T. Ikeda, Y. Inoue, A. Sashima, Kiyoshi Yamamoto, T. Yamashita, K. Kurumatani
In this paper, we propose a wireless sensor network system called ComPass System, which uses low-power radio to provide services in everyday environments, such as indoor positioning services in public spaces. Although such environments present difficult hindrances such as dynamic changes of physical status, the ComPass System is designed to operate in such environments. The ComPass System 1) uses low-power radio and VHF radio band, 2) has low power consumption and functionality with cell batteries, and 3) has higher-level function such as bit-rate detection and signal correction on the ComPass Node----a node device designed for the ComPass System. We constructed an indoor autonomous positioning system in a commercial building, Yokohama Landmark Plaza, Minato-Mirai area, Japan, based on the ComPass System
{"title":"ComPass system: an low power wireless sensor network system and its application to indoor positioning","authors":"T. Ikeda, Y. Inoue, A. Sashima, Kiyoshi Yamamoto, T. Yamashita, K. Kurumatani","doi":"10.1145/1456223.1456356","DOIUrl":"https://doi.org/10.1145/1456223.1456356","url":null,"abstract":"In this paper, we propose a wireless sensor network system called ComPass System, which uses low-power radio to provide services in everyday environments, such as indoor positioning services in public spaces. Although such environments present difficult hindrances such as dynamic changes of physical status, the ComPass System is designed to operate in such environments. The ComPass System 1) uses low-power radio and VHF radio band, 2) has low power consumption and functionality with cell batteries, and 3) has higher-level function such as bit-rate detection and signal correction on the ComPass Node----a node device designed for the ComPass System. We constructed an indoor autonomous positioning system in a commercial building, Yokohama Landmark Plaza, Minato-Mirai area, Japan, based on the ComPass System","PeriodicalId":309453,"journal":{"name":"International Conference on Soft Computing as Transdisciplinary Science and Technology","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115493178","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper presents an adaptive pervasive learning environment, based on contextual QR Codes, where information is presented to learner at the appropriate time and place, and according to a particular task. This Learning environment is called PerZoovasive, where learning activities take place in a zoo and are meant to enhance classroom activities. This paper discusses adaptivity and context awareness system as strategies to provide support for learners in mobile pervasive situations. How to adapt the information while taking into consideration the context of the student or the group? Do context-awareness applications affect information proposed to users? Which role can be played by QR Codes in a pervasive environment? Can this experimentation be used in other learning situations?
{"title":"PerZoovasive: contextual pervasive QR codes as tool to provide an adaptive learning support","authors":"J. Rouillard, M. Laroussi","doi":"10.1145/1456223.1456332","DOIUrl":"https://doi.org/10.1145/1456223.1456332","url":null,"abstract":"This paper presents an adaptive pervasive learning environment, based on contextual QR Codes, where information is presented to learner at the appropriate time and place, and according to a particular task.\u0000 This Learning environment is called PerZoovasive, where learning activities take place in a zoo and are meant to enhance classroom activities.\u0000 This paper discusses adaptivity and context awareness system as strategies to provide support for learners in mobile pervasive situations. How to adapt the information while taking into consideration the context of the student or the group? Do context-awareness applications affect information proposed to users? Which role can be played by QR Codes in a pervasive environment? Can this experimentation be used in other learning situations?","PeriodicalId":309453,"journal":{"name":"International Conference on Soft Computing as Transdisciplinary Science and Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124634929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Evolutionary multiobjective optimization (EMO) is one of the most active research areas in evolutionary computation. EMO algorithms have been successfully used in various application areas. Among them are multiobjective design of neural networks and fuzzy systems. Especially, fuzzy system design has often been discussed as multiobjective problems. This is because we have two conflicting objectives in the design of fuzzy systems: accuracy maximization and complexity minimization. In this paper, we first explain some basic concepts in multiobjective optimization, a basic framework of EMO algorithms and some hot research issues in the EMO community. Next we explain EMO-based approaches to the design of fuzzy systems. We demonstrate through computational experiments that a large number of non-dominated fuzzy systems with different accuracy-complexity tradeoffs can be obtained by a single run of an EMO algorithm. Then we describe the use of EMO algorithms in other areas such as neural networks, genetic programming, clustering, feature selection, and data mining.
