T. Yamanoi, H. Toyoshima, T. Yamazaki, Shin-ichi Ohnishi, M. Sugeno, Elie Sanchez
In order to develop a brain machine interface, the authors have investigated the brain activity during human recognition of characters and symbols representing directional meaning. The authors have recorded electroencephalograms (EEGs) from subjects viewing four types of Kanji (Chinese characters being used currently in the Japanese language) and arrows that were presented on a CRT. Each denoted direction for upward, downward, leftward and rightward, respectively. Subjects were asked to read them silently. Regardless of the directions, the reaction time was almost equal. EEGs were averaged for each stimulus type and direction, and event related potentials (ERPs) were obtained. The equivalent current dipole source localization (ECDL) method has been applied to these ERPs. In both cases, no large difference was observed until 250 ms at their latencies, and after that ECDs were localized to areas related to the working memory for the spatial perception. Taking into account these facts, the authors have investigated a single trial EEGs precisely after the latency at 400ms, and have determined effective sampling latencies for the discriminant analysis on four types of arrows: ↑, ↓, ← and →. By a discriminant analysis, the results of discriminant rate are 100% for each subject and for each trial. These results show the possibility of using EEGs for a brain machine interface in four type controls.
{"title":"Fundamental research for brain machine interface by use of EEG from right frontal gyrus","authors":"T. Yamanoi, H. Toyoshima, T. Yamazaki, Shin-ichi Ohnishi, M. Sugeno, Elie Sanchez","doi":"10.1145/1456223.1456252","DOIUrl":"https://doi.org/10.1145/1456223.1456252","url":null,"abstract":"In order to develop a brain machine interface, the authors have investigated the brain activity during human recognition of characters and symbols representing directional meaning. The authors have recorded electroencephalograms (EEGs) from subjects viewing four types of Kanji (Chinese characters being used currently in the Japanese language) and arrows that were presented on a CRT. Each denoted direction for upward, downward, leftward and rightward, respectively. Subjects were asked to read them silently. Regardless of the directions, the reaction time was almost equal. EEGs were averaged for each stimulus type and direction, and event related potentials (ERPs) were obtained. The equivalent current dipole source localization (ECDL) method has been applied to these ERPs. In both cases, no large difference was observed until 250 ms at their latencies, and after that ECDs were localized to areas related to the working memory for the spatial perception. Taking into account these facts, the authors have investigated a single trial EEGs precisely after the latency at 400ms, and have determined effective sampling latencies for the discriminant analysis on four types of arrows: ↑, ↓, ← and →. By a discriminant analysis, the results of discriminant rate are 100% for each subject and for each trial. These results show the possibility of using EEGs for a brain machine interface in four type controls.","PeriodicalId":309453,"journal":{"name":"International Conference on Soft Computing as Transdisciplinary Science and Technology","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123446790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, we propose an approach of analyzing and evaluating network security based on simulation. It can provide measurable data to help improving network security by simulating various cyber attacks and calculating the security loss of the network to estimate the impacts of the attacks. Firstly, the basic method of evaluation and formulae of calculating security loss are proposed, and then the simulation models and the simulation system which has been implemented are introduced.
{"title":"Network security simulation and evaluation","authors":"Yimin Cui, Tao Zou, Lufeng Zhang, Jinjing Zhao","doi":"10.1145/1456223.1456239","DOIUrl":"https://doi.org/10.1145/1456223.1456239","url":null,"abstract":"In this paper, we propose an approach of analyzing and evaluating network security based on simulation. It can provide measurable data to help improving network security by simulating various cyber attacks and calculating the security loss of the network to estimate the impacts of the attacks. Firstly, the basic method of evaluation and formulae of calculating security loss are proposed, and then the simulation models and the simulation system which has been implemented are introduced.","PeriodicalId":309453,"journal":{"name":"International Conference on Soft Computing as Transdisciplinary Science and Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114126728","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this study, we critically analyse and compare performances of several global optimization (GO) approaches with our hybrid GLPτS method, which uses meta-heuristic rules and a local search in the final stage of finding a global solution. We also critically investigate a Stochastic Genetic Algorithm (StGA) method to demonstrate that there are some loopholes in its algorithm and assumptions. Subsequently, we employ the GLPτS method for neural network (NN) supervised learning, when using our intelligent system for solving real-world pattern recognition and classification problem. In the preprocessing data phase, our system also uses Principal Component Analysis (PCA) and Linear Discriminant Analysis (LDA) for dimensionality reduction and minimization of the chosen number of features for the classification problem. Finally, the reported results are compared with Backpropagation (BP) to demonstrate the competitive properties and the efficiency of our system.
