首页 > 最新文献

2019 14th International Conference on Computer Engineering and Systems (ICCES)最新文献

英文 中文
States and Power Consumption Estimation for NILM NILM的状态和功耗估计
Pub Date : 2019-12-01 DOI: 10.1109/ICCES48960.2019.9068152
Neveen M. Hussein, A. Hesham, Mohsen A. Rashawn
This paper presents Nonintrusive Load Monitoring (NILM) for electrical home appliances network which consists of a known set of devices. Hidden Markov Model (HMM) is used for system modeling. The proposed method enhances determining and defining all states for each device. First we classify each device states into a set of states not only the ON and OFF states in the form of variations in its active power ranges. AMPDS collected dataset is used in training and testing for six selected home devices in a certain household and is also compared to GREEND dataset showing the advantage of the variable observed power readings with those of constant power readings. Each device has different number of states. Then the proposed mechanism is used to minimize these states after understanding the behavior of each state into OFF and ON states only. This method provides high accuracy on the system level, the device level, state inference, power and state sequence estimation.
本文提出了一种针对由一组已知设备组成的家电网络的非侵入式负荷监测方法。隐马尔可夫模型(HMM)用于系统建模。提出的方法增强了对每个设备的所有状态的确定和定义。首先,我们将每个器件的状态分为一组状态,而不仅仅是其有功功率范围变化形式的ON和OFF状态。AMPDS收集的数据集用于特定家庭中六个选定的家用设备的训练和测试,并与GREEND数据集进行了比较,显示了变量观测功率读数与恒定功率读数的优势。每个设备都有不同数量的状态。然后,在了解每个状态的行为后,使用所建议的机制将这些状态最小化,使其仅为OFF和ON状态。该方法在系统级、器件级、状态推断、功率和状态序列估计等方面具有较高的精度。
{"title":"States and Power Consumption Estimation for NILM","authors":"Neveen M. Hussein, A. Hesham, Mohsen A. Rashawn","doi":"10.1109/ICCES48960.2019.9068152","DOIUrl":"https://doi.org/10.1109/ICCES48960.2019.9068152","url":null,"abstract":"This paper presents Nonintrusive Load Monitoring (NILM) for electrical home appliances network which consists of a known set of devices. Hidden Markov Model (HMM) is used for system modeling. The proposed method enhances determining and defining all states for each device. First we classify each device states into a set of states not only the ON and OFF states in the form of variations in its active power ranges. AMPDS collected dataset is used in training and testing for six selected home devices in a certain household and is also compared to GREEND dataset showing the advantage of the variable observed power readings with those of constant power readings. Each device has different number of states. Then the proposed mechanism is used to minimize these states after understanding the behavior of each state into OFF and ON states only. This method provides high accuracy on the system level, the device level, state inference, power and state sequence estimation.","PeriodicalId":136643,"journal":{"name":"2019 14th International Conference on Computer Engineering and Systems (ICCES)","volume":"220 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128064807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Enhanced Machine Larning based Threat Hunter An Intelligent Network Intrusion Detection System 基于增强机器学习的威胁猎人智能网络入侵检测系统
Pub Date : 2019-12-01 DOI: 10.1109/ICCES48960.2019.9068160
Sayed Salah Ahmed Hasan, H. Mohamed, Ayman M. Bahaa-Eldin
In network security, there are many applications and techniques that can be used to maintain targets of high-level security such as confidentiality, integrity, availability, and nonrepudiation for safe communication between different sources. This can be done by supporting networks with security systems to thwart any chances of exploitations by any attacker. Intrusion Detection System (IDS) is one of the major systems as it is capable of monitoring all network traffics (ingoing and outgoing) and performs some analysis and inspection to evaluate the behavior of such traffics. IDS can block all suspicious activities that are trying to breach any network based on policies that are demanded by a system administrator. Traditional IDS has some limits and does not provide a complete solution for some kind of problems. IDS searches for potential abnormal activities on the network traffic and sometimes succeeds to find some vulnerability which may result in compromising the network. We, therefore, suggest an efficient application in this paper of Machine Learning (ML) based IDS.
