Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








51,821 Hits in 5.7 sec

A Multi-intelligent Agent System for Automatic Construction of Rule-based Expert System

Mohammed Abbas Kadhim, M. Afshar Alam, Harleen Kaur
2016 International Journal of Intelligent Systems and Applications  
The main general purpose of this research is the automatic construction of rule-based expert system in diagnosis domain based on an expert system tool and a multi-intelligent agent system.  ...  Index Terms-Intelligent agent system, Expert system shell, Rule-based expert system, Automatic construction of ES, Heart disease diagnosis.  ...  Kamaljit Singh in Kamal Medicare Clinic for their role in the system evaluation and knowledge acquisition processes.  ... 
doi:10.5815/ijisa.2016.09.08 fatcat:3xnilkg6f5bw7pyrw6r3amdb2e

Decision Fusion for Face Authentication [chapter]

Jacek Czyz, Mohammad Sadeghi, Josef Kittler, Luc Vandendorpe
2004 Lecture Notes in Computer Science  
The experiments performed on a realistic database demonstrate that the fully automatic multi-frame -multi-experts system proposed in this work allows a significant improvement over the staticsingle-expert  ...  system.  ...  The expert using LDA face verification and the SVM-based face localisation is referred to as LDA1. The expert called SVM is using the SVM-based verification and localisation.  ... 
doi:10.1007/978-3-540-25948-0_93 fatcat:iccf54y32rfmhlt3qgml44rbfy

Learning Strategies for Knowledge-Base Updating in Online Signature Verification Systems [chapter]

Giuseppe Pirlo, Donato Impedovo, Donato Barbuzzi
2013 Lecture Notes in Computer Science  
This paper addresses the problem of knowledge-base updating in multi-expert signature verification systems and introduces a new strategy which exploits the collective behavior of classifiers to select  ...  In fact, signature characteristics vary in time and whatever approach is considered the effectiveness of a signature verification system strongly depends on the extent to which reference information is  ...  This paper proposes, as Figure 1 shows, the selection of the valuable samples useful to update the knowledge-base of all experts of the set, correctly recognized by the multi-expert system.  ... 
doi:10.1007/978-3-642-41190-8_10 fatcat:732yvl3ljfg77j2y52tvcakihi

Automatic verification of a knowledge base by using a multi-criteria group evaluation with application to security screening at an airport

Jacek Skorupski
2015 Knowledge-Based Systems  
Ahn and Choi [2] proposed using 212 multi-criteria decision-making methods to solve the problem of 213 conflicting rules in expert systems.  ...  Comparison (verification) of expert and automatically generated rules.  ...  The first approach is more advantageous if one has great confi-1041 dence in particular experts and when the aim is to check whether 1042 the group followed correct principles when formulating the rules  ... 
doi:10.1016/j.knosys.2015.05.004 fatcat:hkf6w6p2pndlrpuverqpkgilku

Expert Knowledge Based Design and Verification of Secure Systems with Embedded Devices [chapter]

Vasily Desnitsky, Igor Kotenko
2014 Lecture Notes in Computer Science  
The paper proposes an approach to elicit security knowledge for subsequent use in automated design and verification tools for secure systems with embedded devices.  ...  The sweeping growth of the amount of embedded devices together with their extensive spread pose extensively new design challenges for protection of embedded systems against a wide set of security threats  ...  This research is being supported by grants of the Russian Foundation of Basic Research (projects 13-01-00843, 13-07-13159, 14-07-00697, 14-07-00417), the Program of fundamental research of the Department  ... 
doi:10.1007/978-3-319-10975-6_15 fatcat:pdsoi7uetjgmbfpyzto6i6shnm

Three phase verification for spoken dialog clarification

Sangkeun Jung, Cheongjae Lee, Gary Geunbae Lee
2006 Proceedings of the 11th international conference on Intelligent user interfaces - IUI '06  
The experiment results demonstrate that the three phase verification could effectively catch the word and utterance-level errors in order to increase the SLU (spoken language understanding) performance  ...  for recovering the errors using the three phase verification.  ...  Experts of each domain are implemented by designing the 'situation-based rules' for the corresponding domain Example 1: Examples of the three-phase verification User Utterance & Speech Recognized  ... 
doi:10.1145/1111449.1111468 dblp:conf/iui/JungLL06 fatcat:e3vjiinlmvc2vfftrwrnaczpeq

Anti-spoofing in Action: Joint Operation with a Verification System

Ivana Chingovska, Andre Anjos, Sebastien Marcel
2013 2013 IEEE Conference on Computer Vision and Pattern Recognition Workshops  
For a specific usecase covering face verification, experiments show to what extent simple fusion improves the trustworthiness of the system when exposed to spoofing attacks.  ...  In this paper, we study techniques for decisionlevel and score-level fusion to integrate a recognition and anti-spoofing systems, using an open-source framework that handles the ternary classification  ...  The fusion rules can be applied to combine experts which work with the same biometric modality (like multi-sensor, multi-algorithm, multi-instance and multisample systems) or different biometric modalities  ... 
doi:10.1109/cvprw.2013.22 dblp:conf/cvpr/ChingovskaAM13 fatcat:jqkg7fsxjngshl7il5onwichp4

Knowledge acquisition based on explicit representation

Jhyfang Hu, Jerzy W. Rozenblit
1991 Expert systems with applications  
Abstractmln recent years, knowledge-based systems have become one of the most popular approaches for solving engineering problems.  ...  By exploiting the structured nature and well-defined axioms of the representation scheme, acquisition queries and verification rules are generated automatically.  ...  The purpose of RC verification is to help develop a robust rule base.  ... 
doi:10.1016/0957-4174(91)90054-i fatcat:bff7vgn77vhgnnwwgq3kly6drm

