Volume9 Issue3

Journal of Robotics, Networking and Artificial Life

Volume 9, Issue 3, December 2022

Research Article
1.Design and Development of Ocean Debris Collecting Unmanned Surface Vehicle and Performance Evaluation of Collecting Device in Tank
Jonghyun Ahn1, Shunsuke Oda2, Shota Chikushi3, Takashi Sonoda4, Shinsuke Yasukawa2
1Dept. of Intelligent Mechanical Engineering, Hiroshima Institute of Technology, 2-1-1 Miyake,Saeki-ku, Hiroshima, 731-5193, Japan
2Dept. of Human Intelligence Systems, Kyushu Institute of Technology,2-4 Hibikino, Wakamatsu, Kitakyushu, Fukuoka, 808-0196, Japan
3Dept. of Robotics, Kindai University, 1 Takaya Umenobe, Hiroshima, 739-2116, Japan
4Dept. of Engineering, Nishinippon Institute of Technology, 2-11, Aratsu, Kanda-town, Miyako
-gun, Fukuoka 800-0396, Japan
pp. 209–215
ABSTRACT
In recent years, the oceans debris is increased because of human’s activity. Especially, the plastic debris, such as plastic bottles, is not biodegradable, and therefore those are creating serious environmental problems. The ocean debris collecting in the world is done through volunteer activities. However, these activities require a lot of time and labor. In this research, we proposed a method of ocean debris collecting USV operation method. Also, we designed and developed a USV (Unmanned Surface Vehicle) for the purpose of autonomous oceans debris collecting mission and evaluated the developed ocean debris collecting device. In the development of USV, electronic parts, which are to operate the mission autonomously, were selected. Then, each electronic part was placed inside the waterproof box according to the designed power and communication system diagram. In the development of oceans debris collecting device, we designed a belt conveyor type device. A motor was selected to rotate the device and a decelerator, which used the planetary gear mechanism, was designed. To evaluate the performance of the developed ocean debris collecting device, we tested various types of plastic bottles in tank environment. As a result of the experiment, the developed USV collected various types of plastic bottles with a 47.7% probability.

ARTICLE INFO
Article History
Received 28 April 2022
Accepted 02 August 2022

Keywords
Internet of things (IoT)
Robot
MQ telemetry transport (MQTT)
AES
Supervisory control and data acquisition (SCADA)

JRNAL9301

Download article (PDF)

Research Article
2.Scalable ICS Honeypot Design by Description Files
I-Hsien Liu, Jun-Hao Lin, Hsin-Yu Lai, Jung-Shian Li
Department of Electrical Engineering / Institute of Computer and Communication Engineering, National Cheng Kung University
No.1, University Rd., East Dist., Tainan City 70101, Taiwan
pp. 216–220
ABSTRACT
A prototype honeypot system based on the Modbus/TCP protocol is designed for the protection of Industrial Control Systems (ICS). The proposed system operates under the control of a single server and enables multiple agents, each with several honeypot devices, to be deployed in different industrial environments. For each honeypot, the device characteristics are defined by JSON description files. The experimental results show that the interaction behavior of the proposed honeypot is closer to that of an authentic ICS device (a PLC) than that of the Conpot open-source ICS honeypot reported in the literature. Furthermore, the honeypot is awarded a perfect score by the honeypot scoring mechanism of Shodan Internet of Things (IoT) search engine

ARTICLE INFO
Article History
Received 28 October 2021
Accepted 07 August 2022

Keywords
Industrial control system
Honeypot
Cybersecurity
Shodan

JRNAL9302

Download article (PDF)

Research Article
3.Proposing Discussion Framework and Hypothesis for Neural Underpinnings of Human Symbolic and Embodied Communication from Synchronization Viewpoint
Masayuki Fujiwara, Takashi Hashimoto
School of Knowledge Science, Japan Advanced Institute of Science and Technology, 1–1 Asahidai, Nomi, Ishikawa, 923–1211, Japan
pp. 221-228
ABSTRACT
A framework for discussing the neural underpinning of communication processes is proposed from the perspective of synchronization. This framework comprises four stages: (i) characterizing the target communication in a two-dimensional space defined by symbolic/embodied (non-symbolic) and voluntary/involuntary processes, (ii) focusing on the level of analysis of synchrony on an ontological hierarchy, (iii) constructing a neurocognitive model to simulate neural dynamics, and (iv) testing an empirical hypothesis on the neural underpinning of communication through model-based electroencephalography (EEG) connectivity neurofeedback in communication experiments with the cognitive neural mass/field model. We performed two EEG experiments, implementing the former two stages: the formation of symbolic communication, in which communication changed from voluntary to involuntary, and intentional switching in embodied communication, which involves switching between voluntary and involuntary behavior. The findings on communicative brain activities from these experiments culminated in the hypothesis that three brain regions are involved in interpreting symbols and motor intentions as well as in social coordination, in which one region might be shared by two modalities and the other two are specific to each modality. As we could perform the experiments and their analyses and derive a working hypothesis based on the framework, we claim that the proposed framework may be vital for investigating the neural underpinnings of communication in two different modalities in a unified manner.

