the performance of each of the formulations and to compare the quality of the solutions produced by each of them relative to the other outsourcing policies.
△ Less
Submitted 29 October, 2023;
originally announced October 2023.
-
A Survey Report on Hardware Trojan Detection by Multiple-Parameter Side-Channel Analysis
Authors:
Samir R Katte,
Keith E Fernandez
Abstract:
A major security threat to an integrated circuit (IC) design is the Hardware Trojan attack which is a malicious modification of the design. Previously several papers have investigated into side-channel analysis to detect the presence of Hardware Trojans. The side channel analysis were prescribed in these papers as an alternative to the conventional logic testing for detecting malicious modificatio…
▽ More
A major security threat to an integrated circuit (IC) design is the Hardware Trojan attack which is a malicious modification of the design. Previously several papers have investigated into side-channel analysis to detect the presence of Hardware Trojans. The side channel analysis were prescribed in these papers as an alternative to the conventional logic testing for detecting malicious modification in the design. It has been found that these conventional logic testing are ineffective when it comes to detecting small Trojans due to decrease in the sensitivity due to process variations encountered in the manufacturing techniques. The main paper under consideration in this survey report focuses on proposing a new technique to detect Trojans by using multiple-parameter side-channel analysis. The novel idea will be explained thoroughly in this survey report. We also look into several other papers, which talk about single parameter analysis and how they are implemented. We analyzed the short comings of those single parameter analysis techniques and we then show how this multi-parameter analysis technique is better. Finally we will talk about the combined side-channel analysis and logic testing approach in which there is higher detection coverage for hardware Trojan circuits of different types and sizes.
△ Less
Submitted 4 July, 2023;
originally announced July 2023.
-
A comparison between traditional and Serverless technologies in a microservices setting
Authors:
Juan Mera Menéndez,
Jose Emilio Labra Gayo,
Enrique Riesgo Canal,
Aitor Echevarría Fernández
Abstract:
Serverless technologies, also known as FaaS (Function as a Service), are promoted as solutions that provide dynamic scalability, speed of development, cost-per-consumption model, and the ability to focus on the code while taking attention away from the infrastructure that is managed by the vendor. A microservices architecture is defined by the interaction and management of the application state by…
▽ More
Serverless technologies, also known as FaaS (Function as a Service), are promoted as solutions that provide dynamic scalability, speed of development, cost-per-consumption model, and the ability to focus on the code while taking attention away from the infrastructure that is managed by the vendor. A microservices architecture is defined by the interaction and management of the application state by several independent services, each with a well-defined domain. When implementing software architectures based on microservices, there are several decisions to take about the technologies and the possibility of adopting Serverless. In this study, we implement 9 prototypes of the same microservice application using different technologies. Some architectural decisions and their impact on the performance and cost of the result obtained are analysed. We use Amazon Web Services and start with an application that uses a more traditional deployment environment (Kubernetes) and migration to a serverless architecture is performed by combining and analysing the impact (both cost and performance) of the use of different technologies such as AWS ECS Fargate, AWS Lambda, DynamoDB or DocumentDB.
△ Less
Submitted 23 May, 2023;
originally announced May 2023.
-
Topology optimization for additive manufacturing with length scale, overhang, and building orientation constraints
Authors:
Prabhat Kumar,
Eduardo Fernández
Abstract:
This paper presents a density-based topology optimization approach considering additive manufacturing limitations. The presented method considers the minimum size of parts, the minimum size of cavities, the inability of printing overhanging parts without the use of sacrificial supporting structures, and the printing directions. These constraints are geometrically addressed and implemented. The min…
▽ More
This paper presents a density-based topology optimization approach considering additive manufacturing limitations. The presented method considers the minimum size of parts, the minimum size of cavities, the inability of printing overhanging parts without the use of sacrificial supporting structures, and the printing directions. These constraints are geometrically addressed and implemented. The minimum size on solid and void zones is imposed through a well-known filtering technique. The sacrificial support material is reduced using a constraint that limits the maximum overhang angle of parts by comparing the structural gradient with a critical reference slope. Due to the local nature of the gradient, the chosen restriction is prone to introduce parts that meet the structural slope but that may not be self-supporting. The restriction limits the maximum overhang angle for a user-defined printing direction, which could reduce structural performance if the orientation is not properly selected. To ease these challenges, a new approach to reduce the introduction of such non-self-supporting parts and a novel method that includes different printing directions in the maximum overhang angle constraint are presented. The proposed strategy for considering the minimum size of solid and void phases, maximum overhang angle, and printing direction, is illustrated by solving a set of 2D benchmark design problems including stiff structures and compliant mechanisms. We also provide MATLAB codes in the appendix for educational purposes and for replication of the results.
△ Less
Submitted 15 April, 2022;
originally announced April 2022.
