首页 > 最新文献

Proceedings of the 2020 4th International Symposium on Computer Science and Intelligent Control最新文献

英文 中文
Security Method for Internet of Things Using Machine Learning Against Cyber Attacks 利用机器学习对抗网络攻击的物联网安全方法
T. Ahanger, A. Aljumah
Abstract. Internet of things is a huge network of large number of devices with sensors. This group of devices is estimated to grow over 25 billion in 2020 as its growth since its evolution has been truly more than just rapid growth. With such a growth in network expansion and increase in number of connected devices, security always have been an issue to be improved and one of the weak areas in IoT environment. While applying security in IoT environment the main characteristics of IoT being heterogenetic and the number of IoT devices are the challenges that need to be dealt with some efficient and feasible approach. Therefore, to address this problem, we propose a method of securing IoT system using basic principles of machine learning. The system will analyze the data and detect the malicious packets received from the edge devices. The experimental study showed improved results with the dummy data sets in an IoT environment.
摘要物联网是由大量带有传感器的设备组成的巨大网络。据估计,到2020年,这组设备的增长将超过250亿,因为它的发展已经不仅仅是快速增长。随着网络规模的不断扩大和连接设备数量的不断增加,安全一直是物联网环境中亟待改进的问题和薄弱环节之一。在物联网环境中应用安全性时,物联网的主要特点是异构性和物联网设备的数量是需要解决一些有效可行的方法的挑战。因此,为了解决这个问题,我们提出了一种使用机器学习基本原理保护物联网系统的方法。系统将对数据进行分析,检测从边缘设备接收到的恶意报文。实验研究表明,在物联网环境中使用虚拟数据集可以改善结果。
{"title":"Security Method for Internet of Things Using Machine Learning Against Cyber Attacks","authors":"T. Ahanger, A. Aljumah","doi":"10.1145/3440084.3441199","DOIUrl":"https://doi.org/10.1145/3440084.3441199","url":null,"abstract":"Abstract. Internet of things is a huge network of large number of devices with sensors. This group of devices is estimated to grow over 25 billion in 2020 as its growth since its evolution has been truly more than just rapid growth. With such a growth in network expansion and increase in number of connected devices, security always have been an issue to be improved and one of the weak areas in IoT environment. While applying security in IoT environment the main characteristics of IoT being heterogenetic and the number of IoT devices are the challenges that need to be dealt with some efficient and feasible approach. Therefore, to address this problem, we propose a method of securing IoT system using basic principles of machine learning. The system will analyze the data and detect the malicious packets received from the edge devices. The experimental study showed improved results with the dummy data sets in an IoT environment.","PeriodicalId":250100,"journal":{"name":"Proceedings of the 2020 4th International Symposium on Computer Science and Intelligent Control","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127441623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hierarchical Attention-based BiLSTM Network for Document Similarity Calculation 基于层次关注的文档相似度计算BiLSTM网络
Jiang Zhang, Qun Zhu, Yanlin He
Neural network model is a momentous method to calculate semantic similarity. Taking into account the complexity of document structure, introducing hierarchical structure and attention mechanism into neural network can calculate document semantic representation more precisely. In order to verify the validity of the model, LP50 dataset was tested. The experimental results reveal that accurate document representation can be obtained by using the attention mechanism at two levels of words and sentences. Since this method has taken both the influence of context information and the contribution of components to the document into consideration. Compared with several conventional methods, there is a significant improvement of performance in our model.
