首页 > 最新文献

Third International Conference on Information Technology and Applications (ICITA'05)最新文献

英文 中文
p-MANET: Efficient Power Saving Protocol for Multi-Hop Mobile Ad Hoc Networks p-MANET:多跳移动自组网的高效节能协议
Chiung-Ying Wang, Chi-Jen Wu, Guan-Nan Chen, Ren-Hung Hwang
In this paper, we propose an efficient power saving protocol for multi-hop mobile ad hoc networks, called p-MANET. Our design is expected as a new foundation MAC layer power saving protocol. The main goals of p-MANET protocol are to reduce significant power consumption and transmission latency, and to achieve efficient power saving. Each mobile node in p-MANET only needs to become active during one beacon interval for every n interval where n is the size of a super frame. Thus, efficient power saving is expected. p-MANET also yields low transmission latency because that every mobile node is aware of the active beacon intervals of its neighbors such that it can easily choose a neighbor in active mode or with the least remaining time to wake up to forward packets. Simulations are also conducted to show the efficiency of the proposed p-MANET
在本文中,我们提出了一种高效节能的多跳移动自组网协议,称为p-MANET。我们的设计有望成为一个新的基础MAC层节能协议。p-MANET协议的主要目标是显著降低功耗和传输延迟,实现高效节能。p-MANET中的每个移动节点只需要在每n个间隔的一个信标间隔内激活,其中n是一个超级帧的大小。因此,期望高效节能。p-MANET还产生较低的传输延迟,因为每个移动节点都知道其邻居的活动信标间隔,这样它可以很容易地选择一个处于活动模式或剩余时间最少的邻居来转发数据包。仿真也证明了所提出的p-MANET的有效性
{"title":"p-MANET: Efficient Power Saving Protocol for Multi-Hop Mobile Ad Hoc Networks","authors":"Chiung-Ying Wang, Chi-Jen Wu, Guan-Nan Chen, Ren-Hung Hwang","doi":"10.1109/ICITA.2005.204","DOIUrl":"https://doi.org/10.1109/ICITA.2005.204","url":null,"abstract":"In this paper, we propose an efficient power saving protocol for multi-hop mobile ad hoc networks, called p-MANET. Our design is expected as a new foundation MAC layer power saving protocol. The main goals of p-MANET protocol are to reduce significant power consumption and transmission latency, and to achieve efficient power saving. Each mobile node in p-MANET only needs to become active during one beacon interval for every n interval where n is the size of a super frame. Thus, efficient power saving is expected. p-MANET also yields low transmission latency because that every mobile node is aware of the active beacon intervals of its neighbors such that it can easily choose a neighbor in active mode or with the least remaining time to wake up to forward packets. Simulations are also conducted to show the efficiency of the proposed p-MANET","PeriodicalId":371528,"journal":{"name":"Third International Conference on Information Technology and Applications (ICITA'05)","volume":"176 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132249470","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
WiPS: Location and Motion Sensing Technique of IEEE 802.11 Devices WiPS: IEEE 802.11设备的位置和运动感应技术
T. Kitasuka, K. Hisazumi, Tsuneo Nakanishi, Akira Fukuda
For increasing needs of positioning technology, easy and simple indoor positioning system is desired. Wireless LAN based positioning system is a major candidate of indoor positioning technology. Conventional WLAN based systems require high installation cost or long site calibration before use. In this paper, we describe the implementation of simple WLAN based indoor positioning system WiPS. WiPS uses RSSI between terminals to avoid site calibration. We perform an experiment called a flag game, in which the person raises and lowers the PDA held in each hand. WiPS determines each hand is up or down. As results of the experiment, WiPS detects the movement of PDA in 4.8 sec. on an average
随着人们对定位技术的需求日益增长,人们希望室内定位系统简单易行。基于无线局域网的室内定位系统是室内定位技术的主要候选。传统的基于WLAN的系统在使用前需要高昂的安装成本或长时间的现场校准。本文介绍了基于无线局域网的简易室内定位系统WiPS的实现。WiPS在终端之间使用RSSI,避免了现场校准。我们做了一个叫做旗帜游戏的实验,在这个实验中,人们举起和放下每只手握的掌上电脑。WiPS决定每只手是向上还是向下。实验结果表明,WiPS平均在4.8秒内检测到PDA的运动
