首页 > 最新文献

2016 IEEE 15th International Conference on Cognitive Informatics & Cognitive Computing (ICCI*CC)最新文献

英文 中文
Autonomous robot controller using bitwise gibbs sampling 采用位吉布斯采样的自主机器人控制器
Rémi Canillas, R. Laurent, M. Faix, D. Vaufreydaz, E. Mazer
In the present paper we describe a bio-inspired non von Neumann controller for a simple sensorimotor robotic system. This controller uses a bitwise version of the Gibbs sampling algorithm to select commands so the robot can adapt its course of action and avoid perceived obstacles in the environment. The VHDL specification of the circuit implementation of this controller is based on stochastic computation to perform Bayesian inference at a low energy cost. We show that the proposed unconventional architecture allows to successfully carry out the obstacle avoidance task and to address scalability issues observed in previous works.
在本文中,我们描述了一个简单的感觉运动机器人系统的仿生非冯诺伊曼控制器。这个控制器使用吉布斯采样算法的位版本来选择命令,这样机器人就可以适应它的行动过程,避开环境中的感知障碍。该控制器电路实现的VHDL规范基于随机计算,以低能耗进行贝叶斯推理。我们表明,所提出的非常规架构允许成功地执行避障任务,并解决在以前的工作中观察到的可扩展性问题。
{"title":"Autonomous robot controller using bitwise gibbs sampling","authors":"Rémi Canillas, R. Laurent, M. Faix, D. Vaufreydaz, E. Mazer","doi":"10.1109/ICCI-CC.2016.7862096","DOIUrl":"https://doi.org/10.1109/ICCI-CC.2016.7862096","url":null,"abstract":"In the present paper we describe a bio-inspired non von Neumann controller for a simple sensorimotor robotic system. This controller uses a bitwise version of the Gibbs sampling algorithm to select commands so the robot can adapt its course of action and avoid perceived obstacles in the environment. The VHDL specification of the circuit implementation of this controller is based on stochastic computation to perform Bayesian inference at a low energy cost. We show that the proposed unconventional architecture allows to successfully carry out the obstacle avoidance task and to address scalability issues observed in previous works.","PeriodicalId":135701,"journal":{"name":"2016 IEEE 15th International Conference on Cognitive Informatics & Cognitive Computing (ICCI*CC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113994375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Persuasive communication from a military force to local civilians: A PsyOps system based on the Elaboration Likelihood Model 从军队到当地平民的说服性沟通:基于精化可能性模型的心理战系统
Jean-Yves Bergier, Colette Faucher
Here is presented a model of message processing using one of the leading paradigms in social psychology of persuasion as main theoretical framework: the Elaboration Likelihood Model (ELM). Adapting this dual process theory to military context and actions and more specifically psychological operations allows developing a model taking into account many message characteristics as well as specific factors such as local culture of the audience. It focuses on measuring capacity and motivation of the agents to determine the effect of message sending on attitudes through a detailed cognitive treatment.
