Research on Plan Recognition Based on Misleading Action Processing
نویسندگان
چکیده
As the application field of plan recognition expands continuously, the traditional plan recognition methods have hindered the application of plan recognition in hostile environment, which ignored the defects of misleading action. In this paper, a plan recognition algorithm based on the process of misleading action is proposed under the framework of plan knowledge graph. The method makes it possible to infer the action that is not observed by introducing the concept of the original reliability into the plan knowledge graph, and makes it possible to process the misleading action and wrong operation of the hostile agent by introducing the recognition process of the misleading action, which the method based on plan knowledge graph cannot achieved. The experimental results showed the algorithm in this paper greatly improved the accuracy of plan recognition by the process of the misleading action and it was with good performance. The algorithm has great significance for the application of plan recognition in the adversarial environment such as the intrusion detection, tactical planning, intelligence games etc.
منابع مشابه
Generic Plan of Food Safety Management System Based on ISO 22000:2005 for Aflatoxin Control in Raw Pistachio Processing Units from Raw Material Reception to Packaging
Pistachio is one of the most important agricultural crops of Iran. It is a nut from Anacardiacea family and its domesticated species is called Pistacia vera L. Regarding to pistachio importance and usage and by the expanding of pistachio cultivate, it is necessary to improve agricultural situation and by establishing well equipped processing and packaging units near the farms, it is possible to...
متن کاملPlan Recognition Using A Hypothesize and Revise Paradigm
Problem-Solving: Schmidt linearly ordered and unbounded in time. Plans are bounded, hierarchical, and nonlinearly ordered based on the logical connection between an enduring outcome of one action and the precondition of some subsequent action. Further, a plan is well-formed with reference to the planner's beliefs about the world rather than with respect to the actual state of the world. For the...
متن کاملAlert correlation and prediction using data mining and HMM
Intrusion Detection Systems (IDSs) are security tools widely used in computer networks. While they seem to be promising technologies, they pose some serious drawbacks: When utilized in large and high traffic networks, IDSs generate high volumes of low-level alerts which are hardly manageable. Accordingly, there emerged a recent track of security research, focused on alert correlation, which ext...
متن کاملAction Change Detection in Video Based on HOG
Background and Objectives: Action recognition, as the processes of labeling an unknown action of a query video, is a challenging problem, due to the event complexity, variations in imaging conditions, and intra- and inter-individual action-variability. A number of solutions proposed to solve action recognition problem. Many of these frameworks suppose that each video sequence includes only one ...
متن کاملParallel processing in human audition and post-lesion plasticity
Recent activation and electrophysiological studies have demonstrated that sound recognition and localization are processed in two distinct cortical networks that are each present in both hemispheres. Sound recognition and/or localization may be, however, disrupted by purely unilateral damage, suggesting that processing within one hemisphere may not be sufficient or may be disturbed by the contr...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2015