Pub Date : 2013-07-16DOI: 10.1109/ICCI-CC.2013.6622231
W. Kinsner, Siavash Malektaji
Cognitive systems call for wireless communications with antennas having stringent requirements. For example, software-defined radio, cognitive radio, and cognitive sensor networks operate over very wide bandwidth, with small dimensions, high gain, and omnidirectionally. A candidate capable of addressing such requirements is the fractal antenna. This paper describes selected simulations results of the following two fractal antenna: Koch and Minkowski. The variation trends of the voltage standing-wave ratio, the reflection coefficient, and the S11 parameters of the antenna have been studied for several successive iterates of the fractal shapes.
{"title":"An analysis of Koch and Minkowski fractal antennas for cognitive systems","authors":"W. Kinsner, Siavash Malektaji","doi":"10.1109/ICCI-CC.2013.6622231","DOIUrl":"https://doi.org/10.1109/ICCI-CC.2013.6622231","url":null,"abstract":"Cognitive systems call for wireless communications with antennas having stringent requirements. For example, software-defined radio, cognitive radio, and cognitive sensor networks operate over very wide bandwidth, with small dimensions, high gain, and omnidirectionally. A candidate capable of addressing such requirements is the fractal antenna. This paper describes selected simulations results of the following two fractal antenna: Koch and Minkowski. The variation trends of the voltage standing-wave ratio, the reflection coefficient, and the S11 parameters of the antenna have been studied for several successive iterates of the fractal shapes.","PeriodicalId":130244,"journal":{"name":"2013 IEEE 12th International Conference on Cognitive Informatics and Cognitive Computing","volume":"193 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124285431","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-07-16DOI: 10.1109/ICCI-CC.2013.6622226
Du Zhang
We are faced with a torrent of data generated and captured in digital form as a result of the advancement of sciences, engineering and technologies, and various social, economical and human activities. This big data phenomenon ushers in a new era where human endeavors and scientific pursuits will be aided by not only human capital, and physical and financial assets, but also data assets. Research issues in big data and big data analysis are embedded in multi-dimensional scientific and technological spaces. In this paper, we first take a close look at the dimensions in big data and big data analysis, and then focus our attention on the issue of inconsistencies in big data and the impact of inconsistencies in big data analysis. We offer classifications of four types of inconsistencies in big data and point out the utility of inconsistency-induced learning as a tool for big data analysis.
{"title":"Inconsistencies in big data","authors":"Du Zhang","doi":"10.1109/ICCI-CC.2013.6622226","DOIUrl":"https://doi.org/10.1109/ICCI-CC.2013.6622226","url":null,"abstract":"We are faced with a torrent of data generated and captured in digital form as a result of the advancement of sciences, engineering and technologies, and various social, economical and human activities. This big data phenomenon ushers in a new era where human endeavors and scientific pursuits will be aided by not only human capital, and physical and financial assets, but also data assets. Research issues in big data and big data analysis are embedded in multi-dimensional scientific and technological spaces. In this paper, we first take a close look at the dimensions in big data and big data analysis, and then focus our attention on the issue of inconsistencies in big data and the impact of inconsistencies in big data analysis. We offer classifications of four types of inconsistencies in big data and point out the utility of inconsistency-induced learning as a tool for big data analysis.","PeriodicalId":130244,"journal":{"name":"2013 IEEE 12th International Conference on Cognitive Informatics and Cognitive Computing","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123761061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-07-16DOI: 10.1109/ICCI-CC.2013.6622242
M. Nasri, W. Kinsner
This paper describes the application of extended and unscented Kalman filters for the identification of uncertainties in a process. The extended Kalman filter (EKF) is an optimal linear recursive algorithm that offers a solution to the filtering problem. The EKF is based on a first-order Taylor expansion to approximate the measurement and process models. This approach may cause the estimation process to diverge. Consequently, alternatives (e.g., the unscented Kalman filter, UKF) based on a fixed number of points to represent a Gaussian distribution have been introduced. The EKF and UKF have been applied for the identification of uncertainty in the attitude determination process for small satellites based on noisy measurements collected from Sun sensors and three-axis magnetometers. Simulation results indicate that the EKF and UKF perform equally well when small initial errors are present. However, when large errors are introduced, the UKF leads to a faster convergence and achieves a higher more accurate estimate of the state of the system.