-
HAIDA: Biometric technological therapy tools for neurorehabilitation of Cognitive Impairment
Authors:
Elsa Fernandez,
Jordi Sole-Casals,
Pilar M. Calvo,
Marcos Faundez-Zanuy,
Karmele Lopez-de-Ipina
Abstract:
Dementia, and specially Alzheimer s disease (AD) and Mild Cognitive Impairment (MCI) are one of the most important diseases suffered by elderly population. Music therapy is one of the most widely used non-pharmacological treatment in the field of cognitive impairments, given that music influences their mood, behavior, the decrease of anxiety, as well as facilitating reminiscence, emotional express…
▽ More
Dementia, and specially Alzheimer s disease (AD) and Mild Cognitive Impairment (MCI) are one of the most important diseases suffered by elderly population. Music therapy is one of the most widely used non-pharmacological treatment in the field of cognitive impairments, given that music influences their mood, behavior, the decrease of anxiety, as well as facilitating reminiscence, emotional expressions and movement. In this work we present HAIDA, a multi-platform support system for Musical Therapy oriented to cognitive impairment, which includes not only therapy tools but also non-invasive biometric analysis, speech, activity and hand activity. At this moment the system is on use and recording the first sets of data.
△ Less
Submitted 9 March, 2022;
originally announced March 2022.
-
Machine Learning Method for Functional Assessment of Retinal Models
Authors:
Nikolas Papadopoulos,
Nikos Melanitis,
Antonio Lozano,
Cristina Soto-Sanchez,
Eduardo Fernandez,
Konstantina S Nikita
Abstract:
Challenges in the field of retinal prostheses motivate the development of retinal models to accurately simulate Retinal Ganglion Cells (RGCs) responses. The goal of retinal prostheses is to enable blind individuals to solve complex, reallife visual tasks. In this paper, we introduce the functional assessment (FA) of retinal models, which describes the concept of evaluating the performance of retin…
▽ More
Challenges in the field of retinal prostheses motivate the development of retinal models to accurately simulate Retinal Ganglion Cells (RGCs) responses. The goal of retinal prostheses is to enable blind individuals to solve complex, reallife visual tasks. In this paper, we introduce the functional assessment (FA) of retinal models, which describes the concept of evaluating the performance of retinal models on visual understanding tasks. We present a machine learning method for FA: we feed traditional machine learning classifiers with RGC responses generated by retinal models, to solve object and digit recognition tasks (CIFAR-10, MNIST, Fashion MNIST, Imagenette). We examined critical FA aspects, including how the performance of FA depends on the task, how to optimally feed RGC responses to the classifiers and how the number of output neurons correlates with the model's accuracy. To increase the number of output neurons, we manipulated input images - by splitting and then feeding them to the retinal model and we found that image splitting does not significantly improve the model's accuracy. We also show that differences in the structure of datasets result in largely divergent performance of the retinal model (MNIST and Fashion MNIST exceeded 80% accuracy, while CIFAR-10 and Imagenette achieved ~40%). Furthermore, retinal models which perform better in standard evaluation, i.e. more accurately predict RGC response, perform better in FA as well. However, unlike standard evaluation, FA results can be straightforwardly interpreted in the context of comparing the quality of visual perception.
△ Less
Submitted 4 February, 2022;
originally announced February 2022.
-
Preference Incorporation into Many-Objective Optimization: An Outranking-based Ant Colony Algorithm
Authors:
Gilberto Rivera,
Carlos A. Coello Coello,
Laura Cruz-Reyes,
Eduardo R. Fernandez,
Claudia Gomez-Santillan,
Nelson Rangel-Valdez
Abstract:
In this paper, we enriched Ant Colony Optimization (ACO) with interval outranking to develop a novel multiobjective ACO optimizer to approach problems with many objective functions. This proposal is suitable if the preferences of the Decision Maker (DM) can be modeled through outranking relations. The introduced algorithm (named Interval Outranking-based ACO, IO-ACO) is the first ant-colony optimi…
▽ More
In this paper, we enriched Ant Colony Optimization (ACO) with interval outranking to develop a novel multiobjective ACO optimizer to approach problems with many objective functions. This proposal is suitable if the preferences of the Decision Maker (DM) can be modeled through outranking relations. The introduced algorithm (named Interval Outranking-based ACO, IO-ACO) is the first ant-colony optimizer that embeds an outranking model to bear vagueness and ill-definition of DM preferences. This capacity is the most differentiating feature of IO-ACO because this issue is highly relevant in practice. IO-ACO biases the search towards the Region of Interest (RoI), the privileged zone of the Pareto frontier containing the solutions that better match the DM preferences. Two widely studied benchmarks were utilized to measure the efficiency of IO-ACO, i.e., the DTLZ and WFG test suites. Accordingly, IO-ACO was compared with two competitive many-objective optimizers: The Indicator-based Many-Objective ACO and the Multiobjective Evolutionary Algorithm Based on Decomposition. The numerical results show that IO-ACO approximates the Region of Interest (RoI) better than the leading metaheuristics based on approximating the Pareto frontier alone.
