首页 > 最新文献

2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications最新文献

英文 中文
Application of voiced-speech variability descriptors to emotion recognition 语音变异性描述符在情绪识别中的应用
K. Slot, J. Cichosz, L. Bronakowski
The following paper examines a possibility of applying phone-pronunciation variability descriptors in emotion classification. The proposed group of descriptors comprises a set of statistical parameters of Poincare maps, which are derived for evolution of formant-frequencies and energy of voiced-speech segments. Poincare maps are represented by means of four different parameters that summarize various aspects of plot's scatter. It has been shown that incorporation of the proposed features into a set of commonly-used emotional-speech descriptors, results in a substantial, ten-percent increase in emotion classification performance - recognition rates are at the order of 80% for six-category, speaker independent experiments.
下面的文章探讨了在情绪分类中应用语音变异性描述符的可能性。所提出的描述符组包括一组庞加莱映射的统计参数,这些参数是根据语音段的共振频率和能量的演变而导出的。庞加莱图是通过四个不同的参数来表示的,这些参数概括了图散点的各个方面。研究表明,将所提出的特征整合到一组常用的情绪-言语描述符中,可以显著提高10%的情绪分类性能——在六类独立于说话者的实验中,识别率达到80%左右。
{"title":"Application of voiced-speech variability descriptors to emotion recognition","authors":"K. Slot, J. Cichosz, L. Bronakowski","doi":"10.1109/CISDA.2009.5356537","DOIUrl":"https://doi.org/10.1109/CISDA.2009.5356537","url":null,"abstract":"The following paper examines a possibility of applying phone-pronunciation variability descriptors in emotion classification. The proposed group of descriptors comprises a set of statistical parameters of Poincare maps, which are derived for evolution of formant-frequencies and energy of voiced-speech segments. Poincare maps are represented by means of four different parameters that summarize various aspects of plot's scatter. It has been shown that incorporation of the proposed features into a set of commonly-used emotional-speech descriptors, results in a substantial, ten-percent increase in emotion classification performance - recognition rates are at the order of 80% for six-category, speaker independent experiments.","PeriodicalId":6407,"journal":{"name":"2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications","volume":"13 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2009-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81187552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Machine learning based encrypted traffic classification: Identifying SSH and Skype 基于机器学习的加密流量分类:识别SSH和Skype
Riyad Alshammari, A. N. Zincir-Heywood
The objective of this work is to assess the robustness of machine learning based traffic classification for classifying encrypted traffic where SSH and Skype are taken as good representatives of encrypted traffic. Here what we mean by robustness is that the classifiers are trained on data from one network but tested on data from an entirely different network. To this end, five learning algorithms — AdaBoost, Support Vector Machine, Naïe Bayesian, RIPPER and C4.5 — are evaluated using flow based features, where IP addresses, source/destination ports and payload information are not employed. Results indicate the C4.5 based approach performs much better than other algorithms on the identification of both SSH and Skype traffic on totally different networks.
