首页 > 最新文献

2020 International Conference on Computational Science and Computational Intelligence (CSCI)最新文献

英文 中文
All Nearest Neighbors Query Including Scores Road Network 所有最近的邻居查询,包括分数道路网络
Hyo-Kyun Kim, Tae-Sun Chung
This paper introduces an improved ANN (All Nearest Neighbor) algorithm using the SCL (Standard Clustered Loop) algorithm to reduce the consumption of computing resources that can occur when searching for the data object nearest to the query object in the process of executing the algorithm. Additionally, a method to improve ANN algorithm is proposed. When the algorithm is executed, it is a situation in which the user finds a data object adjacent to the user. In this case, our technique applies the criteria set provided by users.
本文介绍了一种改进的ANN (All Nearest Neighbor,全近邻)算法,该算法采用标准集群循环(Standard Clustered Loop, SCL)算法,以减少在算法执行过程中搜索离查询对象最近的数据对象时可能产生的计算资源消耗。此外,还提出了一种改进人工神经网络算法的方法。当执行算法时,是用户找到与用户相邻的数据对象的情况。在这种情况下,我们的技术应用用户提供的标准集。
{"title":"All Nearest Neighbors Query Including Scores Road Network","authors":"Hyo-Kyun Kim, Tae-Sun Chung","doi":"10.1109/CSCI51800.2020.00265","DOIUrl":"https://doi.org/10.1109/CSCI51800.2020.00265","url":null,"abstract":"This paper introduces an improved ANN (All Nearest Neighbor) algorithm using the SCL (Standard Clustered Loop) algorithm to reduce the consumption of computing resources that can occur when searching for the data object nearest to the query object in the process of executing the algorithm. Additionally, a method to improve ANN algorithm is proposed. When the algorithm is executed, it is a situation in which the user finds a data object adjacent to the user. In this case, our technique applies the criteria set provided by users.","PeriodicalId":336929,"journal":{"name":"2020 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131070713","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Crossroad Accident Responsibility Prediction Based on a Multi-agent System 基于多智能体系统的十字路口事故责任预测
Helton Agbewonou Yawovi, Tadachika Ozono, T. Shintani
With the increasing number of motorized vehicles, road accidents are increasing year by year all over the world.. After an accident, the police investigate the circumstances of the incident and determine each actor’s responsibilities. Our goal is to create a police support system. We focused on a multi-agent system that predicts each actor’s responsibility in a road accident (especially crossroad accidents). The system uses the driving recorder video of a vehicle as the input data source, and it outputs the prediction of the responsibility of each actor in the accident. It consists of three agents: (1) Crash time detection and crash video split into images; (2) Traffic signs detection in the crash video; (3) Responsibility prediction using a knowledge system.
随着机动车数量的不断增加,世界各地的道路交通事故也在逐年增加。事故发生后,警方调查事件的情况并确定每个行为者的责任。我们的目标是建立一个警察支援系统。我们专注于一个多智能体系统,该系统可以预测道路事故(尤其是十字路口事故)中每个参与者的责任。该系统以车辆的行车记录仪视频作为输入数据源,输出对事故中各行为主体责任的预测。它由三个代理组成:(1)碰撞时间检测和碰撞视频分割图像;(2)碰撞视频中的交通标志检测;(3)利用知识系统进行责任预测。
{"title":"Crossroad Accident Responsibility Prediction Based on a Multi-agent System","authors":"Helton Agbewonou Yawovi, Tadachika Ozono, T. Shintani","doi":"10.1109/CSCI51800.2020.00103","DOIUrl":"https://doi.org/10.1109/CSCI51800.2020.00103","url":null,"abstract":"With the increasing number of motorized vehicles, road accidents are increasing year by year all over the world.. After an accident, the police investigate the circumstances of the incident and determine each actor’s responsibilities. Our goal is to create a police support system. We focused on a multi-agent system that predicts each actor’s responsibility in a road accident (especially crossroad accidents). The system uses the driving recorder video of a vehicle as the input data source, and it outputs the prediction of the responsibility of each actor in the accident. It consists of three agents: (1) Crash time detection and crash video split into images; (2) Traffic signs detection in the crash video; (3) Responsibility prediction using a knowledge system.","PeriodicalId":336929,"journal":{"name":"2020 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"134 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129300083","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Lightweight Multi-factor Authentication for Underwater Wireless Sensor Networks 水下无线传感器网络轻量级多因素认证
