首页 > 最新文献

2014 14th International Conference on Hybrid Intelligent Systems最新文献

英文 中文
Hybrid intelligent approach to diagnose multiple faults in complex systems 复杂系统多故障诊断的混合智能方法
Pub Date : 2014-12-01 DOI: 10.1109/HIS.2014.7086204
I. Fliss, M. Tagina
The presence of faults in complex systems can cause serious damage and even generate fatal situations. Proper and timely diagnosis of behavior of such systems is then crucial to detect the presence of eventual faults and isolate their causes. In this context, this paper describes a new intelligent approach to diagnose multiple faults in complex systems. This approach is based on the combination of a fuzzy system optimized by cultural algorithm and causal reasoning. The ongoing experiments focus on a simulation of the three-tank hydraulic system, a benchmark in the diagnosis domain.
在复杂的系统中,故障的存在会造成严重的破坏,甚至产生致命的情况。因此,对这些系统的行为进行适当和及时的诊断对于检测最终故障的存在并隔离其原因至关重要。在此背景下,本文提出了一种新的复杂系统多故障智能诊断方法。该方法将文化算法优化的模糊系统与因果推理相结合。正在进行的实验主要集中在三油箱液压系统的仿真上,这是诊断领域的一个基准。
{"title":"Hybrid intelligent approach to diagnose multiple faults in complex systems","authors":"I. Fliss, M. Tagina","doi":"10.1109/HIS.2014.7086204","DOIUrl":"https://doi.org/10.1109/HIS.2014.7086204","url":null,"abstract":"The presence of faults in complex systems can cause serious damage and even generate fatal situations. Proper and timely diagnosis of behavior of such systems is then crucial to detect the presence of eventual faults and isolate their causes. In this context, this paper describes a new intelligent approach to diagnose multiple faults in complex systems. This approach is based on the combination of a fuzzy system optimized by cultural algorithm and causal reasoning. The ongoing experiments focus on a simulation of the three-tank hydraulic system, a benchmark in the diagnosis domain.","PeriodicalId":161103,"journal":{"name":"2014 14th International Conference on Hybrid Intelligent Systems","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126441797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Emotion recognition using features distances classified by wavelets network and trained by fast wavelets transform 基于小波网络分类和快速小波变换训练的特征距离情感识别
Pub Date : 2014-12-01 DOI: 10.1109/HIS.2014.7086205
Rim Afdhal, R. Ejbali, M. Zaied, C. Amar
This paper focuses on the issue of emotion recognition. It describes an emotion recognition system based on facial expression which contains four steps: detection of face's elements, localization of feature points, their tracking during a movie and facial expression classification. The first step is realized by the famous Viola and Jones algorithm. To localize feature points we have developed an automatic and easy method. To track them we used the optical flow. Finally the classification step is based on wavelet network using Fast Wavelet Transform FWT. The experimental results demonstrated the efficiency of our system.
本文主要研究情感识别问题。描述了一种基于面部表情的情感识别系统,该系统包括四个步骤:人脸元素的检测、特征点的定位、特征点在电影中的跟踪和面部表情分类。第一步由著名的Viola和Jones算法实现。为了实现特征点的自动定位,我们开发了一种简单易行的方法。为了追踪它们,我们使用了光流。最后是基于小波网络的快速小波变换。实验结果证明了系统的有效性。
{"title":"Emotion recognition using features distances classified by wavelets network and trained by fast wavelets transform","authors":"Rim Afdhal, R. Ejbali, M. Zaied, C. Amar","doi":"10.1109/HIS.2014.7086205","DOIUrl":"https://doi.org/10.1109/HIS.2014.7086205","url":null,"abstract":"This paper focuses on the issue of emotion recognition. It describes an emotion recognition system based on facial expression which contains four steps: detection of face's elements, localization of feature points, their tracking during a movie and facial expression classification. The first step is realized by the famous Viola and Jones algorithm. To localize feature points we have developed an automatic and easy method. To track them we used the optical flow. Finally the classification step is based on wavelet network using Fast Wavelet Transform FWT. The experimental results demonstrated the efficiency of our system.","PeriodicalId":161103,"journal":{"name":"2014 14th International Conference on Hybrid Intelligent Systems","volume":"166 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134315884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Three practical attacks against ZigBee security: Attack scenario definitions, practical experiments, countermeasures, and lessons learned 针对ZigBee安全的三种实际攻击:攻击场景定义、实际实验、对策和经验教训
Pub Date : 2014-12-01 DOI: 10.1109/HIS.2014.7086198
Olayemi Olawumi, Keijo Haataja, Mikko Asikainen, Niko Vidgren, Pekka J. Toivanen