这项工作的目的是评估基于机器学习的流量分类的鲁棒性,用于对加密流量进行分类,其中SSH和Skype被视为加密流量的良好代表。这里我们所说的鲁棒性是指分类器在来自一个网络的数据上进行训练,但在来自一个完全不同的网络的数据上进行测试。为此,五种学习算法- AdaBoost,支持向量机,Naïe贝叶斯,RIPPER和C4.5 -使用基于流的特征进行评估,其中不使用IP地址,源/目的端口和有效载荷信息。结果表明,基于C4.5的方法在识别完全不同网络上的SSH和Skype流量方面表现得比其他算法好得多。
{"title":"Machine learning based encrypted traffic classification: Identifying SSH and Skype","authors":"Riyad Alshammari, A. N. Zincir-Heywood","doi":"10.1109/CISDA.2009.5356534","DOIUrl":"https://doi.org/10.1109/CISDA.2009.5356534","url":null,"abstract":"The objective of this work is to assess the robustness of machine learning based traffic classification for classifying encrypted traffic where SSH and Skype are taken as good representatives of encrypted traffic. Here what we mean by robustness is that the classifiers are trained on data from one network but tested on data from an entirely different network. To this end, five learning algorithms — AdaBoost, Support Vector Machine, Naïe Bayesian, RIPPER and C4.5 — are evaluated using flow based features, where IP addresses, source/destination ports and payload information are not employed. Results indicate the C4.5 based approach performs much better than other algorithms on the identification of both SSH and Skype traffic on totally different networks.","PeriodicalId":6407,"journal":{"name":"2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications","volume":"93 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2009-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89237389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 185
Detection & study of DDoS attacks via entropy in data network models 基于数据网络模型熵的DDoS攻击检测与研究
A. Lawniczak, B. D. Stefano, Hao Wu
We detect & study packet traffic anomalies similar to DDoS attacks using information entropy. We perform network-wide monitoring of information entropy of packet traffic at a small number of selected routers. Our method is based on the fact that DDoS attacks change the “natural” order and randomness of packet traffic passing through monitored routers when an attack is taking place in the network. Through this change we detect the start of the attack and study its evolution. We conduct this study for packet-switching networks using static and dynamic routing.
我们使用信息熵检测和研究类似于DDoS攻击的数据包流量异常。我们在少数选定的路由器上对数据包流量的信息熵进行全网监测。我们的方法是基于这样一个事实:当网络中发生攻击时,DDoS攻击改变了通过被监控路由器的数据包流量的“自然”顺序和随机性。通过这种变化,我们可以检测到攻击的开始并研究其演变。我们对使用静态和动态路由的分组交换网络进行了这项研究。
{"title":"Detection & study of DDoS attacks via entropy in data network models","authors":"A. Lawniczak, B. D. Stefano, Hao Wu","doi":"10.1109/CISDA.2009.5356521","DOIUrl":"https://doi.org/10.1109/CISDA.2009.5356521","url":null,"abstract":"We detect & study packet traffic anomalies similar to DDoS attacks using information entropy. We perform network-wide monitoring of information entropy of packet traffic at a small number of selected routers. Our method is based on the fact that DDoS attacks change the “natural” order and randomness of packet traffic passing through monitored routers when an attack is taking place in the network. Through this change we detect the start of the attack and study its evolution. We conduct this study for packet-switching networks using static and dynamic routing.","PeriodicalId":6407,"journal":{"name":"2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications","volume":"1 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2009-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84895908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Traffic to protocol reverse engineering 流量到协议逆向工程
A. Trifilo, S. Burschka, E. Biersack
Network Protocol Reverse Engineering (NPRE) has played an increasing role in honeypot operations. It allows to automatically generate Statemodels and scripts being able to act as realistic counterpart for capturing unknown malware. This work proposes a novel approach in the field of NPRE. By passively listening to network traces, our system automatically derives the protocol state machines of the peers involved allowing the analyst to understand its intrinsic logic. We present a new methodology to extract the relevant fields from arbitrary binary protocols to construct a state model. We prove our methodology by deriving the state machine of documented protocols ARP, DHCP and TCP. We then apply it to Kademlia, the results show the usefulness to support binary reverse engineering processes and detect a new undocumented feature.
