Journal of Robotics, Networking and Artificial Life
Volume 9, Issue 3, December 2022
Research Article
1.Design and Development of Ocean Debris Collecting Unmanned Surface Vehicle
and Performance Evaluation of Collecting Device in Tank
Jonghyun Ahn1, Shunsuke Oda2, Shota Chikushi3, Takashi Sonoda4, Shinsuke Yasukawa2
1Dept. of Intelligent Mechanical Engineering, Hiroshima Institute of Technology,
2-1-1 Miyake,Saeki-ku, Hiroshima, 731-5193, Japan
2Dept. of Human Intelligence Systems, Kyushu Institute of Technology,2-4
Hibikino, Wakamatsu, Kitakyushu, Fukuoka, 808-0196, Japan
3Dept. of Robotics, Kindai University, 1 Takaya Umenobe, Hiroshima, 739-2116,
Japan
4Dept. of Engineering, Nishinippon Institute of Technology, 2-11, Aratsu,
Kanda-town, Miyako
-gun, Fukuoka 800-0396, Japan
pp. 209–215
ABSTRACT
In recent years, the oceans debris is increased because of human’s activity.
Especially, the plastic debris, such as plastic bottles, is not biodegradable,
and therefore those are creating serious environmental problems. The ocean
debris collecting in the world is done through volunteer activities. However,
these activities require a lot of time and labor. In this research, we
proposed a method of ocean debris collecting USV operation method. Also,
we designed and developed a USV (Unmanned Surface Vehicle) for the purpose
of autonomous oceans debris collecting mission and evaluated the developed
ocean debris collecting device. In the development of USV, electronic parts,
which are to operate the mission autonomously, were selected. Then, each
electronic part was placed inside the waterproof box according to the designed
power and communication system diagram. In the development of oceans debris
collecting device, we designed a belt conveyor type device. A motor was
selected to rotate the device and a decelerator, which used the planetary
gear mechanism, was designed. To evaluate the performance of the developed
ocean debris collecting device, we tested various types of plastic bottles
in tank environment. As a result of the experiment, the developed USV collected
various types of plastic bottles with a 47.7% probability.
ARTICLE INFO
Article History
Received 28 April 2022
Accepted 02 August 2022
Keywords
Internet of things (IoT)
Robot
MQ telemetry transport (MQTT)
AES
Supervisory control and data acquisition (SCADA)
JRNAL9301
Download article (PDF)
Research Article
2.Scalable ICS Honeypot Design by Description Files
I-Hsien Liu, Jun-Hao Lin, Hsin-Yu Lai, Jung-Shian Li
Department of Electrical Engineering / Institute of Computer and Communication
Engineering, National Cheng Kung University
No.1, University Rd., East Dist., Tainan City 70101, Taiwan
pp. 216–220
ABSTRACT
A prototype honeypot system based on the Modbus/TCP protocol is designed
for the protection of Industrial Control Systems (ICS). The proposed system
operates under the control of a single server and enables multiple agents,
each with several honeypot devices, to be deployed in different industrial
environments. For each honeypot, the device characteristics are defined
by JSON description files. The experimental results show that the interaction
behavior of the proposed honeypot is closer to that of an authentic ICS
device (a PLC) than that of the Conpot open-source ICS honeypot reported
in the literature. Furthermore, the honeypot is awarded a perfect score
by the honeypot scoring mechanism of Shodan Internet of Things (IoT) search
engine
ARTICLE INFO
Article History
Received 28 October 2021
Accepted 07 August 2022
Keywords
Industrial control system
Honeypot
Cybersecurity
Shodan
JRNAL9302
Download article (PDF)
Research Article
3.Proposing Discussion Framework and Hypothesis for Neural Underpinnings
of Human Symbolic and Embodied Communication from Synchronization Viewpoint
Masayuki Fujiwara, Takashi Hashimoto
School of Knowledge Science, Japan Advanced Institute of Science and Technology,
1–1 Asahidai, Nomi, Ishikawa, 923–1211, Japan
pp. 221-228
ABSTRACT
A framework for discussing the neural underpinning of communication processes
is proposed from the perspective of synchronization. This framework comprises
four stages: (i) characterizing the target communication in a two-dimensional
space defined by symbolic/embodied (non-symbolic) and voluntary/involuntary
processes, (ii) focusing on the level of analysis of synchrony on an ontological
hierarchy, (iii) constructing a neurocognitive model to simulate neural
dynamics, and (iv) testing an empirical hypothesis on the neural underpinning
of communication through model-based electroencephalography (EEG) connectivity
neurofeedback in communication experiments with the cognitive neural mass/field
model. We performed two EEG experiments, implementing the former two stages:
the formation of symbolic communication, in which communication changed
from voluntary to involuntary, and intentional switching in embodied communication,
which involves switching between voluntary and involuntary behavior. The
findings on communicative brain activities from these experiments culminated
in the hypothesis that three brain regions are involved in interpreting
symbols and motor intentions as well as in social coordination, in which
one region might be shared by two modalities and the other two are specific
to each modality. As we could perform the experiments and their analyses
and derive a working hypothesis based on the framework, we claim that the
proposed framework may be vital for investigating the neural underpinnings
of communication in two different modalities in a unified manner.
