Professional Documents
Culture Documents
Download textbook Cybernetics And Algorithms In Intelligent Systems Radek Silhavy ebook all chapter pdf
Download textbook Cybernetics And Algorithms In Intelligent Systems Radek Silhavy ebook all chapter pdf
https://textbookfull.com/product/intelligent-systems-in-
cybernetics-and-automation-control-theory-radek-silhavy/
https://textbookfull.com/product/software-engineering-and-
algorithms-in-intelligent-systems-radek-silhavy/
https://textbookfull.com/product/artificial-intelligence-and-
algorithms-in-intelligent-systems-radek-silhavy/
https://textbookfull.com/product/computational-and-statistical-
methods-in-intelligent-systems-radek-silhavy/
Applied Informatics and Cybernetics in Intelligent
Systems Proceedings of the 9th Computer Science On line
Conference 2020 Volume 3 Radek Silhavy
https://textbookfull.com/product/applied-informatics-and-
cybernetics-in-intelligent-systems-proceedings-of-the-9th-
computer-science-on-line-conference-2020-volume-3-radek-silhavy/
https://textbookfull.com/product/software-engineering-
perspectives-in-intelligent-systems-proceedings-of-4th-
computational-methods-in-systems-and-software-2020-vol-1-radek-
silhavy/
https://textbookfull.com/product/software-engineering-
perspectives-in-intelligent-systems-proceedings-of-4th-
computational-methods-in-systems-and-software-2020-vol-2-radek-
silhavy/
https://textbookfull.com/product/artificial-intelligence-methods-
in-intelligent-algorithms-proceedings-of-8th-computer-science-on-
line-conference-2019-vol-2-radek-silhavy/
https://textbookfull.com/product/intelligent-algorithms-in-
software-engineering-proceedings-of-the-9th-computer-science-on-
line-conference-2020-volume-1-radek-silhavy/
Advances in Intelligent Systems and Computing 765
Cybernetics
and Algorithms
in Intelligent
Systems
Proceedings of 7th Computer Science
On-line Conference 2018, Volume 3
Advances in Intelligent Systems and Computing
Volume 765
Series editor
Janusz Kacprzyk, Polish Academy of Sciences, Warsaw, Poland
e-mail: kacprzyk@ibspan.waw.pl
The series “Advances in Intelligent Systems and Computing” contains publications on theory,
applications, and design methods of Intelligent Systems and Intelligent Computing. Virtually all
disciplines such as engineering, natural sciences, computer and information science, ICT, economics,
business, e-commerce, environment, healthcare, life science are covered. The list of topics spans all the
areas of modern intelligent systems and computing such as: computational intelligence, soft computing
including neural networks, fuzzy systems, evolutionary computing and the fusion of these paradigms,
social intelligence, ambient intelligence, computational neuroscience, artificial life, virtual worlds and
society, cognitive science and systems, Perception and Vision, DNA and immune based systems,
self-organizing and adaptive systems, e-Learning and teaching, human-centered and human-centric
computing, recommender systems, intelligent control, robotics and mechatronics including
human-machine teaming, knowledge-based paradigms, learning paradigms, machine ethics, intelligent
data analysis, knowledge management, intelligent agents, intelligent decision making and support,
intelligent network security, trust management, interactive entertainment, Web intelligence and multimedia.
The publications within “Advances in Intelligent Systems and Computing” are primarily proceedings
of important conferences, symposia and congresses. They cover significant recent developments in the
field, both of a foundational and applicable character. An important characteristic feature of the series is
the short publication time and world-wide distribution. This permits a rapid and broad dissemination of
research results.
Advisory Board
Chairman
Nikhil R. Pal, Indian Statistical Institute, Kolkata, India
e-mail: nikhil@isical.ac.in
Members
Rafael Bello Perez, Universidad Central “Marta Abreu” de Las Villas, Santa Clara, Cuba
e-mail: rbellop@uclv.edu.cu
Emilio S. Corchado, University of Salamanca, Salamanca, Spain
e-mail: escorchado@usal.es
Hani Hagras, University of Essex, Colchester, UK
e-mail: hani@essex.ac.uk
László T. Kóczy, Széchenyi István University, Győr, Hungary
e-mail: koczy@sze.hu
Vladik Kreinovich, University of Texas at El Paso, El Paso, USA
e-mail: vladik@utep.edu
Chin-Teng Lin, National Chiao Tung University, Hsinchu, Taiwan
e-mail: ctlin@mail.nctu.edu.tw
Jie Lu, University of Technology, Sydney, Australia
e-mail: Jie.Lu@uts.edu.au
Patricia Melin, Tijuana Institute of Technology, Tijuana, Mexico
e-mail: epmelin@hafsamx.org
Nadia Nedjah, State University of Rio de Janeiro, Rio de Janeiro, Brazil
e-mail: nadia@eng.uerj.br
Ngoc Thanh Nguyen, Wroclaw University of Technology, Wroclaw, Poland
e-mail: Ngoc-Thanh.Nguyen@pwr.edu.pl
Jun Wang, The Chinese University of Hong Kong, Shatin, Hong Kong
e-mail: jwang@mae.cuhk.edu.hk
123
Editor
Radek Silhavy
Faculty of Applied Informatics
Tomas Bata University in Zlín
Zlín
Czech Republic
This Springer imprint is published by the registered company Springer International Publishing AG
part of Springer Nature
The registered company address is: Gewerbestrasse 11, 6330 Cham, Switzerland
Preface
This book constitutes the refereed proceedings of the modern trends, and approa-
ches of artificial intelligence research and its application to intelligent systems are
presented in this book. Paper discusses hybridization of algorithms, new trends in
neural networks, optimization algorithms, and real-life issues related to artificial
method application.