Ahmed Al Guqhaiman, Oluwatobi Akanbi, Amer Aljaedi, C. E. Chow
Underwater Wireless Sensor Networks (UWSNs) are liable to malicious attacks due to limited bandwidth, limited power, high propagation delay, path loss, and variable speed. The major differences between UWSNs and Terrestrial Wireless Sensor Networks (TWSNs) necessitate a new mechanism to secure UWSNs. The existing Media Access Control (MAC) and routing protocols have addressed the network performance of UWSNs, but are vulnerable to several attacks. The secure MAC and routing protocols must exist to detect Sybil, Blackhole, Wormhole, Hello Flooding, Acknowledgment Spoofing, Selective Forwarding, Sinkhole, and Exhaustion attacks. These attacks can disrupt or disable the network connection. Hence, these attacks can degrade the network performance and total loss can be catastrophic in some applications, like monitoring oil/gas spills. Several researchers have studied the security of UWSNs, but most of the works detect malicious attacks solely based on a certain predefined threshold. It is not optimal to detect malicious attacks after the threshold value is met. In this paper, we propose a multi-factor authentication model that is based on zero-knowledge proof to detect malicious activities and secure UWSNs from several attacks.
水下无线传感器网络(UWSNs)由于带宽有限、功率有限、传播延迟大、路径丢失和速度可变等特点,容易受到恶意攻击。uwsn与地面无线传感器网络(TWSNs)之间的主要区别需要一种新的机制来保护uwsn。现有的媒体访问控制(MAC)和路由协议解决了uwsn的网络性能问题,但容易受到多种攻击。必须存在安全的MAC和路由协议才能检测Sybil、黑洞、虫洞、Hello flood、确认欺骗、选择性转发、天坑和耗尽攻击。这些攻击可以破坏或禁用网络连接。因此,这些攻击会降低网络性能,在某些应用程序(如监测石油/天然气泄漏)中,总损失可能是灾难性的。一些研究人员对UWSNs的安全性进行了研究,但大多数工作仅仅基于某个预定义的阈值来检测恶意攻击。在达到阈值后才检测恶意攻击并不是最优的。在本文中,我们提出了一种基于零知识证明的多因素认证模型来检测恶意活动并保护uwsn免受多种攻击。
{"title":"Lightweight Multi-factor Authentication for Underwater Wireless Sensor Networks","authors":"Ahmed Al Guqhaiman, Oluwatobi Akanbi, Amer Aljaedi, C. E. Chow","doi":"10.1109/CSCI51800.2020.00039","DOIUrl":"https://doi.org/10.1109/CSCI51800.2020.00039","url":null,"abstract":"Underwater Wireless Sensor Networks (UWSNs) are liable to malicious attacks due to limited bandwidth, limited power, high propagation delay, path loss, and variable speed. The major differences between UWSNs and Terrestrial Wireless Sensor Networks (TWSNs) necessitate a new mechanism to secure UWSNs. The existing Media Access Control (MAC) and routing protocols have addressed the network performance of UWSNs, but are vulnerable to several attacks. The secure MAC and routing protocols must exist to detect Sybil, Blackhole, Wormhole, Hello Flooding, Acknowledgment Spoofing, Selective Forwarding, Sinkhole, and Exhaustion attacks. These attacks can disrupt or disable the network connection. Hence, these attacks can degrade the network performance and total loss can be catastrophic in some applications, like monitoring oil/gas spills. Several researchers have studied the security of UWSNs, but most of the works detect malicious attacks solely based on a certain predefined threshold. It is not optimal to detect malicious attacks after the threshold value is met. In this paper, we propose a multi-factor authentication model that is based on zero-knowledge proof to detect malicious activities and secure UWSNs from several attacks.","PeriodicalId":336929,"journal":{"name":"2020 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130868500","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Detection and Defense from False Data Injection Attacks In Aviation Cyber-Physical Systems Using Artificial Immune Systems 利用人工免疫系统检测和防御航空信息物理系统中的虚假数据注入攻击
Abdulaziz A. Alsulami, S. Zein-Sabatto
