首页 > 最新文献

Journal of Intelligent Systems最新文献

英文 中文
Reinforcement learning with Gaussian process regression using variational free energy 基于变分自由能的高斯过程回归强化学习
IF 3 Q3 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2023-01-01 DOI: 10.1515/jisys-2022-0205
Kiseki Kameda, F. Tanaka
Abstract The essential part of existing reinforcement learning algorithms that use Gaussian process regression involves a complicated online Gaussian process regression algorithm. Our study proposes online and mini-batch Gaussian process regression algorithms that are easier to implement and faster to estimate for reinforcement learning. In our algorithm, the Gaussian process regression updates the value function through only the computation of two equations, which we then use to construct reinforcement learning algorithms. Our numerical experiments show that the proposed algorithm works as well as those from previous studies.
现有使用高斯过程回归的强化学习算法的核心部分是复杂的在线高斯过程回归算法。我们的研究提出了在线和小批量高斯过程回归算法,更容易实现,更快地估计强化学习。在我们的算法中,高斯过程回归仅通过计算两个方程来更新值函数,然后我们使用它们来构建强化学习算法。数值实验表明,本文提出的算法与已有的算法一样有效。
{"title":"Reinforcement learning with Gaussian process regression using variational free energy","authors":"Kiseki Kameda, F. Tanaka","doi":"10.1515/jisys-2022-0205","DOIUrl":"https://doi.org/10.1515/jisys-2022-0205","url":null,"abstract":"Abstract The essential part of existing reinforcement learning algorithms that use Gaussian process regression involves a complicated online Gaussian process regression algorithm. Our study proposes online and mini-batch Gaussian process regression algorithms that are easier to implement and faster to estimate for reinforcement learning. In our algorithm, the Gaussian process regression updates the value function through only the computation of two equations, which we then use to construct reinforcement learning algorithms. Our numerical experiments show that the proposed algorithm works as well as those from previous studies.","PeriodicalId":46139,"journal":{"name":"Journal of Intelligent Systems","volume":"15 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75118897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On numerical characterizations of the topological reduction of incomplete information systems based on evidence theory 基于证据理论的不完全信息系统拓扑约简的数值表征
IF 3 Q3 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2023-01-01 DOI: 10.1515/jisys-2022-0214
Changqing Li, Yanlan Zhang
Abstract Knowledge reduction of information systems is one of the most important parts of rough set theory in real-world applications. Based on the connections between the rough set theory and the theory of topology, a kind of topological reduction of incomplete information systems is discussed. In this study, the topological reduction of incomplete information systems is characterized by belief and plausibility functions from evidence theory. First, we present that a topological space induced by a pair of approximation operators in an incomplete information system is pseudo-discrete, which deduces a partition. Then, the topological reduction is characterized by the belief and plausibility function values of the sets in the partition. A topological reduction algorithm for computing the topological reducts in incomplete information systems is also proposed based on evidence theory, and its efficiency is examined by an example. Moreover, relationships among the concepts of topological reduct, classical reduct, belief reduct, and plausibility reduct of an incomplete information system are presented.
