2016 IEEE 15th International Conference on Cognitive Informatics & Cognitive Computing (ICCI*CC)最新文献

筛选
英文 中文
Utilizing finger movement data to cluster patients with everyday action impairment 利用手指运动数据对日常行动障碍患者进行分类
Niken Prasasti, Takehiko Yamaguchi, H. Ohwada
{"title":"Utilizing finger movement data to cluster patients with everyday action impairment","authors":"Niken Prasasti, Takehiko Yamaguchi, H. Ohwada","doi":"10.1109/ICCI-CC.2016.7862077","DOIUrl":"https://doi.org/10.1109/ICCI-CC.2016.7862077","url":null,"abstract":"Difficulty in performing the activities of daily living is a key clinical feature of early cognitive decline in older adults and has also been associated with the early stage of dementia in mild cognitive impairment (MCI). As the number of individuals with dementia and the development of technology rise, an immersive virtual environment or virtual reality has been used in therapy for memory problems in the area of MCI. This study evaluated the use of finger movement data obtained from the virtual-reality-based application and its ability to cluster patients with everyday action impairment. Here, as a pilot study, nine healthy adults completed lunch box packing as an everyday action task in the designated virtual reality called the Virtual Kitchen (VK), equipped with a leap motion controller to record their finger movement. We converted the finger movements to acceleration data and then employed a time series clustering algorithm to create several clusters based on the data set. In addition, to comprehensively review the clustering result, we assessed performance-based measures for the experiment using the Naturalistic Action Test (NAT). The final results indicate that the clusters formed by using the acceleration data seem reasonably analogous to the performance measures (i.e., the type and number of errors that occurred).","PeriodicalId":135701,"journal":{"name":"2016 IEEE 15th International Conference on Cognitive Informatics & Cognitive Computing (ICCI*CC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124240248","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Soft biometric: Give me your favorite images and i will tell your gender 软生物识别:给我你最喜欢的图像,我会告诉你的性别
Samiul Azam, M. Gavrilova
{"title":"Soft biometric: Give me your favorite images and i will tell your gender","authors":"Samiul Azam, M. Gavrilova","doi":"10.1109/ICCI-CC.2016.7862089","DOIUrl":"https://doi.org/10.1109/ICCI-CC.2016.7862089","url":null,"abstract":"Gender estimation for security and forensic purposes is not a trivial task. Recently, researchers provided methods for predicting gender based on face-images, fingerprint ridge density, body shape, voice and gait. No research to date have been concerned with using one's image aesthetic preferences for predicting gender. Cognitively and psychologically, males and females have different visual aesthetic preferences. This paper is a proof of concept that it is possible to use image's perceptual aesthetic features to identify the gender of a person. This article identifies a bag of image aesthetic features and selects a number of most differentiating features using filter and wrapping selection methods. To improve the classification accuracy, weighted combination of decisions obtained by the conventional binary classifiers is used. The final decision is made based on the fusion of probabilities generated by the mixture of classifiers. The prediction model is trained and tested on a database consisting of 24000 images from 120 Flickr users. Experiment shows that a proper weight assignments allows to obtain 77% accuracy in gender prediction based on aesthetics alone.","PeriodicalId":135701,"journal":{"name":"2016 IEEE 15th International Conference on Cognitive Informatics & Cognitive Computing (ICCI*CC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122607548","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Robotic implementation of classical and operant conditioning within a single SNN architecture 在单个SNN架构中,经典条件反射和操作性条件反射的机器人实现
Etienne Dumesnil, Philippe-Olivier Beaulieu, M. Boukadoum