In this paper, three practical attacks against ZigBee security are carried out in our laboratory environment. The attack scenarios are based on utilizing several vulnerabilities found from the main security components of ZigBee technology. The first attack is based on discovering all ZigBee-enabled networks within range as well as the configurations of the corresponding ZigBee-enabled devices: This vital and fundamental basic information can be used for performing further and more severe attacks against the discovered ZigBee-enabled devices/networks. The second attack can be seen as an extension to the first attack and thus the prerequisite for it is the successful completion of the first attack. In the second attack, an attacker eavesdrops on the unencrypted or encrypted traffic of a ZigBee-enabled network in order to obtain and utilize any sensitive/useful information. The third attack is based on replaying (re-transmitting) the captured data as if the original sender is sending the data again. To keep this attack extremely simple, straightforward, and practical, we decided to devise and implement it without having a Man-In-The-Middle (MITM) between the victim devices, since the presence of the MITM would have made the attack very difficult to implement in practice, thus giving it only a theoretical relevance. Indeed, we demonstrate with experimental figures that attacks against ZigBee-enabled devices become practical by using our three attack scenarios. In addition, countermeasures that render the attacks impractical, although not totally eliminating their potential danger, are devised. Moreover, some new ideas that will be used in our future research work are proposed.
本文在实验室环境下对ZigBee安全进行了三种实际的攻击。攻击场景基于利用从ZigBee技术的主要安全组件中发现的几个漏洞。第一种攻击是基于发现范围内所有支持zigbee的网络以及相应的支持zigbee的设备的配置:这些重要和基本的基本信息可用于对发现的支持zigbee的设备/网络进行进一步和更严重的攻击。第二次攻击可以看作是第一次攻击的延伸,因此第二次攻击的先决条件是第一次攻击的成功完成。在第二种攻击中,攻击者窃听支持zigbee的网络的未加密或加密流量,以获取和利用任何敏感/有用的信息。第三种攻击是基于重放(重新传输)捕获的数据,就好像原始发送方再次发送数据一样。为了使这种攻击非常简单、直接和实用,我们决定在受害者设备之间不使用中间人(MITM)的情况下设计和实现它,因为MITM的存在会使攻击在实践中很难实现,从而只给它一个理论相关性。实际上,我们用实验数据证明,通过使用我们的三种攻击场景,针对支持zigbee的设备的攻击变得切实可行。此外,还设计了使攻击变得不切实际的对策,尽管不能完全消除其潜在危险。最后,对今后的研究工作提出了一些新的思路。
{"title":"Three practical attacks against ZigBee security: Attack scenario definitions, practical experiments, countermeasures, and lessons learned","authors":"Olayemi Olawumi, Keijo Haataja, Mikko Asikainen, Niko Vidgren, Pekka J. Toivanen","doi":"10.1109/HIS.2014.7086198","DOIUrl":"https://doi.org/10.1109/HIS.2014.7086198","url":null,"abstract":"In this paper, three practical attacks against ZigBee security are carried out in our laboratory environment. The attack scenarios are based on utilizing several vulnerabilities found from the main security components of ZigBee technology. The first attack is based on discovering all ZigBee-enabled networks within range as well as the configurations of the corresponding ZigBee-enabled devices: This vital and fundamental basic information can be used for performing further and more severe attacks against the discovered ZigBee-enabled devices/networks. The second attack can be seen as an extension to the first attack and thus the prerequisite for it is the successful completion of the first attack. In the second attack, an attacker eavesdrops on the unencrypted or encrypted traffic of a ZigBee-enabled network in order to obtain and utilize any sensitive/useful information. The third attack is based on replaying (re-transmitting) the captured data as if the original sender is sending the data again. To keep this attack extremely simple, straightforward, and practical, we decided to devise and implement it without having a Man-In-The-Middle (MITM) between the victim devices, since the presence of the MITM would have made the attack very difficult to implement in practice, thus giving it only a theoretical relevance. Indeed, we demonstrate with experimental figures that attacks against ZigBee-enabled devices become practical by using our three attack scenarios. In addition, countermeasures that render the attacks impractical, although not totally eliminating their potential danger, are devised. Moreover, some new ideas that will be used in our future research work are proposed.","PeriodicalId":161103,"journal":{"name":"2014 14th International Conference on Hybrid Intelligent Systems","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134538192","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 68
Research of customer behavior anomalies in big financial data 金融大数据中的客户行为异常研究
Pub Date : 2014-12-01 DOI: 10.1109/HIS.2014.7086178
D. Kriksciuniene, Marius Liutvinavicius, V. Sakalauskas, Darius Tamasauskas
The amount of data in financial institutions is growing rapidly and the subject of “big data” has become an urgent trend. The “big data” phenomenon brings challenge to empower analytical methods for enhanced scope. At the same time the big data composed from various sources opens new possibilities to capitalize data research. The article investigates the anomalies in big data used by financial institutions. It proposes the model designed for exploring dynamics and detecting anomalous behavior of bank customers. The experimental screening on bank customers' big data shows significant time and necessary calculation steps reduction for detecting suspicious operations.
