首页 > 最新文献

2020 IEEE Third International Conference on Artificial Intelligence and Knowledge Engineering (AIKE)最新文献

英文 中文
Toward Explanation-Centered Story Generation 走向以解释为中心的故事生成
Jumpei Ono, Miku Kawai, Takashi Ogata
This study proposes the need for explanation-centered story generation, with the objective of extending the method of doing so. Explanation-Centered Story Generation is a concept that generates a story from an explanation, offering a mechanism for the story generation system to generate multiple forms of stories in this manner.
本研究提出了以解释为中心的故事生成的必要性,目的是扩展这样做的方法。以解释为中心的故事生成是一种从解释中生成故事的概念,它为故事生成系统提供了一种机制,以这种方式生成多种形式的故事。
{"title":"Toward Explanation-Centered Story Generation","authors":"Jumpei Ono, Miku Kawai, Takashi Ogata","doi":"10.1109/AIKE48582.2020.00046","DOIUrl":"https://doi.org/10.1109/AIKE48582.2020.00046","url":null,"abstract":"This study proposes the need for explanation-centered story generation, with the objective of extending the method of doing so. Explanation-Centered Story Generation is a concept that generates a story from an explanation, offering a mechanism for the story generation system to generate multiple forms of stories in this manner.","PeriodicalId":370671,"journal":{"name":"2020 IEEE Third International Conference on Artificial Intelligence and Knowledge Engineering (AIKE)","volume":"166 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122926777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Intrusion detection algorithm in Smart Environments featuring activity footprints approach 基于活动足迹方法的智能环境入侵检测算法
Agostino Forestiero
Discovering anomalous data or behaviors is fundamental to obtain critical security information such as intrusion detections, faults and system failures. The limited resources, like computing and storage, make conventional techniques to design Intrusion Detection Systems (IDS) not particularly suitable for smart environments. This paper proposes a novel multiagent algorithm leveraging on devices activity footprints for intrusion detection in Internet of Things environment. Smart objects are mapped with real-valued vectors obtained through the IoT2Vec model, a word embedding technique able to capture the semantic context of device activities and represent these ones in dense vectors. The vectors are assigned to agents, which are spread onto a 2D virtual space, where they move following the rules of a bio-inspired model, the flocking model. A similarity function, applied to the associated vectors, drives the agents for a selective application of the movement rules. The outcome is the emergence of agent groups aggregated on the basis of the activities of their associated devices. Thus, it is possible to easily individuate isolated agents (i.e. devices with dissimilar activity from all), representing potential intruders or with anomalous behaviors to be monitored. Preliminary results confirm the validity of the approach.
发现异常数据或异常行为是获取入侵检测、故障、系统故障等关键安全信息的基础。有限的资源,如计算和存储,使得传统的技术来设计入侵检测系统(IDS)不是特别适合智能环境。针对物联网环境下的入侵检测问题,提出了一种利用设备活动足迹的多智能体算法。智能对象与通过IoT2Vec模型获得的实值向量进行映射,该模型是一种词嵌入技术,能够捕获设备活动的语义上下文,并将这些语义上下文表示为密集向量。这些向量被分配给代理,这些代理被分散到一个2D虚拟空间中,在那里它们按照生物启发模型的规则移动,即群集模型。应用于相关向量的相似函数驱动代理选择性地应用运动规则。其结果是出现了基于其相关设备的活动而聚集的代理组。因此,可以很容易地对孤立的代理(即与所有代理具有不同活动的设备)进行个体化,代表潜在的入侵者或要监视的异常行为。初步结果证实了该方法的有效性。
{"title":"Intrusion detection algorithm in Smart Environments featuring activity footprints approach","authors":"Agostino Forestiero","doi":"10.1109/AIKE48582.2020.00027","DOIUrl":"https://doi.org/10.1109/AIKE48582.2020.00027","url":null,"abstract":"Discovering anomalous data or behaviors is fundamental to obtain critical security information such as intrusion detections, faults and system failures. The limited resources, like computing and storage, make conventional techniques to design Intrusion Detection Systems (IDS) not particularly suitable for smart environments. This paper proposes a novel multiagent algorithm leveraging on devices