This book constitutes the refereed proceedings of the Artificial Intelligence and
Algorithms in Intelligent Systems of the 7th Computer Science On-line Conference
2018 (CSOC 2018), held online in April 2018.
CSOC 2018 has received (all sections) 265 submissions, 141 of them were
accepted for publication. More than 60% of accepted submissions were received
from Europe, 30% from Asia, 5% from Africa, and 5% from America. Researches
from 30 countries participated in CSOC 2018 conference.
CSOC 2018 conference intends to provide an international forum for the dis-
cussion of the latest high-quality research results in all areas related to computer
science. The addressed topics are the theoretical aspects and applications of com-
puter science, artificial intelligence, cybernetics, automation control theory, and
software engineering.
Computer Science On-line Conference is held online, and modern communi-
cation technology, which is broadly used, improves the traditional concept of sci-
entific conferences. It brings equal opportunity to participate in all researchers
around the world.
I believe that you will find the following proceedings interesting and useful for
your own research work.
v
Organization
Program Committee
Program Committee Chairs
vii
viii Organization
OpenPublish.eu s.r.o.
Web: http://www.openpublish.eu
Email: csoc@openpublish.eu
http://www.openpublish.eu
Contents
xi
xii Contents
1 Introduction
The combinatorial problems have great relevance at industrial level, we find them
in various areas such as Civil Engineering [1], Bio Informatics [2], Operational
Research [3], resource allocation [4], scheduling problems [5,6], routing prob-
lems [7,8] among others. On the other hand, in recent years, algorithms inspired
by nature phenomena to solve optimization problems have been generated. As
examples of these algorithms we have Cuckoo Search [9], Black Hole [10], Bat
Algorithm [11], and Grasshopper Optimisation Algorithm [12] among others.
Many of these algorithms work naturally in continuous spaces and therefore
must be adapted to solve combinatorial problems. In the process of adaptation,
the mechanisms of exploration and exploitation of the algorithm can be altered,
having consequences in the efficiency of the algorithm.
Several binarization techniques have been developed to address this situation.
In a literature search, the main binarization methods used correspond to transfer
functions, angle modulation and quantum approach. In this article we present a
binarization method that uses the percentile concept to group the solutions and
then perform the binarization process. To verify the efficiency of our method,
we used the BGOA. This algorithm was proposed in [12] and was applied to test
functions in addition to structural engineering problems.
Grasshoppers are insects and under certain conditions can be considered a
pest, the main characteristic of these insects is related to their movement. When
it is in a larval state, its movement is slow in contrast with the large and abrupt
movements of the adults.
When we look at different areas of engineering and science, we see that com-
binatorial problems appear frequently. We find them in various areas such as
Civil Engineering [1], Bio Informatics [2], Operational Research [3], resource
allocation [4], scheduling problems [5], routing problems [7,8] among others. On
the other hand, in recent years, algorithms inspired by natural phenomena have
been able to solve NP-hard combinatorial problems of significant size. As an
example of algorithms inspired by nature, we have Cuckoo Search [9], Black
Hole [10], Bat Algorithm [11], and Grasshopper Optimisation Algorithm [12],
among others. Many of these algorithms work naturally in continuous spaces
and, therefore, must be adapted to solve combinatorial problems. In the process
of adaptation, the mechanisms of exploration and exploitation of the algorithm
can be altered, having consequences in the efficiency of the algorithm. Several
binarization techniques have been developed to address this situation. In a bib-
liographic search, the main binarization methods used are: transfer functions,
angle modulation, and quantum approach. In this article, we develop a binariza-
tion method that uses the percentile concept to cluster the solutions and then
perform the binarization process. To verify the effectiveness of our method, we
use BGOA. This algorithm was proposed in [11] and applied to test functions in
addition to structural engineering problems. Grasshoppers are insects and under
certain conditions can be considered a pest, the main characteristic of these
insects is related to their movement. When it is in a larval state, its movement
is slow in contrast to the large and abrupt movements of adults.
The mathematical model to simulate the movement of grasshoppers are pre-
sented in Eq. 1
N
ubd − lbd xj − xi
Xid = c( c s(|xdj − xdi |) ) + T̂d (1)
2 dij
j=1,j=i
m
Subject to aij xj ≥ 1, ∀i ∈ I, and xj ∈ {0, 1}, ∀j ∈ J (3)
j=1
where xj = 1 if j ∈ S, xj = 0 otherwise.
4 B. Crawford et al.
3.1 Initialization
are covered by more than one column. The detail of the procedure is shown in
Algorithm 1.
The goal of the Heuristic operator is to select a new column for cases where a
solution needs to be built or repaired. As input variables, the heuristic operator
considers the incomplete solution Sin which must be completed. The operator
obtains the columns that belong to Si n, then obtains the rows R that are not
covered by the solution to Si n. With the set of rows not covered and using Eq. 7
we obtain in line 4 the best 5 rows to be covered. With this list of rows (lRows) on
line 5 we obtain the list of the best columns according to the heuristic indicated
in Eq. 8. Finally randomly in line 6 we obtain the column to incorporate.
