首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 125 毫秒
1.
胡国华  赵青杉 《计算机工程》2006,32(2):266-267,270
数据样本集作为人工智能不可缺少的部分,应是全面的,有效的集合。当所提供的数据样本集残缺不全时,会影响人工智能的有效应用,针对这一问题,该文提出了一种基于决策算法的数据样本集补全方法,能科学、正确、有效地补全数据样本集。为提高人工智能的决策推理铺平了道路。  相似文献   

2.
袁烨  张永  丁汉 《自动化学报》2020,46(10):2013-2030
随着人工智能技术的快速发展及其在工业系统中卓有成效的应用, 工业智能化成为当前工业生产转型的一个重要趋势. 论文提炼了工业人工智能(Industrial artificial intelligence, IAI)的建模、诊断、预测、优化、决策以及智能芯片等共性关键技术, 总结了生产过程监控与产品质量检测等4个主要应用场景. 同时, 论文选择预测性维护作为工业人工智能的典型应用场景, 以工业设备的闭环智能维护形式, 分别从模型方法、数据方法以及融合方法出发, 系统的总结和分析了设备的寿命预测技术和维护决策理论, 展示了人工智能技术在促进工业生产安全、降本、增效、提质等方面的重要作用. 最后, 探讨了工业人工智能研究所面临的问题以及未来的研究方向.  相似文献   

3.
可视化与可视分析已成为众多领域中结合人类智能与机器智能协同理解、分析数据的常见手段。人工智能可以通过对大数据的学习分析提高数据质量,捕捉关键信息,并选取最有效的视觉呈现方式,从而使用户更快、更准确、更全面地从可视化中理解数据。利用人工智能方法,交互式可视化系统也能更好地学习用户习惯及用户意图,推荐符合用户需求的可视化形式、交互操作和数据特征,从而降低用户探索的学习及时间成本,提高交互分析的效率。人工智能方法在可视化中的应用受到了极大关注,产生了大量学术成果。本文从最新工作出发,探讨人工智能在可视化流程的关键步骤中的作用。包括如何智能地表示和管理数据、如何辅助用户快速创建和定制可视化、如何通过人工智能扩展交互手段及提高交互效率、如何借助人工智能辅助数据的交互分析等。具体而言,本文详细梳理每个步骤中需要完成的任务及解决思路,介绍相应的人工智能方法(如深度网络结构),并以图表数据为例介绍智能可视化与可视分析的应用,最后讨论智能可视化方法的发展趋势,展望未来的研究方向及应用场景。  相似文献   

4.
人工智能是管理物联网中大量数据流和存储的解决方案之一。随着高速互联网和许多可以集成到微控制器中的传感器的应用,物联网开始逐渐普及和应用。由于数据流量的激增和传感器的增多,一些数据可能会面临网络中的存储困难、延迟、通道限制等问题。针对这些问题,人工智能在数据挖掘、管理和控制中发挥重要作用。介绍了人工智能系统在物联网中的应用,阐述了数据挖掘和管理的重要性。同时,结合物联网探讨了模糊逻辑和神经网络等人工智能中常用算法的应用。  相似文献   

5.
随着大数据和云计算的技术的深入应用,人工智能时代的机器学习和深度学习更需要日益增长的数据,因此数据安全与隐私保护变得更加迫切。本文介绍人工智能的定义以及特征,探究数据安全和隐私保护现状,分析数据安全和隐私保护面临的诸多问题,并提出在人工智能时代对数据安全和隐私保护的措施。  相似文献   

6.
<正>可解释、可通用的下一代人工智能方法重大研究计划面向人工智能发展国家重大战略需求,以人工智能的基础科学问题为核心,发展人工智能新方法体系,促进我国人工智能基础研究和人才培养,支撑我国在新一轮国际科技竞争中的主导地位。一、科学目标本重大研究计划面向以深度学习为代表的人工智能方法鲁棒性差、可解释性差、对数据的依赖性强等基础科学问题,挖掘机器学习的基本原理,发展可解释、可通用的下一代人工智能方法,并推动人工智能方法在科学领域的创新应用。  相似文献   

7.
如今,人工智能技术在各行各业中都得到了广泛的应用。而在大数据网络中,信息安全问题也一直是人们关注的重点。在大数据网络安全防御中采用人工智能技术,可以自动配置网络安全防御策略,提高网络安全的稳定性与可靠性。文章通过对人工智能技术在大数据网络安全防御中架构设计进行分析,探讨了人工智能技术在大数据网络安全防御中的应用部署﹑架构等。  相似文献   

8.
随着互联网的发展,网络安全问题日益突出。传统的入侵检测系统已经无法满足网络安全的需求,因此人工智能在入侵检测中的应用逐渐受到关注。文章介绍了人工智能系统和传统入侵检测系统的比较,提出了一种基于决策树算法的网络入侵检测系统设计。  相似文献   

