9,534 research outputs found

    Quality of Experience in Cyber-Physical Social Systems: A Cultural Heritage Space Use Case

    Get PDF
    In this PhD thesis, the focus is placed on the optimization of user Quality of Experience (QoE) in Cyber Physical Social Systems and speci cally in cultural heritage spaces. In order to achieve maximization of visitor perceived satisfaction, the challenges associated with visitor optimal decision making regarding touring choices and strategies in a museum or a cultural heritage space are examined and the problem of museum congestion is αddressed. Cultural heritage spaces, and museums in particular, constitute a special type of socio-physical system because, in contrast to other social systems like schools or churches, user experience is primarily controlled by the visitors themselves. Such a system also embodies both human behaviors and physical and technical constraints, a fact that makes adopting a socio-technical perspective in order to improve the visiting experience, essential. Within the above setting, quantitative models and functions are initially formulated to express the visitor experience that is gained throughout a touring process. The functions are based on several socio-physical and behavioral factors. Using this QoE modeling approach, the problem of how to optimise visitor route choices is addressed. A social recommendation and personalization framework is also presented that exploits common visitor characteristics and recommends a set of exhibits to be visited. The creation of self-organizing museum visitor communities are proposed as a means to enhance the visiting experience. They exploit visitor personal characteristics and social interactions and are based on a participatory action research (PAR) process. Recommendation Selection and Visiting Time Management (RSVTM) are combined and formulated into a two-stage distributed algorithm, based on game theory and reinforcement learning. In addition, this PhD thesis examines the problem of congestion management in cultural heritage spaces from a more pragmatic perspective, considering visitor behavioral characteristics and risk preferences. The motivation behind this approach arose from the observation that, in cultural heritage spaces, people interact with each other and consequently the decisions and behavior of one visitor influence and are influenced by others. It is, therefore, important to understand the unknown behavior tendencies of visitors especially when making decisions in order to improve their visiting experience and reduce museum congestion. The proposed mechanisms are founded on and powered by the principles of Prospect Theory and the Tragedy of the Commons. Particular attention is paid to modeling and capturing visitor behaviors and decision making under the potential risks and uncertainties which are typically encountered by visitors during their visit. According to their relative popularity and attractiveness, exhibits at a cultural heritage site are classi ed into two main categories: safe exhibits and Common Pool of Resources (CPR) exhibits. CPR exhibits are considered non-excludable and rivalrous in nature, meaning that they may experience "failure" due to over-exploitation. As a result, a visitor's decision to invest time at a CPR exhibit is regarded as risky because his/her perceived satisfaction greatly depends on the cumulative time spent at it by all visitors. A non-cooperative game among the visitors is formulated and solved in a distributed manner in order to determine the optimal investment time at exhibits for each visitor, while maximizing the visitor's perceived satisfaction. Detailed numerical results are presented, which provide useful insights into visitor behaviors and how these influence visitor perceived satisfaction, as well as museum congestion. Finally, pricing is introduced as an effective mechanism to address the problem of museum congestion. Motivated by several studies that position pricing as a mechanism to prevent overcrowding in museums, this thesis analyzes and studies the impact of different pricing policies on visitor decisions when they act as prospect-theoretic decision-makers. The theory of S-modular games is adopted to determine the time invested by each visitor at exhibits while maximizing satisfaction gained

    A Qualitative Analysis of Online Gaming:

    Get PDF
    The popularity of Massively Multi-Player Online Role-Playing Games (MMORPGs) has risen dramatically over the last decade. Some gamers spend many hours a day in these virtual environments interacting with others gamers, completing quests, and forming social groups. The present study set out to explore the experiences and feelings of online gamers. The study comprised 71 interviews with online gamers (52 males and 19 females) from 11 different countries. Many themes emerged from the analyses of the interview transcripts including (i) relationship with social networking, (ii) social interaction, (iii) the community, (iv) learning real-life skills, (v) reinforcement schedules and operant conditioning, (vi) game design and content, (vii) escaping from real life, (viii) playing longer than intended, and (ix) gamers’ obligations towards others in online worlds. These findings specifically showed the social networking capabilities of online gaming, the community aspects and the psychological mechanisms within MMORPGs that can lead to excessive online gaming. The implications of these findings are discussed in relation to previous qualitative and quantitative research in the area

    Reinforcement Learning and Game Theory for Smart Grid Security

    Get PDF
    This dissertation focuses on one of the most critical and complicated challenges facing electric power transmission and distribution systems which is their vulnerability against failure and attacks. Large scale power outages in Australia (2016), Ukraine (2015), India (2013), Nigeria (2018), and the United States (2011, 2003) have demonstrated the vulnerability of power grids to cyber and physical attacks and failures. These incidents clearly indicate the necessity of extensive research efforts to protect the power system from external intrusion and to reduce the damages from post-attack effects. We analyze the vulnerability of smart power grids to cyber and physical attacks and failures, design different gametheoretic approaches to identify the critical components vulnerable to attack and propose their associated defense strategy, and utilizes machine learning techniques to solve the game-theoretic problems in adversarial and collaborative adversarial power grid environment. Our contributions can be divided into three major parts:Vulnerability identification: Power grid outages have disastrous impacts on almost every aspect of modern life. Despite their inevitability, the effects of failures on power grids’ performance can be limited if the system operator can predict and identify the vulnerable elements of power grids. To enable these capabilities we study machine learning algorithms to identify critical power system elements adopting a cascaded failure simulator as a threat and attack model. We use generation loss, time to reach a certain percentage of line outage/generation loss, number of line outages, etc. as evaluation metrics to evaluate the consequences of threat and attacks on the smart power grid.Adversarial gaming in power system: With the advancement of the technologies, the smart attackers are deploying different techniques to supersede the existing protection scheme. In order to defend the power grid from these smart attackers, we introduce an adversarial gaming environment using machine learning techniques which is capable of replicating the complex interaction between the attacker and the power system operators. The numerical results show that a learned defender successfully narrows down the attackers’ attack window and reduce damages. The results also show that considering some crucial factors, the players can independently execute actions without detailed information about each other.Deep learning for adversarial gaming: The learning and gaming techniques to identify vulnerable components in the power grid become computationally expensive for large scale power systems. The power system operator needs to have the advanced skills to deal with the large dimensionality of the problem. In order to aid the power system operator in finding and analyzing vulnerability for large scale power systems, we study a deep learning technique for adversary game which is capable of dealing with high dimensional power system state space with less computational time and increased computational efficiency. Overall, the results provided in this dissertation advance power grids’ resilience and security by providing a better understanding of the systems’ vulnerability and by developing efficient algorithms to identify vulnerable components and appropriate defensive strategies to reduce the damages of the attack

