首页 > 最新文献

Adv. Artif. Intell. Mach. Learn.最新文献

英文 中文
Adaptable Deep Learning and Probabilistic Graphical Model System for Semantic Segmentation 语义分割的自适应深度学习和概率图模型系统
Pub Date : 1900-01-01 DOI: 10.54364/aaiml.2022.1119
Matthew Avaylon, R. Sadre, Zhen Bai, T. Perciano
Semantic segmentation algorithms based on deep learning architectures have been applied to a diverse set of problems. Consequently, new methodologies have emerged to push the state-of-the-art in this field forward, and the need for powerful user-friendly software increased significantly. The combination of Conditional Random Fields (CRFs) and Convolutional Neural Networks (CNNs) boosted the results of pixel-level classification predictions. Recent work using a fully integrated CRF-RNN layer have shown strong advantages in segmentation benchmarks over the base models. Despite this success, the rigidity of these frameworks prevents mass adaptability for complex scientific datasets and presents challenges in optimally scaling these models. In this work, we introduce a new encoder-decoder system that overcomes both these issues. We adapt multiple CNNs as encoders, allowing for the definition of multiple function parameter arguments to structure the models according to the targeted datasets and scientific problem. We leverage the flexibility of the U-Net architecture to act as a scalable decoder. The CRF-RNN layer is integrated into the decoder as an optional final layer, keeping the entire system fully compatible with back-propagation. To evaluate the performance of our implementation, we performed experiments on the Oxford-IIIT Pet Dataset and to experimental scientific data acquired via micro-computed tomography (microCT), revealing the adaptability of this framework and the performance benefits from a fully end-to-end CNN-CRF system on a both experimental and benchmark datasets.
基于深度学习架构的语义分割算法已经被应用于各种各样的问题。因此,出现了新的方法来推动这一领域的最新技术,并且对功能强大的用户友好软件的需求显著增加。条件随机场(CRFs)和卷积神经网络(cnn)的结合提高了像素级分类预测的结果。最近使用完全集成的CRF-RNN层的工作在分割基准测试中显示出比基本模型更强的优势。尽管取得了成功,但这些框架的刚性阻碍了对复杂科学数据集的大规模适应性,并在优化这些模型方面提出了挑战。在这项工作中,我们介绍了一种新的编码器-解码器系统,克服了这两个问题。我们采用多个cnn作为编码器,允许定义多个函数参数参数来根据目标数据集和科学问题构建模型。我们利用U-Net架构的灵活性作为可扩展的解码器。CRF-RNN层作为可选的最后一层集成到解码器中,使整个系统与反向传播完全兼容。为了评估我们实现的性能,我们在Oxford-IIIT Pet数据集和通过微计算机断层扫描(microCT)获得的实验科学数据上进行了实验,揭示了该框架的适应性以及完全端到端CNN-CRF系统在实验和基准数据集上的性能优势。
{"title":"Adaptable Deep Learning and Probabilistic Graphical Model System for Semantic Segmentation","authors":"Matthew Avaylon, R. Sadre, Zhen Bai, T. Perciano","doi":"10.54364/aaiml.2022.1119","DOIUrl":"https://doi.org/10.54364/aaiml.2022.1119","url":null,"abstract":"Semantic segmentation algorithms based on deep learning architectures have been applied to a diverse set of problems. Consequently, new methodologies have emerged to push the state-of-the-art in this field forward, and the need for powerful user-friendly software increased significantly. The combination of Conditional Random Fields (CRFs) and Convolutional Neural Networks (CNNs) boosted the results of pixel-level classification predictions. Recent work using a fully integrated CRF-RNN layer have shown strong advantages in segmentation benchmarks over the base models. Despite this success, the rigidity of these frameworks prevents mass adaptability for complex scientific datasets and presents challenges in optimally scaling these models. In this work, we introduce a new encoder-decoder system that overcomes both these issues. We adapt multiple CNNs as encoders, allowing for the definition of multiple function parameter arguments to structure the models according to the targeted datasets and scientific problem. We leverage the flexibility of the U-Net architecture to act as a scalable decoder. The CRF-RNN layer is integrated into the decoder as an optional final layer, keeping the entire system fully compatible with back-propagation. To evaluate the performance of our implementation, we performed experiments on the Oxford-IIIT Pet Dataset and to experimental scientific data acquired via micro-computed tomography (microCT), revealing the adaptability of this framework and the performance benefits from a fully end-to-end CNN-CRF system on a both experimental and benchmark datasets.","PeriodicalId":373878,"journal":{"name":"Adv. Artif. Intell. Mach. Learn.","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123661097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Optimizing Distributed Face Recognition Systems through Efficient Aggregation of Facial Embeddings 通过有效的面部嵌入聚合优化分布式人脸识别系统