ARTICLE INFO
Article History
Received 25 November 2021
Accepted 15 August 2022
Keywords
Communication

Framework
Synchronization
Electroencephalogram
Neurocognitive modeling

JRNAL9303

Download article (PDF)

Research Article
4.OPC UA TSN Industrial Control System Cybersecurity Testbed
I-Hsien Liu1, Chuan-Kang Liu2, Li-Yin Chang1, Jung-Shian Li1
1Department of Electronic Engineering/Institute of Computer and Communication Engineering, National Cheng Kung University, No. 1, Daxue Road, East District, Tainan, 701401, Taiwan
2Department of Artificial Intelligence and Computer, Engineering, National Chin-Yi University of Technology, No.57, Sec. 2, Zhongshan Road, Taiping District, Taichung, 411030, Taiwan
pp. 229–232
ABSTRACT
Due to the advent of Industrial 4.0, the Industrial Internet emphasizes the combination and application of IT technology and OT technology, and one of the features of Time sensitive networking is the feature of separating transmission time. This feature will be able to combine IT technology and OT technology in Industrial control systems. But as a result, the issue of information security in the industry is on the rise. In order to research security issue and protection in Time sensitive networking, we have built a test platform support TSN for industrial control networks for related research. Through the experiments in the research, we can know that TSN has a good effect on the separation of general traffic and TSN traffic. TSN won’t be affected by general traffic but is very vulnerable to priority traffic attacks.

ARTICLE INFO
Article History
Received 27 October 2021
Accepted 04 September 2022

Keywords
Industrial control system (ICS)
OPC UA
Cybersecurity
Electroencephalogram
Time sensitive networking (TSN)

JRNAL9304

Download article (PDF)

Research Article
5.Evaluation of Two Rollers Arrangement on a Hemisphere by Kinetic Energy
Kenji Kimura1, Yusuke Abematsu2, Hiroyasu Hirai3, Kazuo Ishii3
1Department of Control Engineering, National Institute of Technology, Matsue College, 14-4 Nishi-ikuma-cho, Matsue-shi, Shimane, 690-8518, Japan
2Mathematics in General Education, National Institute of Technology, Kagoshima College, 1460-1 Shinko, Hayato-cho, Kirishima-shi, Kagoshima 899-5193, Japan
3Graduate School of Life Science and Engineering, Kyushu Institute of Technology, 2-4 Hibikino, Wakamatsu-ku, Kitakyushu-shi 808-0196, Fukuoka, Japan
pp. 233–239
ABSTRACT
A driving roller arrangement of hemisphere is one of the important problems by omnidirectional sphere conveyance. In this research, the roller arrangement problem, viewed as an evaluation function, is thought of as mean of roller’s kinetic energy with respect to the sphere direction. Furthermore, theoretically, we calculate the evaluation function, and find the contact point such that the evaluated value is minimal.

ARTICLE INFO
Article History
Received 10 November, 2021
Accepted 16 August 2022

Keywords
Omnidirectional movement
Kinetic energy
Angular velocity vector of the sphere

JRNAL9305

Download article (PDF)

Research Article
6.Cross-organizational Non-repudiation Industrial Control Log System Based on Blockchain
I-Hsien Liu1, Yao-Chu Tsai1, Chu-Fen Li2, Jung-Shian Li1
1Department of Electrical Engineering / Institute of Computer and Communication Engineering, National Cheng Kung University, No.1, University Rd., East Dist., Tainan City 701401, Taiwan
2Department of Finance, National Formosa University, No. 64, Wenhua Rd, Huwei Town, Yunlin County 632301, Taiwan
pp. 240–244
ABSTRACT
Industrial control system (ICS) and critical infrastructure have become increasingly dependent on cyber-physical systems nowadays. Since ICS network is vulnerable to adversarial attacks, building secure operation mode is essential. In order to secure the integrity of data in ICS, this paper proposes a blockchain-based log system implemented on physical industrial equipment. Applying cross-organizational blockchain transaction mechanism in the specialized master-slave network model, industrial control transmission logs can be verified and non-repudiation

