Artificial Intelligence Advances - Vol.1, Iss.2 October 2019
Artificial Intelligence Advances - Vol.1, Iss.2 October 2019
Artificial Intelligence
Advances
Editor-in-Chief
Dr. Sergey Victorovich Ulyanov
Volume 1 | Issue 2 | October 2019 | Page 1-55
Artificial Intelligence Advances
Contents
Article
5 Probabilistic Rationale of Actions for Artificial Intelligence Systems Operating in Uncer-
tainty Conditions
Andrey I. Kostogryzov
24 School Debit Transaction Using Fingerprint Recognition System
Wai Kit Wong, Thu Soe Min, Shi Enn Chong
38 Using the CVP Traffic Detection Model at Road-Section Applies to Traffic Information
Collection and Monitor - the Case Study
Shing Tenqchen, Yen-Jung Su, Keng-Pin Chen
44 Application of Feature Curves and Shape Blending on Yacht Designing
Shih-Wen Hsiao, Jeng-Horng Chen, Ting-An Yeh
Review
1 The Comparison of Current Development, Technology and Governments’ Attitudes of
Driverless Car at Home and Abroad
Chuyi Zhang
Copyright
Artificial Intelligence Advances is licensed under a Creative Commons-Non-Commercial 4.0 International Copyright
(CC BY- NC4.0). Readers shall have the right to copy and distribute articles in this journal in any form in any medium,
and may also modify, convert or create on the basis of articles. In sharing and using articles in this journal, the user must
indicate the author and source, and mark the changes made in articles. Copyright © BILINGUAL PUBLISHING CO. All
Rights Reserved.
Artificial Intelligence Advances | Volume 01 | Issue 02 | October 2019
REVIEW
The Comparison of Current Development, Technology and Govern-
ments’ Attitudes of Driverless Car at Home and Abroad
Chuyi Zhang*
Beijing University of Posts and Telecommunications, Beijing, 100876, China
Article history Driverless car, as a direction for future automobile development, greatly
Received: 5 August 2019 improves the efficiency and safety of the traffic system. It’s one of the
most popular technical fields. In recent years, driverless car has developed
Accepted: 20 August 2019 rapidly. The related development is concerned by governments, business-
Published Online: 30 October 2019 es, consumers and stakeholders widely, and most of countries have been
actively studying this technology. This paper first introduces the current
Keywords: development of driverless car at home and abroad. Besides, the basic
Driverless car technologies of driverless car are briefly analyzed. In addition, the author
compares the American government’s attitudes with Chinese government’s
Current development attitudes towards driverless car. Specifically, the article makes an analysis
Technology of contents of literature and periodicals at home and abroad and policies
Governments’ attitudes and documents which have already been published. The analysis shows that
there is no great difference between the attitudes of Chinese and American
Future development direction
governments. Both of two governments actively support the development
of driverless car. Finally, this paper expounds the development direction
of the driverless car field in future by dividing into two categories through
road conditions: automatic driving on expressways and automatic driving
in cities.
1. Introduction Engineers (SAE) have all graded automatic driving tech-
A
nology (see Table I), which, to a certain extent, represents
driverless car is a vehicle that is capable of the development phase of the driverless technology [2].
sensing its environment and navigating without In China, the driverless technology has developed well
human input. Driverless cars use a variety of tech- with the encouragement and support of the government.
niques to detect their surroundings, such as radar, laser Beijing, Shanghai and some other cities have promulgated
light, computer vision, GPS, IMU and so on. The poten- the detailed rules of automatic driving road test. In 2014,
tial benefits of driverless cars include reducing mobility Google fired a shot heard all the way to Detroit. Google’s
and infrastructure costs, increasing safety, increasing newest driverless car had no steering wheel and no brakes.
mobility, increasing customer satisfaction and reducing The message was clear: cars of the future will be born
crime [1]. In recent years, driverless cars have been de- fully autonomous, with no human driver needed [3]. Com-
veloping rapidly. The National Highway Traffic Safety panies, such as Uber and Waymo, are also actively testing
Administration (NHTSA) and the Society of Automotive driverless cars hoping for combining autopilot technology
*Corresponding Author:
Chuyi Zhang,
Beijing University of Posts and Telecommunications, Beijing, 100876, China;
Email: [email protected]
with car calling services. In Dubai, the first driverless taxi mixed test of urban road and high-speed traffic conditions.
in the world was put into operation by the Dubai highway In 2015, Toyota Corporation, cooperated with Standford
and Transport Administration (RTA) in February 28, 2018. and University of Michigan, allocated 1 billion to the
These show that the automotive industry is undergoing a autopilot project. In 2016, Toyota Corporation invested
revolution. It is obvious that driverless cars are likely to strategically in American Technology Corp Uber, and also
be widely applied in the future, which has great certain established the cooperative relationship in the research of
research significance. driverless technology. In 2016, Ford Fusion ushered in the
However, no one has investigated both of the technol- debut of the driverless car. Google has built an independent
ogy and governments’ attitudes of driverless cars at home automated driving company Waymo. Its actual test mile-
and abroad so far. There are few book resources about this age of driverless car has reached about 2 million miles. In
topic. But there are many Internet sources and periodical March 2017, Tesla launched the Autopilot 8.1 system on
sources that appear to be reliable. Contents of literature the basis of Autopilot 2, greatly improving the grade of the
and periodicals at home and abroad and policies and doc- driverless car. According to statistics, Tesla has been driv-
uments which have already been published are analyzed. ing over 222 million miles in the Autopilot mode [4].
the same time, Jingdong announced that its unmanned ve- produces control
hicle began to enter the road test phase and planned to run commands for the throttle, the brake, the steering wheel
the test and may be able to use it on a large scale in 2017. and the transmission lever to track the planned trajectory
Didi announced that driverless car would be one of their and send out the corresponding instructions. At present,
major strategic layouts, and will soon achieve the goal of the most commonly used method is the classical intelli-
carrying a passenger car on a driverless car. gent PID algorithm.
Motion control system is similar to the driver’s brain, 6. The Future Development Direction of the
which is used to analyze road information. It’s based on Driverless Car Field
the driving trajectory, speed planning and the current po-
sition, posture and speed of the driverless car. And then it The development direction of driverless car can be divid-
ed into two categories through road conditions: automatic nology, people would use intelligent driverless cars in the
driving on expressways and automatic driving in cities. near future. It is a kind of intelligent car, which combines
The driving environment and traffic signs on the free- detection, identification, judgment, decision, optimization,
way are relatively better, but long time driving at high optimization, execution, feedback, and control function.
speed is rather boring for drivers. The application of driv- It also can learn, summarize and improve skills. Besides,
erless car in this direction can solve this problem well, and it integrates the top scientific and technological achieve-
also can effectively improve the efficiency and safety of ments such as microcomputers, green environment power
traffic. In the future development, as long as driverless car system, new structure material and so on. The driverless
completes the mark line tracking and vehicle identification technology at home and abroad is developing continuous-
function on a well structured highway, and can avoid the ly, and its function and reliability are constantly improv-
same track as far as possible, the full automatic driving of ing. What’s more, further improvements are needed in the
the highway can be achieved successfully. aspects of security, intelligence and regulation of driver-
In cities, there are more vehicles and people on the less cars.
road. Additionally, the environment is much more com-
plex. In the autonomous driving test which took place
References
in Parma in July 2013, the vehicle has proven to be able [1] Wikipedia. Autonomous car. [Online], Available [Ac-
to drive autonomously, without any human intervention, cessed Mar. 30, 2018]:
sharing roads with other vehicles, and manage round- https://en.wikipedia.org/wiki/Autonomous_car
abouts, intersections, priority roads, stops, tunnels, cross- [2] Q.Y. Lv. Prospects for cooperation between un-
walks, traffic lights, highways, and urban roads. But one manned technology and traditional automotive indus-
of the aspects that need to be further investigated and try. Auto Time. U463.6, 2017.
developed is the driving efficiency and speed: the test was [3] H. Lipson. A Driverless World. in Driverless: intelli-
carried out considering safety as a priority, and the most gent cars and the road ahead. Cambridge, Massachu-
complicated maneuvers were carried out at a reduced setts: MIT Press, 2016: 23-45.
speed. Plus some perception problems still have to be [4] W.G. Qiao and X.J. Xu. Development status and di-
solved: the problem of merging in large and multi-lane rection of unmanned vehicle. Shanghai Car. U469,
roundabouts, where vehicles travel at high speeds, has not 2007.
been completely solved [10]. So it still needs further techni- [5] Y.L. Jia. The origin and development of unmanned
cal support and research, and puts forward higher require- vehicles. Information Recording Material. U463.6,
ments for the technology. 2018.
[6] Z. Ai. Is the pilotless time really coming. China
7. Conclusions Equipment Engineering. U463.6, 2018.
[7] U.S. DOT. Federal Automated Vehicles Policy – Ac-
This paper investigates the current development of driv- celerating the Next Revolution In Roadway Safety.
erless cars at home and abroad, analyses the basic tech- Washington, DC, 2016.
nologies of driverless cars, compares the American gov- [8] B.H. Obama. Barack Obama: Self-driving, yes, but
ernment’s attitudes with Chinese government’s attitudes also safe. Pittsburgh Post-Gazette. Pittsburgh, PA,
towards driverless cars, and expounds the future develop- 2016.
ment direction of the driverless car in two ways. [9] S.X. Guo. Policy escort “unmanned” ahead of speed.
The results indicate that the development of driverless New Production. F426.471, 2018.
cars would be the development direction of the automo- [10] B. Alberto, C. Pietro, D. Stefano, L.M. Chiara,
tive industry in the future, and plays an important role in M. Paolo; M. Daniele, P. Matteo, and P. Antonio.
promoting the technology innovation in automobile indus- PROUD-Public Road Urban Driverless-Car Test.
try. With the development of economy, science and tech- IEEE Trans. Phys. Electron. 2015, 16: 3508 - 3519.
ARTICLE
Probabilistic Rationale of Actions for Artificial Intelligence Systems
Operating in Uncertainty Conditions
Andrey I. Kostogryzov1,2*
1. Federal Research Center “Computer Science and Control” of the Russian Academy of Sciences, Vavilova Str. 44,
bld.2, Moscow, 119333, Russia
2. Gubkin Russian State University of Oil and Gas (National Research University) Leninsky Av. 65, bld. 1, Moscow,
119991, Russia
Article history The approach for probabilistic rationale of artificial intelligence systems
Received: 10 September 2019 actions is proposed. It is based on an implementation of the proposed
interconnected ideas 1-7 about system analysis and optimization focused
Accepted: 15 October 2019 on prognostic modeling. The ideas may be applied also by using another
Published Online: 30 October 2019 probabilistic models which supported by software tools and can predict
successfulness or risks on a level of probability distribution functions. The
Keywords: approach includes description of the proposed probabilistic models, optimi-
Analysis zation methods for rationale actions and incremental algorithms for solving
the problems of supporting decision-making on the base of monitored data
Artificial intelligence systems and rationale robot actions in uncertainty conditions. The approach means
Model practically a proactive commitment to excellence in uncertainty conditions.
Operation A suitability of the proposed models and methods is demonstrated by ex-
amples which cover wide applications of artificial intelligence systems.
Prediction
Probability
Rationale
Risk
System
System engineering
1. Introduction processes”, ISO 17359 “Condition monitoring and di-
D
agnostics of machines - General guidelines”, IEC 61508
ifferent mathematical models and methods are “Functional safety of electrical/ electronic/ programmable
applied in system analysis. System analysis is electronic safety-related systems” etc. It is recommended
required at level of the international standards of for using every time across all life-cycle to analyze per-
system engineering - for example, ISO/IEC/IEEE 15288 formance, system behaviour, feasibility, affordability, crit-
“System and software engineering – System life cycle ical quality characteristics, technical risks, sensitivity for
*Corresponding Author:
Andrey I. Kostogryzov,
Federal Research Center “Computer Science and Control” of the Russian Academy of Sciences, Vavilova Str. 44, bld.2, Moscow,
119333, Russia; Gubkin Russian State University of Oil and Gas (National Research University) Leninsky Av. 65, bld. 1, Moscow,
119991, Russia;
Email: [email protected]
changes of critical parameters values etc. Artificial intel- (2) the problem 2 - to rationale a robot actions under
ligence systems (AIS) which are understood here as sys- limitations on admissible risks of “failures” (according to
tems, performing functions by logic reasoning on the base ISO Guide 73 risk is defined as effect of uncertainty on
of data processing, also needs system analysis because of objectives considering consequences. An effect is a devia-
their complexities and uncertainty conditions. tion from the expected — positive and/or negative).
