Catálogo de publicaciones - libros
Knowledge-Based Intelligent Information and Engineering Systems: 10th International Conference, KES 2006, Bournemouth, UK, October 9-11 2006, Proceedings, Part II
Bogdan Gabrys ; Robert J. Howlett ; Lakhmi C. Jain (eds.)
En conferencia: 10º International Conference on Knowledge-Based and Intelligent Information and Engineering Systems (KES) . Bournemouth, UK . October 9, 2006 - October 11, 2006
Resumen/Descripción – provisto por la editorial
No disponible.
Palabras clave – provistas por la editorial
Artificial Intelligence (incl. Robotics); Information Systems Applications (incl. Internet); Information Storage and Retrieval; Computer Appl. in Administrative Data Processing; Computers and Society; Management of Computing and Information Systems
Disponibilidad
| Institución detectada | Año de publicación | Navegá | Descargá | Solicitá |
|---|---|---|---|---|
| No detectada | 2006 | SpringerLink |
Información
Tipo de recurso:
libros
ISBN impreso
978-3-540-46537-9
ISBN electrónico
978-3-540-46539-3
Editor responsable
Springer Nature
País de edición
Reino Unido
Fecha de publicación
2006
Información sobre derechos de publicación
© Springer-Verlag Berlin Heidelberg 2006
Tabla de contenidos
doi: 10.1007/11893004_81
Adequate RSSI Determination Method by Making Use of SVM for Indoor Localization
Hirokazu Miura; Junichi Sakamoto; Noriyuki Matsuda; Hirokazu Taki; Noriyuki Abe; Satoshi Hori
Context-aware computing that recognizes the context in which a user performs a task is one of the most important techniques for supporting user activity in ubiquitous computing. To realize context-aware computing, a computer needs to recognize the user’s location. This paper describes a technique for location detection inside a room using radio waves from a user’s computer. The proposed technique has to be sufficiently robust to cater for dynamic environments and should require only ordinary network devices, such as radio signal emitters, without the need for special equipment. We propose performing localization by relative values of RSSI (Received Signal Strength Indicator) among wireless nodes. Furthermore, we use SVM (Support Vector Machine) to find the criteria for classification (whether a node is inside or outside a given area), in the case where absolute RSSI values are used for localization.
- Skill Acquisition and Ubiquitous Human Computer Interaction | Pp. 628-636
doi: 10.1007/11893004_82
Ontia iJADE: An Intelligent Ontology-Based Agent Framework for Semantic Web Service
Toby H. W. Lam; Raymond S. T. Lee
The Internet becomes part of our lives. Users can access different kinds of information through the Internet. However, the exponential growth of the Internet led to a great problem: difficult to locate relevant information. The Semantic Web is an extension of the current web system in which information is organized in a well-defined manner and for enabling computers and people to work in cooperation. Agent technology gives a new way to this intelligent web system. In this paper, we proposed an innovative agent platform – Ontia iJADE which supports the Semantic Web Service. Ontia iJADE contains an ontology Server known as intelligent Java-based ontology Server (IJAOS), which stores and manages the ontology information for agents to share and reuse.
- IATA – Intelligent Agent Technology and Applications | Pp. 637-643
doi: 10.1007/11893004_83
iJADE FreeWalker: An Ontology-Based Tourist Guiding System
Toby H. W. Lam; Raymond S. T. Lee
In this paper, an ontology-based tourist guiding system, iJADE FreeWalker, is presented. The system integrated with agent and Semantic Web technologies to provide tourist information for the tourist. The tourist’s geographical information is gathered by GPS receiver. The GPS Agent migrates to the tourist information center and retrieves the related tourist information with respect to the user’s location. We defined an upper-level travel ontology by using Web Ontology Language (OWL). By using such system, tourists could browse the relevant information based on their interest and location.
- IATA – Intelligent Agent Technology and Applications | Pp. 644-651
doi: 10.1007/11893004_84
JADE Content Management System (CMS) – An Intelligent Multi-agent Based Content Management System with Chaotic Copyright Protection Scheme
Raymond S. T. Lee; Eddie C. L. Chan; Raymond Y. W. Mak
In this paper, an Intelligent Content Management System with Chaotic Copyright Protection scheme called iJADE CMS is presented. iJADE CMS focuses on how web mining techniques can be effectively applied on Chinese content, with the integration of various AI techniques including intelligent agents, agent ontology and fuzzy logic based data mining scheme. Through the adoption of chaotic encryption scheme, iJADE CMS demonstrates how agentbased copyright protection can be successfully applied to digital media publishing industry. From the application perspective, iJADE CMS provides the state-of-the-art content management function by the integration of iJADE Technology with the Ontological Agent Technology. iJADE CMS assists user to organize the content in the most semantic way. Moreover, the web mining information retrieval method such as Term Frequency Times Inverse Document Frequency (TFIDF) scheme is adopted to mine the linguistic meaning of the information content.
