چکیده
1. مقدمه
2. مطالعات مرتبط
3. مقدمات
4. رویکرد ما
5. ارزیابی عملکرد
6. بحث
7. اظهارات پایانی
منابع
Abstract
1. Introduction
2. Related works
3. Preliminaries
4. Our approach
5. Performance evaluation
6. Discussion
7. Final remarks
Acknowledgments
References
چکیده
در این مقاله، ما به موضوع ارزیابی آسیب بلایا با استفاده از تکنیکهای یادگیری عمیق (DL) میپردازیم. به طور خاص، ما ادغام تکنیکهای DL را در سیستم موتور جستجوی اینترنت اشیاء (IoTSE) برای انجام ارزیابی خسارت ناشی از بلایا پیشنهاد میکنیم. رویکرد ما طراحی دو سناریو، تنظیمات رویداد منفرد و پیچیده، برای تکمیل اعتبارسنجی عملکرد با استفاده از چهار مدل شبکه عصبی کانولوشنال (CNN) است. این دو سناریو با سه سرویس شبکه ممکن طراحی شده اند. نتایج تجربی ما تأیید میکند که هر چهار مدل CNN میتوانند هر برچسب را در طول تنظیم رویداد واحد به خوبی یاد بگیرند. در حالی که، با تنظیمات رویداد پیچیده، مدلهای CNN مشکل یادگیری دارند زیرا چندین رویداد دارای برچسبهای مرتبط نزدیک هستند.
توجه! این متن ترجمه ماشینی بوده و توسط مترجمین ای ترجمه، ترجمه نشده است.
Abstract
In this paper, we address the issue of disaster damage assessments using deep learning (DL) techniques. Specifically, we propose integrating DL techniques into the Internet of Things Search Engine (IoTSE) system to carry out disaster damage assessment. Our approach is to design two scenarios, Single and Complex Event Settings, to complete performance validation using four Convolutional Neural Network (CNN) models. These two scenarios are designed with three possible network services. Our experimental results confirm that all four CNN models can learn each label during the single event setting well. Whereas, with complex event settings, the CNN models have learning difficulty because multiple events have closely related labels.
Introduction
As technology advances, so does our ability to provide data and deep learning (DL)-driven analytics and predictions. ML techniques, especially DL, have received growing attention and applied to numerous areas, including image and video classification, natural language processing, robotics, networking, mobile computing and cybersecurity, among others [1–9]. DL is prominent in our daily lives; at home with our digital assistants (Apple’s Siri, Amazon’s Alexa, Google Home), within our businesses that forecast finance models, among social interactions affording collaboration, and around emerging in autonomous vehicles and smart homes with a variety of smart devices (NEST thermostats, Ring cameras) [3,10]. DL techniques work to secure the network with anomaly and intrusion detection systems using supervised and unsupervised techniques, provide the capability of identifying security breaches that can occur on a specific computer or on the network [11–15], and balance privacy, utility, safety and reliability [16,17].
Discussion
Potential future research directions for DL-based IoTSE for damage assessment concern performance and security.
Performance issue: After running through the performance evaluation, we have determined that all of these models are less likely to recognise the same label in a different but same-topic event. There are two potential ways to improve this. One is utilising DL models that will be able to understand the same or similar context from different datasets. The other is designing a new data pre-processing scheme, which focuses on the similar topic dataset, making the same label data easier for the model to know whether they are the same thing. With respect to the network performance issue, since the whole IoTSE system may be operated over a constrained network environment, the more queries sent to IoTSE, more overhead occurs. To deal with a large number of queries (the cost for responding some queries could be high), we can not only develop the multi-class scheduling algorithms to handle queries with different priorities but also enhance the design of IoTSE architecture to reduce the time taken for processing queries [40 41]. In addition to use the traditional scheduling and optimisation techniques to efficiently manage resources in IoTSE, the new data-oriented network architectures such as Named Data Network (NDN) [64] could be considered.