首页 > 最新文献

2018 IEEE International Conference on the Science of Electrical Engineering in Israel (ICSEE)最新文献

英文 中文
Inpainting of surfaces and Images 表面和图像的喷漆
Ofir Krengel, Eli Appleboim, Yehoshua Y.Zeevi
Inpainting of images, represented on surfaces, was previously considered successfully by the application of a two-dimensional Laplacian operator, including in the context of the discrete representation on surfaces. Considering the shortcoming of errors and computational complexity of the strictly-two-dimensional approaches, we propose a one-dimensional-based multi-line approach, wherein the set of lines cover the region of inpainting and its boundaries. The multi-line framework is implemented on smooth and non-smooth surfaces and on images and the results are found to be superior to the previously published results. Additional possible one-dimensional representations are discussed.
在表面上表示的图像的绘制,以前被认为是成功的应用二维拉普拉斯算子,包括在表面上的离散表示的背景下。考虑到严格二维方法的误差和计算复杂度的缺点,我们提出了一种基于一维的多线方法,其中线集覆盖了喷漆区域及其边界。在光滑和非光滑表面以及图像上实现了多线框架,结果优于先前发表的结果。讨论了其他可能的一维表示。
{"title":"Inpainting of surfaces and Images","authors":"Ofir Krengel, Eli Appleboim, Yehoshua Y.Zeevi","doi":"10.1109/ICSEE.2018.8646005","DOIUrl":"https://doi.org/10.1109/ICSEE.2018.8646005","url":null,"abstract":"Inpainting of images, represented on surfaces, was previously considered successfully by the application of a two-dimensional Laplacian operator, including in the context of the discrete representation on surfaces. Considering the shortcoming of errors and computational complexity of the strictly-two-dimensional approaches, we propose a one-dimensional-based multi-line approach, wherein the set of lines cover the region of inpainting and its boundaries. The multi-line framework is implemented on smooth and non-smooth surfaces and on images and the results are found to be superior to the previously published results. Additional possible one-dimensional representations are discussed.","PeriodicalId":254455,"journal":{"name":"2018 IEEE International Conference on the Science of Electrical Engineering in Israel (ICSEE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129218707","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Unspread the Jam: Scheduling Traffic Lights to Reduce Congestion 消除拥堵:安排交通灯以减少拥堵
Y. Levi, Ayal Taitler, I. Keslassy
In this paper, we consider the practical problem of scheduling traffic lights to reduce the average vehicle waiting times. We find that existing scheduling algorithms have lackluster performance. Instead, we introduce two algorithms. First, extended CMSM (eCMSM), which extends CMSM from a switch scheduling model to a general traffic-light scheduling model. We prove that eCMSM can optimally schedule any traffic batch. Second, we introduce Front-Pressure (FP), which aims to further reduce the average waiting time at general intersections. We then evaluate empirically these two algorithms. We find that when using them, the best average waiting time can be improved in 98% of the simulations when compared to several existing algorithms, most significantly in congested settings.
本文考虑了交通信号灯调度的实际问题,以减少车辆的平均等待时间。我们发现现有的调度算法性能不佳。相反,我们将介绍两种算法。首先,扩展CMSM (eCMSM),将CMSM从一个开关调度模型扩展到一个通用的红绿灯调度模型。证明了eCMSM可以最优调度任意流量批。其次,我们引入了前置压力(FP),旨在进一步减少一般路口的平均等待时间。然后我们对这两种算法进行经验评估。我们发现,当使用它们时,与几种现有算法相比,98%的模拟可以改善最佳平均等待时间,在拥塞设置中最显着。
{"title":"Unspread the Jam: Scheduling Traffic Lights to Reduce Congestion","authors":"Y. Levi, Ayal Taitler, I. Keslassy","doi":"10.1109/ICSEE.2018.8646046","DOIUrl":"https://doi.org/10.1109/ICSEE.2018.8646046","url":null,"abstract":"In this paper, we consider the practical problem of scheduling traffic lights to reduce the average vehicle waiting times. We find that existing scheduling algorithms have lackluster performance. Instead, we introduce two algorithms. First, extended CMSM (eCMSM), which extends CMSM from a switch scheduling model to a general traffic-light scheduling model. We prove that eCMSM can optimally schedule any traffic batch. Second, we introduce Front-Pressure (FP), which aims to further reduce the average waiting time at general intersections. We then evaluate empirically these two algorithms. We find that when using them, the best average waiting time can be improved in 98% of the simulations when compared to several existing algorithms, most significantly in congested settings.","PeriodicalId":254455,"journal":{"name":"2018 IEEE International Conference on the Science of Electrical Engineering in Israel (ICSEE)","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133477020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Methods of nonlinear fourier-based optical transmission with periodically-extended signals 周期性扩展信号非线性傅里叶光传输方法
M. Kamalian, J. Prilepsky, A. Vasylchenkova, D. Shepelsky, S. Turitsyn
The nonlinear Fourier transform (NFT) has attracted great interest recently as a new technique for nonlinearity mitigation in fibre-optic transmission. Most of the attention has so far been paid to the NFT for time-decaying signals while periodic signals can potentially ameliorate some difficulties of conventional NFT, offering a better system performance. We consider two communication systems based on the usage of periodic NFT (PNFT): with signal processing based (i) on the reduced algebro-geometric and (ii) on Riemann-Hilbert problem (RHP) approaches. Simulation results show that both methods can be used for nonlinearity mitigation. However, the latter approach is expandable without considerable penalty in processing complexity, which makes it a more appealing option for implementation.