△ Less
Submitted 15 July, 2021;
originally announced July 2021.
-
Topology Optimization for Large-Scale Additive Manufacturing: Generating designs tailored to the deposition nozzle size
Authors:
Eduardo Fernández,
Can Ayas,
Matthijs Langelaar,
Pierre Duysinx
Abstract:
Additive Manufacturing (AM) processes intended for large scale components deposit large volumes of material to shorten process duration. This reduces the resolution of the AM process, which is typically defined by the size of the deposition nozzle. If the resolution limitation is not considered when designing for Large-Scale Additive Manufacturing (LSAM), difficulties can arise in the manufacturin…
▽ More
Additive Manufacturing (AM) processes intended for large scale components deposit large volumes of material to shorten process duration. This reduces the resolution of the AM process, which is typically defined by the size of the deposition nozzle. If the resolution limitation is not considered when designing for Large-Scale Additive Manufacturing (LSAM), difficulties can arise in the manufacturing process, which may require the adaptation of the deposition parameters. This work incorporates the nozzle size constraint into Topology Optimization (TO) in order to generate optimized designs suitable to the process resolution. This article proposes and compares two methods, which are based on existing TO techniques that enable control of minimum and maximum member size, and of minimum cavity size. The first method requires the minimum and maximum member size to be equal to the deposition nozzle size, thus design features of uniform width are obtained in the optimized design. The second method defines the size of the solid members sufficiently small for the resulting structure to resemble a structural skeleton, which can be interpreted as the deposition path. Through filtering and projection techniques, the thin structures are thickened according to the chosen nozzle size. Thus, a topology tailored to the size of the deposition nozzle is obtained along with a deposition proposal. The methods are demonstrated and assessed using 2D and 3D benchmark problems.
△ Less
Submitted 17 May, 2021;
originally announced May 2021.
-
A numerical scheme for filter boundary conditions in topology optimization on regular and irregular meshes
Authors:
Prabhat Kumar,
Eduardo Fernández
Abstract:
In density-based topology optimization, design variables associated to the boundaries of the design domain require unique treatment to negate boundary effects arising from the filtering technique. An effective approach to deal with filtering boundary conditions is to extend the design domain beyond the borders using void densities. Although the approach is easy to implement, it introduces extra co…
▽ More
In density-based topology optimization, design variables associated to the boundaries of the design domain require unique treatment to negate boundary effects arising from the filtering technique. An effective approach to deal with filtering boundary conditions is to extend the design domain beyond the borders using void densities. Although the approach is easy to implement, it introduces extra computational cost required to store the additional Finite Elements (FEs). This work proposes a numerical technique for the density filter that emulates an extension of the design domain, thus, it avoids boundary effects without demanding additional computational cost, besides it is very simple to implement on both regular and irregular meshes. The numerical scheme is demonstrated using the compliance minimization problem on two-dimensional design domains. In addition, this article presents a discussion regarding the use of a real extension of the design domain, where the Finite Element Analysis (FEA) and volume restriction are influenced. Through a quantitative study, it is shown that affecting FEA or volume restriction with an extension of the FE mesh promotes the disconnection of material from the boundaries of the design domain, which is interpreted as a numerical instability promoting convergence towards local optimums.
△ Less
Submitted 4 January, 2021;
originally announced January 2021.
-
InTAS -- The Ingolstadt Traffic Scenario for SUMO
Authors:
Silas C. Lobo,
Stefan Neumeier,
Evelio M. G. Fernandez,
Christian Facchi
Abstract:
Vehicular Ad Hoc Networks (VANETs) are expected to be the next big step towards safer road transport, supporting applications to exchange information between vehicles. To develop novel applications for this area a high number of tests, considering all traffic situations, are demanded. However, it is unfeasible to reproduce these tests in real life, by the fact that any failure on the applications…
▽ More
Vehicular Ad Hoc Networks (VANETs) are expected to be the next big step towards safer road transport, supporting applications to exchange information between vehicles. To develop novel applications for this area a high number of tests, considering all traffic situations, are demanded. However, it is unfeasible to reproduce these tests in real life, by the fact that any failure on the applications would cause severe impacts on transport system safety and could risk human lives. Thus, this paper presents the concept, model, and validation for InTAS, a realistic traffic scenario for Ingolstadt. InTAS road topology accurately represents Ingolstadt real road map. Elements such as buildings, bus stops, and traffic lights were added to the map. Twenty traffic lights systems were simulated according to the real program deployed on the traffic lights. Traffic demand was modeled based on the activitygen method, considering demographic data and real-traffic information. The city public transport system was also simulated accordingly to bus time-tables and their routes. The simulation step was implemented considering the best value for device.rerouting.probability, which was defined by evaluating InTAS output and real traffic data. The scenario was validated by comparing real-traffic data from 24 measurement points with InTAS simulation results.
