{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T19:22:21Z","timestamp":1740165741549,"version":"3.37.3"},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2020,11,3]],"date-time":"2020-11-03T00:00:00Z","timestamp":1604361600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2020,11,3]],"date-time":"2020-11-03T00:00:00Z","timestamp":1604361600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"name":"The Ministry of Education of the Republic of Korea and the National Research Foundation of Korea","award":["NRF-2017S1A5A2A01026286"],"award-info":[{"award-number":["NRF-2017S1A5A2A01026286"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Hum. Cent. Comput. Inf. Sci."],"published-print":{"date-parts":[[2020,12]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>The latest research on smart city technologies mainly focuses on utilizing cities\u2019 resources to improve the quality of the lives of citizens. Diverse kinds of control signals from massive systems and devices such as adaptive traffic light systems in smart cities can be collected and utilized. Unfortunately, it is difficult to collect a massive dataset of control signals as doing so in the real-world requires significant effort and time. This paper proposes a deep generative model which integrates a long short-term memory model with generative adversarial network (LSTM-GAN) to generate agent control signals based on the words extracted from newspaper articles to solve the problem of collecting massive signals. The discriminatory network in the LSTM-GAN takes continuous word embedding vectors as inputs generated by a pre-trained Word2Vec model. The agent control signals of sequential actions are simultaneously predicted by the LSTM-GAN in real time. Specifically, to collect the training data of smart city simulations, the LSTM-GAN is trained based on the Corpus of Contemporary American English (COCA) newspaper dataset, which contains 5,317,731 sentences, for a total of 93,626,203 word tokens, from written texts. To verify the proposed method, agent control signals were generated and validated. In the training of the LSTM-GAN, the accuracy of the discriminator converged to 50%. In addition, the losses of the discriminator and the generator converged from 4527.04 and 4527.94 to 2.97 and 1.87, respectively.<\/jats:p>","DOI":"10.1186\/s13673-020-00252-8","type":"journal-article","created":{"date-parts":[[2020,11,3]],"date-time":"2020-11-03T16:41:26Z","timestamp":1604421686000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Newspaper article-based agent control in smart city simulations"],"prefix":"10.1186","volume":"10","author":[{"given":"Euhee","family":"Kim","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Sejun","family":"Jang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Shuyu","family":"Li","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3732-5346","authenticated-orcid":false,"given":"Yunsick","family":"Sung","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2020,11,3]]},"reference":[{"key":"252_CR1","doi-asserted-by":"publisher","first-page":"758","DOI":"10.1016\/j.scs.2017.12.032","volume":"38","author":"SE Bibri","year":"2018","unstructured":"Bibri SE (2018) A foundational framework for smart sustainable city development: theoretical, disciplinary, and discursive dimensions and their synergies. Sustain Cities Soc 38:758\u2013794","journal-title":"Sustain Cities Soc"},{"issue":"29","key":"252_CR2","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1186\/s13673-019-0190-9","volume":"9","author":"JH Park","year":"2019","unstructured":"Park JH, Salim MM, Jo JH, Sicato JCS, Rathore S, Park JH (2019) CIoT-Net: a scalable cognitive IoT based smart city network architecture. Hum Comput Inf Sci 9(29):29\u201349","journal-title":"Hum Comput Inf