首页 > 最新文献

American Journal of Artificial Intelligence最新文献

英文 中文
Exploring Factors Influencing AI Sentiment-Analysis Engine Robot Use - Surveying Students in Social Science College 探索影响人工智能情感的因素——分析引擎机器人的使用——对社会科学学院学生的调查
Pub Date : 2023-02-27 DOI: 10.11648/j.ajai.20230701.11
Chin-Liang Hung, C. Chiu
{"title":"Exploring Factors Influencing AI Sentiment-Analysis Engine Robot Use - Surveying Students in Social Science College","authors":"Chin-Liang Hung, C. Chiu","doi":"10.11648/j.ajai.20230701.11","DOIUrl":"https://doi.org/10.11648/j.ajai.20230701.11","url":null,"abstract":"","PeriodicalId":404597,"journal":{"name":"American Journal of Artificial Intelligence","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127440947","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dominance Pruning in Machine Learning for Solving Financial Trading and Real-Time Multimedia Applications 解决金融交易和实时多媒体应用的机器学习优势修剪
Pub Date : 2023-02-06 DOI: 10.11648/j.ajai.20220602.12
Benjamin Wan-Sang Wah
: This paper presents the design of dominance relations to reduce the space traversed in machine learning for solving two applications in financial trading and real-time multimedia. A machine-learning algorithm designed for an application with a huge search space will need to perform an efficient traversal of the space during learning. It will be more effective if it employs a powerful pruning mechanism to eliminate suboptimal candidates before using them in the learning algorithm. In our approach, we present dominance relations for pruning subspaces with suboptimal kernels that are otherwise evaluated in learning, where kernels represent the statistical quality, average density
为了解决金融交易和实时多媒体两种机器学习应用,本文提出了优势关系的设计,以减少机器学习中遍历的空间。为具有巨大搜索空间的应用程序设计的机器学习算法需要在学习过程中执行有效的空间遍历。如果在学习算法中使用次优候选对象之前,采用强大的剪枝机制来剔除次优候选对象,将会更加有效。在我们的方法中,我们提出了具有次优核的修剪子空间的优势关系,这些次优核在学习中被评估,其中核代表统计质量,平均密度
{"title":"Dominance Pruning in Machine Learning for Solving Financial Trading and Real-Time Multimedia Applications","authors":"Benjamin Wan-Sang Wah","doi":"10.11648/j.ajai.20220602.12","DOIUrl":"https://doi.org/10.11648/j.ajai.20220602.12","url":null,"abstract":": This paper presents the design of dominance relations to reduce the space traversed in machine learning for solving two applications in financial trading and real-time multimedia. A machine-learning algorithm designed for an application with a huge search space will need to perform an efficient traversal of the space during learning. It will be more effective if it employs a powerful pruning mechanism to eliminate suboptimal candidates before using them in the learning algorithm. In our approach, we present dominance relations for pruning subspaces with suboptimal kernels that are otherwise evaluated in learning, where kernels represent the statistical quality, average density","PeriodicalId":404597,"journal":{"name":"American Journal of Artificial Intelligence","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126599646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Classification of Spectrum Scheduling Using Conditional Probability and Decision Tree Supervised Learning Approach 基于条件概率和决策树监督学习方法的频谱调度分类
Pub Date : 2021-08-27 DOI: 10.11648/J.AJAI.20210502.11
Imeh J. Umoren, Esther Polycarp, Godwin Ansa
Spectrum Scheduling is an efficient scheme of improving spectrum utilization for faster communications, higher definition media (HDM) and data transmission. Radio spectrum is very limited in supply resulting in enormous problems related to scarcity. It owes the physical support for wireless communication, both fixed applications and mobile broadband. Basically, effective use of the spectrum depends on the channel settings, sensing performance, detection of spectrum prospect as well as effective transmission of both Primary Users (PUs) and Secondary Users (SUs) packets at a specific time slot. In order to improve spectrum utilization this paper adopted quantitative method which employs Probability Theorem to identify the probabilities of both primary Users (PUs) and secondary users (SUs) in the spectrum datasets allocation and further used conditional probability to compare two Frequency Bands i.e., High Frequency (HF) and Very High Frequency (VHF). The result indicates available spectrum holes (SH) left unutilized in the Secondary User (SU) resulting in the need for spectrum scheduling for the SU. The procedure makes the secondary users occupy a probability of 0.002mhz compared to the primary users on 0.00004mhz utilization. This further indicates that some spectrum holes were left unutilized by the license users (Primary Users). However, spectrum allocation is one of the major issues of improving spectrum efficiency and has become a considerable tool in cognitive wireless networks (CWN). Consequently, the goal of spectrum allocation is to assign leisure spectrum resources efficiently to achieve the optimal Quality of Service (QOS and cognitive user requirements of wireless network. Again, classification of spectrum allocation was carried out through difference methods. Firstly, we employ a probability theorem to identify the probability of both Primary Users (PUs) and Secondary Users (SUs) in the allocated spectrum data sets. Secondly, conditional probability was used to compare two frequency band based on primary and secondary allocation policies designed to identify the specific allocation of each band. Thirdly, Machine Learning (ML) Algorithm based on Decision Tree - Supervised Learning (DTSL) approach was adopted to classified our data sets. The result yielded 68% which correctly classified instances based on the total records of sixty-nine (69) data sets. Research findings demonstrate a highly optimized spectrum scheduling for efficient networks service provisions.
