首页 > 最新文献

2018 IEEE 30th International Conference on Tools with Artificial Intelligence (ICTAI)最新文献

英文 中文
[Title page i] [标题页i]
{"title":"[Title page i]","authors":"","doi":"10.1109/ictai.2018.00001","DOIUrl":"https://doi.org/10.1109/ictai.2018.00001","url":null,"abstract":"","PeriodicalId":254686,"journal":{"name":"2018 IEEE 30th International Conference on Tools with Artificial Intelligence (ICTAI)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114107880","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Multimodal Human-Machine Interaction Scheme for an Intelligent Robotic Nurse 智能机器人护士的多模态人机交互方案
Iosif Papadakis Ktistakis, N. Bourbakis
This paper presents a new multimodal Human-Machine Interaction (HMI) scheme-model for the co-operation of a robotic-nurse (here a robotic wheelchair) and its human user. The HMI model processes vocal commands through a Personalized Isolated Word Recognition System (PIWRS) along with the recognition of Body Pose Angles (BPA) for decision-making in real time. In particular, the HMI scheme is able to recognize: (i) a set of voice commands, (ii) a set of body postures and poses and (iii) calculate the appropriate body angles associated to skeletal data obtained through a set of cameras. Furthermore, the HMI scheme receives specific values provided by pressure sensors, which are being utilized by the user throughout the duration of the tasks to be executed that compose the Active Participation System (APS). All these variables are appropriately combined for the safe control of an Autonomous Intelligent Robotic Wheelchair (AIRW) used by people in need. More specifically, the stand-up, turn-around and sit-down are the procedural steps under study.
本文提出了一种新的多模态人机交互(HMI)方案模型,用于机器人护士(这里是机器人轮椅)和它的人类使用者的合作。HMI模型通过个性化孤立词识别系统(PIWRS)处理语音命令,同时识别身体姿势角度(BPA),以便实时决策。特别是,HMI方案能够识别:(i)一组语音命令,(ii)一组身体姿势和姿势,以及(iii)计算与通过一组摄像头获得的骨骼数据相关的适当身体角度。此外,HMI方案接收压力传感器提供的特定值,用户在执行构成主动参与系统(APS)的任务期间使用这些值。所有这些变量都适当地组合在一起,以安全控制有需要的人使用的自主智能机器人轮椅(AIRW)。更具体地说,站立、转身和坐下是正在研究的程序步骤。
{"title":"A Multimodal Human-Machine Interaction Scheme for an Intelligent Robotic Nurse","authors":"Iosif Papadakis Ktistakis, N. Bourbakis","doi":"10.1109/ICTAI.2018.00118","DOIUrl":"https://doi.org/10.1109/ICTAI.2018.00118","url":null,"abstract":"This paper presents a new multimodal Human-Machine Interaction (HMI) scheme-model for the co-operation of a robotic-nurse (here a robotic wheelchair) and its human user. The HMI model processes vocal commands through a Personalized Isolated Word Recognition System (PIWRS) along with the recognition of Body Pose Angles (BPA) for decision-making in real time. In particular, the HMI scheme is able to recognize: (i) a set of voice commands, (ii) a set of body postures and poses and (iii) calculate the appropriate body angles associated to skeletal data obtained through a set of cameras. Furthermore, the HMI scheme receives specific values provided by pressure sensors, which are being utilized by the user throughout the duration of the tasks to be executed that compose the Active Participation System (APS). All these variables are appropriately combined for the safe control of an Autonomous Intelligent Robotic Wheelchair (AIRW) used by people in need. More specifically, the stand-up, turn-around and sit-down are the procedural steps under study.","PeriodicalId":254686,"journal":{"name":"2018 IEEE 30th International Conference on Tools with Artificial Intelligence (ICTAI)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116831493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Zigzagging Strategies for Temporal Induction 时间归纳法之字形策略
Guillaume Baud-Berthier, Laurent Simon
Model Checking is at the heart of formal methods for software and hardware verification. In this area of active research, Bounded Model Checking (BMC) and k-induction have reached very impressive results, especially when both methods are working together. They are based on a common approach that unrolls the transition relation, but each method serves a different purpose in practice. BMC is usually used for bugs findings, while k-induction aims at building inductive invariants. The ZigZag approach, proposed 15 years ago, takes benefit from both strategies by successively calling each one of them, while trying to share a lot of information between calls thanks to the mechanism of SAT clauses learning. Despite the practical importance of the ZigZag algorithm, it was mainly used forwardly until last year. The transition relation was unrolled by increasing depths only. However, as stated by the authors of ZigZag themselves, it was possible to consider the ZigZag approach backwardly. The experimental study of backward zigzag performances was only proposed one year ago. In this paper, we propose to extend the idea of the ZigZag algorithm by allowing to unroll the transitions from the middle. This has the nice property of allowing the SAT solver to keep learnt clauses that are both close to the initial state and to the bad state in the search. Our experimental study however shows that the best option for ZigZag is still to perform it backward, as stated in a previous work. However, we also show that our hybrid approach offers the same performances as forward ZigZag, while allowing more flexible strategies to be developed in the future, for example by choosing the right transition to expand.
