{"title":"Comparing behavior patterns of swarms that learn using tolerance perceptual near sets","authors":"K. S. Patnaik, G. Sahoo, J. Peters","doi":"10.1109/UKRICIS.2010.5898140","DOIUrl":"https://doi.org/10.1109/UKRICIS.2010.5898140","url":null,"abstract":"The problem considered in this paper is how to measure the degree of nearness of behaviours of swarms that learn. The solution to this problem is set forth a methodology for discovering perceptual granules (i.e., sets of perceptual objects) that are, in some sense, close to each other. A perceptual object is something presented to the senses or knowable by the mind. The basic approach to comparing perceptual objects is inspired by the early 1980s work by Zdzis law Pawlak on the classification of objects. Objects are classified by comparing descriptions of objects stored in information tables. In this work, descriptions of swarm behavior are stored in tables called rough ethograms. A swarm behavior description is defined by means of probe functions (sensor readings) that represent behaviour features. The proposed approach to comparing bahaviours and extracting pattern information in different ethograms takes advantage of recent studies of the nearness of objects and near sets. Behavior patterns are near each other if they have similar descriptions. The contribution of this paper is a framework for determining the nearness of behaviours represented in two or more ethograms.","PeriodicalId":359942,"journal":{"name":"2010 IEEE 9th International Conference on Cyberntic Intelligent Systems","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117234895","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
P. Roberts, J. Howroyd, Richard J. Mitchell, V. Ruiz
{"title":"Identifying problematic classes in text classification","authors":"P. Roberts, J. Howroyd, Richard J. Mitchell, V. Ruiz","doi":"10.1109/UKRICIS.2010.5898142","DOIUrl":"https://doi.org/10.1109/UKRICIS.2010.5898142","url":null,"abstract":"Real-world text classification tasks often suffer from poor class structure with many overlapping classes and blurred boundaries. Training data pooled from multiple sources tend to be inconsistent and contain erroneous labelling, leading to poor performance of standard text classifiers. The classification of health service products to specialized procurement classes is used to examine and quantify the extent of these problems. A novel method is presented to analyze the labelled data by selectively merging classes where there is not enough information for the classifier to distinguish them. Initial results show the method can identify the most problematic classes, which can be used either as a focus to improve the training data or to merge classes to increase confidence in the predicted results of the classifier.","PeriodicalId":359942,"journal":{"name":"2010 IEEE 9th International Conference on Cyberntic Intelligent Systems","volume":"6 31","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132815727","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. C. Spencer, D. Xydas, J. Downes, M. W. Hammond, V. Becerra, K. Warwick, Benjamin J. Whalley, S. Nasuto
{"title":"Investigation of spatio-temporal dependencies in neuronal functional connectivity","authors":"M. C. Spencer, D. Xydas, J. Downes, M. W. Hammond, V. Becerra, K. Warwick, Benjamin J. Whalley, S. Nasuto","doi":"10.1109/UKRICIS.2010.5898084","DOIUrl":"https://doi.org/10.1109/UKRICIS.2010.5898084","url":null,"abstract":"Determining how the functional connectivity in cortical cultures on multi-electrode arrays develops over time can provide new and helpful insight into how cognitive pathways form. This study uses both data- and model-driven approaches to determine what dependencies are present in and between functional connectivity networks derived from bursts of extra-cellularly recorded activity. Two models were used to capture the dynamics of individual functional connections and their consistencies were verified using surrogate data. By comparing network-wide properties between model generated networks and functional networks from data, complex interdependencies were revealed. This indicates the persistent co-activation of neuronal pathways, as can be found in whole brain structures and further supports the use of cortical cultures as a consistent model for neuronal studies.","PeriodicalId":359942,"journal":{"name":"2010 IEEE 9th International Conference on Cyberntic Intelligent Systems","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133865442","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Thompson, A. Laws, D. Reilly, A. Taleb-Bendiab, D. Llewellyn-Jones
