首页 > 最新文献

2020 International Conference on Computational Science and Computational Intelligence (CSCI)最新文献

英文 中文
Design of Humanity by the Concept of Artificial Personalities 人造人格概念下的人性设计
Taishi Nemoto, T. Fujimoto
Since the 2000s, the third artificial intelligence boom has occurred. Research on machine learning and deep learning is progressing, but challenges remain regarding realizing so-called ‘human-like’ general-purpose AI (Artificial Intelligence). In recent years, artificial intelligence research has been linked to cognitive science, and the question of what ‘humanity’ is and how to design ‘humanity’ has been raised as issues. The more robots resemble humans, the more the ‘uncanny valley phenomenon’ increases and the more people feel uncomfortable. Even though technology has advanced and realistic textures can be expressed, robots seem to be just ‘artifacts.’ The point of this study is to determine at what point humans feel ‘human-like’ and how to reproduce ‘human-like’ using a computer. In this study, in order to express human personality and characteristic gestures, we generate an ‘artificial personality’ (AP), and let people find the human touch that a real person possesses through that AP. For example, artificial reproduction of the intelligence of a deceased person is difficult with today's technology. However, AP enables to extract the characteristics of a person's gestures, routines, habits, and facial expressions in his or her lifetime, and to digitally recreate the person's personality based on the accumulation of ‘flesh and blood’ data. This study discusses the two elements and basic mechanisms that are necessary for AP research.
自2000年代以来,出现了第三次人工智能热潮。机器学习和深度学习的研究正在取得进展,但在实现所谓的“类人”通用AI(人工智能)方面仍然存在挑战。近年来,人工智能研究与认知科学联系在一起,“人性”是什么以及如何设计“人性”的问题被提了出来。机器人越像人类,“恐怖谷现象”就越普遍,人们也就越感到不舒服。尽管技术先进,可以表达逼真的纹理,但机器人似乎只是“人工制品”。“这项研究的重点是确定人类在什么程度上感觉‘像人’,以及如何用电脑复制‘像人’。”在这项研究中,为了表达人类的个性和特征手势,我们产生了一个“人工人格”(artificial personality, AP),并让人们通过该AP找到一个真实的人所拥有的人情味。例如,在今天的技术下,人工复制一个死者的智能是很困难的。然而,AP能够提取一个人一生中的手势、日常活动、习惯和面部表情的特征,并基于“血肉之躯”数据的积累,以数字方式重建这个人的个性。本研究探讨了AP研究必须具备的两个要素和基本机制。
{"title":"Design of Humanity by the Concept of Artificial Personalities","authors":"Taishi Nemoto, T. Fujimoto","doi":"10.1109/CSCI51800.2020.00121","DOIUrl":"https://doi.org/10.1109/CSCI51800.2020.00121","url":null,"abstract":"Since the 2000s, the third artificial intelligence boom has occurred. Research on machine learning and deep learning is progressing, but challenges remain regarding realizing so-called ‘human-like’ general-purpose AI (Artificial Intelligence). In recent years, artificial intelligence research has been linked to cognitive science, and the question of what ‘humanity’ is and how to design ‘humanity’ has been raised as issues. The more robots resemble humans, the more the ‘uncanny valley phenomenon’ increases and the more people feel uncomfortable. Even though technology has advanced and realistic textures can be expressed, robots seem to be just ‘artifacts.’ The point of this study is to determine at what point humans feel ‘human-like’ and how to reproduce ‘human-like’ using a computer. In this study, in order to express human personality and characteristic gestures, we generate an ‘artificial personality’ (AP), and let people find the human touch that a real person possesses through that AP. For example, artificial reproduction of the intelligence of a deceased person is difficult with today's technology. However, AP enables to extract the characteristics of a person's gestures, routines, habits, and facial expressions in his or her lifetime, and to digitally recreate the person's personality based on the accumulation of ‘flesh and blood’ data. This study discusses the two elements and basic mechanisms that are necessary for AP research.","PeriodicalId":336929,"journal":{"name":"2020 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114522630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Scalable Distributed Checkpointing Algorithm 可扩展的分布式检查点算法
Jinho Ahn
A communication-induced checkpointing algorithm, named HMNR, was introduced to effectively use control information of every other process piggybacked on each sent message for minimizing the number of forced checkpoints. Then, an improved algorithm, called Lazy-HMNR, was presented to lower the possibility of taking forced checkpoints incurred by the asymmetry between checkpointing frequencies of processes. Despite these two different minimization techniques, if the high message interaction traffic occurs, Lazy-HMNR may considerably lower the probability of detecting Z-cycle free patterns due to its shortcoming. Also, there is no prior research attempt to design the algorithms considering network topologies for making the number of forced checkpoints as few as possible with control information piggybacked on each message. This paper introduces a new Lazy-HMNR algorithm for group communication-based distributed systems to synergistically decrease the number of forced checkpoints in a more effective manner.