Note: System is combination of interacting elements or- Note: Some relevant problems (such as the problems of
ganized to achieve one or more stated purposes (according robotics orientation, localization and mapping, informa-
to ISO/IEC/IEEE 15288). tion gathering, the perception and analysis of commands,
Considering AIS specificity there may be some scien- movement and tactile, realizations of manipulations for
tific problems devoted to: which different probabilistic methods are also applicable)
(1) system analysis of uncertainty factors, capabilities have not been covered by this work.
of operation in real time, information gathering and pro- The proposed approach for solving AIS problems are
cessing, protection from authorized access and dangerous based on theoretical and practical researches [15-45] and
influences; need to be used either in combination or in addition to ex-
(2) analysis of system requirements to acceptable con- isting methods which are used now in AIS. There, where it
ditions; is required often prognostic system analysis or where the
(3) system analysis and optimization in architectural used approaches are not effective, the proposed probabi-
design; listic approach can be used as rational basis or alternative.
(4) comparative and prognostic estimations of quality, The ideas of this approach may be applied also by using
safety, interaction “user-system” and conditions, optimi- another probabilistic models which supported by software
zation of different processes, rationale of operation in un- tools and can predict success or risks on a level of prob-
certainty, etc. ability distribution functions (PDF). The structure of this
Now there isn’t enough universal effective approach research is shown by the Figure 1.
to rationale of actions for AIS operating in uncertainty
conditions. In practice for each concrete case it is often
used subjective expert estimations, a regression analysis
of collected data, a simulation of processes [1-14]. It means,
that search of new methods for advanced rationale actions
of AIS and by AIS is today very important. The proposed
approach is focused on probabilistic rationale of actions
to operate in uncertainty conditions against existing ap-
proaches for which applied mathematical methods cover
mainly information processing in the logician if …, that
… and/or tracing situations by a man-operator. An ap-
plication scope of this paper covers AIS supporting de-
cision-making in intellectual manufacture (for example,
in dispatcher intelligence centers) and robotics systems
operating in uncertainty conditions and used to provide
Figure 1. The structure of the research
operation efficiency or/and increase reliability and safety
(including aerial, land, underground, underwater, univer- Various fields of the examples applications have been
sal and functionally focused AIS). chosen purposely to demonstrate universality and analyti-
The main efforts of this paper are not connected with cal usefulness of the probabilistic approach. The proposed
illustrating the capabilities of AIS, but they are focused models and methods are an original Russian creation, they
on demonstrating the applicability of original probabilis- have been presented at seminars, symposiums, confer-
tic models and methods to improve some of the existing ences, ISO/IEC working groups and other forums since
capabilities of AIS [15-45]. For this goal by the use of these 2000 in Russia, Australia, Canada, China, Finland, France,
probabilistic models the next specific problems are cov- Germany, Italy, Kuwait, Luxembourg, Poland, Serbia,
ered: the USA, etc. The supporting software tools were award-
(1) the problem 1 - to rationale a rational variant for de- ed by the Golden Medal of the International Innovation
cision-making on the base of monitored data about events and Investment Salon and the International Exhibition
and conditions, and “Intellectual Robots”, acknowledged on the World's fair
of information technologies CeBIT in Germany, noted frequency of failures λ - is popular today. This implies
by diplomas of the Hanover Industrial Exhibition and the the use of corresponding exponential PDF – see Figure 2.
Russian exhibitions of software. Only one connection of the frequency of failures λ with
random time variable τ between losses of system integrity
2. The essence of the approach may be interpreted as the requirement: “to provide no fail-
ures during required time with probability no less than the
The AIS behaviour corresponding to the rationale of ac-
given admissible probability Padm. this required time should
tions for AIS operating in uncertainty conditions means
be no more than treq. = 1/ λadm., here λadm.=-ln(1-Radm.)”. But
proactive commitment to excellence. Such behaviour is
for AIS element it is rough and unpromising engineering
based on an implementation of the next proposed inter-
estimations because capabilities of monitoring conditions
connected ideas 1-7.
and recovery of the lost element integrity are ignored.
Idea 1 is concerning the usual concept and properties
Such disregard deforms very essentially probabilistic es-
of probability distribution functions (PDF) [15] for a con-
timations of probabilistic risk values and can’t be useful
tinuous random variable of time. PDF for a time variable
for scientific search of effective counteraction measures
τ is nondecreasing function P(t) whose value for a given
against different threats. Deviations from more adequate
point t≥0 can be interpreted as a probability that the value
PDF estimations are very high [33,44,45]. On Figure 3 the
of the random variable τ is less or equal to the time value t,
limitations to admissible risks, fragment of exponential
i.e. P(t)=P(τ≤t). Additionally P(t)=0 for t<0, and P(t)→1
and an adequate PDF of time between losses of system
for t→∞. In general case the solutions for the problems 1
integrity with identical frequency of system integrity
and 2 are based on using concept of the probabilities of
losses are illustrated (in conditional units). It means more
“success” and/or “unsuccess” (risk of “failure”) during
adequate PDF allows more right understanding of prob-
the given prognostic time period treq.. This probability is a
abilistic AIS vision of events prediction with scientific
value for a point treq. and is defined by created PDF.
interpretation considering situations in time line.
Idea 2. The processes, connected with data processing,
Note: System integrity is defined as such system state
and used information should provide required AIS oper-
when system purposes are achieved with the required
ation quality (because AIS is a system, performing func-
quality.
tions by logic reasoning on the base of data processing).
And corresponding probabilistic methods should appro-
priate for prognostic estimations.
Idea 3. The PDF should be presented as analytical de-
pendence on input parameters. It needs to solve direct and
inverse problems to rationale of actions in a real time of
AIS operation. For example, for a simple element PDF
P(t) of time τ between losses of element integrity may be
presented by analytical exponential approximation, i.e.
Figure 2. The possible variants of correlations for ad-
P(t) = 1-exp(-λt), where λ is frequency of failures (losses
missible risks, exponential and an adequate PDF of time
of element integrity). At the same time frequency of fail- between losses of system integrity with identical frequen-
ures may be represented as a sum of frequencies of fail- cy of losses
ures because of specific reasons for each failure type – for
example, failure from “human factor” λ1, from hardware
λ2, from software λ3 and so on. For this use case PDF may
be presented as P(t) =1-exp[-(λ1+λ2+λ3+…)t]. Then if the
adequate function P(t) is built in dependence on different
parameters and if admissible level for probability is given
than inverse problem may be solved.
Note. The rationale for exponential approximation
choice in practice see, for example, in [28, 30].
Idea 4. The PDF should be adequate, it means a de- Figure 3. All requirements to admissible risk are met for
pendence on several essential parameters which define an adequate PDF of time between losses of system integ-
AIS operation and on which “success” or “failure” of rity
AIS operation is mainly dependent. For example the way Idea 5. Because an AIS is a complex system and this
for risks prediction based on uses only one parameter -
AIS may be subsystem or element of comprehensive ered information is used for proper AIS specificity. The
complex system, the proposed approach should allow abstract view on a quality of used information is presented
a generation of probabilistic models for prediction of on Figure 4.
“success” or “failure” of AIS actions in uncertainty con-
ditions. In general case an input for generated models
used in real time should consider system complexity,
periodical diagnostics, monitoring between diagnostics,
recovery of the lost integrity for every system element
and also processes, connected with data processing, and
used information. As an output of such generated models Figure 4. Abstract explanation for a quality of used (real)
adequate PDF of time τ between losses of system (sub- information against required one
system, element) integrity should be produced in analyti- The proposed models for the estimation of information
cal form. systems operation quality are described in Table A.1 of
Idea 6. Input for probabilistic modeling should be Appendix.
formed mainly from gathered data and established specific The main analytical models and calculated measures
order of AIS actions. are the next:
Idea 7. To probabilistic rationale of actions for AIS (1) “The model of functions performance by a complex
operating in uncertainty conditions the problems of opti- system in conditions of unreliability of its components”;
mization should be solved. Optimization should be per- (2) “The models complex of calls processing”;
formed in real time by defined beforehand optimization (3) “The model of entering into IS current data con-
problem statement. Every time the used optimization cerning new objects of application domain”;
problem statement should be appropriated for solving (4) “The model of information gathering”;
specific problem 1or 2. For probabilistic rationale of (5) “The model of information analysis”;
actions the prognostic period should be defined so to be (6) “The models complex of dangerous influences on a
in time to do the given action or complex of actions on protected system”;
acceptable level according to optimization criterion or to (7) “The models complex of an authorized access to
perform preventive action (with which the initiation of system resources”.
performing an action or solving a problem is connected) Risk to lose integrity (R) is an addition to 1 for prob-
or/and to recover operation capabilities (which can be ability of “success” (P), i.e. R=1-P considering conse-
lost). quences.
For the approach implementation the next probabilistic These models, supported by different versions of soft-
models are proposed. ware Complex for Evaluation of Information Systems Op-
eration Quality, registered by Rospatent №2000610272 [46],
3. The Description of the Proposed Models may be applied and improved for solving problems 1 and
In general case a probabilistic space (Ω, B, P) for probabi- 2.
listic modeling is created [15], where: Ω - is a limited space
3.2 About Risks Prediction for System Formalized
of elementary events; B – a class of all subspace of Ω-space,
as “Black box”
satisfied to the properties of σ-algebra; P – is a probabil-
ity measure on a space of elementary events Ω. Because, The proposed models helps to implement ideas 1, 3, 4.
Ω={ωk} is limited, there is enough to establish a reflection In general case successful system operation (not only
ωk→pk =P(ωk) like that pk ≥ 0 and ∑ p k = 1 . AIS) is connected with system counteraction against var-
k
In order not to overload the reader with mathematical ious dangerous influences on system integrity - these may
details, the final formulas for calculations are presented in be counteractions against failures, defects events, “human
the Appendixes A and B. factors” events, etc. There are proposed the formalization
for two general technologies of providing counteraction
3.1 About AIS operation quality against threats: periodical diagnostics of system integrity
The proposed models help to implement ideas 1 and 2. (technology 1, without monitoring between diagnostics)
In general case AIS operation quality is connected with and additionally monitoring between diagnostics (technol-
requirements for reliable and timely producing complete, ogy 2). As a rule these technologies are implemented by
valid and/or, if needed, confidential information. The gath- AIS.
Technology 1 is based on periodical diagnostics of makes an error but a dangerous influence occurs if the
system integrity, that is carried out to detect danger danger is activated before the next diagnostic. Otherwise
sources penetration into a system or consequences of the source will be detected and neutralized during the next
negative influences (see Figure 5). The lost system in- diagnostic.
tegrity can be detect only as a result of diagnostics, after It is supposed for technologies 1 and 2 that the used di-
which system recovery is started. Dangerous influence agnostic tools allow to provide necessary system integrity
on system is acted step-by step: at first a danger source recovery after revealing danger sources penetration into a
penetrates into a system and then after its activation system or consequences of influences.
begins to influence. System integrity can’t be lost be- The probability of correct system operation within the
fore a penetrated danger source is activated. A danger is given prognostic period (i.e. probability of “success” - P)
considered to be realized only after a danger source has may be estimated as a result of use the models presented
influenced on a system. in Appendix B. Risk to lose integrity (R) is an addition
to 1 for probability of correct system operation (P), i.e.
R=1-P considering consequences.
В(t)=Р[max(τ1,τ2)≤t]=Р(τ1≤t)Р(τ2≤t)=В1(t)В2(t)(2) and on the current moment of time. For example, the rang-
es of possible values of conditions may be established:
Applying recurrently expressions (1) – (2), it is possi-
“Working range inside of norm”, “Out of working range,
ble to build PDF of time between losses of integrity for
but inside of norm”, “Abnormality” for each separate crit-
any complex system with parallel and/or series structure
ical parameter. If the parameter ranges of acceptable con-
and theirs combinations.
ditions are not established in explicit form than for mod-
An example of complex system integrating two serial
eling purpose the may be implead and can be expressed
complex subsystems (abstraction) is presented by Figure 7.
in the form of average time value. These time values are
For this integration the next interpretation of elementary
used as input for probabilistic modeling. For example, for
events is used: complex system integrating compound
coal mine some of many dozens heterogeneous parameters
components “Intellectual tructure 1 and 2” is in condition
are: for ventilation equipment - temperature of rotor and
“correct operation” (“success”) during given period Treq. if
engine bearings, a current on phases and voltage of stator;
during this period “AND” component “Intellectual truc-
for modular decontamination equipment - vacuum in the
ture 1” “AND” component “Intellectual tructure 2” (both
pipeline, the expense and temperature of a metano-air
are special complex subsystems including AIS subsystems
mix in the pipeline before equipment, pressure in system
and elements) are in condition “correct operation” (“suc-
of compressed air, etc. It may be interpreted similarly by
cess”).
light signals – “green”, “yellow”, “red” - see Figure 8 and
All ideas for analytical modeling complex systems are
following Example 6.3.
supported by the software tools “Mathematical modeling
of system life cycle processes” – “know how” (registered
by Rospatent №2004610858), “Complex for evaluating
quality of production processes” (registered by Rospatent
№2010614145) and others [46-51].
