Catálogo de publicaciones - libros
Intelligent Information Processing III: IFIP TC12 International Conference on Intelligent Information Processing (IIP 2006), September 20-23, Adelaide, Australia
Zhongzhi Shi ; K. Shimohara ; D. Feng (eds.)
En conferencia: 3º International Conference on Intelligent Information Processing (IIP) . Adelaide, SA, Australia . September 20, 2006 - September 23, 2006
Resumen/Descripción – provisto por la editorial
No disponible.
Palabras clave – provistas por la editorial
Theory of Computation; Artificial Intelligence (incl. Robotics); Simulation and Modeling
Disponibilidad
Institución detectada | Año de publicación | Navegá | Descargá | Solicitá |
---|---|---|---|---|
No detectada | 2007 | SpringerLink |
Información
Tipo de recurso:
libros
ISBN impreso
978-0-387-44639-4
ISBN electrónico
978-0-387-44641-7
Editor responsable
Springer Nature
País de edición
Reino Unido
Fecha de publicación
2007
Información sobre derechos de publicación
© International Federation for Information Processing 2007
Tabla de contenidos
The Process of Synchronization in Dual Redundant Fault-Tolerant System
Dong Liu; Chunyuan Zhang; Rui Li
Synchronization is used in dual redundant fault-tolerant system to make two computers work jointly. It determines the work mode and controls the operations of the system. The paper presents a dual redundant fault-tolerant system and proposes its process of synchronization based on task. The synchronization treats task as the minimal operation unit. And it is implemented with the assist of dual-computer-controller and outer memory, the latter includes task buffer and global data region. Dual-computer-controller controls the input and output of tasks that are stored in task buffer. The switch in of backup computer is implemented by duplicating global data from global data region used by host computer. Additional resolutions for key points, such as the switch between two computers, are also put forward in conclusion. It is proved that the task-level synchronization can make two computers work in phase, and the system is applicable to critical fields requiring high dependability.
Palabras clave: synchronization; dual redundant fault-tolerant system; task; dependability.
- Short Paper | Pp. 493-498
Application of Association Rules for Efficient Learning Work-Flow
Sylvia Encheva; Sharil Tumin
This paper describes application of association rules in education. To make everything more clearly visible a graphic display of objects and attributes in a lattice structure is provided. Vectors and matrices are used to reduce the computational complexity while searching for association rules in the case when at least one attribute included in the ‘if’ part of the statement is known.
Palabras clave: E-learning; data mining.
- Short Paper | Pp. 499-504
Application of Machine Translation in China-America Digital Academic Library
Chen Huang; Haiying Chen
This paper briefly introduces the main ideas of Machine Translation (MT) techniques, then discusses the application of MT in the China-America Digital Academic Library (CADAL)
Palabras clave: CADAL; machine translation; digital library.
- Short Paper | Pp. 505-511
IIP2006 Proceedings
DiMing Ai; XiuFeng Gao
The active functions of aDBS (active Database System) are currently achieved by ECA rule system. But it is difficult for EC A rules system to be analyzed and validated. And there is no perfect model today. Based on the Petri Net, This paper thinks over the character of rules system, and establishes a system model. And some behaviors are analyzed in this paper.
Palabras clave: aDBS; ECA rules; Petri Nets.
- Short Paper | Pp. 513-518
A Formal Description of Agents’ Epistemic States and Environments
Yu Sun; Cungen Cao; Yuefei Sui
To reason the interaction between agents’ epistemic states and environments, the agents’ epistemic states should include ontologies of agents (the agents’ assumptions about environments), what the agents know, believe and desire, and also should include the agents’ interpretations about these symbols in ontologies onto the environments. A formal description of such agents’ epistemic states and several examples are given to show how such a description can be used to explain the puzzles in reasoning the modal sentences. For example, a sentence holding in a structure may have different consequences reasoned by different agents, because of the different epistemic states.
Palabras clave: Agent; Ontology; Epistemic state; Environment; Modality.
- Short Paper | Pp. 519-524
Network Anomalous Intrusion Detection using Fuzzy-Bayes
O Adetunmbi Adebayo; Zhiwei Shi; Zhongzhi Shi; Olumide S. Adewale
Security of networking systems has been an issue since computer networks became prevalent, most especially now that Internet is changing the facie computing. Intrusions pose significant threats to the integrity, confidentiality and availability of information for the internet users. In this paper, a new approach to real-time network anomaly intrusion detection via Fuzzy-Bayesian is proposed to detect malicious activity against computer network; the framework is described to demonstrate the effectiveness of the technique. The combination of fuzzy with Bayesian classifier will improve the overall performance of Bayes based intrusion detection system (IDS). Also, the feasibility of our method is demonstrated by the experiment performed on KDD 1999 IDS data set.
Palabras clave: intrusion detection; fuzzy; naïve-Bayes.
- Short Paper | Pp. 525-530
Reference Algorithm of Text Categorization Based on Fuzzy Cognitive Maps
Zhang Guiyun; Liu Yang; Zhang Weijuan; Wang Yuanyuan
This paper introduces the reference theory and algorithm of text categorization by using fuzzy cognitive map(FCM), which is based on value inference and can be able to infer by combing rule and statistics. This method is flexible and robust, and we do not need train the corpus time after time, it is suitable to the text categorization of insufficiency training, new subject and multi-classification.
Palabras clave: text categorization; fuzzy cognitive map; reference algorithm.
- Short Paper | Pp. 531-536
An Ontology-Based and Cooperative Annotation System
Wenjuan Wu; Xiaoyong Du; He Hu; Ning Ma
The Semantic Web is charming but not easy to realize, since one of the prerequisite steps is to create semantic and precise data adhere to traditional web pages. We provide an annotation system ConAnnotator, which is an ontology-based annotation system and allows cooperative working. It aims at supporting the annotation process as well as the evolvement of the ontology. By semi-automatically creating ontology-based annotations and managing the statistic information about the annotation history, it facilitates the annotation process, makes the annotated documents connected to the ontology and further constructs the Semantic Web, and ultimately helps the users to evolve the ontology itself.
Palabras clave: ontology-based annotation; domain ontology; collaborative annotation; ontology evolvement.
- Short Paper | Pp. 537-542
Simulating Agent Emotion in a Virtual Super Market
Qing Yu; WenJie Wang; ZhongZhi Shi; Fen Lin
This paper reports a method of simulate an Agent emotion in a Virtual Super Market environment. Utility Function is the key to depict people’s emotion especially in the satisfaction feelings. This method finished the process from the emotion to the decision. Agent will act emotionally according to the Utility.
Palabras clave: Virtual Super Market; Utility Function; Lagrange Interpolating Polynomial.
- Short Paper | Pp. 543-548
Digging High Risk Defects Out in Software Engineering
Jin-Cherng Lin; Kuo-Chiang Wu
Data mining implies “digging through tons of data” to uncover implicit information. Software defect is an essential characteristic of software development process, offering much information about software quality assurance. Based on the information supplied by defects, it can help a software team with capability of software quality assurance. In order to dig through lots of defects to uncover implicit information of defects, this paper integrates PCA and DA, combined with the relationship among each defect attribute index, and then we can dig critical factor out of software defects. These critical factors are the vital few defects affecting software quality, warning programmer to stress concentration on getting rid of these vital few defects.
Palabras clave: Prime Components Analysis (PCA); Discriminate Analysis (DA).
- Short Paper | Pp. 549-554