频谱调度是一种有效的提高频谱利用率的方案,用于更快的通信、更高清晰度的媒体(HDM)和数据传输。无线电频谱的供应非常有限,导致了与稀缺有关的巨大问题。它拥有无线通信的物理支持,包括固定应用和移动宽带。基本上,频谱的有效利用取决于信道设置、感知性能、频谱前景检测以及在特定时隙内Primary user (pu)和Secondary user (su)分组的有效传输。为了提高频谱利用率,本文采用了定量方法,利用概率论来确定主用户(pu)和次用户(su)在频谱数据集分配中的概率,并进一步利用条件概率对高频(HF)和甚高频(VHF)两个频段进行比较。计算结果表明,备用用户的可用频谱空壳(SH)未被利用,因此需要对备用用户进行频谱调度,使得备用用户比主用户占用0.00004mhz的概率为0.002mhz。说明部分频谱漏洞未被license用户(Primary users)利用。然而,频谱分配是提高频谱效率的主要问题之一,已成为认知无线网络(CWN)中一个重要的工具。因此,频谱分配的目标是有效分配空闲频谱资源,以实现无线网络最优的服务质量(QOS)和用户认知需求。再次,通过不同的方法对频谱分配进行分类。首先,我们利用概率定理来确定分配频谱数据集中主用户(pu)和副用户(su)的概率。其次,根据设计的主次分配策略,利用条件概率对两个频段进行比较,确定每个频段的具体分配;第三,采用基于决策树监督学习(DTSL)方法的机器学习(ML)算法对数据集进行分类。结果产生68%的基于69个数据集的总记录的正确分类实例。研究结果表明,一种高度优化的频谱调度方法可以有效地提供网络服务。
{"title":"Classification of Spectrum Scheduling Using Conditional Probability and Decision Tree Supervised Learning Approach","authors":"Imeh J. Umoren, Esther Polycarp, Godwin Ansa","doi":"10.11648/J.AJAI.20210502.11","DOIUrl":"https://doi.org/10.11648/J.AJAI.20210502.11","url":null,"abstract":"Spectrum Scheduling is an efficient scheme of improving spectrum utilization for faster communications, higher definition media (HDM) and data transmission. Radio spectrum is very limited in supply resulting in enormous problems related to scarcity. It owes the physical support for wireless communication, both fixed applications and mobile broadband. Basically, effective use of the spectrum depends on the channel settings, sensing performance, detection of spectrum prospect as well as effective transmission of both Primary Users (PUs) and Secondary Users (SUs) packets at a specific time slot. In order to improve spectrum utilization this paper adopted quantitative method which employs Probability Theorem to identify the probabilities of both primary Users (PUs) and secondary users (SUs) in the spectrum datasets allocation and further used conditional probability to compare two Frequency Bands i.e., High Frequency (HF) and Very High Frequency (VHF). The result indicates available spectrum holes (SH) left unutilized in the Secondary User (SU) resulting in the need for spectrum scheduling for the SU. The procedure makes the secondary users occupy a probability of 0.002mhz compared to the primary users on 0.00004mhz utilization. This further indicates that some spectrum holes were left unutilized by the license users (Primary Users). However, spectrum allocation is one of the major issues of improving spectrum efficiency and has become a considerable tool in cognitive wireless networks (CWN). Consequently, the goal of spectrum allocation is to assign leisure spectrum resources efficiently to achieve the optimal Quality of Service (QOS and cognitive user requirements of wireless network. Again, classification of spectrum allocation was carried out through difference methods. Firstly, we employ a probability theorem to identify the probability of both Primary Users (PUs) and Secondary Users (SUs) in the allocated spectrum data sets. Secondly, conditional probability was used to compare two frequency band based on primary and secondary allocation policies designed to identify the specific allocation of each band. Thirdly, Machine Learning (ML) Algorithm based on Decision Tree - Supervised Learning (DTSL) approach was adopted to classified our data sets. The result yielded 68% which correctly classified instances based on the total records of sixty-nine (69) data sets. Research findings demonstrate a highly optimized spectrum scheduling for efficient networks service provisions.","PeriodicalId":404597,"journal":{"name":"American Journal of Artificial Intelligence","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126097293","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reproducing Musicality: Immediate Human-like Musicality Through Machine Learning and Passing the Turing Test 再现音乐性:通过机器学习和通过图灵测试的即时人类音乐性
Pub Date : 2021-05-26 DOI: 10.11648/J.AJAI.20210501.13
Aran V. Samson, A. Coronel
