首页 > 最新文献

2016 IEEE 15th International Conference on Cognitive Informatics & Cognitive Computing (ICCI*CC)最新文献

英文 中文
Utilizing finger movement data to cluster patients with everyday action impairment 利用手指运动数据对日常行动障碍患者进行分类
Niken Prasasti, Takehiko Yamaguchi, H. Ohwada
Difficulty in performing the activities of daily living is a key clinical feature of early cognitive decline in older adults and has also been associated with the early stage of dementia in mild cognitive impairment (MCI). As the number of individuals with dementia and the development of technology rise, an immersive virtual environment or virtual reality has been used in therapy for memory problems in the area of MCI. This study evaluated the use of finger movement data obtained from the virtual-reality-based application and its ability to cluster patients with everyday action impairment. Here, as a pilot study, nine healthy adults completed lunch box packing as an everyday action task in the designated virtual reality called the Virtual Kitchen (VK), equipped with a leap motion controller to record their finger movement. We converted the finger movements to acceleration data and then employed a time series clustering algorithm to create several clusters based on the data set. In addition, to comprehensively review the clustering result, we assessed performance-based measures for the experiment using the Naturalistic Action Test (NAT). The final results indicate that the clusters formed by using the acceleration data seem reasonably analogous to the performance measures (i.e., the type and number of errors that occurred).
日常生活活动困难是老年人早期认知能力下降的一个关键临床特征,也与轻度认知障碍(MCI)痴呆的早期阶段有关。随着痴呆症患者数量的增加和技术的发展,沉浸式虚拟环境或虚拟现实已被用于治疗MCI领域的记忆问题。这项研究评估了从基于虚拟现实的应用程序获得的手指运动数据的使用,以及它对日常行动障碍患者进行分类的能力。在这里,作为一项试点研究,九名健康的成年人在指定的虚拟现实中完成了打包午餐盒的日常动作任务,称为虚拟厨房(VK),配备了一个跳跃运动控制器来记录他们的手指运动。我们将手指运动转换为加速度数据,然后使用时间序列聚类算法基于数据集创建多个聚类。此外,为了全面审查聚类结果,我们使用自然行为测试(NAT)评估了基于性能的实验措施。最后的结果表明,使用加速数据形成的集群似乎与性能度量(即发生的错误的类型和数量)相当相似。
{"title":"Utilizing finger movement data to cluster patients with everyday action impairment","authors":"Niken Prasasti, Takehiko Yamaguchi, H. Ohwada","doi":"10.1109/ICCI-CC.2016.7862077","DOIUrl":"https://doi.org/10.1109/ICCI-CC.2016.7862077","url":null,"abstract":"Difficulty in performing the activities of daily living is a key clinical feature of early cognitive decline in older adults and has also been associated with the early stage of dementia in mild cognitive impairment (MCI). As the number of individuals with dementia and the development of technology rise, an immersive virtual environment or virtual reality has been used in therapy for memory problems in the area of MCI. This study evaluated the use of finger movement data obtained from the virtual-reality-based application and its ability to cluster patients with everyday action impairment. Here, as a pilot study, nine healthy adults completed lunch box packing as an everyday action task in the designated virtual reality called the Virtual Kitchen (VK), equipped with a leap motion controller to record their finger movement. We converted the finger movements to acceleration data and then employed a time series clustering algorithm to create several clusters based on the data set. In addition, to comprehensively review the clustering result, we assessed performance-based measures for the experiment using the Naturalistic Action Test (NAT). The final results indicate that the clusters formed by using the acceleration data seem reasonably analogous to the performance measures (i.e., the type and number of errors that occurred).","PeriodicalId":135701,"journal":{"name":"2016 IEEE 15th International Conference on Cognitive Informatics & Cognitive Computing (ICCI*CC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124240248","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Soft biometric: Give me your favorite images and i will tell your gender 软生物识别:给我你最喜欢的图像,我会告诉你的性别
Samiul Azam, M. Gavrilova
Gender estimation for security and forensic purposes is not a trivial task. Recently, researchers provided methods for predicting gender based on face-images, fingerprint ridge density, body shape, voice and gait. No research to date have been concerned with using one's image aesthetic preferences for predicting gender. Cognitively and psychologically, males and females have different visual aesthetic preferences. This paper is a proof of concept that it is possible to use image's perceptual aesthetic features to identify the gender of a person. This article identifies a bag of image aesthetic features and selects a number of most differentiating features using filter and wrapping selection methods. To improve the classification accuracy, weighted combination of decisions obtained by the conventional binary classifiers is used. The final decision is made based on the fusion of probabilities generated by the mixture of classifiers. The prediction model is trained and tested on a database consisting of 24000 images from 120 Flickr users. Experiment shows that a proper weight assignments allows to obtain 77% accuracy in gender prediction based on aesthetics alone.