神经网络模型是计算语义相似度的重要方法。考虑到文档结构的复杂性,在神经网络中引入层次结构和注意机制可以更精确地计算文档的语义表示。为了验证模型的有效性,对LP50数据集进行了测试。实验结果表明,使用注意机制可以在词和句子两个层次上获得准确的文档表征。由于该方法既考虑了上下文信息的影响,又考虑了组件对文档的贡献。与几种传统方法相比,我们的模型在性能上有了显著的提高。
{"title":"Hierarchical Attention-based BiLSTM Network for Document Similarity Calculation","authors":"Jiang Zhang, Qun Zhu, Yanlin He","doi":"10.1145/3440084.3441188","DOIUrl":"https://doi.org/10.1145/3440084.3441188","url":null,"abstract":"Neural network model is a momentous method to calculate semantic similarity. Taking into account the complexity of document structure, introducing hierarchical structure and attention mechanism into neural network can calculate document semantic representation more precisely. In order to verify the validity of the model, LP50 dataset was tested. The experimental results reveal that accurate document representation can be obtained by using the attention mechanism at two levels of words and sentences. Since this method has taken both the influence of context information and the contribution of components to the document into consideration. Compared with several conventional methods, there is a significant improvement of performance in our model.","PeriodicalId":250100,"journal":{"name":"Proceedings of the 2020 4th International Symposium on Computer Science and Intelligent Control","volume":"2 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127019974","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of Data Ownership Rights in the Big Data Era 大数据时代的数据所有权分析
Wei Xiao, Yaqing Tu, Ping Wan, Ming Li, J. Ma
For working out the problem of ownership rights of data in the Big Data era, this paper proposes an establishment method of data ownership rights based on data classification. By summarizing characteristics of big data and analyzing current main views of the data ownership rights, this proposed method is following the principles of protecting data confidentiality and acknowledging the greatest contributors. First, according to the different involvement degree of participants in data generation processes, the data is divided into two categories: participatory data and non-participatory data. The participatory data is subdivided into equal participatory data and non-equal participatory data based on different contributions of participants. Since the non-participatory data generally involves the private and confidential information of the recorded parties, it is proposed that the ownership rights of this kind of data should belong to the recorded parties. Following the principle of acknowledging the greatest contributors, this paper proposes that the ownership rights of the equal participatory data belongs to all participants and that of non-equal participatory data belongs to the active participants.
为了解决大数据时代的数据所有权问题,本文提出了一种基于数据分类的数据所有权建立方法。通过总结大数据的特点,分析当前关于数据所有权的主要观点,遵循保护数据机密和承认最大贡献者的原则。首先,根据数据生成过程中参与者参与程度的不同,将数据分为参与性数据和非参与性数据两类。根据参与人贡献的不同,将参与式数据细分为平等参与式数据和非平等参与式数据。由于非参与性数据通常涉及被记录方的私人和机密信息,因此建议将这类数据的所有权归被记录方所有。本文遵循承认最大贡献者的原则,提出平等参与数据的所有权属于所有参与者,非平等参与数据的所有权属于积极参与者。
{"title":"Analysis of Data Ownership Rights in the Big Data Era","authors":"Wei Xiao, Yaqing Tu, Ping Wan, Ming Li, J. Ma","doi":"10.1145/3440084.3441210","DOIUrl":"https://doi.org/10.1145/3440084.3441210","url":null,"abstract":"For working out the problem of ownership rights of data in the Big Data era, this paper proposes an establishment method of data ownership rights based on data classification. By summarizing characteristics of big data and analyzing current main views of the data ownership rights, this proposed method is following the principles of protecting data confidentiality and acknowledging the greatest contributors. First, according to the different involvement degree of participants in data generation processes, the data is divided into two categories: participatory data and non-participatory data. The participatory data is subdivided into equal participatory data and non-equal participatory data based on different contributions of participants. Since the non-participatory data generally involves the private and confidential information of the recorded parties, it is proposed that the ownership rights of this kind of data should belong to the recorded parties. Following the principle of acknowledging the greatest contributors, this paper proposes that the ownership rights of the equal participatory data belongs to all participants and that of non-equal participatory data belongs to the active participants.","PeriodicalId":250100,"journal":{"name":"Proceedings of the 2020 4th International Symposium on Computer Science and Intelligent Control","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121607591","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
VAE-GAN Based Zero-shot Outlier Detection 基于VAE-GAN的零距异常点检测
Bekkouch Imad Eddine Ibrahim, D. C. Nicolae, A. Khan, Syed Imran Ali, A. Khattak
Outlier detection is one of the main fields in machine learning and it has been growing rapidly due to its wide range of applications. In the last few years, deep learning-based methods have outperformed machine learning and handcrafted outlier detection techniques, and our method is no different. We present a new twist to generative models which leverages variational autoencoders as a source for uniform distributions which can be used to separate the inliers from the outliers. Both the generative and adversarial parts of the model are used to obtain three main losses (Reconstruction loss, KL-divergence, Discriminative loss) which in return are wrapped with a one-class SVM which is used to make the predictions. We evaluated our method against several datasets both for images and tabular data and it has shown great results for the zero-shot outlier detection problem and was able to easily generalize it for supervised outlier detection tasks on which the performance has increased. For comparison, we evaluated our method against several of the common outlier detection techniques such as DBSCAN-based outlier detection, GMM, K-means and one class SVM directly, and we have outperformed all of them on all datasets.