{"title":"Evolutionary multiobjective optimization and multiobjective fuzzy system design","authors":"H. Ishibuchi","doi":"10.1145/1456223.1456226","DOIUrl":"https://doi.org/10.1145/1456223.1456226","url":null,"abstract":"Evolutionary multiobjective optimization (EMO) is one of the most active research areas in evolutionary computation. EMO algorithms have been successfully used in various application areas. Among them are multiobjective design of neural networks and fuzzy systems. Especially, fuzzy system design has often been discussed as multiobjective problems. This is because we have two conflicting objectives in the design of fuzzy systems: accuracy maximization and complexity minimization. In this paper, we first explain some basic concepts in multiobjective optimization, a basic framework of EMO algorithms and some hot research issues in the EMO community. Next we explain EMO-based approaches to the design of fuzzy systems. We demonstrate through computational experiments that a large number of non-dominated fuzzy systems with different accuracy-complexity tradeoffs can be obtained by a single run of an EMO algorithm. Then we describe the use of EMO algorithms in other areas such as neural networks, genetic programming, clustering, feature selection, and data mining.","PeriodicalId":309453,"journal":{"name":"International Conference on Soft Computing as Transdisciplinary Science and Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114073400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Meta-heuristics are general frameworks of heuristics methods for solving combinatorial optimization problems, where exploring the exact solutions for these problems becomes very hard due to some limitations like extremely large running time. In this paper, new local searches over tree space are defined. Using these local searches, various meta-heuristics can be generalized to deal with tree data structures to introduce a more general framework of meta-heuristics called Meta-Heuristics Programming (MHP) as general machine learning tools. As an alternative to Genetic Programming (GP) algorithm, Memetic Programming (MP) algorithm is proposed as a new outcome of the MHP framework. The efficiency of the proposed MP Algorithm is examined through comparative numerical experiments.
{"title":"Memetic programming with adaptive local search using tree data structures","authors":"Emad Hamdy, A. Hedar, M. Fukushima","doi":"10.1145/1456223.1456278","DOIUrl":"https://doi.org/10.1145/1456223.1456278","url":null,"abstract":"Meta-heuristics are general frameworks of heuristics methods for solving combinatorial optimization problems, where exploring the exact solutions for these problems becomes very hard due to some limitations like extremely large running time. In this paper, new local searches over tree space are defined. Using these local searches, various meta-heuristics can be generalized to deal with tree data structures to introduce a more general framework of meta-heuristics called Meta-Heuristics Programming (MHP) as general machine learning tools. As an alternative to Genetic Programming (GP) algorithm, Memetic Programming (MP) algorithm is proposed as a new outcome of the MHP framework. The efficiency of the proposed MP Algorithm is examined through comparative numerical experiments.","PeriodicalId":309453,"journal":{"name":"International Conference on Soft Computing as Transdisciplinary Science and Technology","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123020394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, we present ContAct-Us an adaptive modeler allowing the modeling and adaptation of context and activity for mobile and pervasive learning scenarios. Indeed, with the emergence of the new mobile devices and their adaptation to learning processes, we have passed from the mobile learning towards the ubiquitous and the pervasive. The study of several works in pervasive learning allowed us to conclude that the focus is particularly on the adaptation of learning activities to the context of learning. From then on, it seems necessary to widen the notion of adaptation to take into account bijective adaptations between the context and learning activities within mobile learning to ensure also the adaptation of the context of use to the requirements of the learning activities and learner's needs. To ensure this bijective adaptation, a model of context and a model of activity will be mandatory. For that purpose and in an MDD approach (Model Driven Development), ContAct-Us allows: (1) The modeling of the eventual contextual elements of pervasive learning environment as well as the relations between them; (2) The modeling of the learning activities based on the approach CTT; (3) The modeling of the various possible relations between the context and learning activities led within mobile learning scenarios, based on activity theory; (4) Bijective adaptations between context and activity.