出于安全和法医目的的性别估计不是一项微不足道的任务。最近,研究人员提出了基于面部图像、指纹脊密度、体型、声音和步态来预测性别的方法。迄今为止,还没有研究涉及使用一个人的图像审美偏好来预测性别。在认知和心理上,男性和女性具有不同的视觉审美偏好。本文证明了利用图像的感性审美特征来识别人的性别是可能的。本文识别了一组图像的美学特征,并使用过滤器和包裹选择方法选择了一些最具区别的特征。为了提高分类精度,将传统二元分类器得到的决策进行加权组合。最后的决策是基于混合分类器产生的概率的融合。该预测模型在一个由来自120个Flickr用户的24000张图片组成的数据库上进行了训练和测试。实验表明,适当的权重分配可以在仅基于美学的性别预测中获得77%的准确率。
{"title":"Soft biometric: Give me your favorite images and i will tell your gender","authors":"Samiul Azam, M. Gavrilova","doi":"10.1109/ICCI-CC.2016.7862089","DOIUrl":"https://doi.org/10.1109/ICCI-CC.2016.7862089","url":null,"abstract":"Gender estimation for security and forensic purposes is not a trivial task. Recently, researchers provided methods for predicting gender based on face-images, fingerprint ridge density, body shape, voice and gait. No research to date have been concerned with using one's image aesthetic preferences for predicting gender. Cognitively and psychologically, males and females have different visual aesthetic preferences. This paper is a proof of concept that it is possible to use image's perceptual aesthetic features to identify the gender of a person. This article identifies a bag of image aesthetic features and selects a number of most differentiating features using filter and wrapping selection methods. To improve the classification accuracy, weighted combination of decisions obtained by the conventional binary classifiers is used. The final decision is made based on the fusion of probabilities generated by the mixture of classifiers. The prediction model is trained and tested on a database consisting of 24000 images from 120 Flickr users. Experiment shows that a proper weight assignments allows to obtain 77% accuracy in gender prediction based on aesthetics alone.","PeriodicalId":135701,"journal":{"name":"2016 IEEE 15th International Conference on Cognitive Informatics & Cognitive Computing (ICCI*CC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122607548","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Robotic implementation of classical and operant conditioning within a single SNN architecture 在单个SNN架构中,经典条件反射和操作性条件反射的机器人实现
Etienne Dumesnil, Philippe-Olivier Beaulieu, M. Boukadoum
This work presents the implementation of operant conditioning (OC) and classical conditioning (CC) with a single spiking neural network (SNN) architecture, thus suggesting that the two types of leaning may relate to the same cognitive process. Both are achieved by using a modified version of spike-timing-dependent plasticity (STDP), where the connection weight between a cue neuron and an action neuron depends on the temporal relation between their spikes and those of a reward neuron. This reward driven STDP (RD-STDP) was implemented with simple computational resources to form an electronic robot's brain, using an adaptation of the synapto-dendritic kernel adapting neuron (SKAN) model. Then, a robot driven by the new neuronal architecture was tested in a maze with changing features, successfully exhibiting CC and OC. These results and the simple computational resources used make the proposed architecture promising for very large scale time-dependent parallel data analysis, with high capacity of adaptation in a dynamic environment. Moreover, it proposes a theoretic framework to model learning by conditioning.