摘要信息系统的知识约简是粗糙集理论在实际应用中的重要内容之一。基于粗糙集理论与拓扑学理论的联系,讨论了一类不完备信息系统的拓扑约简。在本研究中,不完全信息系统的拓扑约简以证据理论中的信念函数和似然函数为特征。首先,我们给出了不完全信息系统中由一对近似算子诱导的拓扑空间是伪离散的,并推导出了一个划分。然后,用划分中集合的置信函数值和似然函数值来表征拓扑约简。基于证据理论,提出了一种计算不完全信息系统拓扑约简的拓扑约简算法,并通过实例验证了算法的有效性。给出了不完全信息系统的拓扑约简、经典约简、信念约简和可信性约简等概念之间的关系。
{"title":"On numerical characterizations of the topological reduction of incomplete information systems based on evidence theory","authors":"Changqing Li, Yanlan Zhang","doi":"10.1515/jisys-2022-0214","DOIUrl":"https://doi.org/10.1515/jisys-2022-0214","url":null,"abstract":"Abstract Knowledge reduction of information systems is one of the most important parts of rough set theory in real-world applications. Based on the connections between the rough set theory and the theory of topology, a kind of topological reduction of incomplete information systems is discussed. In this study, the topological reduction of incomplete information systems is characterized by belief and plausibility functions from evidence theory. First, we present that a topological space induced by a pair of approximation operators in an incomplete information system is pseudo-discrete, which deduces a partition. Then, the topological reduction is characterized by the belief and plausibility function values of the sets in the partition. A topological reduction algorithm for computing the topological reducts in incomplete information systems is also proposed based on evidence theory, and its efficiency is examined by an example. Moreover, relationships among the concepts of topological reduct, classical reduct, belief reduct, and plausibility reduct of an incomplete information system are presented.","PeriodicalId":46139,"journal":{"name":"Journal of Intelligent Systems","volume":"106 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87091537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improvement of predictive control algorithm based on fuzzy fractional order PID 基于模糊分数阶PID的预测控制算法改进
Q3 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2023-01-01 DOI: 10.1515/jisys-2022-0288
Rongzhen Shi
Abstract The existing predictive control strategy has comprehensive prior knowledge of the controlled process, requires weak continuity of the search space for parameter optimization, and its application is limited to some extent. Therefore, improved research on the fuzzy fractional proportional integral differential (PID) predictive control algorithm is proposed. First, the control principle of PID predictive control equipment is proposed. According to this principle, the structure of the PID predictive control equipment adaptive fuzzy PID energy-saving controller is constructed. Through the PID energy-saving control parameter setting principle and fuzzy control rules, the adaptive fuzzy PID energy-saving control of PID predictive control equipment is realized. Finally, the fractional order PID predictive transfer function model is constructed to improve the predictive control algorithm based on PID optimization technology. The experimental results show that the accuracy and efficiency of the designed algorithm can get the best performance index, and its stability, overshoot, time, and control accuracy are basically unchanged. In the small area temperature control, the disturbance interference is small, the anti-disturbance ability is good, and it has strong robustness.
现有的预测控制策略对被控过程具有全面的先验知识,对参数优化搜索空间的连续性要求较弱,在一定程度上限制了其应用。因此,对模糊分数阶比例积分微分(PID)预测控制算法进行了改进研究。首先,提出了PID预测控制装置的控制原理。根据这一原理,构造了PID预测控制设备的自适应模糊PID节能控制器结构。通过PID节能控制参数整定原理和模糊控制规则,实现了PID预测控制设备的自适应模糊PID节能控制。最后,构建分数阶PID预测传递函数模型,对基于PID优化技术的预测控制算法进行改进。实验结果表明,所设计算法的精度和效率均能获得最佳性能指标,其稳定性、超调量、时间、控制精度基本不变。在小区域温度控制中,干扰干扰小,抗干扰能力好,具有较强的鲁棒性。
{"title":"Improvement of predictive control algorithm based on fuzzy fractional order PID","authors":"Rongzhen Shi","doi":"10.1515/jisys-2022-0288","DOIUrl":"https://doi.org/10.1515/jisys-2022-0288","url":null,"abstract":"Abstract The existing predictive control strategy has comprehensive prior knowledge of the controlled process, requires weak continuity of the search space for parameter optimization, and its application is limited to some extent. Therefore, improved research on the fuzzy fractional proportional integral differential (PID) predictive control algorithm is proposed. First, the control principle of PID predictive control equipment is proposed. According to this principle, the structure of the PID predictive control equipment adaptive fuzzy PID energy-saving controller is constructed. Through the PID energy-saving control parameter setting principle and fuzzy control rules, the adaptive fuzzy PID energy-saving control of PID predictive control equipment is realized. Finally, the fractional order PID predictive transfer function model is constructed to improve the predictive control algorithm based on PID optimization technology. The experimental results show that the accuracy and efficiency of the designed algorithm can get the best performance index, and its stability, overshoot, time, and control accuracy are basically unchanged. In the small area temperature control, the disturbance interference is small, the anti-disturbance ability is good, and it has strong robustness.","PeriodicalId":46139,"journal":{"name":"Journal of Intelligent Systems","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134882972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Application study of ant colony algorithm for network data transmission path scheduling optimization 蚁群算法在网络数据传输路径调度优化中的应用研究
IF 3 Q3 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2023-01-01 DOI: 10.1515/jisys-2022-0277
Peng Xiao
Abstract With the rapid development of the information age, the traditional data center network management can no longer meet the rapid expansion of network data traffic needs. Therefore, the research uses the biological ant colony foraging behavior to find the optimal path of network traffic scheduling, and introduces pheromone and heuristic functions to improve the convergence and stability of the algorithm. In order to find the light load path more accurately, the strategy redefines the heuristic function according to the number of large streams on the link and the real-time load. At the same time, in order to reduce the delay, the strategy defines the optimal path determination rule according to the path delay and real-time load. The experiments show that under the link load balancing strategy based on ant colony algorithm, the link utilization ratio is 4.6% higher than that of ECMP, while the traffic delay is reduced, and the delay deviation fluctuates within ±2 ms. The proposed network data transmission scheduling strategy can better solve the problems in traffic scheduling, and effectively improve network throughput and traffic transmission quality.