Pub Date : 1900-01-01 DOI: 10.54364/aaiml.2023.1146
Philipp Hofer, Michael Roland, R. Mayrhofer, Philipp Schwarz
Biometrics are one of the most privacy-sensitive data. Ubiquitous authentication systems with a focus on privacy favor decentralized approaches as they reduce potential attack vectors, both on a technical and organizational level. The gold standard is to let the user be in control of where their own data is stored, which consequently leads to a high variety of devices used. Moreover, in comparison with a centralized system, designs with higher end-user freedom often incur additional network overhead. Therefore, when using face recognition for biometric authentication, an efficient way to compare faces is important in practical deployments, because it reduces both network and hardware requirements that are essential to encourage device diversity. This paper proposes an efficient way to aggregate embeddings used for face recognition based on an extensive analysis on different datasets and the use of different aggregation strategies. As part of this analysis, a new dataset has been collected, which is available for research purposes. Our proposed method supports the construction of massively scalable, decentralized face recognition systems with a focus on both privacy and long-term usability.
生物特征是最敏感的隐私数据之一。关注隐私的无处不在的身份验证系统倾向于分散的方法,因为它们在技术和组织层面上减少了潜在的攻击向量。黄金标准是让用户控制自己的数据存储位置,这导致使用的设备种类繁多。此外,与集中式系统相比,具有更高最终用户自由度的设计通常会产生额外的网络开销。因此,在使用人脸识别进行生物识别身份验证时,在实际部署中,一种有效的方法来比较人脸是很重要的,因为它减少了对网络和硬件的需求,而这是鼓励设备多样性所必需的。基于对不同数据集的广泛分析和不同聚合策略的使用,本文提出了一种有效的人脸识别嵌入聚合方法。作为分析的一部分,收集了一个新的数据集,可用于研究目的。我们提出的方法支持大规模可扩展、分散的人脸识别系统的构建,同时关注隐私和长期可用性。
{"title":"Optimizing Distributed Face Recognition Systems through Efficient Aggregation of Facial Embeddings","authors":"Philipp Hofer, Michael Roland, R. Mayrhofer, Philipp Schwarz","doi":"10.54364/aaiml.2023.1146","DOIUrl":"https://doi.org/10.54364/aaiml.2023.1146","url":null,"abstract":"Biometrics are one of the most privacy-sensitive data. Ubiquitous authentication systems with a focus on privacy favor decentralized approaches as they reduce potential attack vectors, both on a technical and organizational level. The gold standard is to let the user be in control of where their own data is stored, which consequently leads to a high variety of devices used. Moreover, in comparison with a centralized system, designs with higher end-user freedom often incur additional network overhead. Therefore, when using face recognition for biometric authentication, an efficient way to compare faces is important in practical deployments, because it reduces both network and hardware requirements that are essential to encourage device diversity. This paper proposes an efficient way to aggregate embeddings used for face recognition based on an extensive analysis on different datasets and the use of different aggregation strategies. As part of this analysis, a new dataset has been collected, which is available for research purposes. Our proposed method supports the construction of massively scalable, decentralized face recognition systems with a focus on both privacy and long-term usability.","PeriodicalId":373878,"journal":{"name":"Adv. Artif. Intell. Mach. Learn.","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115287726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Estimating Data Loss At Scale 大规模估计数据丢失
Pub Date : 1900-01-01 DOI: 10.54364/aaiml.2022.1120
W. Zhang, Ilya Reznik
For companies that serve corporate customers, Customer Service Outage (CSO) is a catastrophic event that may lead to some loss of their customer data. After each CSO, it is important to have a timely and quantitative measurement of how much data was lost. However, it is impractical for human to do so due to the enormous amount of data. In this paper, we present a robust solution that can return numerical loss report within hours. It handles a variety of challenges that are associated with the data. Consequently, management team can gauge the severity of data loss right after each event and respond accordingly.