{"title":"An open-bounded cybernetic case study of viable computing systems: Applying directive correlation to an algorithmic hot-swapping scenario","authors":"R. Thompson, A. Laws, D. Reilly, A. Taleb-Bendiab, D. Llewellyn-Jones","doi":"10.1109/UKRICIS.2010.5898151","DOIUrl":"https://doi.org/10.1109/UKRICIS.2010.5898151","url":null,"abstract":"This paper presents an open-bounded case study of our Viable Computer System (VCS), the design grammar model innovating a hybrid VCS architectural representation of Beer's cybernetic Viable System Model (VSM). When applied to a previous genetically-modified system scenario, System One represents a metaphor for homeostasis. The set-theoretical framework defines research specifics, i.e. systems and their environments via algorithmic hot-swapping. Further functions and a set of disturbances are introduced, supplying a potential repertoire of tailored responses to open environmental change. Fundamental to promoting emergence, thus viability is Sommerhoff's concept of directive correlation and Ashby's notion of goal-directedness, i.e. the ability to achieve a goal-state under variations in the environment. Example identities exhibit potential for context-free portability including sets of values of environmental and behavioral variables and a set of outcomes allowing the system to develop an adaptive environmental model of fit responses illustrating temporal and autonomic properties of the VCS concept.","PeriodicalId":359942,"journal":{"name":"2010 IEEE 9th International Conference on Cyberntic Intelligent Systems","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130281445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Intelligent system for non-destructive evaluation of historic walls using Ground-Penetrating Radar","authors":"G. Safont, A. Salazar, J. Gosálbez, L. Vergara","doi":"10.1109/UKRICIS.2010.5898153","DOIUrl":"https://doi.org/10.1109/UKRICIS.2010.5898153","url":null,"abstract":"This paper presents a novel system for application in evaluation of ashlar masonry walls inspected with Ground Penetrating Radar (GPR). The system includes the following processing of the GPR signal: elimination of the background from the backscattered signals; depth resolution enhancing; automatic gain control for visualization; and automatic generation of B-Scans (radargrams) of the internal state of the wall. Inhomogeneities in the structure of the wall are detected from the B-Scans. Several experiments were made on scale models of historic ashlar masonry walls. Controlled loads with different weights were applied on the walls, and the corresponding B-Scans were obtained. It is demonstrated the capability of the system for the detection of nook and crack flaws, and for characterizing the deformations of the walls under different steps of weight loads.","PeriodicalId":359942,"journal":{"name":"2010 IEEE 9th International Conference on Cyberntic Intelligent Systems","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122338015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"CSM-based feature extraction for degraded machine printed character recognition","authors":"A. Namane, M. Maamoun, E. Soubari, P. Meyrueis","doi":"10.1109/UKRICIS.2010.5898105","DOIUrl":"https://doi.org/10.1109/UKRICIS.2010.5898105","url":null,"abstract":"This paper presents an OCR method for degraded character recognition applied to typewritten document produced by typesetting machine. The complementary similarity measure method (CSM) is a well known classification method and widely applied in the area of character recognition. In this work the CSM method is not only used as a classifier but also introduced as a feature extractor, and applied to degraded character recognition. The resulted CSM feature vector is used to train a multi layered perceptron (MLP). The use of the CSM as a feature extractor tends to boost the MLP and makes it very powerful and very well suited for rejection. Experimental results on n typewritten A4 page documents show the ability of the model to yield relevant and robust recognition on poor quality printed document characters.","PeriodicalId":359942,"journal":{"name":"2010 IEEE 9th International Conference on Cyberntic Intelligent Systems","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127724945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
F. Belkacem, M. Bensetti, M. Laour, A. Boutar, M. Djennah, D. Moussaoui, B. Mazari
{"title":"The analytical, numerical and neural network evaluation versus experimental of electromagnetic shielding effectiveness of a rectangular enclosure with apertures","authors":"F. Belkacem, M. Bensetti, M. Laour, A. Boutar, M. Djennah, D. Moussaoui, B. Mazari","doi":"10.1109/UKRICIS.2010.5898122","DOIUrl":"https://doi.org/10.1109/UKRICIS.2010.5898122","url":null,"abstract":"The development and investigation of approximate phenomenological models used to estimate the electromagnetic energy coupling through apertures into enclosures is presented in this paper. Some theoretical aspects of the electromagnetic field penetration into a rectangular enclosure through apertures are reviewed. It is shown that for a simple system topology analytical formulations based on a transmission line model give good predictions of the shielding effectiveness of a rectangular enclosure with apertures. Both the magnetic and electric shielding may be calculated as a function of frequency, enclosure