1
W eightRow(i) = . (7)
Li
where Li is the sum of all ones in row i
cj
W eightColumn(j) = . (8)
|R ∩ Mj |
4 Results
In this section we detail the behavior of BGOA when it is applied to SCP. The
contribution of the binary percentile operator was studied when solving the dif-
ferent SCP instances. Additionally, BGOA was compared with other algorithms
that have recently resolved SCP. To solve the different SCP instances, a PC with
Windows 10, core i5 processor and 16 GB in RAM was used. The program was
coded in Python 3.5. For the statistical analysis, the non-parametric Wilcoxon
signed-rank test was used in addition to violin charts. The analysis of violin
charts is performed by comparing the dispersion, median and the interquartile
range of the distributions.
Instance row col Density Best BGOA std (Secs) rnd.0.5 std
known (avg) (avg)
AA03 106 8661 4.05% 33155 33331.4 124.2 207 33693.5 241.1
AA04 106 8002 4.05% 34573 34659.2 58.1 198 34931.0 231.2
AA05 105 7435 4.05% 31623 31717.3 64.8 201 31889.2 103.2
AA06 105 6951 4.11% 37464 37498.6 56.1 199 37651.3 97.1
AA11 271 4413 2.53% 35384 35561.3 131.9 187 35901.2 197.1
AA12 272 4208 2.52% 30809 31232.8 152.8 208 31631.3 210.2
AA13 265 4025 2.60% 33211 33804.4 135.1 189 34201.4 231.4
AA14 266 3868 2.50% 33219 33662.1 125.1 143 33967.3 121.1
AA15 267 3701 2.58% 34409 34686.1 112.8 141 34846.8 161.3
AA16 265 3558 2.63% 32752 33114.1 137.5 187 33601.3 183.9
AA17 264 3425 2.61% 31612 31821.3 89.1 162 32386.2 149.3
AA18 271 3314 2.55% 36782 37119.1 78.1 132 37417.6 148.1
AA19 263 3202 2.63% 32317 32911.2 77.6 146 33109.1 136.1
AA20 269 3095 2.58% 34912 35678.8 91.1 141 35963.1 97.8
BUS1 454 2241 1.88% 27947 28211.2 86.0 189 28756.1 231.6
BUS2 681 9524 0.51% 67760 68312.1 83.2 175 68678.9 101.2
Average 35495.56 35832.56 100.21 175.3 36164.1 165.1
p-value 1.1e-05
BGOA 9
When we compared the Best Values between BGOA and rnd.0.5 which are
shown in Table 2. In the Average comparison, BGOA outperforms rnd.0.5 in all
problems. The comparison of distributions is shown in Fig. 2. We see the disper-
sion of the rnd.0.5 distributions are bigger than the dispersions of BGOA. There-
fore, the percentile binary operator, contribute to the precision of the results.
Finally, the BGOA distributions are closer to zero than rnd.0.5 distributions,
indicating that BGOA has consistently better results than random.0.5. When
we evaluate the behaviour of the algorithms through the Wilcoxon test, this test
indicates that there is a significant difference between the two algorithms.
In this section, we detail the comparisons made with the objective of evaluating
the performance of our BGOA algorithm. For the evaluation, the larger problems
of the OR-library were chosen. To develop the comparison, two algorithms were
selected. The first one corresponds to a discretization Particle Swarm Optimiza-
tion (PSO) technique called Jumping PSO (JPSO), [13]. The second one, is a
binarization of the Black Hole technique called Multi Dynamic Binary Black Hole
(MDBBH) Algorithm, [5]. JPSO uses a discrete PSO based on the frog jump.
JPSO works without the concept of velocity, replacing this one by a component
of random jump which allows to perform the movement in the discrete search
space. On the other hand, MDBBH uses a binarization mechanism specific to
the Black Hole algorithm. This is based on the concept of closeness to the Black
Hole (BH). BH corresponds to the solution that has obtained the best value.
When a solution is close to BH, the transitions are less likely to be performed.
10 B. Crawford et al.
Instance row col Density Best JPSO MDBBH Avg BGOA Avg Time(s)
Known Avg Best Best
E.1 500 5000 10% 29 29.0 29 29.0 29 29.2 8.8
E.2 500 5000 10% 30 30.0 31 31.6 30 30.6 12.5
E.3 500 5000 10% 27 27.0 27 27.4 27 27.3 17.2
E.4 500 5000 10% 28 28.0 28 29.1 28 28.2 11.3
E.5 500 5000 10% 28 28.0 28 28.0 28 28.0 14.3
F.1 500 5000 20% 14 14.0 14 14.1 14 14.0 17.8
F.2 500 5000 20% 15 15.0 15 15.3 15 15.0 16.1
F.3 500 5000 20% 14 14.0 14 14.8 14 15.2 17.8
F.4 500 5000 20% 14 14.0 14 14.9 14 14.3 18.3
F.5 500 5000 20% 13 13.0 14 14.1 14 14.4 17.1
G.1 1000 10000 2% 176 176.0 177 178.5 176 177.1 172.4
G.2 1000 10000 2% 154 155.0 157 160.6 155 155.5 171.3
G.3 1000 10000 2% 166 167.2 168 170.4 167 168.8 178.2
G.4 1000 10000 2% 168 168.2 169 170.9 169 170.6 175.5
G.5 1000 10000 2% 168 168.0 168 169.8 168 169.6 167.1
H.1 1000 10000 5% 63 64.0 64 64.9 64 64.8 152.1
H.2 1000 10000 5% 63 63.0 64 64 64 64.4 155.8
H.3 1000 10000 5% 59 59.2 59 60 60 60.8 143.1
H.4 1000 10000 5% 58 58.3 59 60.4 59 59.6 164.6
H.5 1000 10000 5% 55 55.0 55 56.4 55 55.6 138.1
Average 67.1 67.30 67.7 68.71 67.5 68.15 88.47
In the case of being away from the BH, the probability of transition is greater
(Table 3).