非线性傅里叶变换(NFT)作为一种新型的光纤传输非线性抑制技术,近年来引起了人们的广泛关注。到目前为止,大部分的注意力都集中在时间衰减信号的NFT上,而周期信号可以潜在地改善传统NFT的一些困难,提供更好的系统性能。我们考虑两种基于周期NFT (PNFT)的通信系统:信号处理基于(i)简化代数-几何和(ii)黎曼-希尔伯特问题(RHP)方法。仿真结果表明,两种方法均可用于非线性抑制。然而,后一种方法是可扩展的,而不会对处理复杂性造成相当大的损失,这使得它成为更有吸引力的实现选项。
{"title":"Methods of nonlinear fourier-based optical transmission with periodically-extended signals","authors":"M. Kamalian, J. Prilepsky, A. Vasylchenkova, D. Shepelsky, S. Turitsyn","doi":"10.1109/ICSEE.2018.8721181","DOIUrl":"https://doi.org/10.1109/ICSEE.2018.8721181","url":null,"abstract":"The nonlinear Fourier transform (NFT) has attracted great interest recently as a new technique for nonlinearity mitigation in fibre-optic transmission. Most of the attention has so far been paid to the NFT for time-decaying signals while periodic signals can potentially ameliorate some difficulties of conventional NFT, offering a better system performance. We consider two communication systems based on the usage of periodic NFT (PNFT): with signal processing based (i) on the reduced algebro-geometric and (ii) on Riemann-Hilbert problem (RHP) approaches. Simulation results show that both methods can be used for nonlinearity mitigation. However, the latter approach is expandable without considerable penalty in processing complexity, which makes it a more appealing option for implementation.","PeriodicalId":254455,"journal":{"name":"2018 IEEE International Conference on the Science of Electrical Engineering in Israel (ICSEE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129031017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Synchronverter based photovoltaic inverter 基于同步器的光伏逆变器
Zeev Kustanovich, G. Weiss
We present a research of a possibility of constructing a photovoltaic DC to AC inverter based on a synchronverter operation principle. A possible area of an application for this inverter is in a photovoltaic power plant that is connected to the low voltage grid. We give a brief explanation about a theoretical control algorithm that governs an operation of the inverter including Maximum Power Point Tracking (MPPT). A Simulink average model verifies the performance of the algorithm. We also present a brief explanation of the experiments that are in progress in Smart Grid Interoperability Laboratory of the European Commission Joint Research Center in Ispra, Italy. The main goal of these experiments is to verify a performance of the control algorithm by using an external PCB uploaded with the control algorithm and connected to the Real Time Digital Simulator (RTDS).
