首页 > 最新文献

Journal of Applied Logic最新文献

英文 中文
Parameter selection based on fuzzy logic to improve UAV path-following algorithms 基于模糊逻辑的参数选择改进无人机路径跟踪算法
Q1 Mathematics Pub Date : 2017-11-01 DOI: 10.1016/j.jal.2016.11.025
Pablo Garcia-Aunon , Matilde Santos Peñas , Jesus Manuel de la Cruz García

In order to steer an Unmanned Aerial Vehicle (UAV) and make it follow a desired trajectory, a high level controller is needed. Depending on the control algorithm, one or more parameters have to be tuned, having their values high impact on the performance. In most of the works, these parameters are taken as constant. In this paper, we apply fuzzy logic to select the parameters of the control law and compare this approach with the tuning by constant parameters and with another adjusting method based on the kinematic analysis of the equations of the UAV. After many simulations of the quadrotor following randomly generated paths, we have proved that the fuzzy tuning law is not only a good and feasible solution, but also more general as it can be applied to any trajectory.

为了控制无人机并使其沿预定轨迹飞行,需要一个高级控制器。根据控制算法,必须调整一个或多个参数,这些参数的值对性能有很大影响。在大多数工作中,这些参数都是常数。本文将模糊逻辑应用于控制律参数的选择,并与恒参数整定方法和另一种基于无人机运动方程分析的整定方法进行了比较。通过对四旋翼飞行器随机路径的仿真,证明了模糊整定律不仅是一种很好的可行解,而且具有通用性,可以适用于任何轨迹。
{"title":"Parameter selection based on fuzzy logic to improve UAV path-following algorithms","authors":"Pablo Garcia-Aunon ,&nbsp;Matilde Santos Peñas ,&nbsp;Jesus Manuel de la Cruz García","doi":"10.1016/j.jal.2016.11.025","DOIUrl":"10.1016/j.jal.2016.11.025","url":null,"abstract":"<div><p>In order to steer an Unmanned Aerial Vehicle (UAV) and make it follow a desired trajectory, a high level controller is needed. Depending on the control algorithm, one or more parameters have to be tuned, having their values high impact on the performance. In most of the works, these parameters are taken as constant. In this paper, we apply fuzzy logic to select the parameters of the control law and compare this approach with the tuning by constant parameters and with another adjusting method based on the kinematic analysis of the equations of the UAV. After many simulations of the quadrotor following randomly generated paths, we have proved that the fuzzy tuning law is not only a good and feasible solution, but also more general as it can be applied to any trajectory.</p></div>","PeriodicalId":54881,"journal":{"name":"Journal of Applied Logic","volume":"24 ","pages":"Pages 62-75"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.jal.2016.11.025","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122093873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
A brief review of the ear recognition process using deep neural networks 简要回顾使用深度神经网络的耳朵识别过程
Q1 Mathematics Pub Date : 2017-11-01 DOI: 10.1016/j.jal.2016.11.014
Pedro Luis Galdámez, William Raveane, Angélica González Arrieta

The process of precisely recognize people by ears has been getting major attention in recent years. It represents an important step in the biometric research, especially as a complement to face recognition systems which have difficult in real conditions. This is due to the great variation in shapes, variable lighting conditions, and the changing profile shape which is a planar representation of a complex object. An ear recognition system involving a convolutional neural networks (CNN) is proposed to identify a person given an input image. The proposed method matches the performance of other traditional approaches when analyzed against clean photographs. However, the F1 metric of the results shows improvements in specificity of the recognition. We also present a technique for improving the speed of a CNN applied to large input images through the optimization of the sliding window approach.