对于为企业客户提供服务的公司来说,客户服务中断(CSO)是一种可能导致客户数据丢失的灾难性事件。在每次CSO之后,重要的是要对丢失的数据量进行及时和定量的测量。然而,由于数据量巨大,人类很难做到这一点。在本文中,我们提出了一个鲁棒的解决方案,可以在数小时内返回数字损失报告。它处理与数据相关的各种挑战。因此,管理团队可以在每次事件发生后立即评估数据丢失的严重程度,并做出相应的响应。
{"title":"Estimating Data Loss At Scale","authors":"W. Zhang, Ilya Reznik","doi":"10.54364/aaiml.2022.1120","DOIUrl":"https://doi.org/10.54364/aaiml.2022.1120","url":null,"abstract":"For companies that serve corporate customers, Customer Service Outage (CSO) is a catastrophic event that may lead to some loss of their customer data. After each CSO, it is important to have a timely and quantitative measurement of how much data was lost. However, it is impractical for human to do so due to the enormous amount of data. In this paper, we present a robust solution that can return numerical loss report within hours. It handles a variety of challenges that are associated with the data. Consequently, management team can gauge the severity of data loss right after each event and respond accordingly.","PeriodicalId":373878,"journal":{"name":"Adv. Artif. Intell. Mach. Learn.","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123389677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CAD2Render: A Synthetic Data Generator for Training Object Detection and Pose Estimation Models in Industrial Environments CAD2Render:用于训练工业环境中目标检测和姿态估计模型的合成数据生成器
Pub Date : 1900-01-01 DOI: 10.54364/aaiml.2023.1158
Steven Moonen
Computer vision systems become more wide spread in the manufacturing industry for automating tasks. As these vision systems use more and more machine learning opposed to the classic vision algorithms, streamlining the process of creating the training datasets become more important. Creating large labeled datasets is a tedious and time consuming process that makes it expensive. Especially in a low-volume high-variance manufacturing environment. To reduce the costs of creating training datasets we introduce CAD2Render, a GPUaccelerated synthetic data generator based on the Unity High Definition Render Pipeline
计算机视觉系统在制造业自动化任务中得到越来越广泛的应用。随着这些视觉系统越来越多地使用与经典视觉算法相反的机器学习,简化创建训练数据集的过程变得更加重要。创建大型标记数据集是一个冗长且耗时的过程,因此成本高昂。特别是在小批量、高变化的制造环境中。为了降低创建训练数据集的成本,我们引入了CAD2Render,这是一个基于Unity高清渲染管道的gpu加速合成数据生成器
{"title":"CAD2Render: A Synthetic Data Generator for Training Object Detection and Pose Estimation Models in Industrial Environments","authors":"Steven Moonen","doi":"10.54364/aaiml.2023.1158","DOIUrl":"https://doi.org/10.54364/aaiml.2023.1158","url":null,"abstract":"Computer vision systems become more wide spread in the manufacturing industry for automating tasks. As these vision systems use more and more machine learning opposed to the classic vision algorithms, streamlining the process of creating the training datasets become more important. Creating large labeled datasets is a tedious and time consuming process that makes it expensive. Especially in a low-volume high-variance manufacturing environment. To reduce the costs of creating training datasets we introduce CAD2Render, a GPUaccelerated synthetic data generator based on the Unity High Definition Render Pipeline","PeriodicalId":373878,"journal":{"name":"Adv. Artif. Intell. Mach. Learn.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124046029","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Linguistically-Inspired Neural Coreference Resolution 语言启发的神经共指解析
Pub Date : 1900-01-01 DOI: 10.54364/aaiml.2023.1166
Xuanyue Yang, Wenting Ye, Luke Breitfeller, Tianwei Yue, Wenping Wang
The field of coreference resolution has witnessed significant advancements since the introduction of deep learning-based models. In this paper, we replicate the state-of-the-art coreference resolution model and perform a thorough error analysis. We identify a potential limitation of the current approach in terms of its treatment of grammatical constructions within sentences. Furthermore, the model struggles to leverage contextual information across sentences, resulting in suboptimal accuracy when resolving mentions that span multiple sentences. Motivated by these observations, we propose an approach that integrates linguistic information throughout the entire architecture. Our innovative contributions include multitask learning with part-of-speech (POS) tagging, supervision of intermediate scores, and self-attention mechanisms that operate across sentences. By incorporating these linguisticinspired modules, we not only achieve a modest improvement in the F1 score on CoNLL 2012 dataset, but we also perform qualitative analysis to ascertain whether our model invisibly surpasses the baseline performance. Our findings demonstrate that our model successfully learns linguistic signals that are absent in the original baseline. We posit that these enhance ments may have gone undetected due to annotation errors, but they nonetheless lead to a more accurate understanding of coreference resolution.