我们提出了一种基于同步器工作原理的光伏直流逆变器的可行性研究。这种逆变器的一个可能应用领域是连接到低压电网的光伏发电厂。本文简要介绍了一种控制逆变器运行的理论控制算法,包括最大功率点跟踪(MPPT)。通过Simulink平均模型验证了该算法的性能。我们还简要介绍了位于意大利Ispra的欧盟委员会联合研究中心智能电网互操作性实验室正在进行的实验。这些实验的主要目的是通过使用上载控制算法并连接到实时数字模拟器(RTDS)的外部PCB来验证控制算法的性能。
{"title":"Synchronverter based photovoltaic inverter","authors":"Zeev Kustanovich, G. Weiss","doi":"10.1109/ICSEE.2018.8646184","DOIUrl":"https://doi.org/10.1109/ICSEE.2018.8646184","url":null,"abstract":"We present a research of a possibility of constructing a photovoltaic DC to AC inverter based on a synchronverter operation principle. A possible area of an application for this inverter is in a photovoltaic power plant that is connected to the low voltage grid. We give a brief explanation about a theoretical control algorithm that governs an operation of the inverter including Maximum Power Point Tracking (MPPT). A Simulink average model verifies the performance of the algorithm. We also present a brief explanation of the experiments that are in progress in Smart Grid Interoperability Laboratory of the European Commission Joint Research Center in Ispra, Italy. The main goal of these experiments is to verify a performance of the control algorithm by using an external PCB uploaded with the control algorithm and connected to the Real Time Digital Simulator (RTDS).","PeriodicalId":254455,"journal":{"name":"2018 IEEE International Conference on the Science of Electrical Engineering in Israel (ICSEE)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125654857","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Quality-Energy Trade-off and Bio-Inspired Electronic Systems 质量-能量权衡与仿生电子系统
P. Ros, A. Sanginario, M. Crepaldi, D. Demarchi
Applications are demanding new approaches to electronic systems. The concept of running for obtaining the best performances in terms of speed and dimensions, that drove the electronic design in the last decades, is no more valid. In fact, the electronic systems are nowadays applied in very much different scenarios where sometimes, for example, it is not at all important the speed, but power consumption and reliability are the keys.It is strategic to find new approaches that must have an impact at system level, not on the single parts only, but on the global structure: the optimization is done as consequence of the choices related to how the single devices are working, associated to how they interact each other and they transmit the information. The two levels (system and device) are strictly related, and design choices have to be done looking at the system as a global entity to be optimized.
应用要求电子系统采用新的方法。在速度和尺寸方面获得最佳性能的跑步概念,在过去的几十年里推动了电子设计,不再有效。事实上,电子系统现在被应用在非常不同的场景中,例如,有时速度并不重要,但功耗和可靠性是关键。寻找新的方法必须在系统层面上产生影响,这是一种战略,而不仅仅是在单个部件上,而是在全局结构上:优化是作为与单个设备如何工作相关的选择的结果,与它们如何相互作用以及它们如何传输信息相关。这两个层面(系统和设备)是严格相关的,设计选择必须将系统视为一个要优化的整体实体。
{"title":"Quality-Energy Trade-off and Bio-Inspired Electronic Systems","authors":"P. Ros, A. Sanginario, M. Crepaldi, D. Demarchi","doi":"10.1109/ICSEE.2018.8646112","DOIUrl":"https://doi.org/10.1109/ICSEE.2018.8646112","url":null,"abstract":"Applications are demanding new approaches to electronic systems. The concept of running for obtaining the best performances in terms of speed and dimensions, that drove the electronic design in the last decades, is no more valid. In fact, the electronic systems are nowadays applied in very much different scenarios where sometimes, for example, it is not at all important the speed, but power consumption and reliability are the keys.It is strategic to find new approaches that must have an impact at system level, not on the single parts only, but on the global structure: the optimization is done as consequence of the choices related to how the single devices are working, associated to how they interact each other and they transmit the information. The two levels (system and device) are strictly related, and design choices have to be done looking at the system as a global entity to be optimized.","PeriodicalId":254455,"journal":{"name":"2018 IEEE International Conference on the Science of Electrical Engineering in Israel (ICSEE)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124280329","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Combating Packet Loss in Image Coding using Oversampling and Irregular Interpolation 利用过采样和不规则插值对抗图像编码中的丢包
Mor Goren, R. Zamir
Diversity “multiple description” (MD) source coding promises graceful degradation in the presence of an unknown number of erasures in the channel. A simple solution in the case of two descriptions consists of oversampling the source by a factor of two and delta-sigma quantization. This approach was applied successfully to JPEG-based image coding over a lossy packet network, where the interpolation into two packets is done in the discrete cosine transform (DCT) domain. The extension to a larger number of descriptions, however, suffers from noise amplification whenever the received descriptions do not form a uniform sampling pattern. In this work we show how noise amplification can be reduced by optimizing the interpolation filter. We propose two interpolation methods which, for a given total coding rate, minimize the average distortion over all (K out of N) patterns of received packets. We provide simulation results comparing low pass and irregular interpolation filters, and discuss the advantage of each method.