{"title":"WiPS: Location and Motion Sensing Technique of IEEE 802.11 Devices","authors":"T. Kitasuka, K. Hisazumi, Tsuneo Nakanishi, Akira Fukuda","doi":"10.1109/ICITA.2005.312","DOIUrl":"https://doi.org/10.1109/ICITA.2005.312","url":null,"abstract":"For increasing needs of positioning technology, easy and simple indoor positioning system is desired. Wireless LAN based positioning system is a major candidate of indoor positioning technology. Conventional WLAN based systems require high installation cost or long site calibration before use. In this paper, we describe the implementation of simple WLAN based indoor positioning system WiPS. WiPS uses RSSI between terminals to avoid site calibration. We perform an experiment called a flag game, in which the person raises and lowers the PDA held in each hand. WiPS determines each hand is up or down. As results of the experiment, WiPS detects the movement of PDA in 4.8 sec. on an average","PeriodicalId":371528,"journal":{"name":"Third International Conference on Information Technology and Applications (ICITA'05)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133622451","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Self-Organizing Gaussian Fuzzy CMAC with Truth Value Restriction 具有真值限制的自组织高斯模糊CMAC
M. N. Nguyen, D. Shi, Hiok Chai Quek
The cerebellar model articulation controller (CMAC) is a popular auto-associate memory feed forward neural network model. Since it was proposed, many researchers have introduced fuzzy logic to CMAC and called FCMAC. In FCMAC, the input data is fuzzificated into fuzzy sets before fed into CMAC. This paper proposes self-organizing fuzzification (SOF) technique to form fuzzy sets in the fuzzification phase. The proposed SOF technique uses raw numerical values of a training data set with no preprocessing and obtains dynamic partition-base clusters without prior knowledge of number of clusters. It also provides CMAC a consistent fuzzy rule base. Truth value restriction inference scheme (TVR) is employed in the defuzzification phase. Our experiments are conducted on some benchmark datasets, and the results show that our method outperforms the existing model with higher ability to handle uncertainty in the inference process
小脑模型衔接控制器(CMAC)是一种流行的自关联记忆前馈神经网络模型。自提出以来,许多研究者将模糊逻辑引入到CMAC中,并将其称为FCMAC。在FCMAC中,输入数据被模糊化成模糊集后再被送入CMAC。本文提出了自组织模糊化技术,在模糊化阶段形成模糊集。该方法利用未经预处理的训练数据集的原始数值,在不知道聚类数量的情况下获得基于动态分区的聚类。它还为CMAC提供了一个一致的模糊规则库。在去模糊化阶段采用真值限制推理方案(TVR)。我们在一些基准数据集上进行了实验,结果表明我们的方法优于现有模型,在推理过程中具有更高的处理不确定性的能力
{"title":"Self-Organizing Gaussian Fuzzy CMAC with Truth Value Restriction","authors":"M. N. Nguyen, D. Shi, Hiok Chai Quek","doi":"10.1109/ICITA.2005.250","DOIUrl":"https://doi.org/10.1109/ICITA.2005.250","url":null,"abstract":"The cerebellar model articulation controller (CMAC) is a popular auto-associate memory feed forward neural network model. Since it was proposed, many researchers have introduced fuzzy logic to CMAC and called FCMAC. In FCMAC, the input data is fuzzificated into fuzzy sets before fed into CMAC. This paper proposes self-organizing fuzzification (SOF) technique to form fuzzy sets in the fuzzification phase. The proposed SOF technique uses raw numerical values of a training data set with no preprocessing and obtains dynamic partition-base clusters without prior knowledge of number of clusters. It also provides CMAC a consistent fuzzy rule base. Truth value restriction inference scheme (TVR) is employed in the defuzzification phase. Our experiments are conducted on some benchmark datasets, and the results show that our method outperforms the existing model with higher ability to handle uncertainty in the inference process","PeriodicalId":371528,"journal":{"name":"Third International Conference on Information Technology and Applications (ICITA'05)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132856348","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Performance of sinusoidally-distributed dithering for signed-error constant modulus algorithm 带符号误差常模算法的正弦分布抖动性能
