Search results for "Information Systems"

showing 10 items of 1926 documents

Agents in dynamic contexts, a system for learning plans

2020

Reproducing the human ability to cooperate and collaborate in a dynamic environment is a significant challenge in the field of human-robot teaming interaction. Generally, in this context, a robot has to adapt itself to handle unforeseen situations. The problem is runtime planning when some factors are not known before the execution starts. This work aims to show and discuss a method to handle this kind of situation. Our idea is to use the Belief-Desire-Intention agent paradigm, its the Jason reasoning cycle and a Non-Axiomatic Reasoning System. The result is a novel method that gives the robot the ability to select the best plan.

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniReasoning systemComputer science020207 software engineeringContext (language use)02 engineering and technologyPlan (drawing)Field (computer science)Human–robot interactionPlanningWork (electrical)Human–computer interaction020204 information systems0202 electrical engineering electronic engineering information engineeringRobotBDIHuman-robot interactionJason
researchProduct

Resilient hexapod robot

2017

In this paper, we present a method of learning desired behaviour of the specific robotic system and transfer of the existing knowledge in the event of partial system failure. Six-legged robot (hexapod) built on top of the Bioloid platform is used for the method verification. We use genetic algorithms to optimize the hexapod's gait, after which we simulate physical damage caused to the robot. The goal of this method is to optimize the gait in accordance with the actual robot morphology, instead of the assumed one. Also, knowledge that was previously gained will be transferred in order to improve the results. Nonstandard genetic algorithm with the specific mixed population is used for this.

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniRobot kinematicseducation.field_of_studyHexapodControl and OptimizationEvent (computing)PopulationControl engineeringMicrocontrollerGait (human)machine learningComputer Networks and CommunicationGenetic algorithmArtificial IntelligenceGenetic algorithmRoboteducationresilienceInformation Systems
researchProduct

A genetic algorithm for the design of a fuzzy controller for active queue management

2003

Active queue management (AQM) policies are those\ud policies of router queue management that allow for the detection of network congestion, the notification of such occurrences to the\ud hosts on the network borders, and the adoption of a suitable control\ud policy. This paper proposes the adoption of a fuzzy proportional\ud integral (FPI) controller as an active queue manager for Internet\ud routers. The analytical design of the proposed FPI controller is\ud carried out in analogy with a proportional integral (PI) controller,\ud which recently has been proposed for AQM. A genetic algorithm is\ud proposed for tuning of the FPI controller parameters with respect\ud to optimal disturbance rej…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniRouterQueue management systemComputer sciencePID controllerFuzzy control systemRandom early detectionTCP Congestion ControlActive queue managementNetwork CongestionFuzzy logicComputer Science ApplicationsHuman-Computer InteractionNetwork congestionControl and Systems EngineeringControl theoryElectrical and Electronic EngineeringTail dropActive Queue ManagementSoftwareFuzzy Controllers.Information SystemsIEEE Transactions on Systems, Man and Cybernetics, Part C (Applications and Reviews)
researchProduct

Vulnerability evaluation of distributed reputation management systems

2017

In distributed environments, Reputation Management Systems (RMSs) aim to estimate agents' trustworthiness by exploiting different sources of information. The distributed nature of these systems makes them vulnerable to several types of security attacks, and the response provided by a specific RMS depends on various factors, such as the algorithms adopted for estimating the reputation values and the communication protocols used to enable the cooperation among agents. This work examines the most important security attacks against RMSs and proposes a set of metrics for a quantitative evaluation of the RMS vulnerabilities. A parallel simulation framework is used to automatically give a vulnerab…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniSecurity attackComputer sciencemedia_common.quotation_subjectVulnerability020206 networking & telecommunications02 engineering and technologyComputer securitycomputer.software_genreSet (abstract data type)Parallel simulationTrustworthinessDistributed reputation management020204 information systemsVulnerability evaluation0202 electrical engineering electronic engineering information engineeringData miningCommunications protocolcomputerInstrumentationReputation managementEvaluation metricReputationmedia_common
researchProduct

Elicitation and evaluation of zoom gestures for touchless interaction with desktop displays

2019

Touchless gestural interaction has been widely studied and adopted in many contexts. Furthermore, the growing availability of low-cost enabling devices, such as Kinect or Leap Motion, boosted up the interest in such interaction both for commercial and scientific purposes, both for large public displays and for personal displays. The problem of choosing the right touchless gesture for the right action is thus still an open issue, depending on several aspects, such as context, purpose, users' culture, etc. In this work, we first present the results of a gesture elicitation study that allowed us to identify a set of touchless gestures for performing zoom actions while interacting with desktop …

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniSettore INF/01 - Informaticabusiness.industryComputer sciencetouchless interaction gesture elicitation desktop displays020207 software engineeringContext (language use)WorkloadUsability02 engineering and technologyPreferenceAction (philosophy)Human–computer interaction020204 information systems0202 electrical engineering electronic engineering information engineeringZoombusinessSet (psychology)GestureProceedings of the 8th ACM International Symposium on Pervasive Displays
researchProduct

