Computational Intelligence for Novel Processing Techniques in Industrial Applications

A special issue of Processes (ISSN 2227-9717). This special issue belongs to the section "Automation Control Systems".

Deadline for manuscript submissions: closed (15 December 2023) | Viewed by 7911

Special Issue Editors


E-Mail Website
Guest Editor
Department of Electrical Engineering, National Chin-Yi University of Technology, Taiping District, Taichung City 41170, Taiwan
Interests: biomedical electronics and signal processing; artificial intelligence and its application; embedded system application; pattern recognition; demand response; power quality
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
Department of Electrical Engineering, National Chin-Yi University of Technology, Taiping District, Taichung City 41170, Taiwan
Interests: automatic control; microprocessor; interface control; single-chip control; logic design
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
Department of Electrical Engineering, National Chin-Yi University of Technology, Taiping District, Taichung City 41170, Taiwan
Interests: artificial intelligence and its application; fuzzy control; infosecurity

E-Mail Website
Guest Editor
Department of Electrical Engineering, National Chin-Yi University of Technology, Taiping District, Taichung City 41170, Taiwan
Interests: computer programming; artificial intelligence and intelligence computing; design of electronic system; medical ultrasound

E-Mail Website
Guest Editor
Department of Electrical Engineering, National Chin-Yi University of Technology, Taiping District, Taichung City 41170, Taiwan
Interests: electric machinery; circuit theorem; capacitor control; engineering mathematics; electrical meter

Special Issue Information

Dear Colleagues,

Digital processing techniques with computational intelligence play a noteworthy role and have been extensively applied in industrial applications, such as application domains in smart manufacturing systems, digital medical image systems, and infosecurity communication systems. Digital signal and image processing techniques have attracted the attention of many researchers who want to develop computational intelligence-based techniques for the abovementioned industrial applications. Therefore, novel computational intelligence-based methods/algorithms are required for the following purposes: (1) automatic visual inspection or search, automatic control, advanced robotics, and fault detection in smart manufacturing systems; (2) automatic visual inspection, image enhancement and segmentation, and automatic diagnosis/detection in digital medical image systems; and (3) word, text, and image encryption and decryption infosecurity communication systems.

The scopes such as novel processing techniques for visual inspection/search, fault detection, dynamic image processing, digital medical image processing, automatic diagnosis, and digital data encryption and decryption are included in smart manufacturing engineering, biomedical engineering, and infosecurity engineering. To achieve the abovementioned aim, the proposed Special Issue needs advanced/novel mathematical and intelligent model developments for three scopes to solve both research problems and real world problems. We hope that these up-to-date studies/techniques can be established in order to put special emphasis on emerging topics.

The scope of interest for the proposed Special Issue includes, but are not limited to

Smart Manufacturing System:

  • Automatic visual inspection or search in smart manufacturing system.
  • Fault detection in smart manufacturing system.
  • Advanced robotics and control in smart manufacturing system.
  • Three-dimensional printing for prototyping optimal design in smart manufactute.

 Medical Image System:

  • Smart imaging, microwave, and optical techniques for medical image and signal acquisition.
  • Medical image processing with computational intelligence-based methods.
  • Fractional-order calculus for medical image and signal processing.
  • Automatic diagnosis, detection, and monitoring applications in digital medical image management system.
  • Three-dimensional printing for surgical predictive planning and clinical application.

 Infosecurity Communication System:

  • Chaotic synchronous communication and chaotic system for document and image encryption and decryption.
  • Signal and image encryption and decryption with computational intelligence-based methods.
  • Medical image encryption and decryption in a health information system.

Prof. Dr. Chia-Hung Lin
Prof. Dr. Neng-Sheng Pai
Dr. Pi-Yun Chen
Dr. Jian-Xing Wu
Prof. Dr. Wen-Cheng Pu
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Processes is an international peer-reviewed open access monthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • smart manufacturing system
  • medical image system
  • infosecurity communication system
  • automatic visual inspection
  • fault detection
  • three-dimensional printing
  • automatic diagnosis, detection, and monitoring
  • fractional-order calculus
  • image encryption and decryption
  • signal encryption and decryption

