卷 23, 编号 5 (2024)
Artificial intelligence, knowledge and data engineering
Scheduling as a Constraint Satisfaction Problem (Using the Example of Open-Pit Minе Production Scheduling Problem)
摘要



Using Ontology to Analyze English Comments on Social Networks
摘要
Chatbots have become interesting for many users as technology becomes more and more advanced. The need for information exchange among people through computer systems is increasing daily, raising the preference for using chatbots in most countries. Since Vietnam is such a developing country with a variety of ethnic groups, it requires much attention to the proliferation of social networks and the expansion of the cooperative economy. Regarding social networks, the inappropriate use of words in everyday life has become a significant issue. There are mixed reviews of praise and criticism on social networks; and we try to reduce the negative language use and improve the quality of using social networks language. We aim to meet users’ needs on social networks, promote economic development, and address social issues more effectively. To achieve these goals, in this paper we propose a deep learning technique using ontology knowledge mining to collect and process comments on social networks. This approach aims to enhance the user experience and facilitate the exchange of information among people by mining opinions in comments. Experimental results demonstrate that our method outperforms the conventional approach.



An Approach to a Priori Assessment of Fuzzy Classification Models in Monitoring Tasks
摘要



Clustering of Networks Using the Fish School Search Algorithm
摘要
A network is an aggregation of nodes joined by edges, representing entities and their relationships. In social network clustering, nodes are organized into clusters according to their connectivity patterns, with the goal of community detection. The detection of community structures in networks is essential. However, existing techniques for community detection have not yet utilized the potential of the Fish School Search (FSS) algorithm and modularity principles. We have proposed a novel method, clustering with the Fish School Search algorithm and modularity function (FSC), that enhances modularity in network clustering by iteratively partitioning the network and optimizing the modularity function using the Fish School Search Algorithm. This approach facilitates the discovery of highly modular community structures, improving the resolution and effectiveness of network clustering. We tested FSC on well-known and unknown network structures. Also, we tested it on a network generated using the LFR model to test its performance on networks with different community structures. Our methodology demonstrates strong performance in identifying community structures, indicating its effectiveness in capturing cohesive communities and accurately identifying actual community structures.



Efficient Implementation of Gammatone Filters Based on Warped Cosine Modulated Filter Bank
摘要



Rivest-Shamir-Adleman Algorithm Optimized to Protect IoT Devices from Specific Attacks
摘要
IoT devices are crucial in this modern world in many ways, as they provide support for environmental sensing, automation, and responsible resource conservation. The immense presence of IoT devices in everyday life is inevitable in the smart world. The predominant usage of IoT devices lurks the prying eyes of intentional hackers. Though there are several precautionary security systems and protocols available for generic wireless networks, it is observed that there is a need to formulate a state-of-the-art security mechanism exclusively for IoT network environments. This work is submitted here for the betterment of IoT network security. Three dedicated contributions are integrated in this work to achieve higher security scores in IoT network environments. Fast Fuzzy Anomaly Detector, Legacy Naïve Bayes Attack Classifiers, and Variable Security Schemer of Rivest-Shamir-Adleman algorithm are the novel modules introduced in this work abbreviated as ASORI. Captivating the advantages of the onboard IoT certification mechanism and selecting a dynamic security strategy are the novelties introduced in this work. ASORI model is tested with industrial standard network simulator OPNET to ensure the improved security along with vital network performance parameter betterments.



Robotics, automation and control systems
The Use of Hybrid Communication Architecture in Underwater Wireless Sensor Networks to Enhance Their Lifetime and Efficiency
摘要



Synthesis of a Fuzzy Controller by a Second-Order Object with Delay
摘要



Implicit Understanding: Decoding Swarm Behaviors in Robots through Deep Inverse Reinforcement Learning
摘要
Using reinforcement learning to generate the collective behavior of swarm robots is a common approach. Yet, formulating an appropriate reward function that aligns with specific objectives remains a significant challenge, particularly as the complexity of tasks increases. In this paper, we develop a deep inverse reinforcement learning model to uncover the reward structures that guide autonomous robots in achieving tasks by demonstrations. Deep inverse reinforcement learning models are particularly well-suited for complex and dynamic environments where predefined reward functions may be difficult to specify. Our model can generate different collective behaviors according to the required objectives and effectively copes with continuous state and action spaces, ensuring a nuanced recovery of reward structures. We tested the model using E-puck robots in the Webots simulator to solve two tasks: searching for dispersed boxes and navigation to a predefined position. Receiving rewards depends on demonstrations collected by an intelligent pre-trained swarm using reinforcement learning act as an expert. The results show successful recovery of rewards in both segmented and continuous demonstrations for two behaviors – searching and navigation. By observing the learned behaviors of the swarm by the expert and proposed model, it is noticeable that the model does not merely clone the expert behavior but generates its own strategies to achieve the system’s objectives.



Development of a Linear Control System for a Throttle of a UAV Propeller-Motor Group
摘要


