首页 > 最新文献

Open Computer Science最新文献

英文 中文
Application of artificial intelligence-based style transfer algorithm in animation special effects design 基于人工智能的风格转换算法在动画特效设计中的应用
IF 1.5 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2023-01-01 DOI: 10.1515/comp-2022-0255
Shan Li
Abstract Today, the rapid development of computer technology changes with each passing day. In the computer field, computer animation has rapidly grown from a new thing to a leading industry, and animation has entered the era of three-dimensional animation and computer graphics. This article aims to study the application of artificial intelligence-based style transfer algorithm in animation special effects design. It proposes methods such as adaptive loss function, style transfer process, animation special effect design, etc., and conducts related experiments on the application of style transfer algorithm in animation special effect design in the article. The experimental results show that the style transfer algorithm based on AI can effectively improve the effect of animation special effects. In this survey, more than 80% of the people are satisfied with the animation special effects design based on the style transfer algorithm.
在计算机技术飞速发展的今天,日新月异。在计算机领域,计算机动画从一个新生事物迅速成长为主导产业,动画进入了三维动画和计算机图形时代。本文旨在研究基于人工智能的风格迁移算法在动画特效设计中的应用。本文提出了自适应损失函数、风格转移过程、动画特效设计等方法,并对风格转移算法在动画特效设计中的应用进行了相关实验。实验结果表明,基于AI的风格迁移算法可以有效地提高动画特效的效果。在本次调查中,超过80%的人对基于风格迁移算法的动画特效设计感到满意。
{"title":"Application of artificial intelligence-based style transfer algorithm in animation special effects design","authors":"Shan Li","doi":"10.1515/comp-2022-0255","DOIUrl":"https://doi.org/10.1515/comp-2022-0255","url":null,"abstract":"Abstract Today, the rapid development of computer technology changes with each passing day. In the computer field, computer animation has rapidly grown from a new thing to a leading industry, and animation has entered the era of three-dimensional animation and computer graphics. This article aims to study the application of artificial intelligence-based style transfer algorithm in animation special effects design. It proposes methods such as adaptive loss function, style transfer process, animation special effect design, etc., and conducts related experiments on the application of style transfer algorithm in animation special effect design in the article. The experimental results show that the style transfer algorithm based on AI can effectively improve the effect of animation special effects. In this survey, more than 80% of the people are satisfied with the animation special effects design based on the style transfer algorithm.","PeriodicalId":43014,"journal":{"name":"Open Computer Science","volume":" ","pages":""},"PeriodicalIF":1.5,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45177858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
UAV patrol path planning based on machine vision and multi-sensor fusion 基于机器视觉和多传感器融合的无人机巡逻路径规划
IF 1.5 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2023-01-01 DOI: 10.1515/comp-2022-0276
Xu Chen
Abstract With the rapid development of unmanned aerial vehicle (UAV) technology, there are more and more fields of UAV application. This research mainly discusses the UAV patrol path planning based on machine vision and multi-sensor fusion. This article studies how to apply ultrasonic, a classic ranging sensor, to obstacle avoidance of UAVs. The designed ultrasonic obstacle avoidance system is a complete set of hardware and software systems. The hardware part consists of a forward ultrasonic module and a central signal processing module. Among them, a single-axis stabilization gimbal is designed for the forward ultrasonic module, which decouples the attitude angle of the UAV and the pitch detection angle of the ultrasonic sensor. In the central signal processing module, Kalman filtering is performed on the ultrasonic data in the four directions of front, rear, left, right, and left, and the obstacle avoidance control signal is sent to the flight controller according to the filtered sensor data. At the same time, a human–computer interaction interface is also designed to set various parameters of the obstacle avoidance system. For the route planning method of the tower, the routine steps are used to inspect the tower with a single-circuit line, and the specific targets are the insulator string, the ground wire, and the conductor. In this study, the average statistical result of the straight-line distance of the UAV patrolling 100 m is 99.80 m, and the error is only 0.2%. The fusion obstacle avoidance control method based on machine vision is suitable for the engineering application of UAV perception obstacle avoidance. The obstacle avoidance method adopted in this article can be extended to most flight control platforms, and it is a control method with broad application prospects.