Multi-agent cooperation for particle accelerator control

Paul Skarek, LászlóZsolt Varga
1996 Expert systems with applications  
A generalized hypothesis is introduced, based on a unified view of control, monitoring, diagnosis, maintenance and repair tasks leading to a general method of cooperation for expert systems by exchanging  ...  We present practical investigations in a real industrial controls environment for justifying theoretical DAI (Distributed Artificial Intelligence) results, and we discuss theoretical aspects of practical  ...  learning in a multi-agent system by rule compilation from simulation runs in another agent.  ... 
doi:10.1016/s0957-4174(96)00064-4 fatcat:zgcrgenuhnatfft43ragjllfd4

Semantics-based plausible reasoning to extend the knowledge coverage of medical knowledge bases for improved clinical decision support

Hossein Mohammadhassanzadeh, William Van Woensel, Samina Raza Abidi, Syed Sibte Raza Abidi
2017 BioData Mining  
To extend the coverage of incomplete medical knowledge-based systems beyond their deductive closure, and thus enhance their decision-support capabilities, we argue that innovative, multi-strategy reasoning  ...  In this paper, we present a Semantic Web-based, multi-strategy reasoning approach, which integrates deductive and plausible reasoning and exploits Semantic Web technology to solve complex clinical decision  ...  Funding The authors acknowledge the support of Natural Sciences and Engineering Research Council (NSERC) Canada. This research is supported by a NSERC Discovery Grant.  ... 
doi:10.1186/s13040-017-0123-y pmid:28203277 pmcid:PMC5303296 fatcat:yhynsn6pfbardc5d5izjedtlau

Handwriting verification – Comparison of a multi-algorithmic and a multi-semantic approach

Tobias Scheidat, Claus Vielhauer, Jana Dittman
2009 Image and Vision Computing  
In this paper, a comparison of an existing multi-algorithmic and a new multi-semantic fusion approach for biometric online handwriting user verification is presented.  ...  Second, based on the best two algorithms and the best weighting strategy found during the test of the multi-algorithmic approach, a new multi-semantic fusion approach using a pair wise combination of four  ...  The work on biometric hashes for verification purposes is partly supported by the Deutsche Forschungsgemeinschaft (DFG, German Research Foundation).  ... 
doi:10.1016/j.imavis.2007.03.006 fatcat:xpvtey6eurabrootoaboo4xibq

An Exploration on the Developing of Expert System in Transport Engineering

Shuhairy Norhisham, Amiruddin Ismail, Muhamad Nazri Borhan, Herda Yati Katman, M.J. Zainorizuan, L. Yee Yong, L. Alvin John Meng Siang, O. Mohamad Hanifi, R. Siti Nazahiyah, A. Mohd Shalahuddin
2017 MATEC Web of Conferences  
This paper aims to determine the expert system developed from past research observations. This overview of expert system indicates the use of system which have slight affects on the results.  ...  Two main components categorized for this paper are knowledge base obtained from previous study and a comparative study between the expert system to get a summary of the best inference engine, knowledge  ...  level.  ... 
doi:10.1051/matecconf/201710309014 fatcat:al5ie7upijftbeckhv36w2fixm

GPC: An Expert System Based on Multi-branch Structure for Grass Pest Control Information [chapter]

Zhigang Wu, Zehua Zhang, Wenxin Li, Guangjun Wang, Zhihong Li
2012 IFIP Advances in Information and Communication Technology  
Herein, we develop and evaluate GPC (Grass Pest Control information system), a web-based expert system for identification of grass pests, which included more than 50 species of grass pests.  ...  Based on user needs, GPC was developed with ASP.NET, C# and Microsoft SQL server 2008 database.  ...  Inference process Most of traditional expert systems for assistant diagnosis of green plant pests are based on dichotomous structure, which is rule-based.  ... 
doi:10.1007/978-3-642-27281-3_29 fatcat:jjacp2c52nec5ebzgh6ks2lg2i

Special issue: software verification and testing

Mohammad Reza Mousavi, Jun Pang
2013 Innovations in Systems and Software Engineering  
To achieve his research goal, Affeldt first introduces a formalisation of data structures for signed multi-precision arithmetic in low-level programs.  ...  The SVT track's topics of interest include: tools and techniques for verification of large scale software systems, real world applications and case studies applying software verification, static and run-time  ...  To achieve his research goal, Affeldt first introduces a formalisation of data structures for signed multi-precision arithmetic in low-level programs.  ... 
doi:10.1007/s11334-013-0211-1 fatcat:win6zy5fwffjnlh5mtzu4uvc64

Colour Fusion in Face Authentication System Based on Visible and Near Infrared Images

Seyed Mohammad Sadegh Tabatabaeifar, Mohsen Lashkargir, Sadegh Taghizadeh, Hadi Karimi Tafti
2011 International Journal on Advanced Science, Engineering and Information Technology  
or NIR-based face verification systems.  ...  First, the performance of system in each of the primary colour spaces of visible and near-infrared spectrum is evaluated that the verification process is based on the Normalised Correlation measure within  ...  Most current face verification systems are based on face images taken in the visible spectrum (0.3-0.7µm).  ... 
doi:10.18517/ijaseit.1.4.78 fatcat:mkdsgmwgbfcvxn3djim73d55eq
« Previous Showing results 1 — 15 out of 51,821 results