模型检查是软件和硬件验证的形式化方法的核心。在这个活跃的研究领域,有界模型检查(BMC)和k-归纳已经取得了非常令人印象深刻的结果,特别是当这两种方法一起工作时。它们都基于展开转换关系的通用方法,但是每种方法在实践中都有不同的用途。BMC通常用于发现bug,而k-归纳的目的是构建归纳不变量。15年前提出的ZigZag方法利用了这两种策略的优势,通过连续调用每个呼叫,同时借助SAT从句学习机制,尝试在呼叫之间共享大量信息。尽管ZigZag算法具有重要的实际意义,但直到去年,它还主要是向前使用的。转换关系仅通过增加深度来展开。然而,正如ZigZag的作者自己所述,可以向后考虑ZigZag方法。倒之字形性能的实验研究是一年前才提出的。在本文中,我们建议通过允许从中间展开过渡来扩展ZigZag算法的思想。这有一个很好的特性,允许SAT求解器在搜索中保留既接近初始状态又接近坏状态的学习子句。然而,我们的实验研究表明,ZigZag的最佳选择仍然是向后执行,正如之前的工作所述。然而,我们也表明,我们的混合方法提供了与正向之字形相同的性能,同时允许在未来开发更灵活的策略,例如通过选择正确的过渡来扩展。
{"title":"Zigzagging Strategies for Temporal Induction","authors":"Guillaume Baud-Berthier, Laurent Simon","doi":"10.1109/ICTAI.2018.00117","DOIUrl":"https://doi.org/10.1109/ICTAI.2018.00117","url":null,"abstract":"Model Checking is at the heart of formal methods for software and hardware verification. In this area of active research, Bounded Model Checking (BMC) and k-induction have reached very impressive results, especially when both methods are working together. They are based on a common approach that unrolls the transition relation, but each method serves a different purpose in practice. BMC is usually used for bugs findings, while k-induction aims at building inductive invariants. The ZigZag approach, proposed 15 years ago, takes benefit from both strategies by successively calling each one of them, while trying to share a lot of information between calls thanks to the mechanism of SAT clauses learning. Despite the practical importance of the ZigZag algorithm, it was mainly used forwardly until last year. The transition relation was unrolled by increasing depths only. However, as stated by the authors of ZigZag themselves, it was possible to consider the ZigZag approach backwardly. The experimental study of backward zigzag performances was only proposed one year ago. In this paper, we propose to extend the idea of the ZigZag algorithm by allowing to unroll the transitions from the middle. This has the nice property of allowing the SAT solver to keep learnt clauses that are both close to the initial state and to the bad state in the search. Our experimental study however shows that the best option for ZigZag is still to perform it backward, as stated in a previous work. However, we also show that our hybrid approach offers the same performances as forward ZigZag, while allowing more flexible strategies to be developed in the future, for example by choosing the right transition to expand.","PeriodicalId":254686,"journal":{"name":"2018 IEEE 30th International Conference on Tools with Artificial Intelligence (ICTAI)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128644623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Edge Content Enhanced Network Embedding 边缘内容增强网络嵌入
Hongcui Wang, Erwei Wang, Di Jin, Xiao Wang, Jing Wang, Dongxiao He
Network embedding, aiming at learning the low-dimensional representations of nodes in a network, is a key to many network analysis tasks. All the current network embedding methods primarily explore the network topology or node attributes, while no effort has been made to analyze the edge content for network embedding. The edge content, such as the email content between two users in an email network, is often naturally associated with edges. They carry rich information to describe the interaction between nodes, and provide valuable supervision to learn the representations of nodes. In this paper, we propose a novel edge content enhanced network embedding model, which incorporates the edge content to guide the network representation learning process. We provide the efficient updating rules to infer the parameters in the model, along with theoretical analysis on correctness and convergence guarantees. Extensive experiments, in comparison with the state-of-the-arts, show the superior performance of our proposed new approach on different network analysis tasks.