ARTICLE INFO
Article History
Received 25 November 2021
Accepted 15 August 2022
Keywords
Communication
Framework
Synchronization
Electroencephalogram
Neurocognitive modeling
JRNAL9303
Download article (PDF)
Research Article
4.OPC UA TSN Industrial Control System Cybersecurity Testbed
I-Hsien Liu1, Chuan-Kang Liu2, Li-Yin Chang1, Jung-Shian Li1
1Department of Electronic Engineering/Institute of Computer and Communication
Engineering, National Cheng Kung University, No. 1, Daxue Road, East District,
Tainan, 701401, Taiwan
2Department of Artificial Intelligence and Computer, Engineering, National
Chin-Yi University of Technology, No.57, Sec. 2, Zhongshan Road, Taiping
District, Taichung, 411030, Taiwan
pp. 229–232
ABSTRACT
Due to the advent of Industrial 4.0, the Industrial Internet emphasizes
the combination and application of IT technology and OT technology, and
one of the features of Time sensitive networking is the feature of separating
transmission time. This feature will be able to combine IT technology and
OT technology in Industrial control systems. But as a result, the issue
of information security in the industry is on the rise. In order to research
security issue and protection in Time sensitive networking, we have built
a test platform support TSN for industrial control networks for related
research. Through the experiments in the research, we can know that TSN
has a good effect on the separation of general traffic and TSN traffic.
TSN won’t be affected by general traffic but is very vulnerable to priority
traffic attacks.
ARTICLE INFO
Article History
Received 27 October 2021
Accepted 04 September 2022
Keywords
Industrial control system (ICS)
OPC UA
Cybersecurity
Electroencephalogram
Time sensitive networking (TSN)
JRNAL9304
Download article (PDF)
Research Article
5.Evaluation of Two Rollers Arrangement on a Hemisphere by Kinetic Energy
Kenji Kimura1, Yusuke Abematsu2, Hiroyasu Hirai3, Kazuo Ishii3
1Department of Control Engineering, National Institute of Technology, Matsue
College, 14-4 Nishi-ikuma-cho, Matsue-shi, Shimane, 690-8518, Japan
2Mathematics in General Education, National Institute of Technology, Kagoshima
College, 1460-1 Shinko, Hayato-cho, Kirishima-shi, Kagoshima 899-5193,
Japan
3Graduate School of Life Science and Engineering, Kyushu Institute of Technology,
2-4 Hibikino, Wakamatsu-ku, Kitakyushu-shi 808-0196, Fukuoka, Japan
pp. 233–239
ABSTRACT
A driving roller arrangement of hemisphere is one of the important problems
by omnidirectional sphere conveyance. In this research, the roller arrangement
problem, viewed as an evaluation function, is thought of as mean of roller’s
kinetic energy with respect to the sphere direction. Furthermore, theoretically,
we calculate the evaluation function, and find the contact point such that
the evaluated value is minimal.