本研究提出了操作性条件反射(OC)和经典条件反射(CC)在单一尖峰神经网络(SNN)架构下的实现,从而表明这两种类型的学习可能与相同的认知过程有关。两者都是通过使用一种改进版本的峰值时间依赖可塑性(STDP)来实现的,其中线索神经元和动作神经元之间的连接权重取决于它们的峰值与奖励神经元之间的时间关系。这种奖励驱动的STDP (RD-STDP)是用简单的计算资源来实现的,利用突触-树突核适应神经元(SKAN)模型来形成一个电子机器人的大脑。然后,在变化特征的迷宫中测试了由新神经元结构驱动的机器人,成功地表现出CC和OC。这些结果和使用的简单计算资源使所提出的架构有望用于非常大规模的时间相关并行数据分析,并具有在动态环境中的高适应能力。此外,本文还提出了条件作用学习模型的理论框架。
{"title":"Robotic implementation of classical and operant conditioning within a single SNN architecture","authors":"Etienne Dumesnil, Philippe-Olivier Beaulieu, M. Boukadoum","doi":"10.1109/ICCI-CC.2016.7862055","DOIUrl":"https://doi.org/10.1109/ICCI-CC.2016.7862055","url":null,"abstract":"This work presents the implementation of operant conditioning (OC) and classical conditioning (CC) with a single spiking neural network (SNN) architecture, thus suggesting that the two types of leaning may relate to the same cognitive process. Both are achieved by using a modified version of spike-timing-dependent plasticity (STDP), where the connection weight between a cue neuron and an action neuron depends on the temporal relation between their spikes and those of a reward neuron. This reward driven STDP (RD-STDP) was implemented with simple computational resources to form an electronic robot's brain, using an adaptation of the synapto-dendritic kernel adapting neuron (SKAN) model. Then, a robot driven by the new neuronal architecture was tested in a maze with changing features, successfully exhibiting CC and OC. These results and the simple computational resources used make the proposed architecture promising for very large scale time-dependent parallel data analysis, with high capacity of adaptation in a dynamic environment. Moreover, it proposes a theoretic framework to model learning by conditioning.","PeriodicalId":135701,"journal":{"name":"2016 IEEE 15th International Conference on Cognitive Informatics & Cognitive Computing (ICCI*CC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123663386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Enhancing supervisory training signals with environmental reinforcement learning using adaptive dynamic programming and artificial neural networks 使用自适应动态规划和人工神经网络的环境强化学习增强监督训练信号
N. Melton, D. Wunsch
A method for hybridizing supervised learning with adaptive dynamic programming was developed to increase the speed, quality, and robustness of on-line neural network learning from an imperfect teacher. Reinforcement learning is used to modify and enhance the original supervisory signal before learning occurs. This paper describes the method of hybridization and presents a model problem in which a human supervisor teaches a simulated car to drive around a race track. Simulation results show successful learning and improvements in convergence time, error rate, and stability over either component method alone.