For instances E and F which are of medium size, the results of the MDBBH
and BGOA algorithms are similar when comparing their Best Value. Only in
instance E.2 BGOA was superior to MDBBH. When analyzing the average,
JPSO obtained better results, however, the values of BGOA were close, being
MDBBH the one that obtained the worse performance. For the case of problems
G and H, BGOA was superior in problems G.1, G.2 and G.3 and MDBBH in
problem H.3 when comparing their Best Value. In the case of averages, JPSO
was superior in all cases. However, BGOA obtained results quite close, leaving
MDBBH behind. In this point we must emphasize that the percentile technique
used in BGOA allows binarizing any continuous swarm intelligence algorithm
unlike JPSO that is specific for PSO.
5 Conclusions
In this work, the BGOA algorithm based on the percentile concept was pro-
posed to perform binarization of GOA metaheuristics. We must emphasize that
this percentile concept can be applied in the binarization of any continuous
metaheuristics of the swarm intelligence type. To evaluate the performance of
BGOA 11
Our percentile concept the set covering problem was used together with the
Grasshopper algorithm. Experiments were designed to evaluate the contribution
of the binary operator percentile of the algorithm. It was found that the operator
contributes significantly to improve the accuracy and quality of the solutions,
all these visualized through violin graphics. Finally, compared to the best meta-
heuristic algorithm that has solved SCP, our algorithm had a lower yield of 1.26
%, which is not a big difference considering that JPSO uses a particular adap-
tation mechanism for PSO and the percentile concept It can be easily adapted
to any technique. As future works, we believe that the autonomous search for
efficient configuration is a little-explored area and it could help to improve the
performance of the binarizations both in the quality of the solutions and in
the times of convergence. Additionally, it is interesting to see how this percentile
technique works with other metaheuristics and other NP-hard problems. Finally,
we believe that using machine learning we can generate indicators or obtain
correlations that allow us to understand how the percentile algorithm translates
the exploration and exploitation properties from the continuous space to the
binary space.
References
1. Khatibinia, M., Yazdani, H.: Accelerated multi-gravitational search algorithm for
size optimization of truss structures. Swarm Evol. Comput. (2017)
2. Barman, S., Kwon, Y.-K.: A novel mutual information-based boolean network
inference method from time-series gene expression data. PloS one 12(2), e0171097
(2017)
3. Crawford, B., Soto, R., Monfroy, E., Astorga, G.. Garcı́a, J., Cortes, E.: A meta-
optimization approach for covering problems in facility location. In: Workshop on
Engineering Applications, pp. 565–578. Springer (2017)
4. Garcı́a, J., Crawford, B., Soto, R., Astorga, G.: A percentile transition ranking
algorithm applied to knapsack problem. In: Proceedings of the Computational
Methods in Systems and Software, pp. 126–138. Springer (2017)
5. Garcı́a, J., Crawford, B., Soto, R., Garcı́a, P.: A multi dynamic binary black hole
algorithm applied to set covering problem. In: International Conference on Har-
mony Search Algorithm, pp. 42–51. Springer (2017)
6. Garcı́a, J., Crawford, B., Soto, R., Astorga, G.: A percentile transition ranking
algorithm applied to binarization of continuous swarm intelligence metaheuris-
tics. In: International Conference on Soft Computing and Data Mining, pp. 3–13.
Springer (2018)
7. Franceschetti, A., Demir, E., Honhon, D., Van Woensel, T., Laporte, G., Stobbe,
M.: A metaheuristic for the time-dependent pollution-routing problem. Eur. J.
Oper. Res. 259(3), 972–991 (2017)
8. Crawford, B., Soto, R., Astorga, G., Garcı́a, J., Castro, C., Paredes, F.: Putting
continuous metaheuristics to work in binary search spaces. Complexity 2017 (2017)
9. Yang, X.-S., Deb, S.: Cuckoo search via lévy flights. In: 2009 World Congress on
Nature and Biologically Inspired Computing, NaBIC 2009, pp. 210–214. IEEE
(2009)
10. Hatamlou, A.: Black hole: a new heuristic optimization approach for data cluster-
ing. Inf. Sci. 222, 175–184 (2013)