在网络安全中,有许多应用程序和技术可用于维护高级别安全性目标,例如机密性、完整性、可用性和不可否认性,以实现不同来源之间的安全通信。这可以通过支持带有安全系统的网络来阻止任何攻击者利用的机会来实现。入侵检测系统(Intrusion Detection System, IDS)是主要的网络检测系统之一,它能够监控所有的网络流量(进出),并对这些流量进行分析和检测,以评估这些流量的行为。IDS可以根据系统管理员要求的策略阻止试图破坏任何网络的所有可疑活动。传统的IDS有一些限制,并且不能为某些问题提供完整的解决方案。IDS在网络流量中搜索潜在的异常活动,有时会成功发现一些可能导致网络危害的漏洞。因此,我们在本文中提出了基于机器学习(ML)的IDS的有效应用。
{"title":"An Enhanced Machine Larning based Threat Hunter An Intelligent Network Intrusion Detection System","authors":"Sayed Salah Ahmed Hasan, H. Mohamed, Ayman M. Bahaa-Eldin","doi":"10.1109/ICCES48960.2019.9068160","DOIUrl":"https://doi.org/10.1109/ICCES48960.2019.9068160","url":null,"abstract":"In network security, there are many applications and techniques that can be used to maintain targets of high-level security such as confidentiality, integrity, availability, and nonrepudiation for safe communication between different sources. This can be done by supporting networks with security systems to thwart any chances of exploitations by any attacker. Intrusion Detection System (IDS) is one of the major systems as it is capable of monitoring all network traffics (ingoing and outgoing) and performs some analysis and inspection to evaluate the behavior of such traffics. IDS can block all suspicious activities that are trying to breach any network based on policies that are demanded by a system administrator. Traditional IDS has some limits and does not provide a complete solution for some kind of problems. IDS searches for potential abnormal activities on the network traffic and sometimes succeeds to find some vulnerability which may result in compromising the network. We, therefore, suggest an efficient application in this paper of Machine Learning (ML) based IDS.","PeriodicalId":136643,"journal":{"name":"2019 14th International Conference on Computer Engineering and Systems (ICCES)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133729310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Framework for Video Transmission Scheduling Using Concurrent Multipath Transfer 基于并发多径传输的视频传输调度框架
Pub Date : 2019-12-01 DOI: 10.1109/ICCES48960.2019.9068150
Hatem Fetoh, Ahmad M. Hamad, K. M. Amin
Concurrent multipath scheduling aims to realize the highest efficiency of the network bandwidth utilization. However, concurrent multipath transfer confronts challenges such as long transmission delay, receiver buffer blocking, packet loss, and poor quality of service which significantly degrade the transmission performance in the network. To overcome these challenges, the proposed framework for adaptive scheduling of the concurrent multipath transfer is introduced. This proposed framework depends on the estimation of the bandwidth, path load, packet loss rate, and path delay for next transmissions. The estimation of the bandwidth, path load, packet loss rate, and path delay is based on the transmission information details which are sent from the receiver by the path map. Then, the path score based on the estimated bandwidth, path load, packet loss rate, and path delay is introduced for the best path selection of the next transmission. The simulation results show that the proposed framework improves throughput and reduces retransmission time-out.