摘要随着信息时代的飞速发展,传统的数据中心网络管理方式已经不能满足网络数据流量快速膨胀的需求。因此,本研究采用生物蚁群觅食行为寻找网络流量调度的最优路径,并引入信息素和启发式函数来提高算法的收敛性和稳定性。为了更准确地找到轻负载路径,该策略根据链路上的大流数量和实时负载重新定义了启发式函数。同时,为了减少延迟,该策略根据路径延迟和实时负载定义了最优路径确定规则。实验表明,在基于蚁群算法的链路负载均衡策略下,链路利用率比ECMP提高4.6%,同时减少了流量延迟,延迟偏差波动在±2 ms以内。所提出的网络数据传输调度策略能够较好地解决流量调度问题,有效提高网络吞吐量和流量传输质量。
{"title":"Application study of ant colony algorithm for network data transmission path scheduling optimization","authors":"Peng Xiao","doi":"10.1515/jisys-2022-0277","DOIUrl":"https://doi.org/10.1515/jisys-2022-0277","url":null,"abstract":"Abstract With the rapid development of the information age, the traditional data center network management can no longer meet the rapid expansion of network data traffic needs. Therefore, the research uses the biological ant colony foraging behavior to find the optimal path of network traffic scheduling, and introduces pheromone and heuristic functions to improve the convergence and stability of the algorithm. In order to find the light load path more accurately, the strategy redefines the heuristic function according to the number of large streams on the link and the real-time load. At the same time, in order to reduce the delay, the strategy defines the optimal path determination rule according to the path delay and real-time load. The experiments show that under the link load balancing strategy based on ant colony algorithm, the link utilization ratio is 4.6% higher than that of ECMP, while the traffic delay is reduced, and the delay deviation fluctuates within ±2 ms. The proposed network data transmission scheduling strategy can better solve the problems in traffic scheduling, and effectively improve network throughput and traffic transmission quality.","PeriodicalId":46139,"journal":{"name":"Journal of Intelligent Systems","volume":"10 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86173934","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A review of small object and movement detection based loss function and optimized technique 基于损失函数的小目标和运动检测及其优化技术综述
IF 3 Q3 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2023-01-01 DOI: 10.1515/jisys-2022-0324
R. Chaturvedi, Udayan Ghose
Abstract The objective of this study is to supply an overview of research work based on video-based networks and tiny object identification. The identification of tiny items and video objects, as well as research on current technologies, are discussed first. The detection, loss function, and optimization techniques are classified and described in the form of a comparison table. These comparison tables are designed to help you identify differences in research utility, accuracy, and calculations. Finally, it highlights some future trends in video and small object detection (people, cars, animals, etc.), loss functions, and optimization techniques for solving new problems.