J. Jusak, Z. M. Hussain
The complexity of the ubiquitous constant modulus algorithm (CMA) can be reduced by applying a sign operation to the CMA error function, while a sign operator generally can be seen as a 1-bit (two-level) mid-riser quantization. However, in order to preserve the information lost as a result of quantization processes, dithering is commonly used. In this paper, we evaluate the performance of dithered signed-error CMA utilizing a dithering signal that has sinusoidal probability density function. The algorithm has also been applied for equalization in wireless communication channel, which is distorted by multi-path propagation. Simulation results show that dithering using sinusoidal distribution outperforms the dithering using uniform distribution in terms of convergence speed.
泛在常模算法(CMA)的复杂性可以通过对CMA误差函数应用符号运算来降低,而符号运算符通常可以被视为1位(两级)中间提升量化。然而,为了保留由于量化过程而丢失的信息,通常使用抖动。在本文中,我们利用具有正弦概率密度函数的抖动信号来评估抖动带符号误差CMA的性能。该算法还应用于无线通信信道的多径失真均衡。仿真结果表明,正弦分布抖动在收敛速度上优于均匀分布抖动。
{"title":"Performance of sinusoidally-distributed dithering for signed-error constant modulus algorithm","authors":"J. Jusak, Z. M. Hussain","doi":"10.1109/ICITA.2005.214","DOIUrl":"https://doi.org/10.1109/ICITA.2005.214","url":null,"abstract":"The complexity of the ubiquitous constant modulus algorithm (CMA) can be reduced by applying a sign operation to the CMA error function, while a sign operator generally can be seen as a 1-bit (two-level) mid-riser quantization. However, in order to preserve the information lost as a result of quantization processes, dithering is commonly used. In this paper, we evaluate the performance of dithered signed-error CMA utilizing a dithering signal that has sinusoidal probability density function. The algorithm has also been applied for equalization in wireless communication channel, which is distorted by multi-path propagation. Simulation results show that dithering using sinusoidal distribution outperforms the dithering using uniform distribution in terms of convergence speed.","PeriodicalId":371528,"journal":{"name":"Third International Conference on Information Technology and Applications (ICITA'05)","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117296897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Using Real-Time Traffic Pattern Detection for Dynamic Cache Size Tuning in Information Retrieval 基于实时流量模式检测的信息检索动态缓存大小调整
Richard S. L. Wu, Allan K. Y. Wong, T. Dillon
The novel RTPD/MACSC model proposed in this paper tunes the cache size adoptively on the fly. It combines the extant MACSC (model for adaptive cache size control) and the novel RTPD (real-time traffic pattern detection) capability. Similar to its MACSC predecessor, the new RTPD/MACSC tuner maintains the given cache hit ratio consistently and persistently. It, however, differs from its predecessor because it adapts itself to compensate for the ill effects on the cache hit ratio by the Internet traffic, which embeds various patterns over time. The automatic adaptation (self-tuning) capability in response to traffic pattern changes detected by the RTPD is called self-reconfiguration in the RTPD/MACSC context
本文提出的RTPD/MACSC模型可以动态自适应地调整缓存大小。它结合了现有的MACSC(自适应缓存大小控制模型)和新的RTPD(实时流量模式检测)功能。与MACSC的前身类似,新的RTPD/MACSC调优器始终如一地保持给定的缓存命中率。但是,它与它的前身不同,因为它可以自我调整以补偿Internet流量对缓存命中率的不良影响,随着时间的推移,Internet流量会嵌入各种模式。在RTPD/MACSC上下文中,RTPD检测到的流量模式变化后的自动适应(自调优)能力称为自重构