网络协议逆向工程(NPRE)在蜜罐操作中发挥着越来越重要的作用。它允许自动生成状态模型和脚本,能够作为捕获未知恶意软件的现实对应物。这项工作为NPRE领域提出了一种新的方法。通过被动地监听网络轨迹,我们的系统自动派生相关节点的协议状态机,允许分析人员理解其内在逻辑。提出了一种从任意二进制协议中提取相关字段来构建状态模型的新方法。我们通过推导ARP、DHCP和TCP协议的状态机来证明我们的方法。然后我们将其应用于Kademlia,结果表明它支持二进制逆向工程过程和检测新的未记录的特性的有用性。
{"title":"Traffic to protocol reverse engineering","authors":"A. Trifilo, S. Burschka, E. Biersack","doi":"10.1109/CISDA.2009.5356565","DOIUrl":"https://doi.org/10.1109/CISDA.2009.5356565","url":null,"abstract":"Network Protocol Reverse Engineering (NPRE) has played an increasing role in honeypot operations. It allows to automatically generate Statemodels and scripts being able to act as realistic counterpart for capturing unknown malware. This work proposes a novel approach in the field of NPRE. By passively listening to network traces, our system automatically derives the protocol state machines of the peers involved allowing the analyst to understand its intrinsic logic. We present a new methodology to extract the relevant fields from arbitrary binary protocols to construct a state model. We prove our methodology by deriving the state machine of documented protocols ARP, DHCP and TCP. We then apply it to Kademlia, the results show the usefulness to support binary reverse engineering processes and detect a new undocumented feature.","PeriodicalId":6407,"journal":{"name":"2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications","volume":"70 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2009-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89135717","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 42
Adaptive neural flight control system for helicopter 直升机自适应神经飞行控制系统
S. Suresh
This paper presents an adaptive neural flight control design for helicopters performing nonlinear maneuver. The control strategy uses a neural controller aiding an existing conventional controller. The neural controller uses a real-time learning dynamic radial basis function network, which uses Lyapunov based on-line update rule integrated with the neuron growth criterion. The real-time learning dynamic radial basis function network does not require a priori training and also find a compact network for implementation. The proposed adaptive law provide necessary global stability and better tracking performance. The simulation studies are carried-out using a nonlinear desktop simulation model. The performances of the proposed adaptive control mechanism clearly show that it is very effective when the helicopter is performing nonlinear maneuver.
提出了一种针对直升机非线性机动的自适应神经飞行控制设计方法。该控制策略使用神经控制器辅助现有的传统控制器。神经控制器采用实时学习的动态径向基函数网络,该网络采用基于Lyapunov的在线更新规则与神经元生长准则相结合。实时学习动态径向基函数网络不需要先验训练,也可以找到一个紧凑的网络来实现。所提出的自适应律提供了必要的全局稳定性和较好的跟踪性能。仿真研究采用非线性桌面仿真模型进行。仿真结果表明,所提出的自适应控制机制在直升机进行非线性机动时是非常有效的。
{"title":"Adaptive neural flight control system for helicopter","authors":"S. Suresh","doi":"10.1109/CISDA.2009.5356560","DOIUrl":"https://doi.org/10.1109/CISDA.2009.5356560","url":null,"abstract":"This paper presents an adaptive neural flight control design for helicopters performing nonlinear maneuver. The control strategy uses a neural controller aiding an existing conventional controller. The neural controller uses a real-time learning dynamic radial basis function network, which uses Lyapunov based on-line update rule integrated with the neuron growth criterion. The real-time learning dynamic radial basis function network does not require a priori training and also find a compact network for implementation. The proposed adaptive law provide necessary global stability and better tracking performance. The simulation studies are carried-out using a nonlinear desktop simulation model. The performances of the proposed adaptive control mechanism clearly show that it is very effective when the helicopter is performing nonlinear maneuver.","PeriodicalId":6407,"journal":{"name":"2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications","volume":"125 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2009-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77587579","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
He says, she says. Pat says, Tricia says. How much reference resolution matters for entity extraction, relation extraction, and social network analysis 他说,她说。帕特说,特里西亚说。参考分辨率对实体提取、关系提取和社会网络分析有多重要
J. Diesner, Kathleen M. Carley
Anaphora resolution (AR) identifies the entities that pronouns refer to. Coreference resolution (CR) associates the various instances of an entity with each other. Given our data, our findings suggest that deduplicating and normalizing text data by using AR and CR impacts the literal mention, frequency, identity, and existence of about 75% of the entities in texts. Results are more moderate on the relation level: 13% of the links are modified and 8% are removed. Performing social network analysis on the relations extracted from texts leads to findings contrary to the results from corpus statistics: AR and CR cause different directions in the change of network analytical measures, AR alters these measures more strongly than CR does, and each technique identifies a different set of most crucial nodes. Bringing the results from corpus statistics and social network analysis together suggests that CR is more effective in normalizing entities, while AR is a more powerful technique for splitting up generic nodes into named entities with adjusted weights. Data changes due to AR and CR are qualitatively and quantitatively meaningful: the statistical properties of entities and relations change along with their identities. Consequently, the relational data represent the underlying social structure more truthfully. Our results can support analysts in eliminating some misinterpretations of graphs distilled from texts and in selected those nodes from social networks on which reference resolution should be performed.