The proposed practical way to data forming helps to im- (1A) at limitations on probability of an admissible level
plement idea 6. of quality Pquality (Q) ≥ Padm. and expenses for operation
For each critical parameter (for which prognostic esti- Сoper. (Q) ≤ С adm. and under other development, operation
mations are needed to do actions) the ranges of acceptable or maintenance conditions; or
conditions can be established. The traced conditions of (1B) at limitations on admissible risk to lose system
monitored parameters are data about a condition before integrity R≤Radm. and expenses for operation Сoper. (Q) ≤
С adm. and under other development, operation or mainte-
nance conditions; or are based on using the models and methods above.
(1C) at limitations presented as combination 1A) and
1B); 5.1 The Algorithm for Solving Problem to Ratio-
(2) on utilization stage: nale a Rational Variant for Decision-making on
(A) system parameters, software, technical and control the Base of Monitored Data About Events and
measures (Q) are the most rational for the given period of Conditions (problem 1)
AIS operation if on them the maximum of probability of It is supposed that the terms “success” and accordingly
correct system operation is reached “unsuccess” (“failure”) are defined in terms of admissible
Pquality (Q rational) = max Pquality (Q), condition of interested system to operate for the purpose
according to required quality.
Q Note: For example for each parameter of equipment
the ranges of possible values of conditions may be esti-
(2A.a) at limitations on probability of an admissible
mated as “Working range inside of norm” and “Out of
level of quality Pquality (Q) ≥ Padm. and expenses for opera-
working range, but inside of norm” (“success”) or “Ab-
tion Сoper. (Q) ≤С adm. and under other operation or mainte-
normality” (“failure”), interpreted similarly light signals
nance conditions; or
– “green”, “yellow”, “red”. For this definition a “ailure”
(2A.b). at limitations on admissible risk to lose system
of equipment operation characterizes a threat to lose
integrity R≤Radm. and expenses for operation Сoper. (Q) ≤С
system norm integrity after danger influence (on the logic
adm. and under other operation or maintenance conditions;
level this range “Abnormality” may be interpreted analyt-
or
ically as failure, fault, losses of quality or safety etc.).
(2A.c). at limitations presented as combination 2A.a)
The proposed steps for solving problem 1 to rationale a
and 2A.b);
rational variant for decision-making on the base of moni-
tored data about events and conditions may be carried out
(B) system parameters, software, technical and control
by the next 4 steps – see Figure 9.
measures (Q) are the most rational for the given period of
system operation if on them the minimum of risk to lose
system integrity is reached
Note: Formal statements of optimization may be con- use data from various sources (for example, from air
nected with maximization of benefit at limitations on drones, intelligent buoys on the water or sensors under
admissible levels of quality and/or risks measures or with water, etc.). If necessary, possible damages are taken into
minimization of risks at limitations on admissible levels of account. For example, each use case may be character-
benefit and/or quality and/or risks measures and/or under ized by an expected damages in comparable conventional
other operation or maintenance conditions (see section 4). units. If the objective value of a damage can’t be defined,
Step 4. A decision for the optimal variant of actions expert value of expected level of “failure” for each variant
(defined in step 3) is made. In support of the efficiency of may be set, for example, on a dimensionless scale from 0
the functions, the achievable benefit calculated at step 3 is to 100 (0 – «no damages», i.e. “success”, 100 – «the max-
recorded. New knowledge is improved and systematized imal damage»).
by comparing it with reality (including comparisons of The index i of the first part of the selected route is set
probabilistic estimations and real events). to the initial value i=1.
Note: A solution that meets all conditions may be not Step 2. The knowledge is used to refine the input for
existing. In this case, there is no optimal variant of system prognostic modeling. Using probabilistic model, a cal-
operation on the base of monitored data about events culation of the probability of “failure” (risk of “failure”)
and conditions. is carried out for each variant. From the set of variants
(remaining route) the optimal one is chosen, for its the
5.2 The Algorithm for Solving Problem to Ratio- minimum probability of “failure” (risk of “failure”) is
nale a Robot Actions under Limitations on Ad- achieved.
missible Risks of “Failures” (problem 2) Step 3. The robot overcomes the i-th part of the select-
The approach for solving problem 2 to rationale a robot ed route. If the part can’t be overcome, the comeback to
actions under limitations on admissible risks of “failures” the initial point of the part is being. If an alternative route
is demonstrated in application to robot route optimization isn’t here, the comeback to initial point of the previous
in conditions of uncertainties. part is being. The input for modeling every part of possi-
For a robot, the concept of “failure” under uncertainty ble route for each of the variants are updated. New knowl-
is defined as the failure to achieve the goal within a given edge is improved and systematized by comparing it with
time. It is assumed that there are several possible routes to reality (including comparisons of prognostic risks and real
achieve the goal, and uncertainties may include both the events).
conditions for robot operation (including random events in Step 4. If, after overcoming the i-th part, the robot
orientation, localization and mapping). The minimum risk arrived at the intended point of route (i.e., the last part
of “failure” under the existing conditions and limitations of the route is overcome and the goal is achieved), then
is set as a criterion of optimization. the solution for optimizing the route is complete. If the
The proposed steps for solving problem 2 of robot robot hasn’t yet arrived at the intended point (i.e. the last
route optimization under limitations on admissible risks part of the route isn’t overcome), then the complete set of
of “failure” under conditions of uncertainties may be car- different route variants for achieving the goal is redefined
ried out by the next 4 steps – see Figure 10. (similar to step 1). The input for modeling every part of
possible route for each of the variants are updated, i= i+1.
Then steps 2-4 are repeated until the last part of the route
is overcome on the set of possible variants (i.e. it means
the goal is achieved and problem 2 is solved).
If the set of possible options is exhausted and the goal
is not achieved, it is concluded that the goal is unattain-
able with the risk of “failure” less than the acceptable risk
(i.e., it means an impossibility of solving problem 2 in the
defined conditions).
Figure 10. Steps for cognitive solving problem 2
Thus, to rationale a robot actions under limitations on
Step 1. The complete set of route variants to achieve admissible risks of “failures” (i.e. to a “successful” solu-
the goal within the given time, and for each variant – a set tion of problem 2) in real time, information gathering,
of components, is defined (redefined). Data characterizing probabilistic predictions for possible route variants, their
every part of route for each of the variants are gathered comparison, the choice of the best variant, the implemen-
(refined) for modeling. To do this, a specific robot can tation of further actions, the improvement, systematization
and use of knowledge are being. time between operator’s error during continuous monitor-
ing of system integrity is estimated not less than 1 year (for
6. Examples general technology 2). Initial input data for probabilistic
modeling are reflected by the Table 1, the used model is
6.1 About a Period of Successful System Opera-
described in subsection 3.2 of this paper.
tion by AIS Capabilities
The example is related partly to solving the problem 1 Table 1. Input for estimation
and concerning an estimation of successful system opera-
Variants for comparisons
tion during a long time by AIS capabilities in comparison Input for modeling
1-st (an usual system) 2-nd (an AIS)
against an usual system without or with usual sensors
(without artificial intelligence capabilities to logic reason- The given prognostic period (“in
3 years 5 years
future”)
ing). The frequency of influences for
How long time may be a period of successful system 1 day-1 1 day-1
penetrating into system
operation by AIS capabilities? And what about conditions The mean activation time 6 hours 6 hours
for this long period? The time between the end of 4 hours (by
Those threats to system operation which are known, diagnostic and the beginning of 1 month AIS capabili-
traced at diagnostics and do not cause irreversible con- the next diagnostic ties)
1 hour (by AIS
sequences at the first influence, are considered only. Be- The diagnostic time 4 hours
capabilities)
sides, it is supposed, that an integrity can be operatively The mean time between oper-
recovered after AIS recovering reaction at the earliest ator’s error during continuous 1 year 1 year
monitoring of system integrity
stages of detection of dangerous or guarding symptoms.
Moreover, at modeling the time of full integrity recover- Some probabilities of providing system integrity in
ing is artificially reduced till diagnostic time. Thus, the dependence on input, changing in diapason -50%+100%
elementary condition “acceptable integrity” means such from Table 1 data, are presented on Figures 11-139. They
system state when system purposes are achieved with cover dependences on the given prognostic period, the
the required quality, i.e. absence of danger source or time between the end of diagnostic and the beginning of
neutralization of a penetrated source at the earliest stage the next diagnostic, the mean time between operator’s er-
prior to the its danger influence after activation. It (as ror during continuous monitoring of integrity. Deviations
supposed by the model) enough for successful AIS oper- for other dependences are insignificant.
ation.
Note: The above assumptions are supposed for model-
ing. In a reality it may be not always so. These conditions
are considered for interpretation of modeling results.
To compare system operation with AIS capabilities
against an usual system (without artificial intelligence
capabilities) for the same conditions we consider AIS pos-
Figure 11. The probability of providing system integrity
sibilities to provide “acceptable integrity” by continuous in dependence on the given prognostic period
monitoring with artificial intelligence logic reasoning.
Let's the threats to system integrity are being about 1
time a day because of natural or technogenic threats and
“human factor”. Let's also after occurrence of a danger
source an average activation time is equal to 6 hours,
during which else it is possible to prevent or neutralize
negative influence.
Two variants of reaction caring of AIS integrity are
compared. 1 st variant (an usual system) considers the Figure 12. The probability of providing system integrity
address to a recovering center about 1 time a month and in dependence on the time between the end of diagnostics
and the beginning of the next diagnostics
reception of necessary recovering procedures within 4
hours after diagnostics. 2nd variant means AIS perform-
ing functions of diagnostics every 4 hours and recovering
acceptable integrity within one hour. For all variants mean
The example is connected with rationale a rational re- 6.3 Example of Solving Inverse Problem to Es-
quirements to information system (IS) operation for pro- timate the Mean Residual Time before the Next
viding high information quality for using in an AIS. Infor- Parameters Abnormalities for a Coal Company
mation systems are systems for which input is information
and output (as result of IS operation) also is information The example demonstrates an AIS possibility on the base
for following use according to purpose. This example of solving inverse problem by model described in subsec-
summarizes the numerous results of researches performed tion 3.2 and Appendix B to a rationale of actions in a real
for IS operating in government agencies, manufacturing time for a coal company
structures (including power generation, coal enterprises, Conditions of parameters, traced by dispatcher intelli-
gence center, are data about a condition before and on the
current moment of time, but always the future is more im- Here R(Tpenetr, t, Tbetw, Tdiag, Treq.) is risk to lose integ-
portant for all. With use of current data responsible staff rity, it is addition to 1 for probability P(Treq) of providing
(mechanics, technologists, engineers, etc.) should know system integrity (“probability of success”), for calcula-
about admissible time for work performance to maintain tions the formulas (B.1)–(B.3). Tpenetr is the mathematical
system operation. Otherwise because of ignorance of a expectation of PDF Ωpenetr (τ), it is defined by parameter
residual time resource before abnormality the necessary statistics of transition from “green” into “yellow” range
works are not carried out. I.e. because of ignorance of this (see Figure 8). The others parameters Tbetw, Tdiag in (3) are
residual time it is not undertaken measures for prevention known – see Appendix B. The main practical questions
of negative events after parameters abnormalities (failures, are: what about Treq. and what about a given admissible
accidents, damages and-or the missed benefit because of risk Radm.(Treq)? For answering we can use the properties of
equipment time out). And on the contrary, knowing resid- function R(Tpenetr, t, Tbetw, Tdiag, Treq.):
ual time before abnormality these events may be avoided, (1) if parameter t increases from 0 to ∞ for the same
or system may be maintained accordingly. For monitored another parameters, the function R(…, t, …) is monoto-
critical system the probabilistic approach to estimate the nously decreasing from 1 to 0 (for N – real, i.e. no integer
mean residual time before the next parameters abnormali- part), if the mean activation time of occurred danger (threat
ties for each element and whole system is proposed. - from the 1-st input at the “yellow” range to the 1-st input
For every valuable subsystem (element) monitored pa- in the “red” range) is bigger to lose integrity is less;
rameters are chosen, and for each parameter the ranges of (2) if parameter Treq increases from 0 to ∞ for the same
possible values of conditions are established: “In working another parameters, the function R(…,Treq) is monoto-
limits”, “Out of working range, but inside of norm”), “Ab- nously increasing from 0 to 1, i.e. for large Treq risk ap-
normality” (interpreted similarly light signals – “green”, proaches to 1.
