Kristína Malinovská, L. Malinovský, Pavel Kršek, Svatopluk Kraus, I. Farkaš
{"title":"UBAL","authors":"Kristína Malinovská, L. Malinovský, Pavel Kršek, Svatopluk Kraus, I. Farkaš","doi":"10.1145/3372422.3372443","DOIUrl":"https://doi.org/10.1145/3372422.3372443","url":null,"abstract":"Artificial neural networks, in particular the deep end-to-end architectures trained by error backpropagation (BP), are currently the topmost used learning systems. However, learning in such systems is only loosely inspired by the actual neural mechanisms. Algorithms based on local activation differences were designed as a biologically plausible alternative to BP. We propose Universal Bidirectional Activation-based Learning, a novel neural model derived from contrastive Hebbian learning. Similarly to what is assumed about learning in the brain, our model defines a single learning rule that can perform multiple ways of learning via special hyperparameters. Unlike others, our model consists of mutually dependent, yet separate weight matrices for different directions of activation propagation. We show that UBAL can learn different tasks (such as pattern retrieval, denoising, or classification) with different setups of the learning hyperparameters. We also demonstrate the performance of our algorithm on a machine learning benchmark (MNIST). The experimental results presented in this paper confirm that UBAL is comparable with a basic version BP-trained multilayer network and the related biologically-motivated models.","PeriodicalId":118684,"journal":{"name":"Proceedings of the 2019 2nd International Conference on Computational Intelligence and Intelligent Systems","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115372823","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Method of Pedestrian Trajectory Prediction Based on LSTM","authors":"Xuefeng Jiang, Wei Lin, Junrui Liu","doi":"10.1145/3372422.3372428","DOIUrl":"https://doi.org/10.1145/3372422.3372428","url":null,"abstract":"In the public scene, different pedestrian walks on different paths to avoid colliding with obstacles or others. Any small vehicle navigation in such a scenario should be able to anticipate the approximate position of the people around it at the next moment, and adjust its path to avoid collisions based on the predicted results. Such a problem of trajectory prediction can be regarded as the task of sequence generation, and we are interested in how to predict the future trajectory of pedestrians based on their past trajectory. In recent years, Recurrent Neural Network (RNN) model has been successful in sequence prediction tasks. So, this paper proposes a model combining an attention mechanism and Long Short-Term Memory (LSTM) artificial neural networks, to solve this question. This model can predict a pedestrian's future trajectory by learning his past trajectory. Experiments shows the model work well on multiple datasets, and the test results show that it has a very good effect.","PeriodicalId":118684,"journal":{"name":"Proceedings of the 2019 2nd International Conference on Computational Intelligence and Intelligent Systems","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122474238","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Representation Learning by Convolutional Neural Network for Smartphone Sensor Based Activity Recognition","authors":"Tatsuhito Hasegawa, M. Koshino","doi":"10.1145/3372422.3372439","DOIUrl":"https://doi.org/10.1145/3372422.3372439","url":null,"abstract":"Although many researchers have widely investigated activity recognition using smartphone sensing, estimation accuracy can be adversely affected by individual dependence. The result of our survey showed that the process of smartphone sensor based activity recognition that has not been sufficiently discussed, especially using representation learning by Convolutional Neural Network (CNN). The effectiveness of the representation learning model using CNN in activity recognition was verified, as were 10 types of activity recognition models: Deep Neural Network (DNN) using Hand-Crafted (HC) features, simple CNN model, AlexNet, SE-AlexNet, Fully Convolutional Network (FCN), SE-FCN, VGG, SE-VGG, ResNet, and SE-ResNet, using a benchmark dataset for human activity recognition. Finally, the deep learning models were trained a total of 600 times (10 models, 6 types with varying the number of people in training dataset, and 10 trials to reduce the influence of randomness bias). The results indicate that SE-VGG is the most accurate, as many subjects can be comprised in the training data.","PeriodicalId":118684,"journal":{"name":"Proceedings of the 2019 2nd International Conference on Computational Intelligence and Intelligent Systems","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129624709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Deep Learning Based-Recommendation System: An Overview on Models, Datasets, Evaluation Metrics, and Future