本文提出了一个以说服社会心理学的主要范式之一——精化似然模型(ELM)为主要理论框架的信息加工模型。将这种双重过程理论应用于军事背景和行动,更具体地说是心理操作,可以开发一个考虑到许多信息特征以及特定因素(如受众的当地文化)的模型。它侧重于通过详细的认知处理来测量代理的能力和动机,以确定信息发送对态度的影响。
{"title":"Persuasive communication from a military force to local civilians: A PsyOps system based on the Elaboration Likelihood Model","authors":"Jean-Yves Bergier, Colette Faucher","doi":"10.1109/ICCI-CC.2016.7862029","DOIUrl":"https://doi.org/10.1109/ICCI-CC.2016.7862029","url":null,"abstract":"Here is presented a model of message processing using one of the leading paradigms in social psychology of persuasion as main theoretical framework: the Elaboration Likelihood Model (ELM). Adapting this dual process theory to military context and actions and more specifically psychological operations allows developing a model taking into account many message characteristics as well as specific factors such as local culture of the audience. It focuses on measuring capacity and motivation of the agents to determine the effect of message sending on attitudes through a detailed cognitive treatment.","PeriodicalId":135701,"journal":{"name":"2016 IEEE 15th International Conference on Cognitive Informatics & Cognitive Computing (ICCI*CC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115157843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Fractal based adaptive boosting algorithm for cognitive detection of computer malware 基于分形的计算机恶意软件认知检测自适应增强算法
Muhammad Salman Khan, S. Siddiqui, R. McLeod, K. Ferens, W. Kinsner
Host Based Intrusion Detection Systems (HIDS) are gaining traction in discovering malicious software inside a host operating system. In this paper, the authors have developed a new cognitive host based anomaly detection system based on supervised AdaBoost machine learning algorithm. Particularly, information fractal dimension based approach is incorporated in the original AdaBoost machine learning algorithm to assign higher weight to the classifier that estimates wrong hypothesis. An agent based host sensor is developed that continuously gathers and extracts network profile of all the host processes and the modules spawned by each process of a Microsoft Windows 7 operating system. The main contributions of this paper are that a malware testing sandbox is developed using Microsoft native APIs and an information fractal (cognitive) based AdaBoost algorithm is designed and developed. Our results on empirical data set shows that the malware detection performance of the proposed algorithm outperforms original AdaBoost algorithm in detecting positives including the reduction of false negatives.
基于主机的入侵检测系统(HIDS)在发现主机操作系统内的恶意软件方面正获得越来越多的关注。本文基于监督AdaBoost机器学习算法,开发了一种新的基于认知主机的异常检测系统。特别是在原始AdaBoost机器学习算法中引入了基于信息分形维数的方法,对估计错误假设的分类器赋予更高的权重。开发了一种基于代理的主机传感器,可以连续地采集和提取Windows 7操作系统中所有主机进程的网络概况以及每个进程所产生的模块。本文的主要贡献是利用微软原生api开发了恶意软件测试沙盒,设计并开发了基于信息分形(认知)的AdaBoost算法。我们在经验数据集上的结果表明,该算法在检测阳性(包括减少假阴性)方面优于原始AdaBoost算法。
{"title":"Fractal based adaptive boosting algorithm for cognitive detection of computer malware","authors":"Muhammad Salman Khan, S. Siddiqui, R. McLeod, K. Ferens, W. Kinsner","doi":"10.1109/ICCI-CC.2016.7862074","DOIUrl":"https://doi.org/10.1109/ICCI-CC.2016.7862074","url":null,"abstract":"Host Based Intrusion Detection Systems (HIDS) are gaining traction in discovering malicious software inside a host operating system. In this paper, the authors have developed a new cognitive host based anomaly detection system based on supervised AdaBoost machine learning algorithm. Particularly, information fractal dimension based approach is incorporated in the original AdaBoost machine learning algorithm to assign higher weight to the classifier that estimates wrong hypothesis. An agent based host sensor is developed that continuously gathers and extracts network profile of all the host processes and the modules spawned by each process of a Microsoft Windows 7 operating system. The main contributions of this paper are that a malware testing sandbox is developed using Microsoft native APIs and an information fractal (cognitive) based AdaBoost algorithm is designed and developed. Our results on empirical data set shows that the malware detection performance of the proposed algorithm outperforms original AdaBoost algorithm in detecting positives including the reduction of false negatives.","PeriodicalId":135701,"journal":{"name":"2016 IEEE 15th International Conference on Cognitive Informatics & Cognitive Computing (ICCI*CC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124818780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Image-to-image face recognition using Dual Linear Regression based Classification and Electoral College voting 基于双线性回归分类和选举人团投票的图像对图像人脸识别
Y. Wang, Liang Chen
This paper proposes an image-to-image face recognition algorithm that uses Dual Linear Regression based Classification (DLRC) and an Electoral College voting approach. Each face image involved is first converted into a cluster of images; each image in the cluster is obtained by shifting the original image a few pixels. The similarity of a pair of face images can be measured by comparing the distance between the corresponding image clusters, which is calculated using DLRC approach. To further improve performance, each cluster of images, representing a single face image, is then partitioned into a union of clusters of sub images. DLRC is then used to measure similarities between corresponding sub-image clusters to provide temporary identity decisions; a voting approach is applied to make final conclusions. We have carried out experiments on a benchmark dataset for face recognition. The result demonstrates that the proposed approach works best in certain simple situations, while its performance is also comparable to known algorithms in complicated situations.