Musicology is a growing focus in computer science. Past research has had success in automatically generating music through learning-based agents that make use of neural networks and through model and rule-based approaches. These methods require a significant amount of information, either in the form of a large dataset for learning or a comprehensive set of rules based on musical concepts. This paper explores a model in which a minimal amount of musical information is needed to compose a desired style of music. This paper takes from two concepts, objectness, and evolutionary computation. The concept of objectness, an idea directly derived from imagery and pattern recognition, was used to extract specific musical objects from single musical inputs which are then used as the foundation to algorithmically produce musical pieces that are similar in style to the original inputs. These musical pieces are the product of evolutionary algorithms which implement a sequential evolution approach wherein a generated output may or may not yet be fully within the fitness thresholds of the input pieces. This method eliminates the need for a large amount of pre-provided data as well as the need for long processing times that are commonly associated with machine-learned art-pieces. This study aims to show a proof of concept of the implementation of the described model.
音乐学是计算机科学中一个越来越受关注的领域。过去的研究已经成功地通过使用神经网络的基于学习的代理以及基于模型和规则的方法自动生成音乐。这些方法需要大量的信息,要么是用于学习的大型数据集,要么是基于音乐概念的综合规则集。本文探索了一种模型,在这种模型中,需要最少的音乐信息来创作理想的音乐风格。本文从客观性和进化计算两个概念出发。对象的概念,一个直接来源于图像和模式识别的想法,被用来从单个音乐输入中提取特定的音乐对象,然后作为算法生成与原始输入风格相似的音乐作品的基础。这些音乐片段是进化算法的产物,它实现了顺序进化方法,其中生成的输出可能会或可能不会完全在输入片段的适应度阈值内。这种方法不需要大量预先提供的数据,也不需要机器学习艺术作品通常需要的长时间处理时间。本研究旨在证明所述模型的概念实现。
{"title":"Reproducing Musicality: Immediate Human-like Musicality Through Machine Learning and Passing the Turing Test","authors":"Aran V. Samson, A. Coronel","doi":"10.11648/J.AJAI.20210501.13","DOIUrl":"https://doi.org/10.11648/J.AJAI.20210501.13","url":null,"abstract":"Musicology is a growing focus in computer science. Past research has had success in automatically generating music through learning-based agents that make use of neural networks and through model and rule-based approaches. These methods require a significant amount of information, either in the form of a large dataset for learning or a comprehensive set of rules based on musical concepts. This paper explores a model in which a minimal amount of musical information is needed to compose a desired style of music. This paper takes from two concepts, objectness, and evolutionary computation. The concept of objectness, an idea directly derived from imagery and pattern recognition, was used to extract specific musical objects from single musical inputs which are then used as the foundation to algorithmically produce musical pieces that are similar in style to the original inputs. These musical pieces are the product of evolutionary algorithms which implement a sequential evolution approach wherein a generated output may or may not yet be fully within the fitness thresholds of the input pieces. This method eliminates the need for a large amount of pre-provided data as well as the need for long processing times that are commonly associated with machine-learned art-pieces. This study aims to show a proof of concept of the implementation of the described model.","PeriodicalId":404597,"journal":{"name":"American Journal of Artificial Intelligence","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114473744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Role of Artificial Intelligence (AI) in Condition Monitoring and Diagnostic Engineering Management (COMADEM): A Literature Survey 人工智能(AI)在状态监测与诊断工程管理(COMADEM)中的作用:文献综述
Pub Date : 2021-04-30 DOI: 10.11648/J.AJAI.20210501.12
B. Rao
Artificial Intelligence (AI) is playing a dominant role in the 21st century. Organizations have more data than ever, so it’s crucial to ensure that the analytics team should differentiate between Interesting Data and Useful Data. Amongst the important aspects in Machine Learning are “Feature Selection” and “Feature Extraction”. We are now witnessing the emerging fourth industrial revolution and a considerable number of evolutionary changes in machine learning methodologies to achieve operational excellence in operating and maintaining the industrial assets efficiently, reliably, safely and cost-effectively. AI techniques such as, knowledge based systems, expert systems, artificial neural networks, genetic algorithms, fuzzy logic, case-based reasoning and any combination of these techniques (hybrid systems), machine learning, biomimicry such as swarm intelligence and distributed intelligence. are widely used by multi-disciplinarians to solve a whole range of hitherto intractable problems associated with the proactive maintenance management of industrial assets. In this paper, an attempt is made to review the role of artificial intelligence in condition monitoring and diagnostic engineering management of modern engineering assets. The paper also highlights that unethical and immoral misuse of AI is dangerous.