△ Less
Submitted 24 November, 2020;
originally announced November 2020.
-
Segmentation-free Estimation of Aortic Diameters from MRI Using Deep Learning
Authors:
Axel Aguerreberry,
Ezequiel de la Rosa,
Alain Lalande,
Elmer Fernandez
Abstract:
Accurate and reproducible measurements of the aortic diameters are crucial for the diagnosis of cardiovascular diseases and for therapeutic decision making. Currently, these measurements are manually performed by healthcare professionals, being time consuming, highly variable, and suffering from lack of reproducibility. In this work we propose a supervised deep learning method for the direct estim…
▽ More
Accurate and reproducible measurements of the aortic diameters are crucial for the diagnosis of cardiovascular diseases and for therapeutic decision making. Currently, these measurements are manually performed by healthcare professionals, being time consuming, highly variable, and suffering from lack of reproducibility. In this work we propose a supervised deep learning method for the direct estimation of aortic diameters. The approach is devised and tested over 100 magnetic resonance angiography scans without contrast agent. All data was expert-annotated at six aortic locations typically used in clinical practice. Our approach makes use of a 3D+2D convolutional neural network (CNN) that takes as input a 3D scan and outputs the aortic diameter at a given location. In a 5-fold cross-validation comparison against a fully 3D CNN and against a 3D multiresolution CNN, our approach was consistently superior in predicting the aortic diameters. Overall, the 3D+2D CNN achieved a mean absolute error between 2.2-2.4 mm depending on the considered aortic location. These errors are less than 1 mm higher than the inter-observer variability. Thus, suggesting that our method makes predictions almost reaching the expert's performance. We conclude that the work allows to further explore automatic algorithms for direct estimation of anatomical structures without the necessity of a segmentation step. It also opens possibilities for the automation of cardiovascular measurements in clinical settings.
△ Less
Submitted 9 September, 2020;
originally announced September 2020.
-
Classification of Industrial Control Systems screenshots using Transfer Learning
Authors:
Pablo Blanco Medina,
Eduardo Fidalgo Fernandez,
Enrique Alegre,
Francisco Jáñez Martino,
Roberto A. Vasco-Carofilis,
Víctor Fidalgo Villar
Abstract:
Industrial Control Systems depend heavily on security and monitoring protocols. Several tools are available for this purpose, which scout vulnerabilities and take screenshots from various control panels for later analysis. However, they do not adequately classify images into specific control groups, which can difficult operations performed by manual operators. In order to solve this problem, we us…
▽ More
Industrial Control Systems depend heavily on security and monitoring protocols. Several tools are available for this purpose, which scout vulnerabilities and take screenshots from various control panels for later analysis. However, they do not adequately classify images into specific control groups, which can difficult operations performed by manual operators. In order to solve this problem, we use transfer learning with five CNN architectures, pre-trained on Imagenet, to determine which one best classifies screenshots obtained from Industrial Controls Systems. Using 337 manually labeled images, we train these architectures and study their performance both in accuracy and CPU and GPU time. We find out that MobilenetV1 is the best architecture based on its 97,95% of F1-Score, and its speed on CPU with 0.47 seconds per image. In systems where time is critical and GPU is available, VGG16 is preferable because it takes 0.04 seconds to process images, but dropping performance to 87,67%.
△ Less
Submitted 11 September, 2020; v1 submitted 20 May, 2020;
originally announced May 2020.
-
Perceptual Hashing applied to Tor domains recognition
Authors:
Rubel Biswas,
Roberto A. Vasco-Carofilis,
Eduardo Fidalgo Fernandez,
Francisco Jáñez Martino,
Pablo Blanco Medina
Abstract:
The Tor darknet hosts different types of illegal content, which are monitored by cybersecurity agencies. However, manually classifying Tor content can be slow and error-prone. To support this task, we introduce Frequency-Dominant Neighborhood Structure (F-DNS), a new perceptual hashing method for automatically classifying domains by their screenshots. First, we evaluated F-DNS using images subject…
▽ More
The Tor darknet hosts different types of illegal content, which are monitored by cybersecurity agencies. However, manually classifying Tor content can be slow and error-prone. To support this task, we introduce Frequency-Dominant Neighborhood Structure (F-DNS), a new perceptual hashing method for automatically classifying domains by their screenshots. First, we evaluated F-DNS using images subject to various content preserving operations. We compared them with their original images, achieving better correlation coefficients than other state-of-the-art methods, especially in the case of rotation. Then, we applied F-DNS to categorize Tor domains using the Darknet Usage Service Images-2K (DUSI-2K), a dataset with screenshots of active Tor service domains. Finally, we measured the performance of F-DNS against an image classification approach and a state-of-the-art hashing method. Our proposal obtained 98.75% accuracy in Tor images, surpassing all other methods compared.