异常点检测是机器学习的主要研究领域之一,由于其广泛的应用,其发展迅速。在过去的几年里,基于深度学习的方法已经超越了机器学习和手工异常值检测技术,我们的方法也不例外。我们提出了一个新的扭曲生成模型,它利用变分自编码器作为均匀分布的来源,可用于分离内线和离群值。模型的生成和对抗部分都用于获得三种主要损失(重建损失,kl -散度,判别损失),这些损失反过来被用于进行预测的单类支持向量机包裹。我们针对图像和表格数据的几个数据集评估了我们的方法,它在零间隔离群点检测问题上显示了很好的结果,并且能够很容易地将其推广到性能有所提高的监督离群点检测任务。为了进行比较,我们将我们的方法与几种常见的离群点检测技术(如基于dbscan的离群点检测、GMM、K-means和一类支持向量机)直接进行了评估,并且我们在所有数据集上的表现都优于它们。
{"title":"VAE-GAN Based Zero-shot Outlier Detection","authors":"Bekkouch Imad Eddine Ibrahim, D. C. Nicolae, A. Khan, Syed Imran Ali, A. Khattak","doi":"10.1145/3440084.3441180","DOIUrl":"https://doi.org/10.1145/3440084.3441180","url":null,"abstract":"Outlier detection is one of the main fields in machine learning and it has been growing rapidly due to its wide range of applications. In the last few years, deep learning-based methods have outperformed machine learning and handcrafted outlier detection techniques, and our method is no different. We present a new twist to generative models which leverages variational autoencoders as a source for uniform distributions which can be used to separate the inliers from the outliers. Both the generative and adversarial parts of the model are used to obtain three main losses (Reconstruction loss, KL-divergence, Discriminative loss) which in return are wrapped with a one-class SVM which is used to make the predictions. We evaluated our method against several datasets both for images and tabular data and it has shown great results for the zero-shot outlier detection problem and was able to easily generalize it for supervised outlier detection tasks on which the performance has increased. For comparison, we evaluated our method against several of the common outlier detection techniques such as DBSCAN-based outlier detection, GMM, K-means and one class SVM directly, and we have outperformed all of them on all datasets.","PeriodicalId":250100,"journal":{"name":"Proceedings of the 2020 4th International Symposium on Computer Science and Intelligent Control","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130024732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Ideal Edge Architecture to Scale IoT Devices 扩展物联网设备的理想边缘架构
A. Carvalho, Niall O' Mahony, L. Krpalkova, S. Campbell, Joseph Walsh, P. Doody
Due to the increasing availability of internet connection both industrial and agricultural environments have experienced an expressive increase in the number of IoT devices for the last few years. This paper exposes an extensive architecture investigation looking for an optimal edge solution to cope with existing, and future applications. This paper presents an introduction to the proposed solution in terms of architecture, including local user interface, MQTT broker, machine learning edge engine, some existing management software, local databases, actual software used for hardware communication, the edge agent and aspects of the hardware used during tests. It also presents some results obtained from experiments under heavy load in terms of data and a small number of devices in terms of distribution. Together the paper brings some important findings on edge computing, compare main architectural aspects and will provide a broad view of how edge solutions might be built for this particular scenario. Having discussed how the ideal architecture works and having provided an overview of how it may be applied to industrial and agricultural environments, the conclusion points to the next steps for the current research.
