2016 Conference on Technologies and Applications of Artificial Intelligence (TAAI)最新文献

筛选
英文 中文
Heuristic algorithm for target coverage with connectivity fault-tolerance problem in wireless sensor networks 无线传感器网络中带连通性容错的目标覆盖启发式算法
2016 Conference on Technologies and Applications of Artificial Intelligence (TAAI) Pub Date : 2016-11-01 DOI: 10.1109/TAAI.2016.7880178
N. Hanh, Phan Thi Hong Hanh, Huynh Thi Thanh Binh, N. D. Nghia
{"title":"Heuristic algorithm for target coverage with connectivity fault-tolerance problem in wireless sensor networks","authors":"N. Hanh, Phan Thi Hong Hanh, Huynh Thi Thanh Binh, N. D. Nghia","doi":"10.1109/TAAI.2016.7880178","DOIUrl":"https://doi.org/10.1109/TAAI.2016.7880178","url":null,"abstract":"Wireless sensor networks include a set of sensors being network nodes and a base station. The objective of such systems is to monitor changes which might occur at targets' location. Consequently, assuring the network connectivity is compulsory to maintain a continuous monitoring of given set of targets. However, sensor nodes sometimes stop functioning due to being physically damaged or running out of energy (battery), thus affecting to the connectivity of the system. This paper considers the target coverage with connectivity fault-tolerance problem in wireless sensor networks. The goal of this problem is to come up with a network topology consisting of the least number of sensor nodes that not only offers the greatest target coverage but also maintains the network connectivity even when one random node is defected. This is an NP-Complete combinatorial optimization problem. One heuristic algorithm is proposed to solve the target coverage with connectivity fault-tolerance problem and it is tested on 15 randomly generated instances. Experimental results illustrate a good performance achieved in terms of target coverage, connectivity and fault-tolerance.","PeriodicalId":159858,"journal":{"name":"2016 Conference on Technologies and Applications of Artificial Intelligence (TAAI)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115967729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Systematic selection of N-tuple networks with consideration of interinfluence for game 2048 博弈2048中考虑相互影响的n元网络的系统选择
2016 Conference on Technologies and Applications of Artificial Intelligence (TAAI) Pub Date : 2016-11-01 DOI: 10.1109/TAAI.2016.7880154
Kiminori Matsuzaki
{"title":"Systematic selection of N-tuple networks with consideration of interinfluence for game 2048","authors":"Kiminori Matsuzaki","doi":"10.1109/TAAI.2016.7880154","DOIUrl":"https://doi.org/10.1109/TAAI.2016.7880154","url":null,"abstract":"The puzzle game 2048, a single-player stochastic game played on a 4 × 4 grid, is the most popular among similar slide-and-merge games. One of the strongest computer players for 2048 uses temporal difference learning (TD learning) on so called N-tuple networks, where the shapes of the N-tuples are given by human based on characteristics of the game. In our previous work (Oka and Matsuzaki, 2016), the authors proposed a systematic method of selecting N-tuples under an assumption that the interinfluence among those N-tuple networksn are negligible. Though the selected N-tuple networks worked fine, there were large gaps between those N-tuple networks and the human-designed networks. In this paper, another systematic and game-characteristics-free method of selecting N-tuples is proposed for game 2048, in which the interinfluence among those N-tuple networks is captured. The proposed method is effective and generic: the selected N-tuple networks are as good as human-designed ones under the same setting, and we can obtain larger (or smaller) N-tuple networks in the same manner. We also report the experiment results when we combine the N-tuple networks and expectimax search.","PeriodicalId":159858,"journal":{"name":"2016 Conference on Technologies and Applications of Artificial Intelligence (TAAI)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120986862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Ant colony optimization with multi-pheromones for solving constraint satisfaction problems 求解约束满足问题的多信息素蚁群算法
2016 Conference on Technologies and Applications of Artificial Intelligence (TAAI) Pub Date : 2016-11-01 DOI: 10.1109/TAAI.2016.7880183
Takuya Masukane, Kazunori Mizuno