指代解析(AR)可以识别代词所指的实体。共同引用解析(CR)将实体的各个实例相互关联起来。根据我们的数据,我们的研究结果表明,使用AR和CR对文本数据进行重复删除和规范化会影响文本中约75%实体的字面提及、频率、身份和存在性。结果在关系层面上更为温和:13%的链接被修改,8%被删除。对从文本中提取的关系进行社会网络分析,结果与语料库统计结果相反:AR和CR导致网络分析指标变化的方向不同,AR对这些指标的改变比CR更强烈,每种技术都确定了一组不同的最关键节点。将语料库统计和社会网络分析的结果结合起来,表明CR在规范化实体方面更有效,而AR在将通用节点划分为具有调整权重的命名实体方面是一种更强大的技术。由于AR和CR导致的数据变化在定性和定量上都是有意义的:实体和关系的统计属性随着它们的身份而变化。因此,关系数据更真实地反映了潜在的社会结构。我们的结果可以支持分析人员消除对从文本中提取的图形的一些误解,并从应该执行参考解析的社交网络中选择那些节点。
{"title":"He says, she says. Pat says, Tricia says. How much reference resolution matters for entity extraction, relation extraction, and social network analysis","authors":"J. Diesner, Kathleen M. Carley","doi":"10.1109/CISDA.2009.5356530","DOIUrl":"https://doi.org/10.1109/CISDA.2009.5356530","url":null,"abstract":"Anaphora resolution (AR) identifies the entities that pronouns refer to. Coreference resolution (CR) associates the various instances of an entity with each other. Given our data, our findings suggest that deduplicating and normalizing text data by using AR and CR impacts the literal mention, frequency, identity, and existence of about 75% of the entities in texts. Results are more moderate on the relation level: 13% of the links are modified and 8% are removed. Performing social network analysis on the relations extracted from texts leads to findings contrary to the results from corpus statistics: AR and CR cause different directions in the change of network analytical measures, AR alters these measures more strongly than CR does, and each technique identifies a different set of most crucial nodes. Bringing the results from corpus statistics and social network analysis together suggests that CR is more effective in normalizing entities, while AR is a more powerful technique for splitting up generic nodes into named entities with adjusted weights. Data changes due to AR and CR are qualitatively and quantitatively meaningful: the statistical properties of entities and relations change along with their identities. Consequently, the relational data represent the underlying social structure more truthfully. Our results can support analysts in eliminating some misinterpretations of graphs distilled from texts and in selected those nodes from social networks on which reference resolution should be performed.","PeriodicalId":6407,"journal":{"name":"2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications","volume":"88 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2009-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90095128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Tracking a moving hypothesis for visual data with explicit switch detection 跟踪移动假设的视觉数据与显式开关检测
J. Rhinelander, P. X. Liu
The use of support vector (SV) methods has been successful in many areas involving pattern recognition. Video surveillance requires pattern recognition algorithms that are efficient in their operation, and requires the use of online processing for the detection and identification of events, objects, and behaviours. To successfully use SV methods in video surveillance, on-line training methods must be employed; NORMA [1] is one such training method. A video surveillance system represents a dynamic system with non-stationary characteristics. It is the purpose of our work to enhance NORMA to better adapt to sudden changes (switches) in the surveillance environment. We show that the decision hypothesis that NORMA generates is more accurate when a switch in the data is explicitly detected and managed. Our preliminary testing involves simulated data, real world benchmark data, and real video data captured from a digital camera.