本文提出了一种基于双线性回归分类(Dual Linear Regression based Classification, DLRC)和选举人团投票方法的图像对图像人脸识别算法。所涉及的每张人脸图像首先被转换成一组图像;集群中的每个图像都是通过将原始图像移动几个像素来获得的。通过比较相应图像聚类之间的距离来衡量一对人脸图像的相似度,该方法采用DLRC方法计算。为了进一步提高性能,代表单个人脸图像的每个图像聚类随后被划分为子图像聚类的联合。然后使用DLRC测量相应子图像簇之间的相似性,以提供临时身份决策;采用投票的方法作出最后的结论。我们在人脸识别的基准数据集上进行了实验。结果表明,该方法在某些简单情况下效果最好,而在复杂情况下其性能也与已知算法相当。
{"title":"Image-to-image face recognition using Dual Linear Regression based Classification and Electoral College voting","authors":"Y. Wang, Liang Chen","doi":"10.1109/ICCI-CC.2016.7862022","DOIUrl":"https://doi.org/10.1109/ICCI-CC.2016.7862022","url":null,"abstract":"This paper proposes an image-to-image face recognition algorithm that uses Dual Linear Regression based Classification (DLRC) and an Electoral College voting approach. Each face image involved is first converted into a cluster of images; each image in the cluster is obtained by shifting the original image a few pixels. The similarity of a pair of face images can be measured by comparing the distance between the corresponding image clusters, which is calculated using DLRC approach. To further improve performance, each cluster of images, representing a single face image, is then partitioned into a union of clusters of sub images. DLRC is then used to measure similarities between corresponding sub-image clusters to provide temporary identity decisions; a voting approach is applied to make final conclusions. We have carried out experiments on a benchmark dataset for face recognition. The result demonstrates that the proposed approach works best in certain simple situations, while its performance is also comparable to known algorithms in complicated situations.","PeriodicalId":135701,"journal":{"name":"2016 IEEE 15th International Conference on Cognitive Informatics & Cognitive Computing (ICCI*CC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122609872","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Knowledge-oriented society: The problem of surviving the permanently uncertain future and the Requirement of Permanence 知识社会:在永远不确定的未来中生存的问题和对永恒的要求
H. Ching
Mankind has inherited the earth. But, up to now there is little hint on the meaning and the purpose of this inheritance. Science, thus far, has explained only a tiny fraction. The real issue is identified as the problem of surviving the permanently uncertain future. Technically, the problem can be called the Requirement of Permanence. All the knowledge discoveries of the past, the present, and the future and all the wisdom of the universe accumulated from the infinite past seem to be aimed at satisfying this Requirement of Permanence. And, by the best account, merely looking at the living system on earth, the problem seems to have been solved, as far as the universe in concerned. However, science, dealing with certainty, has missed the essence of the problem, which is solving the permanently uncertain future. The solution is expanded and further explained by Post-Science Social Science based on the solution of value, Post-Science Life or Computer Science based on the solution of complete automation, and Post-Creational Fuzzy Logic for describing the fuzzy reality resulting from the sacrifice of precision in the expansion of the range of tolerance of error of a creation for surviving all the possibilities of the uncertain future. The same solution for solving the problem of the uncertain future is used for solving the problems of financial crises and complexity crises, which will plague our society in the Age of Abundance. Post-science promotes the concept of a future cooperative society of abundance guided by knowledge. A knowledge-oriented, not power or money-oriented, society is needed to solve the problem of surviving the uncertain future permanently. Only knowledge will give mankind the right to inherit the earth and to connect to the wisdom of the universe.
