78 research outputs found
Toward enhancement of deep learning techniques using fuzzy logic: a survey
Deep learning has emerged recently as a type of artificial intelligence (AI) and machine learning (ML), it usually imitates the human way in gaining a particular knowledge type. Deep learning is considered an essential data science element, which comprises predictive modeling and statistics. Deep learning makes the processes of collecting, interpreting, and analyzing big data easier and faster. Deep neural networks are kind of ML models, where the non-linear processing units are layered for the purpose of extracting particular features from the inputs. Actually, the training process of similar networks is very expensive and it also depends on the used optimization method, hence optimal results may not be provided. The techniques of deep learning are also vulnerable to data noise. For these reasons, fuzzy systems are used to improve the performance of deep learning algorithms, especially in combination with neural networks. Fuzzy systems are used to improve the representation accuracy of deep learning models. This survey paper reviews some of the deep learning based fuzzy logic models and techniques that were presented and proposed in the previous studies, where fuzzy logic is used to improve deep learning performance. The approaches are divided into two categories based on how both of the samples are combined. Furthermore, the models' practicality in the actual world is revealed
Fuzzy Systems
This book presents some recent specialized works of theoretical study in the domain of fuzzy systems. Over eight sections and fifteen chapters, the volume addresses fuzzy systems concepts and promotes them in practical applications in the following thematic areas: fuzzy mathematics, decision making, clustering, adaptive neural fuzzy inference systems, control systems, process monitoring, green infrastructure, and medicine. The studies published in the book develop new theoretical concepts that improve the properties and performances of fuzzy systems. This book is a useful resource for specialists, engineers, professors, and students
Hybrid approaches based on computational intelligence and semantic web for distributed situation and context awareness
2011 - 2012The research work focuses on Situation Awareness and Context Awareness topics.
Specifically, Situation Awareness involves being aware of what is happening in the vicinity
to understand how information, events, and oneâs own actions will impact goals and objectives,
both immediately and in the near future. Thus, Situation Awareness is especially
important in application domains where the information flow can be quite high and poor
decisions making may lead to serious consequences.
On the other hand Context Awareness is considered a process to support user applications
to adapt interfaces, tailor the set of application-relevant data, increase the precision of
information retrieval, discover services, make the user interaction implicit, or build smart
environments.
Despite being slightly different, Situation and Context Awareness involve common
problems such as: the lack of a support for the acquisition and aggregation of dynamic environmental
information from the field (i.e. sensors, cameras, etc.); the lack of formal approaches
to knowledge representation (i.e. contexts, concepts, relations, situations, etc.)
and processing (reasoning, classification, retrieval, discovery, etc.); the lack of automated
and distributed systems, with considerable computing power, to support the reasoning on a
huge quantity of knowledge, extracted by sensor data.
So, the thesis researches new approaches for distributed Context and Situation Awareness
and proposes to apply them in order to achieve some related research objectives such
as knowledge representation, semantic reasoning, pattern recognition and information retrieval.
The research work starts from the study and analysis of state of art in terms of
techniques, technologies, tools and systems to support Context/Situation Awareness. The
main aim is to develop a new contribution in this field by integrating techniques deriving
from the fields of Semantic Web, Soft Computing and Computational Intelligence. From
an architectural point of view, several frameworks are going to be defined according to the
multi-agent paradigm.
Furthermore, some preliminary experimental results have been obtained in some application
domains such as Airport Security, Traffic Management, Smart Grids and
Healthcare.
Finally, future challenges is going to the following directions: Semantic Modeling of
Fuzzy Control, Temporal Issues, Automatically Ontology Elicitation, Extension to other
Application Domains and More Experiments. [edited by author]XI n.s
A framework for smart traffic management using heterogeneous data sources
A thesis submitted in partial fulfilment of the requirements of the University of Wolverhampton for the degree of Doctor of Philosophy.Traffic congestion constitutes a social, economic and environmental issue to modern cities as it can negatively impact travel times, fuel consumption and carbon emissions. Traffic forecasting and incident detection systems are fundamental areas of Intelligent Transportation Systems (ITS) that have been widely researched in the last decade. These systems provide real time information about traffic congestion and other unexpected incidents that can support traffic management agencies to activate strategies and notify users accordingly. However, existing techniques suffer from high false alarm rate and incorrect traffic measurements. In recent years, there has been an increasing interest in integrating different types of data sources to achieve higher precision in traffic forecasting and incident detection techniques. In fact, a considerable amount of literature has grown around the influence of integrating data from heterogeneous data sources into existing traffic management systems.
