Artificial Intelligence and Machine Learning最新文献

筛选
英文 中文
Performance and Efficiency Assessment of Drone in Search and Rescue Operation 无人机在搜救行动中的性能与效率评估
Artificial Intelligence and Machine Learning Pub Date : 2022-07-23 DOI: 10.5121/csit.2022.121201
Tauheed Khan Mohd, Vuong Nguyen, T. Hoang, P. M. Zeyede, Beamlak Abdisa
{"title":"Performance and Efficiency Assessment of Drone in Search and Rescue Operation","authors":"Tauheed Khan Mohd, Vuong Nguyen, T. Hoang, P. M. Zeyede, Beamlak Abdisa","doi":"10.5121/csit.2022.121201","DOIUrl":"https://doi.org/10.5121/csit.2022.121201","url":null,"abstract":"With the development of technology, human beings have successfully predicted and prevented the damage caused by natural disasters. However, due to climate change, society has witnessed the rising actions of forest fire, earthquake, tsunami, etc., and there are many which people cannot prevent, and the level of dangerous situations are increasing rapidly for the Search and Rescue (SAR) operation. Not to mention, more and more people are turning their attention and hobbies to exploring wilderness where they might get lost or, worse, get injured. For that reason, to raise the chance of survival for the victims and reduce the risk for the search team, the use of Unmanned aerial vehicles (UAV) has been proposed. The plan is the headquarters will deploy a fleet of drones to get into the areas where human cannot enter easily and then report the situations as well as the condition of the victims with images and videos. In most research papers, it seems very promising; however, there is still much work that needs to be done. In this paper, some of the features which included for future researches are which algorithm is the most optimal, what standard structure should be used for the drones so it can complete the missions under any kind of circumstances, and how to set up a communication line that guaranty the effective to reduce the level of miscommunication.","PeriodicalId":174755,"journal":{"name":"Artificial Intelligence and Machine Learning","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130554970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Intelligent Video Editing Automate Framework using AI and Computer Vision 一个使用人工智能和计算机视觉的智能视频编辑自动化框架
Artificial Intelligence and Machine Learning Pub Date : 2022-07-23 DOI: 10.5121/csit.2022.121216
Haolin Xie, Yu Sun
{"title":"An Intelligent Video Editing Automate Framework using AI and Computer Vision","authors":"Haolin Xie, Yu Sun","doi":"10.5121/csit.2022.121216","DOIUrl":"https://doi.org/10.5121/csit.2022.121216","url":null,"abstract":"At present, many video editing software have been created, but what they all have in common is that they require manual work to edit. And it takes a lot of time and the user needs to watch each frame before editing. In this paper, we have developed a program about AI intelligence. The most important point of this software is that it can automatically focus the face of a person and edit only selected clips of the person to make a complete video. Users only need to prepare the video they want to edit and a photo of the main character. Then, upload both to the software and AI Intelligence will automatically edit it, providing the user with a way to download and save it after editing the main character they need. we applied our application to an example video using the Marvel character Hawkeye as he appears in End Game, and tried many experiments with the clip, eventually we tried many experiments with the clip and finally got a video of our selected character. The results show that this software saves the user a lot of time and is highly efficient. All operations are carried out by AI.","PeriodicalId":174755,"journal":{"name":"Artificial Intelligence and Machine Learning","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131114983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Intelligent Image-Processing Parking Systems 一种新型智能图像处理停车系统
Artificial Intelligence and Machine Learning Pub Date : 2022-07-23 DOI: 10.5121/csit.2022.121212
Sree Veera Venkata Sai Saran Naraharisetti, Benjamin Greenfield, Benjamin Placzek, Steven Atilho, Mohamad Nassar, M. Mekni
{"title":"A Novel Intelligent Image-Processing Parking Systems","authors":"Sree Veera Venkata Sai Saran Naraharisetti, Benjamin Greenfield, Benjamin Placzek, Steven Atilho, Mohamad Nassar, M. Mekni","doi":"10.5121/csit.2022.121212","DOIUrl":"https://doi.org/10.5121/csit.2022.121212","url":null,"abstract":"The scientific community is looking for efficient solutions to improve the quality of life in large cities because of traffic congestion, driving experience, air pollution, and energy consumption. This surge exceeds the capacity of existing transit infrastructure and parking facilities. Intelligent Parking Systems (SPS) that can accommodate short-term parking demand are a must-have for smart city development. SPS are designed to count the number of parked automobiles and identify available parking spaces. In this paper, we present a novel SPS based on real-time computer vision techniques. The proposed system provides features including: vacant parking space recognition, inappropriate parking detection, forecast of available parking spaces, and directed indicators toward various sorts of parking spaces (vacant, occupied, reserved and handicapped). Our system leverages existing video surveillance systems to capture, process image sequences, train computer models to understand and interpret the visual world, and provide guidance and information to the drivers.","PeriodicalId":174755,"journal":{"name":"Artificial Intelligence and Machine Learning","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131235098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Approach CPS for the Smart Monitoring of Industrial Systems 一种用于工业系统智能监控的CPS方法