并发多路径调度的目的是实现网络带宽的最高利用效率。然而,并发多径传输面临传输延迟长、接收端缓冲区阻塞、丢包和服务质量差等问题,严重影响了网络的传输性能。为了克服这些挑战,提出了一种并行多径传输的自适应调度框架。该框架基于对带宽、路径负载、丢包率和下一次传输的路径延迟的估计。带宽、路径负载、丢包率和路径延迟的估计是基于接收端通过路径映射发送的传输信息的细节。然后,引入基于估计带宽、路径负载、丢包率和路径延迟的路径评分,为下一次传输选择最佳路径。仿真结果表明,该框架提高了吞吐量,减少了重传超时。
{"title":"A Framework for Video Transmission Scheduling Using Concurrent Multipath Transfer","authors":"Hatem Fetoh, Ahmad M. Hamad, K. M. Amin","doi":"10.1109/ICCES48960.2019.9068150","DOIUrl":"https://doi.org/10.1109/ICCES48960.2019.9068150","url":null,"abstract":"Concurrent multipath scheduling aims to realize the highest efficiency of the network bandwidth utilization. However, concurrent multipath transfer confronts challenges such as long transmission delay, receiver buffer blocking, packet loss, and poor quality of service which significantly degrade the transmission performance in the network. To overcome these challenges, the proposed framework for adaptive scheduling of the concurrent multipath transfer is introduced. This proposed framework depends on the estimation of the bandwidth, path load, packet loss rate, and path delay for next transmissions. The estimation of the bandwidth, path load, packet loss rate, and path delay is based on the transmission information details which are sent from the receiver by the path map. Then, the path score based on the estimated bandwidth, path load, packet loss rate, and path delay is introduced for the best path selection of the next transmission. The simulation results show that the proposed framework improves throughput and reduces retransmission time-out.","PeriodicalId":136643,"journal":{"name":"2019 14th International Conference on Computer Engineering and Systems (ICCES)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116934866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Survey of Blockchain Applications in IoT Systems 区块链在物联网系统中的应用综述
Pub Date : 2019-12-01 DOI: 10.1109/ICCES48960.2019.9068170
Diaa A. Noby, Ahmed K. F. Khattab
This paper presents an extensive study of the different ways the Internet of Things (IoT) applications exploit the recently developed blockchain technology. Even though the blockchain technology was originally presented as a security mechanism, its numerous benefits such as decentralization, immutability, persistence, anonymity and auditability can be used by IoT systems in different ways. More specifically, we classify the ways IoT systems exploit blockchain into three categories: resource management, decentralized information sharing, and IoT security. The comprehensive study of the applications of the blockchain technology in the different IoT domains presented in this paper sheds the light on the future research directions in the integration of the two technologies.
本文对物联网(IoT)应用利用最新开发的区块链技术的不同方式进行了广泛研究。尽管区块链技术最初是作为一种安全机制提出的,但它的许多优点,如去中心化、不变性、持久性、匿名性和可审计性,可以被物联网系统以不同的方式使用。更具体地说,我们将物联网系统利用区块链的方式分为三类:资源管理、分散的信息共享和物联网安全。本文对区块链技术在不同物联网领域的应用进行了综合研究,揭示了两种技术融合的未来研究方向。
{"title":"A Survey of Blockchain Applications in IoT Systems","authors":"Diaa A. Noby, Ahmed K. F. Khattab","doi":"10.1109/ICCES48960.2019.9068170","DOIUrl":"https://doi.org/10.1109/ICCES48960.2019.9068170","url":null,"abstract":"This paper presents an extensive study of the different ways the Internet of Things (IoT) applications exploit the recently developed blockchain technology. Even though the blockchain technology was originally presented as a security mechanism, its numerous benefits such as decentralization, immutability, persistence, anonymity and auditability can be used by IoT systems in different ways. More specifically, we classify the ways IoT systems exploit blockchain into three categories: resource management, decentralized information sharing, and IoT security. The comprehensive study of the applications of the blockchain technology in the different IoT domains presented in this paper sheds the light on the future research directions in the integration of the two technologies.","PeriodicalId":136643,"journal":{"name":"2019 14th International Conference on Computer Engineering and Systems (ICCES)","volume":"284 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131417125","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Design and Implementation of a Multistage Image Compression and Reconstruction System Based on the Orthogonal Matching Pursuit Using FPGA 基于正交匹配追踪的多级图像压缩与重构系统的FPGA设计与实现
Pub Date : 2019-12-01 DOI: 10.1109/ICCES48960.2019.9068151
Mohamed M. Ahmed, Hassan Bedour, S. M. Hassan
Due to the vast developments in the media communication field and the quality of the visual imaging, image data compression has been one of the most interesting field. The main purpose of the image compression is to produce a very low bit rate while achieving a high quality of the reconstructed images. Image compression are used for all fields of media communication such as medical image recognition, multimedia, digital image processing. There are different algorithms for compression and reconstruction. One of these methods is the Orthogonal Matching Pursuit that is used mainly in the reconstruction of the radar signal. This paper discloses a new methodology for image compression and reconstruction to enhance the performance while at the same time reducing the bit data size. This kind of reconstruction algorithm is based upon multistage compression and OMP reconstruction. The Matlab Simulation and the FPGA implementation will be provided in this paper to validate the concept of this paper.
