In the next fifty years, the main problem of AI is "the solution of Mutil-Agent in the dynamic and un-forecast environment", the standard problem is the robot vs. robot or human vs. robot competition. This p...
详细信息
ISBN:
(纸本)0780384032
In the next fifty years, the main problem of AI is "the solution of Mutil-Agent in the dynamic and un-forecast environment", the standard problem is the robot vs. robot or human vs. robot competition. This paper discusses the problem of collaboration and coordination in RoboCup Agent based on reinforcement learning and shows our experiment results.
Ontology plays an important role on the Semantic Web. In this paper, we propose a method, AOIWD, of acquiring ontology information from Web documents. The AOIWD method employs data mining techniques combined with infe...
详细信息
Summary form only given. A parallel algorithm for EDT transform on linear array with reconfigurable pipeline bus system (LARPBS) is presented. For an image with n/spl times/n pixels, the algorithm can complete the EDT...
详细信息
Summary form only given. A parallel algorithm for EDT transform on linear array with reconfigurable pipeline bus system (LARPBS) is presented. For an image with n/spl times/n pixels, the algorithm can complete the EDT transform in O(nlogn/(c(n)logd(n))) time using n.d(n).c(n) processors, where c(n) and d(n) are parameters satisfying 1/spl les/c(n)/spl les/n , and 1
Probabilistic methods are widely used in intrusion detection especially in computer audit data analysis. There are many famous probabilistic algorithm such as decision tree, Hotelling's T2, chi-square, first-order...
详细信息
ISBN:
(纸本)0780384032
Probabilistic methods are widely used in intrusion detection especially in computer audit data analysis. There are many famous probabilistic algorithm such as decision tree, Hotelling's T2, chi-square, first-order and high-order Markov model. These algorithms focus on some data features to mark anomaly state. New features are introduced into these algorithms and proper combination of these features will provide excellent result. But these algorithms are used single metric generated by multi-events so as to detect intrusion by comparison with a certain threshold. Experiment shows that using per event-based metric can improve accuracy of intrusion detection but not improve complexity of algorithm. In our paper we will provide a metric vector based on algorithm to detection intrusion that is more accurate and effective than traditional ones. Also, we provide some intrusion detection methods to our algorithm.
In the next fifty years, the main problem of AI is "the solution of multi-agent in the dynamic and un-forecast environment", the standard problem is the robot vs. robot or human vs. robot competition. This w...
详细信息
ISBN:
(纸本)0780384032
In the next fifty years, the main problem of AI is "the solution of multi-agent in the dynamic and un-forecast environment", the standard problem is the robot vs. robot or human vs. robot competition. This work discusses the problem of collaboration and coordination in RoboCup agent based on reinforcement learning and shows our experiment results.
A modified ant colony algorithm for solving optimization problem with continuous parameters is presented. In the method, groups of candidate values of the components are constructed, and each value in the group has it...
详细信息
A modified ant colony algorithm for solving optimization problem with continuous parameters is presented. In the method, groups of candidate values of the components are constructed, and each value in the group has its trail information. In each iteration of the ant colony algorithm, the method first chooses initial values of the components using the trail information. Then GA operations of crossover and mutation can determine the values of the components in the solution. Our experimental results on the problem of nonlinear programming show that our method has a much higher convergence speed and stability than those of simulated annealing (SA) and GA.
Many practical problems in commerce and industry involve finding the best way to allocate scarce resources a-mong competing activities. This paper focuses on the problem of integer programming, and describes an evolut...
详细信息
Many practical problems in commerce and industry involve finding the best way to allocate scarce resources a-mong competing activities. This paper focuses on the problem of integer programming, and describes an evolutionary soft a-gent model to solve it. In proposed model, agent is composed of three components: goal, environment and behavior. Experimental shows the model has the characters of parallel computing and goal driving.
In order to construct a secure network, attack and intrusion mode of intruders are analyzed for improving the capability of IDS and firewall systems. This paper presents a method for constructing a network intrusion a...
详细信息
ISBN:
(纸本)0780378652
In order to construct a secure network, attack and intrusion mode of intruders are analyzed for improving the capability of IDS and firewall systems. This paper presents a method for constructing a network intrusion and attack detection system on Honeynet, which is a true network that is constructed for the purpose of gathering information of intruders and attackers. Analyzing these data with data mining algorithm can work our attack modes, in this paper, we propose some method for mining patterns on various data from firewall records and log server in Honeynet, and the result can be in various forms such as associated rules of historic data or certain data structures required by IDS and firewall systems.
The real-time process algebra (RTFA) is a set of new mathematical notations for formally describing software system architectures, and static and dynamic behaviors. To bring RTPA into industrial software development p...
详细信息
ISBN:
(纸本)0780377818
The real-time process algebra (RTFA) is a set of new mathematical notations for formally describing software system architectures, and static and dynamic behaviors. To bring RTPA into industrial software development practice, tools are needed for analyzing and visualizing RTPA specifications. The first step to develop the supporting tools is to build a grammar parser for recognizing the RTPA notation system. In this paper, a parser of RTPA is described. The parser takes a textual RTPA specification as input, and generates an abstract syntax tree (AST) as its output. The generated AST represents RTPA tokens and lexical information in a structured format, which provides a foundation for further semantic analysis, code generation, visualization, and validation.
暂无评论