首页 > 最新文献

2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications最新文献

英文 中文
Neural-based iterative approach for iris detection in iris recognition systems 虹膜识别系统中基于神经的迭代虹膜检测方法
R. D. Labati, V. Piuri, F. Scotti
The detection of the iris boundaries is considered in the literature as one of the most critical steps in the identification task of the iris recognition systems. In this paper we present an iterative approach to the detection of the iris center and boundaries by using neural networks. The proposed algorithm starts by an initial random point in the input image, then it processes a set of local image properties in a circular region of interest searching for the peculiar transition patterns of the iris boundaries. A trained neural network processes the parameters associated to the extracted boundaries and it estimates the offsets in the vertical and horizontal axis with respect to the estimated center. The coordinates of the starting point are then updated with the processed offsets. The steps are then iterated for a fixed number of epochs, producing an iterative refinements of the coordinates of the pupils center and its boundaries. Experiments showed that the method is feasible and it can be exploited even in non-ideal operative condition of iris recognition biometric systems.
在文献中,虹膜边界的检测被认为是虹膜识别系统识别任务中最关键的步骤之一。本文提出了一种利用神经网络迭代检测虹膜中心和边界的方法。该算法从输入图像的一个初始随机点开始,然后在感兴趣的圆形区域内处理一组局部图像属性,搜索虹膜边界的特殊过渡模式。经过训练的神经网络处理与提取的边界相关的参数,并估计相对于估计的中心在垂直和水平轴上的偏移量。然后用处理后的偏移量更新起点的坐标。然后,这些步骤迭代固定数量的时代,产生瞳孔中心及其边界坐标的迭代细化。实验结果表明,该方法是可行的,即使在虹膜识别生物特征系统的非理想工作条件下也能被利用。
{"title":"Neural-based iterative approach for iris detection in iris recognition systems","authors":"R. D. Labati, V. Piuri, F. Scotti","doi":"10.1109/CISDA.2009.5356533","DOIUrl":"https://doi.org/10.1109/CISDA.2009.5356533","url":null,"abstract":"The detection of the iris boundaries is considered in the literature as one of the most critical steps in the identification task of the iris recognition systems. In this paper we present an iterative approach to the detection of the iris center and boundaries by using neural networks. The proposed algorithm starts by an initial random point in the input image, then it processes a set of local image properties in a circular region of interest searching for the peculiar transition patterns of the iris boundaries. A trained neural network processes the parameters associated to the extracted boundaries and it estimates the offsets in the vertical and horizontal axis with respect to the estimated center. The coordinates of the starting point are then updated with the processed offsets. The steps are then iterated for a fixed number of epochs, producing an iterative refinements of the coordinates of the pupils center and its boundaries. Experiments showed that the method is feasible and it can be exploited even in non-ideal operative condition of iris recognition biometric systems.","PeriodicalId":6407,"journal":{"name":"2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications","volume":"328 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2009-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76547784","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Incremental adaptation of fuzzy ARTMAP neural networks for video-based face classification 基于视频的模糊ARTMAP神经网络增量自适应人脸分类
J. Connolly, Eric Granger, R. Sabourin
In many practical applications, new training data is acquired at different points in time, after a classification system has originally been trained. For instance, in face recognition systems, new training data may become available to enroll or to update knowledge of an individual. In this paper, a neural network classifier applied to video-based face recognition is adapted through supervised incremental learning of real-world video data. A training strategy based on particle swarm optimization is employed to co-optimize the weights, architecture and hyperparameters of the fuzzy ARTMAP network during incremental learning of new data. The performance of fuzzy ARTMAP is compared under different class update scenarios when incremental learning is performed according to 3 cases-(A) hyperparameters set to standard values, (B) hyperparameters optimized only at the beginning of the learning process with all classes, and (C) hyperparameters re-optimized whenever new training data becomes available. Overall results indicate that when samples from each individual enrolled to the system are employed for optimization, a higher classification rate is achieved and the solutions produced are more robust to variations caused by pattern presentation order. When all classes are refined equally, this is true with incremental learning according to case (C), whereas, if one class is refined at a time, best performance is obtained with case (B). However, optimizing hyperparameters requires more resources: several training sequences are needed to find the optimal solution and fuzzy ARTMAP with hyperparameters optimized according to classification rate tends to generate a high number of category nodes over longer convergence time.