由于互联网连接的可用性越来越高,工业和农业环境在过去几年中都经历了物联网设备数量的显著增加。本文揭示了一个广泛的架构调查,寻找一个最优的边缘解决方案,以应对现有的和未来的应用。本文从架构方面介绍了所提出的解决方案,包括本地用户界面、MQTT代理、机器学习边缘引擎、一些现有的管理软件、本地数据库、用于硬件通信的实际软件、边缘代理以及测试期间使用的硬件的各个方面。在数据量大的情况下,在设备数量少的情况下,在分布上也给出了一些实验结果。本文总结了一些关于边缘计算的重要发现,比较了主要的架构方面,并将提供一个关于如何为这种特定场景构建边缘解决方案的广泛视角。讨论了理想的体系结构是如何工作的,并概述了它如何应用于工业和农业环境,结论指出了当前研究的下一步。
{"title":"Ideal Edge Architecture to Scale IoT Devices","authors":"A. Carvalho, Niall O' Mahony, L. Krpalkova, S. Campbell, Joseph Walsh, P. Doody","doi":"10.1145/3440084.3441198","DOIUrl":"https://doi.org/10.1145/3440084.3441198","url":null,"abstract":"Due to the increasing availability of internet connection both industrial and agricultural environments have experienced an expressive increase in the number of IoT devices for the last few years. This paper exposes an extensive architecture investigation looking for an optimal edge solution to cope with existing, and future applications. This paper presents an introduction to the proposed solution in terms of architecture, including local user interface, MQTT broker, machine learning edge engine, some existing management software, local databases, actual software used for hardware communication, the edge agent and aspects of the hardware used during tests. It also presents some results obtained from experiments under heavy load in terms of data and a small number of devices in terms of distribution. Together the paper brings some important findings on edge computing, compare main architectural aspects and will provide a broad view of how edge solutions might be built for this particular scenario. Having discussed how the ideal architecture works and having provided an overview of how it may be applied to industrial and agricultural environments, the conclusion points to the next steps for the current research.","PeriodicalId":250100,"journal":{"name":"Proceedings of the 2020 4th International Symposium on Computer Science and Intelligent Control","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127164899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards Real-time Anomaly Detection and Calibration for Large Parking Lot in Urban Complex 城市综合体大型停车场实时异常检测与标定研究
Shuaifei Song, Deyuan Zhu, Yuncheng Song, Kun Yu, Huabin Feng, Hengchang Liu
With the development of low-cost, low-power sensing and communication technologies, there has been growing interest in the IoT for realizing smart cities, in order to maximize the productivity and reliability of urban infrastructure. One of the most representative examples is smart parking system, which consists of parking sensors and backend servers. In existing systems, parking sensors are placed in each parking spot to monitor the status of the parking spot, and then the sensing data is send to backend servers for further processing. Based on these sensor data, the smart parking system can provide some smart services, such as parking spot availability prediction, remote booking and parking guidance. The premise of all these smart services is that the sensor data is accurate and reliable. However, as the sensor ages, the sensor may produce some unreliable data, which brings great challenges to our smart services. In this paper, we present a novel anomaly detection and calibration system in "Suzhou Center", one of the largest most advanced urban complexes in China. Our system uses supervised machine learning algorithms, focusing on capturing spatio-temporal features. The experimental results show that our system can identify most anomalies and improve the accuracy of the sensor.
随着低成本、低功耗传感和通信技术的发展,人们对实现智慧城市的物联网越来越感兴趣,以最大限度地提高城市基础设施的生产力和可靠性。其中最具代表性的例子是智能停车系统,它由停车传感器和后端服务器组成。在现有的系统中,停车传感器被放置在每个停车位,监测车位的状态,然后将传感数据发送到后端服务器进行进一步处理。基于这些传感器数据,智能停车系统可以提供车位可用性预测、远程预约和停车引导等智能服务。所有这些智能服务的前提是传感器数据准确可靠。然而,随着传感器的老化,传感器可能会产生一些不可靠的数据,这给我们的智能服务带来了很大的挑战。在本文中,我们提出了一个新的异常检测和校准系统在“苏州中心”,中国最大的最先进的城市综合体之一。我们的系统使用监督机器学习算法,专注于捕捉时空特征。实验结果表明,该系统能有效地识别出大多数异常,提高了传感器的精度。