activity footprints for intrusion detection in Internet of Things environment. Smart objects are mapped with real-valued vectors obtained through the IoT2Vec model, a word embedding technique able to capture the semantic context of device activities and represent these ones in dense vectors. The vectors are assigned to agents, which are spread onto a 2D virtual space, where they move following the rules of a bio-inspired model, the flocking model. A similarity function, applied to the associated vectors, drives the agents for a selective application of the movement rules. The outcome is the emergence of agent groups aggregated on the basis of the activities of their associated devices. Thus, it is possible to easily individuate isolated agents (i.e. devices with dissimilar activity from all), representing potential intruders or with anomalous behaviors to be monitored. Preliminary results confirm the validity of the approach.","PeriodicalId":370671,"journal":{"name":"2020 IEEE Third International Conference on Artificial Intelligence and Knowledge Engineering (AIKE)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116747532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Cyber Security of Battery Energy Storage Systems and Adoption of Data-driven Methods 电池储能系统的网络安全与数据驱动方法的采用
N. Kharlamova, S. Hashemi, C. Træholt
Battery energy storage systems (BESSs) are becoming a crucial part of electric grids due to their important roles in renewable energy sources (RES) integration in energy systems. Cyber-secure operation of BESS in renewable energy systems is significant, since it is susceptible to cyber threats and its potential failure may result in economical and physical damage to both the BESS and the system. However, there is a lack of comprehensive study on the attack detection methods for industrial BESSs. This paper reviews the state-of-the-art work in the area of BESS cyber threats, investigates how to detect cyberattackes in the operation stage. We address the problem of enhancing the communication channels' integrity can by implementing blockchain in the design stage of BESS, combined with applying artificial intelligence (AI) and machine learning (ML) methods for false data injection attack (FDIA) detection in the BESS operation stage. The focus is on the application of ML and AI methods for FDIA detection on different system layers. Based on our analysis, data-driven approaches such as clustering and artificial-neutral-network-based state estimation (SE) forecast are recommended for the implementation in BESSs.
电池储能系统(bess)在能源系统中可再生能源(RES)的集成中发挥着重要作用,正成为电网的重要组成部分。可再生能源系统中BESS的网络安全运行具有重要意义,因为它容易受到网络威胁,其潜在故障可能导致BESS和系统的经济和物理损害。然而,针对工业bess的攻击检测方法缺乏全面的研究。本文回顾了BESS网络威胁领域的最新工作,探讨了如何在操作阶段检测网络攻击。我们通过在BESS设计阶段实施区块链,结合在BESS运行阶段应用人工智能(AI)和机器学习(ML)方法检测虚假数据注入攻击(FDIA)来解决增强通信通道完整性的问题。重点是在不同的系统层上应用ML和AI方法进行FDIA检测。基于我们的分析,数据驱动的方法如聚类和基于人工中立网络的状态估计(SE)预测被推荐用于bess的实现。
{"title":"The Cyber Security of Battery Energy Storage Systems and Adoption of Data-driven Methods","authors":"N. Kharlamova, S. Hashemi, C. Træholt","doi":"10.1109/AIKE48582.2020.00037","DOIUrl":"https://doi.org/10.1109/AIKE48582.2020.00037","url":null,"abstract":"Battery energy storage systems (BESSs) are becoming a crucial part of electric grids due to their important roles in renewable energy sources (RES) integration in energy systems. Cyber-secure operation of BESS in renewable energy systems is significant, since it is susceptible to cyber threats and its potential failure may result in economical and physical damage to both the BESS and the system. However, there is a lack of comprehensive study on the attack detection methods for industrial BESSs. This paper reviews the state-of-the-art work in the area of BESS cyber threats, investigates how to detect cyberattackes in the operation stage. We address the problem of enhancing the communication channels' integrity can by implementing blockchain in the design stage