引入了一种名为HMNR的通信诱导检查点算法,以有效地利用每个发送消息上承载的每个其他进程的控制信息,以最小化强制检查点的数量。然后,提出了一种改进算法Lazy-HMNR,以降低进程检查点频率不对称导致的强制检查点的可能性。尽管有这两种不同的最小化技术,如果出现高消息交互流量,Lazy-HMNR由于其缺点可能会大大降低检测到Z-cycle自由模式的概率。此外,没有先前的研究尝试设计考虑网络拓扑的算法,以使强制检查点的数量尽可能少,并在每个消息上承载控制信息。针对基于群通信的分布式系统,提出了一种新的Lazy-HMNR算法,以更有效地协同减少强制检查点的数量。
{"title":"Scalable Distributed Checkpointing Algorithm","authors":"Jinho Ahn","doi":"10.1109/CSCI51800.2020.00237","DOIUrl":"https://doi.org/10.1109/CSCI51800.2020.00237","url":null,"abstract":"A communication-induced checkpointing algorithm, named HMNR, was introduced to effectively use control information of every other process piggybacked on each sent message for minimizing the number of forced checkpoints. Then, an improved algorithm, called Lazy-HMNR, was presented to lower the possibility of taking forced checkpoints incurred by the asymmetry between checkpointing frequencies of processes. Despite these two different minimization techniques, if the high message interaction traffic occurs, Lazy-HMNR may considerably lower the probability of detecting Z-cycle free patterns due to its shortcoming. Also, there is no prior research attempt to design the algorithms considering network topologies for making the number of forced checkpoints as few as possible with control information piggybacked on each message. This paper introduces a new Lazy-HMNR algorithm for group communication-based distributed systems to synergistically decrease the number of forced checkpoints in a more effective manner.","PeriodicalId":336929,"journal":{"name":"2020 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114824487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Proximity in the Brain 大脑中的接近性
Zalán Heszberger, A. Gulyás, András Majdán, András Bíró, László Balázs, Szabolcs Mezei, J. Bíró
The structural navigability of complex networks is an important question in the function-structure perspective of complex network analysis. This may provide hints on the underlying mechanisms that have been forming the structure of networks for a desirable level of navigation. It has been already discovered that greedy navigational cores as minimalistic networks with 100% greedy navigability considerably present in many real networks, including the structural networks of the human brain. Because the greedy navigational core is not unique, the connection between the level of its presence in a network and the structural navigability of that network is far from clear. In this paper, we deal with a special subset of the greedy navigational core, the so-called greedy proximity links (GPL), whose presence is necessary for 100% greedy navigability of a network. We show that the greedy proximity links are highly present in the brain networks, and the presence is consistent throughout the the individual subjects.