Sci"},{"issue":"9","key":"252_CR3","first-page":"1","volume":"10","author":"Y Lee","year":"2020","unstructured":"Lee Y, Rathore S, Park JH, Park JH (2020) A blockchain-based smart home gateway architecture for preventing data forgery. Hum Comput Inf Sci 10(9):1\u201314","journal-title":"Hum Comput Inf Sci"},{"issue":"2","key":"252_CR4","first-page":"23","volume":"15","author":"YS Jeong","year":"2019","unstructured":"Jeong YS, Park JH (2019) IoT and smart city technology: challenges, opportunities, and solutions. J Inf Process Syst 15(2):23\u2013238","journal-title":"J Inf Process Syst"},{"key":"252_CR5","doi-asserted-by":"publisher","first-page":"427","DOI":"10.1016\/j.future.2018.10.026","volume":"93","author":"ADM Del Esposte","year":"2019","unstructured":"Del Esposte ADM, Santana EF, Kanashiro L, Costa FM, Braghetto KR, Lago N, Kon K (2019) Design and evaluation of a scalable smart city software platform with large-scale simulations. Fut Gener Comput Syst 93:427\u2013441","journal-title":"Fut Gener Comput Syst"},{"key":"252_CR6","doi-asserted-by":"crossref","unstructured":"Mallapuram S, Ngwum N, Yuan F, Lu C, Yu W (2017) Smart city: the state of the art, datasets, and evaluation platforms. In: 2017 IEEE\/ACIS 16th international conference on computer and information science (ICIS), pp. 447--452. IEEE, Wu Han","DOI":"10.1109\/ICIS.2017.7960034"},{"key":"252_CR7","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1016\/j.cam.2013.11.020","volume":"270","author":"JL Gal\u00e1n-Garc\u00eda","year":"2014","unstructured":"Gal\u00e1n-Garc\u00eda JL, Aguilera-Venegas G, Rodr\u00edguez-Cielos P (2014) An accelerated-time simulation for traffic flow in a smart city. J Comput Appl Math 270:55\u2013563","journal-title":"J Comput Appl Math"},{"key":"252_CR8","doi-asserted-by":"crossref","unstructured":"Mesquita R, Campos-Rebelo R, Barros JP (2019) model based simulation for a smart city project based on LoRa. In: IECON 2019\u201345th annual conference of the IEEE industrial electronics society. IEEE, Lisboa, pp. 5868\u20145873","DOI":"10.1109\/IECON.2019.8927772"},{"key":"252_CR9","doi-asserted-by":"publisher","first-page":"301","DOI":"10.1016\/j.ins.2018.03.050","volume":"450","author":"Y Li","year":"2018","unstructured":"Li Y, Pan Q, Wang S, Yang T, Cambria E (2018) A generative model for category text generation. Inf Sci 450:301\u2013315","journal-title":"Inf Sci"},{"key":"252_CR10","doi-asserted-by":"crossref","unstructured":"Alayba AM, Palade V, England M, Iqbal R (2018) A combined CNN and LSTM model for arabic sentiment analysis. In: International cross-domain conference for machine learning and knowledge extraction, Springer, Hamburg, pp. 179--191.","DOI":"10.1007\/978-3-319-99740-7_12"},{"issue":"3","key":"252_CR11","first-page":"694","volume":"15","author":"DH Kwon","year":"2019","unstructured":"Kwon DH, Kim JB, Heo JS, Kim CM, Han YH (2019) Time series classification of cryptocurrency price trend based on a recurrent LSTM neural network. J Inf Process Syst 15(3):694\u2013706","journal-title":"J Inf Process Syst"},{"key":"252_CR12","first-page":"20","volume":"1","author":"S Yilmaz","year":"2020","unstructured":"Yilmaz S, Toklu S (2020) A deep learning analysis on question classification task using Word2vec representations. Neural Comput Appl 1:20","journal-title":"Neural Comput Appl"},{"issue":"6","key":"252_CR13","first-page":"1503","volume":"15","author":"X Yuan","year":"2019","unstructured":"Yuan X, Wang S, Wan L, Zhang C (2019) SSF: sentence similar function based on Word2vector similar elements. J Inf Process Syst 15(6):1503\u20131516","journal-title":"J Inf Process Syst"},{"key":"252_CR14","unstructured":"https:\/\/www.english-corpora.org\/coca\/"},{"key":"252_CR15","doi-asserted-by":"publisher","unstructured":"Sangaiah AK, Medhane DV, Bian GB, Ghoneim A, Alrashoud M, Hossain MS. Energy-aware green adversary