网络嵌入旨在学习网络中节点的低维表示,是许多网络分析任务的关键。现有的网络嵌入方法主要是对网络拓扑或节点属性进行探索,没有对网络嵌入的边缘内容进行分析。边缘内容,例如电子邮件网络中两个用户之间的电子邮件内容,通常自然地与边缘联系在一起。它们携带了丰富的信息来描述节点之间的交互,并为学习节点的表示提供了有价值的监督。在本文中,我们提出了一种新的边缘内容增强网络嵌入模型,该模型利用边缘内容来指导网络表示学习过程。我们提供了有效的更新规则来推断模型中的参数,并对模型的正确性和收敛性进行了理论分析。大量的实验,与最先进的技术相比,表明我们提出的新方法在不同的网络分析任务上具有优越的性能。
{"title":"Edge Content Enhanced Network Embedding","authors":"Hongcui Wang, Erwei Wang, Di Jin, Xiao Wang, Jing Wang, Dongxiao He","doi":"10.1109/ICTAI.2018.00140","DOIUrl":"https://doi.org/10.1109/ICTAI.2018.00140","url":null,"abstract":"Network embedding, aiming at learning the low-dimensional representations of nodes in a network, is a key to many network analysis tasks. All the current network embedding methods primarily explore the network topology or node attributes, while no effort has been made to analyze the edge content for network embedding. The edge content, such as the email content between two users in an email network, is often naturally associated with edges. They carry rich information to describe the interaction between nodes, and provide valuable supervision to learn the representations of nodes. In this paper, we propose a novel edge content enhanced network embedding model, which incorporates the edge content to guide the network representation learning process. We provide the efficient updating rules to infer the parameters in the model, along with theoretical analysis on correctness and convergence guarantees. Extensive experiments, in comparison with the state-of-the-arts, show the superior performance of our proposed new approach on different network analysis tasks.","PeriodicalId":254686,"journal":{"name":"2018 IEEE 30th International Conference on Tools with Artificial Intelligence (ICTAI)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133718329","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Inferring Stochastic L-Systems Using a Hybrid Greedy Algorithm 用混合贪心算法推断随机l系统
Jason Bernard, Ian McQuillan
Stochastic context-free Lindenmayer systems (S0L-systems) are a formal grammar system that produce sequences of strings based on parallel rewriting rules over a probability distribution. The resulting words can be treated as symbolic instructions to create visual models by simulation software. S0L-system have been used to model different natural and engineered processes. One issue with S0L-systems is the difficulty in determining an S0L-systems to model a process. Current approaches either infer S0L-systems based on aesthetics or rely on a priori expert knowledge. This work introduces PMIT-S0L, a tool for inferring S0L-systems from a sequence of strings generated by a (hidden) L-system, using a greedy algorithm hybridized with search algorithms. PMIT-S0L was evaluated using 3600 procedurally generated S0L-systems and is able to infer the test set with 100% success so long as there are 12 or less rewriting rules in total in the L-system. This makes PMIT-S0L applicable for many practical applications.
随机上下文无关林登梅尔系统(random context-free Lindenmayer system,简称sl系统)是一种基于概率分布上的并行重写规则生成字符串序列的形式化语法系统。生成的单词可以作为符号指令,通过仿真软件创建可视化模型。系统已被用于模拟不同的自然和工程过程。sql系统的一个问题是很难确定一个sql系统来对流程进行建模。当前的方法要么基于美学来推断sl系统,要么依赖于先验的专家知识。这项工作介绍了PMIT-S0L,一个从(隐藏)l系统生成的字符串序列中推断sl系统的工具,使用贪婪算法和搜索算法相结合。PMIT-S0L使用3600个程序生成的s0l系统进行评估,只要l系统中总共有12个或更少的重写规则,就能够100%成功地推断出测试集。这使得PMIT-S0L适用于许多实际应用。
{"title":"Inferring Stochastic L-Systems Using a Hybrid Greedy Algorithm","authors":"Jason Bernard, Ian McQuillan","doi":"10.1109/ICTAI.2018.00097","DOIUrl":"https://doi.org/10.1109/ICTAI.2018.00097","url":null,"abstract":"Stochastic context-free Lindenmayer systems (S0L-systems) are a formal grammar system that produce sequences of strings based on parallel rewriting rules over a probability distribution. The resulting words can be treated as symbolic instructions to create visual models by simulation software. S0L-system have been used to model different natural and engineered processes. One issue with S0L-systems is the difficulty in determining an S0L-systems to model a process. Current approaches either infer S0L-systems based on aesthetics or rely on a priori expert knowledge. This work introduces PMIT-S0L, a tool for inferring S0L-systems from a sequence of strings generated by a (hidden) L-system, using a greedy algorithm hybridized with search algorithms. PMIT-S0L was evaluated using 3600 procedurally generated S0L-systems and is able to infer the test set with 100% success so long as there are 12 or less rewriting rules in total in the L-system. This makes PMIT-S0L applicable for many practical applications.","PeriodicalId":254686,"journal":{"name":"2018 IEEE 30th International Conference on Tools with Artificial Intelligence (ICTAI)","volume":"13 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133174597","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Translation-Based Attributed Network Embedding 基于翻译的属性网络嵌入
Jingjie Mo, Neng Gao, Yujing Zhou, Yang Pei, Jiong Wang