复杂网络的结构可通航性是复杂网络功能-结构分析中的一个重要问题。这可能会为我们提供一些线索,让我们了解形成网络结构的潜在机制,从而达到理想的导航水平。人们已经发现,贪婪导航核心作为具有100%贪婪可通航性的极简网络,在许多真实网络中相当普遍,包括人类大脑的结构网络。因为贪婪的导航核心并不是唯一的,所以它在网络中的存在程度与该网络的结构可通航性之间的联系远不清楚。在本文中,我们处理贪婪导航核心的一个特殊子集,即所谓的贪婪邻近链路(GPL),它的存在对于网络的100%贪婪导航性是必要的。我们发现贪婪邻近链接在大脑网络中高度存在,并且在个体受试者中存在一致。
{"title":"Proximity in the Brain","authors":"Zalán Heszberger, A. Gulyás, András Majdán, András Bíró, László Balázs, Szabolcs Mezei, J. Bíró","doi":"10.1109/CSCI51800.2020.00256","DOIUrl":"https://doi.org/10.1109/CSCI51800.2020.00256","url":null,"abstract":"The structural navigability of complex networks is an important question in the function-structure perspective of complex network analysis. This may provide hints on the underlying mechanisms that have been forming the structure of networks for a desirable level of navigation. It has been already discovered that greedy navigational cores as minimalistic networks with 100% greedy navigability considerably present in many real networks, including the structural networks of the human brain. Because the greedy navigational core is not unique, the connection between the level of its presence in a network and the structural navigability of that network is far from clear. In this paper, we deal with a special subset of the greedy navigational core, the so-called greedy proximity links (GPL), whose presence is necessary for 100% greedy navigability of a network. We show that the greedy proximity links are highly present in the brain networks, and the presence is consistent throughout the the individual subjects.","PeriodicalId":336929,"journal":{"name":"2020 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"191 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123389034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Feature Selection for Learning to Predict Outcomes of Compute Cluster Jobs with Application to Decision Support 基于决策支持的计算集群作业结果学习预测特征选择
Adedolapo Okanlawon, Huichen Yang, Avishek Bose, W. Hsu, Dan Andresen, Mohammed Tanash
We present a machine learning framework and a new test bed for data mining from the Slurm Workload Manager for high-performance computing (HPC) clusters. The focus was to find a method for selecting features to support decisions: helping users decide whether to resubmit failed jobs with boosted CPU and memory allocations or migrate them to a computing cloud. This task was cast as both supervised classification and regression learning, specifically, sequential problem solving suitable for reinforcement learning. Selecting relevant features can improve training accuracy, reduce training time, and produce a more comprehensible model, with an intelligent system that can explain predictions and inferences. We present a supervised learning model trained on a Simple Linux Utility for Resource Management (Slurm) data set of HPC jobs using three different techniques for selecting features: linear regression, lasso, and ridge regression. Our data set represented both HPC jobs that failed and those that succeeded, so our model was reliable, less likely to overfit, and generalizable. Our model achieved an R2 of 95% with 99% accuracy. We identified five predictors for both CPU and memory properties.
我们提出了一个机器学习框架和一个新的测试平台,用于高性能计算(HPC)集群的Slurm工作负载管理器的数据挖掘。重点是找到一种方法来选择支持决策的特性:帮助用户决定是通过提高CPU和内存分配来重新提交失败的作业,还是将它们迁移到计算云。该任务被视为监督分类和回归学习,特别是适合于强化学习的顺序问题解决。选择相关特征可以提高训练精度,减少训练时间,并产生更易于理解的模型,并具有可以解释预测和推断的智能系统。我们提出了一个在简单Linux资源管理实用程序(Slurm) HPC作业数据集上训练的监督学习模型,使用三种不同的技术来选择特征:线性回归、套索回归和脊回归。我们的数据集既代表了失败的HPC作业,也代表了成功的HPC作业,因此我们的模型是可靠的,不太可能过拟合,并且具有通用性。我们的模型达到了95%的R2,准确率为99%。我们确定了CPU和内存属性的五个预测因子。
{"title":"Feature Selection for Learning to Predict Outcomes of Compute Cluster Jobs with Application to Decision Support","authors":"Adedolapo Okanlawon, Huichen Yang, Avishek Bose, W. Hsu, Dan Andresen, Mohammed Tanash","doi":"10.1109/CSCI51800.2020.00230","DOIUrl":"https://doi.org/10.1109/CSCI51800.2020.00230","url":null,"abstract":"We present a machine learning framework and a new test bed for data mining from the Slurm Workload Manager for high-performance computing (HPC) clusters. The focus was to find a method for selecting features to support decisions: helping users decide whether to resubmit failed jobs with boosted CPU and memory allocations or migrate them to a computing cloud. This task was cast as both supervised classification and regression learning, specifically, sequential problem solving suitable for reinforcement learning. Selecting relevant features can improve training accuracy, reduce training time, and produce a more comprehensible model, with an intelligent system that can explain predictions and inferences. We present a supervised learning model trained on a Simple Linux Utility for Resource Management (Slurm) data set of HPC jobs using three different techniques for selecting features: linear regression, lasso, and ridge regression. Our data set represented both HPC jobs that failed and those that succeeded, so our model was reliable, less likely to overfit, and generalizable. Our model achieved an R2 of 95% with 99% accuracy. We identified five predictors for both CPU and memory properties.","PeriodicalId":336929,"journal":{"name":"2020 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"67 1-2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123587156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Safe Selfie 安全的有问题
M. Blair, Davis Jeffords, Eric Lilling, Shankar Banik
In this paper, we discuss the importance and proof of concept for a picture-taking app that will remind the user of their surroundings. The background to this issue is that several people die a year because they are in a situation unsafe for taking pictures, but are too preoccupied with their phone to realise the danger. This application will take many factors into consideration, including user velocity, local emergency contact information, and geological hazards to warn the user of safety issues. The goal of this application is to reduce the amount of accidental injuries or deaths related to taking pictures in unsafe areas.
