Catálogo de publicaciones - libros
Knowledge-Based Intelligent Information and Engineering Systems: 9th International Conference, KES 2005, Melbourne, Australia, September 14-16, 2005, Proceedings, Part II
Rajiv Khosla ; Robert J. Howlett ; Lakhmi C. Jain (eds.)
En conferencia: 9º International Conference on Knowledge-Based and Intelligent Information and Engineering Systems (KES) . Melbourne, VIC, Australia . September 14, 2005 - September 16, 2005
Resumen/Descripción – provisto por la editorial
No disponible.
Palabras clave – provistas por la editorial
No disponibles.
Disponibilidad
| Institución detectada | Año de publicación | Navegá | Descargá | Solicitá |
|---|---|---|---|---|
| No detectada | 2005 | SpringerLink |
Información
Tipo de recurso:
libros
ISBN impreso
978-3-540-28895-4
ISBN electrónico
978-3-540-31986-3
Editor responsable
Springer Nature
País de edición
Reino Unido
Fecha de publicación
2005
Información sobre derechos de publicación
© Springer-Verlag Berlin Heidelberg 2005
Tabla de contenidos
doi: 10.1007/11552451_61
A Study on Privacy-Related Considerations in Ubiquitous Computing Environment
Jang Mook Kang; Jo Nam Jung; Jae-Sang Cha; Chun su Lee
It is said that the UC(Ubiquitous Computing) Environment will be come by the technological revolution in the future. This paper firstly points out the problem that engineer thinks that Ubiquitous computing connected to network have become more complexes and distributed, but most system-related research is still focused on the ’performance’ or ’efficiency’. And that most studied papers in privacy have been focused on encryption technology and protocols for securing the personal information data transaction. This paper secondly points out the problem that law-related researcher thinks that law can controller technology beyond human control. Today, due to the complexity of the problem, new privacy-related research based on total solution is integrative needed to consider laws, technology, economy, norms and so on. This paper will focus on analysis about Privacy in Ubiquitous computing Environment and total protection considerations on privacy. We present new privacy-related considerations in UC (Ubiquitous computing) Environment, point out the mechanism which new re-design privacy concept (protection scope) is affected from the UC (Ubiquitous computing) Environment and provide the total considerations for Privacy protection especially personal information protection by improve the intelligent technology applied in context aware technology.
Palabras clave: Personal Information; Ubiquitous Computing; Intelligent Technology; Ubiquitous Computing Environment; Ubiquitous Network.
- Approaches and Methods into Security Engineering III | Pp. 460-463
doi: 10.1007/11552451_62
Optimal Operation for Cogenerating System of Micro-grid Network
Phil-Hun Cho; Hak-Man Kim; Myong-Chul Shin; Jae-Sang Cha
This paper presents a mathematical model for optimal operating cogeneration of Micro-Grid Network. The electrical and thermal energy production relationship of cogeneration is based on its feasible operation region. In the proposed model, auxiliary boilers as well as cogererators are considered as thermal energy sources. Cost functions of energy sources and the loss function of electrical power are formulated by quadratic functions. The solution of Optimal operation for cogenerating system of micro-grid network is solved by quadratic program. Some examples are tested by proposed model and method.
Palabras clave: Thermal Energy; Electrical Demand; Spot Price; Economic Dispatch; Electrical Energy Generation.
- Approaches and Methods into Security Engineering III | Pp. 464-469
doi: 10.1007/11552451_63
An Efficient and Secured Media Access Mechanism Using the Intelligent Coordinator in Low-Rate WPAN Environment
Joon Heo; Choong Seon Hong
The convenience of IEEE 802.15.4 (Low-rate Wireless Personal Area Network) based wireless access network will lead to widespread deployment in the evolutionary computing and adaptive systems. However, this use is predicated on an implicit assumption of confidentiality and availability. In this environment, malicious device may obtain an unfair share of the channel bandwidth. For example, IEEE 802.15.4 requires nodes competing for getting access to the channel to wait for a ’backoff’ interval, randomly selected from a specified range, before initiating a transmission. Malicious devices may wait for smaller ’backoff’ intervals than well-behaved devices, thereby obtaining an unfair advantage. Such misbehavior can seriously degrade the throughput of well-behaved devices. In this paper, we proposed an intelligent coordinator, a modification to IEEE 802.15.4 specification to simplify the prevention of such malicious devices. Proposed coordinator is able to ascertain whether to apply PTP (Priority Time Period). Simulation results indicate that our prevention mechanism is successful in handling MAC layer misbehavior. We plan to foster our solution in the evolutionary computing systems through further development.
Palabras clave: Medium Access Control; Delivery Ratio; Contention Window; Medium Access Control Layer; Contention Resolution.
- Approaches and Methods into Security Engineering III | Pp. 470-476
doi: 10.1007/11552451_64
Pilot-Symbol Aided SFBC-OFDM Channel Estimation for Intelligent Multimedia Service
Sang Soon Park; Juphil Cho; Heung Ki Baik
Next generation intelligent multimedia communications require high quality voice, graphic, video and data service over any service environment. The MIMO-OFDM systems are well known systems which are attractive for intelligent multimedia service. Among the various MIMO-OFDM systems, the SFBC-OFDM coded in space and frequency domain is a more effective system for mobile environments. In fast time-varying channels, exact channel estimation, tracking and compensation of channel distortion is essential to STBC-OFDM system The conventional channel estimation method with least-squares (LS) algorithm estimates the channel frequency response. In this paper, we propose the pilot-symbol aided channel impulse response estimator for SFBC-OFDM. Our channel estimator is effective in mobile multimedia systems.
