Search results for "Artificial"

showing 10 items of 7394 documents

Towards digital cognitive clones for the decision-makers: adversarial training experiments

2021

Abstract There can be many reasons for anyone to make a digital copy (clone) of own decision-making behavior. This enables virtual presence of a professional decision-maker simultaneously in many places and processes of Industry 4.0. Such clone can be used as one’s responsible representative when the human is not available. Pi-Mind (“Patented Intelligence”) is a technology, which enables “cloning” cognitive skills of humans using adversarial machine learning. In this paper, we present a cyber-physical environment as an adversarial learning ecosystem for cloning image classification skills. The physical component of the environment is provided by the logistic laboratory with camera-surveilla…

cybersecurityComputer scienceProcess (engineering)päätöksentukijärjestelmätneuroverkot02 engineering and technologytekoälyAdversarial machine learningAdversarial systemHuman–computer interactionComponent (UML)0202 electrical engineering electronic engineering information engineeringesineiden internetartificial digital immunitykyberturvallisuusGeneral Environmental ScienceGenerative Adversarial NetworksCloning (programming)ohjausjärjestelmät020206 networking & telecommunicationsAdversaryIndustry 4.0koneoppiminenälytekniikkaGeneral Earth and Planetary Sciences020201 artificial intelligence & image processingClone (computing)Procedia Computer Science
researchProduct

Taxonomy of generative adversarial networks for digital immunity of Industry 4.0 systems

2021

Abstract Industry 4.0 systems are extensively using artificial intelligence (AI) to enable smartness, automation and flexibility within variety of processes. Due to the importance of the systems, they are potential targets for attackers trying to take control over the critical processes. Attackers use various vulnerabilities of such systems including specific vulnerabilities of AI components. It is important to make sure that inappropriate adversarial content will not break the security walls and will not harm the decision logic of critical systems. We believe that the corresponding security toolset must be organized as a trainable self-protection mechanism similar to immunity. We found cer…

cybersecurityIndustry 4.0Computer scienceVulnerabilityneuroverkot02 engineering and technologytekoälyComputer securitycomputer.software_genreAdversarial systemImmunityTaxonomy (general)0202 electrical engineering electronic engineering information engineeringesineiden internetartificial digital immunitykyberturvallisuusGeneral Environmental ScienceFlexibility (engineering)Generative Adversarial Networksbusiness.industryMechanism (biology)020206 networking & telecommunicationsIndustry 4.0AutomationVariety (cybernetics)koneoppiminenälytekniikkaGeneral Earth and Planetary Sciences020201 artificial intelligence & image processingbusinesscomputerProcedia Computer Science
researchProduct

'Dark Ecological Network': strategically tackling light pollution for biodiversity and people

2021

Night-time light pollution from artificial sources can disrupt biological processes and fragment habitats. This study presents a new concept foraddressing the problem: a 'dark ecological network'. Its development involves mapping a new system of connected functional zones and corridors where dark can be preserved to help birds, bats and other taxa, and gives people the chance to experience starry skies.

dark ecological network[SDE.BE] Environmental Sciences/Biodiversity and EcologyALAN[SDE.MCG] Environmental Sciences/Global Changeslight pollution[SHS] Humanities and Social Sciences[SDE.ES] Environmental Sciences/Environmental and Societyartificial light at night
researchProduct

Data-Driven Interactive Multiobjective Optimization Using a Cluster-Based Surrogate in a Discrete Decision Space

2019

In this paper, a clustering based surrogate is proposed to be used in offline data-driven multiobjective optimization to reduce the size of the optimization problem in the decision space. The surrogate is combined with an interactive multiobjective optimization approach and it is applied to forest management planning with promising results. peerReviewed

data-driven optimizationMathematical optimizationOptimization problemComputer scienceboreal forest managementComputer Science::Neural and Evolutionary Computationpäätöksenteko0211 other engineering and technologiesMathematicsofComputing_NUMERICALANALYSISdecision maker02 engineering and technologypreference informationSpace (commercial competition)Multi-objective optimizationComputingMethodologies_ARTIFICIALINTELLIGENCEData-drivenklusteritoptimointi0202 electrical engineering electronic engineering information engineeringCluster analysis021103 operations researchsurrogatesComputingMethodologies_PATTERNRECOGNITIONboreaalinen vyöhyke020201 artificial intelligence & image processingmetsänhoitoCluster basedclustering
researchProduct

Data-Driven Evolutionary Optimization: An Overview and Case Studies

2019

Most evolutionary optimization algorithms assume that the evaluation of the objective and constraint functions is straightforward. In solving many real-world optimization problems, however, such objective functions may not exist, instead computationally expensive numerical simulations or costly physical experiments must be performed for fitness evaluations. In more extreme cases, only historical data are available for performing optimization and no new data can be generated during optimization. Solving evolutionary optimization problems driven by data collected in simulations, physical experiments, production processes, or daily life are termed data-driven evolutionary optimization. In this…

data-driven optimizationMathematical optimizationOptimization problemmodel managementevoluutiolaskenta02 engineering and technologymatemaattinen optimointiEvolutionary computationTheoretical Computer ScienceData modelingData-drivenModel managementkoneoppiminenComputational Theory and MathematicsdatatiedeoptimointiTaxonomy (general)Constraint functionsalgoritmit0202 electrical engineering electronic engineering information engineeringProduction (economics)020201 artificial intelligence & image processingsurrogateevolutionary algorithmsSoftware
researchProduct