在许多实际应用中,新的训练数据是在分类系统最初训练后的不同时间点获得的。例如,在人脸识别系统中,新的训练数据可以用于注册或更新个人的知识。本文通过对真实视频数据的监督式增量学习,将神经网络分类器应用于基于视频的人脸识别。在新数据增量学习过程中,采用基于粒子群优化的训练策略对模糊ARTMAP网络的权值、结构和超参数进行协同优化。根据三种情况(A)将超参数设置为标准值,(B)仅在所有类的学习过程开始时进行超参数优化,(C)在有新的训练数据时重新优化超参数)进行增量学习,比较了模糊ARTMAP在不同类更新场景下的性能。总体结果表明,当使用系统中每个个体的样本进行优化时,实现了更高的分类率,并且生成的解对模式呈现顺序引起的变化具有更强的鲁棒性。当所有的类都被同等地细化时,根据情形(C)的增量学习是正确的,而如果一次细化一个类,则用情形(B)获得最佳性能。然而,优化超参数需要更多的资源:需要多个训练序列来找到最优解,并且根据分类率优化的超参数模糊ARTMAP倾向于在较长的收敛时间内生成大量的类别节点。
{"title":"Incremental adaptation of fuzzy ARTMAP neural networks for video-based face classification","authors":"J. Connolly, Eric Granger, R. Sabourin","doi":"10.1109/CISDA.2009.5356545","DOIUrl":"https://doi.org/10.1109/CISDA.2009.5356545","url":null,"abstract":"In many practical applications, new training data is acquired at different points in time, after a classification system has originally been trained. For instance, in face recognition systems, new training data may become available to enroll or to update knowledge of an individual. In this paper, a neural network classifier applied to video-based face recognition is adapted through supervised incremental learning of real-world video data. A training strategy based on particle swarm optimization is employed to co-optimize the weights, architecture and hyperparameters of the fuzzy ARTMAP network during incremental learning of new data. The performance of fuzzy ARTMAP is compared under different class update scenarios when incremental learning is performed according to 3 cases-(A) hyperparameters set to standard values, (B) hyperparameters optimized only at the beginning of the learning process with all classes, and (C) hyperparameters re-optimized whenever new training data becomes available. Overall results indicate that when samples from each individual enrolled to the system are employed for optimization, a higher classification rate is achieved and the solutions produced are more robust to variations caused by pattern presentation order. When all classes are refined equally, this is true with incremental learning according to case (C), whereas, if one class is refined at a time, best performance is obtained with case (B). However, optimizing hyperparameters requires more resources: several training sequences are needed to find the optimal solution and fuzzy ARTMAP with hyperparameters optimized according to classification rate tends to generate a high number of category nodes over longer convergence time.","PeriodicalId":6407,"journal":{"name":"2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications","volume":"55 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2009-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85645086","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Online biometric authentication using hand vein patterns 使用手部静脉模式的在线生物识别认证
Amioy Kumar, M. Hanmandlu, H. Gupta
Online authentication is one of the basic requirements for any biometric based authentication system used in civil and commercial applications. This paper presents a new approach for online biometric authentication using hand vein patterns. In contrast to the existing approaches, our online authentication system utilizes infrared thermal images of hand vein patterns for authentication purposes. A robust peg free camera set up is employed for infrared thermal imaging. A region of interest (ROI) is extracted from the vein patterns to convolve with Gabor filter for improving the visibility of vein pattern. The outcome of this convolution is the real and imaginary parts of which only the real part is regarded as a texture. Gabor Wavelets at different orientations are convolved with the real part after partitioning it into non-overlapping windows to extract texture. The mean of the convolution on each window is taken as a feature. The experimental results on 100 users conform to the false acceptance error rate (FAR) of 0.1% for the genuine acceptance rate (GAR) of 98.5%.