金融机构的数据量快速增长,“大数据”主题已成为一个紧迫的趋势。“大数据”现象给分析方法带来了挑战,使其具有更大的范围。同时,各种来源的大数据为数据研究的资本化提供了新的可能性。本文调查了金融机构使用的大数据中的异常现象。提出了用于银行客户动态探索和异常行为检测的模型。通过对银行客户大数据的实验筛选,发现可疑操作的时间和必要的计算步骤大大减少。
{"title":"Research of customer behavior anomalies in big financial data","authors":"D. Kriksciuniene, Marius Liutvinavicius, V. Sakalauskas, Darius Tamasauskas","doi":"10.1109/HIS.2014.7086178","DOIUrl":"https://doi.org/10.1109/HIS.2014.7086178","url":null,"abstract":"The amount of data in financial institutions is growing rapidly and the subject of “big data” has become an urgent trend. The “big data” phenomenon brings challenge to empower analytical methods for enhanced scope. At the same time the big data composed from various sources opens new possibilities to capitalize data research. The article investigates the anomalies in big data used by financial institutions. It proposes the model designed for exploring dynamics and detecting anomalous behavior of bank customers. The experimental screening on bank customers' big data shows significant time and necessary calculation steps reduction for detecting suspicious operations.","PeriodicalId":161103,"journal":{"name":"2014 14th International Conference on Hybrid Intelligent Systems","volume":"243 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114579087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Using personas for supporting user modeling on scheduling systems 使用角色来支持调度系统上的用户建模
Pub Date : 2014-12-01 DOI: 10.1109/HIS.2014.7086212
A. Madureira, Bruno Cunha, J. Pereira, S. Gomes, I. Pereira, Jorge M. Santos, A. Abraham
User modeling and user adaptive interaction has become a central research issue to understand users as they interact with technology. The importance of the development of well adapted interfaces to several kinds of users and the differences that characterize them is the basis of the successful interaction. User Personas is a technique that allows the discovery and definition of the archetype users of a system. With that knowledge, the system should shape itself, inferring the user expertise to provide its users with the best possible experience. In this paper, an architecture that combines User Personas and a dynamic, evolving system is proposed, along with an evaluation by its target users. The proposed system is able to infer the user and its matching Persona, and keeps shaping itself in parallel with the user's discovery of the system.