of BESS, combined with applying artificial intelligence (AI) and machine learning (ML) methods for false data injection attack (FDIA) detection in the BESS operation stage. The focus is on the application of ML and AI methods for FDIA detection on different system layers. Based on our analysis, data-driven approaches such as clustering and artificial-neutral-network-based state estimation (SE) forecast are recommended for the implementation in BESSs.","PeriodicalId":370671,"journal":{"name":"2020 IEEE Third International Conference on Artificial Intelligence and Knowledge Engineering (AIKE)","volume":"152 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116659573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Method of Applying Df-pn Algorithm to On-the-fly Controller Synthesis Df-pn算法在动态控制器综合中的应用方法
Kengo Kuwana, K. Tei, Y. Fukazawa, S. Honiden
Discrete controller synthesis is a method that involves using game theory to automatically generate a controller for achieving a system goal. This method is used in artificial intelligence for planning self-adaptive systems, in which it is necessary to shorten the time taken to generate a plan. Discrete controller synthesis generates a controller from an environment model and requirement model. The environment model represents the behavior of the system’s external environment as a finite state machine and is often constructed by parallel composition, which causes a state explosion. As a result, a controller cannot be synthesized within a realistic amount of memory or time. An on-the-fly method called directed controller synthesis (DCS) was developed by Daniel Ciolek. DCS partially expands and checks the environment model during exploration to avoid the state explosion caused by parallel composition. DCS uses a best-first search algorithm and has open lists, which drastically increases the size of the open list when searching for a large-scale problem and lowers search efficiency. Therefore, we propose a method of applying the df-pn algorithm, which is used when playing shogi (Japanese chess) on a computer, particularly tsume-shogi (a type of shogi problem). This algorithm is an iterative deepening depth-first search algorithm that does not have an open list but uses a hash table to store search history. Through experiments comparing our method with DCS, we were able to attain faster controller synthesis with our method than with DCS for large-scale problems.
离散控制器综合是一种利用博弈论自动生成控制器以实现系统目标的方法。该方法用于人工智能规划自适应系统,需要缩短生成计划的时间。离散控制器综合从环境模型和需求模型生成控制器。环境模型将系统外部环境的行为表示为有限状态机,通常采用并行组合的方式构建,从而导致状态爆炸。因此,控制器不能在实际的内存或时间内合成。Daniel Ciolek开发了一种动态方法,称为定向控制器合成(DCS)。在勘探过程中,DCS对环境模型进行局部展开和检查,避免了并行组合引起的状态爆炸。DCS使用最佳优先搜索算法并具有开放列表,这在搜索大规模问题时大大增加了打开列表的大小并降低了搜索效率。因此,我们提出了一种应用df-pn算法的方法,该算法用于在计算机上玩棋(日本象棋),特别是tsume-shogi(一种类型的棋问题)。该算法是一种迭代深化深度优先搜索算法,它没有开放列表,而是使用散列表来存储搜索历史。通过与DCS的对比实验,在大规模问题中,我们可以获得比DCS更快的控制器合成速度。
{"title":"Method of Applying Df-pn Algorithm to On-the-fly Controller Synthesis","authors":"Kengo Kuwana, K. Tei, Y. Fukazawa, S. Honiden","doi":"10.1109/AIKE48582.2020.00033","DOIUrl":"https://doi.org/10.1109/AIKE48582.2020.00033","url":null,"abstract":"Discrete controller synthesis is a method that involves using game theory to automatically generate a controller for achieving a system goal. This method is used in artificial intelligence for planning self-adaptive systems, in which it is necessary to shorten the time taken to generate a plan. Discrete controller synthesis generates a controller from an environment model and requirement model. The environment model represents the behavior of the system’s external environment as a finite state machine and is often constructed by parallel composition, which causes a state explosion. As a result, a controller cannot be synthesized within a realistic amount of memory or time. An on-the-fly method called directed controller synthesis (DCS) was developed by Daniel Ciolek. DCS partially expands and checks