This paper presents a quiz game agent who is attentive to the dynamics of multiple concurrent participants. The attentiveness of this agent is meant to be achieved by an utterance policy that determines the nature of ...
详细信息
Collective Intelligence has received much attention in recent years, as organizations and businesses discover the power of crowds. With new technologies, such as blogs, twitter, wikis, photo sharing, collaborative tag...
详细信息
Artificial Immune Systems (AISs) are composed of techniques inspired by immunology. The clonal selection principle ensures the organism adaptation to fight invading antigens by an immune response activated by the bind...
详细信息
In this research will show a method for sound-recognition with artificial neural network backpropagation concept. The artificial neural network use sigmoid activation function to all layer. Steps to the extraction, fi...
详细信息
Artificial Immune Systems (AISs) are composed of techniques inspired by immunology. The clonal selection principle ensures the organism adaptation to fight invading antigens by an immune response activated by the bind...
详细信息
Artificial Immune Systems (AISs) are composed of techniques inspired by immunology. The clonal selection principle ensures the organism adaptation to fight invading antigens by an immune response activated by the binding of antigens and antibodies. As an immune response can be elicited even when the binding between an antigen and an antibody is not perfect, an approximate binding might suffice, and a Fuzzy Logic mechanism might be the most appropriate mechanism to control such process. This paper presents a novel hybrid model based on concepts of Immune and Fuzzy Systems with applications to pattern recognition problems. The preliminary results obtained here suggest the proposed model is a promising pattern recognition tool.
This paper presents two approaches to achieve attentiveness of a virtual quiz agent in the interactions with multiple users at the same time. One attempts to improve the agent with an utterance strategy to determine w...
详细信息
In recent years, computer-generated interactive virtual characters, called Embodied Conversational Agents (ECAs), are subjects of considerable ongoing research. Nevertheless, their conversational abilities are mediocr...
详细信息
Embodied conversational agents (ECAs) are computer-generated, human-like characters that interact with human users in face-to-face conversations. ECA is a powerful tool for representing cultural differences and is sui...
This article presents a novel framework of image sensing based on the time-domain correlation image sensor. The correlation detection mechanism of the sensor realizes pixel-parallel, selective detection of wideband mo...
详细信息
In the last few years, live pay-TV system via Internet has come to be established with the development of broadband network. To develop such a system, a mechanism for content protection is required. In this paper, a n...
详细信息
In the last few years, live pay-TV system via Internet has come to be established with the development of broadband network. To develop such a system, a mechanism for content protection is required. In this paper, a new architecture integrating fingerprint with cryptosystem is proposed to protect contents from unauthorized access and illegal redistribution. We describe a scheme integrating anti-collusion code and home page public-key cryptosystem. The proposed scheme is shown feasible and realistic for implementing with respect to computation/communication cost.
暂无评论