“yellow”, “red”) – see Figures 8 and 14. The condition It means the such maximal x exists when t=x and
“Abnormality” characterizes a threat to lose system integ- Treq.=x and 0<R(Tpenetr, x, Tbetw, Tdiag, x)<1. I.e. the residual
rity. time before the next parameter abnormality (i.e. time be-
fore first next coming into “red” range) is equal to defined
x with confidence level of admissible risk R(Tpenetr, x, Tbetw,
Tdiag, x). So, if Tpenetr =100 days, for Radm.= 0.01 residual
time x≈2.96 weeks (considering decisions of recovery
problems of integrity every 8 hours). Adequate reaction of
responsible staff in real time is transparent for all interest-
ed parties. Details see [35].
the sorbent; 8th - non-boarding robotic boat – a pollution system diagnostics are used once for work shift 8 hours, a
collector; 9th - an unmanned aerial vehicle. Data is moni- mean duration of the system control is about 10 minutes,
tored from different sources and processed by the models mean recovery time of the lost integrity of object equals
described above in section 3. to 1 day. The workers (they may be robotics, skilled me-
Note: Of course every subsystem also may be consid- chanics, technologists, engineers etc.) are supported by
ered as a special complex system. capabilities of an intellectual system allowing estimations
in real time the mean residual time before the next pa-
rameters abnormalities. Formally they operate as parallel
elements with hot reservation. Workers are capable to
revealing signs of a critical situation after their occur-
rence owing to the support of intellectual systems. If all
subsystems are supported by intellectual systems on the
level which is proper to skilled workers (optimistic view),
workers can commit errors on the average not more often
once a year. If all subsystems are supported by intellec-
tual system on the level which is proper to medium-level
workers (realistic view) only one difference is – medi-
um-level workers can commit errors more often in com-
parison with skilled workers, for one element it is equal to
1 time a month instead of once a year.
Further we do the steps 1-4 from Figure 9. Computed
risks to lose system integrity on Figure 15 means the risks
of “failure” for every subsystem which can be detailed
to the level of every separate critical parameter of equip-
ment.
The fragments of built PDFs on Figure 15 show:
(1) if all subsystems are supported by intellectual sys-
tem on the level which is proper to skilled workers (opti-
Figure 15. Subsystems operating for providing safety of mistic view) the risk of “failure” increases from 0.000003
a floating oil and gas platform for a year to 0.0004 for 10 years and to 0.0013 for 20
years. The MTBF equals to 283 years;
The information from monitored data and a time data (2) if all subsystems are supported by intellectual sys-
of enterprises procedures are used as input for using tem on the level which is proper to medium-level workers
models from Table A.2 and performing steps 1-4 (from (realistic view) the risk of “failure” increases from 0.0009
Figure 9) in real time. Here risks to lose system integrity for a year to 0.0844 for 10 years and 0.25 for 20 years.
during given period Tgiven means risks to be at least once The MTBF equals to 24 years. It is 11.4 times less against
in state “Abnormality” within Treq.. The functions of mod- the results for optimistic view.
eling may be performed on special servers (centralized or Such effects (MTBF = 283 years for optimistic view
mapped). If virtual risks are computed for all points Treq. and MTBF = 24 years for realistic view) are owing to
from 0 to ∞, the calculated values form a trajectory of the implemented technology of counteractions to threats.
PDF. The mathematical expectation of this PDF means These are some estimations for example assumptions.
the mean residual time to the next state “Abnormality”. It Please, compare the effects against primary frequency of
defines mean time before failures (MTBF) from this PDF. occurrence of the latent or obvious threats is equal to once
Requirements to IS operation quality should meet admis- a month, mean activation time of threats is about 1 day +
sible levels recommended in Example 2. workers errors.
To answer the question of the example let the next in-
put are formed from data monitored and the time data of 6.5 Example of Solving Problem 2 for a Robot
enterprises procedures. Route Optimization
Let for every system component a frequency of occur-
rence of the latent or obvious threats is equal to once a Applicability of the proposed probabilistic methods and
month, mean activation time of threats is about 1 day. The models to solving problem 2 (of robot actions optimiza-
tion under limitations on admissible risks of “failure”) is
demonstrated to improve some of the existing capabilities 10 minutes; given prognostic period =2 hours.
of a rescue robot, interconnected with accessory drone,
for route optimization in conditions of uncertainties. Sim- i=1.
ilar problems of specific rescue robot route optimization Step 2 (i=1). Using probabilistic model, a calculation of
from point A (Start) to point E (End) can arise in burning the probability of “failure” is carried out for each variant.
wood, in mountains, in the conditions of a city, and in From the set of variants ABCDE, ABGKLDE, ABGHL-
other situations in conditions of uncertainties. Specific DE the shorter variant ABCDE for which risk is equal to
cases of uncertainties can be connected additionally with 0.034 is chosen (for the route ABGKLDEF risk=0.051, for
complex conditions of environment and necessity of ro- route ABGHLDEF risk=0.067). The relevant data from
botics orientation, localization and mapping that influenc- the drone about the local fire conditions and the weather
es on input for the proposed probabilistic models. on the part BCDE to 8.00 a.m. are taken into account.
On this simplified hypothetical example of moving Step 3 (i=1). The robot overcomes the part AB of route.
some rented values by means of the pilotless car from For the new initial point B the input for modeling every
point A to the final point E of a route (from where the SOS part of possible route are updated in real time for routes
signals are following) we will demonstrate the proposed BCDE, BGKLDE, BGHLDE.
approach to route optimization with acceptable risk of Step 4 (i=1). The robot hasn’t yet arrived at the intend-
“failure” less than 0.1 (i.e. a probability of success should ed point E (i.e. the last part of the route isn’t overcome).
be more than 0.9) under conditions of uncertainties during
the route – see Figure 16. i= i+1=2.
fined by using risk control on the way (with controlled The proposed models include models to estimate AIS
probability of “success” more than 0.9). operation quality and risks prediction for system formal-
ized as “Black box”, algorithm to build new probabilistic
6.6 What about the Possible Pragmatic Effects models for complex system. The practical way to data
from Probabilistic Rationale of Actions for AIS? forming for probabilistic modeling is described.
Author of this article took part in creation of the Com- A suitability of the approach is demonstrated by exam-
plex of supporting technogenic safety on the systems of ples about:
oil&gas transportation and distribution and have been (1) a period of successful system operation by AIS ca-
awarded for it by the Award of the Government of the pabilities;
Russian Federation in the field of a science and tech- (2) acceptable requirements to solve problem 1 for in-
nics. The AIS is a part of the created peripheral posts are formation systems operation;
equipped additionally by means of Complex to feel vibra- (3) solving inverse problem to estimate the mean re-
tion, a fire, the flooding, unauthorized access, hurricane, sidual time before the next parameters abnormalities for a
and also intellectual means of the reaction, capable to coal company;
recognize, identify and predict a development of extreme (4) solving problem 1 by AIS operating for providing
situations – see engineering decisions on Figure 17. safety of a floating oil and gas platform;
(5) solving problem 2 for a robot route optimization;
(6) the possible pragmatic effects from probabilistic
rationale of actions for AIS.
The proposed approach means practically a proactive
commitment to excellence in uncertainty conditions.
7. Conclusion P = V (t - t ) dN (t ) dt ∫ td [ N * W (t ) ] ,
repair time (Trep. is the mean rel ∫0 ∫t 0
time); V(t) – is the PDF of (A.1)
The proposed approach for probabilistic rationale of AIS given time if this time is
actions includes description of the proposed models, opti- random value (Treq. is the mean * - is the convolution sign.
time).
mization methods for rationale actions, incremental algo- Note. The next variants are
rithms for solving: used by the software tools [35-
37]
(1) the problem 1 - to rationale a rational variant for de- :
N(t), W(t) are exponentially
cision-making on the base of monitored data about events distributed (i.e. enough mean
and conditions, and times - TMTBFnk , Trep.), V(t) is
(2) the problem 2 - to rationale a robot actions under determined (i.e. Treq. is const).
N(t)=1–exp(-t×η);
( ) ()
part 4 after 1 part 4.2 MTBF cont . part 4.2
tially distributed. +[(V − V ( ) ) / V ] × e (
( )) − m V −V part 4
,if Т > Т ,
M(t) =1 –exp(-t×μ×ν);
part 4 req . cont .
(A.9)
А(t)= 1–exp(-t/ TMTBF).
Models. Input Evaluated measures Appendix B. The Models to Predict Risks for
The models complex of an autho- “Black box”
rized access to system resources
during objective period. The proposed models allow to estimate preventive risks
Input (for estimation of confi-
dentiality): for being control in real time. The approach for modeling
М is the conditional number of a is based on algorithmic building new probabilistic models
barriers against an unauthorized Probability Pvalue of system protection
access; against unauthorized access during – see Table B.1.
Fm(t) is the PDF of time between objective period The probabilistic models for the estimation of preven-
M
changes of the m-th barrier P value = 1 − ∏ Pover .m , (A.10)
parameters; m =1 tive risks for being control in real time is presented by the
Um(t) is the PDF of parameters where Pover m – is the risk of overcom- formulas (B.1) – (B.6) in Table B.1.
decoding time of the m-th secu- ing the m-th barrier by violator during
rity system barrier, um – the mean objective period when resources value
time of a barrier overcoming; is high, Table B.1 – The models to predict risks for “Black box”
H(t) – is the PDF of objective 1 ∞ ∞ t (the proof and details - see [24, 25, 28, 30, 44-45])
period, when= resources value is P over f 0∫ dt ∫t d F m( t )0∫ d U m( θ )[1 − H ( θ )] ,
m
high. Evaluated
Models, methods Formulas
Note. The next variants are used measures
by the software tools [35-37]: The model for technolo-
Um(t)is exponentially distributed; gy 1 (“Black box”).
Fm(t) and H(t) are determined or Note. Technology 1
exponentially distributed. (without monitoring
The models complex of danger- between diagnostics)
ous influences on a protected Probability Pinfl of faultless (correct) is based on periodical
system. operation during given time: diagnostics of system
Input: variant 1 – the assigned period Treq is less integrity, that are carried
Wpenetr(t) – is the PDF of time be- than established period between neigh-
out to detect danger
tween neighboring influences for boring diagnostics (Treq < Tbetw.+Tdiag)
penetrating a danger source, for sources penetration into
-st Pinfl.(1)(Treq) = 1 - Wpenetr* Wactiv(Treq), a system or conse- R=1-P considering consequences.
Wpenetr.(t)=1-e , s - is the frequen-
(A.11) quences of negative Variant 1 – the given prognostic
cy of influences for penetrating;
Wactiv(t) – is the PDF of activa- influences. The lost period Treq is less than established
tion time of a penetrated danger variant 2 – the assigned period Treq is system integrity can be period between neighboring diag-
source, for Wactiv(t)=1-e-t/b, b – is more than or equals to established period detect only as a result nostics
the mean activation time; between neighboring diagnostics (Treq ≥ of diagnostics, after (Treq < Tbetw.+Tdiag):
Treq – is the required period of Tbetw.+Tdiag): which system recovery P(1) (Treq) = 1 - Wpenetr* Wactiv(Treq).
permanent secure system opera- N (Т betw. + T diag . ) is started. Dangerous (B.1)
⋅ P inf l .(1) (Т betw. + T diag . ) +
N
=P inf l .(2)
tion; T req. influence on system is Risk Variant 2 – the assigned period Treq
Tbetw. – is the time between the T req. − N (Т betw. + T diag . ) acted step-by step: at to lose is more than or equals to estab-
end of diagnostic and the begin- + P inf l . (Т betw. + T diag . ) ,
T req. first a danger source system lished period between neighboring
ning of the next diagnostic, Tdiag penetrates into a system integrity diagnostics
– is the diagnostic time. (A.12)
and then after its activa- (R). (Treq ≥ Tbetw.+Tdiag):
Note. The next variants are used where N=[ Тreq./(Тbetw.+ Тdiag.)] – is the
integer part. tion begins to influence. Proba- measure a)
by the software tools [35-37]:
System integrity can’t bility of P(2) (Treq) = N((Tbetw +Tdiag)/Treq) P(1)
Wpenetr(t) and Um(t) are exponen- N
tially distributed. be lost before a pene- providing (Tbetw +Tdiag) + (Trmn/Treq) P(1)(Trmn),
The models complex of an
trated danger source is system (B.2)
authorized access to system activated. A danger is integrity where N=[Tgiven/(Тbetw.+Тdiag.)] is the
resources. considered to be real- (P) integer part, Trmn = Tgiven -N(Tbetw
Input (for estimation of confi- ized only after a danger +Tdiag);
dentiality): source has influenced measure b)
М is the conditional number on a system. P(2) (Treq) = P(1)N(Tbetw +Tdiag) P(1)
of a barriers against an Input: (Trmn),
unauthorized access; Probability Pprot of system protection Wpenetr(t) – is the PDF of (B.3),
Fm(t) is the PDF of time between against unauthorized access: time between neigh- where the probability of success
changes of the m-th barrier M
P prot = 1 − ∏ Pover m , (A.13) boring influences for within the given time P(1)(Treq) is
parameters; m =1
penetrating a danger defined by (B.1).