为了提高在线神经网络学习的速度、质量和鲁棒性,提出了一种将监督学习与自适应动态规划相结合的方法。在学习发生之前,使用强化学习对原始监控信号进行修改和增强。本文描述了杂交的方法,并提出了一个由人类主管指导模拟汽车在赛道上驾驶的模型问题。仿真结果表明,该方法在收敛时间、错误率和稳定性方面均优于单独使用任一分量方法。
{"title":"Enhancing supervisory training signals with environmental reinforcement learning using adaptive dynamic programming and artificial neural networks","authors":"N. Melton, D. Wunsch","doi":"10.1109/ICCI-CC.2016.7862056","DOIUrl":"https://doi.org/10.1109/ICCI-CC.2016.7862056","url":null,"abstract":"A method for hybridizing supervised learning with adaptive dynamic programming was developed to increase the speed, quality, and robustness of on-line neural network learning from an imperfect teacher. Reinforcement learning is used to modify and enhance the original supervisory signal before learning occurs. This paper describes the method of hybridization and presents a model problem in which a human supervisor teaches a simulated car to drive around a race track. Simulation results show successful learning and improvements in convergence time, error rate, and stability over either component method alone.","PeriodicalId":135701,"journal":{"name":"2016 IEEE 15th International Conference on Cognitive Informatics & Cognitive Computing (ICCI*CC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130058863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Zero-crossing analysis of Lévy walks for real-time feature extraction: Composite signal analysis for strengthening the IoT against DDoS attacks lsamvy行走的过零分析,用于实时特征提取:复合信号分析,增强物联网抵御DDoS攻击
J. D. T. Gonzalez, W. Kinsner
This paper compares the probability similarities between a cyberattack, the distributed denial-of-service, and the mathematical model of probability, Lévy walks. This comparison aims to explore the validity of Lévy walks as a model resembling the DDoS probability features. This research also presents a method, based on the Smirnov transform, for generating synthetic data with the statistical properties of Lévy-walks. This method for synthetic data generation can be utilized for generating arbitrary prescribed probability density functions (pdf). The Smirnov transform is used to solve a cybersecurity engineering problem associated with Internet traffic. The synthetic Lévy-walk process is intertwined with sections of other distinct characteristics (uniform noise, Gaussian noise, and an ordinary sinusoid) to create a composite signal, which is then analyzed with zero-crossing rate (ZCR) within a varying-size window. This paper shows that it is possible to identify the distinct sections present in the composite signal through ZCR. The differentiation of these sections shows an increasing ZCR value as the section under analysis exhibits a higher activity or complexity (from the sinusoid, to a synthetic Lévy-walk process, and uniform and Gaussian noise, respectively). The advantages of the ZCR computation directly in the time-domain are appealing for real-time implementations. The varying window in the ZCR produces more defined values as the window size increases. The changing world of security systems is deeply considered, in an approach for its improvement. This as our society is highly dependent on electronically interconnected systems-of-systems demanding operational robustness and security. The approach proposed for providing a higher degree of security aiming to the development of cognitive security systems.
本文比较了网络攻击、分布式拒绝服务和概率数学模型lsamvy walks之间的概率相似性。这个比较的目的是为了探索lsamvy walk作为一种类似于DDoS概率特征的模型的有效性。本研究还提出了一种基于Smirnov变换的方法,用于生成具有lsamv -walks统计特性的合成数据。这种合成数据生成方法可用于生成任意规定的概率密度函数(pdf)。斯米尔诺夫变换用于解决与互联网流量相关的网络安全工程问题。合成的lvac -walk过程与其他不同特征的部分(均匀噪声、高斯噪声和普通正弦波)交织在一起,形成一个复合信号,然后在不同大小的窗口内用过零率(ZCR)对其进行分析。本文表明,通过ZCR可以识别复合信号中存在的不同部分。这些部分的分化表明,随着所分析的部分表现出更高的活动性或复杂性(分别从正弦波到合成lsamv -walk过程,均匀噪声和高斯噪声),ZCR值也在增加。直接在时域进行ZCR计算的优点对实时实现具有吸引力。随着窗口大小的增加,ZCR中的变化窗口产生更多的定义值。不断变化的世界安全系统是深入考虑,在其改进的方法。这是因为我们的社会高度依赖于要求操作稳健性和安全性的电子互联系统。为提供更高程度的安全性而提出的方法,旨在开发认知安全系统。
{"title":"Zero-crossing analysis of Lévy walks for real-time feature extraction: Composite signal analysis for strengthening the IoT against DDoS attacks","authors":"J. D. T. Gonzalez, W. Kinsner","doi":"10.1109/ICCI-CC.2016.7862027","DOIUrl":"https://doi.org/10.1109/ICCI-CC.2016.7862027","url":null,"abstract":"This paper compares the probability similarities between a cyberattack, the distributed denial-of-service, and the mathematical model of probability, Lévy walks. This comparison aims to explore the validity of Lévy walks as a model resembling the DDoS probability features. This research also presents a method, based on the Smirnov transform, for generating synthetic data with the statistical properties of Lévy-walks. This method for synthetic data generation can be utilized for generating arbitrary prescribed probability density functions (pdf). The Smirnov transform is used to solve a cybersecurity engineering problem associated with Internet traffic. The synthetic Lévy-walk process is intertwined with sections of other distinct characteristics (uniform noise, Gaussian noise, and an ordinary sinusoid) to create a composite signal, which is then analyzed with zero-crossing rate (ZCR) within a varying-size window. This paper shows that it is possible to identify the distinct