{"title":"Robotic implementation of classical and operant conditioning within a single SNN architecture","authors":"Etienne Dumesnil, Philippe-Olivier Beaulieu, M. Boukadoum","doi":"10.1109/ICCI-CC.2016.7862055","DOIUrl":"https://doi.org/10.1109/ICCI-CC.2016.7862055","url":null,"abstract":"This work presents the implementation of operant conditioning (OC) and classical conditioning (CC) with a single spiking neural network (SNN) architecture, thus suggesting that the two types of leaning may relate to the same cognitive process. Both are achieved by using a modified version of spike-timing-dependent plasticity (STDP), where the connection weight between a cue neuron and an action neuron depends on the temporal relation between their spikes and those of a reward neuron. This reward driven STDP (RD-STDP) was implemented with simple computational resources to form an electronic robot's brain, using an adaptation of the synapto-dendritic kernel adapting neuron (SKAN) model. Then, a robot driven by the new neuronal architecture was tested in a maze with changing features, successfully exhibiting CC and OC. These results and the simple computational resources used make the proposed architecture promising for very large scale time-dependent parallel data analysis, with high capacity of adaptation in a dynamic environment. Moreover, it proposes a theoretic framework to model learning by conditioning.","PeriodicalId":135701,"journal":{"name":"2016 IEEE 15th International Conference on Cognitive Informatics & Cognitive Computing (ICCI*CC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123663386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Enhancing supervisory training signals with environmental reinforcement learning using adaptive dynamic programming and artificial neural networks 使用自适应动态规划和人工神经网络的环境强化学习增强监督训练信号
N. Melton, D. Wunsch
{"title":"Enhancing supervisory training signals with environmental reinforcement learning using adaptive dynamic programming and artificial neural networks","authors":"N. Melton, D. Wunsch","doi":"10.1109/ICCI-CC.2016.7862056","DOIUrl":"https://doi.org/10.1109/ICCI-CC.2016.7862056","url":null,"abstract":"A method for hybridizing supervised learning with adaptive dynamic programming was developed to increase the speed, quality, and robustness of on-line neural network learning from an imperfect teacher. Reinforcement learning is used to modify and enhance the original supervisory signal before learning occurs. This paper describes the method of hybridization and presents a model problem in which a human supervisor teaches a simulated car to drive around a race track. Simulation results show successful learning and improvements in convergence time, error rate, and stability over either component method alone.","PeriodicalId":135701,"journal":{"name":"2016 IEEE 15th International Conference on Cognitive Informatics & Cognitive Computing (ICCI*CC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130058863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Zero-crossing analysis of Lévy walks for real-time feature extraction: Composite signal analysis for strengthening the IoT against DDoS attacks lsamvy行走的过零分析,用于实时特征提取:复合信号分析,增强物联网抵御DDoS攻击
J. D. T. Gonzalez, W. Kinsner
{"title":"Zero-crossing analysis of Lévy walks for real-time feature extraction: Composite signal analysis for strengthening the IoT against DDoS attacks","authors":"J. D. T. Gonzalez, W. Kinsner","doi":"10.1109/ICCI-CC.2016.7862027","DOIUrl":"https://doi.org/10.1109/ICCI-CC.2016.7862027","url":null,"abstract":"This paper compares the probability similarities between a cyberattack, the distributed denial-of-service, and the mathematical model of probability, Lévy walks. This comparison aims to explore the validity of Lévy walks as a model resembling the DDoS probability features. This research also presents a method, based on the Smirnov transform, for generating synthetic data with the statistical properties of Lévy-walks. This method for synthetic data generation can be utilized for generating arbitrary prescribed probability density functions (pdf). The Smirnov transform is used to solve a cybersecurity engineering problem associated with Internet traffic. The synthetic Lévy-walk process is intertwined with sections of other distinct characteristics (uniform noise, Gaussian noise, and an ordinary sinusoid) to create a composite signal, which is then analyzed with zero-crossing rate (ZCR) within a varying-size window. This paper shows that it is possible to identify the distinct sections present in the composite signal through ZCR. The differentiation of these sections shows an increasing ZCR value as the section under analysis exhibits a higher activity or complexity (from the sinusoid, to a synthetic Lévy-walk process, and uniform and Gaussian noise, respectively). The advantages of the ZCR computation directly in the time-domain are appealing for real-time implementations. The varying window in the ZCR produces more defined values