{"title":"ContAct-Us: a context-activity adaptive modeler for ubiquitous learning systems","authors":"J. Malek, M. Laroussi, A. Derycke","doi":"10.1145/1456223.1456330","DOIUrl":"https://doi.org/10.1145/1456223.1456330","url":null,"abstract":"In this paper, we present ContAct-Us an adaptive modeler allowing the modeling and adaptation of context and activity for mobile and pervasive learning scenarios. Indeed, with the emergence of the new mobile devices and their adaptation to learning processes, we have passed from the mobile learning towards the ubiquitous and the pervasive. The study of several works in pervasive learning allowed us to conclude that the focus is particularly on the adaptation of learning activities to the context of learning. From then on, it seems necessary to widen the notion of adaptation to take into account bijective adaptations between the context and learning activities within mobile learning to ensure also the adaptation of the context of use to the requirements of the learning activities and learner's needs. To ensure this bijective adaptation, a model of context and a model of activity will be mandatory. For that purpose and in an MDD approach (Model Driven Development), ContAct-Us allows: (1) The modeling of the eventual contextual elements of pervasive learning environment as well as the relations between them; (2) The modeling of the learning activities based on the approach CTT; (3) The modeling of the various possible relations between the context and learning activities led within mobile learning scenarios, based on activity theory; (4) Bijective adaptations between context and activity.","PeriodicalId":309453,"journal":{"name":"International Conference on Soft Computing as Transdisciplinary Science and Technology","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127747434","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A method to combine a Bayesian Network (BN) and Hidden Markov Models (HMMs) is presented. This compound system is applied to robot operations. The addressed problem and presented methods are novel with the following features: (1) BN and HMMs make a total decision system by accepting evidences from HMMs to the BN. (2) The HMM-embedded BN is applied to the human motion recognition for the biped humanoid operation. (3) Besides the motion recognition, the image recognition is incorporated by adding a BN subsystem. Thus, the total HMM-embedded BN can be regarded as an integrator of heterogeneous commands. (4) The human operator and the biped humanoid can be located on the other side of the network each other. (5) The piped humanoid follows various commands of human motions without falling down by showing better sophistication and operation success than HMM-alone and BN-alone systems. In addition to the above, an information supply to the BN from brain signals is realized through a combination with a Support Vector Machine (SVM).
{"title":"HMM-embedded Bayesian network for heterogeneous command integration: applications to biped humanoid operation over the network","authors":"Y. Matsuyama, Youichi Nishida","doi":"10.1145/1456223.1456256","DOIUrl":"https://doi.org/10.1145/1456223.1456256","url":null,"abstract":"A method to combine a Bayesian Network (BN) and Hidden Markov Models (HMMs) is presented. This compound system is applied to robot operations. The addressed problem and presented methods are novel with the following features: (1) BN and HMMs make a total decision system by accepting evidences from HMMs to the BN. (2) The HMM-embedded BN is applied to the human motion recognition for the biped humanoid operation. (3) Besides the motion recognition, the image recognition is incorporated by adding a BN subsystem. Thus, the total HMM-embedded BN can be regarded as an integrator of heterogeneous commands. (4) The human operator and the biped humanoid can be located on the other side of the network each other. (5) The piped humanoid follows various commands of human motions without falling down by showing better sophistication and operation success than HMM-alone and BN-alone systems. In addition to the above, an information supply to the BN from brain signals is realized through a combination with a Support Vector Machine (SVM).","PeriodicalId":309453,"journal":{"name":"International Conference on Soft Computing as Transdisciplinary Science and Technology","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117219486","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Many real world problems can be expressed as optimisation problems. Solving this kind of problems means to find, among all possible solutions, the one that maximises an evaluation function. One approach to solve this kind of problem is to use an informed search strategy. The principle of this kind of strategy is to use problem-specific knowledge beyond the definition of the problem itself to find solutions more efficiently than with an uninformed strategy. This kind of strategy demands to define problem-specific knowledge (heuristics). The efficiency and the effectiveness of systems based on it directly depend on the used knowledge quality. Unfortunately, acquiring and maintaining such knowledge can be fastidious. The objective of the work presented in this paper is to propose an automatic knowledge revision approach for systems based on an informed tree search strategy. Our approach consists in analysing the system execution logs and revising knowledge based on these logs by modelling the revision problem as a knowledge space exploration problem. We present an experiment we carried out in an application domain where informed search strategies are often used: cartographic generalisation.
