This paper presents a novel car racing controller for TORCS (The Open Racing Car Simulator), which is based in the combination of two fuzzy subcontrollers, one for setting the speed, and one to control the steer angle. The obtained results are quite promissing, as the controller is quite competitive even against very tough TORCS teams.
The abstract of the paper is:
“When driving a car it is essential to take into account all possible factors; even more so when, like in the TORCS simulated race game, the objective is not only to avoid collisions, but also to win the race within a limited budget. In this paper, we present the design of an autonomous driver for racing car in a simulated race. Unlike previous controllers, that only used fuzzy logic approaches for either acceleration or steering, the proposed driver uses simultaneously two fuzzy controllers for steering and computing the target speed of the car at every moment of the race. They use the track border sensors as inputs and besides, for enhanced safety, it has also taken into account the relative position of the other competitors. The proposed fuzzy driver is evaluated in practise and timed races giving good results across a wide variety of racing tracks, mainly those that have many turning points.”
During this week, Geneura Team has welcomed Professor Ja’far Alqatawna from the University of Jordan. Ja’far Alqatawna is an Associate Professor at King Abdullah II School for Information Technology, University of Jordan. He received his B.Eng degree in Computer Engineering from Mu’tah University, Jordan, followed by MSc. in Information and Communication Systems Security from The Royal Institute of Technology (KTH), Sweden. In 2010 He has been awarded his Ph.D. Degree in Computer Information Systems with specialisation in Information Security and e-Business from Sheffield Hallam University, UK. He was part of researching projects for investigating XACML as a policy language for distributed networks at Security, Policy and Trust Lab (SPOT) of the Swedish Institute of Computer Science (SICS), Sweden. His current research interests are in the field of Cybersecurity in which he tries to look for multi-dimensional approaches that go beyond the technical dimension in order to develop trustworthy Cyberspace. Yesterday he presented a talk about the use of Data Mining for improving the security of the software systems which you can see in slide share, http://es.slideshare.net/MaribelGarcaArenas/data-mining-in-security-jafar-alqatawna. For this time, he presented and discussed several security areas in which data mining has the possibility of enhancing the existing security methods.
El jueves 26 de noviembre de 2015 celebramos en la Sala de Usos Múltiples del CITIC-UGR (C/ Periodista Rafael Gómez, nº 2) la Jornada sobre Smart Cities y Movilidad, enmarcada en el Programa De Ayudas Genil Para Realización De Actividades Por Grupos De Investigación Interdiciplinares (RAGII-2015).
El objeto de esta Jornada fue la investigación en el área de la gestión de la movilidad, internet de las cosas y smart cities.
A lo largo de la mañana asistimos a varias conferencias, impartidas por responsables del Area de Movilidad del Ayuntamiento de Granada, de varias empresas, así como por parte de investigadores de la Universidad de Granada en este ámbito.
Los objetivos finales fueron crear sinergia entre los diversos grupos de investigación y empresas de este área, así como facilitar el contacto de cara a promover colaboraciones, tales como solicitar proyectos, o realizar transferencia de conocimiento a partir de los resultados de investigación.
El desarrollo de la Jornada se basó en presentaciones de unos 40 minutos, en las que el ponente, por parte del Área de Movilidad del Ayuntamiento de Granada, Nazaríes, UXMobile, Geokeda, e investigadores de los grupos de investigación, comentaron los proyectos en los que trabajan actualmente en el área de las smart cities, así como las problemáticas, y los retos a los que se enfrentan.
UGR was one of the partners participating in this project. More concretely, GeNeura’s members have contributed by leading WP2 – MUSES framework definition and integration during the completion of tasks to define the MUSES System Architecture. In addition, GeNeura’s research has been applied to the project in WP5 – Self-adaptive event correlation, lead by a Spanish security company S2 Grupo. The main purpose of this WP was to develop a system which, on the one side, uses event correlation to detect Security Policy violations and, on the other side, performs an analysis of all the data in the system and creates new Security Policies or enhances the existing ones. Different types of classification, rule association, and clustering algorithms, as well as Data Mining techniques, have been applied with satisfactory results. These results were specially welcomed by the comission, ponting that such a system will be very helpful to enhance security. Also, MUSES is an Open Software project, and you can contribute at https://github.com/MusesProject
The results were presented by S2 Grupo and GeNeura together. The slides are now published on Slideshare:
It has been a pleasure for GeNeura to work in MUSES
Our work titled Going a Step Beyond the Black and White Lists for URL Accesses in the Enterprise by means of Categorical Classifiers, as part of the researh under the MUSES project, has been presented today at the ECTA 2014 conference.
Corporate systems can be secured using an enormous quantity of methods, and the implementation of Black or White lists is among them.
With these lists it is possible to restrict (or to allow) the users the execution of applications or the access to certain URLs, among others. This paper is focused on the latter option. It describes the whole processing of a set of data composed by URL sessions performed by the employees of a company; from the preprocessing stage, including labelling and data balancing processes, to the application of several classification algorithms. The aim is to define a method for automatically make a decision of allowing or denying future URL requests, considering a set of corporate security policies.
Thus, this work goes a step beyond the usual black and white lists, since they can only control those URLs that are specifically included in them, but not by making decisions based in similarity (through classification techniques), or even in other variables of the session, as it is proposed here.
The results show a set of classification methods which get very good classification percentages (95-97%), and which infer some useful rules based in additional features (rather that just the URL string) related to the user’s access. This led us to consider that this kind of tool would be very useful tool for an enterprise.
After the bad experience of spending money in clusters and grids and then spending more time doing maintenance, hack-proofing and installing stuff than science, maybe it is the time to rethink how massive distributed evolutionary computation should be done. Nowadays there are lots of free or use-based resources that can be tapped for doing volunteer-based evolutionary algorithms. That is way my last keynote and tutorial have dealt with that: the IDC Keynote, Low or No Cost Evolutionary computation, which you can access here in Heroku, puts the money where its mouth is: talking and doing volunteer-based evolutionary computing at the same time. The PPSN tutorial, Low or no cost distributed evolutionary computation, touched on the same topic, only longer and with more enphasis on tools.
During 1 month, papers accepted at GECCO1’4 will be freely available. Thus, you can get and read our papers:
“Enforcing corporate security policies via computational intelligence techniques” by Antonio M. Mora, Paloma De las Cuevas, Juan Julián Merelo, Sergio Zamarripa, Anna I. Esparcia-Alcázar (doi: 10.1145/2598394.2605438) at http://goo.gl/33gWES
“A methodology for designing emergent literary backstories on non-player characters using genetic algorithms”, by Rubén Héctor García-Ortega, Pablo García-Sánchez, Antonio Miguel Mora, Juan Julián Merelo (doi: 10.1145/2598394.2598482) at http://goo.gl/9CEcMc