△ Less
Submitted 21 May, 2020; v1 submitted 20 May, 2020;
originally announced May 2020.
-
Classifying Suspicious Content in Tor Darknet
Authors:
Eduardo Fidalgo Fernandez,
Roberto Andrés Vasco Carofilis,
Francisco Jáñez Martino,
Pablo Blanco Medina
Abstract:
One of the tasks of law enforcement agencies is to find evidence of criminal activity in the Darknet. However, visiting thousands of domains to locate visual information containing illegal acts manually requires a considerable amount of time and resources. Furthermore, the background of the images can pose a challenge when performing classification. To solve this problem, in this paper, we explore…
▽ More
One of the tasks of law enforcement agencies is to find evidence of criminal activity in the Darknet. However, visiting thousands of domains to locate visual information containing illegal acts manually requires a considerable amount of time and resources. Furthermore, the background of the images can pose a challenge when performing classification. To solve this problem, in this paper, we explore the automatic classification Tor Darknet images using Semantic Attention Keypoint Filtering, a strategy that filters non-significant features at a pixel level that do not belong to the object of interest, by combining saliency maps with Bag of Visual Words (BoVW). We evaluated SAKF on a custom Tor image dataset against CNN features: MobileNet v1 and Resnet50, and BoVW using dense SIFT descriptors, achieving a result of 87.98% accuracy and outperforming all other approaches.
△ Less
Submitted 21 May, 2020; v1 submitted 20 May, 2020;
originally announced May 2020.
-
Imposing minimum and maximum member size, minimum cavity size, and minimum separation distance between solid members in topology optimization
Authors:
Eduardo Fernández,
Kai-ke Yang,
Stijn Koppen,
Pablo Alarcón,
Simon Bauduin,
Pierre Duysinx
Abstract:
This paper focuses on density-based topology optimization and proposes a combined method to simultaneously impose Minimum length scale in the Solid phase (MinSolid), Minimum length scale in the Void phase (MinVoid) and Maximum length scale in the Solid phase (MaxSolid). MinSolid and MinVoid mean that the size of solid parts and cavities must be greater than the size of a prescribed circle or spher…
▽ More
This paper focuses on density-based topology optimization and proposes a combined method to simultaneously impose Minimum length scale in the Solid phase (MinSolid), Minimum length scale in the Void phase (MinVoid) and Maximum length scale in the Solid phase (MaxSolid). MinSolid and MinVoid mean that the size of solid parts and cavities must be greater than the size of a prescribed circle or sphere. This is ensured through the robust design approach based on eroded, intermediate and dilated designs. MaxSolid seeks to restrict the formation of solid parts larger than a prescribed size, which is imposed through local volume restrictions. In the first part of this article, we show that by proportionally restricting the maximum size of the eroded, intermediate and dilated designs, it is possible to obtain optimized designs satisfying, simultaneously, MinSolid, MinVoid and MaxSolid. However, in spite of obtaining designs with crisp boundaries, some results can be difficult to manufacture due to the presence of multiple rounded cavities, which are introduced by the maximum size restriction with the sole purpose of avoiding thick solid members in the structure. To address this issue, in the second part of this article we propose a new geometric constraint that seeks to control the minimum separation distance between two solid members, also called the Minimum Gap (MinGap). Differently from MinVoid, MinGap introduces large void areas that do not necessarily have to be round. 2D and 3D test cases show that simultaneous control of MinSolid, MinVoid, MaxSolid and MinGap can be useful to improve the manufacturability of maximum size constrained designs.
△ Less
Submitted 29 February, 2020;
originally announced March 2020.
-
Massive Wireless Energy Transfer: Enabling Sustainable IoT Towards 6G Era
Authors:
Onel L. Alcaraz López,
Hirley Alves,
Richard Demo Souza,
Samuel Montejo-Sánchez,
Evelio M. García Fernández,
Matti Latva-aho
Abstract:
Recent advances on wireless energy transfer (WET) make it a promising solution for powering future Internet of Things (IoT) devices enabled by the upcoming sixth generation (6G) era. The main architectures, challenges and techniques for efficient and scalable wireless powering are overviewed in this paper. Candidates enablers such as energy beamforming (EB), distributed antenna systems (DAS), adva…
▽ More
Recent advances on wireless energy transfer (WET) make it a promising solution for powering future Internet of Things (IoT) devices enabled by the upcoming sixth generation (6G) era. The main architectures, challenges and techniques for efficient and scalable wireless powering are overviewed in this paper. Candidates enablers such as energy beamforming (EB), distributed antenna systems (DAS), advances on devices' hardware and programmable medium, new spectrum opportunities, resource scheduling and distributed ledger technology are outlined. Special emphasis is placed on discussing the suitability of channel state information (CSI)-limited/free strategies when powering simultaneously a massive number of devices. The benefits from combining DAS and EB, and from using average CSI whenever available, are numerically illustrated. The pros and cons of the state-of-the-art CSI-free WET techniques in ultra-low power setups are thoroughly revised, and some possible future enhancements are outlined. Finally, key research directions towards realizing WET-enabled massive IoT networks in the 6G era are identified and discussed in detail.