支持向量(SV)方法在模式识别的许多领域都取得了成功。视频监控需要高效的模式识别算法,并且需要使用在线处理来检测和识别事件、对象和行为。为了在视频监控中成功应用SV方法,必须采用在线培训方法;NORMA[1]就是这样一种训练方法。视频监控系统是一个具有非平稳特性的动态系统。增强NORMA以更好地适应监视环境中的突然变化(开关)是我们工作的目的。我们表明,当显式检测和管理数据中的开关时,NORMA生成的决策假设更准确。我们的初步测试包括模拟数据、真实世界基准数据和从数码相机捕获的真实视频数据。
{"title":"Tracking a moving hypothesis for visual data with explicit switch detection","authors":"J. Rhinelander, P. X. Liu","doi":"10.1109/CISDA.2009.5356547","DOIUrl":"https://doi.org/10.1109/CISDA.2009.5356547","url":null,"abstract":"The use of support vector (SV) methods has been successful in many areas involving pattern recognition. Video surveillance requires pattern recognition algorithms that are efficient in their operation, and requires the use of online processing for the detection and identification of events, objects, and behaviours. To successfully use SV methods in video surveillance, on-line training methods must be employed; NORMA [1] is one such training method. A video surveillance system represents a dynamic system with non-stationary characteristics. It is the purpose of our work to enhance NORMA to better adapt to sudden changes (switches) in the surveillance environment. We show that the decision hypothesis that NORMA generates is more accurate when a switch in the data is explicitly detected and managed. Our preliminary testing involves simulated data, real world benchmark data, and real video data captured from a digital camera.","PeriodicalId":6407,"journal":{"name":"2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications","volume":"38 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2009-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83579047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Autonomous control laws for mobile robotic surveillance swarms 移动机器人监视群的自主控制律
R. Mullen, D. Monekosso, S. Barman, Paolo Remagnino
We investigate the use of artificial local forces governed by physics laws for the spatial formation and coordination of a swarm of VTOL UAVs for ground area surveillance applications. Varying parameter effects are investigated through simulation and a learning algorithm is introduced to optimise the swarms behaviour with respect to self-organising into the optimum formation for a given sized ROI to cover collectively.
我们研究了由物理定律控制的人工局部力的使用,用于地面区域监视应用的一群垂直起降无人机的空间形成和协调。通过模拟研究了不同参数的影响,并引入了一种学习算法来优化群体的自组织行为,使其成为给定大小的ROI覆盖的最佳编队。
{"title":"Autonomous control laws for mobile robotic surveillance swarms","authors":"R. Mullen, D. Monekosso, S. Barman, Paolo Remagnino","doi":"10.1109/CISDA.2009.5356555","DOIUrl":"https://doi.org/10.1109/CISDA.2009.5356555","url":null,"abstract":"We investigate the use of artificial local forces governed by physics laws for the spatial formation and coordination of a swarm of VTOL UAVs for ground area surveillance applications. Varying parameter effects are investigated through simulation and a learning algorithm is introduced to optimise the swarms behaviour with respect to self-organising into the optimum formation for a given sized ROI to cover collectively.","PeriodicalId":6407,"journal":{"name":"2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications","volume":"23 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2009-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88092422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
An optimisation model for airlift load planning: Galahad and the quest for the ‘holy grail’ 空运负荷规划的优化模型:加拉哈德和对“圣杯”的追求
Bohdan L. Kaluzny, R. H. A. D. Shaw, A. Ghanmi, Beomjoon Kim
This paper presents an aircraft load allocation optimisation model, which uses a hybrid of simulated annealing and genetic algorithm methods to solve a multi-objective optimisation problem associated with allocating a set of cargo items across a heterogeneous fleet of available airlift assets. It represents candidate solutions using macrochromosomes comprised of an ordered list of available transport assets followed by an ordered list of cargo items. A bin packing heuristic is used to map each individual to a point in asset-utilization space where a novel convex hull based fitness function is used to evaluate the relative quality of each individual and drive an elitist application of genetic operators on the population-including a novel extinction operation that infrequently culls solutions comprising of aircraft chalks that cannot be load balanced. Proof of concept computational results are presented.