{"title":"Towards Real-time Anomaly Detection and Calibration for Large Parking Lot in Urban Complex","authors":"Shuaifei Song, Deyuan Zhu, Yuncheng Song, Kun Yu, Huabin Feng, Hengchang Liu","doi":"10.1145/3440084.3441177","DOIUrl":"https://doi.org/10.1145/3440084.3441177","url":null,"abstract":"With the development of low-cost, low-power sensing and communication technologies, there has been growing interest in the IoT for realizing smart cities, in order to maximize the productivity and reliability of urban infrastructure. One of the most representative examples is smart parking system, which consists of parking sensors and backend servers. In existing systems, parking sensors are placed in each parking spot to monitor the status of the parking spot, and then the sensing data is send to backend servers for further processing. Based on these sensor data, the smart parking system can provide some smart services, such as parking spot availability prediction, remote booking and parking guidance. The premise of all these smart services is that the sensor data is accurate and reliable. However, as the sensor ages, the sensor may produce some unreliable data, which brings great challenges to our smart services. In this paper, we present a novel anomaly detection and calibration system in \"Suzhou Center\", one of the largest most advanced urban complexes in China. Our system uses supervised machine learning algorithms, focusing on capturing spatio-temporal features. The experimental results show that our system can identify most anomalies and improve the accuracy of the sensor.","PeriodicalId":250100,"journal":{"name":"Proceedings of the 2020 4th International Symposium on Computer Science and Intelligent Control","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129975013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on Test Aircraft Quantitative Analysis Model during Flight Test Planning 试飞计划中试验机定量分析模型的研究
Hao Song, Chao-Shih Liu, Qingling Liu, Yang Liu, Chun H. Wang, Mingxu Yi
The process of civil aircraft development is a complex system, where flight test is an extremely important process of the project. In the top-level planning of flight test, it is particularly important to determine the quantity of test aircraft, which is closely related to the total flight test period, cost, and resources. This paper analyzes and studies the number of test aircraft performing flight test missions, analyzes the related factors of the number of test aircraft, and proposes a reasonable calculation model with engineering operability based on flight test period and cost. It provides numerical data reference for overall planning of civil aircraft flight test during multi-objective optimization.
民用飞机的研制过程是一个复杂的系统,其中飞行试验是项目的一个极其重要的过程。在飞行试验的顶层规划中,试验飞机数量的确定尤为重要,这与飞行试验的总周期、成本和资源密切相关。本文对执行飞行试验任务的试验飞机数量进行了分析和研究,分析了试验飞机数量的相关因素,并根据飞行试验周期和成本提出了具有工程可操作性的合理计算模型。为多目标优化过程中民机试飞总体规划提供数值数据参考。
{"title":"Research on Test Aircraft Quantitative Analysis Model during Flight Test Planning","authors":"Hao Song, Chao-Shih Liu, Qingling Liu, Yang Liu, Chun H. Wang, Mingxu Yi","doi":"10.1145/3440084.3441205","DOIUrl":"https://doi.org/10.1145/3440084.3441205","url":null,"abstract":"The process of civil aircraft development is a complex system, where flight test is an extremely important process of the project. In the top-level planning of flight test, it is particularly important to determine the quantity of test aircraft, which is closely related to the total flight test period, cost, and resources. This paper analyzes and studies the number of test aircraft performing flight test missions, analyzes the related factors of the number of test aircraft, and proposes a reasonable calculation model with engineering operability based on flight test period and cost. It provides numerical data reference for overall planning of civil aircraft flight test during multi-objective optimization.","PeriodicalId":250100,"journal":{"name":"Proceedings of the 2020 4th International Symposium on Computer Science and Intelligent Control","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130888729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Fault Magnitude Prognosis in Chemical Process Based on Long Short-Term Memory Network 基于长短期记忆网络的化工过程故障震级预测
Ruosen Qi, Jie Zhang
This paper presents a long range process fault prognosis system using long short-term memory (LSTM) network. Data from historical process operation with faults present are used to train LSTM networks. During process monitoring, a principal component analysis (PCA) model developed from normal historical process operation data is used to detect the presence of a fault. Once a fault is detected, reconstruction based fault diagnosis is used to diagnosis the detected fault. Then the trained LSTM network corresponding the diagnosed fault is use to provide long range fault magnitude forecast. The proposed method is applied to a simulated continuous stirred tank reactor (CSTR) and is compared with fault prognosis using extreme learning machine (ELM). The results show that the proposed fault prognosis method based on LSTM network can achieve excellent long range prognosis performance.