the environment model during exploration to avoid the state explosion caused by parallel composition. DCS uses a best-first search algorithm and has open lists, which drastically increases the size of the open list when searching for a large-scale problem and lowers search efficiency. Therefore, we propose a method of applying the df-pn algorithm, which is used when playing shogi (Japanese chess) on a computer, particularly tsume-shogi (a type of shogi problem). This algorithm is an iterative deepening depth-first search algorithm that does not have an open list but uses a hash table to store search history. Through experiments comparing our method with DCS, we were able to attain faster controller synthesis with our method than with DCS for large-scale problems.","PeriodicalId":370671,"journal":{"name":"2020 IEEE Third International Conference on Artificial Intelligence and Knowledge Engineering (AIKE)","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122519176","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Real-time Restoration of Quality Distortions in Mobile Images using Deep Learning 利用深度学习实时恢复移动图像中的高质量失真
T. Koçak, Cagkan Ciloglu
Frames provided by camera on mobile devices may be distorted because of camera defects and/or weather conditions such as rain and snow. These distortions affect image classifiers. This paper proposes using deep-learning architectures to restore quality distortions in real-time mobile video for image classifiers. An iOS based app is developed using CoreML to show that deep convolutional auto-encoder (CAE) based methods can be used to restore picture quality.
由于相机缺陷和/或雨雪等天气条件,移动设备上的相机提供的画面可能会失真。这些失真影响图像分类器。本文提出使用深度学习架构来恢复图像分类器在实时移动视频中的质量失真。使用CoreML开发了一个基于iOS的应用程序,以显示基于深度卷积自编码器(CAE)的方法可以用于恢复图像质量。
{"title":"Real-time Restoration of Quality Distortions in Mobile Images using Deep Learning","authors":"T. Koçak, Cagkan Ciloglu","doi":"10.1109/AIKE48582.2020.00025","DOIUrl":"https://doi.org/10.1109/AIKE48582.2020.00025","url":null,"abstract":"Frames provided by camera on mobile devices may be distorted because of camera defects and/or weather conditions such as rain and snow. These distortions affect image classifiers. This paper proposes using deep-learning architectures to restore quality distortions in real-time mobile video for image classifiers. An iOS based app is developed using CoreML to show that deep convolutional auto-encoder (CAE) based methods can be used to restore picture quality.","PeriodicalId":370671,"journal":{"name":"2020 IEEE Third International Conference on Artificial Intelligence and Knowledge Engineering (AIKE)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124265804","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of Permission Selection Techniques in Machine Learning-based Malicious App Detection 基于机器学习的恶意应用程序检测中的权限选择技术分析
Jihyeon Park, Munyeong Kang, Seong-je Cho, Hyoil Han, Kyoungwon Suh
With the increasing popularity of the Android platform, we have seen the rapid growth of malicious Android applications recently. Considering that the heavy use of applications on mobile phones such as games, emails, and social network services has become a crucial part of our daily life, we have become more vulnerable to malicious applications running on mobile devices. To alleviate this hostile environment of Android mobile applications, we propose a malware detection approach that (1) extracts both built-in permissions and custom permissions requested by Android apps from their Manifest.xml and (2) applies the permissions and a Random Forest classifier to Android applications for classifying them into benign and malicious. The Random Forest classifier learns a model using the permissions to classify the input dataset of 45,311 Android applications. In the learned model, an optimal subset of permissions has been identified and then using the subset of permissions we could achieve 94.23% accuracy in detecting malware.