Um(t) is the PDF of parame- where Pover m – is the probability of over- source;
ters decoding time of the m-th coming the m-th barrier by violator,
1 ∞
Wactiv(t) – is the PDF of
security system barrier, um – the =P over ∫ [1 − F m(t )]U m(t )dt. (A.14) activation time of a pen-
mean time of a barrier overcom- fm0
m
Models, methods
Evaluated
Formulas Software, 2017, 2: 393.
measures
[8] R. Valencia, J. Andrade-Cetto, Mapping, Planning
The model for technolo-
gy 2 (“Black box”). and Exploration with Pose SLAM, Springer, 2018:
Note. Technology 2, 124.
unlike the previous one,
[9] The DARPA Robotics Challenge Finals: Humanoid
implies that operators
alternating each other Robots To The Rescue, Springer, 2018: 692.
trace system integrity [10] G. Antonelli, Underwater Robots, Springer, 2018:
between diagnostics 374.
(operator may be a
man or special device [11] Cognitive Reasoning for Compliant Robot Manipula-
or their combination). tion, Springer, 2019: 190.
In case of detecting a [12] G. Venture, J.-P. Laumond, B. Watier Biomechanics
danger source an op-
erator recovers system R=1-P considering consequences. of Anthropomorphic Systems, Springer, 2019: 304.
integrity. The ways of Variant 1 - (Treq < Tbetw.+Tdiag): [13] A. Santamaria-Navarro, J. Solà, J. Andrade-Cetto,
integrity recovering are T req T req
ARTICLE
School Debit Transaction Using Fingerprint Recognition System
Wai Kit Wong* Thu Soe Min Shi Enn Chong
Faculty of Engineering and Technology, Multimedia University (MMU), Jalan Ayer Keroh Lama, Melaka, 75450, Ma-
laysia
Article history This paper proposed a fingerprint based school debit transaction system us-
Received: 11 September 2019 ing minutiae matching biometric technology. This biometric cashless trans-
action system intensely shortens the luncheon line traffic and labour force
Accepted: 22 October 2019 compared to conventional cash payment system. Furthermore, contrast with
Published Online: 30 October 2019 card cashless transaction system, fingerprint cashless transaction system
with benefit that user need not carry additional identification object and re-
Keywords: member lengthy password. The implementation of this cashless transaction
Fingerprint recognition system provides a more organize, reliable and efficient way to operate the
school debit transaction system.
Biometric Authentication
Image processing
1. Introduction friends, and sometimes the card can be scanned twice,
N
lead to a double charged for a single transaction. Another
owadays, parents need not to give cash directly concerning issue is if students forgot their identification
to their primary/secondary schools' children. number and PIN number of their card upon transaction, it
Some schools already practice to use their own might lead to a longer queuing time for other students, as
debit card system, whereby students or their parents just primary and secondary students normally have 15-20 min-
need to bank in/ deposit the money to the school treasury utes’ break, the heavy traffic might lead to a waste of food
department, the school treasury department will issue and time. Therefore, a higher level of security and reliable
a debit card to students for purchasing food in canteen, system should be implemented to replace the conventional
stationaries, fees etc. This debit card system in favour by debit card transaction system, in order to create a conve-
parents because they can monitor their children better due nient and safer environment for the children. Thus, bio-
to the reason no cash for students to be get lost/stolen or metric based debit transaction system is being proposed
purchasing outside drugs, tit-bit or unhealthy entertain- by researchers to overcome the above issues [1,2].
ment. Biometric authentication is a method of recognizing
However, parents still have concerns, such as debit a human being according to the physiological measure-
cards being stolen or misplaced by their children. There ments or physically features and traits [3]. The human
were a lot of wasteful resources for the system maintain- physical characteristics such as fingerprints, face, hand
er, as a new card had to be made for them who losing it. geometry, voice and iris are known as biometrics. Bio-
Besides that, students would also share their cards among metric technologies are becoming the foundation of an
*Corresponding Author:
Wai Kit Wong,
Faculty of Engineering and Technology, Multimedia University (MMU), Jalan Ayer Keroh Lama, Melaka, 75450, Malaysia;
Email: [email protected]
extensive array of highly secure identification and person- correct person and section IV reports some experimental
al verification solutions. Since biometric identifiers are results. Finally, in section V, some conclusion and envi-
associated permanently with the user, it is more reliable sion future developments is drawn.
than the conventional authentication methods such as PIN
and password. Thus, biometric based authentication can 2. Fingerprint Recognition School Debit
provide extra confidential in transactions by securing the Transaction System Design
personal information and privacy data.
This section outlines the system design for the fingerprint
In fact, there are many methods for biometric authen-
recognition school debit transaction system. It consists
tication. The most commonly used methods for biomet-
of the hardware architecture and software modules of the
ric authentication are iris scanning [4], hand scanning [5],
system as discuss in section 2.1 and section 2.2 below.
fingerprint recognition [6], face recognition [7], and voice
recognition [8]. The biometric information will never ever 2.1 Hardware Architecture
match with another individual because everyone has their
own unique biometric features. Researchers [9,10,11] had Figure 1 shows the hardware architecture for the proposed
conducted numerous analysis and comparison among dif- fingerprint recognition school debit transaction system.
ferent types of biometric recognition methods. The com- The overall system consists of fingerprint collection mod-
parison of biometric methods is mainly based on charac- ule and PC/tablets placed at each shop/stall, all linked to
teristics such as universality, uniqueness, performance, a centre hub (server) with students’ information database
permanence, and measurability. for info matching and business transaction.
Based on the researchers’ results [9,10,11], fingerprint Stall 1
Functional Push Buttons
recognition has the highest market share among the tech- LCD and LED Transaction
System
Display
nologies of biometric security system in the market. The R305 Optical
Fingerprint
Microcontroller
Arduino Uno PC/
preference of fingerprint recognition in the current market Module Board Fingerprint
Collection Module
Tablets
Server
is mostly due to its high accuracy, performance and sta-
Stall 2 TransactionSystem
bility. Besides that, fingerprint recognition has a moderate
pricing compare to iris scan which required a high capital
…
cost and level of skills to operate and maintain. Moreover, Stall n Transaction System
Figure 3. Fingerprint module connected to Arduino UNO Figure 5. Circuit Diagram of the LED Indicators and
board Arduino UNO Board
Figure 9. Activity diagram for fingerprint verification Figure 11. Activity diagram of transaction process
(c) (d)
gerprint matching technique is proposed to the develop due to the reason that the same device is used to capture
fingerprint based school debit transaction system and it is fingerprint images for both the offline processing stage
run by the following six steps: and online authentication stage. The generalized Hough
Step 1: Scan Live Fingerprint: Retrieve user’s finger- Transform [15] is applied to determine those parameters.
print image using R305-optical fingerprint module. The entry E (l , p, q ) sum up the verification of the orien-
Step 2: Classify Fingerprint Image: Classify the fin-
gerprint image into any of the below eight categories: (i) tation transformation Gθl ,∆x p ,∆y p , where (θ l , ∆x p , ∆y p )
Plain Arch (ii) Tented Arch (iii) Ulnar Loop (iv) Radial
Loop (v) Plain Whorl (vi) Central Pocket Loop Whorl (vii)
are the quantized values of (θ , ∆x, ∆y ) correspondingly.
Double Loop Whorl and (viii) Accidental Loop Whorl, as The normalized E (l , p, q ) in the range from 0 to 1 is
depicted in Figure 15.
represented by f (θ , x, y ) and is treated as the probabil-
Step 3: Identify Region of Interest: identify the essence
point in the fingerprint image and crop the core region ity density function for θ, x, y transformation parameters.
concentrated in the essence point. (θ , x, y ) are independent from each other and can be es-
Step 4: Enroll Fingerprint Minutiae: extract two timated separately, hence f (θ , x, y ) can be re-structured
minutiae spot sets M and N from two fingerprint im-
as:
ages (database and inquiry) with undisclosed scale,
rotation and translations by the following notations:
f (θ , x, y ) = f θ (θ ) * f x ( x ) * f y ( y ) (2)
{( ) (
M = m1x , m1y , γ 1 ,..., m xP , m yP , γ P )} ,
{( ) (
N = n1x , n1y , δ 1 ,..., n xQ , n Qy , δ Q )} where P and Q are ( 1
(1) Rotation Parameter: Let Od = Od ,..., Od d be the
P
)
orientation field from the database fingerprint image and
the total number of minutiaes in set M and set N respec-
tively. (m , m
i i
) ( )
, γ i and n xi , n iy , δ i are those three
( )
Oi = Oi1 ,..., OiPi be the orientation field from the in-
x y
features (x-position, y-position, orientation) correlated quiry fingerprint image, where Pd and Pi are the lengths
with the i-th minutiae in set M and set N respectively. of the Od and Oi arrays respectively. The generalized
Hough Transform based method to estimate the rotation
parameter (θ) consists of following 2 main steps:
(a) Estimate the probability density function of the ro-
tation parameter fθ (θ )
(b) Search the correct rotation parameter of the two
transformation among the two fingerprint images based on
the results obtain in (a.)
x cos θ sin θ x ∆x ∑ l fθ (l )
l∈
G s ,θ ,∆x ,∆y = s + (1)
y − sin θ cos θ y ∆y where λ is the densest interval among the extracted mi-
nutiaes from the collected fingerprint images
where s, θ, (∆x, ∆y ) are the scale, rotation and trans- (2) Translation Parameter: the computation of the trans-
lation parameters correspondingly. For fingerprint authen- ( )
lation parameters t x , t y can be done with the rotation
tication/identification, the scaling factor s is set to unity, parameter θ obtained above. Consider that the minutiae
where (n r ,i
x )
, n yr ,i , δ r ,i are the three features (spatial, Nr.
Step 6: Set Threshold to Compute Matching Score:
position, orientation) related to the i-th minutiae in set
Pair up the minutiae set if the two fingerprint images’ fea-
N r . It can be calculated by [14]:
tures or components ( ml (θ ) , ml ( x ) , m l ( y ) ) are identical or
n xr ,i cos θ − sin θ 0 n xi 0 within a range of tolerance. A tolerance box is generated
r ,i throughout each minutiae feature for coping with the
n y = sin θ cos θ 0 n iy + 0 (4)
shifting in the minutiaes pairs. The minutiaes pairs are
δ r ,i 0
0 1 δ i θ gathered among the pairs that fulfil the below geometric
constraints [14]:
(a) The two minutiaes’ Euclidean distance does not ex-
where (n , n i
x
i
y )
, δ i is the i-th minutiae in set N, θ is ceed a certain value ∆d .
(b) The two minutiaes directions’ angular difference
the estimated rotation angle. Two minutiae points sets M
below a certain tolerance ∆θ
and N r are used to calculate the translation parameters (c) Supposing that in excess of one pairs situate in the
(t x , t y ) . The steps for calculating x-translation, t x : same bounding box, the two minutiaes with the minimum
Euclidean distance opt as the matched pair.
(a) Estimate the probability density function of the
Concerning to weight out the similarity among two fin-
x-translation parameter f x (x ) gerprints, a similarity level measurement method applying
(b) Calculate the x-translation, t x with f x ( x ) . the matching score ψs is adopted, with the below formula
[14]
:
An accumulator array E ( p ) is used to gather the
verification for each possible x-translation, whereby N pair
ψs = (7)
p = m −n i
x
r, j
x is the x-translation which map n
r, j
x max{P, Q}
i i
to m x . m x is the x-coordinate for the i-th minutiae in set
where N pair is the number of matched minutiae pairs,
r, j
M and n x is the x-coordinate for the j-th point in set P and Q are the total number of minutiaes extracted from
N r . The correct x-translation transformation among two the database and inquiry fingerprint images correspond-
ingly. ψs is with value ranging from 0 to 1. If ψs is tends
fingerprint images is computed by mass center [14]:
to 0 implies that the two fingerprints are non-matching,
ml (x) =
∑ l p × f ( p ) (5)
p∈ x
else if ψs is tends to 1 implies that the two fingerprints are
good match.
∑ l f ( p) p∈ x
4. Experimental Results
where λ is the densest interval among the extracted mi-
In this section, the application of the proposed fingerprint
nutiaes from the collected fingerprint images.
school debit transaction system will be illustrated. It will
The steps for calculating y-translation, t y are identi- cover the product overview, test run results and the prod-
cal with that of calculating x-translation, t x . The correct uct survey analysis. The fingerprint school debit transac-
tion system was tested in an institution of higher learning
y-translation transformation among two fingerprint images
within Malaysia, who wants to remain anonymous.
is computed by mass center [14]:
4.1 Product Overview Figure 18. The basic information to insert is course, phone
number, full name, gender and age. After inserting all the
The final prototype of the fingerprint school debit transac- relevant information, the “ADD” button is pressed to en-
tion system is shown in Figure 16. The circuit board and rol in the system. In this case, the system will generate an
Arduino UNO microcontroller module are stored inside an ID number for that particular student. Moreover, the sys-
external custom made casing. The function of all the but- tem can be used to update the latest information or delete
tons are clearly labelled with laminated instruction signs. the student’s previous account.