Published Papers (5 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

20 pages, 10015 KiB  
Article
Multilayer Convolutional Processing Network Based Cryptography Mechanism for Digital Images Infosecurity
by Chia-Hung Lin, Chia-Hung Wen, Hsiang-Yueh Lai, Ping-Tzan Huang, Pi-Yun Chen, Chien-Ming Li and Neng-Sheng Pai
Processes 2023, 11(5), 1476; https://doi.org/10.3390/pr11051476 - 12 May 2023
Cited by 1 | Viewed by 1051
Abstract
Digital images can be easily shared or stored using different imaging devices, storage tools, and computer networks or wireless communication systems. However, these digital images, such as headshots or medical images, may contain private information. Hence, to protect the confidentiality, reliability, and availability [...] Read more.
Digital images can be easily shared or stored using different imaging devices, storage tools, and computer networks or wireless communication systems. However, these digital images, such as headshots or medical images, may contain private information. Hence, to protect the confidentiality, reliability, and availability of digital images on online processing applications, it is crucial to increase the infosecurity of these images. Therefore, an authorization encryption scheme should ensure a high security level of digital images. The present study aimed to establish a multilayer convolutional processing network (MCPN)-based cryptography mechanism for performing two-round image encryption and decryption processes. In the MCPN layer, two-dimensional (2D) spatial convolutional operations were used to extract the image features and perform scramble operations from grayscale to gray gradient values for the first-image encryption and second-image decryption processes, respectively. In the MCPN weighted network, a sine-power chaotic map (SPCM)-based key generator was used to dynamically produce the non-ordered pseudorandom numbers to set the network-weighted values as secret keys in a sufficiently large key space. It performs the second and first encryption processes using the diffusion method, modifying the image pixel values. Children’s headshots and medical images were used to evaluate the security level by comparing the plain and cipher images using the information entropy, number of pixel change rate, and unified averaged changed intensity indices. Moreover, the plain and decrypted images were compared to verify the decrypted image quality using the structural similarity index measurement and peak signal-to-noise ratio. Full article
Show Figures

Figure 1

14 pages, 7816 KiB  
Article
Position Tracking of an Underwater Robot Based on Floating-Downing PI Control
by Chao-Lin Kuo, Yu-Chi Pu and Qi-An Chen
Processes 2022, 10(11), 2346; https://doi.org/10.3390/pr10112346 - 10 Nov 2022
Cited by 2 | Viewed by 1786
Abstract
A remotely operated underwater vehicle (ROV) is crucial in ocean exploration and underwater missions. An ROV is manipulated through a tether cable by an operator on shore or mother boat, and it can be used for underwater observations or as a robotic arm [...] Read more.
A remotely operated underwater vehicle (ROV) is crucial in ocean exploration and underwater missions. An ROV is manipulated through a tether cable by an operator on shore or mother boat, and it can be used for underwater observations or as a robotic arm to take samples back. The position control and movement of an ROV are not stable due to buoyancy, ocean current, and surge waves. To overcome the influence of these disturbances on the ROV, we propose a switch proportional-integral (PI) controller combined with a buck-boost converter (BBC) to process the ROV’s position following. In this paper, a six-axis ROV was designed and implemented. The ROV controller was designed by a NI-roboRIO-based embedded system, which includes a pressure sensor, an accelerometer, six thrusters, and two webcams. The LabVIEW human–machine interface was designed to integrate the control system, sensors, and thrusters. The PI controller was employed to perform the station-keeping and trajectory following. Different PI control parameters were used for the ROV floating-up and diving-down in the sine-wave trajectory following. Experimental results showed that the proposed switch PI control scheme is robust for the position tracking of the underwater robot. The contribution of this study is that we proposed a novel switch proportional-integral controller combined with a buck-boost converter and applied the controller to a natural underwater vehicle, not a mathematical model. The experiments showed that the proposed controller can resist the disturbance of the aquatic environment. Full article
Show Figures

