https://cyber.bibl.u-szeged.hu/index.php/actcybern/issue/feed Acta Cybernetica 2024-12-03T09:35:46+01:00 Boglárka G.-Tóth boglarka@inf.szte.hu Open Journal Systems <div id="main-content" class="region clearfix"> <div class="region region-content"> <div id="block-system-main" class="block block-system"> <div class="content"> <div id="node-30" class="node node-page clearfix"> <div class="content"> <div class="field field-name-body field-type-text-with-summary field-label-hidden"> <div class="field-items"> <div class="field-item even"> <p><img style="margin-left: 10px; margin-right: 10px; float: right; width: 203px; height: 291px;" src="https://www.inf.u-szeged.hu/sites/default/files/kutatas/actacover1802qh.png" alt=""></p> <p>A scientific journal published by the <a href="https://www.inf.u-szeged.hu" target="_blank" rel="noopener">Institute of Informatics</a>, <a href="https://www.u-szeged.hu/english/" target="_blank" rel="noopener">University of Szeged</a>, <a href="https://www.szeged.hu/" target="_blank" rel="noopener">Szeged</a>, <a href="https://www.fsz.bme.hu/hungary/homepage.html" target="_blank" rel="noopener">Hungary</a>.</p> <p>Acta Cybernetica is abstracted by <a href="https://www.ams.org/publications/math-reviews/math-reviews" target="_blank" rel="noopener">Mathematical Reviews</a>, <a href="https://computingreviews.com/" target="_blank" rel="noopener">Computing Reviews</a>, <a href="https://zbmath.org/" target="_blank" rel="noopener">Zentralblatt für Mathematik</a>&nbsp;and <a href="https://dl.acm.org/journal/accy" target="_blank" rel="noopener">ACM Digital Library</a></p> <p>&nbsp;&nbsp; <a href="https://www.scimagojr.com/journalsearch.php?q=13024&amp;tip=sid&amp;clean=0"><img style="margin-left: 10px; margin-right: 10px; float: right; width: 135px; height: 135px;" src="/public/site/images/boglarka/esci-button.png"></a> &nbsp;&nbsp;</p> <p>It is also indexed by <a href="https://www.scopus.com/sourceid/13024" target="_blank" rel="noopener">Scopus</a>,&nbsp;<a href="https://dblp.uni-trier.de/db/journals/actaC/index.html" target="_blank" rel="noopener">DBLP</a>, EBSCO and Emerging Sources Citation Index (ESCI).</p> <p><strong>We are not accepting any new proposals for Special Issues.</strong> The Special Issues for the next few years are already filled.</p> <p>&nbsp;</p> <p><a title="SCImago Journal &amp; Country Rank" href="https://www.scimagojr.com/journalsearch.php?q=13024&amp;tip=sid&amp;exact=no"><img style="margin-left: 10px; margin-right: 10px; float: right; width: 201px; height: 201px;" src="https://www.scimagojr.com/journal_img.php?id=13024" alt=""></a></p> </div> </div> </div> </div> </div> </div> </div> </div> </div> https://cyber.bibl.u-szeged.hu/index.php/actcybern/article/view/4555 Preface + In memoriam of Nicolas Delanoue 2024-11-26T13:27:43+01:00 Luc Jaulin lucjaulin@gmail.com Sébastien Lahaye sebastien.lahaye@univ-angers.fr Andreas Rauh andreas.rauh@uni-oldenburg.de Steffen Schön schoen@ife.uni-hannover.de <p>The Summer Workshop on Interval Methods (SWIM) is an annual scientific meeting initiated in 2008 with a special focus on promoting interval analysis techniques and their applications to a broader community of researchers. Since 2008, SWIM has become a multi-disciplinary keystone event for researchers dealing with various aspects of interval and set-based methods.</p> 2024-11-21T00:00:00+01:00 Copyright (c) https://cyber.bibl.u-szeged.hu/index.php/actcybern/article/view/4359 A Constraint Programming Approach for Polytopic Simulation of Ordinary Differential Equations 2024-12-03T09:35:46+01:00 Julien Alexandre dit Sandretto julien.alexandre-dit-sandretto@ensta-paris.fr Alexandre Chapoutot alexandre.chapoutot@ensta-paris.fr Christophe Garion christophe.garion@isae-supaero.fr Xavier Thirioux xavier.thirioux@isae-supaero.fr <p>This paper presents a constraint-based approach to compute the reachable tube of nonlinear differentiable equations. A set of initial values for the equations is considered and defined by a polytope represented as intersections of zonotopes. Guaranteed numerical integration based on zonotopic computation is used to compute reachable tubes. In order to efficiently build polytopes defined by the intersection of several zonotopes, we use a previously developed abstract domain to represent reachable tubes. The proposed contribution allows to compute more expressive reachable tubes more efficiently than methods based only on boxes, and therefore could improve verification/validation processes in robotics application for example. The approach is evaluated on examples taken from literature and we present two applications of this work.</p> 2024-04-01T00:00:00+02:00 Copyright (c) 2024 Acta Cybernetica https://cyber.bibl.u-szeged.hu/index.php/actcybern/article/view/4367 Verified Bit and Power Allocation for MIMO Systems: A Comparison of SVD Based Techniques With GMD 2024-11-26T13:27:45+01:00 Ekaterina Auer ekaterina.auer@hs-wismar.de Andreas Ahrens andreas.ahrens@hs-wismar.de <p>Methods with result verification have been applied in different practical contexts, for example, in such diverse areas as robotics, computer graphics, or chemistry. Such methods help to verify the result of a computer simulation, additionally taking into account possibly present bounded uncertainty in a deterministic way. Modeling and simulation of multiple-input multiple-output (MIMO) systems has not received much attention from this angle. Nowadays, increasing the capacity of communication links by using the MIMO mechanism is an essential part of various wireless communication standards.