摘要随着无人机技术的飞速发展,无人机的应用领域越来越多。本文主要研究了基于机器视觉和多传感器融合的无人机巡逻路径规划。本文研究了如何将超声波这一经典测距传感器应用于无人机避障。所设计的超声波避障系统是一套完整的硬件和软件系统。硬件部分由正向超声模块和中央信号处理模块组成。其中,前向超声模块设计了单轴稳定框架,实现了无人机姿态角与超声传感器俯仰探测角的解耦。在中央信号处理模块中,对前、后、左、右、左四个方向的超声波数据进行卡尔曼滤波,并根据滤波后的传感器数据向飞行控制器发送避障控制信号。同时,设计了人机交互界面,对避障系统的各项参数进行设置。铁塔线路规划方法采用常规步骤,采用单线检查铁塔,具体检查对象为绝缘子串、地线和导体。在本研究中,无人机巡航100 m直线距离的平均统计结果为99.80 m,误差仅为0.2%。基于机器视觉的融合避障控制方法适合于无人机感知避障的工程应用。本文采用的避障方法可以推广到大多数飞控平台,是一种具有广阔应用前景的控制方法。
{"title":"UAV patrol path planning based on machine vision and multi-sensor fusion","authors":"Xu Chen","doi":"10.1515/comp-2022-0276","DOIUrl":"https://doi.org/10.1515/comp-2022-0276","url":null,"abstract":"Abstract With the rapid development of unmanned aerial vehicle (UAV) technology, there are more and more fields of UAV application. This research mainly discusses the UAV patrol path planning based on machine vision and multi-sensor fusion. This article studies how to apply ultrasonic, a classic ranging sensor, to obstacle avoidance of UAVs. The designed ultrasonic obstacle avoidance system is a complete set of hardware and software systems. The hardware part consists of a forward ultrasonic module and a central signal processing module. Among them, a single-axis stabilization gimbal is designed for the forward ultrasonic module, which decouples the attitude angle of the UAV and the pitch detection angle of the ultrasonic sensor. In the central signal processing module, Kalman filtering is performed on the ultrasonic data in the four directions of front, rear, left, right, and left, and the obstacle avoidance control signal is sent to the flight controller according to the filtered sensor data. At the same time, a human–computer interaction interface is also designed to set various parameters of the obstacle avoidance system. For the route planning method of the tower, the routine steps are used to inspect the tower with a single-circuit line, and the specific targets are the insulator string, the ground wire, and the conductor. In this study, the average statistical result of the straight-line distance of the UAV patrolling 100 m is 99.80 m, and the error is only 0.2%. The fusion obstacle avoidance control method based on machine vision is suitable for the engineering application of UAV perception obstacle avoidance. The obstacle avoidance method adopted in this article can be extended to most flight control platforms, and it is a control method with broad application prospects.","PeriodicalId":43014,"journal":{"name":"Open Computer Science","volume":" ","pages":""},"PeriodicalIF":1.5,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47040047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Zebra-crossing detection based on cascaded Hough transform principle and vanishing point characteristics 基于级联霍夫变换原理和消失点特征的斑马交叉检测
IF 1.5 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2023-01-01 DOI: 10.1515/comp-2022-0260
Chen Zhu, Dong-yuan Ge, Xi-fan Yao, Wenjiang Xiang, Jian Li, Yong-Xiang Li
Abstract In this study, a zebra-crossing detection method based on cascaded Hough transform (CHT) and vanishing point (VP) characteristics is proposed. In this method, the principle of detecting straight lines in the parallel coordinate system is applied to zebra-crossing detection. Each edge point of the image obtained by edge detection is represented in the parallel coordinate system to find the VP. Using the VP coordinate as the judgment condition, those straight lines that do not pass through the VP but meet the straight-line condition are excluded to obtain the straight lines passing through both sides of the zebra crossing, and finally fit the edge points on the straight line, and get the zebra-crossing fitting line segment. Experiments show that CHT has obvious advantages in detection accuracy and speed compared with the Hough transform. At the same time, VPs can be used to eliminate interference segments, which provide support for the accuracy of zebra-crossing detection. This method can get zebra-crossing location information without using region of interest extraction, which also provides a reference method for road detection in some specific cases.
摘要本文提出了一种基于级联霍夫变换(CHT)和消失点(VP)特性的斑马线检测方法。该方法将平行坐标系直线检测原理应用于斑马线检测。通过边缘检测获得的图像的每个边缘点在平行坐标系中表示,以找到VP。以VP坐标为判断条件,排除那些不通过VP但满足直线条件的直线,得到通过斑马线两侧的直线,最后拟合直线上的边缘点,得到斑马线拟合线段。实验表明,与霍夫变换相比,CHT在检测精度和速度上具有明显优势。同时,VP可以用于消除干扰段,这为斑马线检测的准确性提供了支持。该方法可以在不使用感兴趣区域提取的情况下获得斑马线位置信息,也为某些特定情况下的道路检测提供了参考方法。
{"title":"Zebra-crossing detection based on cascaded Hough transform principle and vanishing point characteristics","authors":"Chen Zhu, Dong-yuan Ge, Xi-fan Yao, Wenjiang Xiang, Jian Li, Yong-Xiang Li","doi":"10.1515/comp-2022-0260","DOIUrl":"https://doi.org/10.1515/comp-2022-0260","url":null,"abstract":"Abstract In this study, a zebra-crossing detection method based on cascaded Hough transform (CHT) and vanishing point (VP) characteristics is proposed. In this method, the principle of detecting straight lines in the parallel coordinate system is applied to zebra-crossing detection. Each edge point of the image obtained by edge detection is represented in the parallel coordinate system to find the VP. Using the VP coordinate as the judgment condition, those straight lines that do not pass through the VP but meet the straight-line condition are excluded to obtain the straight lines passing through both sides of the zebra crossing, and finally fit the edge points on the straight line, and get the zebra-crossing fitting line segment. Experiments show that CHT has obvious advantages in detection accuracy and speed compared with the Hough transform. At the same time, VPs can be used to eliminate interference segments, which provide support for the accuracy of zebra-crossing detection. This method can get zebra-crossing location information without using region of interest extraction, which also provides a reference method for road detection in some specific cases.","PeriodicalId":43014,"journal":{"name":"Open Computer Science","volume":" ","pages":""},"PeriodicalIF":1.5,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46117175","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Intelligent cluster construction of internet financial security protection system in banking industry 银行业互联网金融安全保护体系的智能集群构建