在线认证是民用和商业应用中基于生物识别的认证系统的基本要求之一。本文提出了一种利用手部静脉图案进行在线生物识别认证的新方法。与现有方法相比,我们的在线认证系统利用手静脉模式的红外热图像进行认证。红外热成像采用了一种坚固的无钉摄像机装置。通过提取感兴趣区域(ROI)与Gabor滤波器进行卷积,提高了静脉模式的可见性。这个卷积的结果是实部和虚部,其中只有实部被视为纹理。将不同方向的Gabor小波分割成不重叠的窗口后与实部进行卷积提取纹理。将每个窗口上的卷积均值作为特征。100名用户的实验结果符合真实接受率(GAR)为98.5%,虚假接受错误率(FAR)为0.1%。
{"title":"Online biometric authentication using hand vein patterns","authors":"Amioy Kumar, M. Hanmandlu, H. Gupta","doi":"10.1109/CISDA.2009.5356554","DOIUrl":"https://doi.org/10.1109/CISDA.2009.5356554","url":null,"abstract":"Online authentication is one of the basic requirements for any biometric based authentication system used in civil and commercial applications. This paper presents a new approach for online biometric authentication using hand vein patterns. In contrast to the existing approaches, our online authentication system utilizes infrared thermal images of hand vein patterns for authentication purposes. A robust peg free camera set up is employed for infrared thermal imaging. A region of interest (ROI) is extracted from the vein patterns to convolve with Gabor filter for improving the visibility of vein pattern. The outcome of this convolution is the real and imaginary parts of which only the real part is regarded as a texture. Gabor Wavelets at different orientations are convolved with the real part after partitioning it into non-overlapping windows to extract texture. The mean of the convolution on each window is taken as a feature. The experimental results on 100 users conform to the false acceptance error rate (FAR) of 0.1% for the genuine acceptance rate (GAR) of 98.5%.","PeriodicalId":6407,"journal":{"name":"2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications","volume":"39 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2009-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87463503","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 41
Iris biometric authentication based on local global graphs: An FPGA implementation 基于局部全局图的虹膜生物识别认证:FPGA实现
R. Kannavara, N. Bourbakis
In this work, we present a Local-Global (LG) graph methodology for iris based biometric authentication. Local-Global (LG) graph method adds local part information into a global graph. Local graphs of the pre-processed iris images are first calculated by feature extraction and combined to form a Global graph that is stored in a database for the purpose of authentication. The Global graph of the presented test image is compared with the Global graph of the stored reference image and based on a distance metric, the authenticity of the subject is established.
在这项工作中,我们提出了一种基于虹膜的生物识别认证的局部全局(LG)图方法。局部-全局(LG)图法将局部零件信息添加到全局图中。首先通过特征提取计算预处理虹膜图像的局部图,并将其组合成全局图,存储在数据库中用于身份验证。将测试图像的全局图与存储的参考图像的全局图进行比较,并基于距离度量来确定受试者的真实性。
{"title":"Iris biometric authentication based on local global graphs: An FPGA implementation","authors":"R. Kannavara, N. Bourbakis","doi":"10.1109/CISDA.2009.5356550","DOIUrl":"https://doi.org/10.1109/CISDA.2009.5356550","url":null,"abstract":"In this work, we present a Local-Global (LG) graph methodology for iris based biometric authentication. Local-Global (LG) graph method adds local part information into a global graph. Local graphs of the pre-processed iris images are first calculated by feature extraction and combined to form a Global graph that is stored in a database for the purpose of authentication. The Global graph of the presented test image is compared with the Global graph of the stored reference image and based on a distance metric, the authenticity of the subject is established.","PeriodicalId":6407,"journal":{"name":"2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications","volume":"14 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2009-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82106917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Evolution and evaluation of biometric systems 生物识别系统的进化与评价
D. Gorodnichy
Biometric systems have evolved significantly over the past years: from single-sample fully-controlled verification matchers to a wide range of multi-sample multi-modal fully-automated person recognition systems working in a diverse range of unconstrained environments and behaviors. The methodology for biometric system evaluation however has remained practically unchanged, still being largely limited to reporting false match and non-match rates only and the tradeoff curves based thereon. Such methodology may no longer be sufficient and appropriate for investigating the performance of state-of-the-art systems. This paper addresses this gap by establishing taxonomy of biometric systems and proposing a baseline methodology that can be applied to the majority of contemporary biometric systems to obtain an all-inclusive description of their performance. In doing that, a novel concept of multi-order performance analysis is introduced and the results obtained from a large-scale iris biometric system examination are presented.