随着媒体通信领域的飞速发展和视觉成像质量的不断提高,图像数据压缩已成为人们关注的领域之一。图像压缩的主要目的是产生一个非常低的比特率,同时获得高质量的重建图像。图像压缩应用于医学图像识别、多媒体、数字图像处理等媒体通信的各个领域。有不同的压缩和重建算法。其中一种方法是正交匹配追踪,主要用于雷达信号的重建。本文提出了一种新的图像压缩和重建方法,以提高图像压缩和重建的性能,同时减少比特数据的大小。这种重构算法基于多级压缩和OMP重构。本文将提供Matlab仿真和FPGA实现来验证本文的概念。
{"title":"Design and Implementation of a Multistage Image Compression and Reconstruction System Based on the Orthogonal Matching Pursuit Using FPGA","authors":"Mohamed M. Ahmed, Hassan Bedour, S. M. Hassan","doi":"10.1109/ICCES48960.2019.9068151","DOIUrl":"https://doi.org/10.1109/ICCES48960.2019.9068151","url":null,"abstract":"Due to the vast developments in the media communication field and the quality of the visual imaging, image data compression has been one of the most interesting field. The main purpose of the image compression is to produce a very low bit rate while achieving a high quality of the reconstructed images. Image compression are used for all fields of media communication such as medical image recognition, multimedia, digital image processing. There are different algorithms for compression and reconstruction. One of these methods is the Orthogonal Matching Pursuit that is used mainly in the reconstruction of the radar signal. This paper discloses a new methodology for image compression and reconstruction to enhance the performance while at the same time reducing the bit data size. This kind of reconstruction algorithm is based upon multistage compression and OMP reconstruction. The Matlab Simulation and the FPGA implementation will be provided in this paper to validate the concept of this paper.","PeriodicalId":136643,"journal":{"name":"2019 14th International Conference on Computer Engineering and Systems (ICCES)","volume":"121 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116831883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Incipient Fault Detection of Electric Power Transformers Using Fuzzy Logic Based on Roger's and IEC Method 基于罗杰和IEC方法的模糊逻辑电力变压器早期故障检测
Pub Date : 2019-12-01 DOI: 10.1109/ICCES48960.2019.9068132
Fatma Mohamad, Khaled Hosny, T. Barakat
Power transformer is an essential part in any power plant, so continuous check of its reliability should be kept up. Dissolved Gas Analysis (DGA) is one of the most important techniques for detecting incipient faults of transformer that immersed in insulation oil. Some widely used conventional techniques based on DGA such as Roger's and IEC methods were developed to diagnose faults of power transformers. These methods succeeded noticeably to detect transformer's faults. However, they fail to detect the fault type if the measured ratios of gases slightly deviated from the crisp boundaries of ranges assigned by these methods. An Artificial Intelligent technique based method called fuzzy logic approach, which is the field of study in this paper is used to overcome the above mentioned drawback by fuzzifying the boundaries of ranges defined by these techniques. This paper presents a comparison between the results of conventional Roger's, IEC methods and the proposed fuzzy logic.