    Strategic Learning for Active, Adaptive, and Autonomous Cyber Defense

    Full text link
    The increasing instances of advanced attacks call for a new defense paradigm that is active, autonomous, and adaptive, named as the \texttt{`3A'} defense paradigm. This chapter introduces three defense schemes that actively interact with attackers to increase the attack cost and gather threat information, i.e., defensive deception for detection and counter-deception, feedback-driven Moving Target Defense (MTD), and adaptive honeypot engagement. Due to the cyber deception, external noise, and the absent knowledge of the other players' behaviors and goals, these schemes possess three progressive levels of information restrictions, i.e., from the parameter uncertainty, the payoff uncertainty, to the environmental uncertainty. To estimate the unknown and reduce uncertainty, we adopt three different strategic learning schemes that fit the associated information restrictions. All three learning schemes share the same feedback structure of sensation, estimation, and actions so that the most rewarding policies get reinforced and converge to the optimal ones in autonomous and adaptive fashions. This work aims to shed lights on proactive defense strategies, lay a solid foundation for strategic learning under incomplete information, and quantify the tradeoff between the security and costs.Comment: arXiv admin note: text overlap with arXiv:1906.1218

    Thirty Years of Machine Learning: The Road to Pareto-Optimal Wireless Networks

    Full text link
    Future wireless networks have a substantial potential in terms of supporting a broad range of complex compelling applications both in military and civilian fields, where the users are able to enjoy high-rate, low-latency, low-cost and reliable information services. Achieving this ambitious goal requires new radio techniques for adaptive learning and intelligent decision making because of the complex heterogeneous nature of the network structures and wireless services. Machine learning (ML) algorithms have great success in supporting big data analytics, efficient parameter estimation and interactive decision making. Hence, in this article, we review the thirty-year history of ML by elaborating on supervised learning, unsupervised learning, reinforcement learning and deep learning. Furthermore, we investigate their employment in the compelling applications of wireless networks, including heterogeneous networks (HetNets), cognitive radios (CR), Internet of things (IoT), machine to machine networks (M2M), and so on. This article aims for assisting the readers in clarifying the motivation and methodology of the various ML algorithms, so as to invoke them for hitherto unexplored services as well as scenarios of future wireless networks.Comment: 46 pages, 22 fig

    The Evolution of Artificial Intelligence and the Possibility of its Application in Cyber Games

    Get PDF
    Artificial intelligence, as a separate field of research, is currently experiencing a boom - new methods of machine learning and hardware are emerging and improving, and the results achieved change the life of society. Machine translation, handwriting recognition, speech recognition are changing our reality. The work of creating unmanned vehicles, voice assistants and other devices using these technologies is in an active process. The article examines the historical context of the artificial intelligence development, it evaluates the possibilities of its introduction into cyber games, as a safe and effective platform for testing new methods of machine learning. The promotion of such projects can increase the reputation of development companies, ensure increased user confidence in other products and, with a competent marketing strategy, cause a significant public resonance among video game fans, providing the developer with economic profit

    Challenging Social Media Threats using Collective Well-being Aware Recommendation Algorithms and an Educational Virtual Companion

    Full text link
    Social media (SM) have become an integral part of our lives, expanding our inter-linking capabilities to new levels. There is plenty to be said about their positive effects. On the other hand however, some serious negative implications of SM have repeatedly been highlighted in recent years, pointing at various SM threats for society, and its teenagers in particular: from common issues (e.g. digital addiction and polarization) and manipulative influences of algorithms to teenager-specific issues (e.g. body stereotyping). The full impact of current SM platform design -- both at an individual and societal level -- asks for a comprehensive evaluation and conceptual improvement. We extend measures of Collective Well-Being (CWB) to SM communities. As users' relationships and interactions are a central component of CWB, education is crucial to improve CWB. We thus propose a framework based on an adaptive "social media virtual companion" for educating and supporting the entire students' community to interact with SM. The virtual companion will be powered by a Recommender System (CWB-RS) that will optimize a CWB metric instead of engagement or platform profit, which currently largely drives recommender systems thereby disregarding any societal collateral effect. CWB-RS will optimize CWB both in the short term, by balancing the level of SM threat the students are exposed to, as well as in the long term, by adopting an Intelligent Tutor System role and enabling adaptive and personalized sequencing of playful learning activities. This framework offers an initial step on understanding how to design SM systems and embedded educational interventions that favor a more healthy and positive society
    corecore