生物识别系统在过去几年中发生了重大变化:从单样本完全控制的验证匹配器到广泛的多样本多模式全自动人员识别系统,可在各种不受约束的环境和行为中工作。然而,生物识别系统评估的方法几乎保持不变,仍然主要限于报告虚假匹配率和非匹配率以及基于此的权衡曲线。这种方法对于调查最先进系统的性能可能不再是充分和适当的。本文通过建立生物识别系统的分类法并提出一种基线方法来解决这一差距,该方法可应用于大多数当代生物识别系统,以获得对其性能的全面描述。在此过程中,引入了一种新的多阶性能分析概念,并给出了大规模虹膜生物识别系统检测的结果。
{"title":"Evolution and evaluation of biometric systems","authors":"D. Gorodnichy","doi":"10.1109/CISDA.2009.5356531","DOIUrl":"https://doi.org/10.1109/CISDA.2009.5356531","url":null,"abstract":"Biometric systems have evolved significantly over the past years: from single-sample fully-controlled verification matchers to a wide range of multi-sample multi-modal fully-automated person recognition systems working in a diverse range of unconstrained environments and behaviors. The methodology for biometric system evaluation however has remained practically unchanged, still being largely limited to reporting false match and non-match rates only and the tradeoff curves based thereon. Such methodology may no longer be sufficient and appropriate for investigating the performance of state-of-the-art systems. This paper addresses this gap by establishing taxonomy of biometric systems and proposing a baseline methodology that can be applied to the majority of contemporary biometric systems to obtain an all-inclusive description of their performance. In doing that, a novel concept of multi-order performance analysis is introduced and the results obtained from a large-scale iris biometric system examination are presented.","PeriodicalId":6407,"journal":{"name":"2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications","volume":"8 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2009-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82576209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 37
Evolving TCP/IP packets: A case study of port scans 不断发展的TCP/IP数据包:端口扫描的案例研究
P. LaRoche, A. N. Zincir-Heywood, M. Heywood
In this work, we investigate the ability of genetic programming techniques to evolve valid network packets, including all relevant header values, towards a specific goal. We see this as a first step in building a fuzzing system that can learn to adapt for vulnerability analysis. By developing a system that learns the packets that are required to be transmitted towards targets, using feedback from an external network source, we make a step towards having a system that can intelligently explore the capabilities of a given security system. In order to validate our system's capabilities we evolve a variety of port scan patterns while running the packets through an IDS, with the goal to minimizes the alarms raised during the scanning process. Results show that the system not only successfully evolves valid TCP packets, but also remains stealthy in its activity.
在这项工作中,我们研究了遗传编程技术进化有效网络数据包的能力,包括所有相关的报头值,以实现特定目标。我们认为这是建立模糊测试系统的第一步,该系统可以学习适应脆弱性分析。通过开发一个系统来学习需要向目标传输的数据包,使用来自外部网络源的反馈,我们向拥有一个可以智能地探索给定安全系统功能的系统迈出了一步。为了验证系统的功能,我们在通过IDS运行数据包时开发了各种端口扫描模式,目的是尽量减少扫描过程中产生的警报。结果表明,该系统不仅能够成功地演化出有效的TCP数据包,而且在其活动中保持了隐身性。
{"title":"Evolving TCP/IP packets: A case study of port scans","authors":"P. LaRoche, A. N. Zincir-Heywood, M. Heywood","doi":"10.1109/CISDA.2009.5356541","DOIUrl":"https://doi.org/10.1109/CISDA.2009.5356541","url":null,"abstract":"In this work, we investigate the ability of genetic programming techniques to evolve valid network packets, including all relevant header values, towards a specific goal. We see this as a first step in building a fuzzing system that can learn to adapt for vulnerability analysis. By developing a system that learns the packets that are required to be transmitted towards targets, using feedback from an external network source, we make a step towards having a system that can intelligently explore the capabilities of a given security system. In order to validate our system's capabilities we evolve a variety of port scan patterns while running the packets through an IDS, with the goal to minimizes the alarms raised during the scanning process. Results show that the system not only successfully evolves valid TCP packets, but also remains stealthy in its activity.","PeriodicalId":6407,"journal":{"name":"2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications","volume":"2 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2009-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89530061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Feature selection and classification in genetic programming: Application to haptic-based biometric data 遗传规划中的特征选择与分类:在基于触觉的生物特征数据中的应用
F. A. Alsulaiman, N. Sakr, J. J. Valdés, Abdulmotaleb El Saddik, N. Georganas
In this paper, a study is conducted in order to explore the use of genetic programming, in particular gene expression programming (GEP), in finding analytic functions that can behave as classifiers in high-dimensional haptic feature spaces. More importantly, the determined explicit functions are used in discovering minimal knowledge-preserving subsets of features from very high dimensional haptic datasets, thus acting as general dimensionality reducers. This approach is applied to the haptic-based biometrics problem; namely, in user identity verification. GEP models are initially generated using the original haptic biometric datatset, which is imbalanced in terms of the number of representative instances of each class. This procedure was repeated while considering an under-sampled (balanced) version of the datasets. The results demonstrated that for all datasets, whether imbalanced or under-sampled, a certain number (on average) of perfect classification models were determined. In addition, using GEP, great feature reduction was achieved as the generated analytic functions (classifiers) exploited only a small fraction of the available features.