This thesis presents a Smart Traffic Management framework for future cities. The proposed framework fusions different data sources and technologies to improve traffic prediction and incident detection systems. It is composed of two components: social media and simulator component. The social media component consists of a text classification algorithm to identify traffic related tweets. These traffic messages are then geolocated using Natural Language Processing (NLP) techniques. Finally, with the purpose of further analysing user emotions within the tweet, stress and relaxation strength detection is performed. The proposed text classification algorithm outperformed similar studies in the literature and demonstrated to be more accurate than other machine learning algorithms in the same dataset. Results from the stress and relaxation analysis detected a significant amount of stress in 40% of the tweets, while the other portion did not show any emotions associated with them. This information can potentially be used for policy making in transportation, to understand the usersïżœïżœïżœ perception of the transportation network. The simulator component proposes an optimisation procedure for determining missing roundabouts and urban roads flow distribution using constrained optimisation. Existing imputation methodologies have been developed on straight section of highways and their applicability for more complex networks have not been validated. This task presented a solution for the unavailability of roadway sensors in specific parts of the network and was able to successfully predict the missing values with very low percentage error. The proposed imputation methodology can serve as an aid for existing traffic forecasting and incident detection methodologies, as well as for the development of more realistic simulation networks
Personality Identification from Social Media Using Deep Learning: A Review
Social media helps in sharing of ideas and information among people scattered around the world and thus helps in creating communities, groups, and virtual networks. Identification of personality is significant in many types of applications such as in detecting the mental state or character of a person, predicting job satisfaction, professional and personal relationship success, in recommendation systems. Personality is also an important factor to determine individual variation in thoughts, feelings, and conduct systems. According to the survey of Global social media research in 2018, approximately 3.196 billion social media users are in worldwide. The numbers are estimated to grow rapidly further with the use of mobile smart devices and advancement in technology. Support vector machine (SVM), Naive Bayes (NB), Multilayer perceptron neural network, and convolutional neural network (CNN) are some of the machine learning techniques used for personality identification in the literature review. This paper presents various studies conducted in identifying the personality of social media users with the help of machine learning approaches and the recent studies that targeted to predict the personality of online social media (OSM) users are reviewed
Cognitive Models and Computational Approaches for improving Situation Awareness Systems
2016 - 2017The world of Internet of Things is pervaded by complex environments
with smart services available every time and everywhere. In
such a context, a serious open issue is the capability of information
systems to support adaptive and collaborative decision processes
in perceiving and elaborating huge amounts of data. This requires
the design and realization of novel socio-technical systems based on
the âhuman-in-the-loopâ paradigm. The presence of both humans
and software in such systems demands for adequate levels of Situation
Awareness (SA). To achieve and maintain proper levels of
SA is a daunting task due to the intrinsic technical characteristics
of systems and the limitations of human cognitive mechanisms.
In the scientific literature, such issues hindering the SA formation
process are defined as SA demons.
The objective of this research is to contribute to the resolution
of the SA demons by means of the identification of information
processing paradigms for an original support to the SA and the
definition of new theoretical and practical approaches based on
cognitive models and computational techniques.
The research work starts with an in-depth analysis and some
preliminary verifications of methods, techniques, and systems of
SA. A major outcome of this analysis is that there is only a limited
use of the Granular Computing paradigm (GrC) in the SA
field, despite the fact that SA and GrC share many concepts and
principles. The research work continues with the definition of contributions
and original results for the resolution of significant SA
demons, exploiting some of the approaches identified in the analysis
phase (i.e., ontologies, data mining, and GrC). The first contribution addresses the issues related to the bad perception of data
by users. We propose a semantic approach for the quality-aware
sensor data management which uses a data imputation technique
based on association rule mining. The second contribution proposes
an original ontological approach to situation management,
namely the Adaptive Goal-driven Situation Management. The approach
uses the ontological modeling of goals and situations and
a mechanism that suggests the most relevant goals to the users at
a given moment. Lastly, the adoption of the GrC paradigm allows
the definition of a novel model for representing and reasoning
on situations based on a set theoretical framework. This model
has been instantiated using the rough sets theory. The proposed
approaches and models have been implemented in prototypical systems.
