Filters








30 Hits in 11.7 sec

Fuzzy Personality Model Based on Transactional Analysis and VSM for Socially Intelligent Agents and Robots [chapter]

Carelia Gaxiola, Antonio Rodríguez-Díaz, Susan Jones, Manuel Castañón-Puga, Dora-Luz Flores
2009 Studies in Computational Intelligence  
This paper presents a model to add personality features to robots, the Transactional Analysis (TA) is used to define a psychological profile and the Viable Systems Model (VSM) is used to help explain the  ...  decisions made by the robot and how this impacts on its viability.  ...  The authors would like to thank CONACYT and UABC for the financial support given to this project. The students (Carelia Gaxiola and Dora-Luz Flores) were supported by a scholarship from CONACYT.  ... 
doi:10.1007/978-3-642-04514-1_13 fatcat:eeyyc63krvcrbhpqh7qlasiyey

2020 Index IEEE Transactions on Industrial Informatics Vol. 16

2020 IEEE Transactions on Industrial Informatics  
Distributed Clock Synchronization Based on Intelligent Clustering in Local Area Industrial IoT Systems; TII June 2020 3697-3707 Jia, S., see Chen, C., 1873-1884 Jia, W., see Wang, T., 2054-2062 Jia,  ...  Forests-Based Model for Ultra-Short-Term Prediction of PV Characteristics; TII Jan. 2020 202-214 Imran, A., see Hussain, B., TII Aug. 2020 4986-4996 Imran, M., see Fu, S., TII Sept. 2020 6013-6022  ...  ., +, TII Aug. 2020 5345-5356 Intelligent Agent-Based Energy Management System for Islanded AC-DC Microgrids.  ... 
doi:10.1109/tii.2021.3053362 fatcat:blfvdtsc3fdstnk6qoaazskd3i

Framework for Computation Offloading in Mobile Cloud Computing

Dejan Kovachev, Ralf Klamma
2012 International Journal of Interactive Multimedia and Artificial Intelligence  
ACKNOWLEDGMENT The authors would like to thank Professors Omer Rana and José Cardoso e Cunha for the initial ideas on pattern and service abstractions, which ultimately conduced to this work.  ...  We thank Tian Yu for the prototype implementation.  ...  The annotation and the user's profile are represented using the Vector Space Model (VSM). VSM is a model for semantic representations of contents as vectors of items created by G. Salton [9] .  ... 
doi:10.9781/ijimai.2012.171 fatcat:zeqxsym4f5ashmjkiivje2uoau

Credibility Analysis in Social Big Data [chapter]

Bilal Abu-Salih, Pornpit Wongthongtham, Dengya Zhu, Kit Yan Chan, Amit Rudra
2021 Social Big Data Analytics  
Hence, there is a need for well comprehending of social trust to improve and expand the analysis process and inferring credibility of social big data.  ...  One of the main reasons for acquiring the value of SBD is to provide frameworks and methodologies using which the credibility of online social services users can be evaluated.  ...  module Figure 7 7 shows the ROC curves for all models, together on one chart.  ... 
doi:10.1007/978-981-33-6652-7_3 fatcat:u6qeabapozeepfmynw3c27gmke

Process Mining [chapter]

Peter M. D. Gray, Todd Eavis, Alfred Inselberg, Patrick Valduriez, Patrick Valduriez, Goetz Graefe, Goetz Graefe, Hans Zeller, Goetz Graefe, Esther Pacitti, Christoph Koch, Rui Zhang (+81 others)
2009 Encyclopedia of Database Systems  
The idea of creating the present database of applications came up within HSPI in 2016, during an informal meeting about process mining technology and its spread over several business -and not only -situations  ...  Based on an event log, a new model is constructed or discovered based on lowlevel events.  Conformance checking: Used when there is an a priori model.  ...  However, the state of art approaches were based on statistics and data analysis.  ... 
doi:10.1007/978-0-387-39940-9_1477 fatcat:efqm767tifcahgehubn4hjzh2e

A review of the recent contribution of systems thinking to operational research and management science

John Mingers, Leroy White
2010 European Journal of Operational Research  
In the second part we review the main domains of application: strategy, information systems, organisations, production and operations, ecology and agriculture, and medicine and health.  ...  The systems approach, or systems thinking, has been intimately connected with the development of OR and management science initially through the work of founders such as Churchman and Ackoff and latterly  ...  These are based on considerable historical and empirical work on what strategy is and how it is formed.  ... 
doi:10.1016/j.ejor.2009.12.019 fatcat:fij3mcdskbbptjx2rn5xpxmlxm

Artificial Intelligence [article]

Denis Rothman
2018 Zenodo  
These cloud platforms will slowly but surely reduce the need for artificial intelligence developers. Google Cloud's AI provides intuitive machine learning services.  ...  IBM Cloud and Amazon Web Services (AWS) offer machine learning solutions that do not require AI developers.  ...  Word2vec will be used for customized phrases. The Word2vec model A vector space model (VSM) takes words and transforms them into a vector space.  ... 
doi:10.5281/zenodo.5599649 fatcat:vyqr3zzw5rfzpp3zifezw7uzxq