{"title":"Ant colony optimization with multi-pheromones for solving constraint satisfaction problems","authors":"Takuya Masukane, Kazunori Mizuno","doi":"10.1109/TAAI.2016.7880183","DOIUrl":"https://doi.org/10.1109/TAAI.2016.7880183","url":null,"abstract":"To solve large-scale constraint satisfaction problems, CSPs, ant colony optimization, ACO, based meta-heuristics has been effective. However, the naive ACO based method is sometimes inefficient because the method has only single pheromone trails. In this paper, we propose an ant colony optimization based meta-heuristics with multi pheromone trails in which artificial ants construct a candidate assignment by referring several pheromone trail graphs to solve CSP instances. We also implement the proposed model to some ACO based methods, demonstrating how our method is effective for solving graph coloring problems that is one of typical examples of CSPs.","PeriodicalId":159858,"journal":{"name":"2016 Conference on Technologies and Applications of Artificial Intelligence (TAAI)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121184643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A game informatical analysis of RoShamBo 《RoShamBo》的游戏信息分析
2016 Conference on Technologies and Applications of Artificial Intelligence (TAAI) Pub Date : 2016-11-01 DOI: 10.1109/TAAI.2016.7880158
Chetprayoon Panumate, H. Iida, J. Terrillon
{"title":"A game informatical analysis of RoShamBo","authors":"Chetprayoon Panumate, H. Iida, J. Terrillon","doi":"10.1109/TAAI.2016.7880158","DOIUrl":"https://doi.org/10.1109/TAAI.2016.7880158","url":null,"abstract":"This paper introduces a family of RoShamBo games, denoted by RSB(n,b,s,r) which means that n players simultaneously show a move among b possible moves with possible s winning regulations, at each round out of r round matches in total. The player who wins more after r rounds wins. A game informatical analysis of RSB(n,b,s,r) using game refinement measure is carried out, while experiments have been conducted by developing computer players and simulating a million RoShamBo games. Results show that RSB(n, 3, 1, 1) is best to play with n = 8 or 9 and RSB(2, 3, 1,r) is best to play with r = 9 or 10. Moreover, it is confirmed that popular RoShamBo-based games such as GuRiKo in Japan and King PaoYingShub in Thailand have been played with reasonable settings.","PeriodicalId":159858,"journal":{"name":"2016 Conference on Technologies and Applications of Artificial Intelligence (TAAI)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122842448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Using the traffic heterogeneity of Chinese toll highway networks for hierarchical clustering 基于中国收费公路网交通异质性的分层聚类研究
2016 Conference on Technologies and Applications of Artificial Intelligence (TAAI) Pub Date : 2016-11-01 DOI: 10.1109/TAAI.2016.7880174
Shi Fang, Kaigui Bian, Haikun Hong, Kunqing Xie, Yuwen Fu
{"title":"Using the traffic heterogeneity of Chinese toll highway networks for hierarchical clustering","authors":"Shi Fang, Kaigui Bian, Haikun Hong, Kunqing Xie, Yuwen Fu","doi":"10.1109/TAAI.2016.7880174","DOIUrl":"https://doi.org/10.1109/TAAI.2016.7880174","url":null,"abstract":"The spatial clustering of highway traffic is of great interest to researchers and policy makers. In this paper, instead of using the microscopic traffic parameters in the traditional clustering methods, we introduce a new heterogeneity index clustering the sections of a highway based on differences in the content, a.k.a. “Heterogeneity”, in their flow, which can be used as a universal guideline for network spatial clustering. Using real-world toll station origin to destination (O-D) data in three highway networks of China, we evaluate the stability of the traffic heterogeneity and verify the strong correlation between the traffic heterogeneity and the traffic variation. A case study on the hierarchical clustering for these highway roads was carried out, and we evaluate the clustering performances and show that the heterogeneity is a better partitioning criterion than other conventional traffic indices.","PeriodicalId":159858,"journal":{"name":"2016 Conference on Technologies and Applications of Artificial Intelligence (TAAI)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128732234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Extraction of proper names from myanmar text using latent dirichlet allocation 使用潜在狄利克雷分配从缅甸文本中提取专有名称
2016 Conference on Technologies and Applications of Artificial Intelligence (TAAI) Pub Date : 2016-11-01 DOI: 10.1109/TAAI.2016.7880176