提出了一种基于长短期记忆(LSTM)网络的远程过程故障预测系统。利用历史过程运行中存在故障的数据来训练LSTM网络。在过程监控中,主成分分析(PCA)模型是根据正常的历史过程运行数据开发的,用于检测故障的存在。一旦检测到故障,基于重构的故障诊断方法对检测到的故障进行诊断。然后利用所诊断的故障所对应的训练好的LSTM网络进行远程故障幅度预测。将该方法应用于模拟连续搅拌槽式反应器(CSTR),并与极限学习机(ELM)故障预测方法进行了比较。结果表明,提出的基于LSTM网络的故障预测方法具有良好的远程预测性能。
{"title":"Fault Magnitude Prognosis in Chemical Process Based on Long Short-Term Memory Network","authors":"Ruosen Qi, Jie Zhang","doi":"10.1145/3440084.3441212","DOIUrl":"https://doi.org/10.1145/3440084.3441212","url":null,"abstract":"This paper presents a long range process fault prognosis system using long short-term memory (LSTM) network. Data from historical process operation with faults present are used to train LSTM networks. During process monitoring, a principal component analysis (PCA) model developed from normal historical process operation data is used to detect the presence of a fault. Once a fault is detected, reconstruction based fault diagnosis is used to diagnosis the detected fault. Then the trained LSTM network corresponding the diagnosed fault is use to provide long range fault magnitude forecast. The proposed method is applied to a simulated continuous stirred tank reactor (CSTR) and is compared with fault prognosis using extreme learning machine (ELM). The results show that the proposed fault prognosis method based on LSTM network can achieve excellent long range prognosis performance.","PeriodicalId":250100,"journal":{"name":"Proceedings of the 2020 4th International Symposium on Computer Science and Intelligent Control","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126723951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Role of RNNs for Contextual Representations: A Case Study Using DMN-plus rnn在上下文表示中的作用:使用DMN-plus的案例研究
Y. Shen, E. Lai, Mahsa Mohaghegh
Recurrent neural networks (RNNs) have been used prevalently to capture long-term dependencies of sequential inputs. In particular, for question answering systems, variants of RNNs, such as Long Short-Term Memory (LSTM) and Gated Recurrent Unit (GRU), allow the positional, ordering or contextual information to be encoded into latent contextual representations. While applying RNNs for encoding this information is intuitively reasonable, no specific research has been conducted to investigate how effective is their use in such systems when the sequence of sentences is unimportant. In this paper we conduct a case study on the effectiveness of using RNNs to generate context representations using the DMN+ network. Our results based on a three-fact task in the bAbI dataset show that sequences of facts in the training dataset influence the predictive performance of the trained system. We propose two methods to resolve this problem, one is data augmentation and the other is the optimization of the DMN+ structure by replacing the GRU in the episodic memory module with a non-recurrent operation. The experimental results demonstrate that our proposed solutions can resolve the problem effectively.
递归神经网络(RNNs)已被广泛用于捕获顺序输入的长期依赖关系。特别是,对于问答系统,rnn的变体,如长短期记忆(LSTM)和门控循环单元(GRU),允许将位置、顺序或上下文信息编码为潜在的上下文表示。虽然应用rnn对这些信息进行编码在直觉上是合理的,但当句子的顺序不重要时,还没有具体的研究来调查它们在这种系统中的使用效果如何。在本文中,我们对使用rnn使用DMN+网络生成上下文表示的有效性进行了案例研究。我们基于bAbI数据集中的三事实任务的结果表明,训练数据集中的事实序列会影响训练系统的预测性能。我们提出了两种方法来解决这个问题,一种是数据增强,另一种是通过非循环操作替换情景记忆模块中的GRU来优化DMN+结构。实验结果表明,本文提出的解决方案能够有效地解决这一问题。
{"title":"The Role of RNNs for Contextual Representations: A Case Study Using DMN-plus","authors":"Y. Shen, E. Lai, Mahsa Mohaghegh","doi":"10.1145/3440084.3441190","DOIUrl":"https://doi.org/10.1145/3440084.3441190","url":null,"abstract":"Recurrent neural networks (RNNs) have been used prevalently to capture long-term dependencies of sequential inputs. In particular, for question answering systems, variants of RNNs, such as Long Short-Term Memory (LSTM) and Gated Recurrent Unit (GRU), allow the positional, ordering or contextual information to be encoded into latent contextual representations. While applying RNNs for encoding this information is intuitively reasonable, no specific research has been conducted to investigate how effective is their use in such systems when the sequence of sentences is unimportant. In this paper we conduct a case study on the effectiveness of using RNNs to generate context representations using the DMN+ network. Our results based on a three-fact task in the bAbI dataset show that sequences of facts in the training dataset influence the predictive performance of the trained system. We propose two methods to resolve this problem, one is data augmentation and the other is the optimization of the DMN+ structure by replacing the GRU in the episodic memory module with a non-recurrent operation. The experimental results demonstrate that our proposed solutions can resolve the problem effectively.","PeriodicalId":250100,"journal":{"name":"Proceedings of the 2020 4th International Symposium on Computer Science and Intelligent Control","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126310524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Research of Cluster Feature Extraction and Evaluation System Construction for Mixed Teaching Data 混合教学数据聚类特征提取及评价体系构建研究