ARTICLE INFO
Article History
Received 03 November, 2021
Accepted 11 September 2022

Keywords
ICS security
Data integrity
Blockchain
Log verification

JRNAL9306

Download article (PDF)

Research Article
7.Deep Learning Based Imaginary Finger Control Detection Algorithm
Suresh Gobee1, Norrima Mokhtar1, Hamzah Arof1, Noraisyah Md Shah1, Heshalini Rajagopal2, Wan Khairunizam3
1Department of Electrical Engineering, Faculty of Engineering, University of Malaya, Malaysia
2Institute of Computer Science and Digital Innovation, UCSI University, 56000 Kuala Lumpur, Malaysia
3Faculty of Electrical Engineering Technology, University Malaysia Perlis, 02600 Perlis, Malaysia
pp. 245–254
ABSTRACT
Conventionally, the brain signals were analysed manually by the neuroscientists on how the brain signals reacts in proportion with the human body. However, this process is very time consuming and unreliable. Therefore, we have proposed a brain signal detection system based on deep learning algorithm in response to the output of EEG device on the imagery finger movements. These fingers include thumb, index, middle, ring and little of right hand. In this study, 4 Convolutional Neural Network (CNN) classification models were developed. These 4 CNN models are different in terms of the pre-processing requirements and the neural network architecture. The best results for offline classification obtained in this project are 69.07% and 82.83% respectively in terms of average accuracy from 6-class and 2-class tests. Moreover, this project has also developed a proof of concept for applying the trained models in online or real-time classification.

ARTICLE INFO
Article History
Received 11 November, 2021
Accepted 08 September 2022

Keywords
BCI
Imaginary finger movement
CNN
Log verification
EEG.

JRNAL9307

Download article (PDF)

Research Article
8.Expansion of Application Scope and Addition of a Function for Operations into BWDM which is an Automatic Test Cases Generation Tool for VDM++ Specification
Takafumi Muto1, Tetsuro Katayama1, Yoshihiro Kita2, Hisaaki Yamaba1, Kentaro Aburada1, Naonobu Okazaki1
1Department of Computer Science and Systems Engineering, Faculty of Engineering, University of Miyazaki, 1-1 Gakuen-kibanadai nishi, Miyazaki, 889-2192 Japan
2Department of Information Security, Faculty of Information Systems, Siebold Campus, University of Nagasaki, 1-1-1 Manabino, Nagayo-cho, Nishi-Sonogi-gun, Nagasaki, 851-2195 Japan
pp. 255–262
ABSTRACT
The use of the formal specification description language VDM++ in software design can eliminate ambiguity in the specification. However, software testing after implementation is necessary even if the design uses VDM++, but manually generating test cases is labor-intensive and time-consuming. Therefore, our laboratory developed BWDM, which is an automatic test case generation tool for VDM++ specifications. However, BWDM is not very useful because it has three problems about its narrow scope of application. This paper solves the three problems and improves the usefulness of BWDM by expanding the scope of application of VDM++ definitions and adding a function to generate test cases for object states. In addition, we conducted a comparison experiment with manual test case generation and confirmed that BWDM can reduce work time.

ARTICLE INFO
Article History
Received 25 November, 2021
Accepted 14 September 2022

Keywords
Software testing
Formal methods
Test cases
VDM++
Automatic generation.

JRNAL9308

Download article (PDF)

Research Article
9.Fuzzy Theory Applied in Identification System for Tiny Self-Driving Cars
Chun-Chieh Wang
Department of Automation Engineering and Institute of Mechatronoptic Systems, Chienkuo Technology University, Taiwan
pp. 263–267
ABSTRACT
In this paper, a fuzzy theory based identification system has been developed to improve the self-driving image recognition technology. The Raspberry Pi microprocessor is used as the main controller of the car. The author writes a Python program to deal with the image recognition problem. The image processing techniques include grayscale, binarization, morphology, image cutting and so on. There are four main functional tests in the scenario setting. It includes road identification, conversion of lane turning arc into front wheel turning angle, intersection identification, and traffic light identification. The purpose is to verify the functionality of fuzzy-based identified self-driving cars. The experimental results show that the developed recognition system based on fuzzy theory can successfully improve the recognition effect and reduce the probability of self-driving walking errors.