{"title":"Using Real-Time Traffic Pattern Detection for Dynamic Cache Size Tuning in Information Retrieval","authors":"Richard S. L. Wu, Allan K. Y. Wong, T. Dillon","doi":"10.1109/ICITA.2005.301","DOIUrl":"https://doi.org/10.1109/ICITA.2005.301","url":null,"abstract":"The novel RTPD/MACSC model proposed in this paper tunes the cache size adoptively on the fly. It combines the extant MACSC (model for adaptive cache size control) and the novel RTPD (real-time traffic pattern detection) capability. Similar to its MACSC predecessor, the new RTPD/MACSC tuner maintains the given cache hit ratio consistently and persistently. It, however, differs from its predecessor because it adapts itself to compensate for the ill effects on the cache hit ratio by the Internet traffic, which embeds various patterns over time. The automatic adaptation (self-tuning) capability in response to traffic pattern changes detected by the RTPD is called self-reconfiguration in the RTPD/MACSC context","PeriodicalId":371528,"journal":{"name":"Third International Conference on Information Technology and Applications (ICITA'05)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116970170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Privacy Protection in Mobile Agent Based Service Domain 基于移动代理的服务域隐私保护
M. N. Huda, S. Yamada, E. Kamioka
In a mobile agent based environment personal data can be stolen, leaked or sent out to unauthorized persons by malicious mobile agents. In this paper we describe a new architecture and mechanism for user privacy protection in mobile agent based service domain. Agents meet at a protected and encapsulated agent computing environment from where they are not allowed to communicate with the outside world and also are not allowed to leave the platform. All the agents are killed at the host and the computation result is sent to respective parties by the trusted agent meeting and executing platform
在基于移动代理的环境中,个人数据可能被恶意移动代理窃取、泄露或发送给未经授权的人员。本文提出了一种新的基于移动代理的服务领域用户隐私保护体系结构和机制。代理在一个受保护和封装的代理计算环境中会面,在这个环境中,它们不允许与外部世界通信,也不允许离开平台。所有代理在主机上被终止,计算结果由可信代理会议和执行平台发送给各方
{"title":"Privacy Protection in Mobile Agent Based Service Domain","authors":"M. N. Huda, S. Yamada, E. Kamioka","doi":"10.1109/ICITA.2005.218","DOIUrl":"https://doi.org/10.1109/ICITA.2005.218","url":null,"abstract":"In a mobile agent based environment personal data can be stolen, leaked or sent out to unauthorized persons by malicious mobile agents. In this paper we describe a new architecture and mechanism for user privacy protection in mobile agent based service domain. Agents meet at a protected and encapsulated agent computing environment from where they are not allowed to communicate with the outside world and also are not allowed to leave the platform. All the agents are killed at the host and the computation result is sent to respective parties by the trusted agent meeting and executing platform","PeriodicalId":371528,"journal":{"name":"Third International Conference on Information Technology and Applications (ICITA'05)","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115124326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Querying on news stream by using random projection 基于随机投影的新闻流查询
H. Oh'uchi, T. Miura, I. Shioya
In this investigation we discuss powerful yet efficient retrieval mechanism for news stream. Difficulty comes from the fact how to manage incremental information while keeping efficiency. Recently random projection has been paid much attention on dynamic dimensionality reduction. We show this novel technique is really useful for querying news stream in terms of cost and accuracy. We examine some experimental results and excellent efficiency in computation and memory usage.