Artificial Intelligence and Machine Learning Pub Date : 2022-07-23 DOI: 10.5121/csit.2022.121205
Nesrine Jlassi, Cédrick Béler, O. Khlaief, K. Medjaher
{"title":"An Approach CPS for the Smart Monitoring of Industrial Systems","authors":"Nesrine Jlassi, Cédrick Béler, O. Khlaief, K. Medjaher","doi":"10.5121/csit.2022.121205","DOIUrl":"https://doi.org/10.5121/csit.2022.121205","url":null,"abstract":"Process monitoring is an important element for the long-term reliable functioning of any automated system. In fact, monitoring system is constituted of sensors installed in the physical system, in order to analyse, observe and control production systems in real time. In network, these sensors may interact with one other and with an external system via wireless communication. With recent advances in electronics, tiny sensors have appeared. Their low cost and energy consumption allow them to perform three main functions: capture data, provide information and communicate it via sensor network. In this paper, we had interested to the Cyber-Physical System (CPS) and Prognostics Health Management (PHM) domain; The CPS is one of the most important advanced technologies, it connects the physical world with the cyber using a communication layout. In other side, PHM has become a key technology for detectingfuture failures by predicting the future behaviour of the system.","PeriodicalId":174755,"journal":{"name":"Artificial Intelligence and Machine Learning","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126078297","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
EmailTracker: An Intelligent Analytical System to Assist Email Event Tracking using Artificial Intelligence and Big Data EmailTracker:利用人工智能和大数据协助电子邮件事件跟踪的智能分析系统
Artificial Intelligence and Machine Learning Pub Date : 2022-07-23 DOI: 10.5121/csit.2022.121222
Joyce Zheng, Yu Sun
{"title":"EmailTracker: An Intelligent Analytical System to Assist Email Event Tracking using Artificial Intelligence and Big Data","authors":"Joyce Zheng, Yu Sun","doi":"10.5121/csit.2022.121222","DOIUrl":"https://doi.org/10.5121/csit.2022.121222","url":null,"abstract":"Recent studies have shown an increasing demand for software that assists in social media applications, such as Gmail [1] [2]. This paper develops a software that utilizes a pixel image in order to assist Gmail users with the status of their email [3]. This intelligent analytical system can be used to tell whether an email has been opened or not. After conducting a qualitative evaluation of this approach, the results provided evidence of the system’s usability and the reliability of the system to give accurate results and data.","PeriodicalId":174755,"journal":{"name":"Artificial Intelligence and Machine Learning","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130563596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Implementing Risk Score to Protect from Android Pattern Lock Attacks 实现风险评分,以防止Android模式锁定攻击
Artificial Intelligence and Machine Learning Pub Date : 2022-07-23 DOI: 10.5121/csit.2022.121208
Yasir Al-Qaraghuli, Caroline Hillier
{"title":"Implementing Risk Score to Protect from Android Pattern Lock Attacks","authors":"Yasir Al-Qaraghuli, Caroline Hillier","doi":"10.5121/csit.2022.121208","DOIUrl":"https://doi.org/10.5121/csit.2022.121208","url":null,"abstract":"Cyberattacks on Android devices have increased in frequency and commonly occur in physical settings with shoulder surfing and brute-force attacks. These attacks are most common with devices secured by the pattern lock mechanism. This work aims to investigate the various methods that increase the security of Android lock patterns. Research showed that these pattern lock screens are especially vulnerable due to users employing a set of common lock patterns. We propose a pattern-matching algorithm that recognizes these common lock patterns and increases the Risk Score if these passcodes are attempted. The blocking of common passcodes, and identification during the unlocking, reduces the risk of the aforementioned threats to device security. The algorithm we implemented succeeds in deterring users from configuring their devices with commonly used patterns. Overall, our algorithm achieves advanced security compared to current systems by detecting unusual inputs and locking the device when suspicious activity is detected. Our test results show 80% satisfaction from human test subjects when settings the passcode. The algorithm eliminates the use of commonly used patterns and 79% acceptance using our proposed algorithm and blocks access to the device depending on the accuracy score. The proposed algorithm shows remarkable success with limiting brute-force attacks as it proves effective in denying common passcodes.","PeriodicalId":174755,"journal":{"name":"Artificial Intelligence and Machine Learning","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131733883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Pedestrian Counting Scheme for Video Images 一种视频图像行人计数方案
Artificial Intelligence and Machine Learning Pub Date : 2022-07-23 DOI: 10.5121/csit.2022.121211
C. Cheng, Yi-Fan Wu