sections present in the composite signal through ZCR. The differentiation of these sections shows an increasing ZCR value as the section under analysis exhibits a higher activity or complexity (from the sinusoid, to a synthetic Lévy-walk process, and uniform and Gaussian noise, respectively). The advantages of the ZCR computation directly in the time-domain are appealing for real-time implementations. The varying window in the ZCR produces more defined values as the window size increases. The changing world of security systems is deeply considered, in an approach for its improvement. This as our society is highly dependent on electronically interconnected systems-of-systems demanding operational robustness and security. The approach proposed for providing a higher degree of security aiming to the development of cognitive security systems.","PeriodicalId":135701,"journal":{"name":"2016 IEEE 15th International Conference on Cognitive Informatics & Cognitive Computing (ICCI*CC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130070864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Detecting preferences based on eye movement using combinatorial fusion 利用组合融合检测基于眼球运动的偏好
Christina Schweikert, S. Shimojo, D. F. Hsu
When tasked with comparing two images on a screen, a subject's eye movement can be captured and analyzed in order to understand the process of preference formation. The process of comparing two images and developing a preference is analyzed based on a sample dataset. Although it is known in general that our preferences are shaped by our past experiences, a systemic understanding of the factors which lead to preference decision making remains a challenging problem. In this paper, we propose a set of five attributes which are extracted from the temporal eye movement sequence: last duration, total duration, gaze count, interest sustainability, and region change. Each of these five attributes is a scoring system (ranking system). We then use the combinatorial fusion algorithm (CFA) framework to combine pairs of attributes using the rank-score characteristic (RSC) function and cognitive diversity (CD). Our results demonstrate that combination of two attributes can improve individual attributes if the attribute pair has a higher cognitive diversity. Our work represents a new paradigm to use combinatorial fusion for preference detection based on eye movement.
当任务是比较屏幕上的两幅图像时,可以捕捉和分析受试者的眼球运动,以了解偏好形成的过程。基于样本数据集,分析了两幅图像的比较和偏好的形成过程。虽然众所周知,我们的偏好是由我们过去的经历塑造的,但对导致偏好决策的因素的系统理解仍然是一个具有挑战性的问题。在本文中,我们提出了一组从时间眼动序列中提取的五个属性:最后持续时间、总持续时间、凝视次数、兴趣可持续性和区域变化。这五个属性中的每一个都是一个评分系统(排名系统)。然后,我们使用组合融合算法(CFA)框架,利用秩-分数特征(RSC)函数和认知多样性(CD)对属性进行组合。研究结果表明,当属性对具有较高的认知多样性时,两个属性组合可以改善个体属性。我们的工作代表了一种使用组合融合进行基于眼球运动的偏好检测的新范式。
{"title":"Detecting preferences based on eye movement using combinatorial fusion","authors":"Christina Schweikert, S. Shimojo, D. F. Hsu","doi":"10.1109/ICCI-CC.2016.7862057","DOIUrl":"https://doi.org/10.1109/ICCI-CC.2016.7862057","url":null,"abstract":"When tasked with comparing two images on a screen, a subject's eye movement can be captured and analyzed in order to understand the process of preference formation. The process of comparing two images and developing a preference is analyzed based on a sample dataset. Although it is known in general that our preferences are shaped by our past experiences, a systemic understanding of the factors which lead to preference decision making remains a challenging problem. In this paper, we propose a set of five attributes which are extracted from the temporal eye movement sequence: last duration, total duration, gaze count, interest sustainability, and region change. Each of these five attributes is a scoring system (ranking system). We then use the combinatorial fusion algorithm (CFA) framework to combine pairs of attributes using the rank-score characteristic (RSC) function and cognitive diversity (CD). Our results demonstrate that combination of two attributes can improve individual attributes if the attribute pair has a higher cognitive diversity. Our work represents a new paradigm to use combinatorial fusion for preference detection based on eye movement.","PeriodicalId":135701,"journal":{"name":"2016 IEEE 15th International Conference on Cognitive Informatics & Cognitive Computing (ICCI*CC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130115868","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A weighted hybrid model for unsteady nonlinear aerodynamics 非定常非线性空气动力学的加权混合模型
Boxu Zhao, G. Luo, Jihong Zhu
Based on experimental data from the large amplitude oscillation experiment conducted with two degrees of freedom, this work studies and compares the ability of Polynomial Regression, LS-SVM and RBF network to describe the characteristics of unsteady nonlinear aerodynamics. This work also develops a hybrid model for use in unsteady nonlinear aerodynamics based on the standard boosting method. The results indicate that the forecast results and actual data are in good agreement using the method, thus demonstrating that these methods can effectively model highly nonlinear aerodynamics. The results also indicate that the hybrid model has a better effect compared to other methods.