Attributed network embedding, which aims to map the structural and attribute information into a latent vector space jointly, has attracted a surge of research attention in recent years. However, a vast majority of existing work explores the correlation between node structure and attribute values whereas the attribute type information which can be potentially complementary is ignored. How to effectively model the nodes, attribute types and attribute values as well as their relations in a unified framework is an open yet challenging problem. To this end, we propose a translation-based attributed network embedding method named TransANE. In our approach, the whole attributed network is considered as a coupled network which consists of two components, i.e., node relation network and attribute correlation network. We construct attribute correlation network by the co-occurrence of attribute values. Each node-attribute relation is regarded as an attributional triple, e.g., (Tom, Gender, Male). We introduce knowledge representation method to model the mapping between nodes, attribute types and attribute values. Empirically, experiments on two real-world datasets including node multi-class classification and network visualization are conducted to evaluate the effectiveness of our method TransANE in this paper. Our method achieves significant performance compared with state-of-the-art baselines.
属性网络嵌入是一种将结构信息和属性信息共同映射到潜在向量空间的方法,近年来引起了人们的广泛关注。然而,绝大多数现有的工作探索节点结构和属性值之间的相关性,而忽略了可能互补的属性类型信息。如何在统一的框架中对节点、属性类型、属性值以及它们之间的关系进行有效的建模是一个开放而又具有挑战性的问题。为此,我们提出了一种基于翻译的属性网络嵌入方法TransANE。在我们的方法中,整个属性网络被认为是一个耦合网络,它由两个部分组成,即节点关系网络和属性关联网络。利用属性值的共现性构造属性关联网络。每个节点-属性关系被视为一个属性三元组,例如(Tom, Gender, Male)。引入知识表示方法对节点、属性类型和属性值之间的映射关系进行建模。在两个真实数据集上进行了节点多类分类和网络可视化实验,验证了TransANE方法的有效性。与最先进的基线相比,我们的方法取得了显著的性能。
{"title":"Translation-Based Attributed Network Embedding","authors":"Jingjie Mo, Neng Gao, Yujing Zhou, Yang Pei, Jiong Wang","doi":"10.1109/ICTAI.2018.00139","DOIUrl":"https://doi.org/10.1109/ICTAI.2018.00139","url":null,"abstract":"Attributed network embedding, which aims to map the structural and attribute information into a latent vector space jointly, has attracted a surge of research attention in recent years. However, a vast majority of existing work explores the correlation between node structure and attribute values whereas the attribute type information which can be potentially complementary is ignored. How to effectively model the nodes, attribute types and attribute values as well as their relations in a unified framework is an open yet challenging problem. To this end, we propose a translation-based attributed network embedding method named TransANE. In our approach, the whole attributed network is considered as a coupled network which consists of two components, i.e., node relation network and attribute correlation network. We construct attribute correlation network by the co-occurrence of attribute values. Each node-attribute relation is regarded as an attributional triple, e.g., (Tom, Gender, Male). We introduce knowledge representation method to model the mapping between nodes, attribute types and attribute values. Empirically, experiments on two real-world datasets including node multi-class classification and network visualization are conducted to evaluate the effectiveness of our method TransANE in this paper. Our method achieves significant performance compared with state-of-the-art baselines.","PeriodicalId":254686,"journal":{"name":"2018 IEEE 30th International Conference on Tools with Artificial Intelligence (ICTAI)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122053780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Intelligent Scheme for the Identification of QoS Violations in Virtualized Environments 一种虚拟化环境下QoS违规智能识别方案
Kostas Kolomvatsos, M. Koziri, Thanasis Loukopoulos
Current networking applications involve the definition and utilization of multiple virtualized resources on top of the available infrastructure. Software defined networks increase the performance compared with legacy systems as any functionality is managed through software. Securing the quality of service in such environments is significant to support novel applications that deliver their results in real time. In this paper, we propose a monitoring mechanism that observes the performance of the virtualized resources and identifies possible quality of service violations. Our model can be applied to any application domain, however, it is adapted to virtualized resources. We rely on a simple model that collects performance data, focuses on multiple parts of a virtualized functions chain and immediately concludes potential violations in real time. The proposed mechanism is incorporated in an SDN controller that is responsible to manage the virtualized resources. We provide an analytical description of the model and through a large set of simulations, we reveal its performance. Our results exhibit the timely identification of quality of service violations even in very dynamic environments where the performance of the network changes continuously.
