Catálogo de publicaciones - libros

Compartir en
redes sociales


Knowledge-Based Intelligent Information and Engineering Systems: 10th International Conference, KES 2006, Bournemouth, UK, October 9-11 2006, Proceedings, Part II

Bogdan Gabrys ; Robert J. Howlett ; Lakhmi C. Jain (eds.)

En conferencia: 10º International Conference on Knowledge-Based and Intelligent Information and Engineering Systems (KES) . Bournemouth, UK . October 9, 2006 - October 11, 2006

Resumen/Descripción – provisto por la editorial

No disponible.

Palabras clave – provistas por la editorial

Artificial Intelligence (incl. Robotics); Information Systems Applications (incl. Internet); Information Storage and Retrieval; Computer Appl. in Administrative Data Processing; Computers and Society; Management of Computing and Information Systems

Disponibilidad
Institución detectada Año de publicación Navegá Descargá Solicitá
No detectada 2006 SpringerLink

Información

Tipo de recurso:

libros

ISBN impreso

978-3-540-46537-9

ISBN electrónico

978-3-540-46539-3

Editor responsable

Springer Nature

País de edición

Reino Unido

Fecha de publicación

Información sobre derechos de publicación

© Springer-Verlag Berlin Heidelberg 2006

Tabla de contenidos

Adequate RSSI Determination Method by Making Use of SVM for Indoor Localization

Hirokazu Miura; Junichi Sakamoto; Noriyuki Matsuda; Hirokazu Taki; Noriyuki Abe; Satoshi Hori

Context-aware computing that recognizes the context in which a user performs a task is one of the most important techniques for supporting user activity in ubiquitous computing. To realize context-aware computing, a computer needs to recognize the user’s location. This paper describes a technique for location detection inside a room using radio waves from a user’s computer. The proposed technique has to be sufficiently robust to cater for dynamic environments and should require only ordinary network devices, such as radio signal emitters, without the need for special equipment. We propose performing localization by relative values of RSSI (Received Signal Strength Indicator) among wireless nodes. Furthermore, we use SVM (Support Vector Machine) to find the criteria for classification (whether a node is inside or outside a given area), in the case where absolute RSSI values are used for localization.

- Skill Acquisition and Ubiquitous Human Computer Interaction | Pp. 628-636

Ontia iJADE: An Intelligent Ontology-Based Agent Framework for Semantic Web Service

Toby H. W. Lam; Raymond S. T. Lee

The Internet becomes part of our lives. Users can access different kinds of information through the Internet. However, the exponential growth of the Internet led to a great problem: difficult to locate relevant information. The Semantic Web is an extension of the current web system in which information is organized in a well-defined manner and for enabling computers and people to work in cooperation. Agent technology gives a new way to this intelligent web system. In this paper, we proposed an innovative agent platform – Ontia iJADE which supports the Semantic Web Service. Ontia iJADE contains an ontology Server known as intelligent Java-based ontology Server (IJAOS), which stores and manages the ontology information for agents to share and reuse.

- IATA – Intelligent Agent Technology and Applications | Pp. 637-643

iJADE FreeWalker: An Ontology-Based Tourist Guiding System

Toby H. W. Lam; Raymond S. T. Lee

In this paper, an ontology-based tourist guiding system, iJADE FreeWalker, is presented. The system integrated with agent and Semantic Web technologies to provide tourist information for the tourist. The tourist’s geographical information is gathered by GPS receiver. The GPS Agent migrates to the tourist information center and retrieves the related tourist information with respect to the user’s location. We defined an upper-level travel ontology by using Web Ontology Language (OWL). By using such system, tourists could browse the relevant information based on their interest and location.

- IATA – Intelligent Agent Technology and Applications | Pp. 644-651

JADE Content Management System (CMS) – An Intelligent Multi-agent Based Content Management System with Chaotic Copyright Protection Scheme

Raymond S. T. Lee; Eddie C. L. Chan; Raymond Y. W. Mak

In this paper, an Intelligent Content Management System with Chaotic Copyright Protection scheme called iJADE CMS is presented. iJADE CMS focuses on how web mining techniques can be effectively applied on Chinese content, with the integration of various AI techniques including intelligent agents, agent ontology and fuzzy logic based data mining scheme. Through the adoption of chaotic encryption scheme, iJADE CMS demonstrates how agentbased copyright protection can be successfully applied to digital media publishing industry. From the application perspective, iJADE CMS provides the state-of-the-art content management function by the integration of iJADE Technology with the Ontological Agent Technology. iJADE CMS assists user to organize the content in the most semantic way. Moreover, the web mining information retrieval method such as Term Frequency Times Inverse Document Frequency (TFIDF) scheme is adopted to mine the linguistic meaning of the information content.