IF 1.5 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2023-01-01 DOI: 10.1515/comp-2022-0268
Yanzhao Wang
Abstract As the rapid advancement of information security company is developing quickly and the technology including big information, big computer, large cloud, and artificial intelligence are being widely used, network security has entered a new era. While ushering in huge development opportunities, it also faces severe tests. Network security is a major issue related to the comprehensive realization of a well-off society and national security, and has risen to the national strategic level. The current financial industry network security construction mainly focuses on team, process construction, and the research and development of individual tools and equipment. It lacks system research and implementation guidelines for defense technology construction based on industry IT characteristics. At the same time, there is also a lack of objective and unified measurement and evaluation standards for enterprise security defense capabilities, which restricts the improvement of cybersecurity capabilities in the financial industry to a certain extent. In terms of actual combat exercises, in various actual combat exercises over the years, the technical architecture of the bank’s network security defense has withstood the test of high-intensity confrontation. The defense process achieved zero deductions, and stood out among the participating defending teams through traceability and countermeasures, which effectively improved the network security large-scale group operations and security protection capabilities. The effectiveness of the technical architecture design is verified in actual combat, which shows that the control of the bank’s internet financial security protection system is effective. With digital computing, all banking transactions are fully automatically implemented and the bank’s clientele is systematically self-managed. It predicts that using this system, the speed can be increased by 98% and the accuracy can be increased by 12%.
摘要随着信息安全公司的快速发展,包括大信息、大计算机、大云和人工智能在内的技术得到广泛应用,网络安全进入了一个新的时代。在迎来巨大发展机遇的同时,也面临严峻考验。网络安全是关系全面实现小康社会和国家安全的重大问题,已上升到国家战略高度。当前金融行业的网络安全建设主要集中在团队建设、流程建设、个人工具设备研发等方面。缺乏基于行业It特点的国防技术建设的系统研究和实施指南。同时,企业安全防御能力也缺乏客观统一的衡量和评估标准,这在一定程度上制约了金融业网络安全能力的提升。在实战演练方面,在历年的各项实战演练中,该行网络安全防御的技术架构经受住了高强度对抗的考验。防御过程实现了零扣减,并通过溯源和应对措施在参与防御团队中脱颖而出,有效提升了网络安全大规模群体作战和安全防护能力。该技术架构设计的有效性在实战中得到了验证,表明对银行互联网金融安全保护系统的控制是有效的。有了数字计算,所有银行交易都可以完全自动实现,银行客户也可以系统地自我管理。预测使用该系统,速度可提高98%,精度可提高12%。
{"title":"Intelligent cluster construction of internet financial security protection system in banking industry","authors":"Yanzhao Wang","doi":"10.1515/comp-2022-0268","DOIUrl":"https://doi.org/10.1515/comp-2022-0268","url":null,"abstract":"Abstract As the rapid advancement of information security company is developing quickly and the technology including big information, big computer, large cloud, and artificial intelligence are being widely used, network security has entered a new era. While ushering in huge development opportunities, it also faces severe tests. Network security is a major issue related to the comprehensive realization of a well-off society and national security, and has risen to the national strategic level. The current financial industry network security construction mainly focuses on team, process construction, and the research and development of individual tools and equipment. It lacks system research and implementation guidelines for defense technology construction based on industry IT characteristics. At the same time, there is also a lack of objective and unified measurement and evaluation standards for enterprise security defense capabilities, which restricts the improvement of cybersecurity capabilities in the financial industry to a certain extent. In terms of actual combat exercises, in various actual combat exercises over the years, the technical architecture of the bank’s network security defense has withstood the test of high-intensity confrontation. The defense process achieved zero deductions, and stood out among the participating defending teams through traceability and countermeasures, which effectively improved the network security large-scale group operations and security protection capabilities. The effectiveness of the technical architecture design is verified in actual combat, which shows that the control of the bank’s internet financial security protection system is effective. With digital computing, all banking transactions are fully automatically implemented and the bank’s clientele is systematically self-managed. It predicts that using this system, the speed can be increased by 98% and the accuracy can be increased by 12%.","PeriodicalId":43014,"journal":{"name":"Open Computer Science","volume":" ","pages":""},"PeriodicalIF":1.5,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43515390","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Application of SSD network algorithm in panoramic video image vehicle detection system SSD网络算法在全景视频图像车辆检测系统中的应用
IF 1.5 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2023-01-01 DOI: 10.1515/comp-2022-0270
Tao Jiang