The LCD and LED will begin to operate once the USB Next, students are instructed to enrol their fingerprint
cable is connected to PC/laptop/tablet. When the finger- with the assigned identification number in the fingerprint
print verification process is successful, the green LED will collection module. The “Enrol” button must press to enrol a
light up, whereas if unsuccessful fingerprint verification fingerprint, the message “Please insert your ID” will be dis-
process detected, the red LED will be light up. played on LCD screen, as shown in Figure 19(a). Once the
ID number has been inserted, the student may place his/her
finger on the fingerprint module to scan fingerprints. The
student must place his/her finger twice in each registration
process, because the second fingerprint input is required to
compare and check with the initial template to ensure that
both fingerprint inputs are matched. The system will then
display “Print Matched, Enrol successful” to indicate a
success case (as shown in Figure 19(c). Else it will display
“Error” in the LCD screen for fail case. Students who have
successfully enrolled their fingerprint into the database sys-
tem may now start deposit /top up credit into the database.
The top-up page is shown in Figure 19d.
(c)
(a)
(d)
Successful Attempt
Rate of Accuracy
= × 100% (8)
Total Attempt
(a)
(b)
[6] M. M. H. Ali, V. H. Mahale, P. Yannawar and A. T. tion Rate (FRR). Bayometric, 2017. From:
Gaikwad. Overview of fingerprint recognition sys- https://www.bayometric.com/-acceptance-rate-far--
tem. 2016 International Conference on Electrical, recognition-rate-frr/
Electronics, and Optimization Techniques (ICEEOT), [12] W. Yang, S. Wang, J. Hu, G. Zheng and C. Valli.
Chennai, 2016: 1334-1338. Security and Accuracy of Fingerprint-Based Biomet-
[7] R. Mansoor & B. Parisa. A Review Of Face Rec- rics: A Review. Symmetry, 2019, 11(141): 1-19.
ognition Methods. International Journal of Pattern [13] "Intergalactic Vault," [Online]. Available:
Recognition and Artificial Intelligence, 2013, 27(4): http://www.intergalacticvault.com/if-you-have-a-spi-
1356005(1 -35). ral-whorl-fingerprint-pattern-this-iswhat-it-means/
[8] M. K. Sharma & O. Kumar. Speech Recognition: A [14] J. Qi, Z. Shi, X. Zhao and Y. Wang. A Novel Finger-
Review. Special Conference Issue: National Confer- print Matching Method Based On The Hough Trans-
ence on Cloud Computing & Big Data, 2014: 62-71. form Without Quantization Of The Hough Space.
[9] J. Choudhary. Survey of Different Biometric Tech- Proceeding of the Third International Conference on
niques. International Journal of Modern Engineering Image and Graphics (ICIG’ 04) Hong Kong, China,
Research (IJMER), 2012. 2004: 262-265.
[10] M. N. Anjana Doshi. Biometric Recognition Tech- [15] N. Saroha and N. S. Gill. Hough Transform Based
niques. International Journal of Advanced Research Fingerprint Matching Using Minutiae Extraction.
in Computer Networking, Wireless and Mobile Com- International Journal of Advanced Research in Com-
munications, 2015, 2(1): 143-152. puter Science, 2013, 4(10): 117-120.
[11] D. Thaktar. Acceptance Rate (FAR) and Recogni-
ARTICLE
Using the CVP Traffic Detection Model at Road-Section Applies to
Traffic Information Collection and Monitor — the Case Study
Shing Tenqchen1* Yen-Jung Su2 Keng-Pin Chen1
1. ChungHwa Telecom Telecommunication, Laboratories (CHTTL), Taiwan
2. Graduate student of Dept. of Electronic & Computer Engineering, NTUST
Article history This paper proposes a using Cellular-Based Vehicle Probe (CVP) at
Received: 12 September 2019 road-section (RS) method to detect and setup a model for traffic flow infor-
mation (info) collection and monitor. There are multiple traffic collection
Accepted: 23 October 2019 devices including CVP, ETC-Based Vehicle Probe (EVP), Vehicle Detector
Published Online: 31 October 2019 (VD), and CCTV as traffic resources to serve as road condition info for
predicting the traffic jam problem, monitor and control. The main project
Keywords: has been applied at Tai # 2 Ghee-Jing roadway connects to Wan-Li section
Intelligent Transport Systems (ITS) as a trial field on fiscal year of 2017-2018. This paper proposes a man-flow
turning into traffic-flow with Long-Short Time Memory (LTSM) from re-
ETC-Based Vehicle Probe (EVP) current neural network (RNN) model. We also provide a model verification
Vehicle Detector (VD) and validation methodology with RNN for cross verification of system per-
Long-Short Time Memory (LTSM) formance.
Recurrent Neural Network (RNN)
1. Introduction into big data model for regular daytime.
A
This paper provides proposed traffic monitoring re-
dvanced traffic information collection can pro- sources from CVP, EVP, VD, and CCTV, etc. This model
vide an efficient, reliable, instant and mass traffic
combines a LTSM RNN structure to rapidly setup and
info at instant governmental road information
validate with RNN several trained into model with peak
publication. It can also be used for traffic managing strat-
and non-peak model for one year.
egies, monitor and control. This paper provides a trial
The main project combines Tai # 2 Gee-Jing Roadway
area at Tai # 2 Gee-Jing Roadway connecting to Wan-Li
section on the fiscal year of 2017-2018[1,2]. This project connecting to Wan-Li section and Mai-Kin road (RD)
provides a new increased CVP detecting road-section (RS) as RS collection area. It includes Tai #2 northern costal
from Man-flow turning into vehicle-flow Model applying RD (Emerald Bay to Gee-Jin 2nd RD), Gee-Jin 3rd RD,
to Traffic Information Collection and Monitor for 7 days Gee-Jin 2nd RD, Gee-Jin 1st RD, Mai-Jin RD, and An-Ler
per week with 5 minutes interval traffic info. Via the new RD. Figure 1 shows the flowchart of CVP road condition
improved man-flow turning to vehicle flow model, we detection procedure. This paper just includes the above
proposed a Long-Short Time Memory (LTSM) recurrent area as shown 56 RS in total at Figure 2 [1] (24 RS) and
neural network (RNN), to rapidly setup several trained Figure 2a [2] (32 RS). Thus, there are 56 RS in total at
*Corresponding Author:
Shing Tenqchen,
ChungHwa Telecom Telecommunication, Laboratories (CHTTL), Taiwan, China;
Email: [email protected]
Figure 2 (a) & (b) and 5 minutes traffic info for CVP with
RS traffic travelling time, vehicle flow, and RS-turning
vector updated periodically. Figure 3 shows the detected
CVP Road Condition detection flowchart. The flowchart
is designed to have 5 procedures, which is the first step,
CVP signal command original; data collection; the second
step is related traffic info collection, like CVP, EVP, VD,
and CCTV. The third step is merged from step 1 and step
2. Then, the major work of this project is traffic flow tra-
jectory modelling setup and Analysis. The deployed at the
trial region is shown at Figure 2a & b.
(1)
CVP Signal command (3) (4) (5) Figure 3. Signal timing at selected intersection points
original data Collection.
Traffic flow Trajectory RS CVP Road Condition Model
Modelling Setup and Detection and Model Calibration
(2)
types of Intersection
Tai #2nd RD
Gee-Jin 3rd RD II Gee-Jin 2nd RD Gee-Jin 1st RD II Gee-Jin 1st RD I
Gee-Jin 3rd RD I
N N N N N N
Gin-Shan 010 010 010 010 010 010
Keelung
5 4 3 2 1 0 Downtown
HW #3
National
Tai #62
Mai-Jin RD
Ma-Lan RD
Gin-Mei RD Gee-Jin 3rd RD N N
030 020
0 0
N N
040 040
1 An-Ler RD sect. 1 3
N N Keelung
CVP Detecting RS Ba-Do
Si-Ze 050
Intersection 0
040 Downtown
2
(Da-Ye Tunnel)
2018 new increased 2 RS
Yi- 2nd RD
Yi- 1st RD
Shin 2nd RD
2. CVP Road Condition Detection and Model
Jong-Shan 1st RD
Yi- 3rd RD
Yi- 4th RD
Gun-Shi St.
Hsin 2nd
Parking lot
Shin 1st RD Setup
Road condition detection is defined as to include the
Zen 1st RD
Jong 2nd RD
Station
Jong 4th RD
Zen 4th RD can use statistics to calculate each individual timing on
the certain road-section (RS) for every customer. Then,
Jong 3rd RD
Zen 5th RD
SIAO 2nd RD
Ai 1st RD
SIAO 3rd RD
Ai 3rd RD
2.1 Traffic-flow Model Setup and Analysis It can memorize the time-series info of traffic volume
and serve as the reference point of next time stamp. Com-
Via the mobile signal info, we can estimate the traf- pared with RNN model, LSTM model has more gates
fic-flow volume at that RS from the historical info by such as forget gate, input gate, and output gate. They can
neural network training data module to postulate the RS be used as a more complicated parameters to be used
traffic volume. When the system receives the instant memorize and forget to reach a better postulated capabili-
traffic mobile data, one can use this module to postulate ty. We compare the experimental models of CNN, BPNN,
traffic-flow volume. Furthermore, when each accumulated and LSTM from simulation. The LSTM has a better result
period of time from the historical data, one can increase [2]
.
the accuracy of traffic-flow volume. For analyzing the
CVP road- condition to postulate the trend of traffic-flow 2.2 Traffic-flow Estimation
volume. This paper uses the supervised learning from
machine learning model. The training procedure is to tell Via the mobile signal info, this paper proposes a postu-
the true value of that RS to let them learn themselves. The lated estimated traffic –flow volume estimation from neu-
training model is used to postulate the future change of ral network training RS during a historical info module
traffic flow. This paper uses the model of long short- term over a period of time. For accumulated historical data, one
memory, (LSTM) to be an extended model, as shown in can reconstructed the model of RS to increase the accura-
Figure 4 for system architecture. It is an artificially recur- cy of traffic-flow estimation.
rent neural network (RNN) architecture. LSTM has feed- To analyze the trend change of road condition for the
back connections and not only process single data points variation of CVP to postulate the traffic-flow. This paper
(such as images), but also entire sequences of data. The adopts the supervised learning style of machine learning.
compact forms of the equation for the forward pass of an That is at the training level to input the true value of traf-
LSTM with a forget gate are: [7,8] fic-flow to let if self-adjust at the training model. One just
see the MSE error of training model enter the allowance
range to reach the accepted setup model.
We can use this model to postulate the variation of traf-
fic flow in the future. In the model, we propose the major
structure of RNN because the info of time-series model
can record the past info change from memory and use this
model to postulate the future change of traffic flow. There
are five major elements in the RNN model:
tanh
(1) The input of RNN is an X, which is the Telecom
Forget
Gate
Input Gate signal info. Those contain man-flow, date, time (5 minutes
Output
Gate
as one units), and traffic-flow, etc.
(2) The output of RNN is a postulated traffic-flow.
tanh sigmoid
sigmoid sigmoid (3) The parameters of RNN are the weightings of U, V,
W with the final recursive trained values.
(4) The hidden state is to represent the RNN’s memo-
ry’s S.
Input
Output (5) A series of continued periods of time from t-1, t,
t+1.
Figure 4. LSTM system architecture (6) The traffic-flow postulated model is based on the
Where the initial values are c0 = 0 and h0 = 0 and the time-series recurrent neural network, which is based on
operator ο denotes the Hadamard product (element-wise the info of CVP, can be regarded the input of RNN and
product). The subscripts t indexes the time step. LSTM the trend of traffic-flow is regarded as the output of RNN;
handles the cell memory to be a controlled gate state. That where the hidden state at the time instant of t-1 and the
is it can delete, increase, and output the message. ft is de- hidden state of time t. The formula is written as
fined as forget gate, which message is deleted, increased,
and outputted from cell. And, it is defined as the input =
gate (
St f [U ] X t + [W ] St −1 (6) )
which message is deleted, increased, and inputted from
cell. Ot is defined as the output gate which message is de- The Timing Sequence of RNN can be depicted as Fig-
leted, increased, and outputted from cell. ure 5.