在本文中,我们讨论了一个拍照应用程序的重要性和概念证明,它将提醒用户他们的周围环境。这个问题的背景是,每年有几个人因为拍照不安全而死亡,但他们太专注于手机而没有意识到危险。该应用程序将考虑许多因素,包括用户速度、当地紧急联系信息和地质灾害,以警告用户安全问题。这个应用程序的目标是减少与在不安全地区拍照有关的意外伤害或死亡的数量。
{"title":"Safe Selfie","authors":"M. Blair, Davis Jeffords, Eric Lilling, Shankar Banik","doi":"10.1109/CSCI51800.2020.00035","DOIUrl":"https://doi.org/10.1109/CSCI51800.2020.00035","url":null,"abstract":"In this paper, we discuss the importance and proof of concept for a picture-taking app that will remind the user of their surroundings. The background to this issue is that several people die a year because they are in a situation unsafe for taking pictures, but are too preoccupied with their phone to realise the danger. This application will take many factors into consideration, including user velocity, local emergency contact information, and geological hazards to warn the user of safety issues. The goal of this application is to reduce the amount of accidental injuries or deaths related to taking pictures in unsafe areas.","PeriodicalId":336929,"journal":{"name":"2020 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121642386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Cyberbullying Detection Through Sentiment Analysis 基于情感分析的网络欺凌检测
J. Atoum
In recent years with the widespread of social media platforms across the globe especially among young people, cyberbullying and aggression have become a serious and annoying problem that communities must deal with. Such platforms provide various ways for bullies to attack and threaten others in their communities. Various techniques and methodologies have been used or proposed to combat cyberbullying through early detection and alerts to discover and/or protect victims from such attacks. Machine learning (ML) techniques have been widely used to detect some language patterns that are exploited by bullies to attack their victims. Also. Sentiment Analysis (SA) of social media content has become one of the growing areas of research in machine learning. SA provides the ability to detect cyberbullying in real-time. SA provides the ability to detect cyberbullying in real-time. This paper proposes a SA model for identifying cyberbullying texts in Twitter social media. Support Vector Machines (SVM) and Naïve Bayes (NB) are used in this model as supervised machine learning classification tools. The results of the experiments conducted on this model showed encouraging outcomes when a higher n-grams language model is applied on such texts in comparison with similar previous research. Also, the results showed that SVM classifiers have better performance measures than NB classifiers on such tweets.