人工智能(AI)在21世纪发挥着主导作用。组织拥有比以往更多的数据,因此确保分析团队区分有趣的数据和有用的数据至关重要。机器学习的重要方面包括“特征选择”和“特征提取”。我们正在见证新兴的第四次工业革命和机器学习方法的大量进化变化,以实现高效、可靠、安全和经济高效地运营和维护工业资产的卓越运营。人工智能技术,如基于知识的系统,专家系统,人工神经网络,遗传算法,模糊逻辑,基于案例的推理以及这些技术的任何组合(混合系统),机器学习,仿生学,如群体智能和分布式智能。被多学科学者广泛用于解决与工业资产的主动维护管理相关的一系列迄今为止难以解决的问题。本文试图综述人工智能在现代工程资产状态监测与诊断工程管理中的作用。该论文还强调,不道德和不道德地滥用人工智能是危险的。
{"title":"The Role of Artificial Intelligence (AI) in Condition Monitoring and Diagnostic Engineering Management (COMADEM): A Literature Survey","authors":"B. Rao","doi":"10.11648/J.AJAI.20210501.12","DOIUrl":"https://doi.org/10.11648/J.AJAI.20210501.12","url":null,"abstract":"Artificial Intelligence (AI) is playing a dominant role in the 21st century. Organizations have more data than ever, so it’s crucial to ensure that the analytics team should differentiate between Interesting Data and Useful Data. Amongst the important aspects in Machine Learning are “Feature Selection” and “Feature Extraction”. We are now witnessing the emerging fourth industrial revolution and a considerable number of evolutionary changes in machine learning methodologies to achieve operational excellence in operating and maintaining the industrial assets efficiently, reliably, safely and cost-effectively. AI techniques such as, knowledge based systems, expert systems, artificial neural networks, genetic algorithms, fuzzy logic, case-based reasoning and any combination of these techniques (hybrid systems), machine learning, biomimicry such as swarm intelligence and distributed intelligence. are widely used by multi-disciplinarians to solve a whole range of hitherto intractable problems associated with the proactive maintenance management of industrial assets. In this paper, an attempt is made to review the role of artificial intelligence in condition monitoring and diagnostic engineering management of modern engineering assets. The paper also highlights that unethical and immoral misuse of AI is dangerous.","PeriodicalId":404597,"journal":{"name":"American Journal of Artificial Intelligence","volume":"148 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114517233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Neural Network Scheme for Monetary Policy Rate Validation in Nigeria 尼日利亚货币政策利率验证的神经网络方案
Pub Date : 2020-12-11 DOI: 10.11648/J.AJAI.20200402.13
O. S. Ogundele, A. Ujunwa, Aminu Ado Mohammed
This research work is an exploratory study that tried to examine the viability of adopting artificial neural network (ANN), an aspect of machine learning in the analysis of monetary data for the design and validation of monetary policy from both optimistic and normative approach. Methodologically, the research is motivated by the work of [33] which used the Greenbook real time data of the U.S. Federal Reserve's in the analysis of monetary policy reaction functions in forecasting performance using ANN. Following the work on the adoption of this technique, we tried to develop a framework based on machine learning for policy rate forecasting by analysing macroeconomic data with the aim of guiding and aiding monetary authority in making monetary policy decisions. From the results, the ANN perform better in predicting the monetary policy rate compared to the linear models and the univariate process. It also revealed the non-linearity in the behavior of the monetary policy rate in Nigeria during the study period. While the work does not mean to advocate that machine will replace human-being in policy rate determination in the monetary policy-making process; we believe that the development and implementation of this system would support building effective prediction system which can be validated. The result from the designed system is expected to enhance credibility, confidence and transparency of central banks in making an independent decision (s) based on objective forecasts and implied analysis in setting policy through a well-structured comparison of results.
