首页 > 最新文献

Proceedings of the 2020 1st International Conference on Control, Robotics and Intelligent System最新文献

英文 中文
A Cloud Robotic Application Platform Design Based on the Microservices Architecture 基于微服务架构的云机器人应用平台设计
Binhuai Xu, Jing Bian
The paradigm of cloud robotics points out a direction for the future development of robots. By deploying robotic applications in the cloud, the workload and cost of local robots are greatly reduced. The rise of microservices and cloud-native technology provides conveniences and guarantees for the development and deployment of cloud applications. This paper proposes a cloud robotic application platform design based on microservices. With the help of Robot Operating System (ROS), we can use the existing rich and diverse robot software packages and deploy them in the cloud without extra modifications. Through the microservices architecture and container technology, robotic applications can be further decoupled in the cloud. That improves the flexibility and compatibility of the platform and embodies the core idea of microservices. In the end, we present a demonstration to cooperate with a simulated robot to complete the simultaneous localization and mapping (SLAM) task, which verifies the feasibility of our design.
云机器人的范式为机器人的未来发展指明了方向。通过在云中部署机器人应用程序,大大减少了本地机器人的工作量和成本。微服务和云原生技术的兴起为云应用的开发和部署提供了便利和保障。提出了一种基于微服务的云机器人应用平台设计。借助机器人操作系统(ROS),我们可以使用现有丰富多样的机器人软件包,无需额外修改即可将其部署在云中。通过微服务架构和容器技术,机器人应用程序可以在云中进一步解耦。这提高了平台的灵活性和兼容性,体现了微服务的核心思想。最后,我们给出了一个与仿真机器人合作完成同时定位和映射(SLAM)任务的演示,验证了我们设计的可行性。
{"title":"A Cloud Robotic Application Platform Design Based on the Microservices Architecture","authors":"Binhuai Xu, Jing Bian","doi":"10.1145/3437802.3437805","DOIUrl":"https://doi.org/10.1145/3437802.3437805","url":null,"abstract":"The paradigm of cloud robotics points out a direction for the future development of robots. By deploying robotic applications in the cloud, the workload and cost of local robots are greatly reduced. The rise of microservices and cloud-native technology provides conveniences and guarantees for the development and deployment of cloud applications. This paper proposes a cloud robotic application platform design based on microservices. With the help of Robot Operating System (ROS), we can use the existing rich and diverse robot software packages and deploy them in the cloud without extra modifications. Through the microservices architecture and container technology, robotic applications can be further decoupled in the cloud. That improves the flexibility and compatibility of the platform and embodies the core idea of microservices. In the end, we present a demonstration to cooperate with a simulated robot to complete the simultaneous localization and mapping (SLAM) task, which verifies the feasibility of our design.","PeriodicalId":429866,"journal":{"name":"Proceedings of the 2020 1st International Conference on Control, Robotics and Intelligent System","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122888565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Survey on Automatic Text Summarization and Transformer Models Applicability 自动文本摘要及变压器模型适用性研究
Guan Wang, I. Smetannikov, T. Man
This survey talks about Automatic Text Summarization. Information explosion, the problem caused by the rapid growth of the internet, increased more and more necessity of powerful summarizers. This article briefly reviews different methods and evaluation metrics. The main attention is on the applications of the latest trends, neural network-based, and pre-trained transformer language models. Pre-trained language models now are ruling the NLP field, as one of the main down-stream tasks, Automatic Text Summarization is quite an interdisciplinary task and requires more advanced techniques. But there is a limitation of input and context length results in that the whole article cannot be encoded completely. Motivated by the application of recurrent mechanism in Transformer-XL, we build an abstractive summarizer for long text and evaluate how well it performs on dataset CNN/Daily Mail. The model is under general sequence to sequence structure with a recurrent encoder and stacked Transformer decoder. The obtained ROUGE scores tell that the performance is good as expected.