12 B. Crawford et al.
11. Yang, X.-S.: A new metaheuristic bat-inspired algorithm. In: Nature Inspired Coop-
erative Strategies for Optimization (NICSO 2010), pp. 65–74 (2010)
12. Saremi, S., Mirjalili, S., Lewis, A.: Grasshopper optimisation algorithm: theory and
application. Adv. Eng. Softw. 105, 30–47 (2017)
13. Balaji, S., Revathi, N.: A new approach for solving set covering problem using
jumping particle swarm optimization method. Nat. Comput. 15(3), 503–517 (2016)
14. Gary, M.R., Johnson, D.S.: Computers and Intractability. A Guide to the Theory
of NP-Completeness (1979)
15. Lu, Y., Vasko, F.J.: An or practitioner’s solution approach for the set covering
problem. Int. J. Appl. Metaheuristic Comput. (IJAMC) 6(4), 1–13 (2015)
16. Li, Y., Cai, Z.: Gravity-based heuristic for set covering problems and its application
in fault diagnosis. J. Syst. Eng. Electron. 23(3), 391–398 (2012)
17. Kasirzadeh, A., Saddoune, M., Soumis, F.: Airline crew scheduling: models, algo-
rithms, and data sets. EURO J. Transp. Logist. 6(2), 111–137 (2017)
18. Horváth, M., Kis, T.: Computing strong lower and upper bounds for the integrated
multiple-depot vehicle and crew scheduling problem with branch-and-price. Cent.
Eur. J. Oper. Res. 1–29 (2017)
19. Stojković, M.: The operational flight and multi-crew scheduling problem. Yugoslav
J. Oper. Res. 15(1) (2016)
20. Garcı́a, J., Crawford, B., Soto, R., Carlos, C., Paredes, F.: A k-means binarization
framework applied to multidimensional knapsack problem. Appl. Intell. 1–24 (2017)
21. Garcı́a, J., Pope, C., Altimiras, F.: A distributed k-means segmentation algorithm
applied to lobesia botrana recognition. Complexity 2017 (2017)
22. Graells-Garrido, E., Garcı́a, J.: Visual exploration of urban dynamics using mobile
data. In: International Conference on Ubiquitous Computing and Ambient Intelli-
gence, pp. 480–491. Springer (2015)
23. Graells-Garrido, E., Peredo, O., Garcı́a, J.: Sensing urban patterns with antenna
mappings: the case of Santiago, Chile. Sensors 16(7), 1098 (2016)
24. Peredo, O.F., Garcı́a, J.A., Stuven, R., Ortiz, J.M.: Urban dynamic estimation
using mobile phone logs and locally varying anisotropy. In: Geostatistics Valencia
2016, pp. 949–964. Springer (2017)
A Survey on Signal Processing Methods
in Fiber Optic Sensor for Oxidized
Carbon Steel
Abstract. This paper provides a broad overview of the adaptive methods for
noise reduction used in the analysis of data in the different sensors such as
acoustic emissions sensors, power quality signal analysis. The two algorithms
are the Empirical Mode Decomposition and the Ensemble Empirical Mode
Decomposition. We selected these two algorithms because our focus is on these
methods. Firstly, this paper exhibits the inner workings of each algorithm both
in the original authors’ intuition and the mathematical model utilized. Next, we
discuss the advantages of each of the algorithms based on recent and credible
research papers and articles. We also critically dissect the limitations of each
algorithm. This paper aims to give a general understanding on these algorithms
which we hope will spur more research in improving the field of signal pro-
cessing in the fiber optic sensor for the oxidised carbon steel.
1 Introduction
Pipeline monitoring is crucial to reduce the risk of failure while extending the safety life
spam of the pipeline asset [1]. Signals collected from the sensor in pipeline monitoring,
will reveal the anomalies to ascertain actions to be taken. Two crucial parameters
needed to be taken into consideration in the data analysis for the signal processing in
fiber optic sensor for oxidized carbon steel are the time scale and energy distribution.
These parameters provide characteristics information on the pipe condition.
Time scale and energy distribution are important for the time – frequency analysis
in signal processing [2]. One of the possible ways to extract the characteristic infor-
mation is by effectively having the features of the signal for the usage of the pipeline
operators and engineers [3]. The time- frequency method plays a key role, to mine
meaningful information on the pipe condition. This leads to the creation of techniques
and algorithms for correctly identifying information that can describe the pipe
© Springer International Publishing AG, part of Springer Nature 2019
R. Silhavy (Ed.): CSOC 2018, AISC 765, pp. 13–24, 2019.
https://doi.org/10.1007/978-3-319-91192-2_2
14 N. S. M. Jaafar et al.
conditions. To extract the features signal from pipe information, many scholars and
researchers have accomplished the relevant research works in contributing towards the
methods; Empirical Mode Decomposition and the Ensemble Empirical Mode
Decomposition [4, 5]. The aim for this paper is to provide an overview of the existing
methods in signal processing for the fiber sensor. Specifically, we discuss the original
methods used in the field of the signal processing which involves time- frequency
analysis. Even though the existing method is already known, yet both methods still
suffers from the mode mixing phenomenon.
Our paper is structured as follows. In Sect. 2, we provide examples of existing
methods in signal processing used by the scientific community and in the industry.
Each algorithm is explained in both the original authors intuition of the methods as well
as their respective mathematical models. Based on description provided in Sect. 2, we
identify the advantages of each of the algorithms and discuss them in Sect. 3. In
Sect. 4, the weaknesses found in the algorithms discussed in Sect. 2 are identified. This
paper concludes with discussion on proposing of new enhancements to the algorithms.