dimensions, apertures dimensions and positions within the enclosure. This analytical approach is validated by comparing the shielding effectiveness predictions with full-field simulations using the finite-difference time-domain technique, software CST and experimental investigations of the shielding effectiveness in a semi anechoic chamber. Industrial needs in terms of EMC require that the experimental results of the shielding effectiveness are accurate for large frequency intervals. To meet this requirement, a neural network based model is used for the implementation of inverse models in order to estimate physical and geometrical parameters of enclosures. In this context an application is considered. It Concerns the evaluation of the shielding effectiveness (SE) parameter as a function of the frequency. During experimental measurements of the SE parameter we did not get enough resolution for intermediate frequencies [17].","PeriodicalId":359942,"journal":{"name":"2010 IEEE 9th International Conference on Cyberntic Intelligent Systems","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116769101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cloud based global positioning system as a safety monitor for dementia patients","authors":"James Geddes, K. Warwick","doi":"10.1109/UKRICIS.2010.5898085","DOIUrl":"https://doi.org/10.1109/UKRICIS.2010.5898085","url":null,"abstract":"The aim of using Gps for Alzheimer's Patients is to give carers and families of those affected by Alzheimer's Disease, as well as all the other dementia related conditions, a service that can, via SMS text message, notify them should their loved one leave their home. Through a custom website, it enables the carer to remotely manage a contour boundary that is specifically assigned to the patient as well as the telephone numbers of the carers. The technique makes liberal use of such as Google Maps.","PeriodicalId":359942,"journal":{"name":"2010 IEEE 9th International Conference on Cyberntic Intelligent Systems","volume":"71 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128680680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Bayesian model averaging over decision trees for assessing newborn brain maturity from electroencephalogram","authors":"L. Jakaite, V. Schetinin, C. Maple, J. Schult","doi":"10.1109/UKRICIS.2010.5898148","DOIUrl":"https://doi.org/10.1109/UKRICIS.2010.5898148","url":null,"abstract":"We use the Bayesian Model Averaging (BMA) over Decision Trees (DTs) for assessing newborn brain maturity from clinical EEG. We found that within this methodology an appreciable part of EEG features is rarely used in the DT models, because these features make weak contribution to the assessment. It was identified that the portion of DT models using weak EEG features is large. The negative impact of this is twofold. First, the use of weak features obstructs interpretation of DTs. Second, weak attributes increase dimensionality of a model parameter space needed to be explored in detail. We assumed that discarding the DTs using weak features will reduce the negative impact, and then proposed a new technique. This technique has been tested on some benchmark problems, and the results have shown that the original set of attributes can be reduced without a distinguishable decrease in BMA performance. On the EEG data, we found that the original set of features can be reduced from 36 to 12. Rerunning the BMA on the set of the 12 EEG features has slightly improved the performance.","PeriodicalId":359942,"journal":{"name":"2010 IEEE 9th International Conference on Cyberntic Intelligent Systems","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129590663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A survey of object recognition methods for automatic asset detection in high-definition video","authors":"Thomas Warsop, Sameer Singh","doi":"10.1109/UKRICIS.2010.5898117","DOIUrl":"https://doi.org/10.1109/UKRICIS.2010.5898117","url":null,"abstract":"Asset management systems allow organizations to efficiently store data pertaining to the physical location of important assets. Asset detection is a key component of such systems, the automation of which greatly increases efficiency and for which object recognition techniques are an obvious choice. Recently, High-Definition video capturing equipment has become more prolific in these systems. Data captured with such hardware provides more information regarding distant assets, which can be taken advantage of in asset management systems. In this report, we present a survey of object recognition techniques applicable to the scenario of automatic asset detection despite asset distance from the camera. We also present an experimental comparison of a selection of methods with distance-variant asset data.","PeriodicalId":359942,"journal":{"name":"2010 IEEE 9th International Conference on Cyberntic Intelligent Systems","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117222024","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}