A data-driven surrogate-assisted evolutionary algorithm applied to a many-objective blast furnace optimization problem

2017

A new data-driven reference vector-guided evolutionary algorithm has been successfully implemented to construct surrogate models for various objectives pertinent to an industrial blast furnace. A total of eight objectives have been modeled using the operational data of the furnace using 12 process variables identified through a principal component analysis and optimized simultaneously. The capability of this algorithm to handle a large number of objectives, which has been lacking earlier, results in a more efficient setting of the operational parameters of the furnace, leading to a precisely optimized hot metal production process. peerReviewed

data-driven optimizationPareto optimalityEngineeringBlast furnaceMathematical optimizationOptimization problemmodel managementblast furnaceEvolutionary algorithm02 engineering and technologyMulti-objective optimizationIndustrial and Manufacturing Engineering020501 mining & metallurgyData-drivenironmakingoptimointi0202 electrical engineering electronic engineering information engineeringGeneral Materials Scienceta113business.industrypareto-tehokkuusMechanical EngineeringProcess (computing)metamodelingMetamodeling0205 materials engineeringmulti-objective optimizationMechanics of MaterialsPrincipal component analysis020201 artificial intelligence & image processingbusinessrautateollisuus
researchProduct

The Key Concepts of Ethics of Artificial Intelligence

2018

The growing influence and decision-making capacities of Autonomous systems and Artificial Intelligence in our lives force us to consider the values embedded in these systems. But how ethics should be implemented into these systems? In this study, the solution is seen on philosophical conceptualization as a framework to form practical implementation model for ethics of AI. To take the first steps on conceptualization main concepts used on the field needs to be identified. A keyword based Systematic Mapping Study (SMS) on the keywords used in AI and ethics was conducted to help in identifying, defying and comparing main concepts used in current AI ethics discourse. Out of 1062 papers retrieve…

databasesComputer science02 engineering and technologysystematiikkatekoäly0603 philosophy ethics and religionField (computer science)technological innovation0202 electrical engineering electronic engineering information engineeringtietokannatsystematicsautonomous automobilesta113Conceptualizationsystematiikka (biologia)06 humanities and the artsAi ethicsartificial intelligenceethicsEthics of artificial intelligenceFocus (linguistics)innovaatiotKey (cryptography)020201 artificial intelligence & image processingEngineering ethics060301 applied ethicsSystematic mappingetiikka
researchProduct

Data-driven Interactive Multiobjective Optimization : Challenges and a Generic Multi-agent Architecture

2020

In many decision making problems, a decision maker needs computer support in finding a good compromise between multiple conflicting objectives that need to be optimized simultaneously. Interactive multiobjective optimization methods have a lot of potential for solving such problems. However, the growth of complexity in problem formulations and the abundance of data bring new challenges to be addressed by decision makers and method developers. On the other hand, advances in the field of artificial intelligence provide opportunities in this respect. We identify challenges and propose directions of addressing them in interactive multiobjective optimization methods with the help of multiple int…

decision supportComputer science020209 energyCompromisemedia_common.quotation_subjectpäätöksentekopäätöksentukijärjestelmät02 engineering and technologycomputer.software_genreMulti-objective optimizationField (computer science)Data-drivenIntelligent agentcomputational intelligence0202 electrical engineering electronic engineering information engineeringmulti-agent systemsAgent architecturemultiple criteria optimizationGeneral Environmental Sciencemedia_commoninteractive methodsmonitavoiteoptimointiagentsRisk analysis (engineering)data-driven decision makinginteraktiivisuusälykkäät agentitGeneral Earth and Planetary Sciences020201 artificial intelligence & image processingcomputer
researchProduct

On Attacking Future 5G Networks with Adversarial Examples : Survey

2022

The introduction of 5G technology along with the exponential growth in connected devices is expected to cause a challenge for the efficient and reliable network resource allocation. Network providers are now required to dynamically create and deploy multiple services which function under various requirements in different vertical sectors while operating on top of the same physical infrastructure. The recent progress in artificial intelligence and machine learning is theorized to be a potential answer to the arising resource allocation challenges. It is therefore expected that future generation mobile networks will heavily depend on its artificial intelligence components which may result in …

deep learning5G-tekniikkaGeneral Medicinematkaviestinverkottekoälyartificial intelligenceadversarial machine learning5G networkskoneoppiminenmatkaviestinpalvelut (telepalvelut)algoritmit5G cybersecurity knowledge basetietoturvakyberturvallisuusverkkohyökkäyksetverkkopalvelut
researchProduct

Adversarial Attack’s Impact on Machine Learning Model in Cyber-Physical Systems

2020

Deficiency of correctly implemented and robust defence leaves Internet of Things devices vulnerable to cyber threats, such as adversarial attacks. A perpetrator can utilize adversarial examples when attacking Machine Learning models used in a cloud data platform service. Adversarial examples are malicious inputs to ML-models that provide erroneous model outputs while appearing to be unmodified. This kind of attack can fool the classifier and can prevent ML-models from generalizing well and from learning high-level representation; instead, the ML-model learns superficial dataset regularity. This study focuses on investigating, detecting, and preventing adversarial attacks towards a cloud dat…

defence mechanismsComputerApplications_COMPUTERSINOTHERSYSTEMStekoälypilvipalvelutadversarial attacksmachine learningkoneoppiminenArtificial Intelligencecloud data platformälytekniikkaesineiden internettietoturvakyberturvallisuusverkkohyökkäykset
researchProduct