{"title":"Extended and unscented Kalman filters for the identification of uncertainties in a process","authors":"M. Nasri, W. Kinsner","doi":"10.1109/ICCI-CC.2013.6622242","DOIUrl":"https://doi.org/10.1109/ICCI-CC.2013.6622242","url":null,"abstract":"This paper describes the application of extended and unscented Kalman filters for the identification of uncertainties in a process. The extended Kalman filter (EKF) is an optimal linear recursive algorithm that offers a solution to the filtering problem. The EKF is based on a first-order Taylor expansion to approximate the measurement and process models. This approach may cause the estimation process to diverge. Consequently, alternatives (e.g., the unscented Kalman filter, UKF) based on a fixed number of points to represent a Gaussian distribution have been introduced. The EKF and UKF have been applied for the identification of uncertainty in the attitude determination process for small satellites based on noisy measurements collected from Sun sensors and three-axis magnetometers. Simulation results indicate that the EKF and UKF perform equally well when small initial errors are present. However, when large errors are introduced, the UKF leads to a faster convergence and achieves a higher more accurate estimate of the state of the system.","PeriodicalId":130244,"journal":{"name":"2013 IEEE 12th International Conference on Cognitive Informatics and Cognitive Computing","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126915332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-07-16DOI: 10.1109/ICCI-CC.2013.6622255
Camille Barot, D. Lourdeaux, D. Lenne
Virtual environments for training use technical systems simulation and virtual characters to put learners in training situations that emulate genuine work situations. In these environments, maintaining coherence is essential for the learning, whether in the perceived motivations of the characters or the reactions of the technical systems. However, with the complexification of simulated situations, it becomes difficult to maintain this coherence while exerting some control over the scenario, without having to define it explicitly a priori. We present in this paper the SELDON approach, which aims at dynamically adapting the scenario of a virtual environment for training to fit the learner's needs, and focuses on maintaining its coherence. We propose to generate this scenario by using a planning system with two different types of operators - prediction operators, and adjustment operators -, to influence the scenario unfolding in an indirect manner, while respecting the individual agent behaviours.
{"title":"Using planning to predict and influence autonomous agents behaviour in a virtual environment for training","authors":"Camille Barot, D. Lourdeaux, D. Lenne","doi":"10.1109/ICCI-CC.2013.6622255","DOIUrl":"https://doi.org/10.1109/ICCI-CC.2013.6622255","url":null,"abstract":"Virtual environments for training use technical systems simulation and virtual characters to put learners in training situations that emulate genuine work situations. In these environments, maintaining coherence is essential for the learning, whether in the perceived motivations of the characters or the reactions of the technical systems. However, with the complexification of simulated situations, it becomes difficult to maintain this coherence while exerting some control over the scenario, without having to define it explicitly a priori. We present in this paper the SELDON approach, which aims at dynamically adapting the scenario of a virtual environment for training to fit the learner's needs, and focuses on maintaining its coherence. We propose to generate this scenario by using a planning system with two different types of operators - prediction operators, and adjustment operators -, to influence the scenario unfolding in an indirect manner, while respecting the individual agent behaviours.","PeriodicalId":130244,"journal":{"name":"2013 IEEE 12th International Conference on Cognitive Informatics and Cognitive Computing","volume":"74 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127394643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-07-16DOI: 10.1109/ICCI-CC.2013.6622220
Divesh Lala, T. Nishida
In order to produce agents which are effective social actors, behavior must be modeled in an appropriate way. Models exist for a wide range of agent components, but this paper focuses on communication through body expression. Additionally, rather than formulating communication models from scratch, this paper discusses modeling of agents based on existing communication theory in the real world. In this case, Herbert Clark's joint activity theory is used, where each collaborative act is regarded as a joint project between one or more parties. The generalized model is defined and its first implementation in the form of a virtual basketball game is also described. The use of a game provides an ideal testbed for the analysis of communication using Clark's theory.
{"title":"Modeling communicative virtual agents based on joint activity theory","authors":"Divesh Lala, T. Nishida","doi":"10.1109/ICCI-CC.2013.6622220","DOIUrl":"https://doi.org/10.1109/ICCI-CC.2013.6622220","url":null,"abstract":"In order to produce agents which are effective social actors, behavior must be modeled in an appropriate way. Models exist for a wide range of agent components, but this paper focuses on communication through body expression. Additionally, rather than formulating communication models from scratch, this paper discusses modeling of agents based on existing communication theory in the real world. In this case, Herbert Clark's joint activity theory is used, where each collaborative act is regarded as a joint project between one or more parties. The generalized model is defined and its first implementation in the form of a virtual basketball game is also described. The use of a game provides an ideal testbed for the analysis of communication using Clark's theory.","PeriodicalId":130244,"journal":{"name":"2013 IEEE 12th International Conference on Cognitive Informatics and Cognitive Computing","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134518453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-07-16DOI: 10.1109/ICCI-CC.2013.6622276
Hiroyuki Nishiyama, F. Mizoguchi
In this study, we design a cognitive tool to detect malicious images using a smart phone. This tool can learn shot images taken with the camera of a smart phone and automatically classify the new image as an malicious image in the smart phone. To develop the learning and classifier tool, we implement an image analysis function and a learning and classifier function using a support vector machine (SVM) with the smart phone. With this tool, the user can collect image data with the camera of a smart phone, create learning data, and classify the new image data according to the learning data in the smart phone. In this study, we apply this tool to a user interface of a cosmetics recommendation service system and demonstrate its effectiveness by in reducing the load of the diagnosis server in this service and improving the user service.