当前的网络应用程序涉及在可用基础设施之上定义和利用多个虚拟化资源。与遗留系统相比,软件定义的网络提高了性能,因为任何功能都是通过软件管理的。在这样的环境中确保服务质量对于支持实时交付结果的新应用程序非常重要。在本文中,我们提出了一种监视机制,用于观察虚拟化资源的性能并识别可能的服务质量违规。我们的模型可以应用于任何应用程序领域,但是,它适用于虚拟化资源。我们依靠一个简单的模型来收集性能数据,专注于虚拟化功能链的多个部分,并立即实时得出潜在的违规行为。提议的机制被合并到负责管理虚拟化资源的SDN控制器中。我们提供了模型的分析描述,并通过大量的仿真,我们揭示了它的性能。我们的结果显示,即使在网络性能不断变化的非常动态的环境中,也能及时识别服务质量违规。
{"title":"An Intelligent Scheme for the Identification of QoS Violations in Virtualized Environments","authors":"Kostas Kolomvatsos, M. Koziri, Thanasis Loukopoulos","doi":"10.1109/ICTAI.2018.00160","DOIUrl":"https://doi.org/10.1109/ICTAI.2018.00160","url":null,"abstract":"Current networking applications involve the definition and utilization of multiple virtualized resources on top of the available infrastructure. Software defined networks increase the performance compared with legacy systems as any functionality is managed through software. Securing the quality of service in such environments is significant to support novel applications that deliver their results in real time. In this paper, we propose a monitoring mechanism that observes the performance of the virtualized resources and identifies possible quality of service violations. Our model can be applied to any application domain, however, it is adapted to virtualized resources. We rely on a simple model that collects performance data, focuses on multiple parts of a virtualized functions chain and immediately concludes potential violations in real time. The proposed mechanism is incorporated in an SDN controller that is responsible to manage the virtualized resources. We provide an analytical description of the model and through a large set of simulations, we reveal its performance. Our results exhibit the timely identification of quality of service violations even in very dynamic environments where the performance of the network changes continuously.","PeriodicalId":254686,"journal":{"name":"2018 IEEE 30th International Conference on Tools with Artificial Intelligence (ICTAI)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126098241","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Message from the Applications of AI in Smart Cities Track Chairs 人工智能在智慧城市轨道椅中的应用
{"title":"Message from the Applications of AI in Smart Cities Track Chairs","authors":"","doi":"10.1109/ictai.2018.00008","DOIUrl":"https://doi.org/10.1109/ictai.2018.00008","url":null,"abstract":"","PeriodicalId":254686,"journal":{"name":"2018 IEEE 30th International Conference on Tools with Artificial Intelligence (ICTAI)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123600844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Genetic Algorithm for Improving Robustness of Complex Networks 一种提高复杂网络鲁棒性的遗传算法
C. Pizzuti, Annalisa Socievole
A method to enhance the robustness of a network, based on Genetic Algorithms, is proposed. The approach optimizes the effective graph resistance of a network, a measure of robustness derived from the field of electric circuit analysis, that can be computed as a cumulative sum of the eigenvalues of the Laplacian matrix associated with the network. Specialized variation operators allow the method to find a solution almost always coinciding with that obtained by the exhaustive search. Experiments on synthetic and real life networks show that the approach outperforms heuristic strategies extensively investigated, by giving the exact solution in a high percentage of the considered networks.