自引入基于深度学习的模型以来,共参考分辨率领域取得了重大进展。在本文中,我们复制了最先进的共参考分辨率模型,并进行了彻底的误差分析。我们在处理句子中的语法结构方面确定了当前方法的潜在局限性。此外,该模型难以利用跨句子的上下文信息,导致在解析跨多个句子的提及时准确性不够理想。基于这些观察,我们提出了一种将语言信息集成到整个体系结构中的方法。我们的创新贡献包括词性标注的多任务学习,中间分数的监督,以及跨句子操作的自注意机制。通过整合这些受语言启发的模块,我们不仅在CoNLL 2012数据集上实现了F1分数的适度改进,而且还进行了定性分析,以确定我们的模型是否无形地超过了基线性能。我们的研究结果表明,我们的模型成功地学习了原始基线中不存在的语言信号。我们假设这些增强可能由于注释错误而未被检测到,但它们仍然导致对共同参考分辨率的更准确理解。
{"title":"Linguistically-Inspired Neural Coreference Resolution","authors":"Xuanyue Yang, Wenting Ye, Luke Breitfeller, Tianwei Yue, Wenping Wang","doi":"10.54364/aaiml.2023.1166","DOIUrl":"https://doi.org/10.54364/aaiml.2023.1166","url":null,"abstract":"The field of coreference resolution has witnessed significant advancements since the introduction of deep learning-based models. In this paper, we replicate the state-of-the-art coreference resolution model and perform a thorough error analysis. We identify a potential limitation of the current approach in terms of its treatment of grammatical constructions within sentences. Furthermore, the model struggles to leverage contextual information across sentences, resulting in suboptimal accuracy when resolving mentions that span multiple sentences. Motivated by these observations, we propose an approach that integrates linguistic information throughout the entire architecture. Our innovative contributions include multitask learning with part-of-speech (POS) tagging, supervision of intermediate scores, and self-attention mechanisms that operate across sentences. By incorporating these linguisticinspired modules, we not only achieve a modest improvement in the F1 score on CoNLL 2012 dataset, but we also perform qualitative analysis to ascertain whether our model invisibly surpasses the baseline performance. Our findings demonstrate that our model successfully learns linguistic signals that are absent in the original baseline. We posit that these enhance ments may have gone undetected due to annotation errors, but they nonetheless lead to a more accurate understanding of coreference resolution.","PeriodicalId":373878,"journal":{"name":"Adv. Artif. Intell. Mach. Learn.","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127106866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Multi-Layer Learning Machines and Smart Sensor Applications 多层学习机和智能传感器应用
Pub Date : 1900-01-01 DOI: 10.54364/aaiml.2021.1103
M. Mahmoud, Ayman Al-Nasser, Mutaz M. Hamdan
{"title":"Multi-Layer Learning Machines and Smart Sensor Applications","authors":"M. Mahmoud, Ayman Al-Nasser, Mutaz M. Hamdan","doi":"10.54364/aaiml.2021.1103","DOIUrl":"https://doi.org/10.54364/aaiml.2021.1103","url":null,"abstract":"","PeriodicalId":373878,"journal":{"name":"Adv. Artif. Intell. Mach. Learn.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131380436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
AI Based Approach for Shop Classification and a Comparative Study with Human 基于AI的店铺分类方法及其与人类的比较研究
Pub Date : 1900-01-01 DOI: 10.54364/aaiml.2022.1129
Mrouj Almuhajri, C. Suen
The rapid advancements in artificial intelligence algorithms have sharpened the focus on street signs due to their prevalence. Some street signs have consistent shapes and pre-defined colors and fonts, such as traffic signs while others are characterized by their visual variability like shop signboards. This variations create a complicated challenge for AI-based systems to classify them. In this paper, the annotation of the ShoS dataset were extended to include more attributes for shop classification. Then, two classifiers were trained and tested utilizing the extended ShoS dataset. SVM showed great performance as its F1-score reached 89.33%. The classification performance was compared with human performance, and the results showed that our classifier excelled over human performance by about 15%. The results were discussed, so the factors that affect classification were provided for further enhancement.