近年来,通过耳朵精确识别人的过程受到了人们的广泛关注。它代表了生物识别研究的重要一步,特别是作为人脸识别系统在现实条件下难以实现的补充。这是由于形状的巨大变化,可变的照明条件,以及变化的轮廓形状,这是一个复杂物体的平面表示。提出了一种基于卷积神经网络(CNN)的人耳识别系统,用于识别给定图像的人。当对干净的图像进行分析时,所提出的方法的性能与其他传统方法相匹配。然而,结果的F1度量显示识别的特异性有所提高。我们还提出了一种技术,通过优化滑动窗口方法来提高应用于大型输入图像的CNN的速度。
{"title":"A brief review of the ear recognition process using deep neural networks","authors":"Pedro Luis Galdámez,&nbsp;William Raveane,&nbsp;Angélica González Arrieta","doi":"10.1016/j.jal.2016.11.014","DOIUrl":"10.1016/j.jal.2016.11.014","url":null,"abstract":"<div><p>The process of precisely recognize people by ears has been getting major attention in recent years. It represents an important step in the biometric research, especially as a complement to face recognition systems which have difficult in real conditions. This is due to the great variation in shapes, variable lighting conditions, and the changing profile shape which is a planar representation of a complex object. An ear recognition system involving a convolutional neural networks (CNN) is proposed to identify a person given an input image. The proposed method matches the performance of other traditional approaches when analyzed against clean photographs. However, the F1 metric of the results shows improvements in specificity of the recognition. We also present a technique for improving the speed of a CNN applied to large input images through the optimization of the sliding window approach.</p></div>","PeriodicalId":54881,"journal":{"name":"Journal of Applied Logic","volume":"24 ","pages":"Pages 62-70"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.jal.2016.11.014","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122905965","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 51
Enhancing smart-home environments using Magentix2 使用Magentix2增强智能家居环境
Q1 Mathematics Pub Date : 2017-11-01 DOI: 10.1016/j.jal.2016.11.022
S. Valero, E. del Val, J. Alemany, V. Botti

Multi-agent system paradigm has been envisioned as an appropriate solution for challenges in the area of smart-environments. Specifically, MAS add new capabilities such as adaption, reorganization, learning, coordination, etc. These features allow to deal with open issues in the context of smart-homes such as multi-occupancy, activity tracking or profiling activities and behaviors from multiple residents. In this paper, we present Magentix2 as a suitable MAS platform for the development of dynamic smart environments. Specifically, the use of Magentix2 (http://gti-ia.upv.es/sma/tools/magentix2/index.php) facilitates the management of the multiple occupancy in smart living spaces. Normative virtual organizations provide the possibility of defining a set of norms and organizational roles that facilitate the regulation and control of the actions that can be carried out by internal and external agents depending on their profile. Moreover, Magentix2 provides a tracing service to keep track of activities carried out in the system. We illustrate the applicability and benefits of Magentix2 in a set of scenarios in the context of smart-homes.

多智能体系统范式已被设想为解决智能环境领域挑战的合适解决方案。具体来说,MAS增加了适应、重组、学习、协调等新能力。这些功能允许处理智能家居环境中的开放性问题,例如多租户,活动跟踪或分析来自多个居民的活动和行为。在本文中,我们提出了Magentix2作为一个适合开发动态智能环境的MAS平台。具体来说,Magentix2 (http://gti-ia.upv.es/sma/tools/magentix2/index.php)的使用有助于智能生活空间中多人入住的管理。规范的虚拟组织提供了定义一组规范和组织角色的可能性,这些规范和组织角色促进了内部和外部代理根据其配置文件执行的操作的调节和控制。此外,Magentix2提供了跟踪服务来跟踪系统中执行的活动。我们在智能家居背景下的一系列场景中说明了Magentix2的适用性和优点。
{"title":"Enhancing smart-home environments using Magentix2","authors":"S. Valero,&nbsp;E. del Val,&nbsp;J. Alemany,&nbsp;V. Botti","doi":"10.1016/j.jal.2016.11.022","DOIUrl":"10.1016/j.jal.2016.11.022","url":null,"abstract":"<div><p>Multi-agent system paradigm has been envisioned as an appropriate solution for challenges in the area of smart-environments. Specifically, MAS add new capabilities such as adaption, reorganization, learning, coordination, etc. These features allow to deal with open issues in the context of smart-homes such as multi-occupancy, activity tracking or profiling activities and behaviors from multiple residents. In this paper, we present Magentix2 as a suitable MAS platform for the development of dynamic smart environments. Specifically, the use of Magentix2 (<span>http://gti-ia.upv.es/sma/tools/magentix2/index.php</span><svg><path></path></svg>) facilitates the management of the multiple occupancy in smart living spaces. Normative virtual organizations provide the possibility of defining a set of norms and organizational roles that facilitate the regulation and control of the actions that can be carried out by internal and external agents depending on their profile. Moreover, Magentix2 provides a tracing service to keep track of activities carried out in the system. We illustrate the applicability and benefits of Magentix2 in a set of scenarios in the context of smart-homes.</p></div>","PeriodicalId":54881,"journal":{"name":"Journal of Applied Logic","volume":"24 ","pages":"Pages 32-44"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.jal.2016.11.022","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130796989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Fuzzy system for intelligent word recognition using a regular grammar 使用规则语法的模糊智能单词识别系统
Q1 Mathematics Pub Date : 2017-11-01 DOI: 10.1016/j.jal.2016.11.023
D. Álvarez, R.A. Fernández, L. Sánchez