Figure 1

13 pages, 2860 KiB  
Article
Flexible Ring Sensor Array and Machine Learning Model for the Early Blood Leakage Detection during Dialysis
by Ping-Tzan Huang, Chia-Hung Lin and Chien-Ming Li
Processes 2022, 10(11), 2197; https://doi.org/10.3390/pr10112197 - 26 Oct 2022
Cited by 1 | Viewed by 1401
Abstract
Severe blood leakage resulting from the detachment of dialysis tubing is often difficult to detect by nurses in busy clinics. This paper presents a flexible blood leakage detection system featuring a ring-light sensor array with an operating wavelength of 500–700 nm, which is [...] Read more.
Severe blood leakage resulting from the detachment of dialysis tubing is often difficult to detect by nurses in busy clinics. This paper presents a flexible blood leakage detection system featuring a ring-light sensor array with an operating wavelength of 500–700 nm, which is held in place by the gauze covering the dialysis puncture site. A ring-light sensor is connected to a bidirectional hetero-associative memory network, which interprets detected changes in signal strength, the output signal of which is transmitted via WiFi to a server at the nursing station where a machine learning algorithm determines whether blood leakage has occurred. The compact design of this early warning system greatly enhances the comfort and mobility of patients undergoing dialysis. The efficacy of the proposed system was demonstrated in experiments involving artificial blood. Full article
Show Figures

Figure 1

15 pages, 2086 KiB  
Article
Design and Realization of Seeding Quality Monitoring System for Air-Suction Vibrating Disc Type Seed Meter
by Junhui Cheng, Yaoming Li, Jin Chen, Yanbin Liu, Kuizhou Ji and Tiaotiao Chen
Processes 2022, 10(9), 1745; https://doi.org/10.3390/pr10091745 - 1 Sep 2022
Cited by 2 | Viewed by 1341
Abstract
To improve the seeding qualification rate and stability of the air-suction vibrating disc type seed meter on the rice seedling raising line, in this paper, an improved wireless sensor network node layout optimization algorithm was proposed, and the operation monitoring system of the [...] Read more.
To improve the seeding qualification rate and stability of the air-suction vibrating disc type seed meter on the rice seedling raising line, in this paper, an improved wireless sensor network node layout optimization algorithm was proposed, and the operation monitoring system of the seed meter was designed using the Internet of Things and configuration software. In the system, the upper computer software adopted the Kingview software, the lower computer took the STM32F429IGT and CC2530 as the core controllers, and ZigBee was selected for data transmission to build the wireless sensor network. The acquisition of field status information and the sending of control instructions were realized through the sensor nodes constructed by the CC2530 core controller. The data was sent to the coordinator node in real-time through the wireless sensor network. The coordinator node realized the bidirectional transmission of data with Kingview and the upper computer control instructions forwarding using the ASCII protocol The host computer monitoring and management software was developed based on configuration software to realize real-time data monitoring, access database storage, fault alarm, control command sending and other functions. The experimental results showed that the detection accuracy of the system for the seeding amount and missed seeding amount was 94.3% and 95.6%, respectively, which could realize the monitoring of the primary working status of the seed meter. The system realized effective data transmission and data remote wireless transmission function, which provided sufficient theoretical and data support for the performance optimization of the seed meter, and laid a good foundation for the visualization and intelligence of information data. Full article
Show Figures

Figure 1

12 pages, 575 KiB  
Article
An Iterative Backbone Algorithm for Service Network Design Problems
by Ai Gao, Xin Jin and Xudong Diao
Processes 2022, 10(7), 1373; https://doi.org/10.3390/pr10071373 - 14 Jul 2022
Cited by 1 | Viewed by 1268
Abstract
Service network design problems arise at airlines, trucking companies, and railroads wherever there is a need to determine cost-minimizing routes and schedules, given resource availability and service constraints. In recent years, the application of consolidation-based service network design in the express service has [...] Read more.
Service network design problems arise at airlines, trucking companies, and railroads wherever there is a need to determine cost-minimizing routes and schedules, given resource availability and service constraints. In recent years, the application of consolidation-based service network design in the express service has attracted lots of academic attention due to the rapid growth of the express industry. This paper studies the consolidation-based service network design problem, which jointly determines the commodity flow, vehicle dispatching, and fleet sizing. We propose a mixed-integer optimization model to address the problem and design an efficient iterative backbone algorithm to solve large-scale real-world problems. The numerical results of large-scale instances confirmed that the solution obtained by our proposed algorithm is better than that of the primal model, and the running time taken is less than half that of the general solution approach. The computational study confirmed the effectiveness and efficiency of the proposed algorithm. Full article
Show Figures

Figure 1

Back to TopTop