ARTICLE INFO
Article History
Received 10 November, 2021
Accepted 01 August 2022

Keywords
Fuzzy theory based identification system (FTBIS)
Raspberry Pi
Python
Tiny self-driving cars (TSDC

JRNAL9309

Download article (PDF)

Research Article
10.Sign Language Recognition Based on Deep Learning with Improved (2+1)D-ResNet
Yueqin Sheng1, Qunpo Liu1, Ruxin Ga1, Naohiko Hanajima2
1School of Electrical Engineering and Automation, Henan Polytechnic University, 2001 Century Avenue, Jiaozuo, Henan 454003, China
2College of Information and Systems, Muroran Institute of Technology, 27-1 Mizumoto-cho, Hokkaido, Hokkaido 050-8585, Japan
pp. 268–274
ABSTRACT
Sign language is an important communication tool for deaf and hearing-impaired people. The study of sign language recognition can not only promote the communication between deaf-mutes and normal people, but also push the development of intelligent human-computer interaction. Sign language recognition based on deep learning has advantages in processing large scale dataset. Most of them use 3D convolution, which is not conducive to optimization. In this paper, an improved (2+1)D-ResNet model is proposed for isolated word recognition. The model convolves the video frame sequence in space and time dimensions and optimizes the parameters respectively. Based on CELU activation function, the accuracy of sign language recognition is improved effectively. The validity of proposed algorithm is verified on CSL dataset..

ARTICLE INFO
Article History
Received 24 November, 2021
Accepted 18 September 2022

Keywords
Sign language recognition
(2+1)D convolution
3D convolution
CELU activation function

JRNAL9310

Download article (PDF)

Research Article
11.A Part-aware Attention Neural Network for Cross-view Geo-localization between UAV and Satellite
Duc Viet Bui, Masao Kubo, Hiroshi Sato
Department of Computer Science, National Defense Academy, 1-10-20 Hashirimizu, Yokosuka City, Kanagawa Prefecture, Japan
pp. 275–284
ABSTRACT
Cross-view image matching for geo-localization is the task of finding images containing the same geographic target across different platforms. This task has drawn significant attention among researchers due to its vast applications in UAV’s self-localization and navigation. Given a query image from UAV-view, a matching model can find the same geo-referenced satellite image from the database, which can be used later to precisely locate the UAV’s current position. Many studies have achieved high accuracy on existing datasets, but they can be further improved by combining different feature processing methods. Inspired by previous studies, in this paper, we proposed a new framework by using a channel-based attention mechanism combined with a part-based representation learning method, including multi-level feature aggregation and an alternative pooling strategy to enhance the feature extracting process. The proposed model significantly improved matching accuracy and surpassed the existing state-of-the-art methods on University-1652 dataset..

ARTICLE INFO
Article History
Received 29 June 2022
Accepted 20 September 2022

Keywords
Cross-view image matching
Geo-localization
UAV
Attention mechanism
Part-based representation learning

JRNAL9311

Download article (PDF)

Research Article
12.A Survey of Machine Vision Applications for Fruit Recognition
Tianyi Zhang1, Fengzhi Dai1,2
1College of Electronic Information and Automation, Tianjin University of Science and Technology, 300222,China
2Tianjin Tianke Intelligent and Manufacture Technology CO., LTD, China
pp. 285–288
ABSTRACT
Machine vision has been widely used in the field of fruit picking in recent years, and its main application directions include fruit identification, fruit quality detection, fruit maturity detection and grading, etc. Among them, fruit maturity detection technology is of great significance for improving the quality and market competitiveness of fresh and stored fruits. This paper focuses on the application of machine vision in fruit identification, fruit ripeness detection and grading in the past three years, and the application is more mature in many fruits such as citrus, blueberry, cherry, etc. They use some algorithms to accurately identify the fruit, process its image, and feed it back to control the robotic arm for picking and other operations.