{"title":"Knowledge revision in systems based on an informed tree search strategy: application to cartographic generalisation","authors":"P. Taillandier, C. Duchêne, A. Drogoul","doi":"10.1145/1456223.1456281","DOIUrl":"https://doi.org/10.1145/1456223.1456281","url":null,"abstract":"Many real world problems can be expressed as optimisation problems. Solving this kind of problems means to find, among all possible solutions, the one that maximises an evaluation function. One approach to solve this kind of problem is to use an informed search strategy. The principle of this kind of strategy is to use problem-specific knowledge beyond the definition of the problem itself to find solutions more efficiently than with an uninformed strategy. This kind of strategy demands to define problem-specific knowledge (heuristics). The efficiency and the effectiveness of systems based on it directly depend on the used knowledge quality. Unfortunately, acquiring and maintaining such knowledge can be fastidious. The objective of the work presented in this paper is to propose an automatic knowledge revision approach for systems based on an informed tree search strategy. Our approach consists in analysing the system execution logs and revising knowledge based on these logs by modelling the revision problem as a knowledge space exploration problem. We present an experiment we carried out in an application domain where informed search strategies are often used: cartographic generalisation.","PeriodicalId":309453,"journal":{"name":"International Conference on Soft Computing as Transdisciplinary Science and Technology","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127247603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper the controllers for the benchmark fed-batch fermentation process are obtained using the method of interactive evolutionary computation (IEC). The results allow us to conclude that IEC is a viable and very effective alternative to existing methods if the eventual solution is expected to be relatively simple (so it can be found with moderate computational cost), however, the strategy according to which the optimized variables are selected, plays a crucial role in productivity maximization.
{"title":"Fed-batch fermentation controller design with evolutionary computation","authors":"A. Riid, E. Rüstern","doi":"10.1145/1456223.1456300","DOIUrl":"https://doi.org/10.1145/1456223.1456300","url":null,"abstract":"In this paper the controllers for the benchmark fed-batch fermentation process are obtained using the method of interactive evolutionary computation (IEC). The results allow us to conclude that IEC is a viable and very effective alternative to existing methods if the eventual solution is expected to be relatively simple (so it can be found with moderate computational cost), however, the strategy according to which the optimized variables are selected, plays a crucial role in productivity maximization.","PeriodicalId":309453,"journal":{"name":"International Conference on Soft Computing as Transdisciplinary Science and Technology","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127155700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
With increasing networking and globalization of the market, it becomes increasingly difficult to understand how social values of products or services emerge based on the interaction of consumers' value judgments. This paper presents description of a service market model and constructs an agent model of consumers considering a consumer's subjective value using data obtained from a lifestyle survey. Results of the multi-agent simulation show that the pattern of service diffusion can change according to the influence of intensity of network externalities. Moreover, it discusses the characteristics of consumers who use services behind the diffusions.
{"title":"Service diffusion in the market considering consumers' subjective value","authors":"K. Fujita, T. Takenaka, K. Ueda","doi":"10.1145/1456223.1456262","DOIUrl":"https://doi.org/10.1145/1456223.1456262","url":null,"abstract":"With increasing networking and globalization of the market, it becomes increasingly difficult to understand how social values of products or services emerge based on the interaction of consumers' value judgments. This paper presents description of a service market model and constructs an agent model of consumers considering a consumer's subjective value using data obtained from a lifestyle survey. Results of the multi-agent simulation show that the pattern of service diffusion can change according to the influence of intensity of network externalities. Moreover, it discusses the characteristics of consumers who use services behind the diffusions.","PeriodicalId":309453,"journal":{"name":"International Conference on Soft Computing as Transdisciplinary Science and Technology","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130356243","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nodes localization in Wireless Sensor Networks (WSN) has arisen as a very challenging problem in the research community. Most of the applications for WSN are not useful without a priori known nodes positions. One solution to the problem is by adding GPS receivers to each node. Since this is an expensive approach and inapplicable for indoor environments, we need to find an alternative intelligent mechanism for determining nodes location. In this paper, we propose our cluster-based approach of multidimensional scaling (MDS) technique. Our initial experiments show that our algorithm outperforms MDS-MAP[8], particularly for irregular topologies in terms of accuracy.
{"title":"Cluster-based MDS algorithm for nodes localization in wireless sensor networks with irregular topologies","authors":"Biljana Risteska Stojkoska, D. Davcev, A. Kulakov","doi":"10.1145/1456223.1456302","DOIUrl":"https://doi.org/10.1145/1456223.1456302","url":null,"abstract":"Nodes localization in Wireless Sensor Networks (WSN) has arisen as a very challenging problem in the research community. Most of the applications for WSN are not useful without a priori known nodes positions. One solution to the problem is by adding GPS receivers to each node. Since this is an expensive approach and inapplicable for indoor environments, we need to find an alternative intelligent mechanism for determining nodes location. In this paper, we propose our cluster-based approach of multidimensional scaling (MDS) technique. Our initial experiments show that our algorithm outperforms MDS-MAP[8], particularly for irregular topologies in terms of accuracy.","PeriodicalId":309453,"journal":{"name":"International Conference on Soft Computing as Transdisciplinary Science and Technology","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131019286","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}