Showing papers in "International Journal of Software Science and Computational Intelligence in 2013"
TL;DR: Real-time process algebra (RTPA) is adopted to formally describe the architectures and behaviors of FKTS, a formal knowledge retrieval system for intelligent knowledge base modeling and manipulations based on concept algebra.
Abstract: Intelligent knowledge base theories and technologies are fundamentally centric in machine learning and cognitive robotics. This paper presents the design of a formal knowledge retrieval system (FKTS) for intelligent knowledge base modeling and manipulations based on concept algebra. In order to rigorously design and implement FKTS, real-time process algebra (RTPA) is adopted to formally describe the architectures and behaviors of FKTS. The architectural model of FKTS in the form of a set of unified structure models (USMs) is rigorously described. On the basis of USMs, functional models of FKTS are hierarchically refined by a set of unified process models (UPMs). The UPMs of FFTS are divided into two subsystems known as those of the knowledge visualization and knowledge base retrieval subsystems where the content-addressed searching mechanism is implemented in knowledge bases manipulations. The FKTS system is design and implemented as a part of the cognitive learning engine (CLE) for cognitive computers and cognitive robots. A Formal Knowledge Retrieval System for Cognitive Computers and Cognitive Robotics
29 citations
TL;DR: A formal model and a cognitive process for rigorously explaining human attentions are presented and a wide range of applications of the unified attention model are identified in cognitive informatics, cognitive computing, and computational intelligence toward the mimic and simulation of human attention and perception in cognitive computers, cognitive robotics, and cognitive systems.
Abstract: Attention is a complex mental function of humans in order to capture and serve the basic senses of vision, hearing, touch, smell, and taste, as well as internal motivations and perceptions. This paper presents a formal model and a cognitive process for rigorously explaining human attentions. Cognitive foundations of attentions and their relationships with consciousness and other perception processes are explored. The closed loop of attentions is identified that encompasses event capture and behavior reaction. Events for attention are classified into the categories of external stimuli and internal motivations. Behaviors as corresponding responses of attentions encompass recurrent, temporary, and reflex actions. Mathematical models of attentions are created as a foundation for rigorously describing the cognitive process of attentions in denotational mathematics. A wide range of applications of the unified attention model are identified in cognitive informatics, cognitive computing, and computational intelligence toward the mimic and simulation of human attention and perception in cognitive computers, cognitive robotics, and cognitive systems. The Cognitive Process and Formal Models of Human Attentions
27 citations
16 citations
TL;DR: A set of primary and perceptual sensory and neural receptors is formally modeled and analyzed and Sensory neural interfaces and interactions to the central and peripheral nervous systems of the brain and associated memories are systematically described.
Abstract: The human sensory system is a perfect natural real-time distributed system. It transforms physical and chemical stimuli of the external environment into electronic neural signals by specialized sensory receptors. This paper presents a comprehensive framework of the human sensory system as well as its cognitive and theoretical foundations. A set of primary and perceptual sensory and neural receptors is formally modeled and analyzed. Sensory neural interfaces and interactions to the central and peripheral nervous systems of the brain and associated memories are systematically described. This work is a part of a strategic project towards the development of cognitive computers and cognitive robots.
13 citations
TL;DR: An unconstrained modified desirability function is proposed, which do not require boundary conditions on variance, to determine efficient solution for MRO problem.
Abstract: A generic problem encountered in process improvement involves simultaneous optimization of multiple responses so-called 'critical response/output characteristics'. These types of problems are also referred to as 'multiple response optimization MRO problems'. The primary goal of any process improvement initiative is to determine the best process operating conditions that simultaneously optimizes various critical 'response characteristics'. Conventional desirability function approach uses response functions, target values, specifications to convert a MRO problem to a composite single objective optimization problem. The single objective function is maximized to determine near optimal conditions based on specific metaheuristic search strategy. The solution quality is expressed in terms of closeness of mean to target values and reduced variance around targets. Researchers generally impose hypothetical boundary conditions on variance to achieve satisfactory solutions. In this paper, an unconstrained modified desirability function is proposed, which do not require boundary conditions on variance, to determine efficient solution for MRO problem. Various case studies from open literature are selected to verify the superiority of the proposed approach over conventional desirability approach.