用户建模和用户自适应交互已经成为理解用户与技术交互的核心研究问题。开发适合不同类型用户的界面的重要性及其特征的差异是成功交互的基础。用户角色是一种允许发现和定义系统原型用户的技术。有了这些知识,系统应该塑造自己,推断用户的专业知识,为用户提供最好的体验。在本文中,提出了一种结合了用户角色和动态的、不断发展的系统的体系结构,并由其目标用户进行评估。所提出的系统能够推断用户及其匹配的Persona,并随着用户对系统的发现而不断塑造自己。
{"title":"Using personas for supporting user modeling on scheduling systems","authors":"A. Madureira, Bruno Cunha, J. Pereira, S. Gomes, I. Pereira, Jorge M. Santos, A. Abraham","doi":"10.1109/HIS.2014.7086212","DOIUrl":"https://doi.org/10.1109/HIS.2014.7086212","url":null,"abstract":"User modeling and user adaptive interaction has become a central research issue to understand users as they interact with technology. The importance of the development of well adapted interfaces to several kinds of users and the differences that characterize them is the basis of the successful interaction. User Personas is a technique that allows the discovery and definition of the archetype users of a system. With that knowledge, the system should shape itself, inferring the user expertise to provide its users with the best possible experience. In this paper, an architecture that combines User Personas and a dynamic, evolving system is proposed, along with an evaluation by its target users. The proposed system is able to infer the user and its matching Persona, and keeps shaping itself in parallel with the user's discovery of the system.","PeriodicalId":161103,"journal":{"name":"2014 14th International Conference on Hybrid Intelligent Systems","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127548185","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Designing of Beta Basis Function Neural Network for optimization using cuckoo search (CS) 基于布谷鸟搜索优化的β基函数神经网络设计
Pub Date : 2014-12-01 DOI: 10.1109/HIS.2014.7086182
Habib Dhahri, A. Alimi, A. Abraham
In this paper, we apply the Beta Basis Function Neural Network (BBFNN) trained with cuckoo search (CS) for time series predictions. The cuckoo search algorithm optimizes the network parameters. In order to evaluate the effectiveness of the proposed method, we have carried out some experiments on four data sets: Mackey Glass, Lorenz attractor, Henon map and Box-Jenkins. We give also simulation examples to compare the effectiveness of the model with the other known methods in the literature. The results show that the CS-BBFNN model produces a better generalization performance.
在本文中,我们应用布谷鸟搜索(CS)训练的β基函数神经网络(BBFNN)进行时间序列预测。布谷鸟搜索算法优化网络参数。为了评估所提出方法的有效性,我们在四个数据集上进行了实验:Mackey Glass、Lorenz吸引子、Henon map和Box-Jenkins。我们还给出了仿真实例,以比较该模型与文献中其他已知方法的有效性。结果表明,CS-BBFNN模型具有较好的泛化性能。
{"title":"Designing of Beta Basis Function Neural Network for optimization using cuckoo search (CS)","authors":"Habib Dhahri, A. Alimi, A. Abraham","doi":"10.1109/HIS.2014.7086182","DOIUrl":"https://doi.org/10.1109/HIS.2014.7086182","url":null,"abstract":"In this paper, we apply the Beta Basis Function Neural Network (BBFNN) trained with cuckoo search (CS) for time series predictions. The cuckoo search algorithm optimizes the network parameters. In order to evaluate the effectiveness of the proposed method, we have carried out some experiments on four data sets: Mackey Glass, Lorenz attractor, Henon map and Box-Jenkins. We give also simulation examples to compare the effectiveness of the model with the other known methods in the literature. The results show that the CS-BBFNN model produces a better generalization performance.","PeriodicalId":161103,"journal":{"name":"2014 14th International Conference on Hybrid Intelligent Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127586968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Hybrid method for active authentication using keystroke dynamics 使用击键动力学进行主动身份验证的混合方法
Pub Date : 2014-12-01 DOI: 10.1109/HIS.2014.7086173
V. Kaganov, A. Korolyov, M. Krylov, I. Mashechkin, M. Petrovskiy
Nowadays there is a growing interest to active authentication methods in security society. These methods are used for user identity validation with behavioral biometrics such as keystroke or mouse moving dynamics. In this article a new hybrid method for active authentication using keystroke dynamics is presented. This method is a combination of a new keystroke data representation model based on potential functions and machine learning algorithms based on decision trees. The proposed method is tested in static and dynamic authentication scenarios on the benchmark Si6 dataset and datasets collected by the authors. The experimental results confirm that the proposed hybrid method is applicable to reallife authentication systems.