In recent years, there has been a rapid expansion in the development of Cyber-Physical Systems (CPS), which allows the physical components and the cyber components of a system to be fully integrated and interacted with each other and with the physical world. The commercial aviation industry is shifting towards Aviation Cyber-Physical Systems (ACPS) framework because it allows real-time monitoring and diagnostics, real-time data analytics, and the use of Artificial Intelligent technologies in decision making. Inevitably, ACPS is not immune to cyber-attacks due to integrating a network system, which introduces serious security threats. False Data Injection (FDI) attack is widely used against CPS. It is a serious threat to the integrity of the connected physical components. In this paper, we propose a novel security algorithm for detecting FDI attacks in the communication network of ACPS using Artificial Immune System (AIS). The algorithm was developed based on the negative selection approach. The negative selection algorithm is used to detect malicious network packets and drop them. Then, a Nonlinear Autoregressive Exogenous (NARX) network is used to predict packets that dropped by the negative selection algorithm. The developed algorithm was implemented and tested on a networked control system of commercial aircraft as an Aviation Cyber-physical system.
近年来,网络物理系统(cyber - physical Systems, CPS)的发展得到了迅速的发展,它使一个系统的物理组成部分和网络组成部分相互之间以及与物理世界充分集成和互动。商用航空业正在转向航空信息物理系统(ACPS)框架,因为它允许实时监控和诊断、实时数据分析以及在决策中使用人工智能技术。由于集成了网络系统,ACPS不可避免地会受到网络攻击,这带来了严重的安全威胁。虚假数据注入(FDI)攻击是针对CPS的一种广泛的攻击方式。这是对连接的物理组件的完整性的严重威胁。本文提出了一种利用人工免疫系统(AIS)检测ACPS通信网络中FDI攻击的安全算法。该算法是基于负选择方法开发的。负选择算法用于检测并丢弃恶意网络报文。然后,使用非线性自回归外生(NARX)网络来预测被负选择算法丢弃的数据包。该算法作为航空信息物理系统在某商用飞机网络控制系统上进行了实现和测试。
{"title":"Detection and Defense from False Data Injection Attacks In Aviation Cyber-Physical Systems Using Artificial Immune Systems","authors":"Abdulaziz A. Alsulami, S. Zein-Sabatto","doi":"10.1109/CSCI51800.2020.00019","DOIUrl":"https://doi.org/10.1109/CSCI51800.2020.00019","url":null,"abstract":"In recent years, there has been a rapid expansion in the development of Cyber-Physical Systems (CPS), which allows the physical components and the cyber components of a system to be fully integrated and interacted with each other and with the physical world. The commercial aviation industry is shifting towards Aviation Cyber-Physical Systems (ACPS) framework because it allows real-time monitoring and diagnostics, real-time data analytics, and the use of Artificial Intelligent technologies in decision making. Inevitably, ACPS is not immune to cyber-attacks due to integrating a network system, which introduces serious security threats. False Data Injection (FDI) attack is widely used against CPS. It is a serious threat to the integrity of the connected physical components. In this paper, we propose a novel security algorithm for detecting FDI attacks in the communication network of ACPS using Artificial Immune System (AIS). The algorithm was developed based on the negative selection approach. The negative selection algorithm is used to detect malicious network packets and drop them. Then, a Nonlinear Autoregressive Exogenous (NARX) network is used to predict packets that dropped by the negative selection algorithm. The developed algorithm was implemented and tested on a networked control system of commercial aircraft as an Aviation Cyber-physical system.","PeriodicalId":336929,"journal":{"name":"2020 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131153767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Learning and Teaching Undergraduate Introductory Programming Courses in Java – The Use of an IDE VS Command Line 在Java中学习和教授本科编程入门课程- IDE VS命令行的使用
Hussain Aljafer, Gary Cantrell
A topic of debate among Java teachers is whether to use an Integrated Development Environment (IDE) or a text editor paired with a command line compiler to teach introductory Java programming courses. Is it really in the student’s favor to start their programming journey using an IDE or is it better to just use any text editor to write the code and then compile and run the code using the command line? Which approach will help the students really understand the programming concepts and be able to debug their code when they have errors? In this paper we discuss the advantages and disadvantages of both approaches and we compare the performance of two groups of students in which the first group used a text editor with command line commands and the other group used Eclipse IDE.