9.
本文探讨了基于人工智能的网络安全技术与应用。首先,分析了传统入侵检测系统和恶意代码检测方法的局限性。随后,介绍了基于机器学习和行为分析的入侵检测技术,以及基于深度学习和行为分析的恶意代码检测技术。接着,讨论了传统网络攻击响应存在的问题,并探讨了基于强化学习和自然语言处理的网络攻击响应技术。最后,总结了人工智能在网络安全技术与应用中的重要性和未来发展方向。  相似文献   

10.
大数据时代的到来,极大推动了人工智能技术和网络计算机技术的优化发展。在大数据的推动下,人工智能技术逐渐由科技领域拓展至人们的日常生活。基于此,分析和阐述了大数据时代下人工智能技术的内涵及意义,探讨了大数据时代人工智能在计算机网络技术中的有效应用,并结合大数据技术进行深入研究,以实现人工智能技术的长远发展,为人们的生产、生活提供技术支撑与技术服务。  相似文献   

11.
人工智能在入侵检测系统中的应用   总被引:5,自引:0,他引:5  
人工智能技术在滥用检测和异常检测中都起了重要作用。文章介绍了目前应用于入侵检测系统中的主要的人工智能技术即专家系统、人工神经网络、数据挖掘技术、人工免疫技术、自治Agent、数据融合等技术,可以相信入侵检测和人工智能的紧密结合必会极大地提高现有入侵检测系统的性能,同时促进更多人工智能算法的提出并应用于入侵检测这个新的领域。  相似文献   

12.
Dust storms have a major impact on air quality, economic loss, and human health over large regions of the Middle East. Because of the broad extent of dust storms and also political–security issues in this region, satellite data are an important source of dust detection and mapping. The aim of this study was to compare and evaluate the performance of five main dust detection algorithms, including Ackerman, Miller, normalized difference dust index (NDDI), Roskovensky and Liou, and thermal-infrared dust index (TDI), using MODIS Level 1B and also MODIS Deep Blue AOD and OMI AI products in two dust events originating from Iraq and Saudi Arabia. Overall, results showed that the performance of the algorithms varied from event to event and it was not possible to use the published dust/no-dust thresholds for the algorithms tested in the study area. The MODIS AOD and OMI AI products were very effective for initial dust detection and the AOD and AI images correlated highly with the dust images at provincial scale (p-value <0.001), but the application of these products was limited at local scale due to their poor spatial resolution. Results also indicated that algorithms based on MODIS thermal infrared (TIR) bands or a combination of TIR and reflectance bands were better indicators of dust than reflectance-based ones. Among the TIR- based algorithms, TDI performed the best over water surfaces and dust sources, and accounted for approximately 93% and 90% of variations in the AOD and OMI AI data.  相似文献   

13.

Human activity recognition (HAR) has multifaceted applications due to its worldly usage of acquisition devices such as smartphones, video cameras, and its ability to capture human activity data. While electronic devices and their applications are steadily growing, the advances in Artificial intelligence (AI) have revolutionized the ability to extract deep hidden information for accurate detection and its interpretation. This yields a better understanding of rapidly growing acquisition devices, AI, and applications, the three pillars of HAR under one roof. There are many review articles published on the general characteristics of HAR, a few have compared all the HAR devices at the same time, and few have explored the impact of evolving AI architecture. In our proposed review, a detailed narration on the three pillars of HAR is presented covering the period from 2011 to 2021. Further, the review presents the recommendations for an improved HAR design, its reliability, and stability. Five major findings were: (1) HAR constitutes three major pillars such as devices, AI and applications; (2) HAR has dominated the healthcare industry; (3) Hybrid AI models are in their infancy stage and needs considerable work for providing the stable and reliable design. Further, these trained models need solid prediction, high accuracy, generalization, and finally, meeting the objectives of the applications without bias; (4) little work was observed in abnormality detection during actions; and (5) almost no work has been done in forecasting actions. We conclude that: (a) HAR industry will evolve in terms of the three pillars of electronic devices, applications and the type of AI. (b) AI will provide a powerful impetus to the HAR industry in future.

  相似文献   

14.
The Internet connects hundreds of millions of computers across the world running on multiple hardware and software platforms providing communication and commercial services. However, this interconnectivity among computers also enables malicious users to misuse resources and mount Internet attacks. The continuously growing Internet attacks pose severe challenges to develop a flexible, adaptive security oriented methods. Intrusion detection system (IDS) is one of most important component being used to detect the Internet attacks. In literature, different techniques from various disciplines have been utilized to develop efficient IDS. Artificial intelligence (AI) based techniques plays prominent role in development of IDS and has many benefits over other techniques. However, there is no comprehensive review of AI based techniques to examine and understand the current status of these techniques to solve the intrusion detection problems. In this paper, various AI based techniques have been reviewed focusing on development of IDS. Related studies have been compared by their source of audit data, processing criteria, technique used, dataset, classifier design, feature reduction technique employed and other experimental environment setup. Benefits and limitations of AI based techniques have been discussed. The paper will help the better understanding of different directions in which research has been done in the field of IDS. The findings of this paper provide useful insights into literature and are beneficial for those who are interested in applications of AI based techniques to IDS and related fields. The review also provides the future directions of the research in this area.  相似文献   