随着Android平台的日益普及,我们也看到了恶意Android应用程序的快速增长。考虑到在手机上大量使用应用程序,如游戏,电子邮件和社交网络服务已经成为我们日常生活的重要组成部分,我们越来越容易受到移动设备上运行的恶意应用程序的攻击。为了缓解Android移动应用程序的这种敌对环境,我们提出了一种恶意软件检测方法:(1)从Android应用程序的Manifest.xml中提取内置权限和自定义权限,(2)将权限和随机森林分类器应用于Android应用程序,将其分为良性和恶意。随机森林分类器使用权限学习模型,对45,311个Android应用程序的输入数据集进行分类。在学习模型中,我们确定了一个最优的权限子集,并利用该子集对恶意软件进行检测,准确率达到94.23%。
{"title":"Analysis of Permission Selection Techniques in Machine Learning-based Malicious App Detection","authors":"Jihyeon Park, Munyeong Kang, Seong-je Cho, Hyoil Han, Kyoungwon Suh","doi":"10.1109/AIKE48582.2020.00021","DOIUrl":"https://doi.org/10.1109/AIKE48582.2020.00021","url":null,"abstract":"With the increasing popularity of the Android platform, we have seen the rapid growth of malicious Android applications recently. Considering that the heavy use of applications on mobile phones such as games, emails, and social network services has become a crucial part of our daily life, we have become more vulnerable to malicious applications running on mobile devices. To alleviate this hostile environment of Android mobile applications, we propose a malware detection approach that (1) extracts both built-in permissions and custom permissions requested by Android apps from their Manifest.xml and (2) applies the permissions and a Random Forest classifier to Android applications for classifying them into benign and malicious. The Random Forest classifier learns a model using the permissions to classify the input dataset of 45,311 Android applications. In the learned model, an optimal subset of permissions has been identified and then using the subset of permissions we could achieve 94.23% accuracy in detecting malware.","PeriodicalId":370671,"journal":{"name":"2020 IEEE Third International Conference on Artificial Intelligence and Knowledge Engineering (AIKE)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114563971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Predictive Model of Cost Growth in Construction Projects Using Feature Selection 基于特征选择的建设项目成本增长预测模型
Negar Tajziyehchi, Mohammad Moshirpour, George Jergeas, F. Sadeghpour
The construction industry spends billions of dollars on large-scale projects annually. These projects typically experience cost overruns. To solve this issue, it is essential to identify the key factors that contribute to project cost growth. The data provided by the Construction Owners Association of Alberta (COAA) and the Construction Industry Institute (CII) was used in this study. This data shows that Alberta’s average cost growth is much higher than similar projects in the United States, and it is therefore desirable to improve Alberta’s project performance. There are 139 samples for Alberta projects, and the nature of the data is high dimensional, making it difficult to extract useful information from the data for cost growth prediction. The use of dimensionality reduction techniques, such as feature selection, contribute to identifying the most important features that impact cost growth. This study identified 16 out of 281 significant features, selected in two steps. Initially, 21 features were selected by LASSO. The R2 score and RMSE are calculated for five different models in three train and test split models. Random forest had the highest score, using more than 80 percent of the data for training. The permutation importance of each feature is calculated using random forest, and 16 variables are extracted. These features are applied as an input for five machine learning algorithms to evaluate the variables’ predictive ability.
