Third International Conference on Information Technology and Applications (ICITA'05)最新文献

筛选
英文 中文
Real-time spoken affect classification and its application in call-centres 实时语音影响分类及其在呼叫中心中的应用
Donn Morrison, Ruili Wang, L. D. Silva, W. L. Xu
{"title":"Real-time spoken affect classification and its application in call-centres","authors":"Donn Morrison, Ruili Wang, L. D. Silva, W. L. Xu","doi":"10.1109/ICITA.2005.231","DOIUrl":"https://doi.org/10.1109/ICITA.2005.231","url":null,"abstract":"We propose a novel real-time affect classification system based on features extracted from the acoustic speech signal. The proposed system analyses the speech signal and provides a real-time classification of the speaker's perceived affective state. A neural network is trained and tested using a database of 391 authentic emotional utterances from 11 speakers. Two emotions, anger and neutral, are considered. The system is designed to be speaker and text-independent and is to be deployed in a call-centre environment to assist in the handling of customer inquiries. We achieve a success rate of 80.1% accuracy in our preliminary results.","PeriodicalId":371528,"journal":{"name":"Third International Conference on Information Technology and Applications (ICITA'05)","volume":"149 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129368588","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Implementation of velocity filtering for sequential architectures 时序结构中速度滤波的实现
S. Searle
{"title":"Implementation of velocity filtering for sequential architectures","authors":"S. Searle","doi":"10.1109/ICITA.2005.157","DOIUrl":"https://doi.org/10.1109/ICITA.2005.157","url":null,"abstract":"Velocity filtering is a means of detecting weak point targets in imagery sequences. Pixel intensity is accumulated under an assumed target velocity and detection is predicated upon this cumulative intensity. However the unknown target velocity necessitates implementation of an entire bank of velocity filters, which requires dedicated hardware in order to be feasible. This paper describes some heuristic search methods which may be used to facilitate implementation of velocity filtering on a sequential computer. Criteria for ordering a pixel-first search through the candidate space are described. A best-first paradigm is also suggested as an alternative to pixel-first search. Monte-Carlo simulations show that both approaches are more efficient and yield better results than an arbitrary-order search of the candidate space.","PeriodicalId":371528,"journal":{"name":"Third International Conference on Information Technology and Applications (ICITA'05)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128500746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Multivariate interdependent discretization for continuous attribute 连续属性的多元相互离散化
S. Chao, Yiping Li
{"title":"Multivariate interdependent discretization for continuous attribute","authors":"S. Chao, Yiping Li","doi":"10.1109/ICITA.2005.188","DOIUrl":"https://doi.org/10.1109/ICITA.2005.188","url":null,"abstract":"Decision tree is one of the most widely used and practical methods in the data mining and machine learning discipline. However, many discretization algorithms developed in this field focus on univariate only, which is inadequate to handle the critical problems especially owned by medical domain. In this paper, we propose a new multivariate discretization method called multivariate interdependent discretization for continuous attributes - MIDCA. Our novel algorithm can minimize the uncertainty between the interdependent attribute and the continuous-valued attribute, and at the same time to maximize their correlation. The empirical results demonstrate a comparison of performance of various decision tree algorithms on twelve real-life datasets from UCI repository.","PeriodicalId":371528,"journal":{"name":"Third International Conference on Information Technology and Applications (ICITA'05)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128751164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Agent-based network intrusion detection system using data mining approaches 基于agent的网络入侵检测系统采用数据挖掘方法
Cheung-Leung Lui, Tak-Chung Fu, Ting-Yee Cheung