Java教师之间争论的一个话题是,是使用集成开发环境(IDE)还是使用文本编辑器搭配命令行编译器来教授Java编程入门课程。使用IDE开始他们的编程之旅真的对学生有利吗?还是使用任何文本编辑器编写代码,然后使用命令行编译和运行代码更好?哪种方法能帮助学生真正理解编程概念,并在出现错误时能够调试代码?在本文中,我们讨论了这两种方法的优缺点,并比较了两组学生的表现,第一组学生使用带有命令行命令的文本编辑器,另一组学生使用Eclipse IDE。
{"title":"Learning and Teaching Undergraduate Introductory Programming Courses in Java – The Use of an IDE VS Command Line","authors":"Hussain Aljafer, Gary Cantrell","doi":"10.1109/CSCI51800.2020.00184","DOIUrl":"https://doi.org/10.1109/CSCI51800.2020.00184","url":null,"abstract":"A topic of debate among Java teachers is whether to use an Integrated Development Environment (IDE) or a text editor paired with a command line compiler to teach introductory Java programming courses. Is it really in the student’s favor to start their programming journey using an IDE or is it better to just use any text editor to write the code and then compile and run the code using the command line? Which approach will help the students really understand the programming concepts and be able to debug their code when they have errors? In this paper we discuss the advantages and disadvantages of both approaches and we compare the performance of two groups of students in which the first group used a text editor with command line commands and the other group used Eclipse IDE.","PeriodicalId":336929,"journal":{"name":"2020 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127779954","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Determining the number of endmembers of hyperspectral images using clustering 利用聚类方法确定高光谱图像的端元数
José Prades, A. Salazar, G. Safont, L. Vergara
Some applications require knowing how many materials are present in the scene represented by a hyperspectral Image. In a previous paper, we presented an algorithm that estimated the number of materials in the scene using clustering principles. The proposed algorithm obtains a hierarchy of image partitions and selects a partition using a validation Index; the estimated number of materials is set to the number of dusters of the selected partition. In this algorithm, the user must provide the Image and the maximum number of materials that can be estimated (P). In this paper, we have extended our algorithm so that It does not require P as input parameter. The proposed method Iteratively performs the estimation for several increasing values of P and stops the process when a certain condition is met. The results obtained with five hyperspectral Images show that our algorithm approximately estimates the number of materials in that images.