目前,安全学界对主动认证方法越来越感兴趣。这些方法用于使用行为生物识别技术(如击键或鼠标移动动态)验证用户身份。本文提出了一种新的基于击键动力学的混合主动认证方法。该方法结合了一种新的基于势函数的击键数据表示模型和基于决策树的机器学习算法。在Si6基准数据集和作者收集的数据集上对所提出的方法进行了静态和动态认证场景的测试。实验结果表明,该混合方法适用于现实生活中的认证系统。
{"title":"Hybrid method for active authentication using keystroke dynamics","authors":"V. Kaganov, A. Korolyov, M. Krylov, I. Mashechkin, M. Petrovskiy","doi":"10.1109/HIS.2014.7086173","DOIUrl":"https://doi.org/10.1109/HIS.2014.7086173","url":null,"abstract":"Nowadays there is a growing interest to active authentication methods in security society. These methods are used for user identity validation with behavioral biometrics such as keystroke or mouse moving dynamics. In this article a new hybrid method for active authentication using keystroke dynamics is presented. This method is a combination of a new keystroke data representation model based on potential functions and machine learning algorithms based on decision trees. The proposed method is tested in static and dynamic authentication scenarios on the benchmark Si6 dataset and datasets collected by the authors. The experimental results confirm that the proposed hybrid method is applicable to reallife authentication systems.","PeriodicalId":161103,"journal":{"name":"2014 14th International Conference on Hybrid Intelligent Systems","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121099082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Simultaneous optimization of neural network weights and active nodes using metaheuristics 基于元启发式的神经网络权值和活动节点同步优化
Pub Date : 2014-12-01 DOI: 10.1109/HIS.2014.7086207
Varun Ojha, A. Abraham, V. Snás̃el
Optimization of neural network (NN) is significantly influenced by the transfer function used in its active nodes. It has been observed that the homogeneity in the activation nodes does not provide the best solution. Therefore, the customizable transfer functions whose underlying parameters are subjected to optimization were used to provide heterogeneity to NN. For experimental purposes, a meta-heuristic framework using a combined genotype representation of connection weights and transfer function parameter was used. The performance of adaptive Logistic, Tangent-hyperbolic, Gaussian and Beta functions were analyzed. Concise comparisons between different transfer function and between the NN optimization algorithms are presented. The comprehensive analysis of the results obtained over the benchmark dataset suggests that the Artificial Bee Colony with adaptive transfer function provides the best results in terms of classification accuracy over the particle swarm optimization and differential evolution algorithms.
神经网络活动节点的传递函数对网络的优化有很大的影响。已经观察到,激活节点的均匀性并不能提供最佳解决方案。因此,使用可定制的传递函数,其底层参数经过优化,为神经网络提供异构性。为了实验目的,使用了连接权和传递函数参数的组合基因型表示的元启发式框架。分析了自适应Logistic函数、正切双曲函数、高斯函数和Beta函数的性能。简要比较了不同传递函数和不同神经网络优化算法之间的关系。综合分析基准数据集的结果表明,具有自适应传递函数的人工蜂群在分类精度方面优于粒子群优化算法和差分进化算法。
{"title":"Simultaneous optimization of neural network weights and active nodes using metaheuristics","authors":"Varun Ojha, A. Abraham, V. Snás̃el","doi":"10.1109/HIS.2014.7086207","DOIUrl":"https://doi.org/10.1109/HIS.2014.7086207","url":null,"abstract":"Optimization of neural network (NN) is significantly influenced by the transfer function used in its active nodes. It has been observed that the homogeneity in the activation nodes does not provide the best solution. Therefore, the customizable transfer functions whose underlying parameters are subjected to optimization were used to provide heterogeneity to NN. For experimental purposes, a meta-heuristic framework using a combined genotype representation of connection weights and transfer function parameter was used. The performance of adaptive Logistic, Tangent-hyperbolic, Gaussian and Beta functions were analyzed. Concise comparisons between different transfer function and between the NN optimization algorithms are presented. The comprehensive analysis of the results obtained over the benchmark dataset suggests that the Artificial Bee Colony with adaptive transfer function provides the best results in terms of classification accuracy over the particle swarm optimization and differential evolution algorithms.","PeriodicalId":161103,"journal":{"name":"2014 14th International Conference on Hybrid Intelligent Systems","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126213384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Query sound-by-example video retrieval framework 查询逐例视频检索框架
Pub Date : 2014-12-01 DOI: 10.1109/HIS.2014.7086165
Issam Feki, A. Ammar, A. Alimi
In this paper, query sound-by-example video retrieval framework based on audio concepts is presented. First, audio stream extracted from movies in the database is set into orientation clusters using an unsupervised segmentation technique. Audio signals admit a new proposed particular pretreatment process to distinguish audio concepts. This is used for indexing the video data. Second, the query asked by the user, in sound signal form, is treated. Finally, a specific retrieval function is used to obtain video shot containing the sound of query. Objective evaluation reached 89% retrieval performance.