分集“多重描述”(MD)源编码在信道中存在未知数量的擦除时保证了优雅的降级。在两个描述的情况下,一个简单的解决方案是对源进行2倍的过采样和delta-sigma量化。该方法成功地应用于有损数据包网络上基于jpeg的图像编码,其中在离散余弦变换(DCT)域中对两个数据包进行插值。然而,每当接收到的描述不形成均匀的采样模式时,对大量描述的扩展就会受到噪声放大的影响。在这项工作中,我们展示了如何通过优化插值滤波器来减少噪声放大。我们提出了两种插值方法,对于给定的总编码率,最小化接收数据包的所有(K / N)模式的平均失真。我们给出了低通和不规则插值滤波器的仿真结果,并讨论了每种方法的优点。
{"title":"Combating Packet Loss in Image Coding using Oversampling and Irregular Interpolation","authors":"Mor Goren, R. Zamir","doi":"10.1109/ICSEE.2018.8646292","DOIUrl":"https://doi.org/10.1109/ICSEE.2018.8646292","url":null,"abstract":"Diversity “multiple description” (MD) source coding promises graceful degradation in the presence of an unknown number of erasures in the channel. A simple solution in the case of two descriptions consists of oversampling the source by a factor of two and delta-sigma quantization. This approach was applied successfully to JPEG-based image coding over a lossy packet network, where the interpolation into two packets is done in the discrete cosine transform (DCT) domain. The extension to a larger number of descriptions, however, suffers from noise amplification whenever the received descriptions do not form a uniform sampling pattern. In this work we show how noise amplification can be reduced by optimizing the interpolation filter. We propose two interpolation methods which, for a given total coding rate, minimize the average distortion over all (K out of N) patterns of received packets. We provide simulation results comparing low pass and irregular interpolation filters, and discuss the advantage of each method.","PeriodicalId":254455,"journal":{"name":"2018 IEEE International Conference on the Science of Electrical Engineering in Israel (ICSEE)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116633214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Low-Complexity Video Classification using Recurrent Neural Networks 基于递归神经网络的低复杂度视频分类
Ifat Abramovich, Tomer Ben-Yehuda, R. Cohen
Deep learning has led to great successes in computer vision tasks such as image classification. This is mostly attributed to the availability of large image datasets such as ImageNet. However, the progress in video classification has been slower, especially due to the small size of available video datasets and larger computational and memory demands. To promote innovation and advancement in this field, Google announced the YouTube-8M dataset in 2016, which is a public video dataset containing about 8-million tagged videos. In this paper, we train several deep neural networks for video classification on a subset of YouTube-8M. Our approach is based on extracting frame-level features using the Inception-v3 network, which are later used by recurrent neural networks with LSTM/BiLSTM units for video classification. We focus on network architectures with low computational requirements and present a detailed performance comparison. We show that for 5 categories, more than 96% of the videos are labeled correctly, where for 10 categories more than 89% of the videos are labeled correctly. We demonstrate that transfer learning leads to substantial saving in training time, while offering good results.
