Catálogo de publicaciones - libros
Knowledge-Based Intelligent Information and Engineering Systems: 10th International Conference, KES 2006, Bournemouth, UK, October 9-11 2006, Proceedings, Part II
Bogdan Gabrys ; Robert J. Howlett ; Lakhmi C. Jain (eds.)
En conferencia: 10º International Conference on Knowledge-Based and Intelligent Information and Engineering Systems (KES) . Bournemouth, UK . October 9, 2006 - October 11, 2006
Resumen/Descripción – provisto por la editorial
No disponible.
Palabras clave – provistas por la editorial
Artificial Intelligence (incl. Robotics); Information Systems Applications (incl. Internet); Information Storage and Retrieval; Computer Appl. in Administrative Data Processing; Computers and Society; Management of Computing and Information Systems
Disponibilidad
| Institución detectada | Año de publicación | Navegá | Descargá | Solicitá |
|---|---|---|---|---|
| No detectada | 2006 | SpringerLink |
Información
Tipo de recurso:
libros
ISBN impreso
978-3-540-46537-9
ISBN electrónico
978-3-540-46539-3
Editor responsable
Springer Nature
País de edición
Reino Unido
Fecha de publicación
2006
Información sobre derechos de publicación
© Springer-Verlag Berlin Heidelberg 2006
Tabla de contenidos
doi: 10.1007/11893004_101
An Intelligent and Efficient Traitor Tracing for Ubiquitous Environments
Deok-Gyu Lee; Seo Il Kang; Im-Yeong Lee
Broadcast encryption has been applied to transmit digital information such as multimedia, software and paid TV programs on the open networks. One of key factors in the broadcast encryption is that only previously authorized users can access the digital information. If the broadcast message is sent, first of all, the privileged users will decode the session key by using his or her personal key, which the user got previously. The user will get the digital information through this session key. As shown above, the user will obtain messages or session keys using the keys transmitted from a broadcaster, which process requires effective ways for the broadcaster to generate and distribute keys. In addition, when a user wants to withdraw or sign up, an effective process to renew a key is required. It is also necessary to chase and check users’ malicious activities or attacking others. This paper presents a method called Traitor Tracing to solve all these problems. Traitor tracing can check attackers and trace them. It also utilizes a proactive scheme for each user to have effective and intelligence renewal cycle to generate keys.
- Hybrid Information Technology Using Computational Intelligence | Pp. 793-802
doi: 10.1007/11893004_102
e-Business Agent Oriented Component Based Development for Business Intelligence
Ho-Jun Shin; Bo-Yeon Shim
Agent technology becomes more and more importance in Business Intelligence domain. The concepts and technology have been brought to a stage where they are useable in real applications, and there is a growing understanding of how to apply them to practical problems. Component methodologies have proved to be successful in increasing speed to market of software development projects, lowering the development cost and providing better quality.
In this paper, we propose systemical development process using component and UML(Unified Modeling Language) technology to analysis, design and develop e-business agent for business intelligence. The ebA-CBD(e-business Agent-Component Based Development) process is an attempt to consider all of the best features of existing AOSE(Agent Oriented Software Engineering) methodologies while grounding agent-oriented concepts in the same underlying semantic framework used by UML, the standard modeling language for Object Oriented Software Engineering. Finally we describe how these concepts may assist in increasing the efficiency and reusability in business intelligence application and e-business agent development in business intelligence environment.
- Hybrid Information Technology Using Computational Intelligence | Pp. 803-811
doi: 10.1007/11893004_103
New Design of PMU for Real-Time Security Monitoring and Control of Wide Area Intelligent System
Hak-Man Kim; Jin-Hong Jeon; Myong-Chul Shin; Tae-Kyoo Oh
Security monitoring and control are very important for stable operation in wide area intelligent system. Electrical power grid is one of a wide area system and is progressing to intelligent system. For real-time security monitoring and control of electrical power grid, measurement of control variables such as voltage, current, real power, reactive power, power factor and system frequency must be synchronized because sub-control sites are distributed widely. Global Positioning System (GPS) is used for synchronization. In this paper, we introduce the new design concept of Phasor Measurement Unit (PMU) for security monitoring and control of electrical power grid, which is one of the wide area intelligent systems. PMU is applied d-q transformation and Phase Locked Loop (PLL) to improve the robustness of measurement. PMU is tested on three-phase 380V distribution line with resistor load.