建筑业每年在大型项目上花费数十亿美元。这些项目通常会经历成本超支。要解决这个问题,必须确定导致项目成本增长的关键因素。本研究使用了艾伯塔省建筑业主协会(COAA)和建筑工业研究所(CII)提供的数据。这一数据表明,艾伯塔省的平均成本增长远远高于美国同类项目,因此,提高艾伯塔省的项目绩效是可取的。阿尔伯塔省的项目有139个样本,数据的性质是高维的,因此很难从数据中提取有用的信息来预测成本增长。使用降维技术,例如特征选择,有助于识别影响成本增长的最重要的特征。这项研究从281个重要特征中确定了16个,分两步选择。最初,LASSO选择了21个特征。在三种训练和测试分割模型中,计算了五种不同模型的R2得分和RMSE。随机森林的得分最高,使用了80%以上的数据进行训练。利用随机森林计算各特征的排列重要度,提取16个变量。这些特征被用作五种机器学习算法的输入,以评估变量的预测能力。
{"title":"A Predictive Model of Cost Growth in Construction Projects Using Feature Selection","authors":"Negar Tajziyehchi, Mohammad Moshirpour, George Jergeas, F. Sadeghpour","doi":"10.1109/AIKE48582.2020.00029","DOIUrl":"https://doi.org/10.1109/AIKE48582.2020.00029","url":null,"abstract":"The construction industry spends billions of dollars on large-scale projects annually. These projects typically experience cost overruns. To solve this issue, it is essential to identify the key factors that contribute to project cost growth. The data provided by the Construction Owners Association of Alberta (COAA) and the Construction Industry Institute (CII) was used in this study. This data shows that Alberta’s average cost growth is much higher than similar projects in the United States, and it is therefore desirable to improve Alberta’s project performance. There are 139 samples for Alberta projects, and the nature of the data is high dimensional, making it difficult to extract useful information from the data for cost growth prediction. The use of dimensionality reduction techniques, such as feature selection, contribute to identifying the most important features that impact cost growth. This study identified 16 out of 281 significant features, selected in two steps. Initially, 21 features were selected by LASSO. The R2 score and RMSE are calculated for five different models in three train and test split models. Random forest had the highest score, using more than 80 percent of the data for training. The permutation importance of each feature is calculated using random forest, and 16 variables are extracted. These features are applied as an input for five machine learning algorithms to evaluate the variables’ predictive ability.","PeriodicalId":370671,"journal":{"name":"2020 IEEE Third International Conference on Artificial Intelligence and Knowledge Engineering (AIKE)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133840198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A New Adaptive Bidirectional Region-of-Interest Detection Method for Intelligent Traffic Video Analysis 一种用于智能交通视频分析的自适应双向兴趣区域检测方法
Hadi Ghahremannezhad, Hang Shi, Chengjun Liu
Real-time intelligent video-based traffic surveillance applications play an important role in intelligent transportation systems. To reduce false alarms as well as to increase computational efficiency, robust road segmentation for automated Region of Interest (RoI) detection becomes a popular focus in the research community. A novel Adaptive Bidirectional Detection (ABD) of region-of-interest method is presented in this paper to automatically segment the roads with bidirectional traffic flows into two regions of interest. Specifically, a foreground segmentation method is first applied along with the flood-fill algorithm to estimate the road regions. Then the Lucas-Kanade’s optical flow algorithm is utilized to track and divide the estimated road into regions of interest in real-time. Experimental results using a dataset of real traffic videos illustrate the feasibility of the proposed method for automatically determining the RoIs in real-time.