摘要本研究的目的是提供基于视频网络和微小目标识别的研究工作综述。首先讨论了微小物品和视频对象的识别,以及当前技术的研究。检测、损失函数和优化技术以比较表的形式进行分类和描述。这些比较表旨在帮助您识别研究效用,准确性和计算的差异。最后,它强调了视频和小对象检测(人、汽车、动物等)、损失函数和解决新问题的优化技术的一些未来趋势。
{"title":"A review of small object and movement detection based loss function and optimized technique","authors":"R. Chaturvedi, Udayan Ghose","doi":"10.1515/jisys-2022-0324","DOIUrl":"https://doi.org/10.1515/jisys-2022-0324","url":null,"abstract":"Abstract The objective of this study is to supply an overview of research work based on video-based networks and tiny object identification. The identification of tiny items and video objects, as well as research on current technologies, are discussed first. The detection, loss function, and optimization techniques are classified and described in the form of a comparison table. These comparison tables are designed to help you identify differences in research utility, accuracy, and calculations. Finally, it highlights some future trends in video and small object detection (people, cars, animals, etc.), loss functions, and optimization techniques for solving new problems.","PeriodicalId":46139,"journal":{"name":"Journal of Intelligent Systems","volume":"27 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86483691","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A study on predicting crime rates through machine learning and data mining using text 利用文本进行机器学习和数据挖掘预测犯罪率的研究
IF 3 Q3 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2023-01-01 DOI: 10.1515/jisys-2022-0223
Ruaa Mohammed Saeed, Husam Ali Abdulmohsin
Abstract Crime is a threat to any nation’s security administration and jurisdiction. Therefore, crime analysis becomes increasingly important because it assigns the time and place based on the collected spatial and temporal data. However, old techniques, such as paperwork, investigative judges, and statistical analysis, are not efficient enough to predict the accurate time and location where the crime had taken place. But when machine learning and data mining methods were deployed in crime analysis, crime analysis and predication accuracy increased dramatically. In this study, various types of criminal analysis and prediction using several machine learning and data mining techniques, based on the percentage of an accuracy measure of the previous work, are surveyed and introduced, with the aim of producing a concise review of using these algorithms in crime prediction. It is expected that this review study will be helpful for presenting such techniques to crime researchers in addition to supporting future research to develop these techniques for crime analysis by presenting some crime definition, prediction systems challenges and classifications with a comparative study. It was proved though literature, that supervised learning approaches were used in more studies for crime prediction than other approaches, and Logistic Regression is the most powerful method in predicting crime.
犯罪是对任何国家安全行政和司法的威胁。因此,犯罪分析变得越来越重要,因为它是根据收集的空间和时间数据来分配时间和地点。然而,旧的技术,如文书工作、调查法官和统计分析,都不足以有效地预测犯罪发生的准确时间和地点。但是,当机器学习和数据挖掘方法应用于犯罪分析时,犯罪分析和预测的准确性大大提高。在本研究中,使用几种机器学习和数据挖掘技术的各种类型的犯罪分析和预测,基于先前工作的准确度测量的百分比,进行了调查和介绍,目的是对在犯罪预测中使用这些算法进行简要回顾。通过对犯罪定义、预测系统挑战和分类的比较研究,期望本综述的研究有助于向犯罪研究人员介绍这些技术,并支持未来的研究,以发展这些技术用于犯罪分析。文献证明,监督学习方法在犯罪预测研究中的应用比其他方法多,而逻辑回归是预测犯罪最有效的方法。
{"title":"A study on predicting crime rates through machine learning and data mining using text","authors":"Ruaa Mohammed Saeed, Husam Ali Abdulmohsin","doi":"10.1515/jisys-2022-0223","DOIUrl":"https://doi.org/10.1515/jisys-2022-0223","url":null,"abstract":"Abstract Crime is a threat to any nation’s security administration and jurisdiction. Therefore, crime analysis becomes increasingly important because it assigns the time and place based on the collected spatial and temporal data. However, old techniques, such as paperwork, investigative judges, and statistical analysis, are not efficient enough to predict the accurate time and location where the crime had taken place. But when machine learning and data mining methods were deployed in crime analysis, crime analysis and predication accuracy increased dramatically. In this study, various types of criminal analysis and prediction using several machine learning and data mining techniques, based on the percentage of an accuracy measure