人工智能算法的快速发展使人们更加关注路牌的普及。一些街道标志具有一致的形状和预定义的颜色和字体,如交通标志,而另一些则具有视觉可变性,如商店招牌。这种变化给基于人工智能的系统分类带来了复杂的挑战。本文对ShoS数据集的标注进行了扩展,增加了店铺分类的属性。然后,利用扩展的ShoS数据集对两个分类器进行训练和测试。支持向量机的f1得分达到89.33%,表现出良好的性能。将分类性能与人类性能进行比较,结果表明我们的分类器比人类性能高出约15%。对结果进行了讨论,为进一步提高分类水平提供了影响因素。
{"title":"AI Based Approach for Shop Classification and a Comparative Study with Human","authors":"Mrouj Almuhajri, C. Suen","doi":"10.54364/aaiml.2022.1129","DOIUrl":"https://doi.org/10.54364/aaiml.2022.1129","url":null,"abstract":"The rapid advancements in artificial intelligence algorithms have sharpened the focus on street signs due to their prevalence. Some street signs have consistent shapes and pre-defined colors and fonts, such as traffic signs while others are characterized by their visual variability like shop signboards. This variations create a complicated challenge for AI-based systems to classify them. In this paper, the annotation of the ShoS dataset were extended to include more attributes for shop classification. Then, two classifiers were trained and tested utilizing the extended ShoS dataset. SVM showed great performance as its F1-score reached 89.33%. The classification performance was compared with human performance, and the results showed that our classifier excelled over human performance by about 15%. The results were discussed, so the factors that affect classification were provided for further enhancement.","PeriodicalId":373878,"journal":{"name":"Adv. Artif. Intell. Mach. Learn.","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122714947","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Emergence of Heterogeneous Networks 异构网络的出现
Pub Date : 1900-01-01 DOI: 10.54364/aaiml.2022.1131
Gautam Srivastava
Fifth generation (5G) communication provides high-speed data transfer and low latency, serving the better for multiple heterogeneous applications over previous technologies. This has led to the development of heterogeneous networks (HetNets) by integrating diverse information and communication technologies (ICTs) into a single view to provide better quality of service (QoS) for different classes of users [1]. HetNets are poised to see more widespread acceptance of a means of communication favored in 5G and beyond as we look to 6G as well. The fundamental components of a 5G HetNet scenario include the user equipment (UE) and enhanced node B (eNB). The communications between the UEs is facilitated using eNBs that act as a gateway for inward and outward data exchange. User equipment is classified under pico or macro cells in a HetNet whereas the integration of 5G supports distributed communication modes through device-to-device (D2D) features. Along with the support of eNBs, interference cancellation, carrier aggregation, massive multi-input multi-output, and coordinated transmissions are facilitated in this network to meet the QoS requirements of different applications and users [2, 3]. The interoperable nature of the heterogeneous platform provides pervasive and anonymous access to resources and UE communications. In such a pervasive access scenario, security becomes a prime concern due to the interruptions in D2D communications [4]. Unauthorized devices or adversaries focus on the exchanged data to inject malicious or falsified content, changing its freshness and reliability. Therefore, authenticationcentric solutions are