Abstract Due to the popularity of high-performance cameras and the development of computer video pattern recognition technology, intelligent video monitoring technology is widely used in all aspects of social life. It mainly includes the following: industrial control system uses video monitoring technology for remote monitoring and comprehensive monitoring; in addition, intelligent video monitoring technology is also widely used in the agricultural field, for example, farm administrators can view the activities of animals in real time through smart phones, and agricultural experts can predict future weather changes according to the growth of crops. In the implementation of intelligent monitoring system, automatic detection of vehicles in images is an important topic. The construction of China’s Intelligent Transportation System started late, especially in video traffic detection. Although there are many related studies on video traffic detection algorithms, these algorithms usually only analyze and process information from a single sensor. This article describes the application of the single-shot detector (SSD) network algorithm in a panoramic video image vehicle detection system. The purpose of this article is to investigate the effectiveness of the SSD network algorithm in a panoramic video image vehicle detection system. The experimental results show that the detection accuracy of a single convolutional neural network (CNN) algorithm is only 0.7554, the recall rate is 0.9052, and the comprehensive detection accuracy is 0.8235. The detection accuracy of SSD network algorithm is 0.8720, recall rate is 0.9397, and the comprehensive detection accuracy is 0.9046, which is higher than that of single CNN algorithm. Thus, the proposed SSD network algorithm is compared with a single convolution network algorithm. It is more suitable for vehicle detection, and it plays an important role in panoramic video image vehicle detection.
由于高性能摄像机的普及和计算机视频模式识别技术的发展,智能视频监控技术被广泛应用于社会生活的各个方面。主要包括:工业控制系统采用视频监控技术进行远程监控和综合监控;此外,智能视频监控技术也被广泛应用于农业领域,例如,农场管理员可以通过智能手机实时查看动物的活动情况,农业专家可以根据农作物的生长情况预测未来的天气变化。在智能监控系统的实施中,车辆图像的自动检测是一个重要的课题。中国智能交通系统的建设起步较晚,尤其是在视频交通检测方面。虽然有很多视频流量检测算法的相关研究,但这些算法通常只分析和处理来自单个传感器的信息。本文介绍了单镜头检测器(SSD)网络算法在全景视频图像车辆检测系统中的应用。本文的目的是研究SSD网络算法在全景视频图像车辆检测系统中的有效性。实验结果表明,单个卷积神经网络(CNN)算法的检测准确率仅为0.7554,召回率为0.9052,综合检测准确率为0.8235。SSD网络算法的检测准确率为0.8720,召回率为0.9397,综合检测准确率为0.9046,高于单一CNN算法。因此,将所提出的SSD网络算法与单一卷积网络算法进行了比较。它更适合于车辆检测,在全景视频图像车辆检测中起着重要的作用。
{"title":"Application of SSD network algorithm in panoramic video image vehicle detection system","authors":"Tao Jiang","doi":"10.1515/comp-2022-0270","DOIUrl":"https://doi.org/10.1515/comp-2022-0270","url":null,"abstract":"Abstract Due to the popularity of high-performance cameras and the development of computer video pattern recognition technology, intelligent video monitoring technology is widely used in all aspects of social life. It mainly includes the following: industrial control system uses video monitoring technology for remote monitoring and comprehensive monitoring; in addition, intelligent video monitoring technology is also widely used in the agricultural field, for example, farm administrators can view the activities of animals in real time through smart phones, and agricultural experts can predict future weather changes according to the growth of crops. In the implementation of intelligent monitoring system, automatic detection of vehicles in images is an important topic. The construction of China’s Intelligent Transportation System started late, especially in video traffic detection. Although there are many related studies on video traffic detection algorithms, these algorithms usually only analyze and process information from a single sensor. This article describes the application of the single-shot detector (SSD) network algorithm in a panoramic video image vehicle detection system. The purpose of this article is to investigate the effectiveness of the SSD network algorithm in a panoramic video image vehicle detection system. The experimental results show that the detection accuracy of a single convolutional neural network (CNN) algorithm is only 0.7554, the recall rate is 0.9052, and the comprehensive detection accuracy is 0.8235. The detection accuracy of SSD network algorithm is 0.8720, recall rate is 0.9397, and the comprehensive detection accuracy is 0.9046, which is higher than that of single CNN algorithm. Thus, the proposed SSD network algorithm is compared with a single convolution network algorithm. It is more suitable for vehicle detection, and it plays an important role in panoramic video image vehicle detection.","PeriodicalId":43014,"journal":{"name":"Open Computer Science","volume":" ","pages":""},"PeriodicalIF":1.5,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41813414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SMACS: A framework for formal verification of complex adaptive systems SMACS:复杂自适应系统形式化验证的框架
IF 1.5 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2023-01-01 DOI: 10.1515/comp-2022-0275
Muhammad Ilyas Fakhir, Syed Asad Raza Kazmi, Awais Qasim, A. Ishaq
Abstract Self-adaptive systems (SASs) have the capability to evaluate and change their behavior according to changes occurring in the environment. Research in this field is being held since mid-60, and over the last decade, the importance of self-adaptivity is being increased. In the proposed research, colored petri nets (CPN) formal language is being used to model self-adaptive multiagent system. CPN is increasingly used to model self-adaptive complex concurrent systems due to its flexible formal specification and formal verification behavior. CPN being visually more expressive than simple, Petri Nets enable diverse modeling approaches and provides a richer framework for such a complex formalism. The main goal of this research is to apply self-adaptive multi-agent concurrent system (SMACS) for complex architectures. In our previous research, the SMACS framework is proposed and verified through traffic monitoring system. All agents of SMACS are also known as intelligent agents due to their self-adaptation behavior. Due to decentralized approach in this framework, each agent will intelligently adapt its behavior in the environment and send updates to other agents. In this research, we are choosing smart computer lab (SCL) as a case study. For internal structure of each agent modal, μ mu -calculus will be used, and then a model checker TAPAs: a tool for the analysis of process algebras will be applied to verify these properties. CPN-based state space analysis will also be done to verify the behavioral properties of the model. The general objective of the proposed system is to maximize the utility generated over some predetermined time horizon.