of the previous work, are surveyed and introduced, with the aim of producing a concise review of using these algorithms in crime prediction. It is expected that this review study will be helpful for presenting such techniques to crime researchers in addition to supporting future research to develop these techniques for crime analysis by presenting some crime definition, prediction systems challenges and classifications with a comparative study. It was proved though literature, that supervised learning approaches were used in more studies for crime prediction than other approaches, and Logistic Regression is the most powerful method in predicting crime.","PeriodicalId":46139,"journal":{"name":"Journal of Intelligent Systems","volume":"80 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73027349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A multiorder feature tracking and explanation strategy for explainable deep learning 面向可解释深度学习的多阶特征跟踪与解释策略
IF 3 Q3 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2023-01-01 DOI: 10.1515/jisys-2022-0212
Lin Zheng, Yixuan Lin
Abstract A good AI algorithm can make accurate predictions and provide reasonable explanations for the field in which it is applied. However, the application of deep models makes the black box problem, i.e., the lack of interpretability of a model, more prominent. In particular, when there are multiple features in an application domain and complex interactions between these features, it is difficult for a deep model to intuitively explain its prediction results. Moreover, in practical applications, multiorder feature interactions are ubiquitous. To break the interpretation limitations of deep models, we argue that a multiorder linearly separable deep model can be divided into different orders to explain its prediction results. Inspired by the interpretability advantage of tree models, we design a feature representation mechanism that can consistently represent the features of both trees and deep models. Based on the consistent representation, we propose a multiorder feature-tracking strategy to provide a prediction-oriented multiorder explanation for a linearly separable deep model. In experiments, we have empirically verified the effectiveness of our approach in two binary classification application scenarios: education and marketing. Experimental results show that our model can intuitively represent complex relationships between features through diversified multiorder explanations.
一个好的人工智能算法可以对其应用的领域做出准确的预测,并提供合理的解释。然而,深度模型的应用使得黑箱问题(即模型缺乏可解释性)更加突出。特别是当一个应用领域中存在多个特征,并且这些特征之间存在复杂的相互作用时,深度模型很难直观地解释其预测结果。此外,在实际应用中,多阶特征相互作用无处不在。为了打破深度模型的解释局限性,我们认为可以将多阶线性可分深度模型划分为不同阶来解释其预测结果。受树模型可解释性优势的启发,我们设计了一种能够一致地表示树模型和深度模型特征的特征表示机制。基于一致性表示,我们提出了一种多阶特征跟踪策略,为线性可分深度模型提供面向预测的多阶解释。在实验中,我们在教育和营销两个二元分类应用场景中实证验证了我们的方法的有效性。实验结果表明,该模型通过多元的多阶解释,可以直观地表达特征之间的复杂关系。
{"title":"A multiorder feature tracking and explanation strategy for explainable deep learning","authors":"Lin Zheng, Yixuan Lin","doi":"10.1515/jisys-2022-0212","DOIUrl":"https://doi.org/10.1515/jisys-2022-0212","url":null,"abstract":"Abstract A good AI algorithm can make accurate predictions and provide reasonable explanations for the field in which it is applied. However, the application of deep models makes the black box problem, i.e., the lack of interpretability of a model, more prominent. In particular, when there are multiple features in an application domain and complex interactions between these features, it is difficult for a deep model to intuitively explain its prediction results. Moreover, in practical applications, multiorder feature interactions are ubiquitous. To break the interpretation limitations of deep models, we argue that a multiorder linearly separable deep model can be divided into different orders to explain its prediction results. Inspired by the interpretability advantage of tree models, we design a feature representation mechanism that can consistently represent the features of both trees and deep models. Based on the consistent representation, we propose a multiorder feature-tracking strategy to provide a prediction-oriented multiorder explanation for a linearly separable deep model. In experiments, we have empirically verified the effectiveness of our approach in two binary classification application scenarios: education and marketing. Experimental results show that our model can intuitively represent complex relationships between features through diversified multiorder explanations.","PeriodicalId":46139,"journal":{"name":"Journal of Intelligent Systems","volume":"51 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73790806","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Feature extraction algorithm of anti-jamming cyclic frequency of electronic communication signal 电子通信信号抗干扰循环频率特征提取算法