2 Methods
In this section, two signal processing methods for fiber optic sensor in oxidized carbon
steel are comprehensively discussed. The two methods are Empirical Mode Decom-
position and Ensemble Empirical Mode Decomposition. We shall briefly explain the
function of the algorithms as well as the mathematical model used in the algorithms.
This is to give a deep understanding on the inner workings of time – frequency analysis
in signal processing.
Step 7: From the Steps 6, the output from the second iteration resulted in s12 ðtÞ not
meeting the IMF condition, the process of iteration is continued by repeating
the steps in (Sect. 2.1.1). Sifting Process to find the IMFs] until the stopping
criteria are met after the iteration of k.
Step 8: To confirm the s1k as the first IMF, s1k need to check if the signal meets the
stopping criteria. Thus, when the signal of s1k meets the stopping criteria,
16 N. S. M. Jaafar et al.
the process of iteration stops. The output, once it is found meeting the
stopping criteria will be:
Step 9: Next, subtract c1 ðtÞ from the original input signal XðtÞ.
Step 10: The reason on why c1 ðtÞ is subtracted from the input signal is due to c1 ðtÞ
had become a residue, r1 ðtÞ. It became a new input data as long it satisfies
the IMF functions and undergo the iteration by repeating the steps in
(Sect. 2.1.1). Thus, the output will be when it is found to meet the stopping
criteria. The output will be the second of IMF and it will be:
Step 11: To find the subsequent of the residues, the procedure is repeated, resulting in:
Step 12: The notations for c2 till cn shows the corresponding IMFs of the data.
Step 13: To complete the sifting process of IMF, EMD is completed when the
residue, rn ðtÞ met the IMF functions, which means that it is a monotonic
function or does not contain any extrema points.
Step 14: The input signal XðtÞ can be expressed as the sum of the IMFs and the last
residue as referred [9–11]:
XN
XðtÞ ¼ c ðtÞ þ rN ðtÞ
j¼1 j
ð9Þ
Whereby, cj ðtÞ, are the IMF components after N, IMFs are extracted and
rN ðtÞ is the residual of XðtÞ.
Based on the Fig. 1, a flow diagram on the EMD is given and the details are
explained in the (Sect. 2.1). From cj ðtÞ, as the IMF components after N as
the numbers of iterative IMFs are extracted, the first IMF represents the fast
oscillation modes and the higher IMFs represent the slower oscillation
modes.
VI
On his return to Philadelphia, Jefferson found himself the center of a
remarkable newspaper controversy. Fascinated by the beauty of Marie
Antoinette, Edmund Burke of England had written his bitter attack, not only
on the excesses of the French Revolution, but upon its democratic
principles as well. It was the fashion in those days to conceal a hate of
democracy under the cloak of a simulated horror over the crimes of the
Terrorists. Thomas Paine had replied to Burke with his brilliant and
eloquent defense of democracy, ‘The Rights of Man.’ In American circles
where democracy was anathema, and even republicanism was discussed
with cynicism, the Burke pamphlet was received with enthusiasm. It was
not until some time later that ‘The Rights of Man’ reached New York, albeit
its nature was known and there had been a keen curiosity to see it. Early in
May, Madison had promised Jefferson to secure a copy as soon as possible.
He understood that the pamphlet had been suppressed in England, and that
Paine had found it convenient to retire to Paris. ‘This,’ he wrote, ‘may
account for his not sending copies to friends in this country.’[321] At length
a single copy arrived and was loaned by its owner to Madison, who passed
it on to Jefferson. He read it with enthusiasm. Here was a spirited defense of
democracy, and of the fight the French were waging for their liberties; here
an excoriation of the prattle in high social and governmental circles of the
advantage, if not necessity, for titles of nobility. Here was not only an
answer to Burke, but to John Adams, whose ‘Discourses of Davilla’ had
been running for weeks in Fenno’s paper, and had been copied extensively
in other journals with a similar slant. Jefferson was immensely pleased.
Before he had finished with it, the owner had called upon Madison for
its return, as arrangements had been made for its publication by a
Philadelphia printer. It was agreed that Jefferson should send it directly to
the print shop, and in the transmission he wrote a brief explanation of the
delay, and added: ‘I am extremely pleased to find it will be reprinted here,
and that something is at length to be publicly said against the political
heresies which have sprung up among us. I have no doubt our citizens will
rally a second time round the standard of “Common Sense.” ’
To this note he attached so little importance that he kept no copy. With
astonishment he found that the printer had used his note as the preface, with
his name and official title as Secretary of State. The general conviction that
the word ‘heresies’ was meant to apply to the Adams papers sufficiently
indicates the popular interpretation of their trend. The storm broke.
