Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Milos Manic is active.

Publication


Featured researches published by Milos Manic.


winter simulation conference | 2006

CIMS: a framework for infrastructure interdependency modeling and analysis

Donald D. Dudenhoeffer; May R. Permann; Milos Manic

Todays society relies greatly upon an array of complex national and international infrastructure networks, such as transportation, utilities, telecommunication, and even financial networks. While modeling and simulation tools have provided insight into the behavior of individual infrastructure networks, a far less understood area is that of the interrelationships among multiple infrastructure networks including the potential cascading effects that may result due to these interdependencies. This paper first describes infrastructure interdependencies, as well as presenting a formalization of interdependency types. Next the paper describes a modeling and simulation framework called CIMScopy and the work that is being conducted at the Idaho National Laboratory (INL) to model and simulate infrastructure interdependencies and the complex behaviors that can result


international symposium on neural networks | 2009

Neural Network based Intrusion Detection System for critical infrastructures

Ondrej Linda; Todd Vollmer; Milos Manic

Resiliency and security in control systems such as SCADA and Nuclear plants in todays world of hackers and malware are a relevant concern. Computer systems used within critical infrastructures to control physical functions are not immune to the threat of cyber attacks and may be potentially vulnerable. Tailoring an intrusion detection system to the specifics of critical infrastructures can significantly improve the security of such systems. The IDS-NNM - Intrusion Detection System using Neural Network based Modeling, is presented in this paper. The main contributions of this work are: 1) the use and analyses of real network data (data recorded from an existing critical infrastructure); 2) the development of a specific window based feature extraction technique; 3) the construction of training dataset using randomly generated intrusion vectors; 4) the use of a combination of two neural network learning algorithms - the Error-Back Propagation and Levenberg-Marquardt, for normal behavior modeling. The presented algorithm was evaluated on previously unseen network data. The IDS-NNM algorithm proved to be capable of capturing all intrusion attempts presented in the network communication while not generating any false alerts.


IEEE Transactions on Industrial Informatics | 2011

Uncertainty-Robust Design of Interval Type-2 Fuzzy Logic Controller for Delta Parallel Robot

Ondrej Linda; Milos Manic

Type-2 Fuzzy Logic Controllers (T2 FLCs) have been recently applied in many engineering areas. While understanding the control potentials of T2 FLCs can still be considered an open question researchers, commonly claim superiority of T2 FLCs based on a limited exploration of the space of design parameters. The contribution of this work is based on a problem-driven design of uncertainty-robust Interval T2 (IT2) FLCs. The presented methodology starts with a baseline optimized T1 FLC. Next, a group of IT2 FLCs is designed using partially dependent approach by symmetrically blurring the membership functions around the original T1 fuzzy sets. This constrained design space allows for its systematic exploration and analysis. The performance of the designed controllers was evaluated on delta parallel robot hardware under two kinds of commonly encountered uncertainties: i) sensory noise and ii) uncertain system parameters. The experimental results showed that IT2 FLCs provide improved control performance against T1 FLCs when appropriate design of IT2 fuzzy sets is performed. In addition, it was demonstrated that excessive amount of “type-2 fuzziness” in the IT2 FLC design leads to rapid performance degradation.


IEEE Transactions on Fuzzy Systems | 2012

General Type-2 Fuzzy C-Means Algorithm for Uncertain Fuzzy Clustering

Ondrej Linda; Milos Manic

Pattern recognition in real-world data is subject to various sources of uncertainty that should be appropriately managed. The focus of this paper is the management of uncertainty associated with parameters of fuzzy clustering algorithms. Type-2 fuzzy sets (T2 FSs) have received increased research interest over the past decade, primarily due to their potential to model various uncertainties. However, because of the computational intensity of the processing of general T2 fuzzy sets (GT2 FSs), only their constrained version, i.e., the interval T2 (IT2) FSs, were typically used. Fortunately, the recently introduced concepts of α-planes and zSlices allow for efficient representation and computation with GT2 FSs. Following this recent development, this paper presents a novel approach for uncertain fuzzy clustering using the general type-2 fuzzy C-means (GT2 FCM) algorithm. The proposed method builds on top of the previously published IT2 FCM algorithm, which is extended via the α- planes representation theorem. The fuzzifier parameter of the FCM algorithm can be expressed using linguistic terms such as “small” or “high,” which are modeled as T1 FSs. This linguistic fuzzifier value is then used to construct the GT2 FCM cluster membership functions. The linguistic uncertainty is transformed into uncertain fuzzy positions of the extracted clusters. The GT2 FCM algorithm was found to balance the performance of T1 FCM algorithms in various uncertain pattern recognition tasks and to provide increased robustness in situations where noisy or insufficient training data are present.