{"title":"Agent-based network intrusion detection system using data mining approaches","authors":"Cheung-Leung Lui, Tak-Chung Fu, Ting-Yee Cheung","doi":"10.1109/ICITA.2005.57","DOIUrl":"https://doi.org/10.1109/ICITA.2005.57","url":null,"abstract":"Most of the existing commercial NIDS products are signature-based but not adaptive. In this paper, an adaptive NIDS using data mining technology is developed. Data mining approaches are used to accurately capture the actual behavior of network traffic, and portfolio mined is useful for differentiating \"normal\" and \"attack\" traffics. On the other hand, most of the current researches are using only one engine for detection of various attacks; the proposed system is constructed by a number of agents, which are totally different in both training and detecting processes. Each of the agents has its own strength on capturing a kind of network behavior and hence the system has strength on detecting different types of attack. In addition, its ability on detecting new types of attack as well as a higher tolerant to fluctuations were shown. The experimental results showed that the frequent patterns mined from the audit data could be used as reliable agents, which outperformed from traditional signature-based NIDS.","PeriodicalId":371528,"journal":{"name":"Third International Conference on Information Technology and Applications (ICITA'05)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128759068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
The Ant Algorithm for Solving Robot Path Planning Problem 求解机器人路径规划问题的蚁群算法
Gengqian Liu, Tiejun Li, Yuqing Peng, Xiangdan Hou
{"title":"The Ant Algorithm for Solving Robot Path Planning Problem","authors":"Gengqian Liu, Tiejun Li, Yuqing Peng, Xiangdan Hou","doi":"10.1109/ICITA.2005.268","DOIUrl":"https://doi.org/10.1109/ICITA.2005.268","url":null,"abstract":"Using ant algorithm, robot path planning in two-dimension environment is studied. It introduces the intelligent finding optimum mechanism of ant colony. It solves the drawback of local optimization and expedites searching speed. The mathematical model is established and the algorithm is achieved with VB language, the result shows it is valid with the capability of robust and extensibility","PeriodicalId":371528,"journal":{"name":"Third International Conference on Information Technology and Applications (ICITA'05)","volume":"463 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115921845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 65
Partition-Based Parallel PageRank Algorithm 基于分区的并行PageRank算法
A. Rungsawang, Bundit Manaskasemsak
{"title":"Partition-Based Parallel PageRank Algorithm","authors":"A. Rungsawang, Bundit Manaskasemsak","doi":"10.1109/ICITA.2005.207","DOIUrl":"https://doi.org/10.1109/ICITA.2005.207","url":null,"abstract":"A re-ranking technique, called \"PageRank\", brings a successful story behind the Googletrade search engine. Many studies focus on finding an efficient way to compute the PageRank scores of a large web graph. Researchers propose to compute them sequentially by reducing the I/O cost of disk access, improving the convergence rate, or even employing peer-2-peer architecture, etc. However, only a few concentrate on computation using parallel processing techniques. In this paper, we propose a partition-based parallel PageRank algorithm that can efficiently be run on a low-cost parallel environment like PC cluster. For comparison, we also study other two well-known PageRank techniques, and provide an analytical discussion of their performance in terms of I/O and synchronization cost, as well as memory usage. Experimental results show a promising improvement on a large artificial web graph synthesized from the TH domain","PeriodicalId":371528,"journal":{"name":"Third International Conference on Information Technology and Applications (ICITA'05)","volume":"791 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115758911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Uncovering attacks on security protocols 揭露对安全协议的攻击
Wuu Yang
{"title":"Uncovering attacks on security protocols","authors":"Wuu Yang","doi":"10.1109/ICITA.2005.292","DOIUrl":"https://doi.org/10.1109/ICITA.2005.292","url":null,"abstract":"Security protocols are indispensable in secure communication. We give an operational semantics of security protocols in terms of a Prolog-like language. With this semantics, we can uncover attacks on a security protocol that are possible with no more than a given number of rounds. Though our approach is exhaustive testing, the majority of fruitless search is cut off by selecting a small number of representative values that could be sent by an attacker. Hence, the number of scenarios is relatively small and our method is quite practical. Furthermore, our method not only reports possible attacks but also describes the attacks in great detail. This description would be very helpful to protocol designers and analyzers.","PeriodicalId":371528,"journal":{"name":"Third International Conference on Information Technology and Applications (ICITA'05)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115231031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Towards a Web digital archive ontological unification 迈向网络数字档案本体统一