电力变压器是电厂的重要组成部分,必须对其可靠性进行持续检查。溶解气体分析(DGA)是检测浸在绝缘油中的变压器早期故障的重要技术之一。基于DGA的罗杰法和IEC法等常用的常规方法被用于电力变压器的故障诊断。这些方法在变压器故障检测中取得了显著的成功。但是,如果测量到的气体比率稍微偏离这些方法所确定的范围的清晰边界,它们就不能检测到断层类型。本文研究的领域是一种基于人工智能技术的模糊逻辑方法,通过模糊化这些技术所定义的范围的边界来克服上述缺点。本文将传统的罗杰方法、IEC方法与所提出的模糊逻辑的结果进行了比较。
{"title":"Incipient Fault Detection of Electric Power Transformers Using Fuzzy Logic Based on Roger's and IEC Method","authors":"Fatma Mohamad, Khaled Hosny, T. Barakat","doi":"10.1109/ICCES48960.2019.9068132","DOIUrl":"https://doi.org/10.1109/ICCES48960.2019.9068132","url":null,"abstract":"Power transformer is an essential part in any power plant, so continuous check of its reliability should be kept up. Dissolved Gas Analysis (DGA) is one of the most important techniques for detecting incipient faults of transformer that immersed in insulation oil. Some widely used conventional techniques based on DGA such as Roger's and IEC methods were developed to diagnose faults of power transformers. These methods succeeded noticeably to detect transformer's faults. However, they fail to detect the fault type if the measured ratios of gases slightly deviated from the crisp boundaries of ranges assigned by these methods. An Artificial Intelligent technique based method called fuzzy logic approach, which is the field of study in this paper is used to overcome the above mentioned drawback by fuzzifying the boundaries of ranges defined by these techniques. This paper presents a comparison between the results of conventional Roger's, IEC methods and the proposed fuzzy logic.","PeriodicalId":136643,"journal":{"name":"2019 14th International Conference on Computer Engineering and Systems (ICCES)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116719121","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Proceedings ICCES 2019 14th International Conference on Computer Engineering and Systems (ICCES) 第14届计算机工程与系统国际会议(ICCES)
Pub Date : 2019-12-01 DOI: 10.1109/icces48960.2019.9068127
Ashraf Salem, H. Abbas, M. El-Kharashi, Ayman M. Bahaa El-Din, Mohamad Taher
{"title":"Proceedings ICCES 2019 14th International Conference on Computer Engineering and Systems (ICCES)","authors":"Ashraf Salem, H. Abbas, M. El-Kharashi, Ayman M. Bahaa El-Din, Mohamad Taher","doi":"10.1109/icces48960.2019.9068127","DOIUrl":"https://doi.org/10.1109/icces48960.2019.9068127","url":null,"abstract":"","PeriodicalId":136643,"journal":{"name":"2019 14th International Conference on Computer Engineering and Systems (ICCES)","volume":"320 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121838937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Low-Cost Traffic Control using Reinforcement Learning 基于强化学习的低成本交通控制
Pub Date : 2019-12-01 DOI: 10.1109/ICCES48960.2019.9068125
Ahmed F. AbouElhamayed, Hani M. K. Mahdi, Cherif R. Salama
Solving the traffic congestion problem has many benefits financially and environmentally. The application of Artificial Intelligence to solving the traffic congestion problem has been going on for a while. However, most of the current research in this area depends on knowing lots of information about all vehicles in the network. While it produces promising results, applying these techniques in the current world is not easy. In this paper, we apply reinforcement learning to the field of traffic control under the assumption that only minimal information is available. Our approach produces results that are better than currently deployed fixed-time traffic lights without having heavy requirements. In our first test configuration, our agent's waiting time is 82.3% of the best fixed-time traffic lights' waiting time and the average CO2 emissions produced by our agent is 97.5% of the emissions produced by the best fixed-time traffic lights. This shows the potential of applying reinforcement learning to the traffic control problem with limited state.