Trends","authors":"Kyle Ong, S. Haw, K. Ng","doi":"10.1145/3372422.3372444","DOIUrl":"https://doi.org/10.1145/3372422.3372444","url":null,"abstract":"The growth of data in recent years has motivated the emergence of deep learning in many Computer Sciences related fields including Recommender System (RS). Deep learning has emerged as the solution; overcoming the obstacles of traditional recommendation models. Deep learning is able to enhance recommendation quality by learning non-linear and non-trivial user-item relationship, and extracting deep and abstract feature representations for users and items. However, deep learning in RS is still new and flourishing. The contribution of this paper is two-folds. Firstly, we will be providing several insights on the advances of RS focusing on deep-learning models, datasets and evaluation metrics. Secondly, we expand on the current trend and provide several possible research directions in the field of deep learning-based RS.","PeriodicalId":118684,"journal":{"name":"Proceedings of the 2019 2nd International Conference on Computational Intelligence and Intelligent Systems","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128641463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis Instrument of Smart Technology Capability for an Industry: a Total Smart Technology Capability Perspective","authors":"C. Yoon","doi":"10.1145/3372422.3372426","DOIUrl":"https://doi.org/10.1145/3372422.3372426","url":null,"abstract":"In fourth industrial revolution, all kinds of industry fields have utilized smart technology to increase their competitiveness in a global industrial environment. It is a core industrial strategy that most industry has built its smart technology environment appropriate for its industrial tasks and activities. In this environment, the smart technology capability of an industry is critical to efficiently perform industrial activities and effectively advance industrial performance. A reasonable analysis tool is necessary for objectively examining a smart technology ability of an industry in order to synthetically control and improve its smart technology capability. The developed 16-item framework is confirmed by reliability analysis and factor analysis based on previous studies. This study presents a 16-item analysis instrument that can properly examine a smart technology capability of an industry in an entire smart technology perspective. Our findings will contribute to the management and advancement of the smart technology capability of industry fields.","PeriodicalId":118684,"journal":{"name":"Proceedings of the 2019 2nd International Conference on Computational Intelligence and Intelligent Systems","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114773882","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Transformer based Chinese Sentiment Classification","authors":"Zhengshuai Zhu, Yanquan Zhou, Shuhao Xu","doi":"10.1145/3372422.3372438","DOIUrl":"https://doi.org/10.1145/3372422.3372438","url":null,"abstract":"This paper deals with the task of Chinese sentiment classification. We propose the MITE (Multi-Inputs Transformer Encoder) model, draw on the transformer encoding thought, mining the emotional information of Chinese contents. MITE introduce self-attention to find the emotional dependence between words, which we think is important for analyzing text sentiment categories. Experiments prove that our method improve the correctness of sentiment classification, which proves the emotional tendency is influenced by the sentimental polarity of the words in the sentence.","PeriodicalId":118684,"journal":{"name":"Proceedings of the 2019 2nd International Conference on Computational Intelligence and Intelligent Systems","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128997264","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yota Kawawa, R. Onuma, H. Nakayama, H. Kaminaga, Y. Miyadera, Shoichi Nakamura
{"title":"A System for Cultivating Exploration Skills by Presenting Clues Based on the Analysis of Page Selection Behaviors","authors":"Yota Kawawa, R. Onuma, H. Nakayama, H. Kaminaga, Y. Miyadera, Shoichi Nakamura","doi":"10.1145/3372422.3372449","DOIUrl":"https://doi.org/10.1145/3372422.3372449","url":null,"abstract":"Activities performed on the Web have becoming increasingly more complicated. In such activities, the importance of Web exploration through trial and error has increased. To satisfactorily conduct such exploration, it is important for users to comprehend the process of Web exploration and reflect on their search intentions when constructing queries. However, such tasks are difficult for inexperienced people. In this research, we focus on searchers' behaviors of page selection in the Web exploration process. On the basis of behavior analysis, we have developed methods to extract the clues so that unskilled searchers can become aware of the evaluation against pages they acquired and utilize them in further searches. We develop