人类继承了地球。但是,到目前为止,对这种继承的意义和目的几乎没有任何暗示。到目前为止,科学只解释了很小一部分。真正的问题被认为是在永远不确定的未来中生存的问题。从技术上讲,这个问题可以称为“持久性要求”。所有关于过去、现在和未来的知识发现,以及从无限过去积累起来的宇宙智慧,似乎都是为了满足这个永恒的要求。而且,从最好的角度来看,仅仅看看地球上的生命系统,就宇宙而言,这个问题似乎已经解决了。然而,处理确定性的科学忽略了问题的本质,即解决永远不确定的未来。以价值解决方案为基础的后科学社会科学、以完全自动化解决方案为基础的后科学生活或计算机科学,以及为了在不确定的未来的所有可能性中生存而扩大创造物的误差容忍范围而牺牲精度所导致的模糊现实的后创造模糊逻辑,对解决方案进行了扩展和进一步解释。解决不确定的未来问题的方法同样适用于解决金融危机和复杂性危机的问题,这些问题将在富裕时代困扰我们的社会。后科学促进了以知识为指导的未来合作社会的概念。我们需要一个以知识为导向,而不是以权力或金钱为导向的社会,以解决在不确定的未来中永久生存的问题。只有知识才能赋予人类继承地球的权利,并与宇宙的智慧相连接。
{"title":"Knowledge-oriented society: The problem of surviving the permanently uncertain future and the Requirement of Permanence","authors":"H. Ching","doi":"10.1109/ICCI-CC.2016.7862047","DOIUrl":"https://doi.org/10.1109/ICCI-CC.2016.7862047","url":null,"abstract":"Mankind has inherited the earth. But, up to now there is little hint on the meaning and the purpose of this inheritance. Science, thus far, has explained only a tiny fraction. The real issue is identified as the problem of surviving the permanently uncertain future. Technically, the problem can be called the Requirement of Permanence. All the knowledge discoveries of the past, the present, and the future and all the wisdom of the universe accumulated from the infinite past seem to be aimed at satisfying this Requirement of Permanence. And, by the best account, merely looking at the living system on earth, the problem seems to have been solved, as far as the universe in concerned. However, science, dealing with certainty, has missed the essence of the problem, which is solving the permanently uncertain future. The solution is expanded and further explained by Post-Science Social Science based on the solution of value, Post-Science Life or Computer Science based on the solution of complete automation, and Post-Creational Fuzzy Logic for describing the fuzzy reality resulting from the sacrifice of precision in the expansion of the range of tolerance of error of a creation for surviving all the possibilities of the uncertain future. The same solution for solving the problem of the uncertain future is used for solving the problems of financial crises and complexity crises, which will plague our society in the Age of Abundance. Post-science promotes the concept of a future cooperative society of abundance guided by knowledge. A knowledge-oriented, not power or money-oriented, society is needed to solve the problem of surviving the uncertain future permanently. Only knowledge will give mankind the right to inherit the earth and to connect to the wisdom of the universe.","PeriodicalId":135701,"journal":{"name":"2016 IEEE 15th International Conference on Cognitive Informatics & Cognitive Computing (ICCI*CC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122634320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Light-adaptive face registration based on drivers' video 基于驾驶员视频的光适应人脸配准
Zuojin Li, Jun Peng, Liukui Chen, S. S. Tirumala
Under real driving conditions, the fatigue monitoring system based on drivers' video is highly affected by light environment, which deteriorates the registration of facial information and thus the accuracy of surveillance. This paper, on the basis of AAM (Active Appearance Model)-based face registration method, analyzes the reasons of its failure when lighting conditions change and proposes an improved AAM algorithm. The experiments show that the improved AAM method can well register driver's face under changing lighting environment, and thus improve the accuracy in fatigue state recognition based on drivers' videos.
