-
Health Index Estimation Through Integration of General Knowledge with Unsupervised Learning
Authors:
Kristupas Bajarunas,
Marcia L. Baptista,
Kai Goebel,
Manuel A. Chao
Abstract:
Accurately estimating a Health Index (HI) from condition monitoring data (CM) is essential for reliable and interpretable prognostics and health management (PHM) in complex systems. In most scenarios, complex systems operate under varying operating conditions and can exhibit different fault modes, making unsupervised inference of an HI from CM data a significant challenge. Hybrid models combining…
▽ More
Accurately estimating a Health Index (HI) from condition monitoring data (CM) is essential for reliable and interpretable prognostics and health management (PHM) in complex systems. In most scenarios, complex systems operate under varying operating conditions and can exhibit different fault modes, making unsupervised inference of an HI from CM data a significant challenge. Hybrid models combining prior knowledge about degradation with deep learning models have been proposed to overcome this challenge. However, previously suggested hybrid models for HI estimation usually rely heavily on system-specific information, limiting their transferability to other systems. In this work, we propose an unsupervised hybrid method for HI estimation that integrates general knowledge about degradation into the convolutional autoencoder's model architecture and learning algorithm, enhancing its applicability across various systems. The effectiveness of the proposed method is demonstrated in two case studies from different domains: turbofan engines and lithium batteries. The results show that the proposed method outperforms other competitive alternatives, including residual-based methods, in terms of HI quality and their utility for Remaining Useful Life (RUL) predictions. The case studies also highlight the comparable performance of our proposed method with a supervised model trained with HI labels.
△ Less
Submitted 8 May, 2024;
originally announced May 2024.
-
Analytical Solutions for the Inverse Problem within Gradual Semantics
Authors:
Nir Oren,
Bruno Yun,
Assaf Libman,
Murilo S. Baptista
Abstract:
Gradual semantics within abstract argumentation associate a numeric score with every argument in a system, which represents the level of acceptability of this argument, and from which a preference ordering over arguments can be derived. While some semantics operate over standard argumentation frameworks, many utilise a weighted framework, where a numeric initial weight is associated with each argu…
▽ More
Gradual semantics within abstract argumentation associate a numeric score with every argument in a system, which represents the level of acceptability of this argument, and from which a preference ordering over arguments can be derived. While some semantics operate over standard argumentation frameworks, many utilise a weighted framework, where a numeric initial weight is associated with each argument. Recent work has examined the inverse problem within gradual semantics. Rather than determining a preference ordering given an argumentation framework and a semantics, the inverse problem takes an argumentation framework, a gradual semantics, and a preference ordering as inputs, and identifies what weights are needed to over arguments in the framework to obtain the desired preference ordering. Existing work has attacked the inverse problem numerically, using a root finding algorithm (the bisection method) to identify appropriate initial weights. In this paper we demonstrate that for a class of gradual semantics, an analytical approach can be used to solve the inverse problem. Unlike the current state-of-the-art, such an analytic approach can rapidly find a solution, and is guaranteed to do so. In obtaining this result, we are able to prove several important properties which previous work had posed as conjectures.
△ Less
Submitted 2 March, 2022;
originally announced March 2022.
-
The Inverse Problem for Argumentation Gradual Semantics
Authors:
Nir Oren,
Bruno Yun,
Srdjan Vesic,
Murilo Baptista
Abstract:
Gradual semantics with abstract argumentation provide each argument with a score reflecting its acceptability, i.e. how "much" it is attacked by other arguments. Many different gradual semantics have been proposed in the literature, each following different principles and producing different argument rankings. A sub-class of such semantics, the so-called weighted semantics, takes, in addition to t…
▽ More
Gradual semantics with abstract argumentation provide each argument with a score reflecting its acceptability, i.e. how "much" it is attacked by other arguments. Many different gradual semantics have been proposed in the literature, each following different principles and producing different argument rankings. A sub-class of such semantics, the so-called weighted semantics, takes, in addition to the graph structure, an initial set of weights over the arguments as input, with these weights affecting the resultant argument ranking. In this work, we consider the inverse problem over such weighted semantics. That is, given an argumentation framework and a desired argument ranking, we ask whether there exist initial weights such that a particular semantics produces the given ranking. The contribution of this paper are: (1) an algorithm to answer this problem, (2) a characterisation of the properties that a gradual semantics must satisfy for the algorithm to operate, and (3) an empirical evaluation of the proposed algorithm.