12 citations
TL;DR: To achieve a process of moral decision-making believable, the authors propose a cognitive function to determine the importance of each criterion based on the mood and emotional state of AAs, the main objective the model is to enable AAs to make decisions based on ethical and moral judgment.
Abstract: There are a great variety of theoretical models of cognition whose main purpose is to explain the inner workings of the human brain. Researchers from areas such as neuroscience, psychology, and physiology have proposed these models. Nevertheless, most of these models are based on empirical studies and on experiments with humans, primates, and rodents. In fields such as cognitive informatics and artificial intelligence, these cognitive models may be translated into computational implementations and incorporated into the architectures of intelligent autonomous agents AAs. Thus, the main assumption in this work is that knowledge in those fields can be used as a design approach contributing to the development of intelligent systems capable of displaying very believable and human-like behaviors. Decision-Making DM is one of the most investigated and computationally implemented functions. The literature reports several computational models that enable AAs to make decisions that help achieve their personal goals and needs. However, most models disregard crucial aspects of human decision-making such as other agents' needs, ethical values, and social norms. In this paper, the authors present a set of criteria and mechanisms proposed to develop a biologically inspired computational model of Moral Decision-Making MDM. To achieve a process of moral decision-making believable, the authors propose a cognitive function to determine the importance of each criterion based on the mood and emotional state of AAs, the main objective the model is to enable AAs to make decisions based on ethical and moral judgment.
9 citations
TL;DR: Results show that the authors' system can distribute safety confirmation information of victims efficiently among the remaining nodes, and can perform well in an unstable network environment such as that during a disaster.
Abstract: To provide the stable and continuous network services in cases of large-scale natural disasters, computers must use extremely limited network and computational resources effectively without imposing additional administrative burdens. The authors propose a P2P Information Sharing System for affected areas based on our proposed structured P2P network called the Well-distribution Algorithm for an Overlay Network WAON. By applying the WAON framework, the system configures the P2P network autonomously using the remaining nodes, and achieves load balancing dynamically without additional network maintenance costs. Therefore, the system can perform well in an unstable network environment such as that during a disaster. The authors designed and implemented the system and evaluated its overall system behavior and performance in simulations assuming the real scenario of the Great East Japan Earthquake. Results show that the authors' system can distribute safety confirmation information of victims efficiently among the remaining nodes.
9 citations
TL;DR: This paper extends the typology of message expressions and mathematically investigates potency-magnitude relations with a focus on intensified comparative expressions that involve the “degree” of the differences among two or more objects.
Abstract: Electronic word-of-mouth (eWOM) is an important information source that influences consumer product evaluations. The author previously developed a computational model that predicts the potency-magnitude relations of eWOM messages involving subjective rank expressions, which refer to linguistic representations related to the attitude-levels of the benefits of product attributes. This paper extends the typology of message expressions and mathematically investigates potency-magnitude relations with a focus on intensified comparative expressions that involve the “degree” of the differences among two or more objects. The investigations were performed first under the premise of a strict assumption called an interval assumption, and the results were verified under the premise of a conservative assumption called a surjection assumption. These assumptions were introduced to determine the cognitive relationship between attitude-levels and their difference-levels. The investigations include the development of a Q-magnitude Relation Map (Q-Map) that illustrates how the relations change based on the values of two evaluation parameters: evaluation target size and evaluation scale size. Based on the observations of the Q-Maps, five unexplored hypotheses on the potency-magnitude relations were developed with respect to intensified comparative expressions. Unexplored Hypotheses on Potency-Magnitude Relations of eWOM Messages with Intensified Comparative Expressions
7 citations
TL;DR: This paper proposes a cooperation protocol design method for repository-based multi-agent systems to improve the efficiency of multi- agent system development by introducing reusable protocol templates and original protocol template representations.
Abstract: This paper proposes a cooperation protocol design method for repository-based multi-agent systems. The proposal aims to improve the efficiency of multi-agent system development by introducing reusable protocol templates. To achieve the decoupling of protocol templates and application domain processes, original protocol template representations are proposed. Moreover, a graphical design tool with automatic implementation functions of proposed protocol templates is developed to reduce the development cost of multi-agent systems. To validate the functionality and feasibility of the proposal, two disparate multi-agent based applications are developed using the proposed design method. The comparison with the reference implementation shows that applying proposal in practical application development reduces approximately 50% coding work. Cooperation Protocol Design Method for Repository-Based Multi-Agent Applications
7 citations
TL;DR: This paper model sophisticated interaction patterns to improve believability by adapting Herbert Clark's joint activity theory and uses virtual basketball as an environment, where many communicative scenarios occur and common ground knowledge of collaborative actions such as passing is necessary.