本调查讨论了自动文本摘要。信息爆炸,互联网快速增长所带来的问题,增加了对功能强大的摘要器的需求。本文简要回顾了不同的方法和评价指标。主要关注的是最新趋势的应用,基于神经网络和预训练的转换语言模型。预训练语言模型在自然语言处理领域占据主导地位,而自动文本摘要作为其主要的下游任务之一,是一个跨学科的任务,需要更先进的技术。但是由于输入和上下文长度的限制,导致整篇文章不能完全编码。在Transformer-XL中应用循环机制的激励下,我们为长文本构建了一个抽象摘要器,并评估了它在CNN/Daily Mail数据集上的表现。该模型采用一般序对序结构,采用循环编码器和堆叠式变压器解码器。获得的ROUGE分数表明性能如预期的那样好。
{"title":"Survey on Automatic Text Summarization and Transformer Models Applicability","authors":"Guan Wang, I. Smetannikov, T. Man","doi":"10.1145/3437802.3437832","DOIUrl":"https://doi.org/10.1145/3437802.3437832","url":null,"abstract":"This survey talks about Automatic Text Summarization. Information explosion, the problem caused by the rapid growth of the internet, increased more and more necessity of powerful summarizers. This article briefly reviews different methods and evaluation metrics. The main attention is on the applications of the latest trends, neural network-based, and pre-trained transformer language models. Pre-trained language models now are ruling the NLP field, as one of the main down-stream tasks, Automatic Text Summarization is quite an interdisciplinary task and requires more advanced techniques. But there is a limitation of input and context length results in that the whole article cannot be encoded completely. Motivated by the application of recurrent mechanism in Transformer-XL, we build an abstractive summarizer for long text and evaluate how well it performs on dataset CNN/Daily Mail. The model is under general sequence to sequence structure with a recurrent encoder and stacked Transformer decoder. The obtained ROUGE scores tell that the performance is good as expected.","PeriodicalId":429866,"journal":{"name":"Proceedings of the 2020 1st International Conference on Control, Robotics and Intelligent System","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121258321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Security Vulnerability Assessment of Power IoT based on Business Security 基于业务安全的电力物联网安全漏洞评估
Jiaxuan Fei, Kai Chen, Qigui Yao, Qian Guo, Xiangqun Wang
Power Internet of Things is the application of IoT in smart power grid. Once attacked, it will cause huge losses. Therefore, it is necessary to conduct a security assessment to take defensive measures. However, the traditional vulnerability assessment methods of the power Internet of things mostly focus on the security of the system itself, without considering the impact on business economy and efficiency. This paper proposes a security vulnerability assessment method of power Internet of Things integrating business security. This method first analyzes the security risks faced by the power Internet of Things, and establishes its attack tree model. Then, each leaf node is rated from the three safety features, which are weighted by evaluation and calculation, and the activation probability of each leaf node is calculated. After that, considering the blind attack factor, the activation probability of all nodes in the model is calculated. Finally, the vulnerability of the system and the vulnerability sensitivity of each leaf node are obtained. According to the vulnerability sensitivity, measures are taken to protect the weak links of the system. The effectiveness of the proposed method is verified by experiments on SCADA (supervisory control and data acquisition) system in the power Internet of things.
电力物联网是物联网在智能电网中的应用。一旦受到攻击,将造成巨大损失。因此,有必要进行安全评估,采取防范措施。然而,传统的电力物联网脆弱性评估方法大多侧重于系统本身的安全性,而没有考虑对业务经济和效率的影响。本文提出了一种集成业务安全的电力物联网安全漏洞评估方法。该方法首先分析电力物联网面临的安全风险,建立其攻击树模型。然后,从三个安全特征中对每个叶节点进行评级,通过评估计算加权,计算每个叶节点的激活概率。然后,考虑盲攻击因素,计算模型中所有节点的激活概率。最后,得到系统的脆弱性和各叶节点的脆弱性敏感性。根据漏洞的敏感性,对系统的薄弱环节采取相应的保护措施。在电力物联网SCADA(监控与数据采集)系统上进行了实验,验证了该方法的有效性。
{"title":"Security Vulnerability Assessment of Power IoT based on Business Security","authors":"Jiaxuan Fei, Kai Chen, Qigui Yao, Qian Guo, Xiangqun Wang","doi":"10.1145/3437802.3437825","DOIUrl":"https://doi.org/10.1145/3437802.3437825","url":null,"abstract":"Power Internet of Things is the application of IoT in smart power grid. Once attacked, it will cause huge losses. Therefore, it is necessary to conduct a security assessment to take defensive measures. However, the traditional vulnerability assessment methods of the power Internet of things mostly focus on the security of the system itself, without considering the impact on business economy and efficiency. This paper proposes a security vulnerability assessment method of power Internet of Things integrating business security. This method first analyzes the security risks faced by the power Internet of Things, and establishes its attack tree model. Then, each leaf node is rated from the three safety features, which are weighted by evaluation and calculation, and the activation probability