181 research outputs found

    Deriving explanations from partial temporal information

    Get PDF
    The representation and manipulation of natural human understanding of temporal phenomena is a fundamental field of study in Computer Science, which aims both to emulate human thinking, and to use the methods of human intelligence to underpin engineering solutions. In particular, in the domain of Artificial Intelligence, temporal knowledge may be uncertain and incomplete due to the unavailability of complete and absolute temporal information. This paper introduces an inferential framework for deriving logical explanations from partial temporal information. Based on a graphical representation which allows expression of both absolute and relative temporal knowledge in incomplete forms, the system can deliver a verdict to the question if a given set of statements is temporally consistent or not, and provide understandable logical explanation of analysis by simplified contradiction and rule based reasoning

    Design and Implementation of a Wireless Sensor Network for Smart Homes

    Full text link
    Wireless sensor networks (WSNs) have become indispensable to the realization of smart homes. The objective of this paper is to develop such a WSN that can be used to construct smart home systems. The focus is on the design and implementation of the wireless sensor node and the coordinator based on ZigBee technology. A monitoring system is built by taking advantage of the GPRS network. To support multi-hop communications, an improved routing algorithm based on the Dijkstra algorithm is presented. Preliminary simulations have been conducted to evaluate the performance of the algorithm.Comment: International Workshop on Mobile Cyber-Physical Systems (MobiCPS 2010), in conjunction with UIC2010, IEEE, Xi'an, China, 26 - 29 October, 201

    Ontology mapping of business process modeling based on formal temporal logic

    Get PDF
    A business process is the combination of a set of activities with logical order and dependence, whose objective is to produce a desired goal. Business process modeling (BPM) using knowledge of the available process modeling techniques enable a common understanding and analysis of a business process. Industry and academics use informal and formal methods respectively to represent business processes (BP), having the main objective to support an organization. Despite both are aiming at BPM but the methods used are quite different in their semantics. While carrying out literature research, it has been found that there is no general representation of business process modeling is available that is expressive than the commercial modeling tools and techniques. Therefore, it is primarily conceived to provide an ontology mapping of modeling terms of Business Process Modeling Notation (BPMN), Unified Modeling Language (UML) Activity Diagrams (AD) and Event Driven Process Chains (EPC) to temporal logic. Being a formal system, first order logic assists in thorough understanding of process modeling and its application. However, our contribution is to devise a versatile conceptual categorization of modeling terms/constructs and also formalizing them, based on well accepted business notions, such as action, event, process, sub-process, connector and flow. It is demonstrated that the new categorization of modeling terms mapped to formal temporal logic, provides the expressive power to subsume business process modeling techniques i.e. BPMN, UML AD and EPC

    The effect that auditory distractions have on a visual P300 speller while utilizing low-cost off-the-shelf equipment

    Get PDF
    This paper investigates the effect that selected auditory distractions have on the signal of a visual P300 Speller in terms of accuracy, amplitude, latency, user preference, signal morphology, and overall signal quality. In addition, it ensues the development of a hierarchical taxonomy aimed at categorizing distractions in the P300b domain and the effect thereof. This work is part of a larger electroencephalography based project and is based on the P300 speller brain–computer interface (oddball) paradigm and the xDAWN algorithm, with eight to ten healthy subjects, using a non-invasive brain–computer interface based on low-fidelity electroencephalographic (EEG) equipment. Our results suggest that the accuracy was best for the lab condition (LC) at 100%, followed by music at 90% (M90) at 98%, trailed by music at 30% (M30) and music at 60% (M60) equally at 96%, and shadowed by ambient noise (AN) at 92.5%, passive talking (PT) at 90%, and finally by active listening (AL) at 87.5%. The subjects’ preference prodigiously shows that the preferred condition was LC as originally expected, followed by M90, M60, AN, M30, AL, and PT. Statistical analysis between all independent variables shows that we accept our null hypothesis for both the amplitude and latency. This work includes data and comparisons from our previous papers. These additional results should give some insight into the practicability of the aforementioned P300 speller methodology and equipment to be used for real-world applications

    Adaptive digital watermarking scheme based on support vector machines and optimized genetic algorithm

    Get PDF
    Digital watermarking is an effective solution to the problem of copyright protection, thus maintaining the security of digital products in the network. An improved scheme to increase the robustness of embedded information on the basis of discrete cosine transform (DCT) domain is proposed in this study. The embedding process consisted of two main procedures. Firstly, the embedding intensity with support vector machines (SVMs) was adaptively strengthened by training 1600 image blocks which are of different texture and luminance. Secondly, the embedding position with the optimized genetic algorithm (GA) was selected. To optimize GA, the best individual in the first place of each generation directly went into the next generation, and the best individual in the second position participated in the crossover and the mutation process. The transparency reaches 40.5 when GA’s generation number is 200. A case study was conducted on a 256 × 256 standard Lena image with the proposed method. After various attacks (such as cropping, JPEG compression, Gaussian low-pass filtering (3, 0. 5), histogram equalization, and contrast increasing (0.5, 0.6)) on the watermarked image, the extracted watermark was compared with the original one. Results demonstrate that the watermark can be effectively recovered after these attacks. Even though the algorithm is weak against rotation attacks, it provides high quality in imperceptibility and robustness and hence it is a successful candidate for implementing novel image watermarking scheme meeting real timelines

    Security and privacy for data mining of RFID-enabled product supply chains

    Get PDF
    The e-Pedigree used for verifying the authenticity of the products in RFID-enabled product supply chains plays a very important role in product anti-counterfeiting and risk management, but it is also vulnerable to malicious attacks and privacy leakage. While the radio frequency identification (RFID) technology bears merits such as automatic wireless identification without direct eye-sight contact, its security has been one of the main concerns in recent researches such as tag data tampering and cloning. Moreover, privacy leakage of the partners along the supply chains may lead to complete compromise of the whole system, and in consequence all authenticated products may be replaced by the faked ones! Quite different from other conventional databases, datasets in supply chain scenarios are temporally correlated, and every party of the system can only be semi-trusted. In this paper, a system that incorporates merits of both the secure multi-party computing and differential privacy is proposed to address the security and privacy issues, focusing on the vulnerability analysis of the data mining with distributed EPCIS datasets of e-pedigree having temporal relations from multiple range and aggregate queries in typical supply chain scenarios and the related algorithms. Theoretical analysis shows that our proposed system meets perfectly our preset design goals, while some of the other problems leave for future research
    • …
    corecore