△ Less
Submitted 1 February, 2022;
originally announced February 2022.
-
Zooming into chaos for a fast, light and reliable cryptosystem
Authors:
Jeaneth Machicao,
Odemir M. Bruno,
Murilo S. Baptista
Abstract:
In previous work, the $k$-logistic map [Machicao and Bruno, Chaos, vol. 27, 053116 (2017)] was introduced as a transformation operating in the $k$ less significant digits of the Logistic map. It exploited the map's pseudo-randomness character that is present in its less significant digits. In this work, we comprehensively analyze the dynamical and ergodic aspects of this transformation, show its a…
▽ More
In previous work, the $k$-logistic map [Machicao and Bruno, Chaos, vol. 27, 053116 (2017)] was introduced as a transformation operating in the $k$ less significant digits of the Logistic map. It exploited the map's pseudo-randomness character that is present in its less significant digits. In this work, we comprehensively analyze the dynamical and ergodic aspects of this transformation, show its applicability to generic chaotic maps or sets, and its potential impact on enabling the creation of a cryptosystem that is fast, light and reliable.
△ Less
Submitted 10 January, 2020;
originally announced January 2020.
-
Extending Eigentrust with the Max-Plus Algebra
Authors:
Juan Afanador,
Maria Araujo,
Murilo Baptista,
Nir Oren
Abstract:
Eigentrust is a simple and widely used algorithm, which quantifies trust based on the repeated application of an update matrix to a vector of initial trust values. In some cases, however, this procedure is rendered uninformative. Here, we characterise such situations and trace their origin to the algebraic conditions guaranteeing the convergence of the Power Method. We overcome the identified limi…
▽ More
Eigentrust is a simple and widely used algorithm, which quantifies trust based on the repeated application of an update matrix to a vector of initial trust values. In some cases, however, this procedure is rendered uninformative. Here, we characterise such situations and trace their origin to the algebraic conditions guaranteeing the convergence of the Power Method. We overcome the identified limitations by extending Eigentrust's core ideas into the Max-Plus Algebra. The empirical evaluation of our max-plus approach demonstrates improvements over Eigentrust.
△ Less
Submitted 13 June, 2019;
originally announced June 2019.
-
Exploiting ergodicity of the logistic map using deep-zoom to improve security of chaos-based cryptosystems
Authors:
Jeaneth Machicao,
Marcela Alves,
Murilo S. Baptista,
Odemir M. Bruno
Abstract:
This paper explores the deep-zoom properties of the chaotic k-logistic map, in order to propose an improved chaos-based cryptosystem. This map was shown to enhance the random features of the Logistic map, while at the same time reducing the predictability about its orbits. We incorporate its strengths to security into a previously published cryptosystem to provide an optimal pseudo-random number g…
▽ More
This paper explores the deep-zoom properties of the chaotic k-logistic map, in order to propose an improved chaos-based cryptosystem. This map was shown to enhance the random features of the Logistic map, while at the same time reducing the predictability about its orbits. We incorporate its strengths to security into a previously published cryptosystem to provide an optimal pseudo-random number generator (PRNG) as its core operation. The result is a reliable method that does not have the weaknesses previously reported about the original cryptosystem.
△ Less
Submitted 12 September, 2018; v1 submitted 8 August, 2018;
originally announced August 2018.
-
Delegating via Quitting Games
Authors:
Juan Afanador,
Nir Oren,
Murilo S. Baptista
Abstract:
Delegation allows an agent to request that another agent completes a task. In many situations the task may be delegated onwards, and this process can repeat until it is eventually, successfully or unsuccessfully, performed. We consider policies to guide an agent in choosing who to delegate to when such recursive interactions are possible. These policies, based on quitting games and multi-armed ban…
▽ More
Delegation allows an agent to request that another agent completes a task. In many situations the task may be delegated onwards, and this process can repeat until it is eventually, successfully or unsuccessfully, performed. We consider policies to guide an agent in choosing who to delegate to when such recursive interactions are possible. These policies, based on quitting games and multi-armed bandits, were empirically tested for effectiveness. Our results indicate that the quitting game based policies outperform those which do not explicitly account for the recursive nature of delegation.