近年来,随着社交媒体平台在全球尤其是年轻人中的普及,网络欺凌和攻击已成为一个严重而恼人的问题,社区必须应对。这些平台为欺凌者提供了各种攻击和威胁社区内其他人的方式。已经使用或提出了各种技术和方法,通过早期发现和警报来打击网络欺凌,以发现和/或保护受害者免受此类攻击。机器学习(ML)技术已经被广泛用于检测一些被欺凌者用来攻击受害者的语言模式。也。社交媒体内容的情感分析(SA)已经成为机器学习研究的一个新兴领域。SA提供了实时检测网络欺凌的能力。SA提供了实时检测网络欺凌的能力。本文提出了一个识别Twitter社交媒体中网络欺凌文本的SA模型。该模型使用支持向量机(SVM)和Naïve贝叶斯(NB)作为监督式机器学习分类工具。在此模型上进行的实验结果表明,与之前的类似研究相比,将更高n-grams的语言模型应用于此类文本时,结果令人鼓舞。此外,结果表明SVM分类器在此类推文上具有比NB分类器更好的性能指标。
{"title":"Cyberbullying Detection Through Sentiment Analysis","authors":"J. Atoum","doi":"10.1109/CSCI51800.2020.00056","DOIUrl":"https://doi.org/10.1109/CSCI51800.2020.00056","url":null,"abstract":"In recent years with the widespread of social media platforms across the globe especially among young people, cyberbullying and aggression have become a serious and annoying problem that communities must deal with. Such platforms provide various ways for bullies to attack and threaten others in their communities. Various techniques and methodologies have been used or proposed to combat cyberbullying through early detection and alerts to discover and/or protect victims from such attacks. Machine learning (ML) techniques have been widely used to detect some language patterns that are exploited by bullies to attack their victims. Also. Sentiment Analysis (SA) of social media content has become one of the growing areas of research in machine learning. SA provides the ability to detect cyberbullying in real-time. SA provides the ability to detect cyberbullying in real-time. This paper proposes a SA model for identifying cyberbullying texts in Twitter social media. Support Vector Machines (SVM) and Naïve Bayes (NB) are used in this model as supervised machine learning classification tools. The results of the experiments conducted on this model showed encouraging outcomes when a higher n-grams language model is applied on such texts in comparison with similar previous research. Also, the results showed that SVM classifiers have better performance measures than NB classifiers on such tweets.","PeriodicalId":336929,"journal":{"name":"2020 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123900938","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Rules for Optimal Perpetual Gossiping Schemes 最佳永久八卦计划的规则
I. Avramovic, D. Richards
Perpetual gossiping is an all-to-all communication problem on social networks, or any coordinated distributed system in general. In perpetual gossiping, a state of universal reachability is maintained by a continuous sequence of communications between participants. Unlike the well-understood static case, perpetual gossiping is a difficult problem, with some NP-complete classes of solutions. A basic question which remains open is whether an optimal scheme of contiguous calls is guaranteed to exist for a tree. This paper presents a series of theoretical tools directed towards answering the question.
永久的八卦是社交网络或任何协调分布式系统中所有人的交流问题。在没完没了的八卦中,参与者之间的连续交流维持了一种普遍可及的状态。与众所周知的静态情况不同,永久八卦是一个难题,具有一些np完全类的解。一个悬而未决的基本问题是,对于树是否保证存在连续调用的最优方案。本文提出了一系列旨在回答这个问题的理论工具。
{"title":"Rules for Optimal Perpetual Gossiping Schemes","authors":"I. Avramovic, D. Richards","doi":"10.1109/CSCI51800.2020.00043","DOIUrl":"https://doi.org/10.1109/CSCI51800.2020.00043","url":null,"abstract":"Perpetual gossiping is an all-to-all communication problem on social networks, or any coordinated distributed system in general. In perpetual gossiping, a state of universal reachability is maintained by a continuous sequence of communications between participants. Unlike the well-understood static case, perpetual gossiping is a difficult problem, with some NP-complete classes of solutions. A basic question which remains open is whether an optimal scheme of contiguous calls is guaranteed to exist for a tree. This paper presents a series of theoretical tools directed towards answering the question.","PeriodicalId":336929,"journal":{"name":"2020 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125857064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Crossroad Accident Responsibility Prediction Based on a Multi-agent System 基于多智能体系统的十字路口事故责任预测
Helton Agbewonou Yawovi, Tadachika Ozono, T. Shintani
With the increasing number of motorized vehicles, road accidents are increasing year by year all over the world.. After an accident, the police investigate the circumstances of the incident and determine each actor’s responsibilities. Our goal is to create a police support system. We focused on a multi-agent system that predicts each actor’s responsibility in a road accident (especially crossroad accidents). The system uses the driving recorder video of a vehicle as the input data source, and it outputs the prediction of the responsibility of each actor in the accident. It consists of three agents: (1) Crash time detection and crash video split into images; (2) Traffic signs detection in the crash video; (3) Responsibility prediction using a knowledge system.