解决交通拥堵问题在经济上和环境上都有很多好处。应用人工智能来解决交通拥堵问题已经有一段时间了。然而,目前该领域的大部分研究都依赖于对网络中所有车辆的大量信息的了解。虽然它产生了有希望的结果,但在当今世界应用这些技术并不容易。在本文中,我们将强化学习应用于交通控制领域,假设只有最小的信息可用。我们的方法产生的结果比目前部署的固定时间交通灯更好,而且没有太多的要求。在我们的第一个测试配置中,我们agent的等待时间是最佳定时交通灯等待时间的82.3%,我们agent的平均CO2排放量是最佳定时交通灯排放的97.5%。这显示了将强化学习应用于有限状态交通控制问题的潜力。
{"title":"Low-Cost Traffic Control using Reinforcement Learning","authors":"Ahmed F. AbouElhamayed, Hani M. K. Mahdi, Cherif R. Salama","doi":"10.1109/ICCES48960.2019.9068125","DOIUrl":"https://doi.org/10.1109/ICCES48960.2019.9068125","url":null,"abstract":"Solving the traffic congestion problem has many benefits financially and environmentally. The application of Artificial Intelligence to solving the traffic congestion problem has been going on for a while. However, most of the current research in this area depends on knowing lots of information about all vehicles in the network. While it produces promising results, applying these techniques in the current world is not easy. In this paper, we apply reinforcement learning to the field of traffic control under the assumption that only minimal information is available. Our approach produces results that are better than currently deployed fixed-time traffic lights without having heavy requirements. In our first test configuration, our agent's waiting time is 82.3% of the best fixed-time traffic lights' waiting time and the average CO2 emissions produced by our agent is 97.5% of the emissions produced by the best fixed-time traffic lights. This shows the potential of applying reinforcement learning to the traffic control problem with limited state.","PeriodicalId":136643,"journal":{"name":"2019 14th International Conference on Computer Engineering and Systems (ICCES)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121857293","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deep Architectures for Abstractive Text Summarization in Multiple Languages 多语言抽象文本摘要的深度体系结构
Pub Date : 2019-12-01 DOI: 10.1109/ICCES48960.2019.9068171
Amr M. Zaki, M. Khalil, Hazem M. Abbas
Abstractive text summarization is the task of generating a novel summary given an article, not by merely extracting and selecting text to produce a summary, but by actually creating and understating the given text to produce a summary. LSTM seq2seq encoder-decoder with attention models have proved successful in this task, but they suffer from some problems. In this work, we would go through multiple models to try and solve these problems, beginning with simple seq2seq with attention models to going to Pointer-Generator, to using a curriculum learning approach called Scheduled-Sampling, till we reach the new approaches of combining reinforcement learning with seq2seq. We have applied these models on multiple datasets for multiple languages, English and Arabic. We have also introduced a new novel method of working with agglutinative languages, it is a preprocessing technique that is applied to the dataset which increases the relevancy of the vocabulary, which effectively increases the efficiency of the text summarization without modifying the models, we call this technique advanced cleaning, we have applied it to the Arabic dataset, and it can then be applied to any other agglutinative language. We have built these models in Jupiter notebooks to run seamlessly on Google colaboratory.11https://medium.com/@theamrzaki22https://github.com/theamrzaki/text_summurization_abstractive_methods
抽象文本摘要是为给定的文章生成新颖摘要的任务,不是仅仅通过提取和选择文本来生成摘要,而是通过实际创建和理解给定的文本来生成摘要。基于注意力模型的LSTM seq2seq编码器在此任务中取得了成功,但存在一些问题。在这项工作中,我们将通过多个模型来尝试解决这些问题,从带有注意力模型的简单seq2seq开始,到使用指针生成器,再到使用称为调度采样的课程学习方法,直到我们达到将强化学习与seq2seq相结合的新方法。我们已经将这些模型应用于多种语言(英语和阿拉伯语)的多个数据集。我们还引入了一种新的处理黏着语言的方法,它是一种应用于数据集的预处理技术,它增加了词汇的相关性,在不修改模型的情况下有效地提高了文本摘要的效率,我们称这种技术为高级清洗,我们已经将其应用于阿拉伯语数据集,然后它可以应用于任何其他黏着语言。我们已经在Jupiter笔记本电脑中构建了这些模型,以便在谷歌collaborabory.11https://medium.com/@theamrzaki22https://github.com/theamrzaki/text_summurization_abstractive_methods上无缝运行