as the window size increases. The changing world of security systems is deeply considered, in an approach for its improvement. This as our society is highly dependent on electronically interconnected systems-of-systems demanding operational robustness and security. The approach proposed for providing a higher degree of security aiming to the development of cognitive security systems.","PeriodicalId":135701,"journal":{"name":"2016 IEEE 15th International Conference on Cognitive Informatics & Cognitive Computing (ICCI*CC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130070864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Detecting preferences based on eye movement using combinatorial fusion 利用组合融合检测基于眼球运动的偏好
Christina Schweikert, S. Shimojo, D. F. Hsu
{"title":"Detecting preferences based on eye movement using combinatorial fusion","authors":"Christina Schweikert, S. Shimojo, D. F. Hsu","doi":"10.1109/ICCI-CC.2016.7862057","DOIUrl":"https://doi.org/10.1109/ICCI-CC.2016.7862057","url":null,"abstract":"When tasked with comparing two images on a screen, a subject's eye movement can be captured and analyzed in order to understand the process of preference formation. The process of comparing two images and developing a preference is analyzed based on a sample dataset. Although it is known in general that our preferences are shaped by our past experiences, a systemic understanding of the factors which lead to preference decision making remains a challenging problem. In this paper, we propose a set of five attributes which are extracted from the temporal eye movement sequence: last duration, total duration, gaze count, interest sustainability, and region change. Each of these five attributes is a scoring system (ranking system). We then use the combinatorial fusion algorithm (CFA) framework to combine pairs of attributes using the rank-score characteristic (RSC) function and cognitive diversity (CD). Our results demonstrate that combination of two attributes can improve individual attributes if the attribute pair has a higher cognitive diversity. Our work represents a new paradigm to use combinatorial fusion for preference detection based on eye movement.","PeriodicalId":135701,"journal":{"name":"2016 IEEE 15th International Conference on Cognitive Informatics & Cognitive Computing (ICCI*CC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130115868","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A weighted hybrid model for unsteady nonlinear aerodynamics 非定常非线性空气动力学的加权混合模型
Boxu Zhao, G. Luo, Jihong Zhu
{"title":"A weighted hybrid model for unsteady nonlinear aerodynamics","authors":"Boxu Zhao, G. Luo, Jihong Zhu","doi":"10.1109/ICCI-CC.2016.7862038","DOIUrl":"https://doi.org/10.1109/ICCI-CC.2016.7862038","url":null,"abstract":"Based on experimental data from the large amplitude oscillation experiment conducted with two degrees of freedom, this work studies and compares the ability of Polynomial Regression, LS-SVM and RBF network to describe the characteristics of unsteady nonlinear aerodynamics. This work also develops a hybrid model for use in unsteady nonlinear aerodynamics based on the standard boosting method. The results indicate that the forecast results and actual data are in good agreement using the method, thus demonstrating that these methods can effectively model highly nonlinear aerodynamics. The results also indicate that the hybrid model has a better effect compared to other methods.","PeriodicalId":135701,"journal":{"name":"2016 IEEE 15th International Conference on Cognitive Informatics & Cognitive Computing (ICCI*CC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116134282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Terrorism risk assessment using hierarchical bidirectional fuzzy rule interpolation 基于层次双向模糊规则插值的恐怖主义风险评估
Shangzhu Jin, Jike Ge, Jun Peng
{"title":"Terrorism risk assessment using hierarchical bidirectional fuzzy rule interpolation","authors":"Shangzhu Jin, Jike Ge, Jun Peng","doi":"10.1109/ICCI-CC.2016.7862068","DOIUrl":"https://doi.org/10.1109/ICCI-CC.2016.7862068","url":null,"abstract":"Terrorist attacks launched by extremist groups or individuals have caused catastrophic consequences worldwide. Terrorism risk assessment therefore plays a crucial role in national and international security. Fuzzy reasoning-based terrorism risk assessment systems offer a significant potential of providing decision support in combating terrorism, where highly complex situations may be involved. However, missing expertise often presents challenges