Catálogo de publicaciones - libros

Compartir en
redes sociales


Advances in Artificial Intelligence: 4th Helenic Conference on AI, SETN 2006, Heraklion, Crete, Greece, May 18-20, 2006, Proceedings

Grigoris Antoniou ; George Potamias ; Costas Spyropoulos ; Dimitris Plexousakis (eds.)

En conferencia: 4º Hellenic Conference on Artificial Intelligence (SETN) . Heraklion, Crete, Greece . May 18, 2006 - May 20, 2006

Resumen/Descripción – provisto por la editorial

No disponible.

Palabras clave – provistas por la editorial

Artificial Intelligence (incl. Robotics); Information Systems Applications (incl. Internet); Information Storage and Retrieval; Algorithm Analysis and Problem Complexity; Image Processing and Computer Vision; Database Management

Disponibilidad
Institución detectada Año de publicación Navegá Descargá Solicitá
No detectada 2006 SpringerLink

Información

Tipo de recurso:

libros

ISBN impreso

978-3-540-34117-8

ISBN electrónico

978-3-540-34118-5

Editor responsable

Springer Nature

País de edición

Reino Unido

Fecha de publicación

Información sobre derechos de publicación

© Springer-Verlag Berlin Heidelberg 2006

Tabla de contenidos

Graphical Representation of Defeasible Logic Rules Using Digraphs

Efstratios Kontopoulos; Nick Bassiliades

Defeasible reasoning is a rule-based approach for efficient reasoning with incomplete and conflicting information. Nevertheless, it is based on solid mathematical formulations and is not fully comprehensible by end users, who often need graphical trace and explanation mechanisms for the derived conclusions. Directed graphs (or digraphs) can assist in this affair, but their applicability is balanced by the fact that it is difficult to associate data of a variety of types with the nodes and the connections in the graph. In this paper we try to utilize digraphs in the graphical representation of defeasible rules, by exploiting their expressiveness, but also trying to counter their major disadvantage, by defining multiple node and connection types.

- Short Papers | Pp. 529-533

An Efficient Peer to Peer Image Retrieval Technique Using Content Addressable Networks

Spyros Kotoulas; Konstantinos Konstantinidis; Leonidas Kotoulas; Ioannis Andreadis

We present a novel technique for efficient Content Based Peer to Peer Image Retrieval (CBP2PIR) that employs a Content Addressable Network (CAN). A two-stage color histogram based method is described. The first stage defines mapping into the CAN by use of a single fuzzy histogram; while the second stage completes the image retrieval process through a spatially-biased histogram. The proposed system is completely decentralized, non-flooding, and promises high image recall, while minimizing network traffic.

- Short Papers | Pp. 534-537

Predicting Fraudulent Financial Statements with Machine Learning Techniques

Sotiris Kotsiantis; Euaggelos Koumanakos; Dimitris Tzelepis; Vasilis Tampakas

This paper explores the effectiveness of machine learning techniques in detecting firms that issue fraudulent financial statements (FFS) and deals with the identification of factors associated to FFS. To this end, a number of experiments have been conducted using representative learning algorithms, which were trained using a data set of 164 fraud and non-fraud Greek firms in the recent period 2001-2002. This study indicates that a decision tree can be successfully used in the identification of FFS and underline the importance of financial ratios.

- Short Papers | Pp. 538-542

Discrimination of Benign from Malignant Breast Lesions Using Statistical Classifiers

Konstantinos Koutroumbas; Abraham Pouliakis; Tatiana Mona Megalopoulou; John Georgoulakis; Anna-Eva Giachnaki; Petros Karakitsos

The objective of this study is to investigate the discrimination of benign from malignant breast lesions using: the linear, the feedforward neural network, the k-nearest neighbor and the boosting classifiers. Nuclear morphometric parameters from cytological smears taken by Fine Needle Aspiration (FNA) of the breast, have been measured from patients. These parameters undergo an appropriate transformation and then, the classifiers are performed on the raw and on the transformed data. The results show that in terms of the raw data set all classifiers exhibit almost the same performance (overall accuracy  ≡ 87%), Thus the linear classifier suffices for the discrimination of the present problem. Also, based on the previous results, one can conjecture that the use of these classifiers combined with image morphometry and statistical techniques for feature transformation, may offer useful information towards the improvement of the diagnostic accuracy of breast FNA.