ARTICLE INFO
Article History
Received 10 November, 2021
Accepted 16 August 2022
Keywords
Omnidirectional movement
Kinetic energy
Angular velocity vector of the sphere
JRNAL9305
Download article (PDF)
Research Article
6.Cross-organizational Non-repudiation Industrial Control Log System Based
on Blockchain
I-Hsien Liu1, Yao-Chu Tsai1, Chu-Fen Li2, Jung-Shian Li1
1Department of Electrical Engineering / Institute of Computer and Communication
Engineering, National Cheng Kung University, No.1, University Rd., East
Dist., Tainan City 701401, Taiwan
2Department of Finance, National Formosa University, No. 64, Wenhua Rd,
Huwei Town, Yunlin County 632301, Taiwan
pp. 240–244
ABSTRACT
Industrial control system (ICS) and critical infrastructure have become
increasingly dependent on cyber-physical systems nowadays. Since ICS network
is vulnerable to adversarial attacks, building secure operation mode is
essential. In order to secure the integrity of data in ICS, this paper
proposes a blockchain-based log system implemented on physical industrial
equipment. Applying cross-organizational blockchain transaction mechanism
in the specialized master-slave network model, industrial control transmission
logs can be verified and non-repudiation
ARTICLE INFO
Article History
Received 03 November, 2021
Accepted 11 September 2022
Keywords
ICS security
Data integrity
Blockchain
Log verification
JRNAL9306
Download article (PDF)
Research Article
7.Deep Learning Based Imaginary Finger Control Detection Algorithm
Suresh Gobee1, Norrima Mokhtar1, Hamzah Arof1, Noraisyah Md Shah1, Heshalini Rajagopal2, Wan Khairunizam3
1Department of Electrical Engineering, Faculty of Engineering, University
of Malaya, Malaysia
2Institute of Computer Science and Digital Innovation, UCSI University,
56000 Kuala Lumpur, Malaysia
3Faculty of Electrical Engineering Technology, University Malaysia Perlis,
02600 Perlis, Malaysia
pp. 245–254
ABSTRACT
Conventionally, the brain signals were analysed manually by the neuroscientists
on how the brain signals reacts in proportion with the human body. However,
this process is very time consuming and unreliable. Therefore, we have
proposed a brain signal detection system based on deep learning algorithm
in response to the output of EEG device on the imagery finger movements.
These fingers include thumb, index, middle, ring and little of right hand.
In this study, 4 Convolutional Neural Network (CNN) classification models
were developed. These 4 CNN models are different in terms of the pre-processing
requirements and the neural network architecture. The best results for
offline classification obtained in this project are 69.07% and 82.83% respectively
in terms of average accuracy from 6-class and 2-class tests. Moreover,
this project has also developed a proof of concept for applying the trained
models in online or real-time classification.
ARTICLE INFO
Article History
Received 11 November, 2021
Accepted 08 September 2022
Keywords
BCI
Imaginary finger movement
CNN
Log verification
EEG.
JRNAL9307
Download article (PDF)
Research Article
8.Expansion of Application Scope and Addition of a Function for Operations
into BWDM which is an Automatic Test Cases Generation Tool for VDM++ Specification
Takafumi Muto1, Tetsuro Katayama1, Yoshihiro Kita2, Hisaaki Yamaba1, Kentaro Aburada1, Naonobu Okazaki1
1Department of Computer Science and Systems Engineering, Faculty of Engineering,
University of Miyazaki, 1-1 Gakuen-kibanadai nishi, Miyazaki, 889-2192
Japan
2Department of Information Security, Faculty of Information Systems, Siebold
Campus, University of Nagasaki, 1-1-1 Manabino, Nagayo-cho, Nishi-Sonogi-gun,
Nagasaki, 851-2195 Japan
pp. 255–262
ABSTRACT
The use of the formal specification description language VDM++ in software
design can eliminate ambiguity in the specification. However, software
testing after implementation is necessary even if the design uses VDM++,
but manually generating test cases is labor-intensive and time-consuming.
Therefore, our laboratory developed BWDM, which is an automatic test case
generation tool for VDM++ specifications. However, BWDM is not very useful
because it has three problems about its narrow scope of application. This
paper solves the three problems and improves the usefulness of BWDM by
expanding the scope of application of VDM++ definitions and adding a function
to generate test cases for object states. In addition, we conducted a comparison
experiment with manual test case generation and confirmed that BWDM can
reduce work time.
ARTICLE INFO
Article History
Received 25 November, 2021
Accepted 14 September 2022
Keywords
Software testing
Formal methods
Test cases
VDM++
Automatic generation.
JRNAL9308
Download article (PDF)
Research Article
9.Fuzzy Theory Applied in Identification System for Tiny Self-Driving Cars
Chun-Chieh Wang
Department of Automation Engineering and Institute of Mechatronoptic Systems,
Chienkuo Technology University, Taiwan
pp. 263–267
ABSTRACT
In this paper, a fuzzy theory based identification system has been developed
to improve the self-driving image recognition technology. The Raspberry
Pi microprocessor is used as the main controller of the car. The author
writes a Python program to deal with the image recognition problem. The
image processing techniques include grayscale, binarization, morphology,
image cutting and so on. There are four main functional tests in the scenario
setting. It includes road identification, conversion of lane turning arc
into front wheel turning angle, intersection identification, and traffic
light identification. The purpose is to verify the functionality of fuzzy-based
identified self-driving cars. The experimental results show that the developed
recognition system based on fuzzy theory can successfully improve the recognition
effect and reduce the probability of self-driving walking errors.