△ Less
Submitted 2 January, 2021; v1 submitted 11 December, 2019;
originally announced December 2019.
-
Automated Smart Wick System-Based Microfarm Using Internet of Things
Authors:
R. Jorda, Jr.,
C. Alcabasa,
A. Buhay,
E. C. Dela Cruz,
J. P. Mendoza,
A. Tolentino,
L. K. Tolentino,
E. Fernandez,
A. Thio-ac,
J. Velasco,
N. Arago
Abstract:
This paper presents a study conducted to allow urban farmers to remotely monitor their farm through the design and development of an Internet of Things-based (IoT) microfarm prototype which utilized wick system as planting method. The system involves the detection of three environmental parameters namely, light intensity, soil moisture and temperature through the use of respective sensors which we…
▽ More
This paper presents a study conducted to allow urban farmers to remotely monitor their farm through the design and development of an Internet of Things-based (IoT) microfarm prototype which utilized wick system as planting method. The system involves the detection of three environmental parameters namely, light intensity, soil moisture and temperature through the use of respective sensors which were connected to the Arduino microcontroller, the sensor node of the system. Irregularities in the aforementioned parameters were neutralized through the use of parameter regulators such as LED growlight strips, water pump and air cooler. The data collected by these sensors were gathered by the Arduino microcontroller and were sent to the Web database through the IoT gateway which was the Raspberry Pi computer chip. These data were also sent to an Android unit installed with the Microfarm Companion application which was capable of monitoring and controlling the environmental parameters observed in the microfarm. The application allows the user to view the current value of the parameter involved and to choose whether to control the parameter regulators automatically or manually. The microfarm system runs autonomously which reduces the labor required to produce healthy plants and crops. Mustard greens samples were used in testing the system. After a month of monitoring the height of the samples, it was observed that the average height of the samples is about 0.23 cm taller than the standard height. The proponents has also tested the system functionality by evaluating the sensor data log that provides the values gathered by the sensors and the turn-on times of the parameter regulators. From these data, it can be observed that whenever the values obtained by the sensors fall outside the threshold range, the parameter regulators turns on, indicating that the system is working properly.
△ Less
Submitted 30 October, 2019;
originally announced November 2019.
-
Rate Control for Wireless-Powered Communication Network with Reliability and Delay Constraints
Authors:
Onel L. Alcaraz López,
Hirley Alves,
Richard Demo Souza,
Samuel Montejo-Sánchez,
Evelio M. García Fernández
Abstract:
We consider a two-phase Wireless-Powered Communication Network under Nakagami-m fading, where a wireless energy transfer process first powers a sensor node that then uses such energy to transmit its data in the wireless information transmission phase. We explore a fixed transmit rate scheme designed to cope with the reliability and delay constraints of the system while attaining closed-form approx…
▽ More
We consider a two-phase Wireless-Powered Communication Network under Nakagami-m fading, where a wireless energy transfer process first powers a sensor node that then uses such energy to transmit its data in the wireless information transmission phase. We explore a fixed transmit rate scheme designed to cope with the reliability and delay constraints of the system while attaining closed-form approximations for the optimum wireless energy transfer and wireless information transmission blocklength. Then, a more-elaborate rate control strategy exploiting the readily available battery charge information is proposed and the results evidence its outstanding performance when compared with the fixed transmit rate, for which no battery charge information is available. It even reaches an average rate performance close to that of an ideal scheme requiring full Channel State Information at transmitter side. Numerical results show the positive impact of a greater number of antennas at the destination, and evidence that the greater the reliability constraints, the smaller the message sizes on average, and the smaller the optimum information blocklengths. Finally, we corroborate the appropriateness of using the asymptotic blocklength formulation as an approximation of the non-asymptotic finite blocklength results.
△ Less
Submitted 30 August, 2019;
originally announced September 2019.
