By Topic

Fourth IEEE Conference on Cognitive Informatics, 2005. (ICCI 2005).

Date 8-10 Aug. 2005

Filter Results

Displaying Results 1 - 25 of 45
  • Cognitive computation: the Ersatz Brain project

    Publication Year: 2005, Page(s):2 - 3
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (222 KB) | HTML iconHTML

    The following discusses the Ersatz Brain project, a brain-like computing system, of Brown University. It tackles, in general, the proposed hardware and hardware parameters, the software application strategy and potential software applications suitable for its architecture, its technological vision, and the potential result of the project. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Psychological experiments on the cognitive complexities of fundamental control structures of software systems

    Publication Year: 2005, Page(s):4 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (323 KB) | HTML iconHTML

    The measurement of cognitive complexity and functional size of software systems are an age-long problem in software engineering. Although, the symbolic complexity of software may be measured in lines of code, the functional complexity of software is too abstract to be measured or even estimated. Because numerous attributes of software systems are highly dependent on the understanding and measurabi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Some advances in cognitive informatics

    Publication Year: 2005, Page(s):6 - 7
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (96 KB) | HTML iconHTML

    This paper summarizes a few recent developments in cognitive informatics, with special emphasis on signal processing for autonomic computing and its metrics. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fixpoint semantics for rule-base anomalies

    Publication Year: 2005, Page(s):10 - 17
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (443 KB) | HTML iconHTML

    A crucial component of an intelligent system is its knowledge base that contains knowledge about a problem domain. Knowledge base development involves domain analysis, context space definition, ontological specification, and knowledge acquisition, codification and verification. Knowledge base anomalies can affect the correctness and performance of an intelligent system. In this paper, we adopt a f... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The cognitive processes of abstraction and formal inferences

    Publication Year: 2005, Page(s):18 - 26
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (414 KB) | HTML iconHTML

    Theoretical research is predominately an inductive process; while applied research is mainly a deductive process. Both inference processes are based on the cognitive process and means of abstraction. This paper describes the cognitive processes of abstraction and formal inferences such as deduction, induction, abduction, and analogy. The hierarchy of abstraction and the descriptivity of abstract m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A brain-like computer for cognitive software applications: the Ersatz Brain project

    Publication Year: 2005, Page(s):27 - 36
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (685 KB) | HTML iconHTML

    We want to design a suitable computer for the efficient execution of the software now being developed that displays human-like cognitive abilities. Examples of these potential software applications include natural language understanding, text processing, conceptually based Internet search, natural human-computer interfaces, cognitively based data mining, sensor fusion, and image understanding. Req... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cognitive modelling using a logic-based algebra

    Publication Year: 2005, Page(s):37 - 42
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (177 KB) | HTML iconHTML

    We give an approach to cognitive modelling which allows for richer expression than the one based simply on the firing of sets of neurons. The object language of the approach is first-order logic augmented by operations of an algebra, PSEN. Some operations useful for this kind of modelling are postulated combination, comparison and inhibition of sets of sentences. It is shown how these operations c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Case-based introspective learning

    Publication Year: 2005, Page(s):43 - 48
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (251 KB) | HTML iconHTML

    Introspective learning, as a method to improve the learning efficiency, has become an active area of research. In this paper, introspective learning and a general introspective learning mode are discussed. Some related problems such as meta-level reasoning, taxonomy of failure, and the relation between case-based reasoning and introspective learning are represented. Based on the importance of case... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Topological-based classification using artificial gene networks

    Publication Year: 2005, Page(s):49 - 56
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (276 KB) | HTML iconHTML

    The topological properties of artificial gene networks that rely on the assessment of similarities between the expressions profile of gene pairs would be consistent with specific cellular states. Furthermore, some topological properties of the network would have significant variance regarding different cellular states. In this study, we proposed a novel and highly efficient computational framework... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A unified approach to fractal dimensions

    Publication Year: 2005, Page(s):58 - 72
    Cited by:  Papers (21)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (302 KB) | HTML iconHTML

    Many scientific papers treat the diversity of fractal dimensions as mere variations on either the same theme or a single definition. There is a need for a unified approach to fractal dimensions for there are fundamental differences between their definitions. This paper presents a new description of three essential classes of fractal dimensions based on: (i) morphology, (ii) entropy, and (iii) tran... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Theoretical study on a new information entropy and its use in attribute reduction

    Publication Year: 2005, Page(s):73 - 79
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (186 KB) | HTML iconHTML

    The positive region in rough set framework and Shannon conditional entropy are two traditional uncertainty measurements, used usually as heuristic metrics in attribute reduction. In this paper first a new information entropy is systematically compared with Shannon entropy, which shows its competence of another new uncertainty measurement. Then given a decision system we theoretically analyze the v... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A new model of generating chaos

    Publication Year: 2005, Page(s):80 - 85
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (264 KB) | HTML iconHTML

    According to the problem of being difficult to control randomicity of chaos series generated by neutral networks (NN), this paper presents a new model of generating chaos based on adaptive neurofuzzy, inference system (ANFIS) whose inside parameters are adjusted by delaminating-adaptation genetic algorithm. Simulation shows this new model can generate chaos series with excellent randomicity. And r... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Robust independent component analysis for cognitive informatics

    Publication Year: 2005, Page(s):86 - 92
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (423 KB) | HTML iconHTML