Information Sciences | 2011

Interval Type-2 fuzzy voter design for fault tolerant systems

Ondrej Linda; Milos Manic

A voting scheme constitutes an essential component of many fault tolerant systems. Two types of voters are commonly used in applications of real-valued systems: the inexact majority and the amalgamating voters. The inexact majority voter effectively isolates erroneous modules and is capable of reporting benign outputs when a significant disagreement is detected. However, an application specific voter threshold must be provided. On the other hand, amalgamating voter, such as the weighted average voter, reduces the influence of faulty modules by averaging the input values together. Unlike the majority voters, amalgamating voters are not capable of producing benign outputs. In the past, a Type-1 (T1) fuzzy voting scheme was introduced, allowing for both smooth amalgamation of voter inputs and effective signalization of benign outputs. The presented paper proposes an extension to the fuzzy voting scheme via incorporating Interval Type-2 (IT2) fuzzy logic. The IT2 fuzzy logic allows for an improved handling of uncertain assumptions about the distributions of noisy and erroneous inputs which are essential for correct design of the fuzzy voting scheme. The proposed voter design features robust performance when the uncertainty assumptions dynamically change over time. The IT2 fuzzy voter architecture was compared against the average voter, inexact majority voter, and the T1 fuzzy voter using a refined experimental harness. The reported results demonstrate improved availability, safety and reliability of the presented IT2 fuzzy voting scheme.


conference on human system interactions | 2009

Multi-robot, multi-target Particle Swarm Optimization search in noisy wireless environments

Kurt W. Derr; Milos Manic

Multiple small robots (swarms) can work together using Particle Swarm Optimization (PSO) to perform tasks that are difficult or impossible for a single robot to accomplish. The problem considered in this paper is exploration of an unknown environment with the goal of finding a target(s) at an unknown location(s) using multiple small mobile robots. This work demonstrates the use of a distributed PSO algorithm with a novel adaptive RSS weighting factor to guide robots for locating target(s) in high risk environments. The approach was developed and analyzed on multiple robot single and multiple target search. The approach was further enhanced by the multi-robot-multi-target search in noisy environments. The experimental results demonstrated how the availability of radio frequency signal can significantly affect robot search time to reach a target.


IEEE Transactions on Industrial Electronics | 2011

Self-Organizing Fuzzy Haptic Teleoperation of Mobile Robot Using Sparse Sonar Data

Ondrej Linda; Milos Manic

Mobile robot teleoperation has been used in many areas of industrial automation, such as explosives disposal, nuclear waste manipulation, freight handling, or transportation. Here, the commonly provided audio-visual feedback often resulted in an inadequate perception of the remote environment. Haptic augmentation was shown to improve and positively enhance the control of the mobile robot. This paper presents novel self-organizing fuzzy adaptive mapping algorithm (SOFAMap) for a haptic teleoperation of mobile robots. The SOFAMap algorithm was specifically developed for a mobile robot with a rotational sonar sensory system, constituting an alternative to a traditionally used multisonar array. The main contributions of this paper are the following: 1) development of a specific self-organizing environment mapping structure inspired by the growing neural gas algorithm; 2) incorporating a fuzzy controller into the algorithm to adapt to robots motion; and 3) resolving typical issues such as sensor noise, communication time delay, and low sampling rate. The experimental testing was performed in both virtual environment and on a real robotic platform, consisting of a Lego NXT mobile robot and a Novint Falcon 3-DOF haptic interface. The results showed that a high-fidelity haptic feedback can be successfully generated using a simpler and more affordable rotational sonar sensory system, as opposed to the typical multisonar array. Furthermore, it was demonstrated that the SOFAMap algorithm improves the operators awareness of unstructured environments, making it applicable to wide range of mobile robot teleoperation systems.