一些应用程序需要知道高光谱图像所代表的场景中存在多少材料。在之前的一篇论文中,我们提出了一种使用聚类原理估计场景中材料数量的算法。该算法获得图像分区的层次结构,并使用验证索引选择分区;预估的物料数量设置为所选分区的除尘器数量。在该算法中,用户必须提供图像和可以估计的最大材料数量(P)。在本文中,我们扩展了我们的算法,使其不需要P作为输入参数。该方法对P的几个递增值进行迭代估计,当满足一定条件时停止估计。对5张高光谱图像的实验结果表明,我们的算法可以近似地估计出图像中物质的数量。
{"title":"Determining the number of endmembers of hyperspectral images using clustering","authors":"José Prades, A. Salazar, G. Safont, L. Vergara","doi":"10.1109/CSCI51800.2020.00306","DOIUrl":"https://doi.org/10.1109/CSCI51800.2020.00306","url":null,"abstract":"Some applications require knowing how many materials are present in the scene represented by a hyperspectral Image. In a previous paper, we presented an algorithm that estimated the number of materials in the scene using clustering principles. The proposed algorithm obtains a hierarchy of image partitions and selects a partition using a validation Index; the estimated number of materials is set to the number of dusters of the selected partition. In this algorithm, the user must provide the Image and the maximum number of materials that can be estimated (P). In this paper, we have extended our algorithm so that It does not require P as input parameter. The proposed method Iteratively performs the estimation for several increasing values of P and stops the process when a certain condition is met. The results obtained with five hyperspectral Images show that our algorithm approximately estimates the number of materials in that images.","PeriodicalId":336929,"journal":{"name":"2020 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128384033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Human Temperature Scanning from a Distance 远距离人体体温扫描
L. Deligiannidis
In this work we present an inexpensive, yet accurate, solution of measuring human temperature from a distance. The need for such solution is essential during pandemics. During COVID-19, one of the most common symptoms, for those who develop symptoms, is fever. We believe a tool that measures multiple peoples’ temperature from a safe distance can be valuable. As people enter buildings, airports, hospitals, etc. they can be scanned automatically from a safe distance. The system can alert the authorities for further assessment. Even though such a tool does not prevent the spread of a virus by itself, it can help contain the virus following additional measures such as wearing a face mask, frequent hand washing, and social distancing.
在这项工作中,我们提出了一种廉价而准确的远距离测量人体温度的解决方案。在大流行期间,需要这样的解决办法。在COVID-19期间,出现症状的人最常见的症状之一是发烧。我们相信,一个能在安全距离内测量多人体温的工具是有价值的。当人们进入建筑物、机场、医院等地时,他们可以在安全距离外被自动扫描。该系统可以提醒当局进行进一步评估。虽然这种工具本身并不能阻止病毒的传播,但如果采取戴口罩、勤洗手、保持社交距离等附加措施,它可以帮助控制病毒。
{"title":"Human Temperature Scanning from a Distance","authors":"L. Deligiannidis","doi":"10.1109/CSCI51800.2020.00316","DOIUrl":"https://doi.org/10.1109/CSCI51800.2020.00316","url":null,"abstract":"In this work we present an inexpensive, yet accurate, solution of measuring human temperature from a distance. The need for such solution is essential during pandemics. During COVID-19, one of the most common symptoms, for those who develop symptoms, is fever. We believe a tool that measures multiple peoples’ temperature from a safe distance can be valuable. As people enter buildings, airports, hospitals, etc. they can be scanned automatically from a safe distance. The system can alert the authorities for further assessment. Even though such a tool does not prevent the spread of a virus by itself, it can help contain the virus following additional measures such as wearing a face mask, frequent hand washing, and social distancing.","PeriodicalId":336929,"journal":{"name":"2020 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128408152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Rules for Optimal Perpetual Gossiping Schemes 最佳永久八卦计划的规则
I. Avramovic, D. Richards
Perpetual gossiping is an all-to-all communication problem on social networks, or any coordinated distributed system in general. In perpetual gossiping, a state of universal reachability is maintained by a continuous sequence of communications between participants. Unlike the well-understood static case, perpetual gossiping is a difficult problem, with some NP-complete classes of solutions. A basic question which remains open is whether an optimal scheme of contiguous calls is guaranteed to exist for a tree. This paper presents a series of theoretical tools directed towards answering the question.