ARTICLE INFO
Article History
Received 10 November, 2021
Accepted 01 August 2022
Keywords
Fuzzy theory based identification system (FTBIS)
Raspberry Pi
Python
Tiny self-driving cars (TSDC
JRNAL9309
Download article (PDF)
Research Article
10.Sign Language Recognition Based on Deep Learning with Improved (2+1)D-ResNet
Yueqin Sheng1, Qunpo Liu1, Ruxin Ga1, Naohiko Hanajima2
1School of Electrical Engineering and Automation, Henan Polytechnic University,
2001 Century Avenue, Jiaozuo, Henan 454003, China
2College of Information and Systems, Muroran Institute of Technology, 27-1
Mizumoto-cho, Hokkaido, Hokkaido 050-8585, Japan
pp. 268–274
ABSTRACT
Sign language is an important communication tool for deaf and hearing-impaired
people. The study of sign language recognition can not only promote the
communication between deaf-mutes and normal people, but also push the development
of intelligent human-computer interaction. Sign language recognition based
on deep learning has advantages in processing large scale dataset. Most
of them use 3D convolution, which is not conducive to optimization. In
this paper, an improved (2+1)D-ResNet model is proposed for isolated word
recognition. The model convolves the video frame sequence in space and
time dimensions and optimizes the parameters respectively. Based on CELU
activation function, the accuracy of sign language recognition is improved
effectively. The validity of proposed algorithm is verified on CSL dataset..
ARTICLE INFO
Article History
Received 24 November, 2021
Accepted 18 September 2022
Keywords
Sign language recognition
(2+1)D convolution
3D convolution
CELU activation function
JRNAL9310
Download article (PDF)
Research Article
11.A Part-aware Attention Neural Network for Cross-view Geo-localization between
UAV and Satellite
Duc Viet Bui, Masao Kubo, Hiroshi Sato
Department of Computer Science, National Defense Academy, 1-10-20 Hashirimizu,
Yokosuka City, Kanagawa Prefecture, Japan
pp. 275–284
ABSTRACT
Cross-view image matching for geo-localization is the task of finding images
containing the same geographic target across different platforms. This
task has drawn significant attention among researchers due to its vast
applications in UAV’s self-localization and navigation. Given a query image
from UAV-view, a matching model can find the same geo-referenced satellite
image from the database, which can be used later to precisely locate the
UAV’s current position. Many studies have achieved high accuracy on existing
datasets, but they can be further improved by combining different feature
processing methods. Inspired by previous studies, in this paper, we proposed
a new framework by using a channel-based attention mechanism combined with
a part-based representation learning method, including multi-level feature
aggregation and an alternative pooling strategy to enhance the feature
extracting process. The proposed model significantly improved matching
accuracy and surpassed the existing state-of-the-art methods on University-1652
dataset..
ARTICLE INFO
Article History
Received 29 June 2022
Accepted 20 September 2022
Keywords
Cross-view image matching
Geo-localization
UAV
Attention mechanism
Part-based representation learning
JRNAL9311
Download article (PDF)
Research Article
12.A Survey of Machine Vision Applications for Fruit Recognition
Tianyi Zhang1, Fengzhi Dai1,2
1College of Electronic Information and Automation, Tianjin University of
Science and Technology, 300222,China
2Tianjin Tianke Intelligent and Manufacture Technology CO., LTD, China
pp. 285–288
ABSTRACT
Machine vision has been widely used in the field of fruit picking in recent
years, and its main application directions include fruit identification,
fruit quality detection, fruit maturity detection and grading, etc. Among
them, fruit maturity detection technology is of great significance for
improving the quality and market competitiveness of fresh and stored fruits.
This paper focuses on the application of machine vision in fruit identification,
fruit ripeness detection and grading in the past three years, and the application
is more mature in many fruits such as citrus, blueberry, cherry, etc. They
use some algorithms to accurately identify the fruit, process its image,
and feed it back to control the robotic arm for picking and other operations.