-
The Psychological and Physiological Part of Emotions: Multimodal Approximation for Valence Classification
Authors:
Jennifer Sorinas,
Jose Manuel Ferrández,
Eduardo Fernandez
Abstract:
In order to develop more precise and functional affective applications, it is necessary to achieve a balance between the psychology and the engineering applied to emotions. Signals from the central and peripheral nervous systems have been used for emotion recognition purposes, however, their operation and the relationship between them remains unknown. In this context, in the present work we have t…
▽ More
In order to develop more precise and functional affective applications, it is necessary to achieve a balance between the psychology and the engineering applied to emotions. Signals from the central and peripheral nervous systems have been used for emotion recognition purposes, however, their operation and the relationship between them remains unknown. In this context, in the present work we have tried to approach the study of the psychobiology of both systems in order to generate a computational model for the recognition of emotions in the dimension of valence. To this end, the electroencephalography (EEG) signal, electrocardiography (ECG) signal and skin temperature of 24 subjects have been studied. Each methodology has been evaluated individually, finding characteristic patterns of positive and negative emotions in each of them. After feature selection of each methodology, the results of the classification showed that, although the classification of emotions is possible at both central and peripheral levels, the multimodal approach did not improve the results obtained through the EEG alone. In addition, differences have been observed between cerebral and physiological responses in the processing emotions by separating the sample by sex; though, the differences between men and women were only notable at the physiological level.
△ Less
Submitted 1 May, 2019;
originally announced May 2019.
-
Landscape of IoT Patterns
Authors:
Hironori Washizaki,
Nobukazu Yoshioka,
Atsuo Hazeyama,
Takehisa Kato,
Haruhiko Kaiya,
Shinpei Ogata,
Takao Okubo,
Eduardo B. Fernandez
Abstract:
Patterns are encapsulations of problems and solutions under specific contexts. As the industry is realizing many successes (and failures) in IoT systems development and operations, many IoT patterns have been published such as IoT design patterns and IoT architecture patterns. Because these patterns are not well classified, their adoption does not live up to their potential. To understand the reas…
▽ More
Patterns are encapsulations of problems and solutions under specific contexts. As the industry is realizing many successes (and failures) in IoT systems development and operations, many IoT patterns have been published such as IoT design patterns and IoT architecture patterns. Because these patterns are not well classified, their adoption does not live up to their potential. To understand the reasons, this paper analyzes an extensive set of published IoT architecture and design patterns according to several dimensions and outlines directions for improvements in publishing and adopting IoT patterns.
△ Less
Submitted 25 February, 2019;
originally announced February 2019.
-
Ultra-Reliable Cooperative Short-Packet Communications with Wireless Energy Transfer
Authors:
Onel L. A. López,
Evelio M. G. Fernández,
Richard D. Souza,
Hirley Alves
Abstract:
We analyze a cooperative wireless communication system with finite block length and finite battery energy, under quasi-static Rayleigh fading. Source and relay nodes are powered by a wireless energy transfer (WET) process, while using the harvested energy to feed their circuits, send pilot signals to estimate channels at receivers, and for wireless information transmission (WIT). Other power consu…
▽ More
We analyze a cooperative wireless communication system with finite block length and finite battery energy, under quasi-static Rayleigh fading. Source and relay nodes are powered by a wireless energy transfer (WET) process, while using the harvested energy to feed their circuits, send pilot signals to estimate channels at receivers, and for wireless information transmission (WIT). Other power consumption sources beyond data transmission power are considered. The error probability is investigated under perfect/imperfect channel state information (CSI), while reaching accurate closed-form approximations in ideal direct communication system setups. We consider ultra-reliable communication (URC) scenarios under discussion for the next fifth-generation (5G) of wireless systems. The numerical results show the existence of an optimum pilot transmit power for channel estimation, which increases with the harvested energy. We also show the importance of cooperation, even taking into account the multiplexing loss, in order to meet the error and latency constraints of the URC systems.
△ Less
Submitted 1 January, 2018;
originally announced January 2018.
-
Wireless Powered Communications with Finite Battery and Finite Blocklength
Authors:
Onel L. A. López,
Evelio M. G. Fernández,
R. D. Souza,
H. Alves
Abstract:
We analyze a wireless communication system with finite block length and finite battery energy, under quasi-static Nakagami-m fading. Wireless energy transfer is carried out in the downlink while information transfer occurs in the uplink. Transmission strategies for scenarios with/without energy accumulation between transmission rounds are characterized in terms of error probability and energy cons…
▽ More
We analyze a wireless communication system with finite block length and finite battery energy, under quasi-static Nakagami-m fading. Wireless energy transfer is carried out in the downlink while information transfer occurs in the uplink. Transmission strategies for scenarios with/without energy accumulation between transmission rounds are characterized in terms of error probability and energy consumption. A power control protocol for the energy accumulation scenario is proposed and results show the enormous impact on improving the system performance, in terms of error probability and energy consumption. The numerical results corroborate the existence and uniqueness of an optimum target error probability, while showing that a relatively small battery could be a limiting factor for some setups, specially when using the energy accumulation strategy.
△ Less
Submitted 20 December, 2017; v1 submitted 25 May, 2017;
originally announced May 2017.
