Catálogo de publicaciones - libros

Compartir en
redes sociales


Intelligent Information Processing III: IFIP TC12 International Conference on Intelligent Information Processing (IIP 2006), September 20-23, Adelaide, Australia

Zhongzhi Shi ; K. Shimohara ; D. Feng (eds.)

En conferencia: 3º International Conference on Intelligent Information Processing (IIP) . Adelaide, SA, Australia . September 20, 2006 - September 23, 2006

Resumen/Descripción – provisto por la editorial

No disponible.

Palabras clave – provistas por la editorial

Theory of Computation; Artificial Intelligence (incl. Robotics); Simulation and Modeling

Disponibilidad
Institución detectada Año de publicación Navegá Descargá Solicitá
No detectada 2007 SpringerLink

Información

Tipo de recurso:

libros

ISBN impreso

978-0-387-44639-4

ISBN electrónico

978-0-387-44641-7

Editor responsable

Springer Nature

País de edición

Reino Unido

Fecha de publicación

Información sobre derechos de publicación

© International Federation for Information Processing 2007

Tabla de contenidos

The Process of Synchronization in Dual Redundant Fault-Tolerant System

Dong Liu; Chunyuan Zhang; Rui Li

Synchronization is used in dual redundant fault-tolerant system to make two computers work jointly. It determines the work mode and controls the operations of the system. The paper presents a dual redundant fault-tolerant system and proposes its process of synchronization based on task. The synchronization treats task as the minimal operation unit. And it is implemented with the assist of dual-computer-controller and outer memory, the latter includes task buffer and global data region. Dual-computer-controller controls the input and output of tasks that are stored in task buffer. The switch in of backup computer is implemented by duplicating global data from global data region used by host computer. Additional resolutions for key points, such as the switch between two computers, are also put forward in conclusion. It is proved that the task-level synchronization can make two computers work in phase, and the system is applicable to critical fields requiring high dependability.

Palabras clave: synchronization; dual redundant fault-tolerant system; task; dependability.

- Short Paper | Pp. 493-498

Application of Association Rules for Efficient Learning Work-Flow

Sylvia Encheva; Sharil Tumin

This paper describes application of association rules in education. To make everything more clearly visible a graphic display of objects and attributes in a lattice structure is provided. Vectors and matrices are used to reduce the computational complexity while searching for association rules in the case when at least one attribute included in the ‘if’ part of the statement is known.

Palabras clave: E-learning; data mining.

- Short Paper | Pp. 499-504

Application of Machine Translation in China-America Digital Academic Library

Chen Huang; Haiying Chen

This paper briefly introduces the main ideas of Machine Translation (MT) techniques, then discusses the application of MT in the China-America Digital Academic Library (CADAL)

Palabras clave: CADAL; machine translation; digital library.

- Short Paper | Pp. 505-511

IIP2006 Proceedings

DiMing Ai; XiuFeng Gao

The active functions of aDBS (active Database System) are currently achieved by ECA rule system. But it is difficult for EC A rules system to be analyzed and validated. And there is no perfect model today. Based on the Petri Net, This paper thinks over the character of rules system, and establishes a system model. And some behaviors are analyzed in this paper.

Palabras clave: aDBS; ECA rules; Petri Nets.

- Short Paper | Pp. 513-518

A Formal Description of Agents’ Epistemic States and Environments

Yu Sun; Cungen Cao; Yuefei Sui

To reason the interaction between agents’ epistemic states and environments, the agents’ epistemic states should include ontologies of agents (the agents’ assumptions about environments), what the agents know, believe and desire, and also should include the agents’ interpretations about these symbols in ontologies onto the environments. A formal description of such agents’ epistemic states and several examples are given to show how such a description can be used to explain the puzzles in reasoning the modal sentences. For example, a sentence holding in a structure may have different consequences reasoned by different agents, because of the different epistemic states.

Palabras clave: Agent; Ontology; Epistemic state; Environment; Modality.

- Short Paper | Pp. 519-524

Network Anomalous Intrusion Detection using Fuzzy-Bayes

O Adetunmbi Adebayo; Zhiwei Shi; Zhongzhi Shi; Olumide S. Adewale

Security of networking systems has been an issue since computer networks became prevalent, most especially now that Internet is changing the facie computing. Intrusions pose significant threats to the integrity, confidentiality and availability of information for the internet users. In this paper, a new approach to real-time network anomaly intrusion detection via Fuzzy-Bayesian is proposed to detect malicious activity against computer network; the framework is described to demonstrate the effectiveness of the technique. The combination of fuzzy with Bayesian classifier will improve the overall performance of Bayes based intrusion detection system (IDS). Also, the feasibility of our method is demonstrated by the experiment performed on KDD 1999 IDS data set.

Palabras clave: intrusion detection; fuzzy; naïve-Bayes.

- Short Paper | Pp. 525-530

Reference Algorithm of Text Categorization Based on Fuzzy Cognitive Maps

Zhang Guiyun; Liu Yang; Zhang Weijuan; Wang Yuanyuan

This paper introduces the reference theory and algorithm of text categorization by using fuzzy cognitive map(FCM), which is based on value inference and can be able to infer by combing rule and statistics. This method is flexible and robust, and we do not need train the corpus time after time, it is suitable to the text categorization of insufficiency training, new subject and multi-classification.

Palabras clave: text categorization; fuzzy cognitive map; reference algorithm.

- Short Paper | Pp. 531-536

An Ontology-Based and Cooperative Annotation System

Wenjuan Wu; Xiaoyong Du; He Hu; Ning Ma

The Semantic Web is charming but not easy to realize, since one of the prerequisite steps is to create semantic and precise data adhere to traditional web pages. We provide an annotation system ConAnnotator, which is an ontology-based annotation system and allows cooperative working. It aims at supporting the annotation process as well as the evolvement of the ontology. By semi-automatically creating ontology-based annotations and managing the statistic information about the annotation history, it facilitates the annotation process, makes the annotated documents connected to the ontology and further constructs the Semantic Web, and ultimately helps the users to evolve the ontology itself.

Palabras clave: ontology-based annotation; domain ontology; collaborative annotation; ontology evolvement.

- Short Paper | Pp. 537-542

Simulating Agent Emotion in a Virtual Super Market

Qing Yu; WenJie Wang; ZhongZhi Shi; Fen Lin

This paper reports a method of simulate an Agent emotion in a Virtual Super Market environment. Utility Function is the key to depict people’s emotion especially in the satisfaction feelings. This method finished the process from the emotion to the decision. Agent will act emotionally according to the Utility.

Palabras clave: Virtual Super Market; Utility Function; Lagrange Interpolating Polynomial.

- Short Paper | Pp. 543-548

Digging High Risk Defects Out in Software Engineering

Jin-Cherng Lin; Kuo-Chiang Wu

Data mining implies “digging through tons of data” to uncover implicit information. Software defect is an essential characteristic of software development process, offering much information about software quality assurance. Based on the information supplied by defects, it can help a software team with capability of software quality assurance. In order to dig through lots of defects to uncover implicit information of defects, this paper integrates PCA and DA, combined with the relationship among each defect attribute index, and then we can dig critical factor out of software defects. These critical factors are the vital few defects affecting software quality, warning programmer to stress concentration on getting rid of these vital few defects.

Palabras clave: Prime Components Analysis (PCA); Discriminate Analysis (DA).

- Short Paper | Pp. 549-554