{"title":"Design of a cognitive tool to detect malicious images using the smart phone","authors":"Hiroyuki Nishiyama, F. Mizoguchi","doi":"10.1109/ICCI-CC.2013.6622276","DOIUrl":"https://doi.org/10.1109/ICCI-CC.2013.6622276","url":null,"abstract":"In this study, we design a cognitive tool to detect malicious images using a smart phone. This tool can learn shot images taken with the camera of a smart phone and automatically classify the new image as an malicious image in the smart phone. To develop the learning and classifier tool, we implement an image analysis function and a learning and classifier function using a support vector machine (SVM) with the smart phone. With this tool, the user can collect image data with the camera of a smart phone, create learning data, and classify the new image data according to the learning data in the smart phone. In this study, we apply this tool to a user interface of a cosmetics recommendation service system and demonstrate its effectiveness by in reducing the load of the diagnosis server in this service and improving the user service.","PeriodicalId":130244,"journal":{"name":"2013 IEEE 12th International Conference on Cognitive Informatics and Cognitive Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131228397","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-07-16DOI: 10.1109/ICCI-CC.2013.6622261
Pravin Kumar Subbaraj, K. Anandan, Geethanjali Balasubramanian, Mahesh Veezhinathan
Cognitive measures are directed to assess the load of working memory while performing different tasks. Excessive load on working memory hinders learning or performance of individuals. The recommended remedy is to measure and design instructional systems that optimize the use of working memory capacity and avoid cognitive overload. Lexile measure is the current tool used in assessing the difficulty levels of text reading in English language. Studies on correlating the cognitive load with EEG for classifying tasks based on Lexile measures have been performed for native English speakers. In this work, an attempt has been made to analyze the scope of Lexile measure for assessing the cognitive load of Bilingual Indian subjects whose mother tongue is not English. Empirical results show that there is no statistical significance in classifying different reading tasks considering Lexile measures alone. The work could be extended further by including other parameters such as the level of interest and understanding along with performance evaluation for proper assessment of cognitive load in bilingual subjects.
{"title":"Analysis of cognitive load for bilingual subjects based on lexile measures","authors":"Pravin Kumar Subbaraj, K. Anandan, Geethanjali Balasubramanian, Mahesh Veezhinathan","doi":"10.1109/ICCI-CC.2013.6622261","DOIUrl":"https://doi.org/10.1109/ICCI-CC.2013.6622261","url":null,"abstract":"Cognitive measures are directed to assess the load of working memory while performing different tasks. Excessive load on working memory hinders learning or performance of individuals. The recommended remedy is to measure and design instructional systems that optimize the use of working memory capacity and avoid cognitive overload. Lexile measure is the current tool used in assessing the difficulty levels of text reading in English language. Studies on correlating the cognitive load with EEG for classifying tasks based on Lexile measures have been performed for native English speakers. In this work, an attempt has been made to analyze the scope of Lexile measure for assessing the cognitive load of Bilingual Indian subjects whose mother tongue is not English. Empirical results show that there is no statistical significance in classifying different reading tasks considering Lexile measures alone. The work could be extended further by including other parameters such as the level of interest and understanding along with performance evaluation for proper assessment of cognitive load in bilingual subjects.","PeriodicalId":130244,"journal":{"name":"2013 IEEE 12th International Conference on Cognitive Informatics and Cognitive Computing","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117187250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-07-16DOI: 10.1109/ICCI-CC.2013.6622267
Yi Tang, Runhua Wang, Zhiming Dong
In this paper, the delay-dependent robust stability is investigated for uncertain neutral-type delayed neural networks with discrete interval time-varying delays. The parameter uncertainties are assumed to be norm bounded. Based on the Lyapunov-Krasovskii functional, the Leibniz-Newton formula and the linear matrix inequality (LMI) technique, some robust stability conditions are proposed by introducing some free-weighting matrices. A numerical example is presented to illustrate the efficiency of proposed result.