摘要自适应系统(SAS)具有根据环境中发生的变化来评估和改变其行为的能力。自60年代中期以来,这一领域的研究一直在进行,在过去的十年里,自我适应的重要性正在增加。在所提出的研究中,有色petri网(CPN)形式语言被用于自适应多智能体系统的建模。CPN由于其灵活的形式化规范和形式化验证行为,越来越多地被用于对自适应复杂并发系统进行建模。CPN在视觉上比简单的更具表现力,Petri网实现了多种建模方法,并为这种复杂的形式主义提供了更丰富的框架。本研究的主要目标是将自适应多智能体并发系统(SMACS)应用于复杂体系结构。在我们之前的研究中,SMACS框架是通过交通监控系统提出并验证的。SMACS的所有代理由于其自适应行为也被称为智能代理。由于该框架中的去中心化方法,每个代理都将智能地调整其在环境中的行为,并向其他代理发送更新。在本研究中,我们选择智能计算机实验室(SCL)作为案例研究。对于每个代理模态的内部结构,将使用μμ演算,然后应用模型检查器TAPAs:一种用于分析过程代数的工具来验证这些性质。还将进行基于CPN的状态空间分析,以验证模型的行为特性。所提出的系统的总体目标是使在某个预定时间范围内产生的效用最大化。
{"title":"SMACS: A framework for formal verification of complex adaptive systems","authors":"Muhammad Ilyas Fakhir, Syed Asad Raza Kazmi, Awais Qasim, A. Ishaq","doi":"10.1515/comp-2022-0275","DOIUrl":"https://doi.org/10.1515/comp-2022-0275","url":null,"abstract":"Abstract Self-adaptive systems (SASs) have the capability to evaluate and change their behavior according to changes occurring in the environment. Research in this field is being held since mid-60, and over the last decade, the importance of self-adaptivity is being increased. In the proposed research, colored petri nets (CPN) formal language is being used to model self-adaptive multiagent system. CPN is increasingly used to model self-adaptive complex concurrent systems due to its flexible formal specification and formal verification behavior. CPN being visually more expressive than simple, Petri Nets enable diverse modeling approaches and provides a richer framework for such a complex formalism. The main goal of this research is to apply self-adaptive multi-agent concurrent system (SMACS) for complex architectures. In our previous research, the SMACS framework is proposed and verified through traffic monitoring system. All agents of SMACS are also known as intelligent agents due to their self-adaptation behavior. Due to decentralized approach in this framework, each agent will intelligently adapt its behavior in the environment and send updates to other agents. In this research, we are choosing smart computer lab (SCL) as a case study. For internal structure of each agent modal, μ mu -calculus will be used, and then a model checker TAPAs: a tool for the analysis of process algebras will be applied to verify these properties. CPN-based state space analysis will also be done to verify the behavioral properties of the model. The general objective of the proposed system is to maximize the utility generated over some predetermined time horizon.","PeriodicalId":43014,"journal":{"name":"Open Computer Science","volume":" ","pages":""},"PeriodicalIF":1.5,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42980501","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Artificial intelligence-based public safety data resource management in smart cities 基于人工智能的智慧城市公共安全数据资源管理
IF 1.5 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2023-01-01 DOI: 10.1515/comp-2022-0271
Hang Zhao
Abstract With the development of urbanization, urban public safety is becoming more and more important. Urban public safety is not only the foundation of urban development, but also the basic guarantee for the stability of citizens’ lives. In the context of today’s artificial intelligence (AI), the concept of smart cities is constantly being practiced. Urban public safety has also ushered in some new problems and challenges. To this end, this article aimed to use AI technology to build an efficient public safety data resource management system in a smart city environment. A major goal of AI research was to enable machines to perform complex tasks that normally require human intelligence. In this article, a data resource management system was constructed according to the city security system and risk data sources, and the data processing method of neural network (NN) was adopted. Factors affecting urban public safety were processed as indicator data. In this article, the feedforward back-propagation neural network (BPNN) was used to predict the index data in real time, which has realized the management functions of risk monitoring and early warning of public safety data indicators. The BPNN model was used to test the urban risk early warning capability of the constructed system. BPNN is a multi-layer feed-forward NN trained according to the error back-propagation algorithm, which is one of the most widely used NN models. The results showed that the average prediction accuracy of the BPNN model for indicator prediction was about 89%, which was 16.1% higher than that of the traditional NN model. The average risk warning accuracy rate of the BPNN model was 90.3%, which was 16.5% higher than that of the traditional NN model. This shows that the BPNN model using AI technology in this article can more efficiently and accurately carry out early warning of risk and management of urban public safety.
