Shopping centers present a rich and heterogeneous environment, where IT systems can be implemented in order to support the needs of its actors. However, due to the environment complexity, several feasibility issues em...
详细信息
ISBN:
(纸本)9783642196430
Shopping centers present a rich and heterogeneous environment, where IT systems can be implemented in order to support the needs of its actors. However, due to the environment complexity, several feasibility issues emerge when designing both the logical and physical architecture of such systems. Additionally, the system must be able to cope with the individual needs of each actor, and provide services that are easily adopted by them, taking into account several sociological and economical aspects. In this sense, we present an overview of current support systems for shopping center environments. From this overview, a high-level model of the domain (involving actors and services) is described along with challenges and possible features in the context of current Semantic Web, mobile device and sensor technologies.
In this paper we present a securing patient medical images and authentication system to increase the security, confidentiality and integrity of medical images transmitted through the Internet. A public key encryption ...
详细信息
ISBN:
(纸本)9783642196430
In this paper we present a securing patient medical images and authentication system to increase the security, confidentiality and integrity of medical images transmitted through the Internet. A public key encryption technique was used to encrypt the patient capturing fingerprint and then embed it into the patient medical image. The fingerprint has been encrypted using the Rivest-Shamir-Adelman (RSA) public-key encryption algorithm. Then, by embedding the encrypted patient's fingerprint using a technique for digital watermarking in the Discrete Cosine Transform (DCT) domain makes the medical image be robust to several common attacks. The experimental results on different medical imaging modalities demonstrate the efficiency and transparency of the watermarking system.
In this paper a Generalized Least Square estimator for the simultaneous estimation of O-D matrix and equilibrium traffic assignment model parameters is presented. The problem is formulated as fixed-point model (equili...
详细信息
ISBN:
(纸本)9783642205040
In this paper a Generalized Least Square estimator for the simultaneous estimation of O-D matrix and equilibrium traffic assignment model parameters is presented. The problem is formulated as fixed-point model (equilibrium programming) assuming the congested network case. In the optimization step the variability of both O-D demand vector and the matrix of link choice probabilities is considered. We assume as input information a set of observable network data, such as link traffic counts and travel time, as well starting estimates of both O-D matrix and models parameters. Along the paper, the theoretical aspects of the proposed estimator, the solution algorithm as well as the results of numerical applications are discussed.
Grammar Induction (or Grammar Inference or Language Learning) is the process of learning of a grammar from training data of the positive and negative strings of the language. Genetic algorithms are amongst the techniq...
详细信息
ISBN:
(纸本)9783642205040
Grammar Induction (or Grammar Inference or Language Learning) is the process of learning of a grammar from training data of the positive and negative strings of the language. Genetic algorithms are amongst the techniques which provide successful result for the grammar induction. The paper is an extended approach to the earlier work by the authors regarding using stochastic mutation scheme based on Adaptive Genetic Algorithm for the induction of the grammar. Optimization by Genetic Algorithm often comes with premature convergence. The paper suggests two approaches, Elite Mating Pool and generating the population with the Dynamic Application of Reproduction Operator, for handling local convergence by considering a set of eleven different languages and their comparison. The algorithm produces successive generations of individuals, computing their 'fitness value' at each step and selecting the best of them when the termination condition is reached. The paper deals with the issues in implementation of the algorithm,chromosome representation and evaluation, selection and replacement strategy, and the genetic operators for crossover and mutation. The model has been implemented, and the results obtained for the set of eleven languages are shown in the paper.
The knowledge of the functions of protein structures is essential for development of new drugs, better crops and synthetic biochemical. There are numerous experimental methods for determining the protein functions, bu...
详细信息
ISBN:
(纸本)9783642286636;9783642286643
The knowledge of the functions of protein structures is essential for development of new drugs, better crops and synthetic biochemical. There are numerous experimental methods for determining the protein functions, but because of their complexity the number of protein molecules with undetermined functions is rapidly growing. Thus, there is an evident need for development of computer methods for determining the functions of the protein structures. In this study, we introduce the fuzzy theory for protein active sites detection. We propose a novel fuzzy decision tree (FDT) based method for predicting protein active sites that later could be used for determining the functions of the protein molecules. First, we extract several characteristics of the amino acids. Then, we induce FDTs that would be used to predict the protein active sites. We provide experimental results of the evaluation of the prediction power of the proposed method. Also, our method is compared with other machine learning techniques that could be used for this purpose.