for configuring systems that can otherwise assess the likelihood and risk of possible attacks due to the availability of only sparse rule bases. Hierarchical fuzzy rule interpolation systems may be adopted in order to overcome such problems. Unfortunately, situations can become more sophisticated because certain important antecedent values may be missing, which need to be inferred from the known (or hypothesised) consequences. Initial theoretical work on backward fuzzy rule interpolation has been proposed to cope with certain underlying problems. Nevertheless, little has been done in developing and applying an integrated hierarchical bidirectional (forward/backward) fuzzy rule interpolation mechanism that is tailored to suit decision support for terrorism risk assessment. This paper presents such an integrated approach that is capable of dealing with dynamic and insufficient information in the risk assessing process. In particular, the hierarchical system implementing the proposed techniques can predict the likelihood of terrorism attacks on different segments of focused attention. It also helps identify hidden variables that may be useful during the decision support process via performing reverse inference. The results of an experimental investigation of this implemented system are represented, demonstrating the potential and efficacy of the proposed approach.","PeriodicalId":135701,"journal":{"name":"2016 IEEE 15th International Conference on Cognitive Informatics & Cognitive Computing (ICCI*CC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127038766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Dynamic generation of dilemmas in virtual learning environments for non-technical skills training 在非技术技能培训虚拟学习环境中动态生成困境
Azzeddine Benabbou, D. Lourdeaux, D. Lenne
{"title":"Dynamic generation of dilemmas in virtual learning environments for non-technical skills training","authors":"Azzeddine Benabbou, D. Lourdeaux, D. Lenne","doi":"10.1109/ICCI-CC.2016.7862040","DOIUrl":"https://doi.org/10.1109/ICCI-CC.2016.7862040","url":null,"abstract":"Critical situations are situations where a complementarity between technical and non-technical skills is crucial. Several critical dimensions characterize them. In order to train for such situations, simulation systems have to be able to generate scenarios where these dimensions are present in order to solicit one or several non-technical skills. In this paper we focus on one particular critical dimension which is the “Dilemma”. We present our approach for dynamically generating dilemma-based situations using activity and causality models.","PeriodicalId":135701,"journal":{"name":"2016 IEEE 15th International Conference on Cognitive Informatics & Cognitive Computing (ICCI*CC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131074924","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Performance of Licklider transmission protocol (LTP) in LEO-satellite communications with link disruptions 链路中断时Licklider传输协议(LTP)在leo卫星通信中的性能
Ding Wang
{"title":"Performance of Licklider transmission protocol (LTP) in LEO-satellite communications with link disruptions","authors":"Ding Wang","doi":"10.1109/ICCI-CC.2016.7862028","DOIUrl":"https://doi.org/10.1109/ICCI-CC.2016.7862028","url":null,"abstract":"Near Earth missions ranging from low-Earth orbit (LEO) to Earth-Sun Lagrangian points will continue to be a majority of future space missions. A few works have been done with delay/disruption tolerant networking (DTN) technology for LEO-satellite communications and provided feasibility for its adoption in LEO space missions. However, no much work has been done to fully evaluate the performance of DTN in such an environment, especially in the presence of long link disruption, data corruption and loss, and link asymmetry. In this paper, we present an experimental performance evaluation of DTN architecture and protocol stack, with Licklider transmission protocol (LTP) serving as a convergence layer adapter (CLA) underneath bundle protocol (BP), in a typical LEO-satellite communication infrastructure accompanied by a very long link outage, various packet corruption and loss rates, and channel rate symmetry and asymmetry. The experiment was conducted by performing realistic file transfers over a PC-based test-bed.","PeriodicalId":135701,"journal":{"name":"2016 IEEE 15th International Conference on Cognitive Informatics & Cognitive Computing (ICCI*CC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122233343","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信