We present a new approach for off-line intelligent word recognition based on a fuzzy classification model. First, we segment a word into its single characters, and label each pixel as vertical or as horizontal so that we can group all the pixels into vertical or horizontal strokes. Then, we use dynamic zoning to obtain the locations of the connections between the vertical strokes – which are the main strokes – and the horizontal ones. These features let us construct the representative string of a character using a regular grammar and, subsequently, use a Deterministic Finite Automaton to check them out. To accomplish the recognition, we use a Fuzzy Lattice Reasoning classifier. The combination of the representative strings and the fuzzy classifier provides promising performance rates.

提出了一种基于模糊分类模型的离线智能词识别方法。首先,我们将一个单词分割成单个字符,并将每个像素标记为垂直或水平,这样我们就可以将所有像素分组为垂直或水平笔画。然后,我们使用动态分区来获得垂直笔划(主要笔划)和水平笔划之间的连接位置。这些特性使我们能够使用常规语法构造具有代表性的字符字符串,然后使用确定性有限自动机检查它们。为了完成识别,我们使用模糊格推理分类器。代表性字符串和模糊分类器的组合提供了很好的性能。
{"title":"Fuzzy system for intelligent word recognition using a regular grammar","authors":"D. Álvarez,&nbsp;R.A. Fernández,&nbsp;L. Sánchez","doi":"10.1016/j.jal.2016.11.023","DOIUrl":"10.1016/j.jal.2016.11.023","url":null,"abstract":"<div><p>We present a new approach for off-line intelligent word recognition based on a fuzzy classification model. First, we segment a word into its single characters, and label each pixel as vertical or as horizontal so that we can group all the pixels into vertical or horizontal strokes. Then, we use dynamic zoning to obtain the locations of the connections between the vertical strokes – which are the main strokes – and the horizontal ones. These features let us construct the representative string of a character using a regular grammar and, subsequently, use a Deterministic Finite Automaton to check them out. To accomplish the recognition, we use a Fuzzy Lattice Reasoning classifier. The combination of the representative strings and the fuzzy classifier provides promising performance rates.</p></div>","PeriodicalId":54881,"journal":{"name":"Journal of Applied Logic","volume":"24 ","pages":"Pages 45-53"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.jal.2016.11.023","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120919291","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Analysis of meteorological conditions in Spain by means of clustering techniques 用聚类技术分析西班牙的气象条件
Q1 Mathematics Pub Date : 2017-11-01 DOI: 10.1016/j.jal.2016.11.026
Ángel Arroyo , Álvaro Herrero , Verónica Tricio , Emilio Corchado

A comprehensive analysis of clustering techniques is presented in this paper through their application to data on meteorological conditions. Six partitional and hierarchical clustering techniques (k-means, k-medoids, SOM k-means, Agglomerative Hierarchical Clustering, and Clustering based on Gaussian Mixture Models) with different distance criteria, together with some clustering evaluation measures (Calinski–Harabasz, Davies–Bouldin, Gap and Silhouette criterion clustering evaluation object), present various analyses of the main climatic zones in Spain. Real-life data sets, recorded by AEMET (Spanish Meteorological Agency) at four of its weather stations, are analyzed in order to characterize the actual weather conditions at each location. The clustering techniques process the data on some of the main daily meteorological variables collected at these stations over six years between 2004 and 2010.