本文提出了一种基于音频概念的逐例查询视频检索框架。首先,使用无监督分割技术将从数据库中提取的音频流设置为方向聚类。音频信号采用了一种新的预处理方法来区分音频概念。这是用于索引视频数据。其次,处理用户以声音信号形式提出的查询。最后,使用特定的检索函数获取包含查询声音的视频镜头。客观评价检索效能达89%。
{"title":"Query sound-by-example video retrieval framework","authors":"Issam Feki, A. Ammar, A. Alimi","doi":"10.1109/HIS.2014.7086165","DOIUrl":"https://doi.org/10.1109/HIS.2014.7086165","url":null,"abstract":"In this paper, query sound-by-example video retrieval framework based on audio concepts is presented. First, audio stream extracted from movies in the database is set into orientation clusters using an unsupervised segmentation technique. Audio signals admit a new proposed particular pretreatment process to distinguish audio concepts. This is used for indexing the video data. Second, the query asked by the user, in sound signal form, is treated. Finally, a specific retrieval function is used to obtain video shot containing the sound of query. Objective evaluation reached 89% retrieval performance.","PeriodicalId":161103,"journal":{"name":"2014 14th International Conference on Hybrid Intelligent Systems","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125562256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The role of temporal statistics in the transfer of experience in context-dependent reinforcement learning 时间统计在情境依赖强化学习中经验迁移中的作用
Pub Date : 2014-12-01 DOI: 10.1109/HIS.2014.7086184
Oussama H. Hamid
Reinforcement learning (RL) is an algorithmic theory for learning by experience optimal action control. Two widely discussed problems within this field are the temporal credit assignment problem and the transfer of experience. The temporal credit assignment problem postulates that deciding whether an action is good or bad may not be done upon right away because of delayed rewards. The problem of transferring experience investigates the question of how experience can be generalized and transferred from a familiar context, where it was acquired, to an unfamiliar context, where it may, nevertheless, prove helpful. We propose a controller for modelling such flexibility in a context-dependent reinforcement learning paradigm. The devised controller combines two alternatives of perfect learner algorithms. In the first alternative, rewards are predicted by individual objects presented in a temporal sequence. In the second alternative, rewards are predicted on the basis of successive pairs of objects. Simulations run on both deterministic and random temporal sequences show that only in case of deterministic sequences, a previously acquired context could be retrieved. This suggests a role of temporal sequence information in the generalization and transfer of experience.
强化学习(RL)是一种基于经验学习的最优行为控制算法理论。这一领域中被广泛讨论的两个问题是时间信用分配问题和经验转移问题。时间信用分配问题假设,由于延迟奖励,决定一个行为是好是坏可能不会立即完成。转移经验的问题研究的是经验如何被概括和从一个熟悉的环境中转移到一个陌生的环境中,在那里它可能是有用的。我们提出了一个控制器,用于在上下文相关的强化学习范式中建模这种灵活性。所设计的控制器结合了两种选择的完美学习算法。在第一种选择中,奖励是通过在时间序列中呈现的单个物体来预测的。在第二种选择中,奖励是基于连续成对的物体来预测的。在确定性时间序列和随机时间序列上的仿真表明,只有在确定性时间序列中,才能检索到先前获得的上下文。这表明时间序列信息在经验的泛化和转移中起着重要作用。
{"title":"The role of temporal statistics in the transfer of experience in context-dependent reinforcement learning","authors":"Oussama H. Hamid","doi":"10.1109/HIS.2014.7086184","DOIUrl":"https://doi.org/10.1109/HIS.2014.7086184","url":null,"abstract":"Reinforcement learning (RL) is an algorithmic theory for learning by experience optimal action control. Two widely discussed problems within this field are the temporal credit assignment problem and the transfer of experience. The temporal credit assignment problem postulates that deciding whether an action is good or bad may not be done upon right away because of delayed rewards. The problem of transferring experience investigates the question of how experience can be generalized and transferred from a familiar context, where it was acquired, to an unfamiliar context, where it may, nevertheless, prove helpful. We propose a controller for modelling such flexibility in a context-dependent reinforcement learning paradigm. The devised controller combines two alternatives of perfect learner algorithms. In the first alternative, rewards are predicted by individual objects presented in a temporal sequence. In the second alternative, rewards are predicted on the basis of successive pairs of objects. Simulations run on both deterministic and random temporal sequences show that only in case of deterministic sequences, a previously acquired context could be retrieved. This suggests a role of temporal sequence information in the generalization and transfer of experience.","PeriodicalId":161103,"journal":{"name":"2014 14th International Conference on Hybrid Intelligent Systems","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127637283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
期刊
2014 14th International Conference on Hybrid Intelligent Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1