a novel mechanism for cultivating exploration skills by presenting clues in accordance with a searcher's degree of Web exploration experience. In this paper, we describe the design of a support system based on our methods and the characteristics of our prototype with some snapshots.","PeriodicalId":118684,"journal":{"name":"Proceedings of the 2019 2nd International Conference on Computational Intelligence and Intelligent Systems","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128037355","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Finger Recognition Using a Wearable Device while Typing","authors":"Daisuke Hamazaki, Tatsuhito Hasegawa","doi":"10.1145/3372422.3372440","DOIUrl":"https://doi.org/10.1145/3372422.3372440","url":null,"abstract":"In the information society, the ability to use a computer is important. To use a computer, users commonly need a keyboard as an input device. If users place their fingers on the home keys and stroke each key using the correct finger, they will lead to improve their typing skills. In this study, we develop a stroked finger recognition method for keyboard typing using Myo, a wearable device that can simply measure the surface electromyography (EMG) signal of the user's arm. Our method detects the user's stroked finger through machine learning that uses the measured EMG. We introduced window functions during feature extraction in order to suppress the influence of the keystroke speed. Our method was capable of recognizing six categories (five fingers and a neutral state) with an accuracy of about 80% when our method was evaluated by a 10-fold cross validation for each subject's data.","PeriodicalId":118684,"journal":{"name":"Proceedings of the 2019 2nd International Conference on Computational Intelligence and Intelligent Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129526456","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Constructive Multilevel Security System with Cryptographic Techniques by using Cyber-Physical System in the Space/Defense Applications","authors":"S. C. V. Bhaskar, Jagadam Vijay Gopal, S. Anitha","doi":"10.1145/3372422.3372427","DOIUrl":"https://doi.org/10.1145/3372422.3372427","url":null,"abstract":"Protecting sensitive data and maintaining the confidentiality is the most important role in this world. Especially many areas like Space, Defense, Education, Finance, Communications, international affairs sectors. The Multilevel Security (MLS) approach provides a relevant framework for the analysis of security systems regarding cross-level approach through the cyber-physical system. We propose a new key management system for multilevel security in the threat model security policies- security mechanism. The new approach is to construct the MLS through Cyber Physical Systems (CPS) in association with advanced cryptographic tools to protect the defense confidential data from unauthorized, and also to make sure that the data is not released to any counterfeit users. In this paper, a prototype is selected to explain the security of cryptographic strategy like symmetric encryption, message authentication codes, public key encryption, key agreement protocols, and digital signature schemes.","PeriodicalId":118684,"journal":{"name":"Proceedings of the 2019 2nd International Conference on Computational Intelligence and Intelligent Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130152454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance Evaluation of XML Query Processing in Centralized and Distributed Environment","authors":"S. Subramaniam, S. Haw, Lay-Ki Soon","doi":"10.1145/3372422.3372431","DOIUrl":"https://doi.org/10.1145/3372422.3372431","url":null,"abstract":"eXtensible Markup Language (XML) has been used to transfer data among a wide variety of systems. The increasing usage of XML data and increase in query workloads makes XML unrealisable for centralized storage. Therefore, a distributed query evaluation strategy is well-suited to access these types of collections without having to ship large volumes of irrelevant data across the network. A centralized planning and distributed execution strategy can be used in processing XML queries in distributed manner. In this paper, a technique that processes query in distributed environment is presented, with a pruning technique in local distributed servers and the central server federates the results sent by the distributed servers. A series of evaluations were that compares the performance of centralized and distributed techniques using same set of queries on two different datasets. The results show that the proposed technique, D-DGReLab+ outperformed other centralized techniques, TwigStack and QTwig.","PeriodicalId":118684,"journal":{"name":"Proceedings of the 2019 2nd International Conference on Computational Intelligence and Intelligent Systems","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132368965","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}