Q3 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2023-01-01 DOI: 10.1515/jisys-2022-0295
Xuemei Yang
Abstract Anti-jamming cyclic frequency feature extraction is an important link in identifying communication interference signals, which is of great significance for eliminating electronic communication interference factors and improving the security of electronic communication environment. However, when the traditional feature extraction technology faces a large number of data samples, the processing capacity is low, and it cannot solve the multi-classification problems. For this type of problem, a method of electronic communication signal anti-jamming cyclic frequency feature extraction based on particle swarm optimization-support vector machines (PSO-SVM) algorithm is proposed. First, the SVM signal feature extraction model is proposed, and then the particle swarm optimization (PSO) algorithm is used. Optimize the kernel function parameter settings of SVM to raise the classifying quality of the SVM model. Finally, the function of the PSO-SVM signal feature extraction model is tested. The results verify that the PSO-SVM model begins to converge after 60 iterations, and the loss value remains at about 0.2, which is 0.2 lower than that of the SVM technique. The exactitude of signal feature extraction is 90.4%, and the recognition effect of binary phase shift keying signal is the best. The complete rate of signal feature extraction is 85%. This shows that the PSO-SVM model enhances the sensitivity of the anti-jamming cyclic frequency feature, improves the accuracy of the anti-jamming cyclic frequency feature recognition, reduces the running process, reduces the time cost, and greatly increases the performance of the SVM method. The good model performance also improves the application value of the method in the field of electronic communication.
摘要:抗干扰循环频率特征提取是识别通信干扰信号的重要环节,对消除电子通信干扰因素,提高电子通信环境的安全性具有重要意义。然而,传统的特征提取技术在面对大量数据样本时,处理能力较低,无法解决多分类问题。针对这类问题,提出一种基于粒子群优化-支持向量机(PSO-SVM)算法的电子通信信号抗干扰循环频率特征提取方法。首先,提出了支持向量机信号特征提取模型,然后采用粒子群优化(PSO)算法。优化支持向量机核函数参数设置,提高支持向量机模型的分类质量。最后,对PSO-SVM信号特征提取模型的功能进行了验证。结果表明,PSO-SVM模型在60次迭代后开始收敛,损失值保持在0.2左右,比SVM技术的损失值低0.2。信号特征提取的正确率为90.4%,其中二相移键控信号的识别效果最好。信号特征提取完成率为85%。这表明PSO-SVM模型增强了抗干扰循环频率特征的灵敏度,提高了抗干扰循环频率特征识别的准确性,减少了运行过程,降低了时间成本,大大提高了支持向量机方法的性能。良好的模型性能也提高了该方法在电子通信领域的应用价值。
{"title":"Feature extraction algorithm of anti-jamming cyclic frequency of electronic communication signal","authors":"Xuemei Yang","doi":"10.1515/jisys-2022-0295","DOIUrl":"https://doi.org/10.1515/jisys-2022-0295","url":null,"abstract":"Abstract Anti-jamming cyclic frequency feature extraction is an important link in identifying communication interference signals, which is of great significance for eliminating electronic communication interference factors and improving the security of electronic communication environment. However, when the traditional feature extraction technology faces a large number of data samples, the processing capacity is low, and it cannot solve the multi-classification problems. For this type of problem, a method of electronic communication signal anti-jamming cyclic frequency feature extraction based on particle swarm optimization-support vector machines (PSO-SVM) algorithm is proposed. First, the SVM signal feature extraction model is proposed, and then the particle swarm optimization (PSO) algorithm is used. Optimize the kernel function parameter settings of SVM to raise the classifying quality of the SVM model. Finally, the function of the PSO-SVM signal feature extraction model is tested. The results verify that the PSO-SVM model begins to converge after 60 iterations, and the loss value remains at about 0.2, which is 0.2 lower than that of the SVM technique. The exactitude