基于两自由度大振幅振荡实验数据,研究并比较了多项式回归、LS-SVM和RBF网络描述非定常非线性空气动力学特性的能力。本文还在标准增压方法的基础上建立了用于非定常非线性空气动力学的混合模型。结果表明,该方法的预测结果与实际数据吻合较好,表明该方法可以有效地模拟高度非线性的空气动力学。结果还表明,混合模型与其他方法相比具有更好的效果。
{"title":"A weighted hybrid model for unsteady nonlinear aerodynamics","authors":"Boxu Zhao, G. Luo, Jihong Zhu","doi":"10.1109/ICCI-CC.2016.7862038","DOIUrl":"https://doi.org/10.1109/ICCI-CC.2016.7862038","url":null,"abstract":"Based on experimental data from the large amplitude oscillation experiment conducted with two degrees of freedom, this work studies and compares the ability of Polynomial Regression, LS-SVM and RBF network to describe the characteristics of unsteady nonlinear aerodynamics. This work also develops a hybrid model for use in unsteady nonlinear aerodynamics based on the standard boosting method. The results indicate that the forecast results and actual data are in good agreement using the method, thus demonstrating that these methods can effectively model highly nonlinear aerodynamics. The results also indicate that the hybrid model has a better effect compared to other methods.","PeriodicalId":135701,"journal":{"name":"2016 IEEE 15th International Conference on Cognitive Informatics & Cognitive Computing (ICCI*CC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116134282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Terrorism risk assessment using hierarchical bidirectional fuzzy rule interpolation 基于层次双向模糊规则插值的恐怖主义风险评估
Shangzhu Jin, Jike Ge, Jun Peng
Terrorist attacks launched by extremist groups or individuals have caused catastrophic consequences worldwide. Terrorism risk assessment therefore plays a crucial role in national and international security. Fuzzy reasoning-based terrorism risk assessment systems offer a significant potential of providing decision support in combating terrorism, where highly complex situations may be involved. However, missing expertise often presents challenges for configuring systems that can otherwise assess the likelihood and risk of possible attacks due to the availability of only sparse rule bases. Hierarchical fuzzy rule interpolation systems may be adopted in order to overcome such problems. Unfortunately, situations can become more sophisticated because certain important antecedent values may be missing, which need to be inferred from the known (or hypothesised) consequences. Initial theoretical work on backward fuzzy rule interpolation has been proposed to cope with certain underlying problems. Nevertheless, little has been done in developing and applying an integrated hierarchical bidirectional (forward/backward) fuzzy rule interpolation mechanism that is tailored to suit decision support for terrorism risk assessment. This paper presents such an integrated approach that is capable of dealing with dynamic and insufficient information in the risk assessing process. In particular, the hierarchical system implementing the proposed techniques can predict the likelihood of terrorism attacks on different segments of focused attention. It also helps identify hidden variables that may be useful during the decision support process via performing reverse inference. The results of an experimental investigation of this implemented system are represented, demonstrating the potential and efficacy of the proposed approach.