ARTICLE INFO
Article History
Received 22 November 2021
Accepted 22 September 2022

Keywords
Machine vision
Image processing
Edge detection
Maturity inspection

JRNAL9312

Download article (PDF)

Research Article
13.Detecting Approaching Human Hands in a Human-Robot Coexistent Food Preparation Work Area for Preventing Collision
Joo Kooi Tan1, Takaaki Yotsumoto2, Yuta Ono2
1Faculty of Engineering, Kyushu Institute of Technology, Sensuicho 1-1, Tobata, Kitakyushu, Fukuoka 804-8550, Japan
2Graduate y of Engineering, Kyushu Institute of Technology, Sensuicho 1-1, Tobata, Kitakyushu, Fukuoka 804-8550, Japan
pp. 289–294
ABSTRACT
In Japan, the population of working age between 15 and 64 years old peaked in 1995 at about 87 million and is expected to continue to decline in the future. Therefore, to solve the labor shortage, the introduction of industrial robots that can perform the same level of work as humans is strongly requested especially in the food preparation industry. In order to prevent danger to workers there, industrial robots must recognize workers and avoid them when there is fear of collision. In this paper, we propose a method for extracting hand regions based on the color distribution of a hand and GrabCut in an experimental environment to recognize human hands and detect their directions of approach. The proposed method was examined experimentally and gave satisfactory results.

ARTICLE INFO
Article History
Received 26 November 2021
Accepted 24 September 2022

Keywords
Recognition
Hand area extraction
Lab color system
Grab cut

JRNAL9313

Download article (PDF)

Research Article
14.Smart Interactive Virtual Assistant System for Office Door Applications in the Situation of the COVID-19 Pandemic
Muhammad Zharif Aiman Alias, Wan Norsyafizan W. Muhamad, Nurain Izzati Shuhaimi, Darmawaty Mohd Ali, Azlina Idris
School of Electrical Engineering, College of Engineering, University Teknologi MARA, Malaysia
pp. 295–302
ABSTRACT
COVID-19 has now spread to every continent around the world. The virus is spread through the transmission of close contact with the infected person as well as by touching a surface that has been contaminated with the virus. Touchless switches must be utilized especially in office and home environments to reduce the spread of COVID-19. This paper presents the Smart Interactive Virtual Assistant for Smart Office Door Application. The proposed system uses voice recognition and artificial intelligence by applying the open-sourced API of Google Assistant to control the smart door contactless. The user can give the command to the system via voice to either open or close the door. This smart interactive voice assistant system uses Raspberry Pi as the brain or computer for the interface and Python is used as the software for running the coding script. The components used such as LED lights and DC motors are connected through the General-Purpose Input Output of Raspberry Pi and the relay module. One of the DC motors is used for controlling the lock and another one is used for controlling the door. Blue LED is used as a locked door notification while a green LED is used as an unlocked notification. A pair of microphones and speakers are also connected with the Raspberry Pi as input and output voice commands through a USB port and Bluetooth. With the smart interactive virtual assistant solution, office spaces will move towards a more touch-free control which could prevent the spread of COVID-19.

ARTICLE INFO
Article History
Received 19 November 2021
Accepted 26 September 2022

Keywords
Smart virtual assistant
Internet of things
Google assistant
Voice command and raspberry Pi

JRNAL9314

Download article (PDF)

Research Article
15.Data-Balancing Algorithm Based on Generative Adversarial Network for Robust Network Intrusion Detection
I-Hsien Liu, Cheng-En Hsieh, Wei-Min Lin, Jung-Shian Li, Chu-Fen Li1
Department of Electrical Engineering / Institute of Computer and Communication Engineering, National Cheng Kung University,
No.1, University Rd., East Dist., Tainan City 701401, Taiwan
1Department of Finance, National Formosa University, No.64, Wunhua Rd., Huwei Township, Yunlin County 632301, Taiwan
pp. 303–308
ABSTRACT
With the popularization and advancement of digital technology and network technology in recent years, cyber security has emerged as a critical concern. In order to defend against malicious attacks, intrusion detection systems (IDSs) increasingly employ machine learning models as a protection strategy. However, the effectiveness of such models is dependent on the algorithms and datasets used to train them. The present study uses five different supervised algorithms (Naïve Bayes, CNN, LSTM, BAT, and SVM) to implement the IDS machine learning model. A data-balancing algorithm based on a generative adversarial network (GAN) is proposed to mitigate the data imbalance problem in the IDS dataset. The proposed method, designated as GAN-BAL, is applied to the CICIDS 2017 dataset and is shown to improve both the recall rate and the accuracy of the trained IDS models.

ARTICLE INFO
Article History
Received 20 October 2021
Accepted 04 October 2022

Keywords
Anomaly traffic detection
Machine learning
IDS dataset
GAN
Performance analytics

JRNAL9315

Download article (PDF)