of signal feature extraction is 90.4%, and the recognition effect of binary phase shift keying signal is the best. The complete rate of signal feature extraction is 85%. This shows that the PSO-SVM model enhances the sensitivity of the anti-jamming cyclic frequency feature, improves the accuracy of the anti-jamming cyclic frequency feature recognition, reduces the running process, reduces the time cost, and greatly increases the performance of the SVM method. The good model performance also improves the application value of the method in the field of electronic communication.","PeriodicalId":46139,"journal":{"name":"Journal of Intelligent Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136305484","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Classifying cuneiform symbols using machine learning algorithms with unigram features on a balanced dataset 在平衡数据集上使用具有单字特征的机器学习算法对楔形符号进行分类
Q3 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2023-01-01 DOI: 10.1515/jisys-2023-0087
Maha Mahmood, Farah Maath Jasem, Abdulrahman Abbas Mukhlif, Belal AL-Khateeb
Abstract Problem Recognizing written languages using symbols written in cuneiform is a tough endeavor due to the lack of information and the challenge of the process of tokenization. The Cuneiform Language Identification (CLI) dataset attempts to understand seven cuneiform languages and dialects, including Sumerian and six dialects of the Akkadian language: Old Babylonian, Middle Babylonian Peripheral, Standard Babylonian, Neo-Babylonian, Late Babylonian, and Neo-Assyrian. However, this dataset suffers from the problem of imbalanced categories. Aim Therefore, this article aims to build a system capable of distinguishing between several cuneiform languages and solving the problem of unbalanced categories in the CLI dataset. Methods Oversampling technique was used to balance the dataset, and the performance of machine learning algorithms such as Support Vector Machine (SVM), K-Nearest Neighbors (KNN), Decision Tree (DT), Random Forest (RF), and deep learning such as deep neural networks (DNNs) using the unigram feature extraction method was investigated. Results The proposed method using machine learning algorithms (SVM, KNN, DT, and RF) on a balanced dataset obtained an accuracy of 88.15, 88.14, 94.13, and 95.46%, respectively, while the DNN model got an accuracy of 93%. This proves improved performance compared to related works. Conclusion This proves the improvement of classifiers when working on a balanced dataset. The use of unigram features also showed an improvement in the performance of the classifier as it reduced the size of the data and accelerated the processing process.
由于信息的缺乏和标记化过程的挑战,使用楔形文字符号识别书面语言是一项艰巨的任务。楔形文字识别(CLI)数据集试图理解七种楔形文字语言和方言,包括苏美尔语和阿卡德语的六种方言:古巴比伦语、中巴比伦语外围语、标准巴比伦语、新巴比伦语、晚巴比伦语和新亚述语。然而,该数据集存在类别不平衡的问题。因此,本文旨在构建一个能够区分几种楔形语言的系统,并解决CLI数据集中类别不平衡的问题。方法采用过采样技术对数据集进行平衡,研究支持向量机(SVM)、k近邻(KNN)、决策树(DT)、随机森林(RF)等机器学习算法和深度学习如深度神经网络(dnn)等单图特征提取算法的性能。结果采用SVM、KNN、DT和RF四种机器学习算法在平衡数据集上的准确率分别为88.15、88.14、94.13和95.46%,而DNN模型的准确率为93%。这证明了与相关作品相比,性能有所提高。这证明了分类器在平衡数据集上的改进。单图特征的使用也显示了分类器性能的改进,因为它减少了数据的大小并加速了处理过程。
{"title":"Classifying cuneiform symbols using machine learning algorithms with unigram features on a balanced dataset","authors":"Maha Mahmood, Farah Maath Jasem, Abdulrahman Abbas Mukhlif, Belal AL-Khateeb","doi":"10.1515/jisys-2023-0087","DOIUrl":"https://doi.org/10.1515/jisys-2023-0087","url":null,"abstract":"Abstract Problem Recognizing written languages using symbols written in cuneiform is a tough endeavor due to the lack of information and the challenge of the process of tokenization. The Cuneiform Language Identification (CLI) dataset attempts to understand seven cuneiform languages and dialects, including Sumerian and six dialects of the Akkadian language: Old Babylonian, Middle Babylonian Peripheral, Standard Babylonian, Neo-Babylonian, Late Babylonian, and Neo-Assyrian. However, this dataset suffers from the problem of imbalanced categories. Aim Therefore, this article aims to build a system capable of distinguishing between several cuneiform languages and solving the problem of unbalanced categories in the CLI dataset. Methods Oversampling technique was used to balance the dataset, and the performance of machine learning algorithms such