本文讨论了一种强大而高效的新闻流检索机制。难点在于如何在保持效率的同时管理增量信息。随机投影在动态降维方面受到了广泛的关注。我们证明了这种新技术在成本和准确性方面对查询新闻流非常有用。我们检验了一些实验结果,在计算和内存使用方面具有优异的效率。
{"title":"Querying on news stream by using random projection","authors":"H. Oh'uchi, T. Miura, I. Shioya","doi":"10.1109/ICITA.2005.229","DOIUrl":"https://doi.org/10.1109/ICITA.2005.229","url":null,"abstract":"In this investigation we discuss powerful yet efficient retrieval mechanism for news stream. Difficulty comes from the fact how to manage incremental information while keeping efficiency. Recently random projection has been paid much attention on dynamic dimensionality reduction. We show this novel technique is really useful for querying news stream in terms of cost and accuracy. We examine some experimental results and excellent efficiency in computation and memory usage.","PeriodicalId":371528,"journal":{"name":"Third International Conference on Information Technology and Applications (ICITA'05)","volume":"401 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114930602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Performance Tuning in the MacauMap Mobile Map Application 澳门地图移动地图应用程序的性能调优
R. Biuk-Aghai
With the increasing popularity of mobile computing platforms such as personal digital assistants (PDAs) and smart mobile phones, applications originally designed for higher-performance devices are moving onto these resource-constrained mobile devices. Given that these devices have severely restricted processing power, memory, and user interface capabilities, applications intended for these devices have to be carefully designed and implemented to achieve acceptable performance. In this paper we report on our experience with the development of the MacauMap application, a mobile digital map application that runs on PDAs and smart mobile phones. Memory requirements were kept low through a special data format. The main challenge of satisfactory map drawing speed was addressed through a variety of techniques developed for this application. We present the MacauMap application, introduce its design, and conclude with lessons learned from its development
随着个人数字助理(pda)和智能移动电话等移动计算平台的日益普及,最初为高性能设备设计的应用程序正在向这些资源受限的移动设备转移。由于这些设备的处理能力、内存和用户界面功能受到严重限制,因此必须仔细设计和实现用于这些设备的应用程序,以达到可接受的性能。在本文中,我们报告了我们开发澳门地图应用程序的经验,澳门地图应用程序是一个运行在pda和智能手机上的移动数字地图应用程序。通过一种特殊的数据格式,内存需求保持在较低水平。通过为该应用程序开发的各种技术,解决了令人满意的地图绘制速度的主要挑战。我们介绍了MacauMap应用程序,介绍了它的设计,并总结了从它的开发中获得的经验教训
{"title":"Performance Tuning in the MacauMap Mobile Map Application","authors":"R. Biuk-Aghai","doi":"10.1109/ICITA.2005.216","DOIUrl":"https://doi.org/10.1109/ICITA.2005.216","url":null,"abstract":"With the increasing popularity of mobile computing platforms such as personal digital assistants (PDAs) and smart mobile phones, applications originally designed for higher-performance devices are moving onto these resource-constrained mobile devices. Given that these devices have severely restricted processing power, memory, and user interface capabilities, applications intended for these devices have to be carefully designed and implemented to achieve acceptable performance. In this paper we report on our experience with the development of the MacauMap application, a mobile digital map application that runs on PDAs and smart mobile phones. Memory requirements were kept low through a special data format. The main challenge of satisfactory map drawing speed was addressed through a variety of techniques developed for this application. We present the MacauMap application, introduce its design, and conclude with lessons learned from its development","PeriodicalId":371528,"journal":{"name":"Third International Conference on Information Technology and Applications (ICITA'05)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115657165","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Autonomous concept formation in software agents for extending ontologies 扩展本体的软件代理中的自主概念形成
Elise Langham, S. Bullock
Software agent technology is currently based on fixed ontologies and languages, hand-crafted for a particular application. The advent of massively distributed systems however calls for not only a common language between all agents involved but also the ability to autonomously adapt and form concepts about novel experiences and events. We propose a method by which agents can autonomously form new concepts grounded in their own experience. This is an improvement on previous approaches because it can tackle a much wider range of conceptual types and provides an efficient, accurate representation which can be used in a rule based system or conceptual framework.
