Goto

Collaborating Authors

 Information Technology


On the Collaborative Formalization of Agile Semantics Using Social Network Applications

AAAI Conferences

In this position paper we investigate the opportunities of using functionalities provided by social network sites for the collaborative formalization of semantics in the domain of health. In particular we identified benefits in regard to communication support, economic benefits, and technical opportunities. The implementation of the functionalities are illustrated by describing a use case from an ongoing project with the World Health Organization.


Emerging Topic Detection for Business Intelligence Via Predictive Analysis of 'Meme' Dynamics

AAAI Conferences

Detecting and characterizing emerging topics of discussion and consumer trends through analysis of Internet data is of great interest to businesses. This paper considers the problem of monitoring the Web to spot emerging memes – distinctive phrases which act as “tracers” for topics – as a means of early detection of new topics and trends. We present a novel methodology for predicting which memes will propagate widely, appearing in hundreds or thousands of blog posts, and which will not, thereby enabling discovery of significant topics. We begin by identifying measurables which should be predictive of meme success. Interestingly, these metrics are not those traditionally used for such prediction but instead are subtle measures of meme dynamics. These metrics form the basis for learning a classifier which predicts, for a given meme, whether or not it will propagate widely. The utility of the prediction methodology is demonstrated through analysis of a sample of 200 memes which emerged online during the second half of 2008.


Smart Homes or Smart Occupants? Reframing Computational Design Models for the Green Home

AAAI Conferences

Buildings designed around occupant A sustainable home is more than a green building: it is also intelligence will provide flexible, adaptive task a living experience that encourages occupants to use fewer environments, refined control zones and technologies that resources more effectively. Research has shown that small maximize occupants' access to adaptive opportunities changes in behaviour in how we use our homes, such as (Cole & Brown, 2009). Architects, engineers and system turning off lights, reducing heat and uncovering or designers are faced with the challenge of reframing design covering windows, or shortening showers, can result in strategies as a co-evolution of human and building substantial energy and water savings. But changing the intelligence that will encourage as well as underpin way we use resources is proving challenging.


Spatiotemporal Knowledge Representation and Reasoning under Uncertainty for Action Recognition in Smart Homes

AAAI Conferences

We apply artificial intelligence techniques to perform data analysis and activity recognition in smart homes. Sensors embedded in smart home provide primary data for reasoning about observations. The final goal is to provide appropriate assistance for residents to complete their Daily living Activities. Here, we introduce a qualitative approach that considers spatiotemporal specifications of activities in the Activity Recognition Agent to do knowledge representation and reasoning about the observations. We consider different existing uncertainties within sensors observations and Observed Agent’s activities. In the introduced approach, the more details about environment context would cause the less activity recognition process complexity and more precise functionality. To represent the knowledge, we apply the fuzzy logic to represent the world state by the fuzzified received values from sensors. The knowledge would be represented in the fuzzy context frame. To reduce the amount of collected data, meaningful changes in sensors generated values are considered to do Activity Recognition. Applying possibility distributions for event occurrence orders and sequences within different scenarios of activities realization, we are able to generate hypotheses about future possible occur-able events. The possible occur-able events and fuzzy digit parameters of their possible happening moments are represented in matrix format. The hypotheses about possible future observable contexts are generated considering spatial, temporal and other environmental parameters and then they would be ranked. Our final goal is to better explain the observations. If no possible explanation about observation be found, it would be recognized as abnormal behavior. In the case that no expected event be observed, we can reason that maybe event has occurred but not triggered and so next available events in previously learned scenarios would be expected. The system patience for number of possible missed events depends to trade-off between the degrees of resident's forgetfulness and probability of events trigger by applied sensors.


A Directional Feature with Energy based Offline Signature Verification Network

arXiv.org Artificial Intelligence

Signature used as a biometric is implemented in various systems as well as every signature signed by each person is distinct at the same time. So, it is very important to have a computerized signature verification system. In offline signature verification system dynamic features are not available obviously, but one can use a signature as an image and apply image processing techniques to make an effective offline signature verification system. Author proposes a intelligent network used directional feature and energy density both as inputs to the same network and classifies the signature. Neural network is used as a classifier for this system. The results are compared with both the very basic energy density method and a simple directional feature method of offline signature verification system and this proposed new network is found very effective as compared to the above two methods, specially for less number of training samples, which can be implemented practically.