{"title":"Intelligent hybrid system for pattern recognition and classification","authors":"I. Jordanov, A. Georgieva","doi":"10.1145/1456223.1456231","DOIUrl":"https://doi.org/10.1145/1456223.1456231","url":null,"abstract":"In this study, we critically analyse and compare performances of several global optimization (GO) approaches with our hybrid GLPτS method, which uses meta-heuristic rules and a local search in the final stage of finding a global solution. We also critically investigate a Stochastic Genetic Algorithm (StGA) method to demonstrate that there are some loopholes in its algorithm and assumptions. Subsequently, we employ the GLPτS method for neural network (NN) supervised learning, when using our intelligent system for solving real-world pattern recognition and classification problem. In the preprocessing data phase, our system also uses Principal Component Analysis (PCA) and Linear Discriminant Analysis (LDA) for dimensionality reduction and minimization of the chosen number of features for the classification problem. Finally, the reported results are compared with Backpropagation (BP) to demonstrate the competitive properties and the efficiency of our system.","PeriodicalId":309453,"journal":{"name":"International Conference on Soft Computing as Transdisciplinary Science and Technology","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132544576","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper presents an implementation of a neural-based navigation approach on two types of mobile robots namely the Robucar and Robuter. This approach must provide these robots with capability to acquire the obstacle avoidance and target localization behaviors after learning. Then, this approach uses three Neural Networks (NN) to achieve the desired task which can be performed in indoor or outdoor environments. Implementation of the approach and experimental results are presented showing the effectiveness of the overall navigation control system.
{"title":"Implementation of a neural-based navigation approach on indoor and outdoor mobile robots","authors":"O. Azouaoui, M. Kadri, N. Ouadah","doi":"10.1145/1456223.1456243","DOIUrl":"https://doi.org/10.1145/1456223.1456243","url":null,"abstract":"This paper presents an implementation of a neural-based navigation approach on two types of mobile robots namely the Robucar and Robuter. This approach must provide these robots with capability to acquire the obstacle avoidance and target localization behaviors after learning. Then, this approach uses three Neural Networks (NN) to achieve the desired task which can be performed in indoor or outdoor environments. Implementation of the approach and experimental results are presented showing the effectiveness of the overall navigation control system.","PeriodicalId":309453,"journal":{"name":"International Conference on Soft Computing as Transdisciplinary Science and Technology","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129786913","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper we propose an NLP-based Ontology Population approach for a Generic Structure instantiation from natural language texts, in the domain of Risk Management. The approach is semi-automatic and based on combined NLP techniques using domain expert intervention for control and validation. It relies on the predicative power of verbs in the instantiation process. It is not domain dependent since it heavily relies on linguistic knowledge. We demonstrate the effectiveness of our method on the ontology of the PRIMA project (supported by the European community) and we populate this generic domain ontology via an available corpus. A first validation of the approach is done through an experiment with Chemical Fact Sheets from Environmental Protection Agency.