永久的八卦是社交网络或任何协调分布式系统中所有人的交流问题。在没完没了的八卦中,参与者之间的连续交流维持了一种普遍可及的状态。与众所周知的静态情况不同,永久八卦是一个难题,具有一些np完全类的解。一个悬而未决的基本问题是,对于树是否保证存在连续调用的最优方案。本文提出了一系列旨在回答这个问题的理论工具。
{"title":"Rules for Optimal Perpetual Gossiping Schemes","authors":"I. Avramovic, D. Richards","doi":"10.1109/CSCI51800.2020.00043","DOIUrl":"https://doi.org/10.1109/CSCI51800.2020.00043","url":null,"abstract":"Perpetual gossiping is an all-to-all communication problem on social networks, or any coordinated distributed system in general. In perpetual gossiping, a state of universal reachability is maintained by a continuous sequence of communications between participants. Unlike the well-understood static case, perpetual gossiping is a difficult problem, with some NP-complete classes of solutions. A basic question which remains open is whether an optimal scheme of contiguous calls is guaranteed to exist for a tree. This paper presents a series of theoretical tools directed towards answering the question.","PeriodicalId":336929,"journal":{"name":"2020 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125857064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design of Humanity by the Concept of Artificial Personalities 人造人格概念下的人性设计
Taishi Nemoto, T. Fujimoto
Since the 2000s, the third artificial intelligence boom has occurred. Research on machine learning and deep learning is progressing, but challenges remain regarding realizing so-called ‘human-like’ general-purpose AI (Artificial Intelligence). In recent years, artificial intelligence research has been linked to cognitive science, and the question of what ‘humanity’ is and how to design ‘humanity’ has been raised as issues. The more robots resemble humans, the more the ‘uncanny valley phenomenon’ increases and the more people feel uncomfortable. Even though technology has advanced and realistic textures can be expressed, robots seem to be just ‘artifacts.’ The point of this study is to determine at what point humans feel ‘human-like’ and how to reproduce ‘human-like’ using a computer. In this study, in order to express human personality and characteristic gestures, we generate an ‘artificial personality’ (AP), and let people find the human touch that a real person possesses through that AP. For example, artificial reproduction of the intelligence of a deceased person is difficult with today's technology. However, AP enables to extract the characteristics of a person's gestures, routines, habits, and facial expressions in his or her lifetime, and to digitally recreate the person's personality based on the accumulation of ‘flesh and blood’ data. This study discusses the two elements and basic mechanisms that are necessary for AP research.
自2000年代以来,出现了第三次人工智能热潮。机器学习和深度学习的研究正在取得进展,但在实现所谓的“类人”通用AI(人工智能)方面仍然存在挑战。近年来,人工智能研究与认知科学联系在一起,“人性”是什么以及如何设计“人性”的问题被提了出来。机器人越像人类,“恐怖谷现象”就越普遍,人们也就越感到不舒服。尽管技术先进,可以表达逼真的纹理,但机器人似乎只是“人工制品”。“这项研究的重点是确定人类在什么程度上感觉‘像人’,以及如何用电脑复制‘像人’。”在这项研究中,为了表达人类的个性和特征手势,我们产生了一个“人工人格”(artificial personality, AP),并让人们通过该AP找到一个真实的人所拥有的人情味。例如,在今天的技术下,人工复制一个死者的智能是很困难的。然而,AP能够提取一个人一生中的手势、日常活动、习惯和面部表情的特征,并基于“血肉之躯”数据的积累,以数字方式重建这个人的个性。本研究探讨了AP研究必须具备的两个要素和基本机制。
{"title":"Design of Humanity by the Concept of Artificial Personalities","authors":"Taishi Nemoto, T. Fujimoto","doi":"10.1109/CSCI51800.2020.00121","DOIUrl":"https://doi.org/10.1109/CSCI51800.2020.00121","url":null,"abstract":"Since the 2000s, the third artificial intelligence boom has occurred. Research on machine learning and deep learning is progressing, but challenges remain regarding realizing so-called ‘human-like’ general-purpose AI (Artificial Intelligence). In recent years, artificial intelligence research has been linked to cognitive science, and the question of what ‘humanity’ is and how to design ‘humanity’ has been raised as issues. The more robots resemble humans, the more the ‘uncanny valley phenomenon’ increases and the more people feel uncomfortable. Even though technology has advanced and realistic textures can be expressed, robots seem to be just ‘artifacts.’ The point of this study is to determine at what point humans feel ‘human-like’ and how to reproduce ‘human-like’ using a computer. In this study, in order to express human personality and characteristic gestures, we generate an ‘artificial personality’ (AP), and let people find the human touch that a real person possesses through that AP. For example, artificial reproduction of the intelligence of a deceased person is difficult with today's technology. However, AP enables to extract the characteristics of a person's gestures, routines, habits, and facial expressions in his or her lifetime, and to digitally recreate the person's personality based on the accumulation of ‘flesh and blood’ data. This study discusses the two elements and basic mechanisms that are necessary for AP research.","PeriodicalId":336929,"journal":{"name":"2020 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114522630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Feature Selection for Learning to Predict Outcomes of Compute Cluster Jobs with Application to Decision Support 基于决策支持的计算集群作业结果学习预测特征选择
Adedolapo Okanlawon, Huichen Yang, Avishek Bose, W. Hsu, Dan Andresen, Mohammed Tanash
We present a machine learning framework and a new test bed for data mining from the Slurm Workload Manager for high-performance computing (HPC) clusters. The focus was to find a method for selecting features to support decisions: helping users decide whether to resubmit failed jobs with boosted CPU and memory allocations or migrate them to a computing cloud. This task was cast as both supervised classification and regression learning, specifically, sequential problem solving suitable for reinforcement learning. Selecting relevant features can improve training accuracy, reduce training time, and produce a more comprehensible model, with an intelligent system that can explain predictions and inferences. We present a supervised learning model trained on a Simple Linux Utility for Resource Management (Slurm) data set of HPC jobs using three different techniques for selecting features: linear regression, lasso, and ridge regression. Our data set represented both HPC jobs that failed and those that succeeded, so our model was reliable, less likely to overfit, and generalizable. Our model achieved an R2 of 95% with 99% accuracy. We identified five predictors for both CPU and memory properties.
我们提出了一个机器学习框架和一个新的测试平台,用于高性能计算(HPC)集群的Slurm工作负载管理器的数据挖掘。重点是找到一种方法来选择支持决策的特性:帮助用户决定是通过提高CPU和内存分配来重新提交失败的作业,还是将它们迁移到计算云。该任务被视为监督分类和回归学习,特别是适合于强化学习的顺序问题解决。选择相关特征可以提高训练精度,减少训练时间,并产生更易于理解的模型,并具有可以解释预测和推断的智能系统。我们提出了一个在简单Linux资源管理实用程序(Slurm) HPC作业数据集上训练的监督学习模型,使用三种不同的技术来选择特征:线性回归、套索回归和脊回归。我们的数据集既代表了失败的HPC作业,也代表了成功的HPC作业,因此我们的模型是可靠的,不太可能过拟合,并且具有通用性。我们的模型达到了95%的R2,准确率为99%。我们确定了CPU和内存属性的五个预测因子。
{"title":"Feature Selection for Learning to Predict Outcomes of Compute Cluster Jobs with Application to Decision Support","authors":"Adedolapo Okanlawon, Huichen Yang, Avishek Bose, W. Hsu, Dan Andresen, Mohammed Tanash","doi":"10.1109/CSCI51800.2020.00230","DOIUrl":"https://doi.org/10.1109/CSCI51800.2020.00230","url":null,"abstract":"We present a machine learning framework and a new test bed for data mining from the Slurm Workload Manager for high-performance computing (HPC) clusters. The focus was to find a method for selecting features to support decisions: helping users decide whether to resubmit failed jobs with boosted CPU and memory allocations or migrate them to a computing cloud. This task was cast as both supervised classification and regression learning, specifically, sequential problem solving suitable for reinforcement learning. Selecting relevant features can improve training accuracy, reduce training time, and produce a more comprehensible model, with an intelligent system that can explain predictions and inferences. We present a supervised learning model trained on a Simple Linux Utility for Resource Management (Slurm) data set of HPC jobs using three different techniques for selecting features: linear regression, lasso, and ridge regression. Our data set represented both HPC jobs that failed and those that succeeded, so our model was reliable, less likely to overfit, and generalizable. Our model achieved an R2 of 95% with 99% accuracy. We identified five predictors for both CPU and memory properties.","PeriodicalId":336929,"journal":{"name":"2020 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"67 1-2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123587156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2020 International Conference on Computational Science and Computational Intelligence (CSCI)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1