随着机动车数量的不断增加,世界各地的道路交通事故也在逐年增加。事故发生后,警方调查事件的情况并确定每个行为者的责任。我们的目标是建立一个警察支援系统。我们专注于一个多智能体系统,该系统可以预测道路事故(尤其是十字路口事故)中每个参与者的责任。该系统以车辆的行车记录仪视频作为输入数据源,输出对事故中各行为主体责任的预测。它由三个代理组成:(1)碰撞时间检测和碰撞视频分割图像;(2)碰撞视频中的交通标志检测;(3)利用知识系统进行责任预测。
{"title":"Crossroad Accident Responsibility Prediction Based on a Multi-agent System","authors":"Helton Agbewonou Yawovi, Tadachika Ozono, T. Shintani","doi":"10.1109/CSCI51800.2020.00103","DOIUrl":"https://doi.org/10.1109/CSCI51800.2020.00103","url":null,"abstract":"With the increasing number of motorized vehicles, road accidents are increasing year by year all over the world.. After an accident, the police investigate the circumstances of the incident and determine each actor’s responsibilities. Our goal is to create a police support system. We focused on a multi-agent system that predicts each actor’s responsibility in a road accident (especially crossroad accidents). The system uses the driving recorder video of a vehicle as the input data source, and it outputs the prediction of the responsibility of each actor in the accident. It consists of three agents: (1) Crash time detection and crash video split into images; (2) Traffic signs detection in the crash video; (3) Responsibility prediction using a knowledge system.","PeriodicalId":336929,"journal":{"name":"2020 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"134 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129300083","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Hybrid Artificial Intelligence, Machine Learning, and Control Algorithm Integration Framework for Embedded Systems using Semantic Web Technology 基于语义Web技术的嵌入式系统混合人工智能、机器学习和控制算法集成框架
J. Wallace, Angelica Valdivia
A framework to integrate structurally different artificial intelligence, machine learning, and control algorithms is combined with an execution framework to create a powerful embedded system development platform. Control, decision, or algorithms providing an emulation of intelligent behavior in both declarative (interpreted) and imperative (compiled) paradigms can now be combined, for example Prolog and neural networks, respectively. This hybridization of algorithms provides more efficient overall control of systems in terms of resources such as compute cycles, network bandwidth and throughput, and memory speed and capacity. By providing an execution framework and control software that is native to embedded system and cloud architectures, and supports interactivity and time synchronization, the true utility of cloud computing and "big data systems" can be increased.
将结构上不同的人工智能、机器学习和控制算法与执行框架相结合,创建强大的嵌入式系统开发平台。控制、决策或算法在声明性(解释型)和命令式(编译型)范例中提供智能行为的模拟,现在可以组合在一起,例如Prolog和神经网络。这种混合算法在计算周期、网络带宽和吞吐量、内存速度和容量等资源方面提供了更有效的系统整体控制。通过提供嵌入式系统和云架构的本地执行框架和控制软件,并支持交互性和时间同步,可以增加云计算和“大数据系统”的真正效用。
{"title":"A Hybrid Artificial Intelligence, Machine Learning, and Control Algorithm Integration Framework for Embedded Systems using Semantic Web Technology","authors":"J. Wallace, Angelica Valdivia","doi":"10.1109/CSCI51800.2020.00089","DOIUrl":"https://doi.org/10.1109/CSCI51800.2020.00089","url":null,"abstract":"A framework to integrate structurally different artificial intelligence, machine learning, and control algorithms is combined with an execution framework to create a powerful embedded system development platform. Control, decision, or algorithms providing an emulation of intelligent behavior in both declarative (interpreted) and imperative (compiled) paradigms can now be combined, for example Prolog and neural networks, respectively. This hybridization of algorithms provides more efficient overall control of systems in terms of resources such as compute cycles, network bandwidth and throughput, and memory speed and capacity. By providing an execution framework and control software that is native to embedded system and cloud architectures, and supports interactivity and time synchronization, the true utility of cloud computing and \"big data systems\" can be increased.","PeriodicalId":336929,"journal":{"name":"2020 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129381381","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Lightweight Multi-factor Authentication for Underwater Wireless Sensor Networks 水下无线传感器网络轻量级多因素认证