提出了一种基于遗传算法增强网络鲁棒性的方法。该方法优化了网络的有效图电阻,这是一种来自电路分析领域的鲁棒性度量,可以通过与网络相关的拉普拉斯矩阵的特征值的累积和来计算。专门的变分算子使该方法几乎总是能找到与穷举搜索得到的解一致的解。在合成网络和现实生活网络上的实验表明,该方法优于广泛研究的启发式策略,在考虑的网络中给出了高百分比的精确解。
{"title":"A Genetic Algorithm for Improving Robustness of Complex Networks","authors":"C. Pizzuti, Annalisa Socievole","doi":"10.1109/ICTAI.2018.00085","DOIUrl":"https://doi.org/10.1109/ICTAI.2018.00085","url":null,"abstract":"A method to enhance the robustness of a network, based on Genetic Algorithms, is proposed. The approach optimizes the effective graph resistance of a network, a measure of robustness derived from the field of electric circuit analysis, that can be computed as a cumulative sum of the eigenvalues of the Laplacian matrix associated with the network. Specialized variation operators allow the method to find a solution almost always coinciding with that obtained by the exhaustive search. Experiments on synthetic and real life networks show that the approach outperforms heuristic strategies extensively investigated, by giving the exact solution in a high percentage of the considered networks.","PeriodicalId":254686,"journal":{"name":"2018 IEEE 30th International Conference on Tools with Artificial Intelligence (ICTAI)","volume":"128 7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123640244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Regressing Controversy of Music Artists from Microblogs 从微博看音乐人争议的回归
Mhd Mousa Hamad, M. Skowron, M. Schedl
Social media represents a valuable data source for researchers to analyze how people feel about a variety of topics, from politics to products to entertainment. This paper addresses the detection of controversies involving music artists, based on microblogs. In particular, we develop a new controversy detection dataset consisting of 53,441 tweets related to 95 music artists, and we devise and evaluate a comprehensive set of user-and content-based feature candidates to regress controversy. The evaluation results show a strong performance of the presented approach in the controversy detection task: F1 score of 0.811 in a classification task and RMSE of 0.688 in a regression task, using controversy scores in the range [1, 4]. In addition, the results obtained in applying the presented approach on a dataset from a different domain (CNN news controversy) demonstrate transferability of the developed feature set, with a significant improvement over prior approaches. A combination of the adopted Gradient Boosting based classifier and the developed feature set results in an F1 score of 0.775, which represents an improvement of 9.8% compared to the best prior result on this dataset.
社交媒体为研究人员分析人们对各种话题的感受提供了宝贵的数据源,从政治到产品再到娱乐。本文以微博为基础,探讨音乐艺人争议的检测问题。特别是,我们开发了一个新的争议检测数据集,由与95位音乐艺术家相关的53,441条推文组成,我们设计并评估了一套全面的基于用户和内容的候选特征来回归争议。评价结果表明,本文方法在争议检测任务中表现良好:在分类任务中F1得分为0.811,在回归任务中RMSE得分为0.688,争议得分范围为[1,4]。此外,将所提出的方法应用于来自不同领域的数据集(CNN新闻争议)所获得的结果表明,所开发的特征集具有可移植性,与先前的方法相比有显着改善。采用的基于Gradient Boosting的分类器与开发的特征集相结合,F1得分为0.775,与该数据集上的最佳先验结果相比,提高了9.8%。
{"title":"Regressing Controversy of Music Artists from Microblogs","authors":"Mhd Mousa Hamad, M. Skowron, M. Schedl","doi":"10.1109/ICTAI.2018.00090","DOIUrl":"https://doi.org/10.1109/ICTAI.2018.00090","url":null,"abstract":"Social media represents a valuable data source for researchers to analyze how people feel about a variety of topics, from politics to products to entertainment. This paper addresses the detection of controversies involving music artists, based on microblogs. In particular, we develop a new controversy detection dataset consisting of 53,441 tweets related to 95 music artists, and we devise and evaluate a comprehensive set of user-and content-based feature candidates to regress controversy. The evaluation results show a strong performance of the presented approach in the controversy detection task: F1 score of 0.811 in a classification task and RMSE of 0.688 in a regression task, using controversy scores in the range [1, 4]. In addition, the results obtained in applying the presented approach on a dataset from a different domain (CNN news controversy) demonstrate transferability of the developed feature set, with a significant improvement over prior approaches. A combination of the adopted Gradient Boosting based classifier and the developed feature set results in an F1 score of 0.775, which represents an improvement of 9.8% compared to the best prior result on this dataset.","PeriodicalId":254686,"journal":{"name":"2018 IEEE 30th International Conference on Tools with Artificial Intelligence (ICTAI)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126018910","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2018 IEEE 30th International Conference on Tools with Artificial Intelligence (ICTAI)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1