Jing Zhou, Jun Xiong, Ze Chen
At present, the mining and analysis of teaching data is mainly aimed at the online courses data, but not mixed data, which is fused by the traditional offline-classroom and online teaching data. Meanwhile, the most evaluation models are constructed by the learning data to evaluate the teaching quality of teachers, but not to evaluate and grade the individual quality of students. In fact, the evaluation and grading of students' quality can effectively provide more targeted teaching intervention for students of different levels based on the data analysis. To address these issues, the online teaching data is fused by the students' learning behavior data of traditional course to form the mixed data in this paper, and then the sparse non-negative matrix factorization (SNMF) method is adopted to extract the feature clusters of mixed learning data. According to the weights of the extracted cluster features, the multi-level feature indicators are selected in turn to construct the hierarchical evaluation index system. Finally, the comprehensive weighting method is adopted to evaluate and grade the individual students. In this paper, the mixed teaching data of computer basic course of our school is formed, and then the weights of feature clusters are calculated by SNMF and an evaluation model is established to evaluate and grade the students. The grading results are in accordance with the normal distribution and basically consistent with the grading distribution of students' final examination scores. Thus the validity of the model and method proposed in this paper is proved.
目前,教学数据的挖掘和分析主要针对在线课程数据,而不是传统的线下课堂和在线教学数据融合的混合数据。同时,大多数评价模型都是通过学习数据来评价教师的教学质量,而不是对学生的个人素质进行评价和评分。事实上,基于数据分析,对学生素质的评价和评分可以有效地为不同层次的学生提供更有针对性的教学干预。针对这些问题,本文将在线教学数据与传统课程的学生学习行为数据融合形成混合数据,然后采用稀疏非负矩阵分解(SNMF)方法提取混合学习数据的特征聚类。根据提取的聚类特征的权重,依次选择多层次特征指标,构建分级评价指标体系。最后,采用综合加权法对学生个体进行评价和评分。本文通过形成我校计算机基础课程混合教学数据,利用SNMF计算特征聚类权重,建立评价模型对学生进行评价和评分。评分结果符合正态分布,与学生期末考试成绩的评分分布基本一致。从而证明了本文模型和方法的有效性。
{"title":"Research of Cluster Feature Extraction and Evaluation System Construction for Mixed Teaching Data","authors":"Jing Zhou, Jun Xiong, Ze Chen","doi":"10.1145/3440084.3441191","DOIUrl":"https://doi.org/10.1145/3440084.3441191","url":null,"abstract":"At present, the mining and analysis of teaching data is mainly aimed at the online courses data, but not mixed data, which is fused by the traditional offline-classroom and online teaching data. Meanwhile, the most evaluation models are constructed by the learning data to evaluate the teaching quality of teachers, but not to evaluate and grade the individual quality of students. In fact, the evaluation and grading of students' quality can effectively provide more targeted teaching intervention for students of different levels based on the data analysis. To address these issues, the online teaching data is fused by the students' learning behavior data of traditional course to form the mixed data in this paper, and then the sparse non-negative matrix factorization (SNMF) method is adopted to extract the feature clusters of mixed learning data. According to the weights of the extracted cluster features, the multi-level feature indicators are selected in turn to construct the hierarchical evaluation index system. Finally, the comprehensive weighting method is adopted to evaluate and grade the individual students. In this paper, the mixed teaching data of computer basic course of our school is formed, and then the weights of feature clusters are calculated by SNMF and an evaluation model is established to evaluate and grade the students. The grading results are in accordance with the normal distribution and basically consistent with the grading distribution of students' final examination scores. Thus the validity of the model and method proposed in this paper is proved.","PeriodicalId":250100,"journal":{"name":"Proceedings of the 2020 4th International Symposium on Computer Science and Intelligent Control","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115279206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Proceedings of the 2020 4th International Symposium on Computer Science and Intelligent Control
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1