摘要随着城市化的发展,城市公共安全显得越来越重要。城市公共安全是城市发展的基础,也是市民生活稳定的基本保障。在今天的人工智能(AI)背景下,智慧城市的概念正在不断实践。城市公共安全也迎来了一些新的问题和挑战。为此,本文旨在利用人工智能技术构建一个智能城市环境中高效的公共安全数据资源管理系统。人工智能研究的一个主要目标是使机器能够执行通常需要人类智能的复杂任务。本文根据城市安全系统和风险数据源,采用神经网络的数据处理方法,构建了一个数据资源管理系统。将影响城市公共安全的因素作为指标数据进行处理。本文采用前馈-反向传播神经网络(BPNN)对指标数据进行实时预测,实现了公共安全数据指标的风险监测和预警管理功能。利用BPNN模型对所构建系统的城市风险预警能力进行了测试。BPNN是根据误差反向传播算法训练的多层前馈神经网络,是应用最广泛的神经网络模型之一。结果表明,BPNN模型用于指标预测的平均预测准确率约为89%,比传统的NN模型高出16.1%。BPNN模型的平均风险预警准确率为90.3%,比传统NN模型高16.5%。这表明,本文中使用人工智能技术的BPNN模型可以更高效、更准确地进行城市公共安全风险预警和管理。
{"title":"Artificial intelligence-based public safety data resource management in smart cities","authors":"Hang Zhao","doi":"10.1515/comp-2022-0271","DOIUrl":"https://doi.org/10.1515/comp-2022-0271","url":null,"abstract":"Abstract With the development of urbanization, urban public safety is becoming more and more important. Urban public safety is not only the foundation of urban development, but also the basic guarantee for the stability of citizens’ lives. In the context of today’s artificial intelligence (AI), the concept of smart cities is constantly being practiced. Urban public safety has also ushered in some new problems and challenges. To this end, this article aimed to use AI technology to build an efficient public safety data resource management system in a smart city environment. A major goal of AI research was to enable machines to perform complex tasks that normally require human intelligence. In this article, a data resource management system was constructed according to the city security system and risk data sources, and the data processing method of neural network (NN) was adopted. Factors affecting urban public safety were processed as indicator data. In this article, the feedforward back-propagation neural network (BPNN) was used to predict the index data in real time, which has realized the management functions of risk monitoring and early warning of public safety data indicators. The BPNN model was used to test the urban risk early warning capability of the constructed system. BPNN is a multi-layer feed-forward NN trained according to the error back-propagation algorithm, which is one of the most widely used NN models. The results showed that the average prediction accuracy of the BPNN model for indicator prediction was about 89%, which was 16.1% higher than that of the traditional NN model. The average risk warning accuracy rate of the BPNN model was 90.3%, which was 16.5% higher than that of the traditional NN model. This shows that the BPNN model using AI technology in this article can more efficiently and accurately carry out early warning of risk and management of urban public safety.","PeriodicalId":43014,"journal":{"name":"Open Computer Science","volume":"13 1","pages":""},"PeriodicalIF":1.5,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41631848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
RFID supply chain data deconstruction method based on artificial intelligence technology 基于人工智能技术的RFID供应链数据解构方法
IF 1.5 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2023-01-01 DOI: 10.1515/comp-2022-0265
Huiying Zhang, Ze Li
Abstract Radio frequency identification (RFID) is a broad rapidly evolving skill in the past few years. It is characterized by non-contact identification, fast read and write speed, small label size, large data storage capacity, and other technical advantages. RFID technology for goods movement has completely changed the traditional supply chain management, greatly improved the operational efficiency of enterprises, and has become an important method for the development of supply chain logistics. This work mainly studies and analyzes the RFID supply chain, introduces the development and application of RFID supply chain sector technology, and discusses the operation of the supply chain in detail. Then, according to the existing RFID supply chain, a RFID supply chain artificial intelligence (AI) based approach to technology is proposed, and the data analysis of RFID supply chain is introduced in detail. In this work, through the research experiment of AI technology RFID supply chain data analysis, the experimental data show that there are several time-consuming links in the supply chain system. The time consumed in the AI RFID system is 9.9, 3.4, 3.5, and 29.9 min, respectively, while each link in the original system takes 13.4, 4.9, 4.9, and 34.9 min. It can be seen from the above data that the amount of time in each system link of the AI RFID supply chain system is less than that of the original supply chain system, which shortens the entire product passing cycle and greatly improves work efficiency.