model for cyber physical security in industrial system. IEEE Trans Indu Inf. Doi: https:\/\/doi.org\/10.1109\/TII.2019.2953289.","DOI":"10.1109\/TII.2019.2953289"},{"key":"252_CR16","doi-asserted-by":"publisher","unstructured":"Sangaiah, A. K., Hosseinabadi, A. A. R., Sadeghilalimi, M., Zhang, W.: Energy Consumption in Point-Coverage Wireless Sensor Networks via Bat Algorithm. IEEE. Access. Doi: https:\/\/doi.org\/10.1109\/ACCESS.2019.2952644.","DOI":"10.1109\/ACCESS.2019.2952644"},{"key":"252_CR17","doi-asserted-by":"crossref","unstructured":"Chu PM, Wen M, Park J, Kaisi H, Cho K (2019) Three-dimensional simulation for training autonomous vehicles in smart city environments. In: 2019 international conference on internet of things (iThings) and IEEE green computing and communications (GreenCom) and IEEE cyber, physical and social computing (CPSCom) and IEEE smart data (SmartData), IEEE, Atlanta , pp. 84\u2013853.","DOI":"10.1109\/iThings\/GreenCom\/CPSCom\/SmartData.2019.00153"},{"issue":"7","key":"252_CR18","doi-asserted-by":"publisher","first-page":"418","DOI":"10.1109\/TII.2019.2898174","volume":"15","author":"AK Sangaiah","year":"2019","unstructured":"Sangaiah AK, Medhane DV, Han T, Hossain MS, Muhammad G (2019) Enforcing position-based confidentiality with machine learning paradigm through mobile edge computing in real-time industrial informatics. IEEE Trans Industr Inf 15(7):418\u20134196","journal-title":"IEEE Trans Industr Inf"},{"key":"252_CR19","doi-asserted-by":"crossref","unstructured":"Pilehvar MS, Benzaquen J, Shadmand MB, Pahwa A, Mirafzal B, McDaniel J, Rogge D, Erickson J (2018) Modeling, control, and stability of smart loads toward grid of nanogrids for smart cities. In: IECON 2018\u201444th annual conference of the IEEE industrial electronics society, IEEE, Washington, DC , pp. 4045\u20134050.","DOI":"10.1109\/IECON.2018.8591494"},{"issue":"1","key":"252_CR20","first-page":"7","volume":"5","author":"S Vijayarani","year":"2015","unstructured":"Vijayarani S, Ilamathi MJ, Nithya M (2015) Preprocessing techniques for text mining-an overview. Int J Comput Sci Commun Netw 5(1):7\u201316","journal-title":"Int J Comput Sci Commun Netw"},{"key":"252_CR21","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1016\/j.imavis.2018.04.004","volume":"75","author":"P Rodr\u00edguez","year":"2018","unstructured":"Rodr\u00edguez P, Bautista MA, Gonzalez J, Escalera S (2018) Beyond one-hot encoding: lower dimensional target embedding. Image Vis Comput 75:21\u201331","journal-title":"Image Vis Comput"},{"key":"252_CR22","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1016\/j.future.2018.07.052","volume":"90","author":"H Zhang","year":"2019","unstructured":"Zhang H, Xiao X, Mercaldo F, Ni S, Martinelli F, Sangaiah AK (2019) Classification of ransomware families with machine learning based on N-gram of opcodes. Fut Gener Comput Syst 90:211\u2013221","journal-title":"Fut Gener Comput Syst"},{"key":"252_CR23","doi-asserted-by":"crossref","unstructured":"Ma L, Zhang Y (2015) Using Word2Vec to process big text data. In: 2015 IEEE international conference on big data (Big Data), IEEE, Santa Clara, pp. 2895--2897","DOI":"10.1109\/BigData.2015.7364114"},{"key":"252_CR24","doi-asserted-by":"publisher","first-page":"366","DOI":"10.1016\/j.compeleceng.2019.06.014","volume":"77","author":"J Kang","year":"2019","unstructured":"Kang J, Jang S, Li S, Jeong YS, Sung Y (2019) Long short-term memory-based malware classification method for information security. Comput Electr Eng 77:366\u2013375","journal-title":"Comput Electr Eng"},{"key":"252_CR25","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1016\/j.neucom.2019.01.078","volume":"337","author":"G Liu","year":"2019","unstructured":"Liu G, Guo J (2019) Bidirectional LSTM with attention mechanism and convolutional layer for text