- Short Papers | Pp. 543-546

Comparison of Data Fusion Techniques for Robot Navigation

Nikolaos Kyriakoulis; Antonios Gasteratos; Angelos Amanatiadis

This paper proposes and compares several data fusion techniques for robot navigation. The fusion techniques investigated here are several topologies of the Kalman filter. The problem that had been simulated is the navigation of a robot carrying two sensors, one Global Positioning System (GPS) and one Inertial Navigation System (INS). For each of the above topologies, the statistic error and its, mean value, variance and standard deviation were examined.

- Short Papers | Pp. 547-550

On Improving Mobile Robot Motion Control

Michail G. Lagoudakis

This paper describes two simple techniques that can greatly improve navigation and motion control of nonholonomic robots based on range sensor data. The first technique enhances sensory information by re-using recent sensor data through coordinate transformation, whereas the second compensates for errors due to long control cycle times by forward projection through the kinematic model of the robot. Both techniques have been succesfully tested on a Nomad 200 mobile robot.

- Short Papers | Pp. 551-554

Consistency of the Matching Predicate

Dimitris Magos; Ioannis Mourtos; Leonidas Pitsoulis

Let (,) denote an undirected graph, and being the sets of its nodes and edges, respectively. A in (,) is a subset of edges with no common endpoints. Finding a matching of maximum cardinality constitutes the maximum cardinality matching (MCM) problem. For a thorough theoretical discussion we refer to [6]. The MCM problem is of specific interest from a Constraint Programming (CP) point of view because it can model several logical constraints (predicates) like the and the predicates [7]. Thus, the definition of a maximum cardinality matching constraint provides a framework encompassing other predicates. Along this line of research, we define a global constraint with respect to the MCM and address the issue of consistency. Establishing hyper-arc consistency implies the identification of edges that cannot participate in any maximum cardinality matching. Evidently, this issue (also called ) is related to the methods developed for solving the problem. Solving this problem for bipartite graphs was common knowledge long before Edmonds proposed an algorithm for the non-bipartite case [3]. Regarding hyper-arc consistency, the problem has been resolved only for the bipartite case [1].

- Short Papers | Pp. 555-558

Intrusion Detection Using Emergent Self-organizing Maps

Aikaterini Mitrokotsa; Christos Douligeris

In this paper, we analyze the potential of using Emergent Self-Organizing Maps (ESOMs) based on Kohonen Self –Organizing maps in order to detect intrusive behaviours. The proposed approach combines machine learning and information visualization techniques to analyze network traffic and is based on classifying “normal” versus “abnormal” traffic. The results are promising as they show the ability of eSOMs to classify normal against abnormal behaviour regarding false alarms and detection probabilities.

- Short Papers | Pp. 559-562

Mapping Fundamental Business Process Modelling Language to OWL-S

Gayathri Nadarajan; Yun-Heh Chen-Burger

This paper presents a conceptual mapping framework between a formal and visual process modelling language, Fundamental Business Process Modelling Language (FBPML), and the Web Services Ontology (OWL-S), aiming to bridge the gap between Enterprise Modelling methods and Semantic Web services. The framework is divided into a data model and a process model component. An implementation and an evaluation of the process model mapping are demonstrated.

- Short Papers | Pp. 563-566

Modeling Perceived Value of Color in Web Sites

Eleftherios Papachristos; Nikolaos Tselios; Nikolaos Avouris

Color plays an important role in web site design. The selection of effective chromatic combinations and the relation of color to the perceived aesthetic and emotional value of a web site is the focus of this paper. The subject of the reported research has been to define a model through which to be able to associate color combinations with specific desirable emotional and aesthetic values. The presented approach involves application of machine learning techniques on a rich data set collected during a number of empirical studies.

- Short Papers | Pp. 567-570