Yuzana Win, Tomonari Masada
{"title":"Extraction of proper names from myanmar text using latent dirichlet allocation","authors":"Yuzana Win, Tomonari Masada","doi":"10.1109/TAAI.2016.7880176","DOIUrl":"https://doi.org/10.1109/TAAI.2016.7880176","url":null,"abstract":"This paper proposes a method for proper names extraction from Myanmar text by using latent Dirichlet allocation (LDA). Our method aims to extract proper names that provide important information on the contents of Myanmar text. Our method consists of two steps. In the first step, we extract topic words from Myanmar news articles by using LDA. In the second step, we make a post-processing, because the resulting topic words contain some noisy words. Our post-processing, first of all, eliminates the topic words whose prefixes are Myanmar digits and suffixes are noun and verb particles. We then remove the duplicate words and discard the topic words that are contained in the existing dictionary. Consequently, we obtain the words as candidate of proper names, namely personal names, geographical names, unique object names, organization names, single event names, and so on. The evaluation is performed both from the subjective and quantitative perspectives. From the subjective perspective, we compare the accuracy of proper names extracted by our method with those extracted by latent semantic indexing (LSI) and rule-based method. It is shown that both LS] and our method can improve the accuracy of those obtained by rule-based method. However, our method can provide more interesting proper names than LSI. From the quantitative perspective, we use the extracted proper names as additional features in K-means clustering. The experimental results show that the document clusters given by our method are better than those given by LSI and rule-based method in precision, recall and F-score.","PeriodicalId":159858,"journal":{"name":"2016 Conference on Technologies and Applications of Artificial Intelligence (TAAI)","volume":"129 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115421360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sentiment analysis on Chinese movie review with distributed keyword vector representation 基于分布式关键词向量表示的中文影评情感分析
2016 Conference on Technologies and Applications of Artificial Intelligence (TAAI) Pub Date : 2016-11-01 DOI: 10.1109/TAAI.2016.7880169
Chun-Han Chu, Chen-Ann Wang, Yung-Chun Chang, Ying-Wei Wu, Yu-Lun Hsieh, W. Hsu
{"title":"Sentiment analysis on Chinese movie review with distributed keyword vector representation","authors":"Chun-Han Chu, Chen-Ann Wang, Yung-Chun Chang, Ying-Wei Wu, Yu-Lun Hsieh, W. Hsu","doi":"10.1109/TAAI.2016.7880169","DOIUrl":"https://doi.org/10.1109/TAAI.2016.7880169","url":null,"abstract":"In the area of national language processing, performing machine learning technique on customer or movie review for sentiment analysis has been? frequently tried. While methods such as? support vector machine (SVM) were much favored in the 2000s, recently there is a steadily rising percentage of implementation with vector representation and artificial neural network. In this article we present an approach to implement word embedding method to conduct sentiment analysis on movie review from a renowned bulletin board system forum in Taiwan. After performing log-likelihood ratio (LLR) on the corpus and selecting the top 10000 most related keywords as representative vectors for different sentiments, we use these vectors as the sentiment classifier for the testing set. We achieved results that are not only comparable to traditional methods like Naïve Bayes and SVM, but also outperform Latent Dirichlet Allocation, TF-IDF and its variant. It also tops the original LLR with a substantial margin.","PeriodicalId":159858,"journal":{"name":"2016 Conference on Technologies and Applications of Artificial Intelligence (TAAI)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128375236","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Topic suggestion by Bayesian network enhanced tag inference in community question answering 基于贝叶斯网络的话题建议增强了社区问答中的标签推理
2016 Conference on Technologies and Applications of Artificial Intelligence (TAAI) Pub Date : 2016-11-01 DOI: 10.1109/TAAI.2016.7880110
Gerel Tumenbayar, Hung-Yu kao