Differentially Private Empirical Risk Minimization

arXiv.org Artificial Intelligence

Privacy-preserving machine learning algorithms are crucial for the increasingly common setting in which personal data, such as medical or financial records, are analyzed. We provide general techniques to produce privacy-preserving approximations of classifiers learned via (regularized) empirical risk minimization (ERM). These algorithms are private under the $\epsilon$-differential privacy definition due to Dwork et al. (2006). First we apply the output perturbation ideas of Dwork et al. (2006), to ERM classification. Then we propose a new method, objective perturbation, for privacy-preserving machine learning algorithm design. This method entails perturbing the objective function before optimizing over classifiers. If the loss and regularizer satisfy certain convexity and differentiability criteria, we prove theoretical results showing that our algorithms preserve privacy, and provide generalization bounds for linear and nonlinear kernels. We further present a privacy-preserving technique for tuning the parameters in general machine learning algorithms, thereby providing end-to-end privacy guarantees for the training process. We apply these results to produce privacy-preserving analogues of regularized logistic regression and support vector machines. We obtain encouraging results from evaluating their performance on real demographic and benchmark data sets. Our results show that both theoretically and empirically, objective perturbation is superior to the previous state-of-the-art, output perturbation, in managing the inherent tradeoff between privacy and learning performance.


Feature Selection via Sparse Approximation for Face Recognition

arXiv.org Artificial Intelligence

Inspired by biological vision systems, the over-complete local features with huge cardinality are increasingly used for face recognition during the last decades. Accordingly, feature selection has become more and more important and plays a critical role for face data description and recognition. In this paper, we propose a trainable feature selection algorithm based on the regularized frame for face recognition. By enforcing a sparsity penalty term on the minimum squared error (MSE) criterion, we cast the feature selection problem into a combinatorial sparse approximation problem, which can be solved by greedy methods or convex relaxation methods. Moreover, based on the same frame, we propose a sparse Ho-Kashyap (HK) procedure to obtain simultaneously the optimal sparse solution and the corresponding margin vector of the MSE criterion. The proposed methods are used for selecting the most informative Gabor features of face images for recognition and the experimental results on benchmark face databases demonstrate the effectiveness of the proposed methods.


Predictors of short-term decay of cell phone contacts in a large scale communication network

arXiv.org Machine Learning

Under what conditions is an edge present in a social network at time t likely to decay or persist by some future time t + Delta(t)? Previous research addressing this issue suggests that the network range of the people involved in the edge, the extent to which the edge is embedded in a surrounding structure, and the age of the edge all play a role in edge decay. This paper uses weighted data from a large-scale social network built from cell-phone calls in an 8-week period to determine the importance of edge weight for the decay/persistence process. In particular, we study the relative predictive power of directed weight, embeddedness, newness, and range (measured as outdegree) with respect to edge decay and assess the effectiveness with which a simple decision tree and logistic regression classifier can accurately predict whether an edge that was active in one time period continues to be so in a future time period. We find that directed edge weight, weighted reciprocity and time-dependent measures of edge longevity are highly predictive of whether we classify an edge as persistent or decayed, relative to the other types of factors at the dyad and neighborhood level.


Distributed Autonomous Online Learning: Regrets and Intrinsic Privacy-Preserving Properties

arXiv.org Artificial Intelligence

Online learning has become increasingly popular on handling massive data. The sequential nature of online learning, however, requires a centralized learner to store data and update parameters. In this paper, we consider online learning with {\em distributed} data sources. The autonomous learners update local parameters based on local data sources and periodically exchange information with a small subset of neighbors in a communication network. We derive the regret bound for strongly convex functions that generalizes the work by Ram et al. (2010) for convex functions. Most importantly, we show that our algorithm has \emph{intrinsic} privacy-preserving properties, and we prove the sufficient and necessary conditions for privacy preservation in the network. These conditions imply that for networks with greater-than-one connectivity, a malicious learner cannot reconstruct the subgradients (and sensitive raw data) of other learners, which makes our algorithm appealing in privacy sensitive applications.


Intelligent Semantic Web Search Engines: A Brief Survey

arXiv.org Artificial Intelligence

The World Wide Web (WWW) allows the people to share the information (data) from the large database repositories globally. The amount of information grows billions of databases. We need to search the information will specialize tools known generically search engine. There are many of search engines available today, retrieving meaningful information is difficult. However to overcome this problem in search engines to retrieve meaningful information intelligently, semantic web technologies are playing a major role. In this paper we present survey on the search engine generations and the role of search engines in intelligent web and semantic search technologies.