Goto

Collaborating Authors

 Country


Can Computers Create Humor?

AI Magazine

Despite the fact that AI has always been adventurous in trying to elucidate complex aspects of human behaviour, only recently has there been research into computational modelling of humor. One obstacle to progress is the lack of a precise and detailed theory of how humor operates. Nevertheless, since the early 1990s, there have been a number of small programs that create simple verbal humor, and more recently there have been studies of the automatic classification of the humorous status of texts. In addition, there are a number of advocates of the practical uses of computational humor: in user-interfaces, in education, and in advertising. Computer-generated humor is still quite basic, but it could be viewed as a form of exploratory creativity. For computational humor to improve, some hard problems in AI will have to be addressed.


Essay in the Style of Douglas Hofstadter

AI Magazine

It was written not by a human being, but by my computer program EWI (an acronym for "experiments in writing intelligence"). EWI was fed the texts of two of Hofstadter's books--namely, Gรถdel, Escher, Bach (winner of the Pulitzer Prize for General Nonfiction in 1980) and Metamagical Themas--and then, following its code, EWI carefully analyzed these two books for their uniquely Hofstadterian stylistic elements and features, after which it recombined these stylistic elements in new fashions. EWI thereby came up with some 25 new and highly diverse "Hofstadter articles," one of which is given below, and the article is followed by a brief commentary about EWI and its output by Hofstadter himself. Actually, I should state up front that the wonderful sparkling dialogues of GEB, which are a substantial part of that book, were not used by EWI in generating any of the articles, because EWI is unfortunately not yet able to work with inputs that belong to different genres, such as chapters and dialogues. To combine stylistic aspects of two or more different genres of writing represents a very thorny challenge indeed. Endowing EWI with that extra level of flexibility is one of my next major goals.


Deus Ex Machina โ€” A Higher Creative Species in the Game of Chess

AI Magazine

Computers and human beings play chess differently. The basic paradigm that computer programs employ is known as "search and evaluate." Their static evaluation is arguably more primitive than the perceptual one of humans. Yet the intelligence emerging from them is phenomenal. A human spectator would not be able to tell the difference between a brilliant computer game and one played by Kasparov. Chess played by today's machines looks extraordinary, full of imagination and creativity. Such elements may be the reason why computers are superior to humans in the sport of kings, at least for the moment. This paper article about how roles have changed: Humans play chess like machines and machines play chess the way humans used to play.


A Fuzzy Petri Nets Model for Computing With Words

arXiv.org Artificial Intelligence

Motivated by Zadeh's paradigm of computing with words rather than numbers, several formal models of computing with words have recently been proposed. These models are based on automata and thus are not well-suited for concurrent computing. In this paper, we incorporate the well-known model of concurrent computing, Petri nets, together with fuzzy set theory and thereby establish a concurrency model of computing with words--fuzzy Petri nets for computing with words (FPNCWs). The new feature of such fuzzy Petri nets is that the labels of transitions are some special words modeled by fuzzy sets. By employing the methodology of fuzzy reasoning, we give a faithful extension of an FPNCW which makes it possible for computing with more words. The language expressiveness of the two formal models of computing with words, fuzzy automata for computing with words and FPNCWs, is compared as well. A few small examples are provided to illustrate the theoretical development.


Algorithms for Image Analysis and Combination of Pattern Classifiers with Application to Medical Diagnosis

arXiv.org Artificial Intelligence

Medical Informatics and the application of modern signal processing in the assistance of the diagnostic process in medical imaging is one of the more recent and active research areas today. This thesis addresses a variety of issues related to the general problem of medical image analysis, specifically in mammography, and presents a series of algorithms and design approaches for all the intermediate levels of a modern system for computer-aided diagnosis (CAD). The diagnostic problem is analyzed with a systematic approach, first defining the imaging characteristics and features that are relevant to probable pathology in mammo-grams. Next, these features are quantified and fused into new, integrated radio-logical systems that exhibit embedded digital signal processing, in order to improve the final result and minimize the radiological dose for the patient. In a higher level, special algorithms are designed for detecting and encoding these clinically interest-ing imaging features, in order to be used as input to advanced pattern classifiers and machine learning models. Finally, these approaches are extended in multi-classifier models under the scope of Game Theory and optimum collective deci-sion, in order to produce efficient solutions for combining classifiers with minimum computational costs for advanced diagnostic systems. The material covered in this thesis is related to a total of 18 published papers, 6 in scientific journals and 12 in international conferences.