Their capabilities in improving SA in real applications have
been evaluated with typical methodologies used for SA systems. [edited by Author]XXX cicl
Modélisation formelle des systÚmes de détection d'intrusions
LâĂ©cosystĂšme de la cybersĂ©curitĂ© Ă©volue en permanence en termes du nombre, de la diversitĂ©, et de la complexitĂ© des attaques. De ce fait, les outils de dĂ©tection deviennent inefficaces face Ă certaines attaques. On distingue gĂ©nĂ©ralement trois types de systĂšmes de dĂ©tection dâintrusions : dĂ©tection par anomalies, dĂ©tection par signatures et dĂ©tection hybride. La dĂ©tection par anomalies est fondĂ©e sur la caractĂ©risation du comportement habituel du systĂšme, typiquement de maniĂšre statistique. Elle permet de dĂ©tecter des attaques connues ou inconnues, mais gĂ©nĂšre aussi un trĂšs grand nombre de faux positifs. La dĂ©tection par signatures permet de dĂ©tecter des attaques connues en dĂ©finissant des rĂšgles qui dĂ©crivent le comportement connu dâun attaquant. Cela demande une bonne connaissance du comportement de lâattaquant. La dĂ©tection hybride repose sur plusieurs mĂ©thodes de dĂ©tection incluant celles sus-citĂ©es. Elle prĂ©sente lâavantage dâĂȘtre plus prĂ©cise pendant la dĂ©tection. Des outils tels que Snort et Zeek offrent des langages de bas niveau pour lâexpression de rĂšgles de reconnaissance dâattaques. Le nombre dâattaques potentielles Ă©tant trĂšs grand, ces bases de rĂšgles deviennent rapidement difficiles Ă gĂ©rer et Ă maintenir. De plus, lâexpression de rĂšgles avec Ă©tat dit stateful est particuliĂšrement ardue pour reconnaĂźtre une sĂ©quence dâĂ©vĂ©nements. Dans cette thĂšse, nous proposons une approche stateful basĂ©e sur les diagrammes dâĂ©tat-transition algĂ©briques (ASTDs) afin dâidentifier des attaques complexes. Les ASTDs permettent de reprĂ©senter de façon graphique et modulaire une spĂ©cification, ce qui facilite la maintenance et la comprĂ©hension des rĂšgles. Nous Ă©tendons la notation ASTD avec de nouvelles fonctionnalitĂ©s pour reprĂ©senter des attaques complexes. Ensuite, nous spĂ©cifions plusieurs attaques avec la notation Ă©tendue et exĂ©cutons les spĂ©cifications obtenues sur des flots dâĂ©vĂ©nements Ă lâaide dâun interprĂ©teur pour identifier des attaques. Nous Ă©valuons aussi les performances de lâinterprĂ©teur avec des outils industriels tels que Snort et Zeek. Puis, nous rĂ©alisons un compilateur afin de gĂ©nĂ©rer du code exĂ©cutable Ă partir dâune spĂ©cification ASTD, capable dâidentifier de façon efficiente les sĂ©quences dâĂ©vĂ©nements.Abstract : The cybersecurity ecosystem continuously evolves with the number, the diversity,
and the complexity of cyber attacks. Generally, we have three types of Intrusion
Detection System (IDS) : anomaly-based detection, signature-based detection, and
hybrid detection. Anomaly detection is based on the usual behavior description of
the system, typically in a static manner. It enables detecting known or unknown attacks
but also generating a large number of false positives. Signature based detection
enables detecting known attacks by defining rules that describe known attackerâs behavior.
It needs a good knowledge of attacker behavior. Hybrid detection relies on
several detection methods including the previous ones. It has the advantage of being
more precise during detection. Tools like Snort and Zeek offer low level languages to
represent rules for detecting attacks. The number of potential attacks being large,
these rule bases become quickly hard to manage and maintain. Moreover, the representation
of stateful rules to recognize a sequence of events is particularly arduous. In this thesis, we propose a stateful approach based on algebraic state-transition
diagrams (ASTDs) to identify complex attacks. ASTDs allow a graphical and modular
representation of a specification, that facilitates maintenance and understanding of
rules. We extend the ASTD notation with new features to represent complex attacks.
Next, we specify several attacks with the extended notation and run the resulting specifications
on event streams using an interpreter to identify attacks. We also evaluate
the performance of the interpreter with industrial tools such as Snort and Zeek. Then,
we build a compiler in order to generate executable code from an ASTD specification,
able to efficiently identify sequences of events
- âŠ