of each leaf node is calculated. After that, considering the blind attack factor, the activation probability of all nodes in the model is calculated. Finally, the vulnerability of the system and the vulnerability sensitivity of each leaf node are obtained. According to the vulnerability sensitivity, measures are taken to protect the weak links of the system. The effectiveness of the proposed method is verified by experiments on SCADA (supervisory control and data acquisition) system in the power Internet of things.","PeriodicalId":429866,"journal":{"name":"Proceedings of the 2020 1st International Conference on Control, Robotics and Intelligent System","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128881488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Recommender system for an academic supervisor with a matrix normalization approach 基于矩阵归一化方法的学术导师推荐系统
V. Kazakovtsev, Svyatoslav Oreshin, A. Serdyukov, Egor Krasheninnikov, S. Muravyov, Albert Bezvinnyi, Alexander Panfilov, Igor Glukhov, Y. Kaliberda, Daniil Masalskiy, Timofey Podolenchuk, Maksim Khlopotov
This article proposes a recommendation system for choosing an academic supervisor, based on an assessment of the similarity of student interests and the scientific achievements of the possible mentor from the university faculty. We used a new approach to calculate similarity with no creating co-authorship networks but using Scopus quality metrics. Each scientist is presented as a combination of his achievements in each field of science. As a normalization method, we used the cumulative distribution function of the logarithm of the weighted impacts of professors in the field. We compared different similarity measures and performed clustering to assess their adequacy and thus assess the quality of the system due to the impossibility of comparing the received recommendations with the data of the past years.
本文提出了一种基于评估学生兴趣和大学教师可能的导师的科学成就的相似性来选择学术导师的推荐系统。我们使用了一种新的方法来计算相似度,不需要创建合作作者网络,而是使用Scopus质量指标。每位科学家都是他在每个科学领域的成就的结合体。作为一种归一化方法,我们使用了该领域教授加权影响的对数的累积分布函数。由于无法将收到的建议与过去几年的数据进行比较,我们比较了不同的相似性度量并进行聚类以评估其充分性,从而评估系统的质量。
{"title":"Recommender system for an academic supervisor with a matrix normalization approach","authors":"V. Kazakovtsev, Svyatoslav Oreshin, A. Serdyukov, Egor Krasheninnikov, S. Muravyov, Albert Bezvinnyi, Alexander Panfilov, Igor Glukhov, Y. Kaliberda, Daniil Masalskiy, Timofey Podolenchuk, Maksim Khlopotov","doi":"10.1145/3437802.3437817","DOIUrl":"https://doi.org/10.1145/3437802.3437817","url":null,"abstract":"This article proposes a recommendation system for choosing an academic supervisor, based on an assessment of the similarity of student interests and the scientific achievements of the possible mentor from the university faculty. We used a new approach to calculate similarity with no creating co-authorship networks but using Scopus quality metrics. Each scientist is presented as a combination of his achievements in each field of science. As a normalization method, we used the cumulative distribution function of the logarithm of the weighted impacts of professors in the field. We compared different similarity measures and performed clustering to assess their adequacy and thus assess the quality of the system due to the impossibility of comparing the received recommendations with the data of the past years.","PeriodicalId":429866,"journal":{"name":"Proceedings of the 2020 1st International Conference on Control, Robotics and Intelligent System","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127844736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Wind Turbine Health Information Mining Based on SCADA Data 基于SCADA数据的风力发电机健康信息挖掘
Zhengnan Hou, Xiaoxiao Lv, Shengxian Zhuang
The working status of wind turbine can be obtained and fault warning can be given accurately, if the data information mining is efficient. However the existing SCADA data monitoring methods do not take the history and trend into account. A data information mining method based on LSSVR for wind turbine SCADA data is presented in this paper. First, LSSVR model of wind turbine with output power as output and other 30 parameters as input is built by using the SCADA data of wind turbine normal condition. Then, using the LSSVR model, the residual of output power prediction and actual value is obtained. At last, by analyzing the current information, historical information and trend information mined from the residual, wind turbine working status is concluded and early warning is given if necessary. Through cases of both chronic fault and acute fault, the accuracy and effectiveness of the proposed method is verified which means the maintenance cost of WT could be reduced by using the proposed method.
