Search results for "Information Systems"
showing 10 items of 1926 documents
Agents in dynamic contexts, a system for learning plans
2020
Reproducing the human ability to cooperate and collaborate in a dynamic environment is a significant challenge in the field of human-robot teaming interaction. Generally, in this context, a robot has to adapt itself to handle unforeseen situations. The problem is runtime planning when some factors are not known before the execution starts. This work aims to show and discuss a method to handle this kind of situation. Our idea is to use the Belief-Desire-Intention agent paradigm, its the Jason reasoning cycle and a Non-Axiomatic Reasoning System. The result is a novel method that gives the robot the ability to select the best plan.
Resilient hexapod robot
2017
In this paper, we present a method of learning desired behaviour of the specific robotic system and transfer of the existing knowledge in the event of partial system failure. Six-legged robot (hexapod) built on top of the Bioloid platform is used for the method verification. We use genetic algorithms to optimize the hexapod's gait, after which we simulate physical damage caused to the robot. The goal of this method is to optimize the gait in accordance with the actual robot morphology, instead of the assumed one. Also, knowledge that was previously gained will be transferred in order to improve the results. Nonstandard genetic algorithm with the specific mixed population is used for this.
A genetic algorithm for the design of a fuzzy controller for active queue management
2003
Active queue management (AQM) policies are those\ud policies of router queue management that allow for the detection of network congestion, the notification of such occurrences to the\ud hosts on the network borders, and the adoption of a suitable control\ud policy. This paper proposes the adoption of a fuzzy proportional\ud integral (FPI) controller as an active queue manager for Internet\ud routers. The analytical design of the proposed FPI controller is\ud carried out in analogy with a proportional integral (PI) controller,\ud which recently has been proposed for AQM. A genetic algorithm is\ud proposed for tuning of the FPI controller parameters with respect\ud to optimal disturbance rej…
Vulnerability evaluation of distributed reputation management systems
2017
In distributed environments, Reputation Management Systems (RMSs) aim to estimate agents' trustworthiness by exploiting different sources of information. The distributed nature of these systems makes them vulnerable to several types of security attacks, and the response provided by a specific RMS depends on various factors, such as the algorithms adopted for estimating the reputation values and the communication protocols used to enable the cooperation among agents. This work examines the most important security attacks against RMSs and proposes a set of metrics for a quantitative evaluation of the RMS vulnerabilities. A parallel simulation framework is used to automatically give a vulnerab…
Elicitation and evaluation of zoom gestures for touchless interaction with desktop displays
2019
Touchless gestural interaction has been widely studied and adopted in many contexts. Furthermore, the growing availability of low-cost enabling devices, such as Kinect or Leap Motion, boosted up the interest in such interaction both for commercial and scientific purposes, both for large public displays and for personal displays. The problem of choosing the right touchless gesture for the right action is thus still an open issue, depending on several aspects, such as context, purpose, users' culture, etc. In this work, we first present the results of a gesture elicitation study that allowed us to identify a set of touchless gestures for performing zoom actions while interacting with desktop …
Investigating Proactive Search Support in Conversations
2018
Conversations among people involve solving disputes, building common ground, and reinforce mutual beliefs and assumptions. Conversations often require external information that can support these human activities. In this paper, we study how a spoken conversation can be supported by a proactive search agent that listens to the conversation, detects entities mentioned in the conversation, and proactively retrieves and presents information related to the conversation. A total of 24 participants (12 pairs) were involved in informal conversations, using either the proactive search agent or a control condition that did not support conversational analysis or proactive information retrieval. Data c…
Adaptive distributed outlier detection for WSNs.
2014
The paradigm of pervasive computing is gaining more and more attention nowadays, thanks to the possibility of obtaining precise and continuous monitoring. Ease of deployment and adaptivity are typically implemented by adopting autonomous and cooperative sensory devices; however, for such systems to be of any practical use, reliability and fault tolerance must be guaranteed, for instance by detecting corrupted readings amidst the huge amount of gathered sensory data. This paper proposes an adaptive distributed Bayesian approach for detecting outliers in data collected by a wireless sensor network; our algorithm aims at optimizing classification accuracy, time complexity and communication com…
Visual Re-Ranking for Multi-Aspect Information Retrieval
2017
We present visual re-ranking, an interactive visualization technique for multi-aspect information retrieval. In multi-aspect search, the information need of the user consists of more than one aspect or query simultaneously. While visualization and interactive search user interface techniques for improving user interpretation of search results have been proposed, the current research lacks understanding on how useful these are for the user: whether they lead to quantifiable benefits in perceiving the result space and allow faster, and more precise retrieval. Our technique visualizes relevance and document density on a two-dimensional map with respect to the query phrases. Pointing to a locat…
360° Tracking Using a Virtual PTZ Camera
2017
Object tracking using still or PTZ cameras is a hard task for large spaces and needs several devices to completely cover the area or to track multiple subjects. The introduction of \(360^{\circ }\) camera technology offers a complete view of the scene in a single image and can be useful to reduce the number of devices needed in the tracking problem. In this paper we present a framework using \(360^{\circ }\) cameras to simulate an unlimited number of PTZ cameras and to be used for tracking. The proposed method to track a single target process an equirectangular view of the scene and obtains a model of the moving object in the image plane. The target is tracked analyzing the next frame of th…
Fake News Spreaders Detection: Sometimes Attention Is Not All You Need
2022
Guided by a corpus linguistics approach, in this article we present a comparative evaluation of State-of-the-Art (SotA) models, with a special focus on Transformers, to address the task of Fake News Spreaders (i.e., users that share Fake News) detection. First, we explore the reference multilingual dataset for the considered task, exploiting corpus linguistics techniques, such as chi-square test, keywords and Word Sketch. Second, we perform experiments on several models for Natural Language Processing. Third, we perform a comparative evaluation using the most recent Transformer-based models (RoBERTa, DistilBERT, BERT, XLNet, ELECTRA, Longformer) and other deep and non-deep SotA models (CNN,…