</p> <p>In this paper, we consider the channel separation stage in the overall modeling and simulation process for MIMO systems and compare the singular value decomposition (SVD) and the geometric mean decomposition (GMD) based approaches from the point of view of the achievable bit error ratio (BER) under good and poor scattering conditions. As a special focus, we use interval methods to verify the result and to deal with the appearing epistemic uncertainty. Additionally, we consider resource allocation in detail, which mostly makes sense only for the SVD approach since the goal of the GMD based one is to avoid it. However, this has been studied only asymptotically until now and needs confirmation. We propose a combined analytical-numerical approach to simulate resource allocation relying on verified techniques. The theoretical results are illustrated and the comparison is performed using simulated data for an uncorrelated and a correlated MIMO system with four receiving and four transmitting antennas.</p> 2024-03-21T00:00:00+01:00 Copyright (c) https://cyber.bibl.u-szeged.hu/index.php/actcybern/article/view/4368 Robust Control and Actuator Fault Detection Based on an Iterative LMI Approach: Application on a Quadrotor 2024-11-26T13:27:45+01:00 Oussama Benzinane oussama.benzinane@uni-oldenburg.de Andreas Rauh andreas.rauh@uni-oldenburg.de <p>Linear Matrix Inequalities (LMIs) have recently gained momentum due to the increasing performance of computing hardware. Many current research activities rely on the advantages of this growth in order to design controllers with provable stability and performance guarantees. To guarantee robustness despite actuator faults, model uncertainty, nonlinearities, and measurement noise, a novel iterative LMI approach is presented to design an observer-based state feedback controller allowing for simultaneous optimization of the control and observer gains. A comparison with a combination of an Extended Kalman Filter (EKF) and a Linear-Quadratic Regulator (LQR) has been conducted, inherently providing guaranteed stability for the closed loop only when the separation principle holds, which is not the case in this study. Both approaches are applied on a quadrotor, where reliable detection and compensation of the faults in the presence of measurement noise is demonstrated.</p> 2024-03-21T00:00:00+01:00 Copyright (c) https://cyber.bibl.u-szeged.hu/index.php/actcybern/article/view/4360 A New Interval Arithmetic to Generate the Complementary of Contractors 2024-11-26T13:27:46+01:00 Pierre Filiol pierre.filiol@netc.fr Theotime Bollengier theotime.bollengier@ensta-bretagne.org Luc Jaulin lucjaulin@gmail.com Jean Christophe Le Lann jean-christophe.le_lann@ensta-bretagne.fr <p>Contractor algebra is used to characterize a set defined as a composition of sets defined by inequalities. It mainly uses interval methods combined with constraint propagation. This algebra includes the classical operations we have for sets such as the intersection, the union and the inversion. Now, it does not include the complement operator. The reason for this is probably related to the interval arithmetic itself. In this paper, we show that if we change the arithmetic used for intervals adding a single flag, similar to not a number, we are able to include easily the complement in the algebra of contractors.</p> 2024-03-21T00:00:00+01:00 Copyright (c) https://cyber.bibl.u-szeged.hu/index.php/actcybern/article/view/4377 Exponential State Enclosure Techniques for the Implementation of Validated Model Predictive Control 2024-11-26T13:27:46+01:00 Mohamed Fnadi mohamed.fnadi@univ-littoral.fr Andreas Rauh andreas.rauh@uni-oldenburg.de <p>The design task of predictive controllers for uncertain systems is commonly formulated on the basis of their kinematic and/or dynamic models. These models are assumed to be expressed as initial value problems (IVPs) for finite-dimensional sets of nonlinear ordinary differential equations (ODEs). If constraints for the admissible state trajectories are formulated, bounds for these trajectories need to be computed by numerical procedures to obtain guaranteed enclosures of all possible states at each time step that contain the solution of the exact IVP-ODEs. Uncertainties in both the initial states and system parameters are considered in this paper by means of bounded interval variables. For this kind of system representation, we apply an exponential enclosure approach to determine guaranteed enclosures of all reachable states. This approach is embedded in a novel manner into the framework of a guaranteed nonlinear model predictive control (NMPC) to acquire optimal and safe control domains along a receding horizon. The NMPC problem is solved at each time step considering several constraints which are crucial for the system's safety and stability, namely, bounds on the state trajectories and the control signals. The capabilities of the combination of the exponential enclosure technique with the set-based NMPC strategy are illustrated through simulations using a nonlinear inverted pendulum.