{"title":"Topic suggestion by Bayesian network enhanced tag inference in community question answering","authors":"Gerel Tumenbayar, Hung-Yu kao","doi":"10.1109/TAAI.2016.7880110","DOIUrl":"https://doi.org/10.1109/TAAI.2016.7880110","url":null,"abstract":"Since Web 2.0 emerges, users became very active in attending Web forum and Q&A Community. For the community about technology, engineering and science, it is likely that most of the professionals follow the same general path to study specific knowledge and this path would be between topics from basic one to specific one or from topic about old technology to a topic about new technology. Our work aims to find this general conditional relationship between topics by using Bayesian Network model and then use this model to suggest the reasonable topics for professionals to further study.","PeriodicalId":159858,"journal":{"name":"2016 Conference on Technologies and Applications of Artificial Intelligence (TAAI)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134288724","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Sensitive information for privacy on social networks a case study of PTT-and-FB linkage 社交网络中的隐私敏感信息——以ptt与fb联动为例
2016 Conference on Technologies and Applications of Artificial Intelligence (TAAI) Pub Date : 2016-11-01 DOI: 10.1109/TAAI.2016.7880181
R. Wang, Rui Wang, Chih-Hua Tai, De-Nian Yang
{"title":"Sensitive information for privacy on social networks a case study of PTT-and-FB linkage","authors":"R. Wang, Rui Wang, Chih-Hua Tai, De-Nian Yang","doi":"10.1109/TAAI.2016.7880181","DOIUrl":"https://doi.org/10.1109/TAAI.2016.7880181","url":null,"abstract":"It might not seem dangerous for a person to leave some pieces of personal information on the Internet since everyone tends to do this. But the truth is that if someone ever tries to collect those pieces of information together, he might be able to find out the true identity of the person in reality after analyzing the collected data, which is what we call “cyber hunting”. This work focuses on the question of “what kind(s) of personal information will lead to a higher risk of personal re-identification on the Internet?” To answer this question, we conducted a case study of PTT-and-FB linkage and share effective suggestions for Internet users to avoid being cyber hunted. At the end of this work, we found that the three attributes of gender, birthday and location are more sensitive compared to other attributes and users should prevent themselves from providing these kinds of information to secure their privacy.","PeriodicalId":159858,"journal":{"name":"2016 Conference on Technologies and Applications of Artificial Intelligence (TAAI)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121535814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automatic opinion leader recognition in group discussions 在小组讨论中自动识别意见领袖
2016 Conference on Technologies and Applications of Artificial Intelligence (TAAI) Pub Date : 2016-11-01 DOI: 10.1109/TAAI.2016.7880177
Yujeung Ho, Hao-Min Liu, Hui-Hsin Hsu, Chun-Han Lin, Yao-Hua Ho, Ling-Jyh Chen
{"title":"Automatic opinion leader recognition in group discussions","authors":"Yujeung Ho, Hao-Min Liu, Hui-Hsin Hsu, Chun-Han Lin, Yao-Hua Ho, Ling-Jyh Chen","doi":"10.1109/TAAI.2016.7880177","DOIUrl":"https://doi.org/10.1109/TAAI.2016.7880177","url":null,"abstract":"In this paper, we propose an efficient approach to identify the opinion leader from group discussion. This approach is able to recognize the opinion leader without analyzing semantic and syntactic features, which may cost a lot more computing effort. We firstly propose algorithms to evaluate the degree of participation and the emotion expression from the speaking of each member during group discussion. Moreover, by conducting lab-scale experiment, a well-trained model, which is tested on single dataset as well as on cross dataset, is obtained to recognize the opinion leader. Finally, we conduct a field experiment to evaluate the proposed system in a real world setting. The results show that the accuracy of opinion leader identification could achieve to 94.68% on Berlin dataset, 76% on Youtube data and 73.33% on live group discussion. Thus, with this simple and efficient system, opinion leader can be successfully identified in various conditions.","PeriodicalId":159858,"journal":{"name":"2016 Conference on Technologies and Applications of Artificial Intelligence (TAAI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129976920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信