Juan P. Palacios, J. Cremades, Carmen Costilla
{"title":"Towards a Web digital archive ontological unification","authors":"Juan P. Palacios, J. Cremades, Carmen Costilla","doi":"10.1109/ICITA.2005.289","DOIUrl":"https://doi.org/10.1109/ICITA.2005.289","url":null,"abstract":"The Web is a universal space where a huge amount of information is daily published. Digital archives (DA) constitute a valuable documentary domain to be propagated through the Web. But the virtual integration of Web heterogeneous data sources is a difficult task nowadays. This paper deals with the semantic integration of many specific DA ontologies. Beforehand, we have proposed a virtual and dynamic Web integrated architecture, based on mediator and wrapper layers. This paper is focused on a unified DA ontological proposal allocated at the mediator layer. Coming from the ISAD(G) and ISAAR(CPF) International Archival standards, two specific archival ontologies: ISAD-0 and ISAAR-0 are introduced. Besides, we have built the integrated parliamentary management system, SIAPI (successfully running at the Asamblea of Madrid since 1999) that contains a powerful parliamentary archive system. From it, we have built the SIAP-0 specific parliamentary archive ontology. Above all these ontologies, a global ontological kernel (GOK) is here introduced. The GOK, as a unifying umbrella, provides the attachment of many pre-existing specific DA ontologies. In the future, this GOK will make possible that the user query will be firstly pre-processed against to a personalized ontology, inferred from the GOK and tailored to each Web user preference's profile.","PeriodicalId":371528,"journal":{"name":"Third International Conference on Information Technology and Applications (ICITA'05)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114899704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
"RoboPress" — An Automated Mobile Press for Manufacturing Concrete Products “RoboPress”& # 8212;一种用于制造混凝土制品的自动移动压机
G. Adam, E. Grant, Gordon K. Lee
{"title":"\"RoboPress\" — An Automated Mobile Press for Manufacturing Concrete Products","authors":"G. Adam, E. Grant, Gordon K. Lee","doi":"10.1109/ICITA.2005.2","DOIUrl":"https://doi.org/10.1109/ICITA.2005.2","url":null,"abstract":"This paper presents innovative manufacturing and control procedures applied in the design, construction and operation, of a mobile hydraulic press machine (RoboPress). The research demonstrates how the design of an automated mobile manufacturing system can be optimized through using qualitative modeling and simulation from artificial intelligence","PeriodicalId":371528,"journal":{"name":"Third International Conference on Information Technology and Applications (ICITA'05)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125379532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
E-DM: A QoS-Enabled Storage Service Schedule System in Shared Storage Environment E-DM:共享存储环境下支持qos的存储服务调度系统
Yong Feng, Yan-yuan Zhang
{"title":"E-DM: A QoS-Enabled Storage Service Schedule System in Shared Storage Environment","authors":"Yong Feng, Yan-yuan Zhang","doi":"10.1109/ICITA.2005.121","DOIUrl":"https://doi.org/10.1109/ICITA.2005.121","url":null,"abstract":"This paper introduces E-DM, a QoS-enabled storage service schedule system, which provides performance virtualization in shared storage environment. It uses EPYFQ scheduling algorithm to schedule requests from virtual disks according to their shares, and can satisfy the following three requirements demanded by performance virtualization, performance isolation, fairness and throughput. We also evaluate E-DM from the above three aspects. Our results show that E-DM has good ability of performance isolation and fairness. Besides, we can adjust the tradeoff between tight resource control and throughput of storage system through the parameter epsiv","PeriodicalId":371528,"journal":{"name":"Third International Conference on Information Technology and Applications (ICITA'05)","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126110663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信