{"title":"A Pedestrian Counting Scheme for Video Images","authors":"C. Cheng, Yi-Fan Wu","doi":"10.5121/csit.2022.121211","DOIUrl":"https://doi.org/10.5121/csit.2022.121211","url":null,"abstract":"Pedestrian counting aims to compute the numbers of pedestrians entering and leaving an area of interest based on object detection and tracking techniques. This paper proposes a simple and effective approach of pedestrian counting that can effectively solve the problem of pedestrian occlusion.Firstly, the moving objects are detected by the median filtering and foreground extraction with the improved mixed Gaussian model. And then the HOG (Histogram of oriented gradient) features detection and the SVM (Support vector machine) classification are applied to identify the pedestrians. A pedestrian dataset containing 1500 positive samples, 12000 negative samples, and 420 hard examples, which gave the false discriminant results with the initial classifier, also considered as negative samples to enhance classification capability is employed. In addition, the Kalman filtering with BLOB analysis for dynamic target tracking is chosen to predict pedestrian trajectory.This method greatly reduces the target misjudgment caused by overlapping and completes the two-way counting. Experiments on pedestrian tracking and counting in video images demonstrate promising performance with satisfactory recognition rate and processing time.","PeriodicalId":174755,"journal":{"name":"Artificial Intelligence and Machine Learning","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123623974","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cryptographic Algorithms Identification based on Deep Learning 基于深度学习的密码算法识别
Artificial Intelligence and Machine Learning Pub Date : 2022-07-23 DOI: 10.5121/csit.2022.121217
Ruiqi Xia, Manman Li, Shaozhen Chen
{"title":"Cryptographic Algorithms Identification based on Deep Learning","authors":"Ruiqi Xia, Manman Li, Shaozhen Chen","doi":"10.5121/csit.2022.121217","DOIUrl":"https://doi.org/10.5121/csit.2022.121217","url":null,"abstract":"The identification of cryptographic algorithms is the premise of cryptanalysis which can help recover the keys effectively. This paper focuses on the construction of cryptographic identification classifiers based on residual neural network and feature engineering. We select 6 algorithms including block ciphers and public keys ciphers for experiments. The results show that the accuracy is generally over 90% for each algorithm. Our work has successfully combined deep learning with cryptanalysis, which is also very meaningful for the development of modern cryptography and pattern recognition.","PeriodicalId":174755,"journal":{"name":"Artificial Intelligence and Machine Learning","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131626762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluation of Machines Learning Algorithms in Detection of Malware-based Phishing Attacks for Securing E-Mail Communication 基于恶意软件的网络钓鱼攻击检测中的机器学习算法评估
Artificial Intelligence and Machine Learning Pub Date : 2022-07-23 DOI: 10.5121/csit.2022.121202
Kambey L. Kisambu, Mohamedi M. Mjahidi
{"title":"Evaluation of Machines Learning Algorithms in Detection of Malware-based Phishing Attacks for Securing E-Mail Communication","authors":"Kambey L. Kisambu, Mohamedi M. Mjahidi","doi":"10.5121/csit.2022.121202","DOIUrl":"https://doi.org/10.5121/csit.2022.121202","url":null,"abstract":"Malicious software, commonly known as Malware is one of the most significant threats facing Internet users today. Malware-based phishing attacks are among the major threats to Internet users that are difficult to defend against because they do not appear to be malicious in nature. There were several initiatives in combating phishing attacks but there are many difficulties and obstacles encountered. This study deals with evaluation of machine learning algorithms in detection of malware-based phishing attacks for securing email communication. It deeply evaluate the efficacy of the algorithms when integrated with major open-source security mail filters with different mitigation techniques. The main classifiers used such as SVM, KNN, Logistic Regression and Naïve Bayes were evaluated using performance metrics namely accuracy, precision, recall and f-score. Based on the findings, the study proposed improvement for securing e-mail communication against malware-based phishing using the best performing machine-learning algorithm to keep pace with malware evolution.","PeriodicalId":174755,"journal":{"name":"Artificial Intelligence and Machine Learning","volume":"66 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132802298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Artificial Intelligence and Machine Learning: 31st Benelux AI Conference, BNAIC 2019, and 28th Belgian-Dutch Machine Learning Conference, BENELEARN 2019, Brussels, Belgium, November 6-8, 2019, Revised Selected Papers 人工智能和机器学习:第31届比荷卢人工智能会议(BNAIC 2019)和第28届比荷机器学习会议(BENELEARN 2019),比利时布鲁塞尔,2019年11月6日至8日,修订论文选集
Artificial Intelligence and Machine Learning Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-65154-1
T. Saloky, J. Šeminský
{"title":"Artificial Intelligence and Machine Learning: 31st Benelux AI Conference, BNAIC 2019, and 28th Belgian-Dutch Machine Learning Conference, BENELEARN 2019, Brussels, Belgium, November 6-8, 2019, Revised Selected Papers","authors":"T. Saloky, J. Šeminský","doi":"10.1007/978-3-030-65154-1","DOIUrl":"https://doi.org/10.1007/978-3-030-65154-1","url":null,"abstract":"","PeriodicalId":174755,"journal":{"name":"Artificial Intelligence and Machine Learning","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121238800","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信