Proceedings oftheSixthInternational Conference on intelligent System and Knowledge Engineering presents selected papers from the conference ISKE 2011, held December 15-17 in Shanghai, China. This proceedings doesnt on...
ISBN:
(数字)9783642256615
ISBN:
(纸本)9783642256608
Proceedings oftheSixthInternational Conference on intelligent System and Knowledge Engineering presents selected papers from the conference ISKE 2011, held December 15-17 in Shanghai, China. This proceedings doesnt only examine original research and approaches in the broad areas of intelligent systems and knowledge engineering, but also present new methodologies and practices in intelligentcomputing paradigms. The book introduces the current scientific and technical advances in the fields of artificial intelligence, machine learning, pattern recognition, data mining, information retrieval, knowledge-based systems, knowledge representation and reasoning, multi-agent systems, natural-language processing, etc. Furthermore, new computing methodologies are presented, including cloud computing, service computing and pervasive computing with traditional intelligent methods. The proceedings will be beneficial for both researchers and practitioners who want to utilize intelligent methods in their specific research fields. Dr. Yinglin Wang is a professor at the Department of Computer Science and Engineering, Shanghai Jiao Tong University, China; Dr. Tianrui Li is a professor at the School of Information Science and Technology, Southwest Jiaotong University, China.
The assignment problem has a wide variety of applications and in particular, it can be applied to any two-sided market. In this paper, we propose a multi-agent framework to distributively solve this kind of assignment...
详细信息
ISBN:
(纸本)9783642198748
The assignment problem has a wide variety of applications and in particular, it can be applied to any two-sided market. In this paper, we propose a multi-agent framework to distributively solve this kind of assignment problems, by providing agents which negotiate with respect to their preferences. We present here a realisation of the minimal concession strategy. Our realisation of the minimal concession strategy has useful properties: it preserves the privacy and improves the optimality of the solution and the equity amongst the partners.
When an RNA primary sequence is folded back on itself, forming complementary base-pairs, a form called RNA secondary structure is created. The first solution for the RNA secondary structure prediction problem was the ...
详细信息
ISBN:
(纸本)9783642286636;9783642286643
When an RNA primary sequence is folded back on itself, forming complementary base-pairs, a form called RNA secondary structure is created. The first solution for the RNA secondary structure prediction problem was the Nussinov dynamic programming algorithm developed in 1978 which is still an irreplaceable base that all other approaches rely on. In this work, the Nussinov algorithm is analyzed but from the CUDA GPU programming perspective. The algorithm is radically redesigned in order to utilize the highly parallel NUMA architecture of the GPU. The implementation of the Nussinov algorithm on CUDA architecture for NVidia GeForce 8500 GT graphic card results with substantial acceleration compared with the sequential executed algorithm.
With the abundance of information available today, we need efficient tools to explore it. Search engines attempt to retrieve the most relevant documents for a given query, but still require users to look for the exact...
详细信息
ISBN:
(纸本)9783642231629
With the abundance of information available today, we need efficient tools to explore it. Search engines attempt to retrieve the most relevant documents for a given query, but still require users to look for the exact answer. Question Answering (Q&A) systems go one step further by trying to answer users' questions posed in natural language. In this paper we describe a semantic approach to Q&A retrieval for Bulgarian language. We investigate how the usage of named entity recognition, question answer type detection and dependency parsing can improve the retrieval of answer-bearing structures compared to the bag-of-words model. Moreover, we evaluate nine different dependency parsing algorithms for Bulgarian, and a named entity recognizer trained with data automatically extracted from Wikipedia.
Storytelling is a core element of the design of Serious Games. Traditionally it is implemented by chaining narrative blocks. This paper presents a proposal for a new approach - stories are built via removal of blocks....
详细信息
ISBN:
(纸本)9783642231629
Storytelling is a core element of the design of Serious Games. Traditionally it is implemented by chaining narrative blocks. This paper presents a proposal for a new approach - stories are built via removal of blocks. The internal structure is briefly discussed along with the main advantage of using this approach - the possibility to shape a story depending on the goals. The didactical modeling and the representation of competences are also described, as well as the possibility for automatic design of stories and automatic assessment of gained competencies.
暂无评论