如果数据信息挖掘是有效的,就可以准确地获取风力发电机组的工作状态并给出故障预警。但是现有的SCADA数据监测方法没有考虑历史和趋势。提出了一种基于LSSVR的风电SCADA数据信息挖掘方法。首先,利用风力机正常状态SCADA数据,建立以输出功率为输出,其他30个参数为输入的风力机LSSVR模型。然后,利用LSSVR模型,得到输出功率预测值与实测值的残差。最后,通过对残差中挖掘的当前信息、历史信息和趋势信息进行分析,得出风力机的工作状态,并在必要时进行预警。通过慢性故障和急性故障实例验证了该方法的准确性和有效性,表明该方法可以降低小波变换的维护成本。
{"title":"Wind Turbine Health Information Mining Based on SCADA Data","authors":"Zhengnan Hou, Xiaoxiao Lv, Shengxian Zhuang","doi":"10.1145/3437802.3437815","DOIUrl":"https://doi.org/10.1145/3437802.3437815","url":null,"abstract":"The working status of wind turbine can be obtained and fault warning can be given accurately, if the data information mining is efficient. However the existing SCADA data monitoring methods do not take the history and trend into account. A data information mining method based on LSSVR for wind turbine SCADA data is presented in this paper. First, LSSVR model of wind turbine with output power as output and other 30 parameters as input is built by using the SCADA data of wind turbine normal condition. Then, using the LSSVR model, the residual of output power prediction and actual value is obtained. At last, by analyzing the current information, historical information and trend information mined from the residual, wind turbine working status is concluded and early warning is given if necessary. Through cases of both chronic fault and acute fault, the accuracy and effectiveness of the proposed method is verified which means the maintenance cost of WT could be reduced by using the proposed method.","PeriodicalId":429866,"journal":{"name":"Proceedings of the 2020 1st International Conference on Control, Robotics and Intelligent System","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124118680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adversarial DGA Domain Examples Generation and Detection 对抗DGA域示例生成与检测
Heng Cao, Chundong Wang, Long Huang, Xiaochun Cheng, Haoran Fu
Botnets have long relied on the Domain Generation Algorithm (DGA) to survive to this day. The detection rate of the DGA detection methods based on machine learning is already high. However, the models trained by the existing data sets sometimes are blind to new variant domains.To mitigate such problem, a method based on generation adversarial networks (GAN) called DnGAN is proposed to generate adversarial DGA examples in this paper. Experiment results show that the adversarial examples can effectively escape the detection of multiple detectors. And by using these adversarial examples as training data can effectively enhance the ability of the detector to identify DGA families that have not been seen before.