深度学习在图像分类等计算机视觉任务中取得了巨大成功。这主要归功于像ImageNet这样的大型图像数据集的可用性。然而,视频分类的进展一直较慢,特别是由于可用视频数据集的规模较小以及对计算和内存的需求较大。为了推动这一领域的创新和进步,谷歌在2016年公布了YouTube-8M数据集,这是一个包含约800万个标记视频的公共视频数据集。在本文中,我们在YouTube-8M的一个子集上训练了几个用于视频分类的深度神经网络。我们的方法是基于使用Inception-v3网络提取帧级特征,这些特征后来被带有LSTM/BiLSTM单元的递归神经网络用于视频分类。我们关注低计算需求的网络架构,并给出了详细的性能比较。我们发现,对于5个类别,超过96%的视频被正确标记,而对于10个类别,超过89%的视频被正确标记。我们证明了迁移学习可以节省大量的训练时间,同时提供良好的效果。
{"title":"Low-Complexity Video Classification using Recurrent Neural Networks","authors":"Ifat Abramovich, Tomer Ben-Yehuda, R. Cohen","doi":"10.1109/ICSEE.2018.8646076","DOIUrl":"https://doi.org/10.1109/ICSEE.2018.8646076","url":null,"abstract":"Deep learning has led to great successes in computer vision tasks such as image classification. This is mostly attributed to the availability of large image datasets such as ImageNet. However, the progress in video classification has been slower, especially due to the small size of available video datasets and larger computational and memory demands. To promote innovation and advancement in this field, Google announced the YouTube-8M dataset in 2016, which is a public video dataset containing about 8-million tagged videos. In this paper, we train several deep neural networks for video classification on a subset of YouTube-8M. Our approach is based on extracting frame-level features using the Inception-v3 network, which are later used by recurrent neural networks with LSTM/BiLSTM units for video classification. We focus on network architectures with low computational requirements and present a detailed performance comparison. We show that for 5 categories, more than 96% of the videos are labeled correctly, where for 10 categories more than 89% of the videos are labeled correctly. We demonstrate that transfer learning leads to substantial saving in training time, while offering good results.","PeriodicalId":254455,"journal":{"name":"2018 IEEE International Conference on the Science of Electrical Engineering in Israel (ICSEE)","volume":"153 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115547168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Automatic Detection of Insulting Sentences in Conversation 会话中侮辱性语句的自动检测
Merav Allouch, A. Azaria, Rina Azoulay, Ester Ben-Izchak, M. Zwilling, D. Zachor
An overall goal of our work is to use machine-learning based solutions to assist children with communication difficulties in their communication task. In this paper, we concentrate on the problem of recognizing insulting sentences the child says, or insulting sentences that are told to him. An automated agent that is able to recognize such sentences can alert the child in real time situations, and can suggest how to respond to the resulting social situation. We composed a dataset of 1241 non-insulting and 1255 insulting sentences. We trained different machine learning methods on 90% randomly chosen sentences from the dataset and tested it on the remaining. We used the following machine learning methods: Multi-Layer Neural Network, SVM, Naive Bayes, Decision Tree, and Tree Bagger for the task. We found that the best predictors of the insulting sentences, were the SVM method, with 80% recall and over 75%precision, and the Multi-Layer Neural Network and the Tree Bagger, with precision and recall exceeding 75%, We also found that adding additional data to the learning process, such as 9500 labeled sentences from twitter, or adding the word “positive” and the word “negative” to sentences including positive or negative words, respectively, slightly improves the results in most of the cases. Our results provide the cornerstones for an automated system that would enable on-line assistance and consultation for children with communication disabilities, and also for other persons with communication problems, in a way that will enable them to function better in society through this assistance.
我们工作的总体目标是使用基于机器学习的解决方案来帮助有沟通困难的儿童完成沟通任务。在本文中,我们集中研究识别孩子所说的侮辱性句子或告诉他的侮辱性句子的问题。一个能够识别这些句子的自动代理可以在实时情况下提醒孩子,并可以建议如何应对由此产生的社交情况。我们组成了一个包含1241个非侮辱性句子和1255个侮辱性句子的数据集。我们在数据集中随机选择的90%的句子上训练了不同的机器学习方法,并在剩下的句子上进行了测试。我们使用了以下机器学习方法:多层神经网络、支持向量机、朴素贝叶斯、决策树和树袋机。我们发现,对侮辱性句子进行预测的最佳方法是支持向量机方法(SVM),其查全率为80%,查全率超过75%,以及多层神经网络和Tree Bagger,其查全率和查全率均超过75%。我们还发现,在学习过程中添加额外的数据,例如从twitter中添加9500个标记句子,或者在句子中分别添加单词“positive”和单词“negative”,包括正面或负面词汇。在大多数情况下会稍微改善结果。我们的研究结果为自动化系统提供了基础,该系统可以为有沟通障碍的儿童以及其他有沟通问题的人提供在线帮助和咨询,从而使他们能够通过这种帮助更好地在社会中发挥作用。