△ Less
Submitted 20 April, 2018;
originally announced April 2018.
-
Understanding Information Transmission in Complex Networks
Authors:
Nicolás Rubido,
Celso Grebogi,
Murilo S. Baptista
Abstract:
Information Theory concepts and methodologies conform the background of how communication systems are studied and understood. They are mainly focused on the source-channel-receiver problem and on the asymptotic limits of accuracy and communication rates, which are the classical problems studied by Shannon. However, the impact of Information Theory on networks (acting as the channel) is just starti…
▽ More
Information Theory concepts and methodologies conform the background of how communication systems are studied and understood. They are mainly focused on the source-channel-receiver problem and on the asymptotic limits of accuracy and communication rates, which are the classical problems studied by Shannon. However, the impact of Information Theory on networks (acting as the channel) is just starting. Here, we present an approach to understand how information flows in any connected complex network. Our approach is based on defining linear conservative flows that travel through the network from source to receiver. This framework allows us to have an analytical description of the problem and also linking the topological invariants of the network, such as the node degree, with the information flow. In particular, our approach is able to deal with information transmission in modular networks (networks containing community structures) or multiplex networks (networks with multiple layers), which are nowadays of paramount importance.
△ Less
Submitted 15 May, 2017;
originally announced May 2017.
-
Chaotic, informational and synchronous behaviour of multiplex networks
Authors:
M. S. Baptista,
R. M. Szmoski,
R. F. Pereira,
S. E. de Souza Pinto
Abstract:
The understanding of the relationship between topology and behaviour in interconnected networks would allow to characterise and predict behaviour in many real complex networks since both are usually not simultaneously known. Most previous studies have focused on the relationship between topology and synchronisation. In this work, we provide analytical formulas that shows how topology drives comple…
▽ More
The understanding of the relationship between topology and behaviour in interconnected networks would allow to characterise and predict behaviour in many real complex networks since both are usually not simultaneously known. Most previous studies have focused on the relationship between topology and synchronisation. In this work, we provide analytical formulas that shows how topology drives complex behaviour: chaos, information, and weak or strong synchronisation; in multiplex networks with constant Jacobian. We also study this relationship numerically in multiplex networks of Hindmarsh-Rose neurons. Whereas behaviour in the analytically tractable network is a direct but not trivial consequence of the spectra of eigenvalues of the Laplacian matrix, where behaviour may strongly depend on the break of symmetry in the topology of interconnections, in Hindmarsh-Rose neural networks the nonlinear nature of the chemical synapses breaks the elegant mathematical connection between the spectra of eigenvalues of the Laplacian matrix and the behaviour of the network, creating networks whose behaviour strongly depends on the nature (chemical or electrical) of the inter synapses.
△ Less
Submitted 20 November, 2015; v1 submitted 20 October, 2015;
originally announced October 2015.
-
A fast and light stream cipher for smartphones
Authors:
Gerard Vidal,
Murilo Baptista,
Hector Mancini
Abstract:
We present a stream cipher based on a chaotic dynamical system. Using a chaotic trajectory sampled under certain rules in order to avoid any attempt to reconstruct the original one, we create a binary pseudo-random keystream that can only be exactly reproduced by someone that has fully knowledge of the communication system parameters formed by a transmitter and a receiver and sharing the same init…
▽ More
We present a stream cipher based on a chaotic dynamical system. Using a chaotic trajectory sampled under certain rules in order to avoid any attempt to reconstruct the original one, we create a binary pseudo-random keystream that can only be exactly reproduced by someone that has fully knowledge of the communication system parameters formed by a transmitter and a receiver and sharing the same initial conditions. The plaintext is XORed with the keystream creating the ciphertext, the encrypted message. This keystream passes the NISTs randomness test and has been implemented in a videoconference App for smartphones, in order to show the fast and light nature of the proposed encryption system.