Figure 5. Timing Sequence of RNN [3,4] Data Model Training Model Testing Model
N
of variation. To reduce the effects of the irregular states, Data Pre-
processing
Extract info
one needs to pretreat the traffic info. The pretreatment Train Model
of traffic info include the info become a time-series info; Finish model setup
and store at AP server
Return Model
Parameters
which contains 4 stages, sort out time-series info, com- Message Queue
Acquire an instant
bine RS, info standardization, and correspond to CVP necessary CVP info
info, respectively. The total flowchart is depicted as fig- Data Pre- Download
Model Postulation
D a t a i s Z-score is
Step 3:
standardized. standardized. Figure 7. Man-flow turning into traffic-flow postulated
Connect & P r o d u c e
framework
Step 4: Correspond to
Correspond to Training data
CVP data
EVP data.
or testing data. The framework of human-flow given at Figure 8
turning into vehicle-flow contains input layer, LSTM
Figure 6. Pretreatment of Man-flow turning into traf- layer, hidden layer and output layer; where t represents
fic-flow time stamp, t-5, represents a priori 5 time stamp. X1 –
The procedure is arranged into the following stages: X4 represents different characteristics, j1 to jn represents
(1) The 1st stage: a hidden neural unit, y(t) represents the traffic-flow. At
The 1st stage is to arrange time-series data and telecom input layer, there are numerous characteristics such as
user individual time-series data. the total signal numbers, travel time, a rough estimated
(2) The 2nd stage: total number of vehicles at that RS to be a set of input
The 2nd stage is to combine RS. At first is to investigate info. Furthermore, one-time estimated info needs to be
the path road section in correspondence table and find out input 6 sets data from (t0)~(t-5). After passing numerous
the needed RS info of required path and combine them long-term memory LSTM layer (as shown in Figure 7)
and delete the outlier’s value and vacant value. and one hidden layer, it finally come out an estimated
(3) The 3rd stage: traffic-flow result. The flowchart of human-flow turning
The 3rd stage is to standardize data and proceed the into vehicle-flow postulated model is given in Figure
data to meet standard normal distribution. That is, the 8. Mainly, it can be casted with three folds. There are
mean value is 0, standard deviation error is 1, and, its data model, training model, and testing model, respec-
transfer function is tively. Their responsibilities are data processing at data
model, training model at trained model, and executing
z=
(x − µ) (7)
vehicle-flow postulation at testing model. At first, one
σ comes into data model. They execute the judge of retrain
to decide those data whether needs to be retrained. If,
where x is needed to be standardized score, µ is the av- it is ‘yes’, it shall enter to query the historical data and
erage value, σ is the standard error and σ ≠ 0, z represents proceed to handle data preprocessing. Via the training
model, one can get the extracted trained model to be the fication result.
input model of neuron. After finishing the setup model, This paper adopts the Lewis [7] as the accuracy of
we store it into Application (AP) server. Furthermore, evaluation criteria with MAPE. If, when the value of
from the data model, one can acquire the necessary MAPE is between 10%-20%, it the model has high accu-
postulated CVP data and similarly proceed info pre-pro- racy; when the value is 20%~50%, it means the predic-
cessing. Therefore, we can get a better capability from tion is reasonable.
that kind of reference record. The individual training and
parameter adjustment are important to reach an expected Table 2. MAPE Evaluation criteria [7]
result.
MAPE(%) illustration
iv:1412.6980, 2014.
[7] Lewis, C. D. Industrial and business forecasting
methods: A radical guide to exponential smoothing
and curve fitting. London, Boston: Butterworth Sci-
Figure 10 (a). The CVP traffic-flow verification at Na- entific, 1982: 305.
tional HW #1 (From Bar-do to Mai-Gin RD) [8] Sak, Haşim, Andrew Senior, and Françoise Beaufays.
Long short-term memory recurrent neural network
architectures for large scale acoustic modeling. Fif-
teenth annual conference of the international speech
communication association, 2014.
[9] Yann LeCun, Leon Bottou, Yoshua Bengio, Patrick
Haffner. Gradient-Based Learning Applied to Docu-
ment Recognition, 1998.
ARTICLE
Application of Feature Curves and Shape Blending on Yacht Designing
Shih-Wen Hsiao1* Jeng-Horng Chen2 Ting-An Yeh1
1. Department of Industrial Design, National Cheng Kung University, Tainan, 70101, Taiwan
2. Department of Systems and Naval Mechatronic Engineering, National Cheng Kung University, Tainan, 70101, Tai-
wan
Article history The global yacht market share and industry might expand continually since
Received: 16 September 2019 increasing people are willing to enjoy the yacht life in lower price nowa-
days while yacht activities were regards as a luxury acitivity in the past.
Accepted: 23 October 2019 Additionally, Taiwanese yacht manufacturers are well-known worldwide.
Published Online: 30 October 2019 They show excellent performances on the international annual rankings
which implies Taiwan has excellent manufacturing technologies. However,
Keywords: Taiwanese manufacturers so far do not have a mature local design team.
Artificial intelligent Therefore, this study goals to developing a systematic and objective design
method for hull designing, which facilitates designers to design innovative
Yacht industry yachts or create a series product with brand recognition. This study is divid-
Shape morphing ed into three parts: the first part is the investigation of the yachts market; the
Computer aid design second is establishing a shape blending platform; the third is 3D forming.
Finally, it is used the existing ship CAD software to design an innovative
Product design
yacht based on the blended curves and then calculates its basic hydrostatic
Aesthetics performance. This study provides a quantitative method to create a new
form and to preserve the features for a brand. The exist yacht combines
with other graphics to create a new form and maximizes the features of the
original graphics.
1. Introduction In the past, the yacht market was mainly distributed
T
in North America, Europe, the Mediterranean, and New
he yacht industry has had a stable demanding mar-
Zealand and Australia. With the rise of Dubai and China
ket in Europe and American. In recent years, the
in recently, the demand in these two regions has grown
market for yachts, water amusement facilities and
rapidly. According to the global luxury yacht market sur-
related industries has expanded depending on the people’s
vey report of Wise Guy Reports in 2017 [1], the market and
attention to leisure and entertainment. At present, the mar-
ket capacity of the entire yacht industry in the world has growth trend of the future yacht industry are pointed out
exceeded USD 40 billion. Because of the world economic in the article because of the growth of millionaire families
growth, the adjustment of the supply and demand scales, and the popularity of yachts as luxury sports. Thus, they
and the large number of old ships that need to be renewed, have increased the market demand for private yachts. In
the overall demand for new ships will remain above a cer- addition, the market size in the following ten years is fore-
tain amount. cast to grow. By 2022, the global market can reach USD
*Corresponding Author:
Shih-Wen Hsiao,
Department of Industrial Design, National Cheng Kung University, No. 1, University Road, Tainan, 70101, Taiwan;
Email: [email protected]
74.7 billion [1]. uct makers in the market, it is critical to stand out from
Taiwan has a land area of about 36,000 km2 where the vast competitors in the case where the market share of
contains 31 yacht manufacturers and several of which are the product is close to saturation and the product function
well-known worldwide. Our construction abilities have and manufacturing technology are highly mature. When
been favored around the world as well. Also the yacht the brand is identified as a combination of elements, noth-
manufacturers have been ranked in the global rankings ing can be ignored and the product conveys brand value
recently. For example, Horizon Yachts has been ranked through its appearance [7]. Overall, family features and the
among the top ten manufacturers in the world for many establishment of perceived connections between brands
years [2], and the Ocean Alexander, their number of yacht and consumers, with their design needs and business eco-
sales in 2016 also jumped to the fourth place in the world nomic considerations, which may be a key factor in de-
[3]
. Those show Taiwanese yacht manufacturers have good termining whether the product is sold successfully in the
reputation and are trusted by the international customers. market.
However, Hsing Hang Marine states on its official website Regarding the basic principle of aesthetics within the
that the yachts produced by Taiwanese brand have not yet past days, Plato once stated that the thing with symmetry
established their own distinctive style and brand charac- and regularity was beautiful. Most forms of beauty were
teristics. It is to say that Taiwan still hasn’t had its own possessed regular geometric shapes, conforming to the
yacht designer team. Most of the current ship plans are appearance of natural look. Birkhoff, the first scholar
designed abroad. It is more difficult to develop the specif- proposing quantitative beauty, applied the calculations of
ic characteristics of the company. beauty on forming, poetry, music and other fields in his
In recent years, the manufacturers in Asia, such as book Theory of Aesthetic Mathematic. He applied the
South Korea and China, has also been continuously im- above concepts to quantify the beauty by mathematics.
[8]
proving. Among these countries, China progress the most. Later, Staudek used Birkhoff’s aesthetic formula to
In such a competitive environment, to maintain market discuss the contribution of the measurement method re-
share and the company’s profitability, Taiwan should garding the aesthetic quantification of the appearance of
break through the present operation modes of buying de- the object and he verified it by vases (shown in Figure 1)
[9]
signs from abroad, and consider both future trends and . The several types of characteristic points were created
one of the major features of Taiwan's yacht industry. Add- along the outline: terminal point, point of inflection, point
ing features to their products highlights the values and of vertical tangent, and point of abrupt change in the di-
significances behind the brand, while the product can be rection of tangent. (Eq. (1)).
modularized, launched a series of products, and used for
innovative design to increase recognition. H +V + P +T
M= (1)
For many modern industries, the application and de- C
sign extension of the brand series are the design direction
of the new era. Yacht design can also use this concept to Where H is the number of the horizontal order, H ≤ 4;
develop specialty products. The purpose of this study is V is the number of the vertical order, V ≤ 4; P is the num-
to apply computer-aided design (CAD), systematic col- ber of the proportional order, T ≤ 4; C is the number of
laboration design, and the concept of brand feature to es- the tangent order, ; is the complexity of the characteristic
tablish a system that is suitable for yacht design: develop points and M is the aesthetic measure.
new forms with the shape blending method, and judge the
form with the principles of aesthetics, which is no longer
relying on the designer's personal aesthetic to design the
appearance of the yacht.
2. Related Works
2.1 Feature Forms and Aesthetics
In the product design, the appearance is the most basic
Figure 1. Tomáš Staudek’s aesthetic measurement of
form of a product. Regardless of the functions, the ap- vases
pearance has a tremendous influence on product sales, and
sometimes plays an important role in whether the product Hsiao & Tian added the appropriate parameters into
can survive successfully [4-6]. Therefore, for mature prod- the original aesthetic measure. The new formula could
be applied to the 2D curves and 3D surface. Also, they and the conceptual yacht design. Finally, it is to present
proposed the measurement of the order, complexity, and a new yacht with distinctive features and a system model
aesthetics of the form as the evaluation basis of the form that could be applied to design concept yachts.
aesthetics for designers. Finally, it assisted designers to
design new products. [10]
yacht's form with other features, so the eight samples, inal canoe, orchid and Taipei 101(shown in appendix
named in order from A to H, were selected as a reference A.2). The eight options for the subject to choose and to
based on the survey results. (See as appendix A.1) The add in the yacht design were ranked. According to the
first choice for yacht samples was that the manufacturer top five elements of the most wanted element and based
designed and built the length between 25 to 40 meters on the result, the highest score of the aboriginal pattern
of yacht. For its style to reach the modern trend, the ship and the second highest score of Taiwanese leopard cat
should be built within five years, and its main function are selected to add in the design.
was leisure. There was at least one closed interior space
on the deck. It was mainly driven by fuel and achieving
the buoyancy requirements and the regulations.
To concentrate on the exterior design, the samples pre-
sented to the participants should be displayed by outlines
and feature curves, and excluded materials, color. At the
same time, the influence of brand preferences on the par-
ticipants was excluded as well. At the time of the investi-
gation, the brands of the eight yachts were not disclosed: Figure 4. Preference ranking and scores of the Taiwanese
the participants only knew the length, beam and draught elements going to be blended (Score; Selection; Percent-
of the yachts. age)
3.2.2 Expert Survey
3.3 Shape Blending and Selecting the Feature
The study interviewed 11 yacht experts and conducted a Curves
survey of preferences, including engineers, designers and
According to the results, this study selected the top two
operations managers of ship researchers, shipping agents,
scores: Taiwanese aboriginal pattern and Taiwanese leop-
and who were interested in yachts and had a certain level
ard cat as the Taiwanese feature elements for the new
of understanding multiple yachting experience and under-
concept yacht design, respectively decomposing the fea-
stand the Taiwanese yacht brands, concerning about the
ture curves, and then composing new elements and shape
latest yachts often.
blending of hull.
11 experts conducted style analysis on eight ships and
The hull sample used the G yacht as a reference and the
ranked them in order of preference. The interview results
study selected its local feature curves. According to the
showed that the eleven experts disagreed on the style
side-view diagram above the waterline, the yacht curves
view, but only the G (Figure 3) had a similar view. In
could be divided into outlines, windows, structural lines,
terms of the preference ranking, the number G also was
details, the parts of which to adjusted are selected. Then,
scored the highest. Thus, it was going to use the number
they were blended with the same or different feature el-
G yacht on the following study.
ements. The datum hull was created by DELFTshipTM
free, from which the outlines of the various views were
obtained, and the side view and top view of the G yacht
were used to obtain more detailed curves, shown as Fig-
ure 5. With the lines in the front view, top view, and right
view, the curves that represent the features of the Taiwan-
ese leopard cat could be selected. The curves of Taiwan-
Figure 3. The yacht G
ese leopard cat's round head and strong musculoskeletal
In addition, the interview also questioned the ex- features were the final decision to join the new form of the
perts’ views on the innovative yacht styling and their yacht, shown as Figure 6.
acceptance of the design of the Taiwanese elements.