Major Beckwith, the British Agent, hastened to express his pained
surprise to Washington’s Secretary at the recommendation by the Secretary
of State of a pamphlet which had been suppressed in England. The secretary
was sufficiently impressed by the scandalized tone of the aristocratic
society of Philadelphia, which was usually lionizing some degenerate
members of the European nobility, to write his chief in detail. When
Randolph dined with Mrs. Washington, Lear retailed it to him, and the
suggestion was made that Jefferson should know. Thus there was something
more than a tempest in a teapot. Everywhere men were partisans of the
pamphlets of Burke or Paine, the aristocrats on one side, the democrats on
the other, the stoutest of the republicans everywhere delighted with ‘The
Rights of Man.’ This was true in even the small towns and the villages of
far places. One traveler passing through Reading was surprised to find the
two pamphlets the ‘general topic of conversation,’ and he was assured of
the delight that awaited him in the reading of Paine’s.[322] All too long had
the Americans been drugged with Fenno’s deification of the upper classes
—with John Adams’s ‘Discourses’ on the necessity of ‘distinctions’—and
here was old ‘Common Sense’ back again in the old form slashing the
aristocrats fore and aft. The press responded to the popular demand, and
everywhere ‘The Rights of Man’ was being published serially to be eagerly
read by the thousands who had not seen the pamphlet. But it was not all
one-sided. If the ‘Painites’ wrote furiously in some papers, the ‘Burkites’
were prolific in Fenno’s and a few others. In the fashionable drawing-rooms
a poll would have shown a decided preference for the defender of
aristocracy who had wept so eloquently over the woes of a frivolous Queen.
Nowhere was Burke so popular and Paine so loathed as in the home of
Adams, the Vice-President. ‘What do you think of Paine’s pamphlet?’ asked
Dr. Rush, to whom society was cooling because of his democratic
tendencies. The second official of the Republic hesitated as if for dramatic
effect, and then, solemnly laying his hand upon his heart, he answered, ‘I
detest that book and its tendency from the bottom of my heart.’ Indeed,
most of the Federalists were frankly with Burke. ‘Although Mr. Burke may
have carried his veneration for old establishments too far, and may not have
made sufficient allowance for the imperfections of human nature in the
conflict of the French Revolution,’ wrote Davie to Judge Iredell, ‘yet I think
his letter contains a sufficient amount of intelligence to have rescued him
from the undistinguishing abuse of Paine.’[323]
With most of the Federalist leaders in sympathy with Burke, few
ventured to attack Paine in the open. Not so with Adams who was
spluttering mad over the Jefferson ‘preface.’ He was positive that the
publication of Paine’s pamphlet in this country had been instigated by his
former colleague at Paris.[324] To him the pamphlet of Paine, the ‘preface’
of Jefferson, the acclaim for both on the part of the people was but a
devilish conspiracy of Jefferson’s to pull him down. ‘More of Jefferson’s
subterranean tricks.’ And with this conviction, John Quincy Adams, the
son, then in Boston, took up a trenchant pen to write the articles of
‘Publicola’ for the ‘Centinel,’ sneering at the Jeffersonian note to the
printer, assailing Paine and democracy, and stoutly defending the
governmental forms of England. So well did he discharge his filial duty that
his articles were published in pamphlet form in England by the friends of
Burke, and many of the Federalist papers reproduced them as they
appeared.
Then the newspaper battle began in earnest. Many indignant democrats
rushed to the attack of ‘Publicola’ with all the greater zest because of the
belief that ‘Publicola’ was none other than ‘Davilla’ himself. ‘America will
not attend to this antiquated sophistry,’ wrote one, ‘whether decorated by
the gaudy ornaments of a Burke, the curious patch-work of a Parr to which
all antiquity must have contributed its prettiest rags and tatters, or the
homely ungraceful garb which has been furnished her by Mr. John
Adams.’[325] Another suggested that ‘Publicola’ would soon cease to write
since ‘the time for the new election is approaching,’ although the
‘Discourses’ might be continued without danger since ‘dullness, like the
essence of opium, sets every reader to sleep before he has passed the third
sentence.’[326] As for ‘Publicola,’ his letters were ‘being brought forward to
persuade the people that an hereditary nobility, and, of consequence, high
salaries, pomp and parade are essential to the prosperity of the country.’[327]
In Boston, where the letters were appearing, ‘Agricola’ and ‘Brutus’ began
spirited replies in the rival paper.[328] Other writers, with less grace and
force, joined in the fray. Who are to constitute our nobility, demanded
‘Republican,’ our moneyed men—the speculators? If so ‘Dukes, Lords and
Earls will swarm like insects gendered by the sun,’ and the worn-out soldier
who had been tricked out of his paper would have the satisfaction of
‘bowing most submissively to their lordships while seated in their
carriages.’[329]
But Adams was not without his defenders. ‘An American’ declared that
all the abuse was ‘designed as a political ladder by which to climb.’
Miserable creatures! ‘Ages after the tide of time has swept their names into
oblivion, the immortal deeds of Adams will shine on the brightest pages of
history.’[330] ‘The Ploughman’ indignantly resented the insinuation that
Adams had written the ‘Publicola’ letters. In truth, ‘his friends consider Dr.
Adams as being calumniated’ by having such sentiments ascribed to him.
[331] To all the ‘hornets’ that were buzzing about Adams, Fenno felt he
could be indifferent, for they had no stings. They were merely nonentities
trying to give consequence to their scribblings by appearing to be answering
the Vice-President.