- Hybrid Information Technology Using Computational Intelligence | Pp. 812-818
doi: 10.1007/11893004_104
Security Intelligence: Web Contents Security System for Semantic Web
Nam-deok Cho; Eun-ser Lee; Hyun-gun Park
WWW (World Wide Web) has incurred the problem that users are not necessarily provided with the information they want to receive, at a time when the amount of information is explosively increasing. Therefore, Tim Berners-Lee proposed the Semantic Web as the new web paradigm to solve this problem. But there is always a security problem in Semantic Web such as WWW and the study about this is insufficient. Therefore, the authors of this paper propose that the Security Intelligence system should be used to present semantic information using ontology and prevents that users flow out the information. This system is an ACM(Access Control Matrix) based access control model basically, and It is a system that prevent information leakage by user’s deliberation and by user’s mistake. It can be also used for WWW.
- Hybrid Information Technology Using Computational Intelligence | Pp. 819-828
doi: 10.1007/11893004_105
Performance Analysis of Location Estimation Algorithm Using an Intelligent Coordination Scheme in RTLS
Seung-Hee Jeong; Hyun-Jae Lee; Joon-Sung Lee; Chang-Heon Oh
In this paper, we proposed a high precision location estimation algorithm using an intelligent coordination scheme in 2.45GHz RTLS and analyzed an average estimation error distance at 2D coordinates searching-area (300m×300m and 250m×250m). An average error distance was reduced as the number of available reader and received sub-blink increased. Proposed location estimation algorithm satisfied the RTLS specification requirements, 3m radius accuracy when the number of available reader is greater than 3 and the received sub-blink number exceeds 2 times in 250m×250m. Also, an average error distance was saturated within 0.5m~2.5m in case of 250m×250m when the number of available reader is greater than 4 regardless of the number of sub-blink. Also we confirmed that the 3m radius accuracy is 78 percent, and the 2.348m radius accuracy is 72 percent in 300m×300m searching-area when the number of available reader and received sub-blink was 8 and 4 times, respectively. In that case, we confirmed that 3m radius accuracy is 99 percent, and the 2.348m radius accuracy is 97 percent in 250m×250m searching-area.
- Hybrid Information Technology Using Computational Intelligence | Pp. 829-835
doi: 10.1007/11893004_106
Security Requirements for Ubiquitous Software Development Site
Tai-hoon Kim
A PP (protection profile) defines an implementation-independent set of security requirements for a category of Target of Evaluations. Consumers or owners can therefore construct or cite a PP to express their security needs without reference to any specific IT products. Generally, PP contains security assurance requirements about the security of development environment for IT product or system and PP can applied to ubiquitous software development site. This paper proposes some security environments for ubiquitous software development site by analyzing the ALC_DVS.1 of the ISO/IEC 15408 and Base Practices (BPs) of the ISO/IEC 21827.
- Hybrid Information Technology Using Computational Intelligence | Pp. 836-843
doi: 10.1007/11893004_107
Paraconsistent Artificial Neural Network: Applicability in Computer Analysis of Speech Productions
Jair Minoro Abe; João Carlos Almeida Prado; Kazumi Nakamatsu
In this work we sketch how Paraconsistent Artificial Neural Network – PANN – can be useful in speech signals recognition by using phonic traces signals. The PANN is built based on Paraconsistent Annotated Logic E( and it allows us to manipulate uncertain, inconsistent and paracomplete information without trivialization.
- Logic Based Intelligent Information Systems | Pp. 844-850
doi: 10.1007/11893004_108
Intelligent Paraconsistent Logic Controller and Autonomous Mobile Robot Emmy II
Jair M. Abe; Cláudio R. Torres; Germano L. Torres; Kazumi Nakamatsu; Michiro Kondo
In this work we present a logic controller based on Paraconsistent Annotated Logic named Paracontrol, which can be applied to resolve conflicts and to deal with contradictions and/or paracompleteness, by implementing a decision-making in the presence of uncertainties. Such controller was implemented in a real autonomous mobile robot Emmy II.
- Logic Based Intelligent Information Systems | Pp. 851-857
doi: 10.1007/11893004_109
EVALPSN Based Intelligent Drivers’ Model
Kazumi Nakamatsu; Michiro Kondo; Jair M. Abe
We introduce an intelligent drivers’ model for traffic simulation in a small area including some intersections, which models drivers’ decision making based on defeasible deontic reasoning and can deal with minute speed change of cars in the simulation system. The intelligent model is computed based on defeasible deontic reasoning by a paraconsistent annotated logic program EVALPSN.
- Logic Based Intelligent Information Systems | Pp. 858-865
doi: 10.1007/11893004_110
The Study of the Robust Learning Algorithm for Neural Networks
Shigenobu Yamawaki
In this paper, we propose the robust learning algorithm for neural networks. The suggested algorithm is obtaining the expanded Kalman filter in the Krein space. We show that this algorithm can be applied to identify the nonlinear system in the presence of the observed noise and system noise.
- Logic Based Intelligent Information Systems | Pp. 866-870