    This paper evaluates the outlier sensitivity of five independent component analysis (ICA) algorithms (FastICA, extended-Infomax, JADE, radical, and β-divergence) using: (i) the Amari separation performance index, (ii) the optimum angle of rotation error, and (iii) the contrast function difference, in an outlier-contaminated mixture simulation. The Amari separation performance index has reveal... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A novel fuzzy neural network: the vague neural network

    Publication Year: 2005, Page(s):94 - 99
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (503 KB) | HTML iconHTML

    Fuzzy neural network that combines the artificial neural network and fuzzy logic is regarded as one of promising intelligent system. Based on fuzzy theory, fuzzy neural network has its problems: fuzzy membership function is a single value which combines the evidence for and against the pattern without indicating how much there is of which, hence it cannot get the more reasonable result of classifi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysing the role of perceived self-efficacy in information processing for Web-based information systems

    Publication Year: 2005, Page(s):100 - 109
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (308 KB) | HTML iconHTML

    From the perspective of individuals' beliefs about their cognitive abilities to process information, understanding the use of Web-based information systems is a big challenge. Ensuring then the competent processing of information, on the basis of users' mental processes and states, guarantees successful use of Web-based information systems. However, this issue becomes critical when users interact ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Study of the protein-protein interaction networks via random graph approach

    Publication Year: 2005, Page(s):110 - 119
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (355 KB) | HTML iconHTML

    We employ the random graph theory approach to analyze the protein-protein interaction database DIP, for seven species. Several global topological parameters are used to characterize the protein-protein interaction networks (PINs) for each species. We find that the seven PINs are well approximated by the scale-free networks and the hierarchical models possibly except fruit fly. In particular, we de... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A model of attention-guided visual sparse coding

    Publication Year: 2005, Page(s):120 - 125
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (283 KB) | HTML iconHTML

    Sparse coding theory demonstrates that the neurons in primary visual cortex form a sparse representation of natural scenes in the viewpoint of statistics, but a typical scene contains many different patterns (corresponding to neurons in cortex) compete for neural representation because of the limited processing capacity of the visual system. We propose an attention-guided sparse coding model. This... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • How does the memory work? By timed-arc Petri nets

    Publication Year: 2005, Page(s):128 - 135
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (371 KB) | HTML iconHTML

    In this paper we use the graphical formalism timed-arc Petri nets to specify cognitive systems. In addition to the usual characteristics of this formalism, this timed extension of PNs features the possibility of capturing the facts of enabling/disabling a transition as a consequence of the time elapsed. This feature is useful to represent systems where the delays can strongly modify the state, suc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automatic high-dimensional association rule generation for large relational data sets

    Publication Year: 2005, Page(s):136 - 143
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1269 KB) | HTML iconHTML

    Data mining extracts knowledge from a large amount of data. It has been used in a variety of applications ranging from business and marketing to bioinformatics and genomics. Many data mining algorithms currently available, however, generate relatively simple rules that include a small number of attributes. Moreover, these algorithms need to build decision trees, which take a significant amount of ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Map element extraction model for pedestrian route guidance map

    Publication Year: 2005, Page(s):144 - 153
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (447 KB) | HTML iconHTML

    A model that can generate compact and intelligible route guidance maps is essential for distributing efficient information on pedestrian route guidance through mobile terminals. In this research, we focus on the fact that the existing route guidance maps have been prepared by considering the characteristics of people's spatial cognition. By analyzing which roads and buildings are represented in ex... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dimension reduction of microarray data based on local tangent space alignment

    Publication Year: 2005, Page(s):154 - 159
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (230 KB) | HTML iconHTML

    We introduce the new nonlinear dimension reduction method: LTSA, in dealing with the difficulty of analyzing high-dimensional, nonlinear microarray data. Firstly, we analyze the applicability of the method and we propose the reconstruction error of LTSA. The method is tested on Iris data set and acute leukemias microarray data. The results show good visualization performance. And LTSA outperforms ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cognitive information fusion of georeferenced data for tactical applications

    Publication Year: 2005, Page(s):160 - 166
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (333 KB) | HTML iconHTML

    Georeferenced data from multiple autonomous sources for defined AOI (areas of interest) can be fused and analyzed in support of various decision-making processes such as risk assessment, emergency response, situation awareness and tactical planning. However, data from multiple heterogeneous sources may be in different formats, scales, qualities and coverage. All these characteristics of multi-sour... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards a unified theory of spoken language processing

    Publication Year: 2005, Page(s):167 - 172
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (270 KB) | HTML iconHTML

    Spoken language processing is arguably the most sophisticated behavior of the most complex organism in the known universe and, unsurprisingly, scientists still have much to learn about how it works. Meanwhile, automated spoken language processing systems have begun to emerge in commercial applications, not as a result of any deep insights into the way in which humans process language, but largely ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On cognitive properties of human factors in engineering

    Publication Year: 2005, Page(s):174 - 182
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (495 KB) | HTML iconHTML

    Human traits and needs are the fundamental force underlying almost all phenomena in human task performances, engineering organizations, and societies. This paper explores the cognitive foundations of human traits and cognitive properties of human factors in engineering. The fundamental traits of human beings are identified, and the hierarchical model of basic human needs is formally describes. The... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • How to disregard irrelevant stimulus dimensions: evidence from comparative visual search

    Publication Year: 2005, Page(s):183 - 192
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (258 KB) | HTML iconHTML

    To what extent is it possible to disregard stimulus dimensions that are irrelevant to a certain task? This question was tackled in three experiments using the paradigm of comparative visual search. Reaction times and eye-movement data were recorded in order to study the cognitive processes in this series of tasks. For the data analysis, task-specific variables were defined and their values compute... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.