长期以来,僵尸网络一直依赖领域生成算法(DGA)生存至今。基于机器学习的DGA检测方法的检出率已经很高。然而,由现有数据集训练的模型有时对新的变异域是盲目的。为了解决这一问题,本文提出了一种基于生成对抗网络(generative adversarial networks, GAN)的DnGAN方法来生成对抗的DGA示例。实验结果表明,对抗样例可以有效地逃避多个检测器的检测。通过使用这些对抗样本作为训练数据,可以有效地增强检测器识别以前未见过的DGA族的能力。
{"title":"Adversarial DGA Domain Examples Generation and Detection","authors":"Heng Cao, Chundong Wang, Long Huang, Xiaochun Cheng, Haoran Fu","doi":"10.1145/3437802.3437836","DOIUrl":"https://doi.org/10.1145/3437802.3437836","url":null,"abstract":"Botnets have long relied on the Domain Generation Algorithm (DGA) to survive to this day. The detection rate of the DGA detection methods based on machine learning is already high. However, the models trained by the existing data sets sometimes are blind to new variant domains.To mitigate such problem, a method based on generation adversarial networks (GAN) called DnGAN is proposed to generate adversarial DGA examples in this paper. Experiment results show that the adversarial examples can effectively escape the detection of multiple detectors. And by using these adversarial examples as training data can effectively enhance the ability of the detector to identify DGA families that have not been seen before.","PeriodicalId":429866,"journal":{"name":"Proceedings of the 2020 1st International Conference on Control, Robotics and Intelligent System","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114527144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Implementing a Machine Learning Approach to Predicting Students’ Academic Outcomes 实现机器学习方法来预测学生的学业成绩
Svyatoslav Oreshin, A. Filchenkov, Polina Petrusha, Egor Krasheninnikov, Alexander Panfilov, Igor Glukhov, Y. Kaliberda, Daniil Masalskiy, A. Serdyukov, V. Kazakovtsev, Maksim Khlopotov, Timofey Podolenchuk, I. Smetannikov, D. Kozlova
This research is dedicated to the problem of transforming ”linear” educational systems of higher education institutions into a new paradigm of person-centered, blended and individual education. This paper investigates role, application, and challenges of applying AI to predict the academic performance traditional of students: dropouts, GPA, publication activity and other indicators to decrease dropouts and make the learning process more personalized and adaptive. In the first part, we overview the process of data mining using internal university’s resources (LMS and other systems) and open source data from students’ social networks. Such an aggregation allows describing each student by socio-demographic and psychometric features. Further, we demonstrate how we can dynamically monitor students’ activities during the learning process to supplement the resulting features. In the second part of our research, we propose various static and dynamic targets for predictive models and demonstrate the results of predictions and comparisons of several predictive models. The research is based on the information on data processing of more than 20000 students in 2013-2019.
本研究致力于将高等教育机构的“线性”教育系统转变为以人为本、混合和个性化教育的新范式。本文研究了应用人工智能预测学生传统学业表现的作用、应用和挑战:辍学、GPA、发表活动等指标,以减少辍学,使学习过程更具个性化和适应性。在第一部分中,我们概述了利用大学内部资源(LMS和其他系统)和来自学生社交网络的开源数据进行数据挖掘的过程。这样的汇总可以通过社会人口统计和心理特征来描述每个学生。此外,我们还演示了如何在学习过程中动态监控学生的活动,以补充生成的功能。在研究的第二部分,我们提出了预测模型的各种静态和动态目标,并展示了几种预测模型的预测结果和比较。该研究基于2013-2019年2万多名学生的数据处理信息。
{"title":"Implementing a Machine Learning Approach to Predicting Students’ Academic Outcomes","authors":"Svyatoslav Oreshin, A. Filchenkov, Polina Petrusha, Egor Krasheninnikov, Alexander Panfilov, Igor Glukhov, Y. Kaliberda, Daniil Masalskiy, A. Serdyukov, V. Kazakovtsev, Maksim Khlopotov, Timofey Podolenchuk, I. Smetannikov, D. Kozlova","doi":"10.1145/3437802.3437816","DOIUrl":"https://doi.org/10.1145/3437802.3437816","url":null,"abstract":"This research is dedicated to the problem of transforming ”linear” educational systems of higher education institutions into a new paradigm of person-centered, blended and individual education. This paper investigates role, application, and challenges of applying AI to predict the academic performance traditional of students: dropouts, GPA, publication activity and other indicators to decrease dropouts and make the learning process more personalized and adaptive. In the first part, we overview the process of data mining using internal university’s resources (LMS and other systems) and open source data from students’ social networks. Such an aggregation allows describing each student by socio-demographic and psychometric features. Further, we demonstrate how we can dynamically monitor students’ activities during the learning process to supplement the resulting features. In the second part of our research, we propose various static and dynamic targets for predictive models and demonstrate the results of predictions and comparisons of several predictive models. The research is based on the information on data processing of more than 20000 students in 2013-2019.","PeriodicalId":429866,"journal":{"name":"Proceedings of the 2020 1st International Conference on Control, Robotics and Intelligent System","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130565967","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Numerical Estimation of Network Traffic Failure Based on Probabilistic Approximation Methods: To what extent the network traffic failure can be predicted? 基于概率逼近法的网络流量故障数值估计:网络流量故障在多大程度上可以预测?