as Support Vector Machine (SVM), K-Nearest Neighbors (KNN), Decision Tree (DT), Random Forest (RF), and deep learning such as deep neural networks (DNNs) using the unigram feature extraction method was investigated. Results The proposed method using machine learning algorithms (SVM, KNN, DT, and RF) on a balanced dataset obtained an accuracy of 88.15, 88.14, 94.13, and 95.46%, respectively, while the DNN model got an accuracy of 93%. This proves improved performance compared to related works. Conclusion This proves the improvement of classifiers when working on a balanced dataset. The use of unigram features also showed an improvement in the performance of the classifier as it reduced the size of the data and accelerated the processing process.","PeriodicalId":46139,"journal":{"name":"Journal of Intelligent Systems","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135699439","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dimensions of artificial intelligence techniques, blockchain, and cyber security in the Internet of medical things: Opportunities, challenges, and future directions 医疗物联网中的人工智能技术、区块链和网络安全维度:机遇、挑战和未来方向
IF 3 Q3 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2023-01-01 DOI: 10.1515/jisys-2022-0267
Aya Hamid Ameen, M. A. Mohammed, A. N. Rashid
Abstract The Internet of medical things (IoMT) is a modern technology that is increasingly being used to provide good healthcare services. As IoMT devices are vulnerable to cyberattacks, healthcare centers and patients face privacy and security challenges. A safe IoMT environment has been used by combining blockchain (BC) technology with artificial intelligence (AI). However, the services of the systems are costly and suffer from security and privacy problems. This study aims to summarize previous research in the IoMT and discusses the roles of AI, BC, and cybersecurity in the IoMT, as well as the problems, opportunities, and directions of research in this field based on a comprehensive literature review. This review describes the integration schemes of AI, BC, and cybersecurity technologies, which can support the development of new systems based on a decentralized approach, especially in healthcare applications. This study also identifies the strengths and weaknesses of these technologies, as well as the datasets they use.
医疗物联网(IoMT)是一种现代技术,越来越多地用于提供良好的医疗保健服务。由于IoMT设备容易受到网络攻击,医疗中心和患者面临隐私和安全方面的挑战。通过将区块链(BC)技术与人工智能(AI)相结合,使用了安全的物联网环境。然而,这些系统的服务成本很高,并且存在安全和隐私问题。本研究旨在总结前人在物联网领域的研究成果,在综合文献综述的基础上,探讨人工智能、BC和网络安全在物联网领域的作用,以及该领域的问题、机遇和研究方向。本文介绍了AI、BC和网络安全技术的集成方案,这些方案可以支持基于分散方法的新系统的开发,特别是在医疗保健应用中。本研究还确定了这些技术的优点和缺点,以及它们使用的数据集。
{"title":"Dimensions of artificial intelligence techniques, blockchain, and cyber security in the Internet of medical things: Opportunities, challenges, and future directions","authors":"Aya Hamid Ameen, M. A. Mohammed, A. N. Rashid","doi":"10.1515/jisys-2022-0267","DOIUrl":"https://doi.org/10.1515/jisys-2022-0267","url":null,"abstract":"Abstract The Internet of medical things (IoMT) is a modern technology that is increasingly being used to provide good healthcare services. As IoMT devices are vulnerable to cyberattacks, healthcare centers and patients face privacy and security challenges. A safe IoMT environment has been used by combining blockchain (BC) technology with artificial intelligence (AI). However, the services of the systems are costly and suffer from security and privacy problems. This study aims to summarize previous research in the IoMT and discusses the roles of AI, BC, and cybersecurity in the IoMT, as well as the problems, opportunities, and directions of research in this field based on a comprehensive literature review. This review describes the integration schemes of AI, BC, and cybersecurity technologies, which can support the development of new systems based on a decentralized approach, especially in healthcare applications. This study also identifies the strengths and weaknesses of these technologies, as well as the datasets they use.","PeriodicalId":46139,"journal":{"name":"Journal of Intelligent Systems","volume":"55 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83832482","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
Journal of Intelligent Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1