Advertisement

The Journal of Supercomputing

, Volume 74, Issue 12, pp 6923–6938 | Cite as

An event-driven plan recognition algorithm based on intuitionistic fuzzy theory

  • Xiaofan WangEmail author
  • Lei Wang
  • Shengji Li
  • Jin Wang
Article
  • 64 Downloads

Abstract

Plan recognition is a process of the observers inferring agents’ goal and planning by observing the agents’ behavior sequences. It is applied to image processing, network security and military domain. But the most prior work about plan recognition could not deal with fragmentary and small quantity of event information effectively and accurately. In this paper, we put forward an event-driven plan recognition method based on intuitionistic fuzzy theory. The algorithm based on recognizing the fuzzy event sequences is presented to forecast the future action about object. First, by analyzing the process and feature of plan recognition, we bring the master plan into sub-tasks which are a sequence of events, and then we create an algorithm about predicting the goal of the plan by recognizing the series of events. At the same time, thinking about the uncertainty of event, intuitionistic fuzzy theory is put into this model to eliminate the ambiguity of data. Finally, an experiment in military domain is testified for our approach.

Keywords

Plan recognition Situation assessment Intuitionistic fuzzy theory Event 

References

  1. 1.
    Nogueira JM, Furtado AL, Alcazar JJP (1996) A hybrid formal theory of plan recognition and its implementation. Lect Notes Comput Sci 1159:31–40CrossRefGoogle Scholar
  2. 2.
    Ma S, Jiang H, Han M, Xie J, Li C (2017) Research on automatic parking systems based on parking scene recognition. IEEE Access 5:21901–21917CrossRefGoogle Scholar
  3. 3.
    Zheng Y, Sun L, Wang S, Zhang J, Ning J (2018) Spatially regularized structural support vector machine for robust visual tracking. IEEE Trans Neural Netw Learn Syst.  https://doi.org/10.1109/tnnls.2018.2855686 CrossRefGoogle Scholar
  4. 4.
    Park C, Pattipati KR, Kleinman DL (2012) Multi-level operational C2 architecture modeling via hierarchically structured semi-Markov decision processes. IEEE Int Conf Syst 2:1262–1267Google Scholar
  5. 5.
    Han X, Mandal S, Pattipati KR (2014) An optimization-based distributed planning algorithm: a blackboard-based collaborative framework. IEEE Trans Syst Man Cybern Syst 44:673–684CrossRefGoogle Scholar
  6. 6.
    Li W, Wang B, Wang S (2006) Study of situation assessment method based on plan recognition theory. J Electron Inf 28:532–536Google Scholar
  7. 7.
    Lei Y, Wang B (2006) Techniques for battlefield situation assessment based on intuitionistic fuzzy decision. J Electron 34:2175–2179Google Scholar
  8. 8.
    Wang X, Wang B (2009) Techniques for situation assessment based on bayesian network and intuitionistic fuzzy reasoning. Syst Eng Electr Technol 31:2742–2746Google Scholar
  9. 9.
    Loui RP, Smith J (2017) An ontology for active and passive aerial drone threat automatic plan recognition. In: Aerospace and Electronics Conference, pp 62–67Google Scholar
  10. 10.
    Ariffin NAM, Snai NFM (2014) Plan recognition scheme using multi-factors authentication for smart card online system. In: International Symposium on Biometric and Security Technologies, pp 156–160Google Scholar
  11. 11.
    Amos-Binks A, Clark J, Weston K, Winters M, Harfoush K (2017) Efficient attack plan recognition using automated planning. In: IEEE Symposium on Computers and Communications, pp 1001–1006Google Scholar
  12. 12.
    Geib CW, Goldman RP (2009) A probabilistic plan recognition algorithm based on plan tree grammars. Artif Intell 173:1101–1132MathSciNetCrossRefGoogle Scholar
  13. 13.
    Zhang D, Jie L, Shao G (2012) A new plan recognition algorithm and its implementation. In: International Conference on Computational Intelligence and Security, pp 159–162Google Scholar
  14. 14.
    Katz G, Huang D, Hauge T, Gentili R, Reggia J (2017) A new parsimonious cause-effect reasoning algorithm for robot imitation and plan recognition. IEEE Trans Cogn Dev Syst 10:1–17Google Scholar
  15. 15.
    Wang J, Yin Y, Zhang J, Lee S, Sherratt RS (2013) Mobility based energy efficient and multi-sink algorithms for consumer home networks. IEEE Trans Consum Electron 59(1):77–84CrossRefGoogle Scholar
  16. 16.
    Wang J, Cao Y, Li B, Lee S, Kim J (2015) A glowworm swarm optimization based clustering algorithm with mobile sink support for wireless sensor networks. J Intern Technol 16:825–832Google Scholar
  17. 17.
    Zhu H, Xiao F, Sun L, Wang R, Yang P (2017) R-TTWD: robust device-free through-the-wall detection of moving human with WiFi. IEEE J Sel Areas Commun 35:1090–1103CrossRefGoogle Scholar
  18. 18.