</p> 2024-03-20T00:00:00+01:00 Copyright (c) https://cyber.bibl.u-szeged.hu/index.php/actcybern/article/view/4365 Set-Valued Approach for the Online Identification of the Open-Circuit Voltage of Lithium-Ion Batteries 2024-11-26T13:27:47+01:00 Marit Lahme marit.lahme@uni-oldenburg.de Andreas Rauh andreas.rauh@uni-oldenburg.de <p>To describe the dynamic behavior of lithium-ion batteries using the terminal current and the terminal voltage as input and output of the battery, equivalent circuit models are used, which comprise series resistances, RC sub-networks and a state of charge dependent voltage source. The parameters of the battery model are influenced by aging effects as well as other factors such as the state of charge and the cell temperature. Although those variations can be estimated with the help of an augmented state vector, the typically applied approaches do not allow for a direct identification of nonlinear dependencies of circuit elements on the state of charge or other influence factors. Therefore, a two-stage identification routine for identifying those nonlinear dependencies using an interval observer and an interval contraction scheme is proposed in this paper. The identification routine was successfully applied to identify the open-circuit voltage characteristic of a lithium-ion battery. Numerical simulations are used to evaluate the identification quality of the identification routine.</p> 2024-03-20T00:00:00+01:00 Copyright (c) https://cyber.bibl.u-szeged.hu/index.php/actcybern/article/view/4388 The Codac Library 2024-11-26T13:27:47+01:00 Simon Rohou simon.rohou@ensta-bretagne.fr Benoît Desrochers benoit.desrochers@ensta-bretagne.org Fabrice Le Bars fabrice.le_bars@ensta-bretagne.fr <p>Codac (Catalog Of Domains And Contractors) is a C++/Python library providing tools for constraint programming over reals, trajectories and sets. It has many applications in parameter estimation, guaranteed integration or robot localization and provides reliable outputs by computing sets of feasible solutions according to the constraints defining the problem. This paper provides a brief overview of the library and its Contractor Network approach, illustrated on a convincing robotic application.</p> 2024-03-21T00:00:00+01:00 Copyright (c) https://cyber.bibl.u-szeged.hu/index.php/actcybern/article/view/4444 RISC-V Based Hardware Acceleration of Interval Contractor Primitives in the Context of Mobile Robotics 2024-11-26T13:27:47+01:00 Pierre Filiol pierre.filiol@netc.fr Theotime Bollengier theotime.bollengier@ensta-bretagne.org Luc Jaulin lucjaulin@gmail.com Jean-Christophe Le Lann jean-christophe.le_lann@ensta-bretagne.fr <p>Localization tasks, generally modeled as Constraint Satisfaction Problem (CSP), are recurring problems in mobile robotics. Known approaches rely on software libraries which all have their advantages but also their limitations, among which non-optimal computing performances. This paper proposes a different approach which consists in extending the RISC-V ISA to provide hardware support for interval primitives.</p> 2024-10-24T00:00:00+02:00 Copyright (c) https://cyber.bibl.u-szeged.hu/index.php/actcybern/article/view/4446 GPU-Accelerated, Interval-Based Parameter Identification Methods Illustrated Using the Two-Compartment Problem 2024-11-26T13:27:48+01:00 Lorenz Gillner lorenz.gillner@hs-wismar.de Ekaterina Auer ekaterina.auer@hs-wismar.de <p>Interval methods are helpful in the context of scientific computing for reliable treatment of problems with bounded uncertainty. Most traditional interval algorithms, however, were designed for sequential execution while internally depending on processor-specific instructions for directed rounding. Nowadays, many-core processors and dedicated hardware for massively parallel data processing have become the de facto standard for high-performance computers. Interval libraries have yet to adapt to this heterogeneous computing paradigm. In this article, we investigate the parallelization of interval methods with an emphasis on modern graphics processors. Using a parameter identification scenario in combination with newly developed or enhanced GPU-based interval software, we evaluate different methods for reducing the size of large interval search domains. For the first time, algorithmic differentiation can be used with intervals on the GPU. Different versions of interval optimization algorithms are compared wrt. their functionality, run times, and energy consumption.</p> 2024-10-24T00:00:00+02:00 Copyright (c) https://cyber.bibl.u-szeged.hu/index.php/actcybern/article/view/4438 Asymptotically Minimal Contractors Based on the Centered Form 2024-11-26T13:27:48+01:00 Luc Jaulin lucjaulin@gmail.com <p>This paper proposes a new interval-based contractor for nonlinear equations which is minimal when dealing with narrow boxes. The method is based on the centered form classically used by interval algorithms combined with a Gauss Jordan band diagonalization preconditioning. As an illustration in stability analysis, we propose to compute the set of all parameters of a characteristic function of linear time-delayed equations which have at least one zero in the imaginary axis. Our approach is able compute a guaranteed and accurate enclosure of the solution set faster than existing approaches.</p> 2024-10-24T00:00:00+02:00 Copyright (c)