The acceptance was also divided into 11 stages, more
score more acceptance. The answers were all positive,
the score statistics were shown in Figure 4. At the same
(a) The outline of the main deck (side view)
time, this study provided several Taiwanese elements,
namely: butterfly, Taiwanese salmon, Taiwanese leopard
cat, Hakka pattern, aboriginal pattern, Taiwanese aborig- (b) The fence of the deck (side view)
Figure 6. The selected feature curves of Taiwanese leop- 4.2 The Interface and Method of Shape Blending
ard cat
A blending platform was written by JAVA, shown as Fig-
The function of the aboriginal patterns cloud be classi-
ure 8. After the hull and one of the sectional curves of
fied to records, legends, blessings, etc. After referring to
Taiwanese leopard cat were inserted into the platform, the
the shape, story behind the pattern, the study selected the
blending operation could be performed. The steps were as
hundred pacer (Deinagkistrodon), a kind of snake, and the
follows:
eye of the sun as the blending elements.
(1) Inserted the point data (.txt) of the yacht and the el-
ement separately.
(2) Adjusted the yacht weight W S and the element
weight WE, WS + WE = 1.
(3) Clicked the Blending button to blend.
(4) The SAVE button stored the blending result in the
image file (.jpeg).
(a) Hundred pacer (Deinagkistrodon)
(5) The Clear button cleared all point data and display
curves shown on the interface.
(a) the weight of ship, WS: 0.4; the weight of element, WE:0.6
(b) the weight of ship, WS: 0.5; the weight of element, WE:0.5
Figure 12. The blending results from the top view of main
deck and the hundred pacer’s head
4.3.3 The Final Result The eye of the sun is installed on the bow which follows
its original meaning: the eyes of vessel. Such pattern is
After repeatedly adjusted the yacht model through the bound to be engraved on the canoe of the Dawu people to
hydrostatic performance and aesthetic test, the final result protect the crews from the navigation. In the results of this
was shown in Figures 14 and 15 This new yacht was a study also adds such elements. However, in order to make
private yacht for leisure and entertainment, suitable for it more concise, this design slightly simplifies the original
families or entertaining guests. The design had a length of graphics, but carries the same meaning as the origin, a
33.40 m, a total length of 33.59 m, a design beam of 7.30 wish of safe sail.
m, a total beam of 7.78 m, a design draft of 1.7 m, and a
hydrostatic performance result of a relative water densi- 5. Discussion and Conclusion
ty of 1.025 and a mean shell thickness of 0.015 m. The
molded volume was 122.038 m3, the displacement was Based on the feature parameterization method, shape
127.37 tons, the longitudinal center of buoyancy is 16.301 blending and other methods combined with the existing
m, the block coefficient was 0.2998, and the waterplane 3D CAD software DELFTshipTM free and Rhino 5.0, this
coefficient was 0.4932. There were two closed cabins and study established a new concept of yacht design process,
an open platform above the deck. and uses the JAVA programming language to carry out the
calculation of point data.
the blending method shows that the results of the arith- 5.3 Conclusion
metic mean and the geometric mean method are similar
to the original graph, and the blended curves are more This study provides a systematic method to design the
predictable. The result of the harmonic mean method is concept of yacht design: the existing yachts, with the
significantly different from the original graph. However, it actual animal, graphics, etc. into the yacht, constitute
can still be seen that it is a little similar to the original, and new curves, so that the figures can be properly combined
the generalized weighted mean method has the biggest with the existing yacht, the maximum present the special
difference. Because this study focuses on the feasibility of characteristics of the original graphics, and can meet the
the vessel, the arithmetic mean and geometric mean meth- basic performance of the yacht and the legal norms. The
od are more suitable so this study uses the least difference new curve obtained from the shape blending method can
method - arithmetic mean. At the same time, it can be seen also be completely preserved and provided for the next
that the harmonic mean method is suitable for the devel- design use. The future development is to further improve
opment of brand new product, subverting the impression the shape blending software, making the selected feature
of the past. points more accurate and more representative in order to
preserve the feature. Also, improving the software can de-
5.2 Problems and Discussions crease the time of the design process. Widely application
for the brand company, it can be effectively established
The results of interviews with relevant industry workers and save its own brand features, and further add new
and experts show that the participant's perception of each elements into the old product style. If a brand company
yacht is different, only a few in common. The possible wants a cross-over with different domains, this method
reason causing the problem is that the definition of each can provide a higher level of cooperation.
adjective is not clearly defined, so the participants might
follow their thinking based on growth background, experi- Appendix
ence and understanding of the vocabularies. These results
in different imaginations, which lead to divergence of
A.1 Eight Selected Yacht Samples
results. Therefore, it is necessary to guide the participants
to understand before they fill in the questionnaire, to de-
scribe the connection between words and images, and to
present photos in a monochrome stereoscopic model.
In the discussion of style and feature curves, this study
only interviews workers and experts in related industries.
In the future, it is better to add a large number of con-
sumer opinions in this part, and further subdivide into (a) Raised pilothouse yacht A
statistical data of different regions, and even join the age
segment for analysis. It can better reflect the market ori-
entation, assist in the decision-making of the design, and
then the accurately position in the market can capture con-
sumer curiosity and inspire desire of purchase.
In this study, some blended feature curves are seg-
ment of the initial curves. This research method does not
provide a feature curve that can be more automatically
(b) Luxury leisure yacht B
selected. In contrast, it is necessary to manually select the
required curve segments. In this aspect, the computer pro-
gram of the platform can add the ability about selecting
partial curves, making the whole process more automatic
and convenient. In addition, each software and platform
are independent on each other at present. When data is
processed, it is often necessary to switch between several
software. If the platform for calculation can be rewritten
as a plug-in for a forming software or doing operations
(c) Luxury sport fisher yacht C
inside the CAD software, it will be more convenient from
blending to the forming process.
References
[1] QYResearch Group. Global Luxury Yacht Market
Professional Survey Report 2017. [R]. Wise Guy Re-
ports., 2017. Retrieved from
h t t p s : / / w w w. w i s e g u y r e p o r t s . c o m / r e -
ports/887080-global-luxury-yacht-market-profes-
sional-survey-report-2017
[2] Raphael Montigneaux and the editors of Show Boats
International. Annual Report: 2016 Global Order
Book. [R]. 2015. Retrieved from
https://www.boatinternational.com/yacht-mar-
(f) Taiwanese aboriginal canoe ket-intelligence/luxury-yachts-on-order/annual-re-
ports/2016-global-order-book—28783
[3] Yo, Hsiao-Yen. Mysterious Taiwanese yacht facto-
ry dominates the US market: not to help American
OEM manufacturing but to find American to OEM
manufacture. [J]. Wealth Magazine, 2016, 499: 103-
105.
[4] Bloch, P. H.. Seeking the ideal form: product design
and consumer response. [J]. The Journal of Market-
ing, 1995, 59(3), 16-29.
DOI: 10.2307/1252116
[5] Moulson, T., & Sproles, G.. Styling strategy. [J].
Business Horizons, 2000, 43: 45-52.
[6] Page, C. & Herr, P. M.. An investigation of the pro-
cesses by which product design and brand strength
interact to determine initial affect and quality judg-
ments. [J]. Journal of Consumer Psychology, 2002,
12(2): 133-147
(g) Orchid [7] Mccormack, J. P., Cagan, J., & Vogel, C. M.. Speak-
ing the Buick language: capturing, understanding,
and exploring brand identity with shape grammars.
[J]. Design Studies, 2004, 25(1): 1-29.
[8] Birkhoff, George D.. Aesthetic Measure. [M]. Cam-
bridge, MA: Harvard University Press, 1993.
[9] Staudek, T.. On Birkhoff’s Aesthetic Measure of Vas-
es. [J]. FI MU Report Series, 1999.
[10] Hsiao, S. W. & Tian, Z. C.. Use aesthetic measure to
analyze the consumer preference model of product
forms. [J]. International Journal of Engineering and
Innovative Technology (IJEIT), 2018, 12(7): 5-11.
[11] Hui, K.C. & Li, Y.. A feature-based shape blending
technique for industrial design. [J]. Computer-Aided
Design, 1998, 30(10): 823-824.
[12] Wang, G.J., Wang, C.C. & Frank Chuang, S.H.. Re-
verse engineering of sculptured surfaces by four-axis
non contacting-scanning. [J]. The International Jour-
nal of Advanced Manufacturing Technology, 1999,
15(11): 800-809.
[13] Hsiao, S.W. & Chuang, J. C.. A reverse engineering
(h) Taipei 101
Resources: Google Images, www.google.com.tw/imghp based approach for product form design. [J]. Design
Studies, 2003, 24(2): 155-171. curve. [J]. Advanced Engineering Informatics, 2018,
[14] Hsiao, S.W., Lee, C.H., Chen, R.Q. & Lin, Chien-Yu. 38: 14-26.
A methodology for brand feature establishment based DOI: https://doi.org/ 10.1016/j.aei.2018.05.008
on the decomposition and reconstruction of a feature
Ⅰ. Format
Ⅱ. Cover Letter
Ⅲ. Abstract
A general introduction to the research topic of the paper should be provided, along with a brief summary of its main
results and implications. Kindly ensure the abstract is self-contained and remains readable to a wider audience. The
abstract should also be kept to a maximum of 200 words.
Authors should also include 5-8 keywords after the abstract, separated by a semi-colon, avoiding the words already used
in the title of the article.
Abstract and keywords should be reflected as font size 14.
Ⅳ. Title
The title should not exceed 50 words. Authors are encouraged to keep their titles succinct and relevant.
Titles should be reflected as font size 26, and in bold type.
Ⅳ. Section Headings
Ⅴ. Introduction
The introduction should highlight the significance of the research conducted, in particular, in relation to current state of
research in the field. A clear research objective should be conveyed within a single sentence.
Ⅵ. Methodology/Methods
In this section, the methods used to obtain the results in the paper should be clearly elucidated. This allows readers to be
able to replicate the study in the future. Authors should ensure that any references made to other research or experiments
should be clearly cited.
Ⅶ. Results
In this section, the results of experiments conducted should be detailed. The results should not be discussed at length in
this section. Alternatively, Results and Discussion can also be combined to a single section.
Ⅷ. Discussion
In this section, the results of the experiments conducted can be discussed in detail. Authors should discuss the direct and
indirect implications of their findings, and also discuss if the results obtain reflect the current state of research in the field.
Applications for the research should be discussed in this section. Suggestions for future research can also be discussed in
this section.
Ⅸ. Conclusion
This section offers closure for the paper. An effective conclusion will need to sum up the principal findings of the papers,
and its implications for further research.
Ⅹ. References
References should be included as a separate page from the main manuscript. For parts of the manuscript that have
referenced a particular source, a superscript (ie. [x]) should be included next to the referenced text.
[x] refers to the allocated number of the source under the Reference List (eg. [1], [2], [3])
In the References section, the corresponding source should be referenced as:
[x] Author(s). Article Title [Publication Type]. Journal Name, Vol. No., Issue No.: Page numbers. (DOI number)
J = Journal/Magazine
M = Monograph/Book
C = (Article) Collection
D = Dissertation/Thesis
P = Patent
S = Standards
N = Newspapers
R = Reports
Kindly note that the order of appearance of the referenced source should follow its order of appearance in the main manu-
script.
Graphs, Figures, Tables, and Equations
Graphs, figures and tables should be labelled closely below it and aligned to the center. Each data presentation type
should be labelled as Graph, Figure, or Table, and its sequence should be in running order, separate from each other.
Equations should be aligned to the left, and numbered with in running order with its number in parenthesis (aligned
right).
Ⅻ. Others
Conflicts of interest, acknowledgements, and publication ethics should also be declared in the final version of the manu-
script. Instructions have been provided as its counterpart under Cover Letter.
About the Publisher
Bilingual Publishing Co. (BPC) is an international publisher of online, open access and scholarly peer-reviewed
journals covering a wide range of academic disciplines including science, technology, medicine, engineering,educa-
tion and social science. Reflecting the latest research from a broad sweep of subjects, our content is accessible world-
wide – both in print and online.
BPC aims to provide an analytics as well as platform for information exchange and discussion that help organizations
and professionals in advancing society for the betterment of mankind. BPC hopes to be indexed by well-known
databases in order to expand its reach to the science community, and eventually grow to be a reputable publisher
recognized by scholars and researchers around the world.
Database Inclusion
National Library, Singapore Asia & Pacific area Science China National Knowledge Creative Commons
Citation Index Infrastructure