本文通过聚类技术在气象条件数据上的应用,对聚类技术进行了全面的分析。基于不同距离标准的k-means、k-medoids、SOM k-means、Agglomerative hierarchical clustering和基于高斯混合模型的聚类方法,以及Calinski-Harabasz、Davies-Bouldin、Gap和Silhouette标准聚类评价对象等聚类评价指标,对西班牙主要气候带进行了各种分析。AEMET(西班牙气象局)在其四个气象站记录的真实数据集进行了分析,以便描述每个地点的实际天气状况。聚类技术处理了2004年至2010年6年间这些站点收集的一些主要每日气象变量的数据。
{"title":"Analysis of meteorological conditions in Spain by means of clustering techniques","authors":"Ángel Arroyo ,&nbsp;Álvaro Herrero ,&nbsp;Verónica Tricio ,&nbsp;Emilio Corchado","doi":"10.1016/j.jal.2016.11.026","DOIUrl":"10.1016/j.jal.2016.11.026","url":null,"abstract":"<div><p>A comprehensive analysis of clustering techniques is presented in this paper through their application to data on meteorological conditions. Six partitional and hierarchical clustering techniques (<em>k</em>-means, <em>k</em>-medoids, SOM <em>k</em>-means, Agglomerative Hierarchical Clustering, and Clustering based on Gaussian Mixture Models) with different distance criteria, together with some clustering evaluation measures (Calinski–Harabasz, Davies–Bouldin, Gap and Silhouette criterion clustering evaluation object), present various analyses of the main climatic zones in Spain. Real-life data sets, recorded by AEMET (Spanish Meteorological Agency) at four of its weather stations, are analyzed in order to characterize the actual weather conditions at each location. The clustering techniques process the data on some of the main daily meteorological variables collected at these stations over six years between 2004 and 2010.</p></div>","PeriodicalId":54881,"journal":{"name":"Journal of Applied Logic","volume":"24 ","pages":"Pages 76-89"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.jal.2016.11.026","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132319575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Sensorless control of variable speed induction motor drive using RBF neural network 基于RBF神经网络的变速感应电机无传感器控制
Q1 Mathematics Pub Date : 2017-11-01 DOI: 10.1016/j.jal.2016.11.017
Pavel Brandstetter, Martin Kuchar

High power of modern digital signal processors and their decreasing prices enable practical implementation of different speed estimators which are used in the sensorless control of AC drives. The paper describes application possibilities of artificial neural networks for the sensorless speed control of the A.C. induction motor drive. In the sensorless control structure of the A.C. drive, there is implemented the speed estimator which uses two different artificial neural networks for speed estimation. The first speed estimator uses a multilayer feedforward artificial neural network. Its properties are compared with the speed estimator using a radial basis function neural network. The sensorless A.C. drive was simulated in program Matlab-Simulink. The main goal of many simulations was finding suitable structure of the artificial neural network with required number of neuron units which will ensure good control characteristics and simultaneously will enable a practical implementation of the artificial neural network in the digital signal processor control system.

现代数字信号处理器的高功率及其不断下降的价格使用于交流驱动器无传感器控制的不同速度估计器的实际实施成为可能。介绍了人工神经网络在交流感应电动机无传感器调速中的应用可能性。在交流传动的无传感器控制结构中,实现了用两种不同的人工神经网络进行速度估计的速度估计器。第一个速度估计器采用多层前馈人工神经网络。将其性能与径向基函数神经网络速度估计器进行了比较。在Matlab-Simulink中对无传感器交流传动进行了仿真。许多仿真的主要目标是找到具有所需神经元单元数量的合适的人工神经网络结构,以保证良好的控制特性,同时使人工神经网络在数字信号处理器控制系统中的实际实现成为可能。
{"title":"Sensorless control of variable speed induction motor drive using RBF neural network","authors":"Pavel Brandstetter,&nbsp;Martin Kuchar","doi":"10.1016/j.jal.2016.11.017","DOIUrl":"10.1016/j.jal.2016.11.017","url":null,"abstract":"<div><p>High power of modern digital signal processors and their decreasing prices enable practical implementation of different speed estimators which are used in the sensorless control of AC drives. The paper describes application possibilities of artificial neural networks for the sensorless speed control of the A.C. induction motor drive. In the sensorless control structure of the A.C. drive, there is implemented the speed estimator which uses two different artificial neural networks for speed estimation. The first speed estimator uses a multilayer feedforward artificial neural network. Its properties are compared with the speed estimator using a radial basis function neural network. The sensorless A.C. drive was simulated in program Matlab-Simulink. The main goal of many simulations was finding suitable structure of the artificial neural network with required number of neuron units which will ensure good control characteristics and simultaneously will enable a practical implementation of the artificial neural network in the digital signal processor control system.</p></div>","PeriodicalId":54881,"journal":{"name":"Journal of Applied Logic","volume":"24 ","pages":"Pages 97-108"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.jal.2016.11.017","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134353929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Comparison of classification techniques applied for network intrusion detection and classification 分类技术在网络入侵检测和分类中的应用比较
Q1 Mathematics Pub Date : 2017-11-01 DOI: 10.1016/j.jal.2016.11.018
Amira Sayed A. Aziz , Sanaa EL-Ola Hanafi , Aboul Ella Hassanien