Shigeo Akashi, Yao Tong
As for the modern network traffic circulation which has been realized by the Internet, it is one thing to discuss the problem asking how to detect where the network traffic failure has occurred, and quite another to discuss the problem asking how to predict and how to estimate the frequency indicating numerically how often the network traffic failure occurs, because the former problem, which is called the network traffic failure detection problem, and the latter problem, which is called the network traffic failure estimation problem, are investigated with the network skills based on the statistical methods and the network skills based on the probabilistic methods, respectively. Moreover, since it is one thing to locate the network traffic failure on the network segments and quite another to predict them beforehand, it is important for us to apply not only statistical methods but also probabilistic ones for the solutions to these problems.
对于由Internet实现的现代网络流量流通,讨论如何检测网络流量故障发生的位置是一回事,讨论如何预测和估计数字表示网络流量故障发生频率的问题是另一回事,因为前一个问题称为网络流量故障检测问题,后一个问题称为网络流量故障检测问题。本文分别用基于统计方法的网络技能和基于概率方法的网络技能对网络流量故障估计问题进行了研究。此外,由于在网段上定位网络流量故障是一回事,而事先预测又是另一回事,因此我们不仅要应用统计方法,还要应用概率方法来解决这些问题,这一点很重要。
{"title":"Numerical Estimation of Network Traffic Failure Based on Probabilistic Approximation Methods: To what extent the network traffic failure can be predicted?","authors":"Shigeo Akashi, Yao Tong","doi":"10.1145/3437802.3437838","DOIUrl":"https://doi.org/10.1145/3437802.3437838","url":null,"abstract":"As for the modern network traffic circulation which has been realized by the Internet, it is one thing to discuss the problem asking how to detect where the network traffic failure has occurred, and quite another to discuss the problem asking how to predict and how to estimate the frequency indicating numerically how often the network traffic failure occurs, because the former problem, which is called the network traffic failure detection problem, and the latter problem, which is called the network traffic failure estimation problem, are investigated with the network skills based on the statistical methods and the network skills based on the probabilistic methods, respectively. Moreover, since it is one thing to locate the network traffic failure on the network segments and quite another to predict them beforehand, it is important for us to apply not only statistical methods but also probabilistic ones for the solutions to these problems.","PeriodicalId":429866,"journal":{"name":"Proceedings of the 2020 1st International Conference on Control, Robotics and Intelligent System","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114574270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An improved text classification method based on convolutional neural networks 一种基于卷积神经网络的改进文本分类方法
Yan Yan, Wenya Li, Guanhua Chen, Wei Liu
To improve the classification accuracy of complaint work order text data, a deep learning-based classification method is designed. The word vector of this paper uses word2vec. Although word2vec represents the semantic richness of the words, it ignores the semantic information of the local words of the sentence. The word vector using a combination of n-gram and word2vec is both semantically rich and takes into account the local word order. In terms of the classification model, a combination of attention and CNN is used to consider both global and local features. After several sets of comparative experiments, the proposed algorithm for text classification on a company's complaint text effectively improves the accuracy rate. The accuracy rate is better than other algorithms reaching more than 90%.