designed for data security along with integrity checks to ensure transmitted data is delivered at the receiver end [5]. Globally, the data security and privacy of the Internet of Things (IoT) has been a concern to all users. As more and more individuals see themselves conducting their day-to-day livelihood on mobile devices, they also see themselves sharing personal information over open channels. Robust data authentication and efficient key management are assimilated in the heterogeneous communication platform for leveraging the security level of data exchange to preserve user data security and privacy. Key management and hash-based authentication methods are designedwith less complexity to reduce the computational and communication-based overheads, alongwith lower latency to support the design goal of 5G environments. Therefore, the adaptiveness of the authentication method is required to be two-fold, namely user-centric and application-centric, as guided by the service and security provider. We have seenmany different areas fuse to offer strong authenticationmethods in 5G. These tend to include Artificial Intelligence, Machine Learning, Deep Learning, and more recently, blockchain technology [6]. Artificial intelligence techniques tend to
第五代(5G)通信提供高速数据传输和低延迟,比以前的技术更好地服务于多种异构应用。这导致了异构网络(HetNets)的发展,通过将不同的信息和通信技术(ict)集成到一个视图中,为不同类别的用户提供更好的服务质量(QoS)[1]。在我们展望6G的同时,HetNets也有望看到5G及以后的通信方式得到更广泛的接受。5G HetNet场景的基本组件包括用户设备(UE)和增强节点B (eNB)。使用充当向内和向外数据交换网关的enb促进了ue之间的通信。用户设备在HetNet中分为微型或宏单元,而5G的集成通过设备对设备(D2D)功能支持分布式通信模式。在enb的支持下,该网络可以实现干扰消除、载波聚合、海量多输入多输出、协同传输等功能,满足不同应用和用户的QoS需求[2,3]。异构平台的互操作特性提供了对资源和UE通信的普遍和匿名访问。在这样一个普遍的访问场景中,由于D2D通信的中断,安全性成为一个主要问题[4]。未经授权的设备或攻击者关注交换的数据注入恶意或伪造的内容,改变其新鲜度和可靠性。因此,以身份验证为中心的解决方案设计用于数据安全以及完整性检查,以确保传输的数据在接收端交付[5]。在全球范围内,物联网(IoT)的数据安全和隐私一直是所有用户关注的问题。随着越来越多的人看到自己在移动设备上进行日常生活,他们也看到自己在开放渠道上分享个人信息。异构通信平台吸收了健壮的数据认证和高效的密钥管理,利用数据交换的安全级别来保护用户数据的安全性和隐私性。密钥管理和基于哈希的身份验证方法的设计复杂性较低,以减少基于计算和通信的开销,同时降低延迟,以支持5G环境的设计目标。因此,在服务和安全提供者的指导下,身份验证方法的适应性要求是双重的,即以用户为中心和以应用程序为中心。我们已经看到许多不同的领域融合在5G中提供强大的认证方法。这些往往包括人工智能,机器学习,深度学习,以及最近的区块链技术[6]。人工智能技术倾向于
{"title":"The Emergence of Heterogeneous Networks","authors":"Gautam Srivastava","doi":"10.54364/aaiml.2022.1131","DOIUrl":"https://doi.org/10.54364/aaiml.2022.1131","url":null,"abstract":"Fifth generation (5G) communication provides high-speed data transfer and low latency, serving the better for multiple heterogeneous applications over previous technologies. This has led to the development of heterogeneous networks (HetNets) by integrating diverse information and communication technologies (ICTs) into a single view to provide better quality of service (QoS) for different classes of users [1]. HetNets are poised to see more widespread acceptance of a means of communication favored in 5G and beyond as we look to 6G as well. The fundamental components of a 5G HetNet scenario include the user equipment (UE) and enhanced node B (eNB). The communications between the UEs is facilitated using eNBs that act as a gateway for inward and outward data exchange. User equipment is classified under pico or macro cells in a HetNet whereas the integration of 5G supports distributed communication modes through device-to-device (D2D) features. Along with the support of eNBs, interference cancellation, carrier aggregation, massive multi-input multi-output, and coordinated