In a previous research, a multi-agent artificial immune system for network intrusion detection and classification was proposed and tested, where a multi-layer detection and classification process was executed on each agent, for each host in the network. In this paper, we show the experiments that were held to chose the appropriate classifiers by testing different classifiers and comparing them to increase the detection accuracy and obtain more information on the detected anomalies. It will be shown that no single classifier should be used for all types of attacks, due to different classification rates obtained. This is due to attacks representations in the train set and dependency between features used to detect them. It will also be shown that a basic and simple classifier such as Naive Bayes has better classification results in the case of low-represented attacks, and the basic decision trees such as Naive-Bayes Tree and Best-First Tree give very good results compared to well-known J48 (Weka implementation of C4.5) and Random Forest decision trees. Based on these experiments and their results, Naive Bayes and Best-First tree classifiers were selected to classify the anomaly-detected traffic. It was shown that in the detection phase, 90% of anomalies were detected, and in the classification phase, 88% of false positives were successfully labeled as normal traffic connections, and 79% of DoS and Probe attacks were labeled correctly, mostly by NB, NBTree, and BFTree classifiers.

在前人的研究中,提出并测试了一种用于网络入侵检测和分类的多智能体人工免疫系统,该系统对网络中的每台主机上的每个智能体执行多层检测和分类过程。在本文中,我们通过测试不同的分类器并对它们进行比较来选择合适的分类器,以提高检测精度并获得更多检测到的异常信息。由于得到的分类率不同,不应该对所有类型的攻击使用单一分类器。这是由于训练集中的攻击表示和用于检测它们的特征之间的依赖关系。它还将表明,朴素贝叶斯等基本和简单的分类器在低代表攻击的情况下具有更好的分类结果,并且与众所周知的J48 (C4.5的Weka实现)和随机森林决策树相比,朴素贝叶斯树和最佳优先树等基本决策树给出了非常好的结果。基于这些实验和结果,选择朴素贝叶斯和最佳优先树分类器对检测到的异常流量进行分类。结果表明,在检测阶段,90%的异常被检测出来;在分类阶段,88%的假阳性被成功标记为正常流量连接,79%的DoS和Probe攻击被正确标记,主要是通过NB、NBTree和BFTree分类器。
{"title":"Comparison of classification techniques applied for network intrusion detection and classification","authors":"Amira Sayed A. Aziz ,&nbsp;Sanaa EL-Ola Hanafi ,&nbsp;Aboul Ella Hassanien","doi":"10.1016/j.jal.2016.11.018","DOIUrl":"10.1016/j.jal.2016.11.018","url":null,"abstract":"<div><p>In a previous research, a multi-agent artificial immune system for network intrusion detection and classification was proposed and tested, where a multi-layer detection and classification process was executed on each agent, for each host in the network. In this paper, we show the experiments that were held to chose the appropriate classifiers by testing different classifiers and comparing them to increase the detection accuracy and obtain more information on the detected anomalies. It will be shown that no single classifier should be used for all types of attacks, due to different classification rates obtained. This is due to attacks representations in the train set and dependency between features used to detect them. It will also be shown that a basic and simple classifier such as Naive Bayes has better classification results in the case of low-represented attacks, and the basic decision trees such as Naive-Bayes Tree and Best-First Tree give very good results compared to well-known J48 (Weka implementation of C4.5) and Random Forest decision trees. Based on these experiments and their results, Naive Bayes and Best-First tree classifiers were selected to classify the anomaly-detected traffic. It was shown that in the detection phase, 90% of anomalies were detected, and in the classification phase, 88% of false positives were successfully labeled as normal traffic connections, and 79% of DoS and Probe attacks were labeled correctly, mostly by NB, NBTree, and BFTree classifiers.</p></div>","PeriodicalId":54881,"journal":{"name":"Journal of Applied Logic","volume":"24 ","pages":"Pages 109-118"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.jal.2016.11.018","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130202644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 63
Special issue SOCO 2015 2015年SOCO特刊
Q1 Mathematics Pub Date : 2017-11-01 DOI: 10.1016/j.jal.2017.09.001
Álvaro Herrero, Bruno Baruque, Javier Sedano, Héctor Quintián, Emilio Corchado
{"title":"Special issue SOCO 2015","authors":"Álvaro Herrero,&nbsp;Bruno Baruque,&nbsp;Javier Sedano,&nbsp;Héctor Quintián,&nbsp;Emilio Corchado","doi":"10.1016/j.jal.2017.09.001","DOIUrl":"https://doi.org/10.1016/j.jal.2017.09.001","url":null,"abstract":"","PeriodicalId":54881,"journal":{"name":"Journal of Applied Logic","volume":"24 ","pages":"Pages 1-2"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.jal.2017.09.001","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138232010","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Summarizing information by means of causal sentences through causal graphs 通过因果图,用因果句来总结信息
Q1 Mathematics Pub Date : 2017-11-01 DOI: 10.1016/j.jal.2016.11.020
C. Puente , A. Sobrino , J.A. Olivas , E. Garrido