在真实驾驶条件下,基于驾驶员视频的疲劳监测系统受光照环境影响较大,不利于人脸信息的配准,进而影响监控的准确性。本文在基于主动外观模型的人脸配准方法的基础上,分析了光照条件变化导致人脸配准失效的原因,提出了一种改进的主动外观模型配准算法。实验表明,改进的AAM方法可以在变化的光照环境下很好地对驾驶员面部进行配准,从而提高了基于驾驶员视频的疲劳状态识别的准确性。
{"title":"Light-adaptive face registration based on drivers' video","authors":"Zuojin Li, Jun Peng, Liukui Chen, S. S. Tirumala","doi":"10.1109/ICCI-CC.2016.7862062","DOIUrl":"https://doi.org/10.1109/ICCI-CC.2016.7862062","url":null,"abstract":"Under real driving conditions, the fatigue monitoring system based on drivers' video is highly affected by light environment, which deteriorates the registration of facial information and thus the accuracy of surveillance. This paper, on the basis of AAM (Active Appearance Model)-based face registration method, analyzes the reasons of its failure when lighting conditions change and proposes an improved AAM algorithm. The experiments show that the improved AAM method can well register driver's face under changing lighting environment, and thus improve the accuracy in fatigue state recognition based on drivers' videos.","PeriodicalId":135701,"journal":{"name":"2016 IEEE 15th International Conference on Cognitive Informatics & Cognitive Computing (ICCI*CC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121992747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Bio-inspired cognitive model for sustained attention 持续注意力的生物启发认知模型
Luis Martin, Gustavo Torres, Gabriela E. López-Tolsa
Sustained attention is an important cognitive function for living organisms. This function allows them to stay focused on a task with a stable performance. This is the main reason that makes this function required by virtual creatures with realistic behaviours. This document presents a bio-inspired cognitive model for sustained attention which takes into account its impairment and performance enhancement factors. The impairment factors are given by the time on task, the circadian rhythm of sleep and by sleep deprivation. Furthermore, it makes use of the motivation as an enhancement factor to deal with the impairments. This model was designed using neuroscientific evidence about the brain structures related with sustained attention tasks and the processes around them. In order to validate the model, a simple psychological task was used to test the virtual agent behaviour. The presented model was designed to be a compatible sub-functionality of a more complex cognitive architecture.
持续注意力是生物体的一项重要认知功能。该功能使他们能够专注于性能稳定的任务。这是具有现实行为的虚拟生物需要此功能的主要原因。本文提出了一种生物启发的持续注意力认知模型,该模型考虑了其损害和性能增强因素。损害因素是由工作时间、睡眠的昼夜节律和睡眠剥夺给出的。此外,它利用动机作为增强因子来处理损伤。这个模型是根据与持续注意力任务及其周围过程相关的大脑结构的神经科学证据设计的。为了验证模型的有效性,采用一个简单的心理任务来测试虚拟代理的行为。提出的模型被设计成一个更复杂的认知体系结构的兼容子功能。
{"title":"Bio-inspired cognitive model for sustained attention","authors":"Luis Martin, Gustavo Torres, Gabriela E. López-Tolsa","doi":"10.1109/ICCI-CC.2016.7862092","DOIUrl":"https://doi.org/10.1109/ICCI-CC.2016.7862092","url":null,"abstract":"Sustained attention is an important cognitive function for living organisms. This function allows them to stay focused on a task with a stable performance. This is the main reason that makes this function required by virtual creatures with realistic behaviours. This document presents a bio-inspired cognitive model for sustained attention which takes into account its impairment and performance enhancement factors. The impairment factors are given by the time on task, the circadian rhythm of sleep and by sleep deprivation. Furthermore, it makes use of the motivation as an enhancement factor to deal with the impairments. This model was designed using neuroscientific evidence about the brain structures related with sustained attention tasks and the processes around them. In order to validate the model, a simple psychological task was used to test the virtual agent behaviour. The presented model was designed to be a compatible sub-functionality of a more complex cognitive architecture.","PeriodicalId":135701,"journal":{"name":"2016 IEEE 15th International Conference on Cognitive Informatics & Cognitive Computing (ICCI*CC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129518629","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Construction of linguistic variables based on rule induction and concept hierarchy 基于规则归纳法和概念层次的语言变量构建
S. Tsumoto, S. Hirano
Application of attribute-oriented generalization to an informatation often lead to inconsistent results of rule induction, which can be viewed as generation of fuziness with partialization of attribute information. This paper focuses on fuzzy linguistic variables and proposes a solution for inconsistencies. The results show that domain ontology may play an important role in construction of linguistic variables.