- Approaches and Methods into Security Engineering III | Pp. 477-482
doi: 10.1007/11552451_65
Cryptographic Protocol Design Concept with Genetic Algorithms
Kyeongmo Park; Chuleui Hong
This paper describes design concepts of genetic algorithms in the cryptographic protocols for a fault-tolerant agent replication system. The principles of cryptographic protocols are outlined, followed by the specification of modal logic that is used to encode the belief and knowledge of communicating parties. Replication and voting do not suffice and cryptographic support is required. Secret sharing is a fundamental notion for secure cryptographic design. In a secret sharing protocol a dealer shares a secret among servers so that subsets of + 1 or more servers can later reconstruct the secret, while subsets of or less servers have no information about it. This is what it is called a threshold secret sharing scheme. A verifiable secret sharing protocol adds fault tolerance to the above tasks. Our protocol can be used by asynchronous fault-tolerant service replicas.
- Approaches and Methods into Security Engineering III | Pp. 483-489
doi: 10.1007/11552451_66
An Efficient Backoff Scheme for IEEE 802.11e EDCF Differential Service
Ho-Jin Shin; Jang-Sub Kim; Dong-Ryeol Shin
Wireless LANs (WLANs) are one of the fastest growing wireless access technologies. Unfortunately, since they were developed to closely match existing wired LANs, the popular IEEE 802.11 standards have several problems in providing Quality of Service (QoS) to stations. The IEEE 802.11e standard is being developed to overcome these drawbacks. One of most important function in 802.11e is the contention-based channel access mechanism called enhanced distributed coordination function (EDCF), which provides a priority scheme by differentiating the inter-frame space and the initial window size. In this paper, we first consider the enhanced DCF access method of IEEE 802.11e. We then introduced analytical model, which can be used to calculate the traffic priority and throughput corresponding to the configuration of multiple DCF contention parameters under saturation throughput. This enhanced DCF access method differs from the standard backoff schemes in that the backoff time is not uniformly chosen in the contention window interval that results in reduced collision probability under high loads. Numerical analysis shows that saturation throughput of the proposed scheme outperform the earlier approach.
- Approaches and Methods into Security Engineering III | Pp. 490-499
doi: 10.1007/11552451_67
Some Properties of Grounding Modal Conjunctions in Artificial Cognitive Agents
Radosław Piotr Katarzyniak
In this paper properties of an originally introduced idea of epistemic satisfaction relation are discussed. It is assumed that this relation defines states of artificial cognition in which particular cases of modal conjunctions are well grounded. Presented theorems show that the epistemic satisfaction preserves the desirable similarity between artificially realized grounding and its natural counterpart known from the context of natural language discourse. The most important conclusion is that as regards to the set of modal conjunctions it is possible to develop an artificial cognitive agent that is able to carry out semantic communication reflecting the natural language communication. In order to achieve this property the artificial cognitive agent needs to be equipped with a certain system modality thresholds.
Palabras clave: Cognitive Agent; Modality Threshold; Base Profile; Modal Conjunction; Semantic Communication.
- Communicative Intelligent I | Pp. 500-506
doi: 10.1007/11552451_68
Multi-agent System for Web Advertising
Przemysław Kazienko
The main aim of a personalized advertising system is to provide advertisements, which are most suitable for the given anonymous user navigating the web site. To achieve this goal, many sources of data are processed in one coherent vector space: the advertisers’ and publisher’s web site content, sessions of former users from the past, the history of clicks on banners and the current user behavior as well as the advertising policy promoting certain campaigns. The multi-agent system running mostly on the publisher site is introduced to organize personalized advertising. Each cooperating agent is responsible for a separate, specific task: web content and usage mining, click-through data exploration, user monitoring, advertisement recommendation and management.
- Communicative Intelligent I | Pp. 507-513
doi: 10.1007/11552451_69
A Mobile Agent Approach to Intrusion Detection in Network Systems
Grzegorz Kolaczek; Agnieszka Pieczynska-Kuchtiak; Krzysztof Juszczyszyn; Adam Grzech; Radosław Piotr Katarzyniak; Ngoc Thanh Nguyen
A major problem with current approaches to the automatic intrusion detection is that it is difficult to make a difference between a normal user behaviour and potential attacker. In this case it is very difficult to conduct investigations of attacks without human intervention. In this paper a framework of an original proposal of the multi-agent system is presented. The aim of this system is security evaluation of the network system on the basis of intrusions pattern scenarios matching. Mechanism of intrusions’ detection and defining new attacks’ templates are introduced. In this proposal soft methods of computing, advanced methods of symbolic knowledge representation and the methods of semantic communication are used.
- Communicative Intelligent I | Pp. 514-519
doi: 10.1007/11552451_70
Non-textual Document Ranking Using Crawler Information and Web Usage Mining
Maciej Kiewra; Ngoc Thanh Nguyen
Document ranking creation has a big impact on the whole IR system. The characteristics of the local rankings differ from the global rankings, because the local system can access information unavailable for the global search engines. The purpose of this paper is to discuss non-textual factors that may influence on a document’s ranking position and to present a new method of document ranking calculation () that can be useful for local search engines, recommendation systems etc.
- Communicative Intelligent I | Pp. 520-526