{"title":"An NLP-based ontology population for a risk management generic structure","authors":"J. Makki, Anne-Marie Alquier, V. Prince","doi":"10.1145/1456223.1456296","DOIUrl":"https://doi.org/10.1145/1456223.1456296","url":null,"abstract":"In this paper we propose an NLP-based Ontology Population approach for a Generic Structure instantiation from natural language texts, in the domain of Risk Management. The approach is semi-automatic and based on combined NLP techniques using domain expert intervention for control and validation. It relies on the predicative power of verbs in the instantiation process. It is not domain dependent since it heavily relies on linguistic knowledge.\u0000 We demonstrate the effectiveness of our method on the ontology of the PRIMA project (supported by the European community) and we populate this generic domain ontology via an available corpus. A first validation of the approach is done through an experiment with Chemical Fact Sheets from Environmental Protection Agency.","PeriodicalId":309453,"journal":{"name":"International Conference on Soft Computing as Transdisciplinary Science and Technology","volume":"395 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132058415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
While software adaptation is recognized as an important challenge of software engineering, this discipline is still in its infancy. Adaptation must be prepared at design time to be observed at runtime. In this context, important efforts are required on software architectures to endow them with adaptation potentialities. In this paper, we propose a component-based software development approach, a component model especially, to create an adaptation support at runtime. We implement the inside of components by means of UML 2 State Machine Diagrams. By using model executability, we detail in the paper how to carry out dynamic adaptation of software components.
{"title":"Dynamic adaptive software components: the MOCAS approach","authors":"Cyril Ballagny, N. Hameurlain, F. Barbier","doi":"10.1145/1456223.1456327","DOIUrl":"https://doi.org/10.1145/1456223.1456327","url":null,"abstract":"While software adaptation is recognized as an important challenge of software engineering, this discipline is still in its infancy. Adaptation must be prepared at design time to be observed at runtime. In this context, important efforts are required on software architectures to endow them with adaptation potentialities. In this paper, we propose a component-based software development approach, a component model especially, to create an adaptation support at runtime. We implement the inside of components by means of UML 2 State Machine Diagrams. By using model executability, we detail in the paper how to carry out dynamic adaptation of software components.","PeriodicalId":309453,"journal":{"name":"International Conference on Soft Computing as Transdisciplinary Science and Technology","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132444292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this article, we expose the basics of distributed identity management systems and characterize what makes an identity federation architecture a singular one. We depict the evolutions and current trends of the interconnection of information systems by exposing what could be a global identity management system issued from the convergence of multiple identity federations. Thereby, we expose the expected functionalities of such an architecture and we also describe the basic distributed identity management mechanisms necessary for their deployment. Then, we discuss about privacy concerns and why some of these functionalities should be implemented carefully.
{"title":"Complex federation architectures: stakes, tricks & issues","authors":"Mikaël Ates, J. Fayolle, C. Gravier, J. Lardon","doi":"10.1145/1456223.1456258","DOIUrl":"https://doi.org/10.1145/1456223.1456258","url":null,"abstract":"In this article, we expose the basics of distributed identity management systems and characterize what makes an identity federation architecture a singular one.\u0000 We depict the evolutions and current trends of the interconnection of information systems by exposing what could be a global identity management system issued from the convergence of multiple identity federations.\u0000 Thereby, we expose the expected functionalities of such an architecture and we also describe the basic distributed identity management mechanisms necessary for their deployment. Then, we discuss about privacy concerns and why some of these functionalities should be implemented carefully.","PeriodicalId":309453,"journal":{"name":"International Conference on Soft Computing as Transdisciplinary Science and Technology","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133688357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Automatic speech recognition systems (ASR) have more trouble processing spontaneous speech (e.g. debates) than prepared speech (e.g. broadcast news). These difficulties are due to peculiarities of spontaneous speech (false start, repetition, schwa, etc.). In this paper, we highlight some of these peculiarities, especially in French. We show that the use of manual transcriptions having no link with the focused application, but which contains only transcriptions of very spontaneous speech, allows to estimate a better language model, strongly decreasing perplexity and significantly decreasing the word error rate on spontaneous speech. But other knowledge bases used by the ASR have to be adapted. For example, our work shows that adding specific pronunciation variants seems useful, but has to be constrained and modelized. Finally, we compare errors of our CMU Sphinx-based ASR system on spontaneous vs. prepared speech.