基于实时智能视频的交通监控应用在智能交通系统中发挥着重要作用。为了减少误报和提高计算效率,鲁棒道路分割自动感兴趣区域(RoI)检测成为研究领域的热点。提出了一种基于兴趣区域的自适应双向检测方法,将具有双向交通流的道路自动分割为两个兴趣区域。具体而言,首先将前景分割方法与洪水填充算法一起应用于道路区域估计。然后利用Lucas-Kanade光流算法实时跟踪并将估计的道路划分为感兴趣的区域。基于真实交通视频数据集的实验结果验证了该方法实时自动确定roi的可行性。
{"title":"A New Adaptive Bidirectional Region-of-Interest Detection Method for Intelligent Traffic Video Analysis","authors":"Hadi Ghahremannezhad, Hang Shi, Chengjun Liu","doi":"10.1109/AIKE48582.2020.00012","DOIUrl":"https://doi.org/10.1109/AIKE48582.2020.00012","url":null,"abstract":"Real-time intelligent video-based traffic surveillance applications play an important role in intelligent transportation systems. To reduce false alarms as well as to increase computational efficiency, robust road segmentation for automated Region of Interest (RoI) detection becomes a popular focus in the research community. A novel Adaptive Bidirectional Detection (ABD) of region-of-interest method is presented in this paper to automatically segment the roads with bidirectional traffic flows into two regions of interest. Specifically, a foreground segmentation method is first applied along with the flood-fill algorithm to estimate the road regions. Then the Lucas-Kanade’s optical flow algorithm is utilized to track and divide the estimated road into regions of interest in real-time. Experimental results using a dataset of real traffic videos illustrate the feasibility of the proposed method for automatically determining the RoIs in real-time.","PeriodicalId":370671,"journal":{"name":"2020 IEEE Third International Conference on Artificial Intelligence and Knowledge Engineering (AIKE)","volume":"16 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120815064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Automatic Calibration of Forest Fire Weather Index For Independent Customizable Regions Based on Historical Records 基于历史记录的独立可定制区域林火天气指数自动定标
J. S. Junior, J. Paulo, Jérôme Mendes, D. Alves, L. Ribeiro
Wildfire Decision Support Systems are critical tools for civil protection authorities in the management of all wildfire stages, including prevention. To timely act and apply the necessary preventive measures to reduce the fire danger in wildfires, many proposed calibration studies of the Canadian Forest Fire Weather Index System (CFFWIS) have been performed mainly based on techniques that still depend on manual and empirical analysis, being limited to exploiting a few regions. This paper proposes a methodology for automatic calibration of the CFFWIS to obtain a fire danger measurement that best suits the specific characteristics of a given region. The proposed methodology, applied to 769 regions from Europe, is based on the k-means clustering technique to automatically identify patterns in the data sets composed of elements of the CFFWIS and wildfire records. The results of the automatic calibration of the CFFWIS on each of the 769 regions reinforce the versatility of the proposed methodology, which can be adapted to different regions.
野火决策支持系统是民防部门管理包括预防在内的所有野火阶段的关键工具。为了及时采取行动并采取必要的预防措施来减少野火的火灾危险,许多关于加拿大森林火灾天气指数系统(CFFWIS)的拟议校准研究主要基于仍然依赖于人工和经验分析的技术,仅限于开发少数地区。本文提出了一种自动校准CFFWIS的方法,以获得最适合给定地区特定特征的火灾危险测量值。该方法应用于欧洲769个地区,基于k-均值聚类技术,自动识别由CFFWIS和野火记录元素组成的数据集中的模式。769个区域的CFFWIS自动校准结果强化了所提出方法的通用性,该方法可以适应不同的区域。
{"title":"Automatic Calibration of Forest Fire Weather Index For Independent Customizable Regions Based on Historical Records","authors":"J. S. Junior, J. Paulo, Jérôme Mendes, D. Alves, L. Ribeiro","doi":"10.1109/AIKE48582.2020.00011","DOIUrl":"https://doi.org/10.1109/AIKE48582.2020.00011","url":null,"abstract":"Wildfire Decision Support Systems are critical tools for civil protection authorities in the management of all wildfire stages, including prevention. To timely act and apply the necessary preventive measures to reduce the fire danger in wildfires, many proposed calibration studies of the Canadian Forest Fire Weather Index System (CFFWIS) have been performed mainly based on techniques that still depend on manual and empirical analysis, being limited to exploiting a few regions. This paper proposes a methodology for automatic calibration of the CFFWIS to obtain a fire danger measurement that best suits the specific characteristics of a given region. The proposed methodology, applied to 769 regions from Europe, is based on the k-means clustering technique to automatically identify patterns in the data sets composed of elements of the CFFWIS and wildfire records. The results of the automatic calibration of the CFFWIS on each of the 769 regions reinforce the versatility of the proposed methodology, which can be adapted to different regions.","PeriodicalId":370671,"journal":{"name":"2020 IEEE Third International Conference on Artificial Intelligence and Knowledge Engineering (AIKE)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121949956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Hey ML, what can you do for me? 嘿,ML,你能为我做什么?