{"title":"Deep Architectures for Abstractive Text Summarization in Multiple Languages","authors":"Amr M. Zaki, M. Khalil, Hazem M. Abbas","doi":"10.1109/ICCES48960.2019.9068171","DOIUrl":"https://doi.org/10.1109/ICCES48960.2019.9068171","url":null,"abstract":"Abstractive text summarization is the task of generating a novel summary given an article, not by merely extracting and selecting text to produce a summary, but by actually creating and understating the given text to produce a summary. LSTM seq2seq encoder-decoder with attention models have proved successful in this task, but they suffer from some problems. In this work, we would go through multiple models to try and solve these problems, beginning with simple seq2seq with attention models to going to Pointer-Generator, to using a curriculum learning approach called Scheduled-Sampling, till we reach the new approaches of combining reinforcement learning with seq2seq. We have applied these models on multiple datasets for multiple languages, English and Arabic. We have also introduced a new novel method of working with agglutinative languages, it is a preprocessing technique that is applied to the dataset which increases the relevancy of the vocabulary, which effectively increases the efficiency of the text summarization without modifying the models, we call this technique advanced cleaning, we have applied it to the Arabic dataset, and it can then be applied to any other agglutinative language. We have built these models in Jupiter notebooks to run seamlessly on Google colaboratory.11https://medium.com/@theamrzaki22https://github.com/theamrzaki/text_summurization_abstractive_methods","PeriodicalId":136643,"journal":{"name":"2019 14th International Conference on Computer Engineering and Systems (ICCES)","volume":"223 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131546681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Design and Implementation of Robust Firefighting/Intruder Detection System Using Fuzzy Logic Decision Control (FIDFUZ) 基于模糊决策控制(FIDFUZ)的鲁棒消防/入侵检测系统设计与实现
Pub Date : 2019-12-01 DOI: 10.1109/ICCES48960.2019.9068159
Marianne A. Azer, A. Elshafee
This research focuses on using quantifiable methods for using the IoT as a main support to firefighting/intruder detection. From our research, we have found numerous researches associated to supplying remote services by means of portable sensors and communication technologies. We represent in our research a unique Smart Firefighting/lntruder Detection System with the support of Fuzzy Logic Decision Control (FIDFUZ). The projected system has an innovative value which is the Fuzzy Logic Decision Support System application that deals with the predicted inaccuracy and the doubt in the sensor's information acquired, as well as minimizing the rate of false positive and true negative. FIDFUZ full architecture is presented, applied and checked by simulation and using real data.
本研究的重点是使用可量化的方法,将物联网作为消防/入侵者检测的主要支持。从我们的研究中,我们发现了许多与通过便携式传感器和通信技术提供远程服务相关的研究。在我们的研究中,我们提出了一种独特的基于模糊决策控制(FIDFUZ)的智能消防/入侵检测系统。该预测系统具有创新价值,是模糊逻辑决策支持系统的应用,它能处理预测的不准确性和传感器获取的信息中的疑点,并最大限度地降低假阳性和真阴性的概率。给出了FIDFUZ的完整体系结构,并通过仿真和实际数据进行了验证。
{"title":"Design and Implementation of Robust Firefighting/Intruder Detection System Using Fuzzy Logic Decision Control (FIDFUZ)","authors":"Marianne A. Azer, A. Elshafee","doi":"10.1109/ICCES48960.2019.9068159","DOIUrl":"https://doi.org/10.1109/ICCES48960.2019.9068159","url":null,"abstract":"This research focuses on using quantifiable methods for using the IoT as a main support to firefighting/intruder detection. From our research, we have found numerous researches associated to supplying remote services by means of portable sensors and communication technologies. We represent in our research a unique Smart Firefighting/lntruder Detection System with the support of Fuzzy Logic Decision Control (FIDFUZ). The projected system has an innovative value which is the Fuzzy Logic Decision Support System application that deals with the predicted inaccuracy and the doubt in the sensor's information acquired, as well as minimizing the rate of false positive and true negative. FIDFUZ full architecture is presented, applied and checked by simulation and using real data.","PeriodicalId":136643,"journal":{"name":"2019 14th International Conference on Computer Engineering and Systems (ICCES)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128330582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2019 14th International Conference on Computer Engineering and Systems (ICCES)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1