软件代理技术目前基于固定的本体和语言,为特定的应用程序手工制作。然而,大规模分布式系统的出现不仅需要所有相关代理之间的共同语言,还需要自主适应和形成有关新经验和事件的概念的能力。我们提出了一种方法,通过这种方法,智能体可以根据自己的经验自主地形成新概念。这是对以前方法的改进,因为它可以处理更广泛的概念类型,并提供有效、准确的表示,可用于基于规则的系统或概念框架。
{"title":"Autonomous concept formation in software agents for extending ontologies","authors":"Elise Langham, S. Bullock","doi":"10.1109/ICITA.2005.85","DOIUrl":"https://doi.org/10.1109/ICITA.2005.85","url":null,"abstract":"Software agent technology is currently based on fixed ontologies and languages, hand-crafted for a particular application. The advent of massively distributed systems however calls for not only a common language between all agents involved but also the ability to autonomously adapt and form concepts about novel experiences and events. We propose a method by which agents can autonomously form new concepts grounded in their own experience. This is an improvement on previous approaches because it can tackle a much wider range of conceptual types and provides an efficient, accurate representation which can be used in a rule based system or conceptual framework.","PeriodicalId":371528,"journal":{"name":"Third International Conference on Information Technology and Applications (ICITA'05)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115710939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SAFE Model Approach to Construction of Intelligent Security Systems 构建智能安防系统的SAFE模型方法
Z. Chaczko, S. Sinha
Dynamic environments such as that of any public and private infrastructure, workplace and even home consist of multiple entities that continuously interact with each other. Integrating an intelligent security system in such an environment necessitates the need for a soft systems approach that gives perspective to such interactions through identifying associated holons. The holonic analysis allows characterisation of ill-defined and often problematic situations that are resultant of the human activity system. This paper discusses some techniques that can be adopted to resolve scenarios that are plagued with uncertainty in reasoning and the continuously varying nature of interrelationship between native entities. The technical aspect of this system encompasses the mode of query processing and surveillance through a structured sensor network set up with the aid of distributed services and network protocols
动态环境,如任何公共和私人基础设施、工作场所甚至家庭,都是由多个实体组成的,这些实体不断地相互作用。在这样的环境中集成智能安全系统需要一种软系统方法,通过识别相关的全息来提供这种交互的视角。整体分析允许对人类活动系统导致的不明确和经常有问题的情况进行表征。本文讨论了一些可以用来解决推理不确定性和本地实体之间相互关系不断变化的问题的技术。该系统的技术方面包括通过借助于分布式服务和网络协议建立的结构化传感器网络进行查询处理和监控的模式
{"title":"SAFE Model Approach to Construction of Intelligent Security Systems","authors":"Z. Chaczko, S. Sinha","doi":"10.1109/ICITA.2005.243","DOIUrl":"https://doi.org/10.1109/ICITA.2005.243","url":null,"abstract":"Dynamic environments such as that of any public and private infrastructure, workplace and even home consist of multiple entities that continuously interact with each other. Integrating an intelligent security system in such an environment necessitates the need for a soft systems approach that gives perspective to such interactions through identifying associated holons. The holonic analysis allows characterisation of ill-defined and often problematic situations that are resultant of the human activity system. This paper discusses some techniques that can be adopted to resolve scenarios that are plagued with uncertainty in reasoning and the continuously varying nature of interrelationship between native entities. The technical aspect of this system encompasses the mode of query processing and surveillance through a structured sensor network set up with the aid of distributed services and network protocols","PeriodicalId":371528,"journal":{"name":"Third International Conference on Information Technology and Applications (ICITA'05)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123272382","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
Third International Conference on Information Technology and Applications (ICITA'05)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1