摘要射频识别(RFID)是近年来发展迅速的一项技术。具有非接触式识别、读写速度快、标签尺寸小、数据存储容量大等技术优势。RFID货物移动技术彻底改变了传统的供应链管理,大大提高了企业的运营效率,成为供应链物流发展的重要手段。本文主要对RFID供应链进行了研究和分析,介绍了RFID供应链领域技术的发展和应用,并对供应链的运作进行了详细的探讨。然后,根据现有的RFID供应链,提出了一种基于RFID供应链人工智能的技术方法,并详细介绍了RFID供应链的数据分析。在本工作中,通过对AI技术RFID供应链数据分析的研究实验,实验数据表明,供应链系统中存在几个耗时的环节。AI RFID系统耗时分别为9.9分钟、3.4分钟、3.5分钟、29.9分钟,而原系统各环节耗时分别为13.4分钟、4.9分钟、4.9分钟、34.9分钟。从以上数据可以看出,AI RFID供应链系统的各个系统环节的时间量比原来的供应链系统要少,缩短了整个产品的通过周期,大大提高了工作效率。
{"title":"RFID supply chain data deconstruction method based on artificial intelligence technology","authors":"Huiying Zhang, Ze Li","doi":"10.1515/comp-2022-0265","DOIUrl":"https://doi.org/10.1515/comp-2022-0265","url":null,"abstract":"Abstract Radio frequency identification (RFID) is a broad rapidly evolving skill in the past few years. It is characterized by non-contact identification, fast read and write speed, small label size, large data storage capacity, and other technical advantages. RFID technology for goods movement has completely changed the traditional supply chain management, greatly improved the operational efficiency of enterprises, and has become an important method for the development of supply chain logistics. This work mainly studies and analyzes the RFID supply chain, introduces the development and application of RFID supply chain sector technology, and discusses the operation of the supply chain in detail. Then, according to the existing RFID supply chain, a RFID supply chain artificial intelligence (AI) based approach to technology is proposed, and the data analysis of RFID supply chain is introduced in detail. In this work, through the research experiment of AI technology RFID supply chain data analysis, the experimental data show that there are several time-consuming links in the supply chain system. The time consumed in the AI RFID system is 9.9, 3.4, 3.5, and 29.9 min, respectively, while each link in the original system takes 13.4, 4.9, 4.9, and 34.9 min. It can be seen from the above data that the amount of time in each system link of the AI RFID supply chain system is less than that of the original supply chain system, which shortens the entire product passing cycle and greatly improves work efficiency.","PeriodicalId":43014,"journal":{"name":"Open Computer Science","volume":" ","pages":""},"PeriodicalIF":1.5,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42277628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Big data technology for computer intrusion detection 计算机入侵检测的大数据技术
IF 1.5 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2023-01-01 DOI: 10.1515/comp-2022-0267
Ying Chen
Abstract In order to improve the ability of computer network intrusion detection, the big data technology for computer intrusion detection was studied. This research uses big data technology to build a network intrusion detection model, using clustering algorithms, classification algorithms, and association rule algorithms in data mining to automatically identify the attack patterns in the network and quickly learn and extract the characteristics of network attacks. The experimental results show that the recognition effect of the classification algorithm is obviously better than that of the clustering algorithm and the association rule. With the increase in the proportion of abnormal commands, the accuracy rate can still be maintained at 90%. As a compromise between the classification algorithm and the clustering algorithm, the accuracy rate of the association rule algorithm is basically maintained at more than 75%. It is proved that the big data technology oriented to computer intrusion detection can effectively improve the detection ability of computer network intrusion.