本文进行了一项研究,旨在探索遗传规划,特别是基因表达规划(GEP)在寻找高维触觉特征空间中可以作为分类器的分析函数中的使用。更重要的是,确定的显式函数用于从非常高维的触觉数据集中发现最小的知识保留特征子集,从而充当一般的降维器。该方法应用于基于触觉的生物识别问题;即在用户身份验证中。GEP模型最初是使用原始的触觉生物特征数据集生成的,这些数据集在每个类别的代表性实例数量方面是不平衡的。在考虑数据集的欠采样(平衡)版本时,重复此过程。结果表明,对于所有数据集,无论是不平衡还是欠采样,都确定了一定数量(平均)的完美分类模型。此外,使用GEP,由于生成的分析函数(分类器)只利用了可用特征的一小部分,因此实现了很大的特征缩减。
{"title":"Feature selection and classification in genetic programming: Application to haptic-based biometric data","authors":"F. A. Alsulaiman, N. Sakr, J. J. Valdés, Abdulmotaleb El Saddik, N. Georganas","doi":"10.1109/CISDA.2009.5356540","DOIUrl":"https://doi.org/10.1109/CISDA.2009.5356540","url":null,"abstract":"In this paper, a study is conducted in order to explore the use of genetic programming, in particular gene expression programming (GEP), in finding analytic functions that can behave as classifiers in high-dimensional haptic feature spaces. More importantly, the determined explicit functions are used in discovering minimal knowledge-preserving subsets of features from very high dimensional haptic datasets, thus acting as general dimensionality reducers. This approach is applied to the haptic-based biometrics problem; namely, in user identity verification. GEP models are initially generated using the original haptic biometric datatset, which is imbalanced in terms of the number of representative instances of each class. This procedure was repeated while considering an under-sampled (balanced) version of the datasets. The results demonstrated that for all datasets, whether imbalanced or under-sampled, a certain number (on average) of perfect classification models were determined. In addition, using GEP, great feature reduction was achieved as the generated analytic functions (classifiers) exploited only a small fraction of the available features.","PeriodicalId":6407,"journal":{"name":"2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications","volume":"34 12 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2009-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83007294","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Dynamical networks as a tool for system analysis and exploration 动态网络作为系统分析和探索的工具
I. Pestov, S. Verga
This paper attempts to bring together methods and tools across three selected areas of Computational Intelligence pertaining to complex systems: dynamical networks, statistical machine learning, and multi-agent technologies. The paper begins with a discussion of computational challenges arising from growing complexity in modern operating environments. Then the discussion proceeds to an overview of intelligent tools that can be used to address these challenges. The emphasis is given to dynamical networks as the means for consolidating ideas and approaches. An illustrative example shows how the network-based tools can be used to model complex socio-technical systems, to identify hidden interdependencies among their components, and to explore their vulnerabilities in simulations.
本文试图将与复杂系统相关的计算智能的三个选定领域的方法和工具结合在一起:动态网络、统计机器学习和多智能体技术。本文首先讨论了现代操作环境中日益复杂的计算挑战。然后,讨论继续对可用于解决这些挑战的智能工具进行概述。重点是动态网络作为巩固思想和方法的手段。一个说明性的例子展示了如何使用基于网络的工具来模拟复杂的社会技术系统,识别其组件之间隐藏的相互依赖关系,并在模拟中探索其漏洞。
{"title":"Dynamical networks as a tool for system analysis and exploration","authors":"I. Pestov, S. Verga","doi":"10.1109/CISDA.2009.5356527","DOIUrl":"https://doi.org/10.1109/CISDA.2009.5356527","url":null,"abstract":"This paper attempts to bring together methods and tools across three selected areas of Computational Intelligence pertaining to complex systems: dynamical networks, statistical machine learning, and multi-agent technologies. The paper begins with a discussion of computational challenges arising from growing complexity in modern operating environments. Then the discussion proceeds to an overview of intelligent tools that can be used to address these challenges. The emphasis is given to dynamical networks as the means for consolidating ideas and approaches. An illustrative example shows how the network-based tools can be used to model complex socio-technical systems, to identify hidden interdependencies among their components, and to explore their vulnerabilities in simulations.","PeriodicalId":6407,"journal":{"name":"2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications","volume":"71 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2009-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84934374","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Fast localization in indoor environments 室内环境快速定位
R. Elias, A. Elnahas
In this paper, we propose an algorithm for fast indoor localization. The algorithm does not require any sensors to be installed; instead, localization is determined using image matching. Our system studies (or learns) the indoor environment through detecting image junctions using the so-called JUDOCA detector. Any 2-edge junction forms a triangle that can be used to store information and recognize the environment afterwards. Correlation is applied to points denoted with respect to one side of the triangle formed by the junction. Experiments show that this approach reaches similar accuracy of the affine-based correlation approach in less processing time.