-
Ultra-Reliable Short-Packet Communications with Wireless Energy Transfer
Authors:
Onel L. Alcaraz López,
Hirley Alves,
Richard Demo Souza,
Evelio Martín García Fernández
Abstract:
We analyze and optimize a wireless system with energy transfer in the downlink and information transfer in the uplink, under quasi-static Nakagami-m fading. We consider ultra-reliable communication scenarios representative of the fifth-generation of wireless systems, with strict error and latency requirements. The error probability and delay are investigated, and an approximation for the former is…
▽ More
We analyze and optimize a wireless system with energy transfer in the downlink and information transfer in the uplink, under quasi-static Nakagami-m fading. We consider ultra-reliable communication scenarios representative of the fifth-generation of wireless systems, with strict error and latency requirements. The error probability and delay are investigated, and an approximation for the former is given and validated through simulations. The numerical results demonstrate that there are optimum numbers of channels uses for both energy and information transfer for a given message length.
△ Less
Submitted 21 February, 2017;
originally announced February 2017.
-
Ultra Reliable Short Message Relaying with Wireless Power Transfer
Authors:
Onel L. Alcaraz López,
Hirley Alves,
Richard Demo Souza,
Evelio Martín García Fernández
Abstract:
We consider a dual-hop wireless network where an energy constrained relay node first harvests energy through the received radio-frequency signal from the source, and then uses the harvested energy to forward the source's information to the destination node. The throughput and delay metrics are investigated for a decode-and-forward relaying mechanism at finite blocklength regime and delay-limited t…
▽ More
We consider a dual-hop wireless network where an energy constrained relay node first harvests energy through the received radio-frequency signal from the source, and then uses the harvested energy to forward the source's information to the destination node. The throughput and delay metrics are investigated for a decode-and-forward relaying mechanism at finite blocklength regime and delay-limited transmission mode. We consider ultra-reliable communication scenarios under discussion for the next fifth-generation of wireless systems, with error and latency constraints. The impact on these metrics of the blocklength, information bits, and relay position is investigated.
△ Less
Submitted 2 February, 2017;
originally announced February 2017.
-
Critical Systems Development Using Modeling Languages. (CSDUML-04): Current Developments and Future Challenges (Report on the Third International Workshop)
Authors:
Jan Jürjens,
Eduardo B. Fernandez,
Robert B. France,
Bernhard Rumpe,
Constance Heitmeyer
Abstract:
We give a short report on the contributions to and some discussions made and conclusions drawn at the Third International Workshop on Critical Systems Development Using Modeling Languages (CSDUML'04).
We give a short report on the contributions to and some discussions made and conclusions drawn at the Third International Workshop on Critical Systems Development Using Modeling Languages (CSDUML'04).
△ Less
Submitted 22 September, 2014;
originally announced September 2014.
-
Patterns for Business-to-consumer E-Commerce Applications
Authors:
Xiaohong Yuan,
Eduardo B. Fernandez
Abstract:
E-commerce is one of the most important web applications. We present here a set of patterns that describe shopping carts, products, catalogue, customer accounts, shipping, and invoices. We combine them in the form of composite patterns, which in turn make up a domain model for business-to-consumer e-commerce. We also indicate how to add security constraints to this model. This domain model can be…
▽ More
E-commerce is one of the most important web applications. We present here a set of patterns that describe shopping carts, products, catalogue, customer accounts, shipping, and invoices. We combine them in the form of composite patterns, which in turn make up a domain model for business-to-consumer e-commerce. We also indicate how to add security constraints to this model. This domain model can be used as a computation-independent model from which specific applications can be produced using a model-driven architecture approach.
△ Less
Submitted 16 August, 2011;
originally announced August 2011.
-
PVM-Distributed Implementation of the Radiance Code
Authors:
Francisco R. Villatoro,
Antonio J. Nebro,
Jose E. Fernández
Abstract:
The Parallel Virtual Machine (PVM) tool has been used for a distributed implementation of Greg Ward's Radiance code. In order to generate exactly the same primary rays with both the sequential and the parallel codes, the quincunx sampling technique used in Radiance for the reduction of the number of primary rays by interpolation, must be left untouched in the parallel implementation. The octree…
▽ More
The Parallel Virtual Machine (PVM) tool has been used for a distributed implementation of Greg Ward's Radiance code. In order to generate exactly the same primary rays with both the sequential and the parallel codes, the quincunx sampling technique used in Radiance for the reduction of the number of primary rays by interpolation, must be left untouched in the parallel implementation. The octree of local ambient values used in Radiance for the indirect illumination has been shared among all the processors. Both static and dynamic image partitioning techniques which replicate the octree of the complete scene in all the processors and have load-balancing, have been developed for one frame rendering. Speedups larger than 7.5 have been achieved in a network of 8 workstations. For animation sequences, a new dynamic partitioning distribution technique with superlinear speedups has also been developed.
△ Less
Submitted 22 February, 2008;
originally announced February 2008.