{"title":"From prepared speech to spontaneous speech recognition system: a comparative study applied to French language","authors":"Richard Dufour","doi":"10.1145/1456223.1456345","DOIUrl":"https://doi.org/10.1145/1456223.1456345","url":null,"abstract":"Automatic speech recognition systems (ASR) have more trouble processing spontaneous speech (e.g. debates) than prepared speech (e.g. broadcast news). These difficulties are due to peculiarities of spontaneous speech (false start, repetition, schwa, etc.). In this paper, we highlight some of these peculiarities, especially in French.\u0000 We show that the use of manual transcriptions having no link with the focused application, but which contains only transcriptions of very spontaneous speech, allows to estimate a better language model, strongly decreasing perplexity and significantly decreasing the word error rate on spontaneous speech.\u0000 But other knowledge bases used by the ASR have to be adapted. For example, our work shows that adding specific pronunciation variants seems useful, but has to be constrained and modelized. Finally, we compare errors of our CMU Sphinx-based ASR system on spontaneous vs. prepared speech.","PeriodicalId":309453,"journal":{"name":"International Conference on Soft Computing as Transdisciplinary Science and Technology","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131366093","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The focus of this paper is a construction of better knowledge base in case-based classifier system. Our knowledge base structure is based on concept lattice where rules are built from its subconcept-superconcept relation. Since the lattice can only be constructed from inputs with binary attributes, descriptive and numeric attributes must be transformed to binary attributes. In this paper, we propose the transformation of numeric attributes to descriptive attributes using fuzzy set theory. We experiment on benchmark data sets, Car and Iris, to determine the performance in term of number of rules used and classification precision. The results show that trend of accuracy is proportional to the size of learning inputs. The number of rules used is relatively small compared with size of training data. Our case-based classifier produces very promising results in practice and can classify the new problem more accurate than traditional classifiers.
{"title":"Building classification rules for case-based classifier using fuzzy sets and formal concept analysis","authors":"J. Tadrat, V. Boonjing, P. Pattaraintakorn","doi":"10.1145/1456223.1456230","DOIUrl":"https://doi.org/10.1145/1456223.1456230","url":null,"abstract":"The focus of this paper is a construction of better knowledge base in case-based classifier system. Our knowledge base structure is based on concept lattice where rules are built from its subconcept-superconcept relation. Since the lattice can only be constructed from inputs with binary attributes, descriptive and numeric attributes must be transformed to binary attributes. In this paper, we propose the transformation of numeric attributes to descriptive attributes using fuzzy set theory. We experiment on benchmark data sets, Car and Iris, to determine the performance in term of number of rules used and classification precision. The results show that trend of accuracy is proportional to the size of learning inputs. The number of rules used is relatively small compared with size of training data. Our case-based classifier produces very promising results in practice and can classify the new problem more accurate than traditional classifiers.","PeriodicalId":309453,"journal":{"name":"International Conference on Soft Computing as Transdisciplinary Science and Technology","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115777575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Intelligent systems for the classroom are nothing new. Despite all of the developments in this area, however, there is very little research into the use of semantic-web technologies for the implementation of smart systems for a school environment. The proposed system will provide a practical and automated location-awareness solution that can be used to provide real-time classroom services for students based on the semantic web. Using infrared location beacons, student laptops will be able to identify their current location and join a classroom area network, providing to the students lesson information for the current class, digital collaboration opportunities, as well as personalized information from an ontology-driven knowledgebase. By automating the classroom computing experience, the focus of the class can remain on the lesson material itself, providing a more productive learning environment.
{"title":"Location-aware classroom services on the semantic web","authors":"Kris Scott, R. Benlamri","doi":"10.1145/1456223.1456336","DOIUrl":"https://doi.org/10.1145/1456223.1456336","url":null,"abstract":"Intelligent systems for the classroom are nothing new. Despite all of the developments in this area, however, there is very little research into the use of semantic-web technologies for the implementation of smart systems for a school environment. The proposed system will provide a practical and automated location-awareness solution that can be used to provide real-time classroom services for students based on the semantic web. Using infrared location beacons, student laptops will be able to identify their current location and join a classroom area network, providing to the students lesson information for the current class, digital collaboration opportunities, as well as personalized information from an ontology-driven knowledgebase. By automating the classroom computing experience, the focus of the class can remain on the lesson material itself, providing a more productive learning environment.","PeriodicalId":309453,"journal":{"name":"International Conference on Soft Computing as Transdisciplinary Science and Technology","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124579337","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}