Meanwhile, Jefferson was keenly enjoying the turmoil. We wish it were
possible to trace it all to his contrivance, for nothing could have served his
purpose better. To have foreseen that the writing of a few simple lines
would have awakened the militant republicanism of the country and have
aroused the democratic impulses of the inert mass would have been
complimentary to his political genius. But this is not the only instance
where a clever politician with the reputation of a magician has stumbled
forward. There is no doubt that Jefferson was astonished and embarrassed
on learning that the printer had made an unauthorized use of his personal
note. He admitted to Washington that he had Adams’s writings in mind, but
that nothing was more remote from his thoughts than of becoming ‘a
contributor before the public.’ However, he was not impressed with the
reflections on his taste. ‘Their real fear,’ he added, ‘is that this popular and
republican pamphlet ... is likely ... to wipe out all the unconstitutional
doctrines which their bellwether, Davilla, has been preaching for a twelve-
month.’[332] This explanation was enough for Knox, who wrote accordingly
to Adams,[333] but not enough for Jefferson who sent a frank explanation to
Adams with an expression of regret. In generous mood, the latter accepted
the explanation with the protestation that their old friendship was ‘still dear
to my heart,’ and that ‘there is no office I would not resign rather than give
a just occasion for one friend to desert me.’[334]
Madison, to whom Jefferson had sent a similar explanation, had assumed
that there had been a mistake or an imposition, but he could see no reason
for indignation on the part of Adams or his friends. ‘Surely,’ he wrote, ‘if it
be innocent and decent for one servant of the public to write against its
government, it cannot be very criminal or indecent in another to patronize a
written defence of the principles on which that Government is
founded.’[335]
However much Jefferson may have regretted the unauthorized use of his
letter, he rejoiced in its effect. He wrote Paine that the controversy had
awakened the people, shown the ‘monocrats’ that the silence of the masses
concerning the teachings of ‘Davilla’ did not mean that they had been
converted ‘to the doctrine of king, lords and commons,’ and that they were
‘confirmed in their good old faith.’[336] The incident had established
Jefferson in the public mind as the outstanding leader of democracy, had set
the public tongue to wagging on politics again. More was involved in the
pamphlets of Burke and Paine than differences over the French Revolution.
The keynote of Burke’s was aristocracy and privilege; that of Paine’s was
democracy and equal rights. The former was the gospel of the American
Federalists; the latter the covenant of the American Democracy. Studying
the reactions with his characteristic keenness, Jefferson was convinced that
the time was ripe to mobilize for the inevitable struggle.
VII
Suddenly the bubble showed signs of bursting. A New York bank stopped
discounting for some of the speculators. Messengers hurried forth with the
ominous news, horses’ hoofs hammering the Jersey roads to Philadelphia,
where there was consternation and a falling-off in buying.[350] Pay-day had
not yet come, but it was on the way, and men began to regain their senses.
Then came the emergence of the political phase. ‘Does history afford an
instance,’ asked one observer, ‘where inequality in property, without any
adequate consideration, ever before so suddenly took place in the world? or
the basis of the power and influence of an Aristocracy was created?’[351] A
Boston paper commented significantly on the ease with which the mere
opening and closing of the galleries of Congress could serve the purposes of
speculation. ‘How easily might this be done should any member of
Congress be inclined to speculate.’[352]
Thus the talk of a ‘corrupt squadron’ in the First Congress was not the
invention of Jefferson—it was the talk of the highways and the byways, the
coffee-houses and the taverns, and we find it recurring in the
correspondence of the public men of the period. Everywhere sudden
fortunes sprang up as if by magic. There was a rumbling and grumbling in
the offing. With the people thinking more seriously of Madison’s fight for
discrimination, he began to loom along with Jefferson as a prospective
leader against the ‘system.’ With the discovery that the law had been
violated in the subscription of more than thirty shares, it was hoped that it
would ‘draw the attention of Madison ... immediately on the meeting of
Congress’ and that ‘the whole proceedings ... be declared nugatory.’[353]
Then came the election of Bank directors in the fall, and indignation
flamed when the prizes went to leaders in the Congress that had created the
Bank—to Rufus King, Samuel Johnson of North Carolina, William Smith
of South Carolina, Jeremiah Wadsworth of the ‘fast sailing vessels,’ John
Laurance of New York, William Bingham of Philadelphia, Charles Carroll
of Carrollton, George Cabot, Fisher Ames, and Thomas Willing, the partner
of Robert Morris.
Members of Congress had speculated heavily and profitably on their
knowledge of their own intent in legislation; they were owners of bank
scrip of the Bank they created, and their leaders were on the board of
directors. There was talk among the people of a ‘corrupt squadron,’ and
Jefferson did not invent the term; he found it in the street and used it.
Though Hamilton, scrupulously honest, was not involved in proceedings
that were vicious, if not corrupt, many of his lieutenants were, and that, for
the purposes of politics, made an issue.
But Hamilton was in the saddle, booted and spurred, and riding hard
toward the realization of his conception of government, followed by an
army that fairly glittered with the brilliancy of many of his field marshals,
and which was imposing in the financial, social, and cultural superiority of
the rank and file; an army that could count on the greater part of the press to
publish its orders of the day, and on the beneficiaries of its policies to fill its
campaign coffers. And it was at this juncture that Jefferson began the
mobilization of an army that would seem uncouth and ragged by
comparison. The cleavage was distinct; the ten-year war was on.
As a preliminary to the story of the struggle, it is important to know
more of the character and methods of the man who dared challenge
Hamilton’s powerful array and something of the social atmosphere in
Philadelphia where the great battles were fought.
CHAPTER V
II
III
IV