A framework for GPU-based application-independent 3D interactions

Harlen Costa Batagelo, Shin-Ting Wu
2008 The Visual Computer  
Keywords: Intelligent Agents, Society of Intelligent Agents, e-Gov Management for Health Programs Joint Outage Probability: An Exact Formulation for the Outage Problem in Wireless Systems Flávio du  ...  The computation of the VSM is required for power systems planning and operation.  ... 
doi:10.1007/s00371-008-0296-y fatcat:sl3f6lyyancmdgb3v7kysceuvq

Quantification of environmental and economic impacts for main categories of building labeling schemes

Erkki Seinre, Jarek Kurnitski, Hendrik Voll
2014 Energy and Buildings  
FaculTy oF civil enGineerinG chair oF heaTinG and venTilaTion chair of heating and ventilation mainly focuses on the research in hvac systems, indoor climate of the buildings, energy efficient and sustainable  ...  buildings, passive cooling systems and heat supply systems (heat pumps).  ...  disorders and the effect of external physical stressor.  ... 
doi:10.1016/j.enbuild.2013.11.048 fatcat:ckgxbn7mtrh47gf4xsdaaio5jm

Fake BTS Attacks of GSM System on Software Radio Platform

Yubo Song, Kan Zhou, Xi Chen
2012 Journal of Networks  
A Review on Cloud Computing Development Sugang Ma 222 229 236 243 249 259 267 275 282 288 300 305 REGULAR PAPERS Real Time Intrusion Prediction based on Optimized Alerts with Hidden Markov Model and Security  ...  The first paper, "Extensive Design for Attack's Recognition and Resistance of Survivable Network" by Hui Xu and Xiang Gu, gives a solution of attack defense of survivable network based on extentics.  ...  Intelligent Storage and Retrieval Systems Based on RFID and Vision in Automated Warehouse Index Terms-intelligent storage and retrieval systems, robot control, RFID, robot vision, automated warehouse  ... 
doi:10.4304/jnw.7.2.275-281 fatcat:3ejjimllcvewjeifopbvhl3zmi

OR in strategic land-use planning

C J L Yewlett
2001 Journal of the Operational Research Society  
hierarchy process Artificial intelligence Capital budgeting Case based reasoning Classification analysis Cluster analysis Cognitive mapping Combinatorics Conflict analysis Control systems Cost benefit  ...  Other work focuses on models using CPM/PERT” and time impact analysis.’  ... 
doi:10.1057/palgrave.jors.2601086 fatcat:zjrplrvho5dgjk5spyvnjxo43a

An orchestration approach for unwanted Internet traffic identification

Eduardo Feitosa, Eduardo Souto, Djamel H. Sadok
2012 Computer Networks  
They have the following settings: User-agent: * and disallow: /, which restricts any agent (robot) from accessing any content inside their directory.  ...  [135] propose a statistical model based on modeling aggregate traffic using time series and, as a consequence, offer an anomaly detection procedure based on such modeling.  ... 
doi:10.1016/j.comnet.2012.04.018 fatcat:2aeso6gfq5dmhixzfzpjo7jrwm

Illustrative risks to the public in the use of computer systems and related technology

Peter G. Neumann
1994 Software engineering notes  
f 911 software discarded updated address in fatal Chicago area fire (S 17 1 Robots and Artificial Intelligence !  ...  (R 21 42) SPhe Georgia's HOPE scholarship program passwords and personal info exposed on the Web and cached on search engines for many months; deletion of one file blamed (R 21 58,59) SP Washington State  ...  ef$ Water company software upgrade results in monster water bill and threats of penalties and interest (R 20 12) f British Gas blames SW for sending 15,000 customers false warnings (S 19 2:4) $f Marks&  ... 
doi:10.1145/181610.181612 fatcat:qfzxpio6tfgl5nmbevta334afi

Illustrative risks to the public in the use of computer systems and related technology

Peter G. Neumann
1992 Software engineering notes  
f 911 software discarded updated address in fatal Chicago area fire (S 17 1 Robots and Artificial Intelligence !  ...  (R 21 42) SPhe Georgia's HOPE scholarship program passwords and personal info exposed on the Web and cached on search engines for many months; deletion of one file blamed (R 21 58,59) SP Washington State  ...  ef$ Water company software upgrade results in monster water bill and threats of penalties and interest (R 20 12) f British Gas blames SW for sending 15,000 customers false warnings (S 19 2:4) $f Marks&  ... 
doi:10.1145/134292.134293 fatcat:ayrwcbvvljhrdeav5kvrxaycs4

Illustrative risks to the public in the use of computer systems and related technology

Peter G. Neumann
1996 Software engineering notes  
f 911 software discarded updated address in fatal Chicago area fire (S 17 1 Robots and Artificial Intelligence !  ...  (R 21 42) SPhe Georgia's HOPE scholarship program passwords and personal info exposed on the Web and cached on search engines for many months; deletion of one file blamed (R 21 58,59) SP Washington State  ...  ef$ Water company software upgrade results in monster water bill and threats of penalties and interest (R 20 12) f British Gas blames SW for sending 15,000 customers false warnings (S 19 2:4) $f Marks&  ... 
doi:10.1145/381790.381797 fatcat:kcxte3luzrg57ms3gwwbqzs5ji
« Previous Showing results 1 — 15 out of 30 results