本文提出了一种飞机负载分配优化模型,该模型使用模拟退火和遗传算法的混合方法来解决与在可用空运资产的异构机队中分配一组货物相关的多目标优化问题。它使用macrochromosome表示候选解决方案,macrochromosome由可用运输资产的有序列表和货物项的有序列表组成。装箱启发式用于将每个个体映射到资产利用空间中的一个点,其中使用基于新凸壳的适应度函数来评估每个个体的相对质量,并驱动种群上遗传算子的精英应用-包括一种新的灭绝操作,该操作很少剔除由无法负载平衡的飞机粉笔组成的解决方案。给出了概念验证的计算结果。
{"title":"An optimisation model for airlift load planning: Galahad and the quest for the ‘holy grail’","authors":"Bohdan L. Kaluzny, R. H. A. D. Shaw, A. Ghanmi, Beomjoon Kim","doi":"10.1109/CISDA.2009.5356562","DOIUrl":"https://doi.org/10.1109/CISDA.2009.5356562","url":null,"abstract":"This paper presents an aircraft load allocation optimisation model, which uses a hybrid of simulated annealing and genetic algorithm methods to solve a multi-objective optimisation problem associated with allocating a set of cargo items across a heterogeneous fleet of available airlift assets. It represents candidate solutions using macrochromosomes comprised of an ordered list of available transport assets followed by an ordered list of cargo items. A bin packing heuristic is used to map each individual to a point in asset-utilization space where a novel convex hull based fitness function is used to evaluate the relative quality of each individual and drive an elitist application of genetic operators on the population-including a novel extinction operation that infrequently culls solutions comprising of aircraft chalks that cannot be load balanced. Proof of concept computational results are presented.","PeriodicalId":6407,"journal":{"name":"2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications","volume":"46 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2009-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79117895","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Testing harbour patrol and interception policies using particle-swarm-based learning of cooperative behavior 使用基于粒子群的合作行为学习测试港口巡逻和拦截策略
T. Flanagan, C. Thornton, J. Denzinger
We present a general scheme for testing multiagent systems, respectively policies used by them, for unwanted emergent behavior using learning of cooperative behavior via particle swarm systems. By using particle swarm systems in this setting, we are able to create agents interacting/attacking the tested agents that can use parameterised high-level actions. We also can evaluate the quality of an attack using several measures that can be prioritised and used in a multi-objective manner in the search. This solves some general problems of other testing approaches using learning. We instantiate this general scheme to test harbour patrol and interception policies for two Canadian harbours, showing that our approach is able to find problems in these policies.
我们提出了一种测试多智能体系统的通用方案,分别使用它们使用的策略,通过粒子群系统学习合作行为来测试不必要的紧急行为。通过在此设置中使用粒子群系统,我们能够创建交互/攻击可以使用参数化高级操作的被测试代理的代理。我们还可以使用几种方法来评估攻击的质量,这些方法可以在搜索中以多目标的方式进行优先排序和使用。这解决了使用学习的其他测试方法的一些一般问题。我们实例化了这个通用方案来测试两个加拿大港口的港口巡逻和拦截政策,表明我们的方法能够发现这些政策中的问题。
{"title":"Testing harbour patrol and interception policies using particle-swarm-based learning of cooperative behavior","authors":"T. Flanagan, C. Thornton, J. Denzinger","doi":"10.1109/CISDA.2009.5356561","DOIUrl":"https://doi.org/10.1109/CISDA.2009.5356561","url":null,"abstract":"We present a general scheme for testing multiagent systems, respectively policies used by them, for unwanted emergent behavior using learning of cooperative behavior via particle swarm systems. By using particle swarm systems in this setting, we are able to create agents interacting/attacking the tested agents that can use parameterised high-level actions. We also can evaluate the quality of an attack using several measures that can be prioritised and used in a multi-objective manner in the search. This solves some general problems of other testing approaches using learning. We instantiate this general scheme to test harbour patrol and interception policies for two Canadian harbours, showing that our approach is able to find problems in these policies.","PeriodicalId":6407,"journal":{"name":"2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications","volume":"74 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2009-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88955616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
期刊
2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1