An Idiotypic Immune Network as a Short Term Learning Architecture for Mobile Robots

arXiv.org Artificial Intelligence

A combined Short-Term Learning (STL) and Long-Term Learning (LTL) approach to solving mobile robot navigation problems is presented and tested in both real and simulated environments. The LTL consists of rapid simulations that use a Genetic Algorithm to derive diverse sets of behaviours. These sets are then transferred to an idiotypic Artificial Immune System (AIS), which forms the STL phase, and the system is said to be seeded. The combined LTL-STL approach is compared with using STL only, and with using a handdesigned controller. In addition, the STL phase is tested when the idiotypic mechanism is turned off. The results provide substantial evidence that the best option is the seeded idiotypic system, i.e. the architecture that merges LTL with an idiotypic AIS for the STL. They also show that structurally different environments can be used for the two phases without compromising transferability


An Immune Inspired Network Intrusion Detection System Utilising Correlation Context

arXiv.org Artificial Intelligence

Network Intrusion Detection Systems (NIDS) are computer systems which monitor a network with the aim of discerning malicious from benign activity on that network. While a wide range of approaches have met varying levels of success, most IDSs rely on having access to a database of known attack signatures which are written by security experts. Nowadays, in order to solve problems with false positive alerts, correlation algorithms are used to add additional structure to sequences of IDS alerts. However, such techniques are of no help in discovering novel attacks or variations of known attacks, something the human immune system (HIS) is capable of doing in its own specialised domain. This paper presents a novel immune algorithm for application to the IDS problem. The goal is to discover packets containing novel variations of attacks covered by an existing signature base.


An Evolutionary Squeaky Wheel Optimisation Approach to Personnel Scheduling

arXiv.org Artificial Intelligence

The quest for robust heuristics that are able to solve more than one problem is ongoing. In this paper, we present, discuss and analyse a technique called Evolutionary Squeaky Wheel Optimisation and apply it to two different personnel scheduling problems. Evolutionary Squeaky Wheel Optimisation improves the original Squeaky Wheel Optimisation's effectiveness and execution speed by incorporating two extra steps (Selection and Mutation) for added evolution. In the Evolutionary Squeaky Wheel Optimisation, a cycle of Analysis-Selection-Mutation-Prioritization-Construction continues until stopping conditions are reached. The aim of the Analysis step is to identify below average solution components by calculating a fitness value for all components. The Selection step then chooses amongst these underperformers and discards some probabilistically based on fitness. The Mutation step further discards a few components at random. Solutions can become incomplete and thus repairs may be required. The repairs are carried out by using the Prioritization to first produce priorities that determine an order by which the following Construction step then schedules the remaining components. Therefore, improvement in the Evolutionary Squeaky Wheel Optimisation is achieved by selective solution disruption mixed with interative improvement and constructive repair. Strong experimental results are reported on two different domains of personnel scheduling: bus and rail driver scheduling and hospital nurse scheduling.


An Immune Inspired Approach to Anomaly Detection

arXiv.org Artificial Intelligence

The immune system provides a rich metaphor for computer security: anomaly detection that works in nature should work for machines. However, early artificial immune system approaches for computer security had only limited success. Arguably, this was due to these artificial systems being based on too simplistic a view of the immune system. We present here a second generation artificial immune system for process anomaly detection. It improves on earlier systems by having different artificial cell types that process information. Following detailed information about how to build such second generation systems, we find that communication between cells types is key to performance. Through realistic testing and validation we show that second generation artificial immune systems are capable of anomaly detection beyond generic system policies. The paper concludes with a discussion and outline of the next steps in this exciting area of computer security.


An Agent Based Classification Model

arXiv.org Artificial Intelligence

The major function of this model is to access the UCI Wisconsin Breast Can- cer data-set[1] and classify the data items into two categories, which are normal and anomalous. This kind of classifi cation can be referred as anomaly detection, which discriminates anomalous behaviour from normal behaviour in computer systems. One popular solution for anomaly detection is Artifi cial Immune Sys- tems (AIS). AIS are adaptive systems inspired by theoretical immunology and observed immune functions, principles and models which are applied to prob- lem solving. The Dendritic Cell Algorithm (DCA)[2] is an AIS algorithm that is developed specifi cally for anomaly detection. It has been successfully applied to intrusion detection in computer security. It is believed that agent-based mod- elling is an ideal approach for implementing AIS, as intelligent agents could be the perfect representations of immune entities in AIS. This model evaluates the feasibility of re-implementing the DCA in an agent-based simulation environ- ment called AnyLogic, where the immune entities in the DCA are represented by intelligent agents. If this model can be successfully implemented, it makes it possible to implement more complicated and adaptive AIS models in the agent-based simulation environment.