将面向属性的泛化应用于信息,往往会导致规则归纳结果不一致,这可以看作是属性信息局部化的模糊性生成。本文主要研究模糊语言变量,并提出了一种不一致的解决方法。结果表明,领域本体在语言变量的构建中可能发挥重要作用。
{"title":"Construction of linguistic variables based on rule induction and concept hierarchy","authors":"S. Tsumoto, S. Hirano","doi":"10.1109/ICCI-CC.2016.7862086","DOIUrl":"https://doi.org/10.1109/ICCI-CC.2016.7862086","url":null,"abstract":"Application of attribute-oriented generalization to an informatation often lead to inconsistent results of rule induction, which can be viewed as generation of fuziness with partialization of attribute information. This paper focuses on fuzzy linguistic variables and proposes a solution for inconsistencies. The results show that domain ontology may play an important role in construction of linguistic variables.","PeriodicalId":135701,"journal":{"name":"2016 IEEE 15th International Conference on Cognitive Informatics & Cognitive Computing (ICCI*CC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124033398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Lung cancer detection using Local Energy-based Shape Histogram (LESH) feature extraction and cognitive machine learning techniques 基于局部能量的形状直方图特征提取和认知机器学习技术的肺癌检测
S. Wajid, A. Hussain, Kaizhu Huang, W. Boulila
The novel application of Local Energy-based Shape Histogram (LESH) feature extraction technique was recently proposed for breast cancer diagnosis using mammogram images [22]. This paper extends our original work to apply the LESH technique to detect lung cancer. The JSRT Digital Image Database of chest radiographs is selected for research experimentation. Prior to LESH feature extraction, we enhanced the radiograph images using a contrast limited adaptive histogram equalization (CLAHE) approach. Selected state-of-the-art cognitive machine learning classifiers, namely extreme learning machine (ELM), support vector machine (SVM) and echo state network (ESN) are then applied using the LESH extracted features for efficient diagnosis of correct medical state (existence of benign or malignant cancer) in the x-ray images. Comparative simulation results, evaluated using the classification accuracy performance measure, are further bench-marked against state-of-the-art wavelet based features, and authenticate the distinct capability of our proposed framework for enhancing the diagnosis outcome.
最近提出了一种基于局部能量的形状直方图(LESH)特征提取技术在乳房x光图像乳腺癌诊断中的新应用[22]。本文扩展了我们的工作,将LESH技术应用于肺癌的检测。选择JSRT胸片数字图像数据库进行研究实验。在进行LESH特征提取之前,我们使用对比度有限的自适应直方图均衡化(CLAHE)方法增强了x线片图像。然后选择最先进的认知机器学习分类器,即极限学习机(ELM)、支持向量机(SVM)和回声状态网络(ESN),利用LESH提取的特征有效诊断x射线图像中正确的医疗状态(存在良性或恶性癌症)。对比仿真结果,使用分类精度性能指标进行评估,并进一步与最先进的基于小波的特征进行基准测试,并验证我们提出的框架在增强诊断结果方面的独特能力。
{"title":"Lung cancer detection using Local Energy-based Shape Histogram (LESH) feature extraction and cognitive machine learning techniques","authors":"S. Wajid, A. Hussain, Kaizhu Huang, W. Boulila","doi":"10.1109/ICCI-CC.2016.7862060","DOIUrl":"https://doi.org/10.1109/ICCI-CC.2016.7862060","url":null,"abstract":"The novel application of Local Energy-based Shape Histogram (LESH) feature extraction technique was recently proposed for breast cancer diagnosis using mammogram images [22]. This paper extends our original work to apply the LESH technique to detect lung cancer. The JSRT Digital Image Database of chest radiographs is selected for research experimentation. Prior to LESH feature extraction, we enhanced the radiograph images using a contrast limited adaptive histogram equalization (CLAHE) approach. Selected state-of-the-art cognitive machine learning classifiers, namely extreme learning machine (ELM), support vector machine (SVM) and echo state network (ESN) are then applied using the LESH extracted features