Javier Pastorino, A. Biswas
Machine learning (ML) algorithms are data-driven and given a goal task and a prior experience dataset relevant to the task, one can attempt to solve the task using ML seeking to achieve high accuracy. There is usually a big gap in the understanding between an ML experts and the dataset providers due to limited expertise in cross disciplines. Narrowing down a suitable set of problems to solve using ML is possibly the most ambiguous yet important agenda for data providers to consider before initiating collaborations with ML experts. We proposed an ML-fueled pipeline to identify potential problems (i.e., the tasks) so data providers can, with ease, explore potential problem areas to investigate with ML. The autonomous pipeline integrates information theory and graph-based unsupervised learning paradigms in order to generate a ranked retrieval of top-k problems for the given dataset for a successful ML based collaboration. We conducted experiments on diverse real-world and well-known datasets, and from a supervised learning standpoint, the proposed pipeline achieved 72% top-5 task retrieval accuracy on an average, which surpasses the retrieval performance for the same paradigm using the popular exploratory data analysis tools. Detailed experiment results with our source codes are available at: https://github.com/jpastorino/heyml.
机器学习(ML)算法是数据驱动的,给定目标任务和与任务相关的先前经验数据集,可以尝试使用ML寻求实现高精度来解决任务。由于跨学科的专业知识有限,机器学习专家和数据集提供者之间的理解通常存在很大差距。在开始与ML专家合作之前,数据提供商需要考虑的最模糊但最重要的议程可能是缩小使用ML解决的合适问题集。我们提出了一个机器学习驱动的管道来识别潜在的问题(即任务),这样数据提供者就可以轻松地探索潜在的问题领域,用机器学习进行调查。自治管道集成了信息论和基于图的无监督学习范式,以便为给定数据集生成top-k问题的排序检索,从而实现成功的基于机器学习的协作。我们在不同的现实世界和知名数据集上进行了实验,从监督学习的角度来看,所提出的管道平均达到72%的前5名任务检索准确率,超过了使用流行的探索性数据分析工具在相同范式下的检索性能。详细的实验结果与我们的源代码可在:https://github.com/jpastorino/heyml。
{"title":"Hey ML, what can you do for me?","authors":"Javier Pastorino, A. Biswas","doi":"10.1109/AIKE48582.2020.00023","DOIUrl":"https://doi.org/10.1109/AIKE48582.2020.00023","url":null,"abstract":"Machine learning (ML) algorithms are data-driven and given a goal task and a prior experience dataset relevant to the task, one can attempt to solve the task using ML seeking to achieve high accuracy. There is usually a big gap in the understanding between an ML experts and the dataset providers due to limited expertise in cross disciplines. Narrowing down a suitable set of problems to solve using ML is possibly the most ambiguous yet important agenda for data providers to consider before initiating collaborations with ML experts. We proposed an ML-fueled pipeline to identify potential problems (i.e., the tasks) so data providers can, with ease, explore potential problem areas to investigate with ML. The autonomous pipeline integrates information theory and graph-based unsupervised learning paradigms in order to generate a ranked retrieval of top-k problems for the given dataset for a successful ML based collaboration. We conducted experiments on diverse real-world and well-known datasets, and from a supervised learning standpoint, the proposed pipeline achieved 72% top-5 task retrieval accuracy on an average, which surpasses the retrieval performance for the same paradigm using the popular exploratory data analysis tools. Detailed experiment results with our source codes are available at: https://github.com/jpastorino/heyml.","PeriodicalId":370671,"journal":{"name":"2020 IEEE Third International Conference on Artificial Intelligence and Knowledge Engineering (AIKE)","volume":"1074 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132882704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2020 IEEE Third International Conference on Artificial Intelligence and Knowledge Engineering (AIKE)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1