The objective of this work is to propose a complete system able to extract causal sentences from a set of text documents, select the causal sentences contained, create a causal graph in base to a given concept using as source these causal sentences, and finally produce a text summary gathering all the information connected by means of this causal graph. This procedure has three main steps. The first one is focused in the extraction, filtering and selection of those causal sentences that could have relevant information for the system. The second one is focused on the composition of a suitable causal graph, removing redundant information and solving ambiguity problems. The third step is a procedure able to read the causal graph to compose a suitable answer to a proposed causal question by summarizing the information contained in it.

本工作的目标是提出一个完整的系统,能够从一组文本文档中提取因果句,选择包含的因果句,以这些因果句为源,在基础上创建给定概念的因果图,最后生成一个文本摘要,收集通过该因果图连接的所有信息。这个过程有三个主要步骤。第一个重点是提取、过滤和选择那些可能具有系统相关信息的因果句。二是构建合适的因果图,去除冗余信息,解决歧义问题。第三步是一个程序,能够阅读因果图,通过总结其中包含的信息,为提出的因果问题组成一个合适的答案。
{"title":"Summarizing information by means of causal sentences through causal graphs","authors":"C. Puente ,&nbsp;A. Sobrino ,&nbsp;J.A. Olivas ,&nbsp;E. Garrido","doi":"10.1016/j.jal.2016.11.020","DOIUrl":"10.1016/j.jal.2016.11.020","url":null,"abstract":"<div><p>The objective of this work is to propose a complete system able to extract causal sentences from a set of text documents, select the causal sentences contained, create a causal graph in base to a given concept using as source these causal sentences, and finally produce a text summary gathering all the information connected by means of this causal graph. This procedure has three main steps. The first one is focused in the extraction, filtering and selection of those causal sentences that could have relevant information for the system. The second one is focused on the composition of a suitable causal graph, removing redundant information and solving ambiguity problems. The third step is a procedure able to read the causal graph to compose a suitable answer to a proposed causal question by summarizing the information contained in it.</p></div>","PeriodicalId":54881,"journal":{"name":"Journal of Applied Logic","volume":"24 ","pages":"Pages 3-14"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.jal.2016.11.020","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130675056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Electronic institutions and neural computing providing law-compliance privacy for trusting agents 电子机构和神经计算为信任代理提供守法隐私
Q1 Mathematics Pub Date : 2017-11-01 DOI: 10.1016/j.jal.2016.11.019
Mar Lopez , Javier Carbo , Jose M. Molina , Juanita Pedraza