Abstract: Believability is necessary for agents to establish intimate, real-time collaborations with humans in an interactive game environment. In this paper, the authors model sophisticated interaction patterns to improve believability by adapting Herbert Clark's joint activity theory. The authors use virtual basketball as an environment, where many communicative scenarios occur and common ground knowledge of collaborative actions such as passing is necessary. The authors have completed preliminary implementation of the agents through the use of a unique computational model based on common ground, and evaluations of basketball simulations have been made with respect to believability scenarios.
5 citations
TL;DR: An intra-class threshold for multimodal biometric recognition procedure has been developed and is found to perform better than traditional ROC curve based threshold technique.
Abstract: Biometric recognition techniques attracted the researchers for the last two decades due to their many applications in the field of security. In recent times multimodal biometrics have been found to perform better, in several aspects, over unimodal biometrics. The classical approach for recognition is based on dissimilarity measure and for the sake of proper classification one needs to put a threshold on the dissimilarity value. In this paper an intra-class threshold for multimodal biometric recognition procedure has been developed. The authors' selection method of threshold is based on statistical set estimation technique which is applied on a minimal spanning tree and consisting of fused face and iris images. The fusion is performed here on feature level using face and iris biometrics. The proposed method, applied on several multimodal datasets, found to perform better than traditional ROC curve based threshold technique.
TL;DR: A specification language based on an extended first order predicate calculus and allows specifiers to modularize their specifications and express constraints which are fundamental features in mobile applications.
Abstract: Mobile applications are increasingly being developed by many developers using different environments for diverse devices. However, there is no method or formal language that helps these developers specify their requirements before the coding stage. In this paper, the author describes a specification language that helps in this context. To achieve rigor, the language is based on an extended first order predicate calculus and allows specifiers to modularize their specifications. The language is founded on two concepts: a pristine which can be seen as a unit of cognition and a definition which is a logical rule based on pristines and other definitions. Furthermore, the language allows specifiers to express constraints which are fundamental features in mobile applications. A use of this language is shown by an example. Towards a Specification Language for Mobile Applications
TL;DR: Experiments show that this algorithm for the identification of the heavy rail surface defects is proven to be more rapid in testing the inclusions, cracks and oxide skin defects with a good promotional value.
Abstract: Color imaging in the hot rolled condition provides the better reaction of heavy rail on surface defects. In this paper, it proposes a series of novel algorithms of accurate position and segmentation of surface defects of heavy rail. An image acquisition device is designed on the adjustable camera bracket with the linear array CCD, and based on the correlation among pixels at the image level, a fast positioning method is developed for searching the Region Of Interesting ROI of the surface defects. Using the Mean-Shift image filtering algorithm which features multi-parameter kernel function, amendments to the sampling point weights and regional search with the nearest neighbor sampling points, accurate segmentation of the identification character is easily achieved by K-means clustering. Experiments show that this algorithm for the identification of the heavy rail surface defects is proven to be more rapid in testing the inclusions, cracks and oxide skin defects with a good promotional value.
TL;DR: Using the authors’ system, the user can easily take a suitable skin picture and observe the skin care progress, so that in an esthetic room, theuser and beauty therapist can verify the esthetic effect by viewing the pictures taken before and after treatment.
Abstract: In this study, the authors design a user-support system employing a smart phone for skin progress analysis. The authors’ proposed system seeks to provide user support for a skin diagnostic service employing a smart phone’s camera, with the user’s photograph of a skin image and continuous diagnosis of the photographed area. The cognitive user-support module recognizes the processing and the user operation of the smart phone, and transmits advice on the operation to the user in real time, via voice or text messages. In addition, the cognitive user-support module can recommend contents suitable for the user, based on the user’s past situation. In the skin diagnostic service, the authors’ system provides the user with auto photography when the picture is taken, by recognizing the user’s situation and guiding the user via voice or text message. The authors’ system can recommend the skin area that was used for the last diagnostic service in order to perform continuous skin diagnosis. Using the authors’ system, the user can easily take a suitable skin picture and observe the skin care progress, so that in an esthetic room, the user and beauty therapist can verify the esthetic effect by viewing the pictures taken before and after treatment. Design and Implementation of a Cognitive User-Support System for Skin Progress Analysis Using a Smart Phone
TL;DR: Two semiotic models for a description of development stages of indicators, including generation processes of expert knowledge about developed indicators, are presented, with a new notion of “Frege’s space” introduced.