这项研究工作是一项探索性研究,试图从乐观和规范的角度来检验采用人工神经网络(ANN)的可行性,这是机器学习在货币数据分析中的一个方面,用于货币政策的设计和验证。在方法上,本研究的动力来自于[33]的工作,该工作使用了美联储的Greenbook实时数据来分析使用人工神经网络预测绩效中的货币政策反应函数。在采用这种技术之后,我们试图通过分析宏观经济数据来开发一个基于机器学习的政策利率预测框架,目的是指导和帮助货币当局做出货币政策决策。从结果来看,与线性模型和单变量过程相比,人工神经网络在预测货币政策利率方面表现更好。这也揭示了研究期间尼日利亚货币政策利率行为的非线性。虽然本文并不主张在货币政策制定过程中机器将取代人来决定政策利率;我们相信,该系统的开发和实施将有助于建立有效的预测系统,并可进行验证。所设计的系统的结果有望提高中央银行在制定政策时基于客观预测和隐含分析的独立决策的可信度、信心和透明度,并通过结构良好的结果比较。
{"title":"A Neural Network Scheme for Monetary Policy Rate Validation in Nigeria","authors":"O. S. Ogundele, A. Ujunwa, Aminu Ado Mohammed","doi":"10.11648/J.AJAI.20200402.13","DOIUrl":"https://doi.org/10.11648/J.AJAI.20200402.13","url":null,"abstract":"This research work is an exploratory study that tried to examine the viability of adopting artificial neural network (ANN), an aspect of machine learning in the analysis of monetary data for the design and validation of monetary policy from both optimistic and normative approach. Methodologically, the research is motivated by the work of [33] which used the Greenbook real time data of the U.S. Federal Reserve's in the analysis of monetary policy reaction functions in forecasting performance using ANN. Following the work on the adoption of this technique, we tried to develop a framework based on machine learning for policy rate forecasting by analysing macroeconomic data with the aim of guiding and aiding monetary authority in making monetary policy decisions. From the results, the ANN perform better in predicting the monetary policy rate compared to the linear models and the univariate process. It also revealed the non-linearity in the behavior of the monetary policy rate in Nigeria during the study period. While the work does not mean to advocate that machine will replace human-being in policy rate determination in the monetary policy-making process; we believe that the development and implementation of this system would support building effective prediction system which can be validated. The result from the designed system is expected to enhance credibility, confidence and transparency of central banks in making an independent decision (s) based on objective forecasts and implied analysis in setting policy through a well-structured comparison of results.","PeriodicalId":404597,"journal":{"name":"American Journal of Artificial Intelligence","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114536877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Real-Time Distracted Drivers Detection Using Deep Learning 基于深度学习的分心驾驶员实时检测
Pub Date : 2019-05-15 DOI: 10.11648/J.AJAI.20190301.11
Vlad Tămaș, V. Maties
In the last few years, the number of road accidents is increasing worldwide. According to the World Health Organization the most common cause behind these accidents is driver’s distraction and in many cases is caused by the use of a mobile phone. An attempt to develop a system for detecting distracted drivers and warn the responsible person against it was done. The system is a CNN based system that detects and identifies the cause of distraction. The base architecture for the CNN is VGG-16 and is modified for this task. Various activation functions (Leaky ReLU, DReLU, SELU) were used in order to investigate performance. Also, the performance of a lightweight attention module (squeeze-and-excitation) was evaluated. Experimental results show that the system outperforms earlier lightweight models in literature achieving an accuracy of 95.82%.