In this paper we present an integral solution for law-compliance privacy-protection into trust models for agent systems. Several privacy issues are concerned into trust relationships. Specifically, we define which privacy rights must legally be guaranteed in trusting communities of agents. From them, we describe additional interaction protocols that are required to implement such guarantees. Next, we apply additional message exchanges into a specific application domain (the Agent Trust and Reputation testbed) using JADE agent platform. The decisions about how to apply these control mechanisms (about when to launch the corresponding JADE protocol) has been efficiently carried out by neural computing. It uses past behavior of agents to decide (classify) which agents are worthy to share privacy with, considering which number of past interactions we should take into account. Furthermore, we also enumerate the corresponding privacy violations that would have taken place if these control mechanisms (in form of interaction protocols) were ignored or misused. From the possible existence of privacy violations, a regulatory structure is required to address (prevent and fix) the corresponding harmful consequences. We use Islander (an electronic institution editor) to formally define the scenes where privacy violation may be produced, attached to the ways to repair it: the defeasible actions that could voluntarily reduce or eliminate the privacy damage, and the obligations that the electronic institution would impose as penalties.

本文提出了一种将合规性隐私保护集成到代理系统信任模型中的整体解决方案。信任关系涉及到几个隐私问题。具体来说,我们定义了哪些隐私权必须在可信的代理社区中得到法律保障。在此基础上,我们描述了实现此类保证所需的其他交互协议。接下来,我们使用JADE代理平台将额外的消息交换应用到特定的应用程序域(代理信任和信誉测试平台)。关于如何应用这些控制机制(关于何时启动相应的JADE协议)的决策已通过神经计算有效地执行。它使用代理过去的行为来决定(分类)哪些代理值得与之共享隐私,考虑到我们应该考虑多少过去的交互。此外,我们还列举了如果这些控制机制(以交互协议的形式)被忽视或滥用,将会发生的相应的隐私侵犯。从可能存在的侵犯隐私的情况来看,需要一个监管结构来解决(防止和修复)相应的有害后果。我们使用Islander(电子机构编辑器)正式定义了可能产生隐私侵犯的场景,并附带了修复方法:可以自愿减少或消除隐私损害的可行行动,以及电子机构将作为惩罚施加的义务。
{"title":"Electronic institutions and neural computing providing law-compliance privacy for trusting agents","authors":"Mar Lopez ,&nbsp;Javier Carbo ,&nbsp;Jose M. Molina ,&nbsp;Juanita Pedraza","doi":"10.1016/j.jal.2016.11.019","DOIUrl":"10.1016/j.jal.2016.11.019","url":null,"abstract":"<div><p>In this paper we present an integral solution for law-compliance privacy-protection into trust models for agent systems. Several privacy issues are concerned into trust relationships. Specifically, we define which privacy rights must legally be guaranteed in trusting communities of agents. From them, we describe additional interaction protocols that are required to implement such guarantees. Next, we apply additional message exchanges into a specific application domain (the Agent Trust and Reputation testbed) using JADE agent platform. The decisions about how to apply these control mechanisms (about when to launch the corresponding JADE protocol) has been efficiently carried out by neural computing. It uses past behavior of agents to decide (classify) which agents are worthy to share privacy with, considering which number of past interactions we should take into account. Furthermore, we also enumerate the corresponding privacy violations that would have taken place if these control mechanisms (in form of interaction protocols) were ignored or misused. From the possible existence of privacy violations, a regulatory structure is required to address (prevent and fix) the corresponding harmful consequences. We use Islander (an electronic institution editor) to formally define the scenes where privacy violation may be produced, attached to the ways to repair it: the defeasible actions that could voluntarily reduce or eliminate the privacy damage, and the obligations that the electronic institution would impose as penalties.</p></div>","PeriodicalId":54881,"journal":{"name":"Journal of Applied Logic","volume":"24 ","pages":"Pages 119-131"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.jal.2016.11.019","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115406244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Journal of Applied Logic
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1