Investigating Proactive Search Support in Conversations

2018

Conversations among people involve solving disputes, building common ground, and reinforce mutual beliefs and assumptions. Conversations often require external information that can support these human activities. In this paper, we study how a spoken conversation can be supported by a proactive search agent that listens to the conversation, detects entities mentioned in the conversation, and proactively retrieves and presents information related to the conversation. A total of 24 participants (12 pairs) were involved in informal conversations, using either the proactive search agent or a control condition that did not support conversational analysis or proactive information retrieval. Data c…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniStructure (mathematical logic)Settore INF/01 - InformaticaComputer sciencemedia_common.quotation_subject05 social sciencesControl (management)Common ground02 engineering and technology113 Computer and information sciencesvoice interfacesWorld Wide Web020204 information systems0202 electrical engineering electronic engineering information engineeringKey (cryptography)Natural (music)0501 psychology and cognitive sciencesConversationbackground speechspoken conversation supportproactive search050107 human factorsmedia_common
researchProduct

Adaptive distributed outlier detection for WSNs.

2014

The paradigm of pervasive computing is gaining more and more attention nowadays, thanks to the possibility of obtaining precise and continuous monitoring. Ease of deployment and adaptivity are typically implemented by adopting autonomous and cooperative sensory devices; however, for such systems to be of any practical use, reliability and fault tolerance must be guaranteed, for instance by detecting corrupted readings amidst the huge amount of gathered sensory data. This paper proposes an adaptive distributed Bayesian approach for detecting outliers in data collected by a wireless sensor network; our algorithm aims at optimizing classification accuracy, time complexity and communication com…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniUbiquitous computingComputer scienceReal-time computingFault toleranceEnergy consumptionWSNComputer Science ApplicationsOutlier Detection.Human-Computer InteractionKey distribution in wireless sensor networksControl and Systems EngineeringBayesian NetworkOutlierAnomaly detectionElectrical and Electronic EngineeringCommunication complexityWireless sensor networkTime complexitySoftwareInformation SystemsIEEE transactions on cybernetics
researchProduct

Visual Re-Ranking for Multi-Aspect Information Retrieval

2017

We present visual re-ranking, an interactive visualization technique for multi-aspect information retrieval. In multi-aspect search, the information need of the user consists of more than one aspect or query simultaneously. While visualization and interactive search user interface techniques for improving user interpretation of search results have been proposed, the current research lacks understanding on how useful these are for the user: whether they lead to quantifiable benefits in perceiving the result space and allow faster, and more precise retrieval. Our technique visualizes relevance and document density on a two-dimensional map with respect to the query phrases. Pointing to a locat…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniWeb search queryConcept searchInformation retrievalSettore INF/01 - Informaticamulti-aspect searchComputer scienceinformation retrieval information visualization multi-aspect search multi-dimensional rankingInformationSystems_INFORMATIONSTORAGEANDRETRIEVALeducation020207 software engineeringta613202 engineering and technology113 Computer and information sciencesQuery expansionmulti-dimensional rankingWeb query classification020204 information systemsHuman–computer information retrieval0202 electrical engineering electronic engineering information engineeringRelevance (information retrieval)Visual Wordinformation visualizationinformation retrievalDocument retrieval
researchProduct

360° Tracking Using a Virtual PTZ Camera

2017

Object tracking using still or PTZ cameras is a hard task for large spaces and needs several devices to completely cover the area or to track multiple subjects. The introduction of \(360^{\circ }\) camera technology offers a complete view of the scene in a single image and can be useful to reduce the number of devices needed in the tracking problem. In this paper we present a framework using \(360^{\circ }\) cameras to simulate an unlimited number of PTZ cameras and to be used for tracking. The proposed method to track a single target process an equirectangular view of the scene and obtains a model of the moving object in the image plane. The target is tracked analyzing the next frame of th…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle Informazionibusiness.industryComputer scienceComputer Science (all)Frame (networking)360 cameraComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONProcess (computing)Center (category theory)02 engineering and technologyObject trackingImage planeTracking (particle physics)Theoretical Computer ScienceCover (topology)020204 information systemsVideo trackingPTZ camera0202 electrical engineering electronic engineering information engineeringEquirectangular projection020201 artificial intelligence & image processingComputer visionEquirectangular projectionArtificial intelligencebusiness
researchProduct

Fake News Spreaders Detection: Sometimes Attention Is Not All You Need

2022

Guided by a corpus linguistics approach, in this article we present a comparative evaluation of State-of-the-Art (SotA) models, with a special focus on Transformers, to address the task of Fake News Spreaders (i.e., users that share Fake News) detection. First, we explore the reference multilingual dataset for the considered task, exploiting corpus linguistics techniques, such as chi-square test, keywords and Word Sketch. Second, we perform experiments on several models for Natural Language Processing. Third, we perform a comparative evaluation using the most recent Transformer-based models (RoBERTa, DistilBERT, BERT, XLNet, ELECTRA, Longformer) and other deep and non-deep SotA models (CNN,…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle Informazionitext classificationcorpus linguisticSettore ING-INF/03 - Telecomunicazionifake newTwitterauthor profilingconvolutional neural networkdeep learningNatural Language Processing (NLP)user classificationfake news; misinformation; Natural Language Processing (NLP); transformers; Twitter; convolutional neural networks; text classification; deep learning; machine learning; user classification; author profiling; corpus linguistics; linguistic analysismachine learningtransformermisinformationlinguistic analysisInformation Systems
researchProduct