在过去的几年里,世界范围内的道路交通事故数量正在增加。据世界卫生组织称,这些事故背后最常见的原因是司机分心,在许多情况下是由使用手机引起的。开发一种检测分心司机并警告责任人的系统的尝试已经完成。该系统是一个基于CNN的系统,可以检测和识别分心的原因。CNN的基本架构是VGG-16,并为此任务进行了修改。使用了各种激活函数(Leaky ReLU, DReLU, SELU)来研究性能。此外,还对轻量级注意力模块(挤压激励)的性能进行了评估。实验结果表明,该系统优于文献中较早的轻量化模型,准确率达到95.82%。
{"title":"Real-Time Distracted Drivers Detection Using Deep Learning","authors":"Vlad Tămaș, V. Maties","doi":"10.11648/J.AJAI.20190301.11","DOIUrl":"https://doi.org/10.11648/J.AJAI.20190301.11","url":null,"abstract":"In the last few years, the number of road accidents is increasing worldwide. According to the World Health Organization the most common cause behind these accidents is driver’s distraction and in many cases is caused by the use of a mobile phone. An attempt to develop a system for detecting distracted drivers and warn the responsible person against it was done. The system is a CNN based system that detects and identifies the cause of distraction. The base architecture for the CNN is VGG-16 and is modified for this task. Various activation functions (Leaky ReLU, DReLU, SELU) were used in order to investigate performance. Also, the performance of a lightweight attention module (squeeze-and-excitation) was evaluated. Experimental results show that the system outperforms earlier lightweight models in literature achieving an accuracy of 95.82%.","PeriodicalId":404597,"journal":{"name":"American Journal of Artificial Intelligence","volume":"5 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120889907","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Modern Invisible Hazard of Urban Air Environment Pollution When Operating Vehicles That Causes Large Economic Damage 现代城市大气环境污染的无形危害,造成巨大的经济损失
Pub Date : 1900-01-01 DOI: 10.11648/j.ajai.20210502.14
V. Azarov, V. Kutenev
{"title":"Modern Invisible Hazard of Urban Air Environment Pollution When Operating Vehicles That Causes Large Economic Damage","authors":"V. Azarov, V. Kutenev","doi":"10.11648/j.ajai.20210502.14","DOIUrl":"https://doi.org/10.11648/j.ajai.20210502.14","url":null,"abstract":"","PeriodicalId":404597,"journal":{"name":"American Journal of Artificial Intelligence","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132827559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Implementation of Defense in Depth Strategy to Secure Industrial Control System in Critical Infrastructures 实施纵深防御战略保障关键基础设施工业控制系统安全
Pub Date : 1900-01-01 DOI: 10.11648/J.AJAI.20190302.11
Tschroub Abdelghani
The goal of this communication is to examine the implementation of defense in depth strategy to secure the industrial control systems (ICS) from threats, hackers, vandals and other ones that can damage the critical infrastructures (gas transportation network, power transmission network, power generation, power distribution grids, air traffic, petrochemical industries, rail traffic, military industries) and others big infrastructures that affect large number of persons and security of nations [1]. The defense in depth concept ensures the physical access protection of the infrastructure, using network access control system (NAC) and traditional security measures, and implements policies and procedures that deal training and cybersecurity awareness programs, risk assessment (analyzing and documenting), and the plan of security. The philosophy of defense in depth uses also the IT technologies in order to ensure separation and segmentations of the networks to the VLANs, demilitarized zones, VPN, using firewalls, switch and routers. The hardening of different systems installed like routers, firewalls, switches and other devices on the network such as SCADA servers is a very sensitive operation of defense in depth. The last important operations are monitoring and maintenance, the monitoring serve to detect and stop intrusions attempts before they can damage the control system with using detection and protection system (IDS/IPS), and the maintenance operations control system (soft and hard), schedule updating of anti-virus software on different devices installed in the network like (computers, SCADA servers, routers, switch and other devices). The defense-in-depth recommendations described in this document can decrease the risk of attacks can target industrial network architectures, like VLAN hopping, SQL injection on SCADA, IP spoofing and DoS (denies of service) and others ones. The risk of attacks can use a common point of access as point of failures (RTU, corporate VPNs, database links, wireless communication, and IT controlled communication equipment). The implementation strict of the defense in depth concept can avoid important damage of critical infrastructures such as loss of production, damage to plant, impact on reputation, impact of health, impact of safety, impact of environment and impact on nation’s security.