摘要为了提高计算机网络入侵检测的能力,研究了计算机入侵检测的大数据技术。本研究利用大数据技术构建网络入侵检测模型,利用数据挖掘中的聚类算法、分类算法和关联规则算法,自动识别网络中的攻击模式,快速学习和提取网络攻击特征。实验结果表明,分类算法的识别效果明显优于聚类算法和关联规则。随着异常命令比例的增加,准确率仍然可以保持在90%。作为分类算法和聚类算法的折衷,关联规则算法的准确率基本保持在75%以上。实践证明,面向计算机入侵检测的大数据技术可以有效提高计算机网络入侵的检测能力。
{"title":"Big data technology for computer intrusion detection","authors":"Ying Chen","doi":"10.1515/comp-2022-0267","DOIUrl":"https://doi.org/10.1515/comp-2022-0267","url":null,"abstract":"Abstract In order to improve the ability of computer network intrusion detection, the big data technology for computer intrusion detection was studied. This research uses big data technology to build a network intrusion detection model, using clustering algorithms, classification algorithms, and association rule algorithms in data mining to automatically identify the attack patterns in the network and quickly learn and extract the characteristics of network attacks. The experimental results show that the recognition effect of the classification algorithm is obviously better than that of the clustering algorithm and the association rule. With the increase in the proportion of abnormal commands, the accuracy rate can still be maintained at 90%. As a compromise between the classification algorithm and the clustering algorithm, the accuracy rate of the association rule algorithm is basically maintained at more than 75%. It is proved that the big data technology oriented to computer intrusion detection can effectively improve the detection ability of computer network intrusion.","PeriodicalId":43014,"journal":{"name":"Open Computer Science","volume":" ","pages":""},"PeriodicalIF":1.5,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42349087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Machine learning-based processing of unbalanced data sets for computer algorithms 基于机器学习的不平衡数据集处理的计算机算法
IF 1.5 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2023-01-01 DOI: 10.1515/comp-2022-0273
Qingwei Zhou, Yongjun Qi, Hailing Tang, Peng Wu
Abstract The rapid development of technology allows people to obtain a large amount of data, which contains important information and various noises. How to obtain useful knowledge from data is the most important thing at this stage of machine learning (ML). The problem of unbalanced classification is currently an important topic in the field of data mining and ML. At present, this problem has attracted more and more attention and is a relatively new challenge for academia and industry. The problem of unbalanced classification involves classifying data when there is insufficient data or severe category distribution deviations. Due to the inherent complexity of unbalanced data sets, more new algorithms and tools are needed to effectively convert a large amount of raw data into useful information and knowledge. Unbalanced data set is a special case of classification problem, in which the distribution between classes is uneven, and it is difficult to classify data accurately. This article mainly introduces the research on the processing method of computer algorithms based on the processing method of unbalanced data sets based on ML, aiming to provide some ideas and directions for the processing of computer algorithms based on unbalanced data sets based on ML. This article proposes a research strategy for processing unbalanced data sets based on ML, including data preprocessing, decision tree data classification algorithm, and C4.5 algorithm, which are used to conduct research experiments on processing methods for unbalanced data sets based on ML. The experimental results in this article show that the accuracy rate of the decision tree C4.5 algorithm based on ML is 94.80%, which can be better used for processing unbalanced data sets based on ML.
科技的飞速发展使人们获得了大量的数据,这些数据中包含着重要的信息和各种各样的噪声。如何从数据中获取有用的知识是机器学习这个阶段最重要的事情。不平衡分类问题是当前数据挖掘和机器学习领域的一个重要课题,目前该问题越来越受到关注,是学术界和工业界面临的一个比较新的挑战。不平衡分类问题涉及在数据不足或类别分布偏差严重的情况下对数据进行分类。由于不平衡数据集固有的复杂性,需要更多新的算法和工具将大量的原始数据有效地转化为有用的信息和知识。不平衡数据集是分类问题的一种特殊情况,类之间的分布是不均匀的,很难对数据进行准确的分类。本文主要介绍了基于ML的非平衡数据集处理方法的计算机算法处理方法的研究,旨在为基于ML的非平衡数据集计算机算法的处理提供一些思路和方向。本文提出了基于ML的非平衡数据集处理的研究策略,包括数据预处理、决策树数据分类算法、C4.5算法等。进行了基于ML的非平衡数据集处理方法的研究实验。本文的实验结果表明,基于ML的决策树C4.5算法准确率为94.80%,可以更好地用于基于ML的非平衡数据集处理。
{"title":"Machine learning-based processing of unbalanced data sets for computer algorithms","authors":"Qingwei Zhou, Yongjun Qi, Hailing Tang, Peng Wu","doi":"10.1515/comp-2022-0273","DOIUrl":"https://doi.org/10.1515/comp-2022-0273","url":null,"abstract":"Abstract The rapid development of technology allows people to obtain a large amount of data, which contains important information and various noises. How to obtain useful knowledge from data is the most important thing at this stage of machine learning (ML). The problem of unbalanced classification is currently an important topic in the field of data mining and ML. At present, this problem has attracted more and more attention and is a relatively new challenge for academia and industry. The problem of unbalanced classification involves classifying data when there is insufficient data or severe category distribution deviations. Due to the inherent complexity of unbalanced data sets, more new algorithms and tools are needed to effectively convert a large amount of raw data into useful information and knowledge. Unbalanced data set is a special case of classification problem, in which the distribution between classes is uneven, and it is difficult to classify data accurately. This article mainly introduces the research on the processing method of computer algorithms based on the processing method of unbalanced data sets based on ML, aiming to provide some ideas and directions for the processing of computer algorithms based on unbalanced data sets based on ML. This article proposes a research strategy for processing unbalanced data sets based on ML, including data preprocessing, decision tree data classification algorithm, and C4.5 algorithm, which are used to conduct research experiments on processing methods for unbalanced data sets based on ML. The experimental results in this article show that the accuracy rate of the decision tree C4.5 algorithm based on ML is 94.80%, which can be better used for processing unbalanced data sets based on ML.","PeriodicalId":43014,"journal":{"name":"Open Computer Science","volume":" ","pages":""},"PeriodicalIF":1.5,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48169670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Open Computer Science
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1