classification. Neurocomputing 337:325\u2013338","journal-title":"Neurocomputing"},{"issue":"6","key":"252_CR26","doi-asserted-by":"publisher","first-page":"44","DOI":"10.5815\/ijitcs.2018.06.05","volume":"10","author":"D Pawade","year":"2018","unstructured":"Pawade D, Sakhapara A, Jain M, Jain N, Gada K (2018) Story scrambler-automatic text generation using word level RNN-LSTM. IJITCS 10(6):44\u201353","journal-title":"IJITCS"},{"key":"252_CR27","doi-asserted-by":"crossref","unstructured":"Yu L, Zhang W, Wang J, Yu Y (2017) Seqgan: sequence generative adversarial nets with policy gradient. In: Thirty-first AAAI conference on artificial intelligence. pp. 2852\u20132858","DOI":"10.1609\/aaai.v31i1.10804"},{"key":"252_CR28","unstructured":"Goodfellow I, Pouget-Abadie J, Mirza M, Xu B, Warde-Farley D, Ozair S, Courville A, Bengio Y (2014) Generative adversarial nets. Advances neural information processing systems conference, pp. 2672\u20132680"},{"key":"252_CR29","unstructured":"Denton EL, Chintala S, Fergus R (2015) Deep generative image models using a laplacian pyramid of adversarial networks. In: Advances Neural Information Processing Systems Conferences, pp. 1486\u20131494"},{"key":"252_CR30","unstructured":"Mirza M, Osindero S. Conditional generative adversarial nets. arXiv Preprint, arXiv:1411.1784"},{"key":"252_CR31","unstructured":"Mogren O. C-RNN-GAN: continuous recurrent neural networks with adversarial training. arXiv preprint arXiv:1611.09904"},{"issue":"10","key":"252_CR32","doi-asserted-by":"publisher","first-page":"883","DOI":"10.3390\/math7100883","volume":"7","author":"S Li","year":"2019","unstructured":"Li S, Jang S, Sung Y (2019) Automatic melody composition using enhanced GAN. Mathematics 7(10):883\u2013896","journal-title":"Mathematics"},{"key":"252_CR33","unstructured":"Santhanam GK, Grnarova P. Defending against adversarial attacks by leveraging an entire GAN. arXiv preprint arXiv:1805.10652"},{"issue":"1","key":"252_CR34","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1109\/MSP.2017.2765202","volume":"35","author":"A Creswell","year":"2018","unstructured":"Creswell A, White T, Dumoulin V, Arulkumaran K, Sengupta B, Bharath AA (2018) Generative adversarial networks: an overview. IEEE Signal Process Mag 35(1):53\u201365","journal-title":"IEEE Signal Process Mag"},{"key":"252_CR35","unstructured":"Nie W, Narodytska N, Patel A (2018) Relgan: relational generative adversarial networks for text generation. In: International conference on learning representations, Vancouver, pp. 1\u201320"},{"key":"252_CR36","unstructured":"Rajeswar S, Subramanian S, Dutil F, Pal C, Courville A. Adversarial generation of natural language. arXiv preprint arXiv:1705.10929."}],"container-title":["Human-centric Computing and Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13673-020-00252-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s13673-020-00252-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13673-020-00252-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,26]],"date-time":"2022-11-26T11:34:53Z","timestamp":1669462493000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1186\/s13673-020-00252-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,3]]},"references-count":36,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2020,12]]}},"alternative-id":["252"],"URL":"https:\/\/doi.org\/10.1186\/s13673-020-00252-8","relation":{},"ISSN":["2192-1962"],"issn-type":[{"type":"electronic","value":"2192-1962"}],"subject":[],"published":{"date-parts":[[2020,11,3]]},"assertion":[{"value":"6 January 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 October 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 November 2020","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no competing interests.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"44"}}