极端组织或个人发动的恐怖袭击在世界范围内造成了灾难性后果。因此,恐怖主义风险评估在国家和国际安全中发挥着至关重要的作用。基于模糊推理的恐怖主义风险评估系统在打击可能涉及高度复杂情况的恐怖主义方面提供决策支持的巨大潜力。然而,缺乏专业知识通常会给配置系统带来挑战,否则,由于只有稀疏的规则库可用性,系统就无法评估可能发生攻击的可能性和风险。为了克服这类问题,可以采用层次模糊规则插值系统。不幸的是,情况可能会变得更加复杂,因为某些重要的先行值可能会丢失,这需要从已知(或假设)的结果中推断出来。为了解决一些潜在的问题,人们提出了关于后向模糊规则插值的初步理论工作。然而,在开发和应用一种集成的层次双向(前向/后向)模糊规则插值机制方面做得很少,这种机制是为适应恐怖主义风险评估的决策支持而定制的。本文提出了一种能够处理风险评估过程中动态和不充分信息的综合方法。特别是,实现所提出的技术的分层系统可以预测不同集中注意力部分发生恐怖袭击的可能性。它还可以通过执行反向推理来帮助识别在决策支持过程中可能有用的隐藏变量。最后给出了该系统的实验研究结果,证明了该方法的潜力和有效性。
{"title":"Terrorism risk assessment using hierarchical bidirectional fuzzy rule interpolation","authors":"Shangzhu Jin, Jike Ge, Jun Peng","doi":"10.1109/ICCI-CC.2016.7862068","DOIUrl":"https://doi.org/10.1109/ICCI-CC.2016.7862068","url":null,"abstract":"Terrorist attacks launched by extremist groups or individuals have caused catastrophic consequences worldwide. Terrorism risk assessment therefore plays a crucial role in national and international security. Fuzzy reasoning-based terrorism risk assessment systems offer a significant potential of providing decision support in combating terrorism, where highly complex situations may be involved. However, missing expertise often presents challenges for configuring systems that can otherwise assess the likelihood and risk of possible attacks due to the availability of only sparse rule bases. Hierarchical fuzzy rule interpolation systems may be adopted in order to overcome such problems. Unfortunately, situations can become more sophisticated because certain important antecedent values may be missing, which need to be inferred from the known (or hypothesised) consequences. Initial theoretical work on backward fuzzy rule interpolation has been proposed to cope with certain underlying problems. Nevertheless, little has been done in developing and applying an integrated hierarchical bidirectional (forward/backward) fuzzy rule interpolation mechanism that is tailored to suit decision support for terrorism risk assessment. This paper presents such an integrated approach that is capable of dealing with dynamic and insufficient information in the risk assessing process. In particular, the hierarchical system implementing the proposed techniques can predict the likelihood of terrorism attacks on different segments of focused attention. It also helps identify hidden variables that may be useful during the decision support process via performing reverse inference. The results of an experimental investigation of this implemented system are represented, demonstrating the potential and efficacy of the proposed approach.","PeriodicalId":135701,"journal":{"name":"2016 IEEE 15th International Conference on Cognitive Informatics & Cognitive Computing (ICCI*CC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127038766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Dynamic generation of dilemmas in virtual learning environments for non-technical skills training 在非技术技能培训虚拟学习环境中动态生成困境
Azzeddine Benabbou, D. Lourdeaux, D. Lenne
Critical situations are situations where a complementarity between technical and non-technical skills is crucial. Several critical dimensions characterize them. In order to train for such situations, simulation systems have to be able to generate scenarios where these dimensions are present in order to solicit one or several non-technical skills. In this paper we focus on one particular critical dimension which is the “Dilemma”. We present our approach for dynamically generating dilemma-based situations using activity and causality models.
