Skip to main content

Advertisement

Log in

An event-driven plan recognition algorithm based on intuitionistic fuzzy theory

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

Plan recognition is a process of the observers inferring agents’ goal and planning by observing the agents’ behavior sequences. It is applied to image processing, network security and military domain. But the most prior work about plan recognition could not deal with fragmentary and small quantity of event information effectively and accurately. In this paper, we put forward an event-driven plan recognition method based on intuitionistic fuzzy theory. The algorithm based on recognizing the fuzzy event sequences is presented to forecast the future action about object. First, by analyzing the process and feature of plan recognition, we bring the master plan into sub-tasks which are a sequence of events, and then we create an algorithm about predicting the goal of the plan by recognizing the series of events. At the same time, thinking about the uncertainty of event, intuitionistic fuzzy theory is put into this model to eliminate the ambiguity of data. Finally, an experiment in military domain is testified for our approach.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2

Similar content being viewed by others

References

  1. Nogueira JM, Furtado AL, Alcazar JJP (1996) A hybrid formal theory of plan recognition and its implementation. Lect Notes Comput Sci 1159:31–40

    Article  Google Scholar 

  2. Ma S, Jiang H, Han M, Xie J, Li C (2017) Research on automatic parking systems based on parking scene recognition. IEEE Access 5:21901–21917

    Article  Google Scholar 

  3. Zheng Y, Sun L, Wang S, Zhang J, Ning J (2018) Spatially regularized structural support vector machine for robust visual tracking. IEEE Trans Neural Netw Learn Syst. https://doi.org/10.1109/tnnls.2018.2855686

    Article  Google Scholar 

  4. Park C, Pattipati KR, Kleinman DL (2012) Multi-level operational C2 architecture modeling via hierarchically structured semi-Markov decision processes. IEEE Int Conf Syst 2:1262–1267

    Google Scholar 

  5. Han X, Mandal S, Pattipati KR (2014) An optimization-based distributed planning algorithm: a blackboard-based collaborative framework. IEEE Trans Syst Man Cybern Syst 44:673–684

    Article  Google Scholar 

  6. Li W, Wang B, Wang S (2006) Study of situation assessment method based on plan recognition theory. J Electron Inf 28:532–536

    Google Scholar 

  7. Lei Y, Wang B (2006) Techniques for battlefield situation assessment based on intuitionistic fuzzy decision. J Electron 34:2175–2179

    Google Scholar 

  8. Wang X, Wang B (2009) Techniques for situation assessment based on bayesian network and intuitionistic fuzzy reasoning. Syst Eng Electr Technol 31:2742–2746

    Google Scholar 

  9. Loui RP, Smith J (2017) An ontology for active and passive aerial drone threat automatic plan recognition. In: Aerospace and Electronics Conference, pp 62–67

  10. Ariffin NAM, Snai NFM (2014) Plan recognition scheme using multi-factors authentication for smart card online system. In: International Symposium on Biometric and Security Technologies, pp 156–160

  11. Amos-Binks A, Clark J, Weston K, Winters M, Harfoush K (2017) Efficient attack plan recognition using automated planning. In: IEEE Symposium on Computers and Communications, pp 1001–1006

  12. Geib CW, Goldman RP (2009) A probabilistic plan recognition algorithm based on plan tree grammars. Artif Intell 173:1101–1132

    Article  MathSciNet  Google Scholar 

  13. Zhang D, Jie L, Shao G (2012) A new plan recognition algorithm and its implementation. In: International Conference on Computational Intelligence and Security, pp 159–162

  14. Katz G, Huang D, Hauge T, Gentili R, Reggia J (2017) A new parsimonious cause-effect reasoning algorithm for robot imitation and plan recognition. IEEE Trans Cogn Dev Syst 10:1–17

    Google Scholar 

  15. Wang J, Yin Y, Zhang J, Lee S, Sherratt RS (2013) Mobility based energy efficient and multi-sink algorithms for consumer home networks. IEEE Trans Consum Electron 59(1):77–84

    Article  Google Scholar 

  16. Wang J, Cao Y, Li B, Lee S, Kim J (2015) A glowworm swarm optimization based clustering algorithm with mobile sink support for wireless sensor networks. J Intern Technol 16:825–832

    Google Scholar 

  17. Zhu H, Xiao F, Sun L, Wang R, Yang P (2017) R-TTWD: robust device-free through-the-wall detection of moving human with WiFi. IEEE J Sel Areas Commun 35:1090–1103

    Article  Google Scholar 

  18. Singh S, Sharma PK, Moon SY, Moon D, Park JH (2016) A comprehensive study on APT attacks and countermeasures for future networks and communications: challenges and solutions. J Supercomput 71:1–32

    Google Scholar 

  19. Kim B (2017) A distributed coexistence mitigation scheme for IoT-s. J Inf Process Syst 13:1602–1612

    Google Scholar 

  20. Koo K, Cha E (2017) Image recognition performance enhancements using image normalization. Hum Cent Comput Inf Sci 12:7–33