- IATA – Intelligent Agent Technology and Applications | Pp. 652-658

Agent-Controlled Distributed Resource Sharing to Improve P2P File Exchanges in User Networks

J. C. Burguillo-Rial; E. Costa-Montenegro; F. J. González-Castaño; J. Vales-Alonso

In this paper, we evaluate the feasibility of distributed control of shared resources in user-managed networks. This paradigm has become possible with the advent of broadband wireless networking technologies such as IEEE 802.11. One of the most popular applications in these networks is peer-to-peer (P2P) file exchange. Node cooperation can optimize the usage of shared “external” accesses to the Internet (set of links between the user network and the Internet). In a previous paper, we evaluated different agent-oriented distributed control schema, based on the concept of , on ideal mesh networks subject to uniform traffic. Each node in the mesh network chooses to behave as a cooperator or a defector. Cooperators may assist in file exchange, whereas defectors try to get advantage of network resources without providing help in return. Before this paper was completed, we observed that popular P2P protocols like eMule, Kazaa and BitTorrent were evolving towards the same credit-oriented strategies we previously proposed. Now, we realistically model both user network traffic and topology, and evaluate a new advanced agent-based distributed control scheme. The simulation results in this paper confirm on realistic networks the main conclusion in our previous research: autonomous node agents become cooperators in their permanent state when they take decisions from local information, checking that file exchange services offered to neighbor nodes do not exceed appropriate credit limits.

- IATA – Intelligent Agent Technology and Applications | Pp. 659-669

An Agent-Based System Supporting Collaborative Product Design

Jian Xun Wang; Ming Xi Tang

Collaborative design can create added value in the design and production process by bringing the benefit of team work and cooperation in a concurrent and coordinated manner. However, the difficulties arising from the differences between heterogeneous system architectures and information structures undermine the effectiveness and the success of collaborative design. This paper presents a new framework of collaborative design which adopts an agent-based approach and relocates designers, managers, systems, and supporting agents in a unified knowledge representation scheme for product design. An agent-based system capable of assisting designers in the management and coordination of collaborative design process via the cooperation of a network of agents including mainly management agents, communication agents, and design agents etc is described.

- IATA – Intelligent Agent Technology and Applications | Pp. 670-677

Application Presence Fingerprinting for NAT-Aware Router

Jun Bi; Lei Zhao; Miao Zhang

NAT-aware routers are required by ISPs to administrate network address translation and enhance the management and security of access network. In this paper, we propose the new fingerprinting for NAT-aware router based on application-level presence information, which is usually not easily modified by network address translation gateways or the fingerprinted hosts behind gateways.

- Computational Intelligence Approaches and Methods for Security Engineering | Pp. 678-685

Interaction for Intelligent Mobile Systems

G. M. P. O’Hare; S. Keegan; M. J. O’Grady

Mobile computing poses significant new challenges due the disparity of the environments in which it may be deployed and the difficulties in realizing effective software solutions within the computational constraints of the average mobile device. Likewise, enabling seamless and intuitive interaction is a process fraught with difficulty. Embedding intelligence into the mobile application or the physical environment as articulated by the AmI vision is one potential strategy that software engineers could adopt. In this paper, some pertinent issues concerning the deployment of intelligent agents on mobile devices for certain interaction paradigms are discussed and illustrated in the context of an m-commerce application.

- Computational Intelligence Approaches and Methods for Security Engineering | Pp. 686-693

Design of a Intelligent SOAP Message Service Processor for Enhancing Mobile Web Service

Gil-Cheol Park; Seoksoo Kim

As the mobile internet becomes one of the main methods for information delivery, mobile Web Services are regarded as a critical aspect of e-business architecture. In this paper, we proposed a intelligent mobile Web Services middleware that enhances SOAP processing performance by eliminating the Servlet container (Tomcat), a required component of typical Web services implementation. Our main contributions are to overcome the latency problem of current Web Services and to provide an easy mobile Web service implementation. Our system can completely support standard Web Services protocol, minimizing communication overhead, message processing time, and server overload. Finally we compare our empirical results with those of typical Web Services.

- Computational Intelligence Approaches and Methods for Security Engineering | Pp. 694-700

Convergence Rate in Intelligent Self-organizing Feature Map Using Dynamic Gaussian Function

Geuk Lee; Seoksoo Kim; Tai Hoon Kim; Min Wook Kil

The existing self-organizing feature map has weak points when it trains. It needs too many input patterns, and a learning time is increased to handle them. In this paper, we propose a method improving the convergence speed and the convergence rate of the intelligent self-organizing feature map by adapting Dynamic Gaussian Function instead of using a Neighbor Interaction Set whose learning rate is steady during the training of the self-organizing feature map.

- Computational Intelligence Approaches and Methods for Security Engineering | Pp. 701-708