ARTICLE INFO
Article History
Received 22 November 2021
Accepted 22 September 2022
Keywords
Machine vision
Image processing
Edge detection
Maturity inspection
JRNAL9312
Download article (PDF)
Research Article
13.Detecting Approaching Human Hands in a Human-Robot Coexistent Food Preparation
Work Area for Preventing Collision
Joo Kooi Tan1, Takaaki Yotsumoto2, Yuta Ono2
1Faculty of Engineering, Kyushu Institute of Technology, Sensuicho 1-1,
Tobata, Kitakyushu, Fukuoka 804-8550, Japan
2Graduate y of Engineering, Kyushu Institute of Technology, Sensuicho 1-1,
Tobata, Kitakyushu, Fukuoka 804-8550, Japan
pp. 289–294
ABSTRACT
In Japan, the population of working age between 15 and 64 years old peaked
in 1995 at about 87 million and is expected to continue to decline in the
future. Therefore, to solve the labor shortage, the introduction of industrial
robots that can perform the same level of work as humans is strongly requested
especially in the food preparation industry. In order to prevent danger
to workers there, industrial robots must recognize workers and avoid them
when there is fear of collision. In this paper, we propose a method for
extracting hand regions based on the color distribution of a hand and GrabCut
in an experimental environment to recognize human hands and detect their
directions of approach. The proposed method was examined experimentally
and gave satisfactory results.
ARTICLE INFO
Article History
Received 26 November 2021
Accepted 24 September 2022
Keywords
Recognition
Hand area extraction
Lab color system
Grab cut
JRNAL9313
Download article (PDF)
Research Article
14.Smart Interactive Virtual Assistant System for Office Door Applications
in the Situation of the COVID-19 Pandemic
Muhammad Zharif Aiman Alias, Wan Norsyafizan W. Muhamad, Nurain Izzati
Shuhaimi, Darmawaty Mohd Ali, Azlina Idris
School of Electrical Engineering, College of Engineering, University Teknologi
MARA, Malaysia
pp. 295–302
ABSTRACT
COVID-19 has now spread to every continent around the world. The virus
is spread through the transmission of close contact with the infected person
as well as by touching a surface that has been contaminated with the virus.
Touchless switches must be utilized especially in office and home environments
to reduce the spread of COVID-19. This paper presents the Smart Interactive
Virtual Assistant for Smart Office Door Application. The proposed system
uses voice recognition and artificial intelligence by applying the open-sourced
API of Google Assistant to control the smart door contactless. The user
can give the command to the system via voice to either open or close the
door. This smart interactive voice assistant system uses Raspberry Pi as
the brain or computer for the interface and Python is used as the software
for running the coding script. The components used such as LED lights and
DC motors are connected through the General-Purpose Input Output of Raspberry
Pi and the relay module. One of the DC motors is used for controlling the
lock and another one is used for controlling the door. Blue LED is used
as a locked door notification while a green LED is used as an unlocked
notification. A pair of microphones and speakers are also connected with
the Raspberry Pi as input and output voice commands through a USB port
and Bluetooth. With the smart interactive virtual assistant solution, office
spaces will move towards a more touch-free control which could prevent
the spread of COVID-19.
ARTICLE INFO
Article History
Received 19 November 2021
Accepted 26 September 2022
Keywords
Smart virtual assistant
Internet of things
Google assistant
Voice command and raspberry Pi
JRNAL9314
Download article (PDF)
Research Article
15.Data-Balancing Algorithm Based on Generative Adversarial Network for Robust
Network Intrusion Detection
I-Hsien Liu, Cheng-En Hsieh, Wei-Min Lin, Jung-Shian Li, Chu-Fen Li1
Department of Electrical Engineering / Institute of Computer and Communication
Engineering, National Cheng Kung University,
No.1, University Rd., East Dist., Tainan City 701401, Taiwan
1Department of Finance, National Formosa University, No.64, Wunhua Rd.,
Huwei Township, Yunlin County 632301, Taiwan
pp. 303–308
ABSTRACT
With the popularization and advancement of digital technology and network
technology in recent years, cyber security has emerged as a critical concern.
In order to defend against malicious attacks, intrusion detection systems
(IDSs) increasingly employ machine learning models as a protection strategy.
However, the effectiveness of such models is dependent on the algorithms
and datasets used to train them. The present study uses five different
supervised algorithms (Naïve Bayes, CNN, LSTM, BAT, and SVM) to implement
the IDS machine learning model. A data-balancing algorithm based on a generative
adversarial network (GAN) is proposed to mitigate the data imbalance problem
in the IDS dataset. The proposed method, designated as GAN-BAL, is applied
to the CICIDS 2017 dataset and is shown to improve both the recall rate
and the accuracy of the trained IDS models.
ARTICLE INFO
Article History
Received 20 October 2021
Accepted 04 October 2022
Keywords
Anomaly traffic detection
Machine learning
IDS dataset
GAN
Performance analytics
JRNAL9315
Download article (PDF)