    Singh S, Sharma PK, Moon SY, Moon D, Park JH (2016) A comprehensive study on APT attacks and countermeasures for future networks and communications: challenges and solutions. J Supercomput 71:1–32Google Scholar
  19. 19.
    Kim B (2017) A distributed coexistence mitigation scheme for IoT-s. J Inf Process Syst 13:1602–1612Google Scholar
  20. 20.
    Koo K, Cha E (2017) Image recognition performance enhancements using image normalization. Hum Cent Comput Inf Sci 12:7–33Google Scholar
  21. 21.
    Sharma PK, Moon SY, Park JH (2017) Block-VN: a distributed block chain based vehicular network architecture in smart city. J Inf Process Syst 13:184–195Google Scholar
  22. 22.
    Zheng Y, Jeon B, Zhang J, Chen Y (2015) Adaptively determining regularization parameters in non-local total variation regularization for image denoising. Electron Lett 51:144–145CrossRefGoogle Scholar
  23. 23.
    Han J, Quan R, Zhang D, Nie F (2018) Robust object co-segmentation using background prior. IEEE Trans Image Process 27:1639–1651MathSciNetCrossRefGoogle Scholar
  24. 24.
    Cheng G, Yang C, Yao X, Guo L, Han J (2018) When deep learning meets metric learning: remote sensing image scene classification via learning discriminative CNNs. IEEE Trans Geosci Remote Sens.  https://doi.org/10.1109/tgrs.2017.2783902 CrossRefGoogle Scholar
  25. 25.
    Wang X, Wang B (2010) Algorithm based attribute-value-tree for calculation of core and attribute reduction. J Xidian Univ 37:1111–1118Google Scholar
  26. 26.
    Schmidt CF, Sridharan NS, Goodson JL (1978) The Plan Recognition Problem: an Intersection of Psychology and Artificial Intelligence. Artif Intell 11:45–83CrossRefGoogle Scholar
  27. 27.
    Wilensky R (1983) Planning and understanding. Addison-Wesley, ReadingGoogle Scholar
  28. 28.
    Kautz HA, Allen JF (1986) Generalized plan recognition. In: Proceedings of the 5th National Conference on AI, pp 32–37Google Scholar
  29. 29.
    Geib CW, Goldman RP (2001) Plan recognition in intrusion detection systems. In: Darpa Information Survivability Conference and Exposition II, vol 1, pp 46–55Google Scholar
  30. 30.
    Geib CW, Goldman RP (2001) Partial observability in collaborative task tracking. In: Proceedings of the AAAI 2001 Fall Symposium on Collaborative Task TrackingGoogle Scholar
  31. 31.
    Mirsky R, Gal Y, Shieber SM (2017) CRADLE: an online plan recognition algorithm for exploratory domains. ACM Trans Intell Syst Technol 8:1–22CrossRefGoogle Scholar
  32. 32.
    Farias GP, Hilgert LW, Meneguzzi FR, Vieira R, Bordini RH (2016) Automatic generation of plan libraries for plan recognition performance evaluation. IEEE Comput Soc 2:129–132Google Scholar
  33. 33.
    Wu J (1999) Key Technology Research of Situation Assessment. Xidian UniversityGoogle Scholar
  34. 34.
    Cheng Y, Wang B, Li W (2003) The study of situation assessment based on the model of multi-agent plan recognition. Fire Control Command Control 28:11–14Google Scholar
  35. 35.
    Jiang YF, Ma N (2002) Solution to plan recognition problem based on circumscription. Chin J Comput 25:1411–1416MathSciNetGoogle Scholar
  36. 36.
    Tunio MZ, Luo H, Wang C, Zhao F, Shao W, Pathan ZH (2018) Crowdsourcing software development: task assignment using PDDL artificial intelligence planning. J Inf Process Syst 14:129–139Google Scholar
  37. 37.
    Souril A, Hosseini R (2018) A state-of-the art survey of malware detection approaches using data mining techniques. Hum Cent Comput Inf Sci 8:1–22CrossRefGoogle Scholar
  38. 38.
    Wan M, Yao J, Jing Y, Jin X (2018) Event-based anomaly detection for non-public industrial communication protocols in SDN-based control systems. Comput Mater Contin 55:447–463Google Scholar
  39. 39.
    Liu X, Zhang Q, Xia X (2017) The stable explicit time stepping analysis with a new enrichment scheme by XFEM. Comput Mater Contin 53:187–206Google Scholar
  40. 40.
    Shahabi C, Kim SH, Nocera L, Constantinou G, Lu Y, Cai Y, Medioni G, Nevatia R, Banaei-Kashani F (2014) Janus-multi source event detection and collection system for effective surveillance of criminal activity. J Inf Process Syst 10:1–22CrossRefGoogle Scholar
  41. 41.
    Hussain A, Abbasi AR, Afzulpurkar N (2012) Detecting and interpreting self-manipulating hand movements for student’s affect prediction. Hum Cent Comput Inf Sci 8:1–18Google Scholar
  42. 42.
    Hall DL, Llinas J (2001) Handbook of multi-sensor data fusion. CRC Press, Washington DCGoogle Scholar
  43. 43.
    Atanassov K (1986) Intuitionistic fuzzy sets. Fuzzy Sets Syst 20:87–96CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  1. 1.School of Computer Science and EngineeringXi’an University of TechnologyXi’anChina
  2. 2.School of Computer and Communication EngineeringChangsha University of Science and TechnologyChangshaChina

Personalised recommendations