为了提高投诉工单文本数据的分类精度,设计了一种基于深度学习的分类方法。本文的词向量使用word2vec。虽然word2vec代表了单词的语义丰富度,但它忽略了句子局部单词的语义信息。使用n-gram和word2vec组合的词向量既具有丰富的语义,又考虑了局部词序。在分类模型方面,采用了注意力与CNN相结合的方法,同时考虑了全局和局部特征。经过几组对比实验,本文提出的算法对某公司投诉文本进行分类,有效提高了分类准确率。准确率优于其他算法,达到90%以上。
{"title":"An improved text classification method based on convolutional neural networks","authors":"Yan Yan, Wenya Li, Guanhua Chen, Wei Liu","doi":"10.1145/3437802.3437833","DOIUrl":"https://doi.org/10.1145/3437802.3437833","url":null,"abstract":"To improve the classification accuracy of complaint work order text data, a deep learning-based classification method is designed. The word vector of this paper uses word2vec. Although word2vec represents the semantic richness of the words, it ignores the semantic information of the local words of the sentence. The word vector using a combination of n-gram and word2vec is both semantically rich and takes into account the local word order. In terms of the classification model, a combination of attention and CNN is used to consider both global and local features. After several sets of comparative experiments, the proposed algorithm for text classification on a company's complaint text effectively improves the accuracy rate. The accuracy rate is better than other algorithms reaching more than 90%.","PeriodicalId":429866,"journal":{"name":"Proceedings of the 2020 1st International Conference on Control, Robotics and Intelligent System","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117313873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Text Classification Method with Combination of Fuzzy Relation and Feature Distribution Variance 模糊关系与特征分布方差相结合的文本分类方法
Wei Liu, Renze Xiong, Ning N. Cheng, Yiming Y. Sun
To accurately express the fuzzy relation between word features and texts, and fuzzy relation between word features and categories respectively. A text classification method is proposed based on Fuzzy Relation and Feature Distribution Variance (FRFDV). This method firstly performs feature reduction and category feature word extraction according to the distribution of features in inter-category and intra-category. Then the method defines the word feature set, test text set and category set as fuzzy sets. Next, each text and category are represented respectively by defining the membership function of the word feature set to the test text set and the category set. When using word feature sets to represent categories, pay attention to the membership degree of features to categories and their distribution between categories; when using feature sets to represent test texts, give categorical feature words and non-categorical feature words with different weights. Finally, the fuzzy set correlation formula is used to calculate the correlation between the text and each category, and the category with the largest correlation is the category of the text. Comparing with the XGBOOST [Fang, 2020, Gong and Wang, 2018] algorithm and SVM algorithm, it is proved that the text classification method based on FRFDV is feasible. The accuracy of the results is higher by 2 % and 4 % respectively.
准确表达词特征与文本的模糊关系、词特征与类别的模糊关系。提出一种基于模糊关系和特征分布方差(FRFDV)的文本分类方法。该方法首先根据特征在类别间和类别内的分布进行特征约简和类别特征词提取。然后将词特征集、测试文本集和类别集定义为模糊集。接下来,通过定义单词特征集对测试文本集和类别集的隶属函数来分别表示每个文本和类别。在使用词特征集表示类别时,要注意特征与类别的隶属度及其在类别之间的分布;在使用特征集表示测试文本时,给出不同权重的分类特征词和非分类特征词。最后,利用模糊集关联公式计算文本与各类别之间的关联,关联度最大的类别即为该文本所属的类别。对比XGBOOST [Fang, 2020, Gong and Wang, 2018]算法和SVM算法,证明了基于FRFDV的文本分类方法是可行的。结果的准确度分别提高了2%和4%。
{"title":"Text Classification Method with Combination of Fuzzy Relation and Feature Distribution Variance","authors":"Wei Liu, Renze Xiong, Ning N. Cheng, Yiming Y. Sun","doi":"10.1145/3437802.3437829","DOIUrl":"https://doi.org/10.1145/3437802.3437829","url":null,"abstract":"To accurately express the fuzzy relation between word features and texts, and fuzzy relation between word features and categories respectively. A text classification method is proposed based on Fuzzy Relation and Feature Distribution Variance (FRFDV). This method firstly performs feature reduction and category feature word extraction according to the distribution of features in inter-category and intra-category. Then the method defines the word feature set, test text set and category set as fuzzy sets. Next, each text and category are represented respectively by defining the membership function of the word feature set to the test text set and the category set. When using word feature sets to represent categories, pay attention to the membership degree of features to categories and their distribution between categories; when using feature sets to represent test texts, give categorical feature words and non-categorical feature words with different weights. Finally, the fuzzy set correlation formula is used to calculate the correlation between the text and each category, and the category with the largest correlation is the category of the text. Comparing with the XGBOOST [Fang, 2020, Gong and Wang, 2018] algorithm and SVM algorithm, it is proved that the text classification method based on FRFDV is feasible. The accuracy of the results is higher by 2 % and 4 % respectively.","PeriodicalId":429866,"journal":{"name":"Proceedings of the 2020 1st International Conference on Control, Robotics and Intelligent System","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120955800","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Proceedings of the 2020 1st International Conference on Control, Robotics and Intelligent System
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1