本次通信的目标是检查实施纵深防御战略,以确保工业控制系统(ICS)免受威胁,黑客,破坏者和其他可能破坏关键基础设施的威胁(天然气运输网络,输电网络,发电,配电网,空中交通,石化工业,铁路交通)。军事工业)和其他影响大量人员和国家安全的大型基础设施[1]。纵深防御概念通过使用网络访问控制系统(NAC)和传统安全措施,确保基础设施的物理访问保护,并实施处理培训和网络安全意识计划、风险评估(分析和记录)和安全计划的策略和程序。纵深防御的理念还使用IT技术,以确保网络的分离和分割到vlan,非军事区,VPN,使用防火墙,交换机和路由器。对安装在网络上的路由器、防火墙、交换机和其他设备(如SCADA服务器)的不同系统进行加固是一项非常敏感的纵深防御操作。最后一个重要的操作是监控和维护,监控服务于检测和保护系统(IDS/IPS),在入侵企图破坏控制系统之前检测和阻止入侵企图,维护控制系统(软、硬),定时更新安装在网络中的不同设备(计算机、SCADA服务器、路由器、交换机等设备)上的杀毒软件。本文档中描述的深度防御建议可以降低攻击的风险,这些攻击可以针对工业网络架构,如VLAN跳变,SCADA上的SQL注入,IP欺骗和DoS(拒绝服务)等。攻击的风险可以使用公共访问点作为故障点(RTU、公司vpn、数据库链接、无线通信和IT控制的通信设备)。实施严格的纵深防御理念,可以避免对生产的损失、对工厂的破坏、对声誉的影响、对健康的影响、对安全的影响、对环境的影响、对国家安全的影响等关键基础设施的重要损害。
{"title":"Implementation of Defense in Depth Strategy to Secure Industrial Control System in Critical Infrastructures","authors":"Tschroub Abdelghani","doi":"10.11648/J.AJAI.20190302.11","DOIUrl":"https://doi.org/10.11648/J.AJAI.20190302.11","url":null,"abstract":"The goal of this communication is to examine the implementation of defense in depth strategy to secure the industrial control systems (ICS) from threats, hackers, vandals and other ones that can damage the critical infrastructures (gas transportation network, power transmission network, power generation, power distribution grids, air traffic, petrochemical industries, rail traffic, military industries) and others big infrastructures that affect large number of persons and security of nations [1]. The defense in depth concept ensures the physical access protection of the infrastructure, using network access control system (NAC) and traditional security measures, and implements policies and procedures that deal training and cybersecurity awareness programs, risk assessment (analyzing and documenting), and the plan of security. The philosophy of defense in depth uses also the IT technologies in order to ensure separation and segmentations of the networks to the VLANs, demilitarized zones, VPN, using firewalls, switch and routers. The hardening of different systems installed like routers, firewalls, switches and other devices on the network such as SCADA servers is a very sensitive operation of defense in depth. The last important operations are monitoring and maintenance, the monitoring serve to detect and stop intrusions attempts before they can damage the control system with using detection and protection system (IDS/IPS), and the maintenance operations control system (soft and hard), schedule updating of anti-virus software on different devices installed in the network like (computers, SCADA servers, routers, switch and other devices). The defense-in-depth recommendations described in this document can decrease the risk of attacks can target industrial network architectures, like VLAN hopping, SQL injection on SCADA, IP spoofing and DoS (denies of service) and others ones. The risk of attacks can use a common point of access as point of failures (RTU, corporate VPNs, database links, wireless communication, and IT controlled communication equipment). The implementation strict of the defense in depth concept can avoid important damage of critical infrastructures such as loss of production, damage to plant, impact on reputation, impact of health, impact of safety, impact of environment and impact on nation’s security.","PeriodicalId":404597,"journal":{"name":"American Journal of Artificial Intelligence","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130395855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
期刊
American Journal of Artificial Intelligence
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1