{"title":"Novel delay-dependent robust stability criteria for uncertain neutral-type delayed neural networks with discrete interval time-varying delays","authors":"Yi Tang, Runhua Wang, Zhiming Dong","doi":"10.1109/ICCI-CC.2013.6622267","DOIUrl":"https://doi.org/10.1109/ICCI-CC.2013.6622267","url":null,"abstract":"In this paper, the delay-dependent robust stability is investigated for uncertain neutral-type delayed neural networks with discrete interval time-varying delays. The parameter uncertainties are assumed to be norm bounded. Based on the Lyapunov-Krasovskii functional, the Leibniz-Newton formula and the linear matrix inequality (LMI) technique, some robust stability conditions are proposed by introducing some free-weighting matrices. A numerical example is presented to illustrate the efficiency of proposed result.","PeriodicalId":130244,"journal":{"name":"2013 IEEE 12th International Conference on Cognitive Informatics and Cognitive Computing","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124255742","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-07-16DOI: 10.1109/ICCI-CC.2013.6622260
Natsuki Sano, K. Yada
In grocery stores, discount flyers act as an important tool to provide discount information to customers and spur buying motivation among them. However, discount flyer have limited space. As customers purchase popular products even if they are not actively promoted, mentioning them on discount flyers is an ineffective strategy. Therefore, the proper allocation of discounted products is an important topic which is related to category management. In this paper, we propose a prediction model for the number of purchased products based on the data obtained through radio frequency identification (RFID), point of sales (POS), and discount flyers. We propose a method to determine the share of product categories on discount flyers by evaluating the interaction effect between sales area and bargain scale using the prediction model. The experimental results show that the sales area near the register has a significant interaction effect on bargain sales, suggesting that discounted products should be arranged in front of the register.
{"title":"Determining the share of product categories on discount flyers based on the interaction effect between bargain scale and sales area","authors":"Natsuki Sano, K. Yada","doi":"10.1109/ICCI-CC.2013.6622260","DOIUrl":"https://doi.org/10.1109/ICCI-CC.2013.6622260","url":null,"abstract":"In grocery stores, discount flyers act as an important tool to provide discount information to customers and spur buying motivation among them. However, discount flyer have limited space. As customers purchase popular products even if they are not actively promoted, mentioning them on discount flyers is an ineffective strategy. Therefore, the proper allocation of discounted products is an important topic which is related to category management. In this paper, we propose a prediction model for the number of purchased products based on the data obtained through radio frequency identification (RFID), point of sales (POS), and discount flyers. We propose a method to determine the share of product categories on discount flyers by evaluating the interaction effect between sales area and bargain scale using the prediction model. The experimental results show that the sales area near the register has a significant interaction effect on bargain sales, suggesting that discounted products should be arranged in front of the register.","PeriodicalId":130244,"journal":{"name":"2013 IEEE 12th International Conference on Cognitive Informatics and Cognitive Computing","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122490550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-07-16DOI: 10.1109/ICCI-CC.2013.6622233
Takuma Oide, Atsushi Takeda, Akiko Takahashi, T. Suganuma
There are many obstacles to overcome when we use network services during a large-scale disaster, such as poor communication with unstable networks. Under such network environment, computers need to save network resources and to balance loads among nodes without user's operation. We propose the P2P Safety Confirmation System in which each node sufficiently achieves autonomous dynamic load balancing. This system is based on our proposed structured P2P network called Well-distribution Algorithm for an Overly Network (Waon), which does not require any network restriction and not incur additional maintenance costs during its load balancing. We implemented the system and evaluated node's behavior while nodes autonomously balance loads. Moreover we applied this framework to build a communication support system in natural disaster.
{"title":"SS5 design of a P2P information sharing system and its application to communication support in natural disaster","authors":"Takuma Oide, Atsushi Takeda, Akiko Takahashi, T. Suganuma","doi":"10.1109/ICCI-CC.2013.6622233","DOIUrl":"https://doi.org/10.1109/ICCI-CC.2013.6622233","url":null,"abstract":"There are many obstacles to overcome when we use network services during a large-scale disaster, such as poor communication with unstable networks. Under such network environment, computers need to save network resources and to balance loads among nodes without user's operation. We propose the P2P Safety Confirmation System in which each node sufficiently achieves autonomous dynamic load balancing. This system is based on our proposed structured P2P network called Well-distribution Algorithm for an Overly Network (Waon), which does not require any network restriction and not incur additional maintenance costs during its load balancing. We implemented the system and evaluated node's behavior while nodes autonomously balance loads. Moreover we applied this framework to build a communication support system in natural disaster.","PeriodicalId":130244,"journal":{"name":"2013 IEEE 12th International Conference on Cognitive Informatics and Cognitive Computing","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125835021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}