Ahmed Al Guqhaiman, Oluwatobi Akanbi, Amer Aljaedi, C. E. Chow
Underwater Wireless Sensor Networks (UWSNs) are liable to malicious attacks due to limited bandwidth, limited power, high propagation delay, path loss, and variable speed. The major differences between UWSNs and Terrestrial Wireless Sensor Networks (TWSNs) necessitate a new mechanism to secure UWSNs. The existing Media Access Control (MAC) and routing protocols have addressed the network performance of UWSNs, but are vulnerable to several attacks. The secure MAC and routing protocols must exist to detect Sybil, Blackhole, Wormhole, Hello Flooding, Acknowledgment Spoofing, Selective Forwarding, Sinkhole, and Exhaustion attacks. These attacks can disrupt or disable the network connection. Hence, these attacks can degrade the network performance and total loss can be catastrophic in some applications, like monitoring oil/gas spills. Several researchers have studied the security of UWSNs, but most of the works detect malicious attacks solely based on a certain predefined threshold. It is not optimal to detect malicious attacks after the threshold value is met. In this paper, we propose a multi-factor authentication model that is based on zero-knowledge proof to detect malicious activities and secure UWSNs from several attacks.
水下无线传感器网络(UWSNs)由于带宽有限、功率有限、传播延迟大、路径丢失和速度可变等特点,容易受到恶意攻击。uwsn与地面无线传感器网络(TWSNs)之间的主要区别需要一种新的机制来保护uwsn。现有的媒体访问控制(MAC)和路由协议解决了uwsn的网络性能问题,但容易受到多种攻击。必须存在安全的MAC和路由协议才能检测Sybil、黑洞、虫洞、Hello flood、确认欺骗、选择性转发、天坑和耗尽攻击。这些攻击可以破坏或禁用网络连接。因此,这些攻击会降低网络性能,在某些应用程序(如监测石油/天然气泄漏)中,总损失可能是灾难性的。一些研究人员对UWSNs的安全性进行了研究,但大多数工作仅仅基于某个预定义的阈值来检测恶意攻击。在达到阈值后才检测恶意攻击并不是最优的。在本文中,我们提出了一种基于零知识证明的多因素认证模型来检测恶意活动并保护uwsn免受多种攻击。
{"title":"Lightweight Multi-factor Authentication for Underwater Wireless Sensor Networks","authors":"Ahmed Al Guqhaiman, Oluwatobi Akanbi, Amer Aljaedi, C. E. Chow","doi":"10.1109/CSCI51800.2020.00039","DOIUrl":"https://doi.org/10.1109/CSCI51800.2020.00039","url":null,"abstract":"Underwater Wireless Sensor Networks (UWSNs) are liable to malicious attacks due to limited bandwidth, limited power, high propagation delay, path loss, and variable speed. The major differences between UWSNs and Terrestrial Wireless Sensor Networks (TWSNs) necessitate a new mechanism to secure UWSNs. The existing Media Access Control (MAC) and routing protocols have addressed the network performance of UWSNs, but are vulnerable to several attacks. The secure MAC and routing protocols must exist to detect Sybil, Blackhole, Wormhole, Hello Flooding, Acknowledgment Spoofing, Selective Forwarding, Sinkhole, and Exhaustion attacks. These attacks can disrupt or disable the network connection. Hence, these attacks can degrade the network performance and total loss can be catastrophic in some applications, like monitoring oil/gas spills. Several researchers have studied the security of UWSNs, but most of the works detect malicious attacks solely based on a certain predefined threshold. It is not optimal to detect malicious attacks after the threshold value is met. In this paper, we propose a multi-factor authentication model that is based on zero-knowledge proof to detect malicious activities and secure UWSNs from several attacks.","PeriodicalId":336929,"journal":{"name":"2020 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130868500","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2020 International Conference on Computational Science and Computational Intelligence (CSCI)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1