4,024 research outputs found
Two-phased knowledge formalisation for hydrometallurgical gold ore process recommendation and validation
This paper describes an approach to externalising and formalising expert knowledge involved in the design and evaluation of hydrometallurgical process chains for gold ore treatment. The objective was to create a case-based reasoning application for recommending and validating a treatment process of gold ores. We describe a twofold approach. Formalising human expert knowledge about gold mining situations enables the retrieval of similar mining contexts and respective process chains, based on prospection data gathered from a potential gold mining site. Secondly, empirical knowledge on hydrometallurgical treatments is formalised. This enabled us to evaluate and, where needed, redesign the process chain that was recommended by the first aspect of our approach. The main problems with formalisation of knowledge in the domain of gold ore refinement are the diversity and the amount of parameters used in literature and by experts to describe a mining context. We demonstrate how similarity knowledge was used to formalise literature knowledge. The evaluation of data gathered from experiments with an initial prototype workflow recommender, Auric Adviser, provides promising results
Reactive Rules for Emergency Management
The goal of the following survey on Event-Condition-Action (ECA) Rules is to come to a common understanding and intuition on this topic within EMILI. Thus it does not give an academic overview on Event-Condition-Action Rules which would be valuable for computer scientists only. Instead the survey tries to introduce Event-Condition-Action Rules and their use for emergency management based on real-life examples from the use-cases identified in Deliverable 3.1. In this way we hope to address both, computer scientists and security experts, by showing how the Event-Condition-Action Rule technology can help to solve security issues in emergency management. The survey incorporates information from other work packages, particularly from Deliverable D3.1 and its Annexes, D4.1, D2.1 and D6.2 wherever possible
A Domain Specific Lexicon Acquisition Tool for Cross-Language Information Retrieval
With the recent enormous increase of information dissemination via the web as incentive there is a growing interest in supporting tools for cross-language retrieval. In this paper we describe a disclosure and retrieval approach that fulfils the needs of both information providers and users by offering fast and cheap access to large amounts of documents from various language domains. Relevant information can be retrieved irrespective of the language used for the specification of a query. In order to realize this type of multilingual functionality the availability of several translation tools is needed, both of a generic and a domain specific nature. Domain specific tools are often not available or only against large costs. In this paper we will therefore focus on a way to reduce these costs, namely the automatic derivation of multilingual resources from so-called parallel text corpora. The benefits of this approach will be illustrated for an example system, i.e. the demonstrator developed within the project Twenty-One, which is tuned to information from the area of sustainable development
Reliable and robust detection of freezing of gait episodes with wearable electronic devices
A wearable wireless sensing system for assisting patients affected by Parkinson's disease is proposed. It uses integrated micro-electro-mechanical inertial sensors able to recognize the episodes of involuntary gait freezing. The system operates in real time and is designed for outdoor and indoor applications. Standard tests were performed on a noticeable number of patients and healthy persons and the algorithm demonstrated its reliability and robustness respect to individual specific gait and postural behaviors. The overall performances of the system are excellent with a specificity higher than 97%
Location based services in wireless ad hoc networks
In this dissertation, we investigate location based services in wireless ad hoc networks from four different aspects - i) location privacy in wireless sensor networks (privacy), ii) end-to-end secure communication in randomly deployed wireless sensor networks (security), iii) quality versus latency trade-off in content retrieval under ad hoc node mobility (performance) and iv) location clustering based Sybil attack detection in vehicular ad hoc networks (trust). The first contribution of this dissertation is in addressing location privacy in wireless sensor networks. We propose a non-cooperative sensor localization algorithm showing how an external entity can stealthily invade into the location privacy of sensors in a network. We then design a location privacy preserving tracking algorithm for defending against such adversarial localization attacks. Next we investigate secure end-to-end communication in randomly deployed wireless sensor networks. Here, due to lack of control on sensors\u27 locations post deployment, pre-fixing pairwise keys between sensors is not feasible especially under larger scale random deployments. Towards this premise, we propose differentiated key pre-distribution for secure end-to-end secure communication, and show how it improves existing routing algorithms. Our next contribution is in addressing quality versus latency trade-off in content retrieval under ad hoc node mobility. We propose a two-tiered architecture for efficient content retrieval in such environment. Finally we investigate Sybil attack detection in vehicular ad hoc networks. A Sybil attacker can create and use multiple counterfeit identities risking trust of a vehicular ad hoc network, and then easily escape the location of the attack avoiding detection. We propose a location based clustering of nodes leveraging vehicle platoon dispersion for detection of Sybil attacks in vehicular ad hoc networks --Abstract, page iii
Interference Effects in Quantum Belief Networks
Probabilistic graphical models such as Bayesian Networks are one of the most
powerful structures known by the Computer Science community for deriving
probabilistic inferences. However, modern cognitive psychology has revealed
that human decisions could not follow the rules of classical probability
theory, because humans cannot process large amounts of data in order to make
judgements. Consequently, the inferences performed are based on limited data
coupled with several heuristics, leading to violations of the law of total
probability. This means that probabilistic graphical models based on classical
probability theory are too limited to fully simulate and explain various
aspects of human decision making.
Quantum probability theory was developed in order to accommodate the
paradoxical findings that the classical theory could not explain. Recent
findings in cognitive psychology revealed that quantum probability can fully
describe human decisions in an elegant framework. Their findings suggest that,
before taking a decision, human thoughts are seen as superposed waves that can
interfere with each other, influencing the final decision.
In this work, we propose a new Bayesian Network based on the psychological
findings of cognitive scientists. We made experiments with two very well known
Bayesian Networks from the literature. The results obtained revealed that the
quantum like Bayesian Network can affect drastically the probabilistic
inferences, specially when the levels of uncertainty of the network are very
high (no pieces of evidence observed). When the levels of uncertainty are very
low, then the proposed quantum like network collapses to its classical
counterpart
- ā¦