Abstract: The paper presents two semiotic models for a description of development stages of indicators, including generation processes of expert knowledge about developed indicators. For the description of stages of these processes, a new notion of “Frege’s space“ is introduced. The authors described two applied semiotic models of knowledge acquisition. Those processes were studied in the context of forming an expert knowledge base named proactive dictionary, which represents a component of an evaluation system. This dictionary enables experts to fix stages of indicators development, to present the results of developing different variants of indicators in graphic form, to compare and evaluate these variants. Theoretical Framework and Denotatum-Based Models of Knowledge Creation for Monitoring and Evaluating R&D Program Implementation
TL;DR: The present study considers a fuzzy color system in which three fuzzy sets are constructed on the tone triangle, which processes a fuzzy input and outputs a color on the color triangle system.
Abstract: The present study considers a fuzzy color system in which three fuzzy sets are constructed on the tone triangle. This system processes a fuzzy input and outputs a color on the color triangle system. Two fuzzy sets not black and white are applied to the tone triangle relationship. By evaluating the attributes of chromaticness, whiteness, and blackness on the tone triangle, a target color can be easily obtained as the center of gravity of the resulting fuzzy set. The output of the system is a tone triangle, which includes a compound vector with three weights scalars in color space. The differences between a fuzzy input and the resulting inference output is shown by the input-output characteristic linear shape and right triangle shape between the chromaticness, the whiteness, and the blackness of the input and the chromaticness of the output.
TL;DR: A virtual situation where a speaker was surrounded by several speakers and the author hypothesized that the diversity of communication channels available to the audience would increase the awareness of others and facilitate the adoption of an exocentric perspective.
Abstract: The present study investigates the nature of egocentric biases in a situation where a speaker is surrounded by social actors with different perspectives. In this context, the author investigated how communication channels function to ease egocentric bias during collaborative activities. To investigate this point, the author used conversational agents as social actors. The present study therefore created a virtual situation where a speaker was surrounded by several speakers. The author hypothesized that the diversity of communication channels available to the audience would increase the awareness of others and facilitate the adoption of an exocentric perspective. The results of the analysis show that participants who engaged in the collaboration task with various communication channels used fewer egocentric perspectives. Studies in egocentrism and communication have not yet investigated the conversational dynamics of multiple speakers. This study therefore provides a new perspective about the kinds of factors that may ease such biases. Facilitating Perspective Taking in Groups: An Analysis Using Multiple Conversational Agents
TL;DR: This paper presents the concept of the information system implementation transformation (ISIT) cloud that covers dynamics of global information system implementations and depicts these dynamics as interpretative readiness curves in relation to IS implementation phases.
Abstract: Global information systems IS are often designed and implemented without due consideration or management of the human aspect of information systems. The lack of acknowledgement of human factors generates cost overruns, time delays and may ultimately lead to a partial failure of the system or even an aborted implementation. In this paper the authors present the concept of the information system implementation transformation ISIT cloud that covers dynamics of global information system implementations. The authors have depicted these dynamics as interpretative readiness curves in relation to IS implementation phases. The authors argue that human elements are impacting the overall level of implementation readiness. The authors support their argument by discussing the role of attitudes towards IS implementations, after which the authors break it down into a focus on the role of culture and finally link our ISIT concept to the layered reference model of the brain LRMB to understand the role of cognitive elements within IS implementations. The results of their approach provide improved understanding of the human elements of global information system implementations and its organizational readiness.
TL;DR: The authors implemented a topic database based on word lists developed for people with aphasia as an RDF database to exploit the conceptual relationships among words and extended it to include web resources a user needs.
Abstract: This paper describes a topic database for conversation support for people with cognitive handicaps such as aphasia. The authors implemented a topic database based on word lists developed for people with aphasia as an RDF database to exploit the conceptual relationships among words and extended it to include web resources a user needs. To allow database personalization, the authors introduce an access control mechanism and incorporate the topic database into a chat system for remote conversation support over the Internet. Construction of a Topic Database for Remote Conversation Support