{"title":"Automatic Detection of Insulting Sentences in Conversation","authors":"Merav Allouch, A. Azaria, Rina Azoulay, Ester Ben-Izchak, M. Zwilling, D. Zachor","doi":"10.1109/ICSEE.2018.8646165","DOIUrl":"https://doi.org/10.1109/ICSEE.2018.8646165","url":null,"abstract":"An overall goal of our work is to use machine-learning based solutions to assist children with communication difficulties in their communication task. In this paper, we concentrate on the problem of recognizing insulting sentences the child says, or insulting sentences that are told to him. An automated agent that is able to recognize such sentences can alert the child in real time situations, and can suggest how to respond to the resulting social situation. We composed a dataset of 1241 non-insulting and 1255 insulting sentences. We trained different machine learning methods on 90% randomly chosen sentences from the dataset and tested it on the remaining. We used the following machine learning methods: Multi-Layer Neural Network, SVM, Naive Bayes, Decision Tree, and Tree Bagger for the task. We found that the best predictors of the insulting sentences, were the SVM method, with 80% recall and over 75%precision, and the Multi-Layer Neural Network and the Tree Bagger, with precision and recall exceeding 75%, We also found that adding additional data to the learning process, such as 9500 labeled sentences from twitter, or adding the word “positive” and the word “negative” to sentences including positive or negative words, respectively, slightly improves the results in most of the cases. Our results provide the cornerstones for an automated system that would enable on-line assistance and consultation for children with communication disabilities, and also for other persons with communication problems, in a way that will enable them to function better in society through this assistance.","PeriodicalId":254455,"journal":{"name":"2018 IEEE International Conference on the Science of Electrical Engineering in Israel (ICSEE)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116750544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Robust speaker clustering quality estimation 鲁棒说话人聚类质量估计
Yishai Cohen, I. Lapidot
This paper focuses on estimating the quality of a clustering process. In our case - the task is to cluster short speech segments that belong to different speakers. Moreover, speaker clustering quality may be well estimated on several clustering approaches if they all based on the same features. This is very important, as it allows us to use the same quality estimation system without retraining, and achieve reasonable results even when the clustering method is changed. We predict the system’s quality by applying a logistic regression estimator on a several statistical parameters of the clustering. In this paper, mean-shift clustering with either cosine or probabilistic linear discriminant analysis (PLDA) score as similarity measure, and stochastic vector quantization (VQ) with cosine distance were applied in order to cluster the short speaker segments represented by i-vectors. The quality of the clustering is measured using the average cluster purity (ACP), average speaker purity (ASP) and K. We show that these measures can be estimated fairly well by applying logistic regression based on various clustering statistics that calculated once clustering is over. These statistical parameters are used as a feature vector representing the clustering.
本文的重点是估计聚类过程的质量。在我们的例子中,任务是聚类属于不同说话人的短语音片段。此外,如果几种聚类方法都基于相同的特征,则可以很好地估计说话人聚类质量。这是非常重要的,因为它允许我们使用相同的质量估计系统而不需要再训练,即使改变聚类方法也能得到合理的结果。我们通过对聚类的几个统计参数应用逻辑回归估计器来预测系统的质量。本文采用余弦或概率线性判别分析(PLDA)得分作为相似性度量的均值偏移聚类和余弦距离的随机矢量量化(VQ)对i-vector表示的短说话人片段进行聚类。聚类的质量是用平均聚类纯度(ACP)、平均说话者纯度(ASP)和k来衡量的。我们表明,通过应用基于聚类结束后计算的各种聚类统计数据的逻辑回归,这些度量可以很好地估计出来。这些统计参数被用作表示聚类的特征向量。
{"title":"Robust speaker clustering quality estimation","authors":"Yishai Cohen, I. Lapidot","doi":"10.1109/ICSEE.2018.8646164","DOIUrl":"https://doi.org/10.1109/ICSEE.2018.8646164","url":null,"abstract":"This paper focuses on estimating the quality of a clustering process. In our case - the task is to cluster short speech segments that belong to different speakers. Moreover, speaker clustering quality may be well estimated on several clustering approaches if they all based on the same features. This is very important, as it allows us to use the same quality estimation system without retraining, and achieve reasonable results even when the clustering method is changed. We predict the system’s quality by applying a logistic regression estimator on a several statistical parameters of the clustering. In this paper, mean-shift clustering with either cosine or probabilistic linear discriminant analysis (PLDA) score as similarity measure, and stochastic vector quantization (VQ) with cosine distance were applied in order to cluster the short