    Google Scholar 

  21. Sharma PK, Moon SY, Park JH (2017) Block-VN: a distributed block chain based vehicular network architecture in smart city. J Inf Process Syst 13:184–195

    Google Scholar 

  22. Zheng Y, Jeon B, Zhang J, Chen Y (2015) Adaptively determining regularization parameters in non-local total variation regularization for image denoising. Electron Lett 51:144–145

    Article  Google Scholar 

  23. Han J, Quan R, Zhang D, Nie F (2018) Robust object co-segmentation using background prior. IEEE Trans Image Process 27:1639–1651

    Article  MathSciNet  Google Scholar 

  24. Cheng G, Yang C, Yao X, Guo L, Han J (2018) When deep learning meets metric learning: remote sensing image scene classification via learning discriminative CNNs. IEEE Trans Geosci Remote Sens. https://doi.org/10.1109/tgrs.2017.2783902

    Article  Google Scholar 

  25. Wang X, Wang B (2010) Algorithm based attribute-value-tree for calculation of core and attribute reduction. J Xidian Univ 37:1111–1118

    Google Scholar 

  26. Schmidt CF, Sridharan NS, Goodson JL (1978) The Plan Recognition Problem: an Intersection of Psychology and Artificial Intelligence. Artif Intell 11:45–83

    Article  Google Scholar 

  27. Wilensky R (1983) Planning and understanding. Addison-Wesley, Reading

    Google Scholar 

  28. Kautz HA, Allen JF (1986) Generalized plan recognition. In: Proceedings of the 5th National Conference on AI, pp 32–37

  29. Geib CW, Goldman RP (2001) Plan recognition in intrusion detection systems. In: Darpa Information Survivability Conference and Exposition II, vol 1, pp 46–55

  30. Geib CW, Goldman RP (2001) Partial observability in collaborative task tracking. In: Proceedings of the AAAI 2001 Fall Symposium on Collaborative Task Tracking

  31. Mirsky R, Gal Y, Shieber SM (2017) CRADLE: an online plan recognition algorithm for exploratory domains. ACM Trans Intell Syst Technol 8:1–22

    Article  Google Scholar 

  32. Farias GP, Hilgert LW, Meneguzzi FR, Vieira R, Bordini RH (2016) Automatic generation of plan libraries for plan recognition performance evaluation. IEEE Comput Soc 2:129–132

    Google Scholar 

  33. Wu J (1999) Key Technology Research of Situation Assessment. Xidian University

  34. Cheng Y, Wang B, Li W (2003) The study of situation assessment based on the model of multi-agent plan recognition. Fire Control Command Control 28:11–14

    Google Scholar 

  35. Jiang YF, Ma N (2002) Solution to plan recognition problem based on circumscription. Chin J Comput 25:1411–1416

    MathSciNet  Google Scholar 

  36. Tunio MZ, Luo H, Wang C, Zhao F, Shao W, Pathan ZH (2018) Crowdsourcing software development: task assignment using PDDL artificial intelligence planning. J Inf Process Syst 14:129–139

    Google Scholar 

  37. Souril A, Hosseini R (2018) A state-of-the art survey of malware detection approaches using data mining techniques. Hum Cent Comput Inf Sci 8:1–22

    Article  Google Scholar 

  38. Wan M, Yao J, Jing Y, Jin X (2018) Event-based anomaly detection for non-public industrial communication protocols in SDN-based control systems. Comput Mater Contin 55:447–463

    Google Scholar 

  39. Liu X, Zhang Q, Xia X (2017) The stable explicit time stepping analysis with a new enrichment scheme by XFEM. Comput Mater Contin 53:187–206

    Google Scholar 

  40. Shahabi C, Kim SH, Nocera L, Constantinou G, Lu Y, Cai Y, Medioni G, Nevatia R, Banaei-Kashani F (2014) Janus-multi source event detection and collection system for effective surveillance of criminal activity. J Inf Process Syst 10:1–22

    Article  Google Scholar 

  41. Hussain A, Abbasi AR, Afzulpurkar N (2012) Detecting and interpreting self-manipulating hand movements for student’s affect prediction. Hum Cent Comput Inf Sci 8:1–18

    Google Scholar 

  42. Hall DL, Llinas J (2001) Handbook of multi-sensor data fusion. CRC Press, Washington DC

    Google Scholar 

  43. Atanassov K (1986) Intuitionistic fuzzy sets. Fuzzy Sets Syst 20:87–96

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xiaofan Wang.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Wang, X., Wang, L., Li, S. et al. An event-driven plan recognition algorithm based on intuitionistic fuzzy theory. J Supercomput 74, 6923–6938 (2018). https://doi.org/10.1007/s11227-018-2650-9

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-018-2650-9

Keywords