IEEE Transactions on Industrial Informatics | 2014

Mining Building Energy Management System Data Using Fuzzy Anomaly Detection and Linguistic Descriptions

Dumidu Wijayasekara; Ondrej Linda; Milos Manic; Craig Rieger

Building Energy Management Systems (BEMSs) are essential components of modern buildings that are responsible for minimizing energy consumption while maintaining occupant comfort. However, since indoor environment is dependent on many uncertain criteria, performance of BEMS can be suboptimal at times. Unfortunately, complexity of BEMSs, large amount of data, and interrelations between data can make identifying these suboptimal behaviors difficult. This paper proposes a novel Fuzzy Anomaly Detection and Linguistic Description (Fuzzy-ADLD)-based method for improving the understandability of BEMS behavior for improved state-awareness. The presented method is composed of two main parts: 1) detection of anomalous BEMS behavior; and 2) linguistic representation of BEMS behavior. The first part utilizes modified nearest neighbor clustering algorithm and fuzzy logic rule extraction technique to build a model of normal BEMS behavior. The second part of the presented method computes the most relevant linguistic description of the identified anomalies. The presented Fuzzy-ADLD method was applied to real-world BEMS system and compared against a traditional alarm-based BEMS. Six different scenarios were tested, and the presented Fuzzy-ADLD method identified anomalous behavior either as fast as or faster (an hour or more) than the alarm based BEMS. Furthermore, the Fuzzy-ADLD method identified cases that were missed by the alarm-based system, thus demonstrating potential for increased state-awareness of abnormal building behavior.


IEEE Transactions on Industrial Electronics | 2011

Fuzzy Force-Feedback Augmentation for Manual Control of Multirobot System

Ondrej Linda; Milos Manic

Multirobot systems represent an enticing area of research with numerous real-world applications. Teams of multiple robots can achieve tasks that are more difficult or even impossible for a single robot, e.g., environment exploration, search and rescue, or surveillance operations. In a previous work, the authors developed a system for the single-operator manual control of a multirobot system. However, such teleoperation systems commonly suffer from inadequate perception of the remote environment. This paper extends the previously presented work by adding a fuzzy force-feedback (FFF) augmentation for the manual control of a multirobot system. The FFF augmentation delivers additional information to the operator. Moreover, it guides the operator toward the smooth control of the robotic group. The force feedback was generated by a system of fuzzy controllers monitoring the state of the multirobot group. The performance of the system was evaluated in a virtual environment, and the recorded forces were explored in various scenarios. The force-feedback augmentation demonstrated the following improvements: 1) operators increased obstacle awareness and 2) improved maneuvering performance.


conference on industrial electronics and applications | 2008

Wireless based object tracking based on neural networks

Kurt W. Derr; Milos Manic

Location based services (LBS), context aware applications, and people and object tracking depend on the ability to locate mobile devices, also known as localization, in the wireless landscape. Localization enables a diverse set of applications that include, but are not limited to, vehicle guidance in an industrial environment, security monitoring, self-guided tours, personalized communications services, resource tracking, mobile commerce services, guiding emergency workers during fire emergencies, habitat monitoring, environmental surveillance, and receiving alerts. This paper presents a new neural network approach (LENSR) based on a competitive topological counter propagation network (CPN) with k-nearest neighborhood vector mapping, for indoor location estimation based on received signal strength. The advantage of this approach is both speed and accuracy. The tested accuracy of the algorithm was 90.6% within 1 meter and 96.4% within 1.5 meters. Several approaches for location estimation using WLAN technology were reviewed for comparison of results.

Collaboration


Dive into the Milos Manic's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Kasun Amarasinghe

Virginia Commonwealth University

View shared research outputs
Top Co-Authors

Avatar

Radu Balan

Technical University of Cluj-Napoca

View shared research outputs
Top Co-Authors

Avatar

Sergiu-Dan Stan

Technical University of Cluj-Napoca

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Kurt W. Derr

Idaho National Laboratory

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Craig Rieger

Idaho National Laboratory

View shared research outputs
Top Co-Authors

Avatar

Todd Vollmer

Idaho National Laboratory

View shared research outputs
Researchain Logo
Decentralizing Knowledge