transmissions are facilitated in this network to meet the QoS requirements of different applications and users [2, 3]. The interoperable nature of the heterogeneous platform provides pervasive and anonymous access to resources and UE communications. In such a pervasive access scenario, security becomes a prime concern due to the interruptions in D2D communications [4]. Unauthorized devices or adversaries focus on the exchanged data to inject malicious or falsified content, changing its freshness and reliability. Therefore, authenticationcentric solutions are designed for data security along with integrity checks to ensure transmitted data is delivered at the receiver end [5]. Globally, the data security and privacy of the Internet of Things (IoT) has been a concern to all users. As more and more individuals see themselves conducting their day-to-day livelihood on mobile devices, they also see themselves sharing personal information over open channels. Robust data authentication and efficient key management are assimilated in the heterogeneous communication platform for leveraging the security level of data exchange to preserve user data security and privacy. Key management and hash-based authentication methods are designedwith less complexity to reduce the computational and communication-based overheads, alongwith lower latency to support the design goal of 5G environments. Therefore, the adaptiveness of the authentication method is required to be two-fold, namely user-centric and application-centric, as guided by the service and security provider. We have seenmany different areas fuse to offer strong authenticationmethods in 5G. These tend to include Artificial Intelligence, Machine Learning, Deep Learning, and more recently, blockchain technology [6]. Artificial intelligence techniques tend to","PeriodicalId":373878,"journal":{"name":"Adv. Artif. Intell. Mach. Learn.","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124891027","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Unsupervised Feature Selection Approach Using Genetic Algorithm on Partitioned Data 基于遗传算法的分区数据无监督特征选择方法
Pub Date : 1900-01-01 DOI: 10.54364/aaiml.2022.1134
Anika Saxena, Deepesh Chugh, H. Mittal, Mohammad Sajid, Ritu Chauhan, Eiad Yafi, Jian Cao, Mukesh Prasad
A novel feature selection approach is presented in this paper. Sammon’s Stress Function transforms the high dimension data to a lower dimension data set. A data set is divided into small partitions. The features are assigned randomly to these partitions. Using GA with Sammon Error as fitness value, a small, desired number of features are selected from every partition. The combination of the reduced subsets of the features from these partitions is again divided into small partitions. After a certain number of iterating the process, a desired small number of features is obtained. For experimental validation, the proposed method has been tested on 11 standard datasets with three classifiers namely, Decision Tree, MLP and KNN. The classification accuracies obtained by the proposed method is highest on most of the considered datasets against the results reported in literature. Moreover, the proposed method selects comparatively less number of features in comparison to considered methods. The optimistic results obtained from the proposed method justify its strength.