危急情况是指技术和非技术技能互补至关重要的情况。它们有几个关键方面。为了针对这种情况进行培训,模拟系统必须能够生成存在这些维度的情景,以激发一种或几种非技术技能。在本文中,我们将重点讨论一个特殊的关键维度,即 "困境"。我们介绍了利用活动和因果关系模型动态生成基于困境的情境的方法。
{"title":"Dynamic generation of dilemmas in virtual learning environments for non-technical skills training","authors":"Azzeddine Benabbou, D. Lourdeaux, D. Lenne","doi":"10.1109/ICCI-CC.2016.7862040","DOIUrl":"https://doi.org/10.1109/ICCI-CC.2016.7862040","url":null,"abstract":"Critical situations are situations where a complementarity between technical and non-technical skills is crucial. Several critical dimensions characterize them. In order to train for such situations, simulation systems have to be able to generate scenarios where these dimensions are present in order to solicit one or several non-technical skills. In this paper we focus on one particular critical dimension which is the “Dilemma”. We present our approach for dynamically generating dilemma-based situations using activity and causality models.","PeriodicalId":135701,"journal":{"name":"2016 IEEE 15th International Conference on Cognitive Informatics & Cognitive Computing (ICCI*CC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131074924","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Performance of Licklider transmission protocol (LTP) in LEO-satellite communications with link disruptions 链路中断时Licklider传输协议(LTP)在leo卫星通信中的性能
Ding Wang
Near Earth missions ranging from low-Earth orbit (LEO) to Earth-Sun Lagrangian points will continue to be a majority of future space missions. A few works have been done with delay/disruption tolerant networking (DTN) technology for LEO-satellite communications and provided feasibility for its adoption in LEO space missions. However, no much work has been done to fully evaluate the performance of DTN in such an environment, especially in the presence of long link disruption, data corruption and loss, and link asymmetry. In this paper, we present an experimental performance evaluation of DTN architecture and protocol stack, with Licklider transmission protocol (LTP) serving as a convergence layer adapter (CLA) underneath bundle protocol (BP), in a typical LEO-satellite communication infrastructure accompanied by a very long link outage, various packet corruption and loss rates, and channel rate symmetry and asymmetry. The experiment was conducted by performing realistic file transfers over a PC-based test-bed.
从近地轨道(LEO)到地球-太阳拉格朗日点的近地任务将继续成为未来太空任务的主要内容。在低轨道卫星通信的容忍延迟/中断网络技术方面已经进行了一些工作,并为在低轨道空间任务中采用该技术提供了可行性。然而,在这种环境下,特别是在存在长链路中断、数据损坏和丢失以及链路不对称的情况下,对DTN的性能进行全面评估的工作还不多。在本文中,我们提出了DTN架构和协议栈的实验性能评估,其中Licklider传输协议(LTP)作为包协议(BP)下的汇聚层适配器(CLA),在典型的leo -卫星通信基础设施中,伴随很长的链路中断,各种数据包损坏和丢失率,以及信道速率对称和不对称。该实验是通过在基于pc的测试台上执行真实的文件传输来进行的。
{"title":"Performance of Licklider transmission protocol (LTP) in LEO-satellite communications with link disruptions","authors":"Ding Wang","doi":"10.1109/ICCI-CC.2016.7862028","DOIUrl":"https://doi.org/10.1109/ICCI-CC.2016.7862028","url":null,"abstract":"Near Earth missions ranging from low-Earth orbit (LEO) to Earth-Sun Lagrangian points will continue to be a majority of future space missions. A few works have been done with delay/disruption tolerant networking (DTN) technology for LEO-satellite communications and provided feasibility for its adoption in LEO space missions. However, no much work has been done to fully evaluate the performance of DTN in such an environment, especially in the presence of long link disruption, data corruption and loss, and link asymmetry. In this paper, we present an experimental performance evaluation of DTN architecture and protocol stack, with Licklider transmission protocol (LTP) serving as a convergence layer adapter (CLA) underneath bundle protocol (BP), in a typical LEO-satellite communication infrastructure accompanied by a very long link outage, various packet corruption and loss rates, and channel rate symmetry and asymmetry. The experiment was conducted by performing realistic file transfers over a PC-based test-bed.","PeriodicalId":135701,"journal":{"name":"2016 IEEE 15th International Conference on Cognitive Informatics & Cognitive Computing (ICCI*CC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122233343","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
期刊
2016 IEEE 15th International Conference on Cognitive Informatics & Cognitive Computing (ICCI*CC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1