- IATA – Intelligent Agent Technology and Applications | Pp. 652-658
doi: 10.1007/11893004_85
Agent-Controlled Distributed Resource Sharing to Improve P2P File Exchanges in User Networks
J. C. Burguillo-Rial; E. Costa-Montenegro; F. J. González-Castaño; J. Vales-Alonso
In this paper, we evaluate the feasibility of distributed control of shared resources in user-managed networks. This paradigm has become possible with the advent of broadband wireless networking technologies such as IEEE 802.11. One of the most popular applications in these networks is peer-to-peer (P2P) file exchange. Node cooperation can optimize the usage of shared “external” accesses to the Internet (set of links between the user network and the Internet). In a previous paper, we evaluated different agent-oriented distributed control schema, based on the concept of , on ideal mesh networks subject to uniform traffic. Each node in the mesh network chooses to behave as a cooperator or a defector. Cooperators may assist in file exchange, whereas defectors try to get advantage of network resources without providing help in return. Before this paper was completed, we observed that popular P2P protocols like eMule, Kazaa and BitTorrent were evolving towards the same credit-oriented strategies we previously proposed. Now, we realistically model both user network traffic and topology, and evaluate a new advanced agent-based distributed control scheme. The simulation results in this paper confirm on realistic networks the main conclusion in our previous research: autonomous node agents become cooperators in their permanent state when they take decisions from local information, checking that file exchange services offered to neighbor nodes do not exceed appropriate credit limits.
- IATA – Intelligent Agent Technology and Applications | Pp. 659-669
doi: 10.1007/11893004_86
An Agent-Based System Supporting Collaborative Product Design
Jian Xun Wang; Ming Xi Tang
Collaborative design can create added value in the design and production process by bringing the benefit of team work and cooperation in a concurrent and coordinated manner. However, the difficulties arising from the differences between heterogeneous system architectures and information structures undermine the effectiveness and the success of collaborative design. This paper presents a new framework of collaborative design which adopts an agent-based approach and relocates designers, managers, systems, and supporting agents in a unified knowledge representation scheme for product design. An agent-based system capable of assisting designers in the management and coordination of collaborative design process via the cooperation of a network of agents including mainly management agents, communication agents, and design agents etc is described.
- IATA – Intelligent Agent Technology and Applications | Pp. 670-677
doi: 10.1007/11893004_87
Application Presence Fingerprinting for NAT-Aware Router
Jun Bi; Lei Zhao; Miao Zhang
NAT-aware routers are required by ISPs to administrate network address translation and enhance the management and security of access network. In this paper, we propose the new fingerprinting for NAT-aware router based on application-level presence information, which is usually not easily modified by network address translation gateways or the fingerprinted hosts behind gateways.
- Computational Intelligence Approaches and Methods for Security Engineering | Pp. 678-685
doi: 10.1007/11893004_88
Interaction for Intelligent Mobile Systems
G. M. P. O’Hare; S. Keegan; M. J. O’Grady
Mobile computing poses significant new challenges due the disparity of the environments in which it may be deployed and the difficulties in realizing effective software solutions within the computational constraints of the average mobile device. Likewise, enabling seamless and intuitive interaction is a process fraught with difficulty. Embedding intelligence into the mobile application or the physical environment as articulated by the AmI vision is one potential strategy that software engineers could adopt. In this paper, some pertinent issues concerning the deployment of intelligent agents on mobile devices for certain interaction paradigms are discussed and illustrated in the context of an m-commerce application.
- Computational Intelligence Approaches and Methods for Security Engineering | Pp. 686-693
doi: 10.1007/11893004_89
Design of a Intelligent SOAP Message Service Processor for Enhancing Mobile Web Service
Gil-Cheol Park; Seoksoo Kim
As the mobile internet becomes one of the main methods for information delivery, mobile Web Services are regarded as a critical aspect of e-business architecture. In this paper, we proposed a intelligent mobile Web Services middleware that enhances SOAP processing performance by eliminating the Servlet container (Tomcat), a required component of typical Web services implementation. Our main contributions are to overcome the latency problem of current Web Services and to provide an easy mobile Web service implementation. Our system can completely support standard Web Services protocol, minimizing communication overhead, message processing time, and server overload. Finally we compare our empirical results with those of typical Web Services.
- Computational Intelligence Approaches and Methods for Security Engineering | Pp. 694-700
doi: 10.1007/11893004_90
Convergence Rate in Intelligent Self-organizing Feature Map Using Dynamic Gaussian Function
Geuk Lee; Seoksoo Kim; Tai Hoon Kim; Min Wook Kil
The existing self-organizing feature map has weak points when it trains. It needs too many input patterns, and a learning time is increased to handle them. In this paper, we propose a method improving the convergence speed and the convergence rate of the intelligent self-organizing feature map by adapting Dynamic Gaussian Function instead of using a Neighbor Interaction Set whose learning rate is steady during the training of the self-organizing feature map.
- Computational Intelligence Approaches and Methods for Security Engineering | Pp. 701-708