15.
Visualization and artificial intelligence (AI) are well-applied approaches to data analysis. On one hand, visualization can facilitate humans in data understanding through intuitive visual representation and interactive exploration. On the other hand, AI is able to learn from data and implement bulky tasks for humans. In complex data analysis scenarios, like epidemic traceability and city planning, humans need to understand large-scale data and make decisions, which requires complementing the strengths of both visualization and AI. Existing studies have introduced AI-assisted visualization as AI4VIS and visualization-assisted AI as VIS4AI. However, how can AI and visualization complement each other and be integrated into data analysis processes are still missing. In this paper, we define three integration levels of visualization and AI. The highest integration level is described as the framework of VIS+AI, which allows AI to learn human intelligence from interactions and communicate with humans through visual interfaces. We also summarize future directions of VIS+AI to inspire related studies.  相似文献   

16.
Accurate anomaly detection is critical to the early detection of potential failures of industrial systems and proactive maintenance schedule management. There are some existing challenges to achieve efficient and reliable anomaly detection of an automation system: (1) transmitting large amounts of data collected from the system to data processing components; (2) applying both historical data and real-time data for anomaly detection. This paper proposes a novel Digital Twin-driven anomaly detection framework that enables real-time health monitoring of industrial systems and anomaly prediction. Our framework, adopting the visionary edge AI or edge intelligence (EI) philosophy, provides a feasible approach to ensuring high-performance anomaly detection via implementing Digital Twin technologies in a dynamic industrial edge/cloud network. Edge-based Digital Twin allows efficient data processing by providing computing and storage capabilities on edge devices. A proof-of-concept prototype is developed on a LiBr absorption chiller to demonstrate the framework and technologies' feasibility. The case study shows that the proposed method can detect anomalies at an early stage.  相似文献   

17.
周涛  甘燃  徐东伟  王竟亦  宣琦 《软件学报》2024,35(1):185-219
深度神经网络是人工智能领域的一项重要技术, 它被广泛应用于各种图像分类任务. 但是, 现有的研究表明深度神经网络存在安全漏洞, 容易受到对抗样本的攻击, 而目前并没有研究针对图像对抗样本检测进行体系化分析. 为了提高深度神经网络的安全性, 针对现有的研究工作, 全面地介绍图像分类领域的对抗样本检测方法. 首先根据检测器的构建方式将检测方法分为有监督检测与无监督检测, 然后根据其检测原理进行子类划分. 最后总结对抗样本检测领域存在的问题, 在泛化性和轻量化等方面提出建议与展望, 旨在为人工智能安全研究提供帮助.  相似文献   

18.
Preface          下载免费PDF全文
Database and Artificial Intelligence (AI) can benefit from each other. On the one hand, AI can make database more intelligent (AI4DB) by exploiting learning-based techniques. On the other hand, database techniques can optimize AI models (DB4AI), such as reducing the complexity of using AI models and accelerating the deployment of AI algorithms. In this special section, we discuss 1) how to exploit AI or machine learning techniques for index design, performance tuning, query processing in database systems, and 2) how to utilize database and data management techniques to make AI models more reusable and more tolerant to dirty data.  相似文献   

19.
新型冠状病毒肺炎(corona virus disease,COVID-19)的暴发对全球人类的生命财产安全造成了巨大威胁。人工智能(artificial intelligence,AI)为助力打赢这场疫情攻坚战发挥了不可替代的作用。由于AI的助力,医疗资源紧张的问题得到大幅度缓解,并提高了医疗诊断效率,同时也避免接触感染的风险。阐述了COVID-19和AI的背景知识,从疫情趋势预测、疫情溯源追踪、检测诊断、药物开发、疫苗研制、药物再利用、网络舆论管控以及基因组测序这8个疫情防控的环节讨论了AI在本次COVID-19中的研究进展,并列举本次疫情中AI所面临的挑战,浅谈本次疫情对我国AI产业影响以及两者的辩证关系,对全文进行总结。  相似文献   

20.
人工智能技术因其强大的学习和泛化能力已经被广泛应用到各种真实场景中.然而,现有人工智能技术还面临着三大挑战.第一,现有AI技术使用门槛高,依赖于AI从业者选择合适模型、设计合理参数、编写程序,因此很难被广泛应用到非计算机领域;第二,现有AI算法训练效率低,造成了大量计算资源浪费,甚至延误决策时机;第三、现有AI技术强依赖高质量数据,如果数据质量较低,可能造成计算结果的错误.数据库技术可以有效解决这三个难题,因此目前面向AI的数据管理得到了广泛关注.本文首先给出AI中数据管理的整体框架,然后详细综述基于声明式语言模型的AI系统、面向AI优化的计算引擎、执行引擎和面向AI的数据治理引擎四个方面.最后展望未来的研究方向和挑战.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号