本文提出了一种快速室内定位算法。该算法不需要安装任何传感器;相反,定位是使用图像匹配确定的。我们的系统通过使用所谓的JUDOCA探测器检测图像结点来研究(或学习)室内环境。任何两边交界处形成一个三角形,可以用来存储信息,并在之后识别环境。关联应用于相对于由结形成的三角形的一边表示的点。实验表明,该方法在较短的处理时间内达到了与仿射相关方法相似的精度。
{"title":"Fast localization in indoor environments","authors":"R. Elias, A. Elnahas","doi":"10.1109/CISDA.2009.5356553","DOIUrl":"https://doi.org/10.1109/CISDA.2009.5356553","url":null,"abstract":"In this paper, we propose an algorithm for fast indoor localization. The algorithm does not require any sensors to be installed; instead, localization is determined using image matching. Our system studies (or learns) the indoor environment through detecting image junctions using the so-called JUDOCA detector. Any 2-edge junction forms a triangle that can be used to store information and recognize the environment afterwards. Correlation is applied to points denoted with respect to one side of the triangle formed by the junction. Experiments show that this approach reaches similar accuracy of the affine-based correlation approach in less processing time.","PeriodicalId":6407,"journal":{"name":"2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications","volume":"45 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2009-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85247127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Minimizing risk on a fleet mix problem with a multiobjective evolutionary algorithm 基于多目标进化算法的机群混合问题风险最小化
M. Mazurek, S. Wesolkowski
We apply the non-dominated sorting genetic algorithm-II (NSGA-II) to perform a multiobjective optimization of the Stochastic Fleet Estimation (SaFE) model. SaFE is a Monte Carlo-based model which generates a vehicle fleet based on the set of requirements that the fleet is supposed to accomplish. We search for Pareto-optimal combinations of valid platform-assignments for a list of tasks, which can be applied to complete scenarios output by SaFE. Solutions are evaluated on three objectives, with the goal of minimizing fleet cost, total task duration time, and the risk that a solution will not be able to accomplish possible future scenarios.
我们应用非支配排序遗传算法- ii (NSGA-II)对随机舰队估计(SaFE)模型进行多目标优化。SaFE是一个基于蒙特卡罗的模型,它根据车队应该完成的要求集生成车队。我们为一组任务搜索有效平台分配的帕累托最优组合,这些任务可以应用于由SaFE输出的完整场景。解决方案根据三个目标进行评估,目标是最小化车队成本、总任务持续时间和解决方案无法完成未来可能场景的风险。
{"title":"Minimizing risk on a fleet mix problem with a multiobjective evolutionary algorithm","authors":"M. Mazurek, S. Wesolkowski","doi":"10.1109/CISDA.2009.5356525","DOIUrl":"https://doi.org/10.1109/CISDA.2009.5356525","url":null,"abstract":"We apply the non-dominated sorting genetic algorithm-II (NSGA-II) to perform a multiobjective optimization of the Stochastic Fleet Estimation (SaFE) model. SaFE is a Monte Carlo-based model which generates a vehicle fleet based on the set of requirements that the fleet is supposed to accomplish. We search for Pareto-optimal combinations of valid platform-assignments for a list of tasks, which can be applied to complete scenarios output by SaFE. Solutions are evaluated on three objectives, with the goal of minimizing fleet cost, total task duration time, and the risk that a solution will not be able to accomplish possible future scenarios.","PeriodicalId":6407,"journal":{"name":"2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications","volume":"454 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2009-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82941461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
期刊
2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1