提出了一种新的特征选择方法。萨蒙应力函数将高维数据转换为低维数据集。数据集被分成小的分区。特征被随机分配到这些分区。使用以Sammon误差作为适应度值的遗传算法,从每个分区中选择少量所需的特征。来自这些分区的特征的简化子集的组合再次被划分为小的分区。经过一定次数的迭代过程后,获得所需的少量特征。为了实验验证,本文采用决策树、MLP和KNN三种分类器在11个标准数据集上进行了测试。与文献报道的结果相比,本文提出的方法在大多数考虑的数据集上获得的分类精度最高。此外,与考虑的方法相比,该方法选择的特征数量相对较少。所提方法得到的乐观结果证明了其有效性。
{"title":"A Novel Unsupervised Feature Selection Approach Using Genetic Algorithm on Partitioned Data","authors":"Anika Saxena, Deepesh Chugh, H. Mittal, Mohammad Sajid, Ritu Chauhan, Eiad Yafi, Jian Cao, Mukesh Prasad","doi":"10.54364/aaiml.2022.1134","DOIUrl":"https://doi.org/10.54364/aaiml.2022.1134","url":null,"abstract":"A novel feature selection approach is presented in this paper. Sammon’s Stress Function transforms the high dimension data to a lower dimension data set. A data set is divided into small partitions. The features are assigned randomly to these partitions. Using GA with Sammon Error as fitness value, a small, desired number of features are selected from every partition. The combination of the reduced subsets of the features from these partitions is again divided into small partitions. After a certain number of iterating the process, a desired small number of features is obtained. For experimental validation, the proposed method has been tested on 11 standard datasets with three classifiers namely, Decision Tree, MLP and KNN. The classification accuracies obtained by the proposed method is highest on most of the considered datasets against the results reported in literature. Moreover, the proposed method selects comparatively less number of features in comparison to considered methods. The optimistic results obtained from the proposed method justify its strength.","PeriodicalId":373878,"journal":{"name":"Adv. Artif. Intell. Mach. Learn.","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123518019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Investigating the Impact of Yaw Pose Variation on Facial Recognition Performance 研究偏航姿态变化对人脸识别性能的影响
Pub Date : 1900-01-01 DOI: 10.54364/aaiml.2023.1162
Omer Abdulhaleem Naser, S. M. S. Ahmad, K. Samsudin, M. Hanafi
Facial recognition systems often struggle with detecting faces in poses that deviate from the frontal view. Therefore, this paper investigates the impact of variations in yaw poses on the accuracy of facial recognition systems and presents a robust approach optimized to detect faces with pose variations ranging from 0◦ to ±90◦ . The proposed system integrates MTCNN, FaceNet, and SVC, and is trained and evaluated on the Taiwan dataset, which includes face images with diverse yaw poses. The training dataset consists of 89 subjects, with approximately 70 images per subject, and the testing dataset consists of 49 subjects, each with approximately 5 images. Our system achieved a training accuracy of 99.174% and a test accuracy of 96.970%, demonstrating its efficiency in detecting faces with pose variations. These findings suggest that the proposed approach can be a valuable tool in improving facial recognition accuracy in real-world scenarios.
面部识别系统常常难以检测出姿势偏离正面视角的人脸。因此,本文研究了偏航姿态变化对面部识别系统准确性的影响,并提出了一种鲁棒的方法,该方法经过优化,可以检测姿态变化范围从0◦到±90◦的人脸。该系统集成了MTCNN、FaceNet和SVC,并在台湾数据集上进行了训练和评估,该数据集包括具有不同偏航姿态的人脸图像。训练数据集由89个主题组成,每个主题大约有70张图像,测试数据集由49个主题组成,每个主题大约有5张图像。该系统的训练准确率为99.174%,测试准确率为96.970%,证明了该系统对姿态变化人脸的检测效率。这些发现表明,所提出的方法可以成为提高真实场景中面部识别准确性的有价值的工具。
{"title":"Investigating the Impact of Yaw Pose Variation on Facial Recognition Performance","authors":"Omer Abdulhaleem Naser, S. M. S. Ahmad, K. Samsudin, M. Hanafi","doi":"10.54364/aaiml.2023.1162","DOIUrl":"https://doi.org/10.54364/aaiml.2023.1162","url":null,"abstract":"Facial recognition systems often struggle with detecting faces in poses that deviate from the frontal view. Therefore, this paper investigates the impact of variations in yaw poses on the accuracy of facial recognition systems and presents a robust approach optimized to detect faces with pose variations ranging from 0◦ to ±90◦ . The proposed system integrates MTCNN, FaceNet, and SVC, and is trained and evaluated on the Taiwan dataset, which includes face images with diverse yaw poses. The training dataset consists of 89 subjects, with approximately 70 images per subject, and the testing dataset consists of 49 subjects, each with approximately 5 images. Our system achieved a training accuracy of 99.174% and a test accuracy of 96.970%, demonstrating its efficiency in detecting faces with pose variations. These findings suggest that the proposed approach can be a valuable tool in improving facial recognition accuracy in real-world scenarios.","PeriodicalId":373878,"journal":{"name":"Adv. Artif. Intell. Mach. Learn.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129899423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Adv. Artif. Intell. Mach. Learn.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1