speaker segments represented by i-vectors. The quality of the clustering is measured using the average cluster purity (ACP), average speaker purity (ASP) and K. We show that these measures can be estimated fairly well by applying logistic regression based on various clustering statistics that calculated once clustering is over. These statistical parameters are used as a feature vector representing the clustering.","PeriodicalId":254455,"journal":{"name":"2018 IEEE International Conference on the Science of Electrical Engineering in Israel (ICSEE)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123986813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Probability Based Keys Sharing for IOT Security 基于概率的物联网安全密钥共享
G. Leshem, Esther David, M. Domb
The Internet of Things (IoT) is composed of a vast number of connected devices, interacting among them in real-time and high messaging volume. Such setting is in high probability to be targeted by malicious attackers. Therefore, robust security measures are required. Encryption is one of the ways to prevent the exposure of the transmitted messages and authenticate it. The main challenge of implementing encryption, is the need to frequently and securely change the encryption keys, which require constant key construction and key distribution. IoT devices have poor memory, storage, and processing bandwidth. Most of the existing security solutions cannot be implemented on them, and so leading to lack of adequate security. Allowing safe interaction between any two IoT-devices, means having a unique encryption key per conversation. This requires frequent changes of the encryption keys. To increase the availability of keys at each IoT-device, we propose an ongoing key construction process that loads the network with a common key-pool. The protocol is scalable to ensure long term security sustainability and encryption availability. The proposed protocol is based on a probability analysis that ensures the existence of a common key between any pair of IoT devices in a predefine probability which is set by the system designer. The implementation proves the feasibility of our proposed security protocol for IoT networks.
物联网(IoT)由大量连接的设备组成,这些设备之间实时交互,消息量很大。这样的设置很有可能成为恶意攻击者的目标。因此,需要健壮的安全措施。加密是防止传输的消息暴露并对其进行身份验证的方法之一。实现加密的主要挑战是需要频繁且安全地更改加密密钥,这需要不断地构造密钥和分发密钥。物联网设备的内存、存储和处理带宽较差。大多数现有的安全解决方案不能在它们上实现,因此导致缺乏足够的安全性。允许任何两个物联网设备之间的安全交互,意味着每次会话都有一个唯一的加密密钥。这需要经常更改加密密钥。为了提高每个物联网设备上密钥的可用性,我们提出了一个持续的密钥构建过程,该过程用一个公共密钥池加载网络。该协议是可扩展的,以确保长期的安全可持续性和加密可用性。所提出的协议基于概率分析,该分析确保任何一对物联网设备之间以由系统设计者设置的预定义概率存在公共密钥。实现证明了我们提出的物联网网络安全协议的可行性。
{"title":"Probability Based Keys Sharing for IOT Security","authors":"G. Leshem, Esther David, M. Domb","doi":"10.1109/icsee.2018.8645999","DOIUrl":"https://doi.org/10.1109/icsee.2018.8645999","url":null,"abstract":"The Internet of Things (IoT) is composed of a vast number of connected devices, interacting among them in real-time and high messaging volume. Such setting is in high probability to be targeted by malicious attackers. Therefore, robust security measures are required. Encryption is one of the ways to prevent the exposure of the transmitted messages and authenticate it. The main challenge of implementing encryption, is the need to frequently and securely change the encryption keys, which require constant key construction and key distribution. IoT devices have poor memory, storage, and processing bandwidth. Most of the existing security solutions cannot be implemented on them, and so leading to lack of adequate security. Allowing safe interaction between any two IoT-devices, means having a unique encryption key per conversation. This requires frequent changes of the encryption keys. To increase the availability of keys at each IoT-device, we propose an ongoing key construction process that loads the network with a common key-pool. The protocol is scalable to ensure long term security sustainability and encryption availability. The proposed protocol is based on a probability analysis that ensures the existence of a common key between any pair of IoT devices in a predefine probability which is set by the system designer. The implementation proves the feasibility of our proposed security protocol for IoT networks.","PeriodicalId":254455,"journal":{"name":"2018 IEEE International Conference on the Science of Electrical Engineering in Israel (ICSEE)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126195488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2018 IEEE International Conference on the Science of Electrical Engineering in Israel (ICSEE)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1