△ Less
Submitted 5 December, 2013;
originally announced December 2013.
-
Analysis of communities in a mythological social network
Authors:
Pedro J. Miranda,
Murilo S. Baptista,
Sandro E. de S. Pinto
Abstract:
The intriguing nature of classical Homeric narratives has always fascinated the occidental culture contributing to philosophy, history, mythology and straight forwardly to literature. However what would be so intriguing about Homer's narratives' At a first gaze we shall recognize the very literal appeal and aesthetic pleasure presented on every page across Homer's chants in Odyssey and rhapsodies…
▽ More
The intriguing nature of classical Homeric narratives has always fascinated the occidental culture contributing to philosophy, history, mythology and straight forwardly to literature. However what would be so intriguing about Homer's narratives' At a first gaze we shall recognize the very literal appeal and aesthetic pleasure presented on every page across Homer's chants in Odyssey and rhapsodies in Iliad. Secondly we may perceive a biased aspect of its stories contents, varying from real-historical to fictional-mythological. To encompass this glance, there are some new archeological finding that supports historicity of some events described within Iliad, and consequently to Odyssey. Considering these observations and using complex network theory concepts, we managed to built and analyze a social network gathered across the classical epic, Odyssey of Homer. Longing for further understanding, topological quantities were collected in order to classify its social network qualitatively into real or fictional. It turns out that most of the found properties belong to real social networks besides assortativity and giant component's size. In order to test the network's possibilities to be real, we removed some mythological members that could imprint a fictional aspect on the network. Carrying on this maneuver the modified social network resulted on assortative mixing and reduction of the giant component, as expected for real social networks. Overall we observe that Odyssey might be an amalgam of fictional elements plus real based human relations, which corroborates other author's findings for Iliad and archeological evidences.
△ Less
Submitted 19 June, 2013; v1 submitted 11 June, 2013;
originally announced June 2013.
-
Structure and function in flow networks
Authors:
Nicolás Rubido,
Celso Grebogi,
Murilo S. Baptista
Abstract:
This Letter presents a unified approach for the fundamental relationship between structure and function in flow networks by solving analytically the voltages in a resistor network, transforming the network structure to an effective all-to-all topology, and then measuring the resultant flows. Moreover, it defines a way to study the structural resilience of the graph and to detect possible communiti…
▽ More
This Letter presents a unified approach for the fundamental relationship between structure and function in flow networks by solving analytically the voltages in a resistor network, transforming the network structure to an effective all-to-all topology, and then measuring the resultant flows. Moreover, it defines a way to study the structural resilience of the graph and to detect possible communities.
△ Less
Submitted 10 January, 2013;
originally announced January 2013.
-
Reconstruction of eye movements during blinks
Authors:
M. S. Baptista,
C. Bohn,
R. Kliegl,
R. Engbert,
J. Kurths
Abstract:
In eye movement research in reading, the amount of data plays a crucial role for the validation of results. A methodological problem for the analysis of the eye movement in reading are blinks, when readers close their eyes. Blinking rate increases with increasing reading time, resulting in high data losses, especially for older adults or reading impaired subjects. We present a method, based on t…
▽ More
In eye movement research in reading, the amount of data plays a crucial role for the validation of results. A methodological problem for the analysis of the eye movement in reading are blinks, when readers close their eyes. Blinking rate increases with increasing reading time, resulting in high data losses, especially for older adults or reading impaired subjects. We present a method, based on the symbolic sequence dynamics of the eye movements, that reconstructs the horizontal position of the eyes while the reader blinks. The method makes use of an observed fact that the movements of the eyes before closing or after opening contain information about the eyes movements during blinks. Test results indicate that our reconstruction method is superior to methods that use simpler interpolation approaches. In addition, analyses of the reconstructed data show no significant deviation from the usual behavior observed in readers.
△ Less
Submitted 13 March, 2008; v1 submitted 15 February, 2008;
originally announced February 2008.