for efficient diagnosis of correct medical state (existence of benign or malignant cancer) in the x-ray images. Comparative simulation results, evaluated using the classification accuracy performance measure, are further bench-marked against state-of-the-art wavelet based features, and authenticate the distinct capability of our proposed framework for enhancing the diagnosis outcome.","PeriodicalId":135701,"journal":{"name":"2016 IEEE 15th International Conference on Cognitive Informatics & Cognitive Computing (ICCI*CC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131448460","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
A user authentication protocol combined with trust model and ECC for wireless sensor networks 一种结合信任模型和ECC的无线传感器网络用户认证协议
Tao Liu, Gan Huang, Zheng Xu
As sensor nodes are usually installed in harsh environments and nobody attends them, the character means it's easy for the networks to be subjected to all kinds of attacks. Moreover, the networks have limited computer power, communication power and energies. Therefore, in the environment, a well-organized and lightweight user authentication is a vital issue when a user possesses right to use the data from sensor nodes. In this article, a new user authentication protocol using trust model and elliptic curve cryptography (ECC) for WSNs is submitted. The result of the trust model analysis indicates that the model can improve the model's ability of withstanding attacks from the malicious nodes. The results of safety analysis and performance analysis for our proposed user authentication protocol demonstrate that this protocol can be flexible to all sorts of common known attacks and performs similarly or better compared with some active user authentication protocols.
由于传感器节点通常安装在恶劣的环境中,无人看管,这一特性意味着网络很容易受到各种攻击。此外,网络的计算机能力、通信能力和能源有限。因此,在环境中,当用户拥有使用来自传感器节点的数据的权利时,组织良好且轻量级的用户身份验证是至关重要的问题。本文提出了一种基于信任模型和椭圆曲线加密(ECC)的无线传感器网络用户认证协议。信任模型分析结果表明,该模型可以提高模型抵御恶意节点攻击的能力。本文提出的用户认证协议的安全性分析和性能分析结果表明,该协议可以灵活地应对各种常见的已知攻击,并且与一些活跃的用户认证协议相比,性能相似或更好。
{"title":"A user authentication protocol combined with trust model and ECC for wireless sensor networks","authors":"Tao Liu, Gan Huang, Zheng Xu","doi":"10.1109/ICCI-CC.2016.7862076","DOIUrl":"https://doi.org/10.1109/ICCI-CC.2016.7862076","url":null,"abstract":"As sensor nodes are usually installed in harsh environments and nobody attends them, the character means it's easy for the networks to be subjected to all kinds of attacks. Moreover, the networks have limited computer power, communication power and energies. Therefore, in the environment, a well-organized and lightweight user authentication is a vital issue when a user possesses right to use the data from sensor nodes. In this article, a new user authentication protocol using trust model and elliptic curve cryptography (ECC) for WSNs is submitted. The result of the trust model analysis indicates that the model can improve the model's ability of withstanding attacks from the malicious nodes. The results of safety analysis and performance analysis for our proposed user authentication protocol demonstrate that this protocol can be flexible to all sorts of common known attacks and performs similarly or better compared with some active user authentication protocols.","PeriodicalId":135701,"journal":{"name":"2016 IEEE 15th International Conference on Cognitive Informatics & Cognitive Computing (ICCI*CC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132736094","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2016 IEEE 15th International Conference on Cognitive Informatics & Cognitive Computing (ICCI*CC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1