DIGITAL LIBRARY ARCHIVE
HOME > DIGITAL LIBRARY ARCHIVE
Journal of Intelligence and Information Systems,
Vol. 10, No. 3, December 2004
Character Segmentation using Side Profile Pattern
Minchul Jung
Vol. 10, No. 3, Page: 1 ~ 10
Keywords : character segmentation, Optical Character Recognition(OCR), cutting cost, character prototype
Abstract
In this paper, a new character segmentation algorithm of machine printed character recognition is proposed. The new approach of the proposed character segmentation algorithm overcomes the weak points of both feature-based approaches and recognition-based approaches in character segmentation. This paper defines side profiles of touching characters. The character segmentation algorithm gives a candidate single character in touching characters by side profiles, without any help of character recognizer. It segments touching characters and decides the candidate single character by side profiles. This paper also defines cutting cost, which makes the proposed character segmentation find an optimal segmenting path. The performance of the proposed character segmentation algorithm in this paper has been obtained using a real envelope reader system, which can recognize addresses in U.S. mail pieces and sort the mail pieces. 3359 mail pieces were tested. The improvement was from?68.92%?to 80.08% by the proposed character segmentation.
An Agent based Emergency Warning System for Dealing With Defensive Information Warfare in Strategic Simulation Exercises
Yong-Han Lee , and Soundar R.T. Kumara
Vol. 10, No. 3, Page: 11 ~ 26
Keywords : intelligent software agent, rule-based system, strategic simulation exercise, emergency warning system
Abstract
Software for analyzing documents on the net to detect specific categories of occurrences is in great demand. In the current world where detecting terrorist threats is critical there is a great need for such systems. One of the critical application areas of such software is the automatic detection of a national infrastructure emergency. In this research an agent-based generic architecture for emergency warning systems is proposed and implemented. This system, called the National Infrastructure Emergency Warning System (NIEWS), is designed to analyze given documents, to detect threats, and to report possible threats with the necessary information to the appropriate users autonomously. In addition, a systematic analysis framework to detect emergencies on the subject of defensive information warfare is designated and implemented through a knowledge base. The developed system along with the knowledge base is implemented and successfully deployed to Strategic Crisis Exercise (SCE) at the United State Army War College (USAWC), saving a good amount of money by replacing human SMEs (subject matter experts) in the SCE.
New Data Model for Efficient Search and Reusability of XML Documents
Eun-Young Kim, and Se-Hak Chun
Vol. 10, No. 3, Page: 27 ~ 37
Keywords : XML Document Management, Relational Database, Objective Database
Abstract
XML has been proposed as a document standard for the representation and exchange of data on the WWW, and also becoming a standard for the search and reuse of scattered documents. When implementing a XML contents management system, special consideration should be imposed on how to model data and how to store the modelled data for effective and efficient management of the semi-structured data. In this paper, we proposed a new data model for the storage and search of XML document data. This proposed data model could represent both of data and structure views of XML documents, and be applied to the new data system for XML documents as well as the existing data systems.
Fuzzy reasoning for assessing bulk tank milk quality
Taioun Kim, Daeyou Jung, and Bhushan M. Jayarao
Vol. 10, No. 3, Page: 39 ~ 57
Keywords : Bulk tank milk, Mastitis, Fuzzy logic reasoning
Abstract
Many dairy producers periodically receive information about their bulk tank milk with reference to bulk tank somatic cell counts, standard plate counts, and preliminary incubation counts. This information, when collected over a period of time, in combination with bulk tank mastitis culture reports can become a significant knowledge base. Several guidelines have been proposed to interpret farm bulk tank milk bacterial counts. However many of the suggested interpretive criteria lack validation, and provide little insight to the interrelationship between different groups of bacteria found in bulk tank milk. Also the linguistic terms describing bulk tank milk quality or herd management status are rather vague or fuzzy such as excellent, good or unsatisfactory. The objective of this paper was to develop a set of fuzzy descriptors to evaluate bulk tank milk quality and herd's milking practice based on bulk tank milk microbiology test results. Thus, fuzzy logic based reasoning methodologies were developed based on fuzzy inference engine. Input parameters were bulk tank somatic cell counts, standard plate counts, preliminary incubation counts, laboratory pasteurization counts, non agalactiae-Streptococci and Streptococci like organisms, and Staphylococcus aureus. Based on the input data, bulk tank milk quality was classified as excellent, good, milk cooling problem, cleaning problem, environmental mastitis, or mixed with mastitis and cleaning problems. The results from fuzzy reasoning would provide a reference regarding a good management practice for milk producers, dairy health consultants, and veterinarians.
Web Service based Recommendation System using Inference Engine
SungTae Kim, SooMin Park, and JungJin Yang
Vol. 10, No. 3, Page: 59 ~ 72
Keywords : Web Service, Inference Engine, Knowledge Base, Recommendation System
Abstract
The range of Internet usage is drastically broadened and diversed from information retrieval and collection to many different functions. Contrasting to the increase of Internet use, the efficiency of finding necessary information is decreased. Therefore, the need of information system which provides customized information is emerged. Our research proposes Web Service based recommendation system which employes inference engine to find and recommend the most appropriate products for users. Web applications in present provide useful information for users while they still carry the problem of overcoming different platforms and distributed computing environment. The need of standardized and systematic approach is necessary for easier communication and coherent system development through heterogeneous environments. Web Service is programming language independent and improves interoperability by describing, deploying, and executing modularized applications through network. The paper focuses on developing Web Service based recommendation system which will provide benchmarks of Web Service realization. It is done by integrating inference engine where the dynamics of information and user preferences are taken into account.
Attribute Utility-Based Negotiation Agent Methodology for Customer-To-Customer Electronic Commerce
Yong U. Song, June S. Hong, and Wooju Kim
Vol. 10, No. 3, Page: 73 ~ 89
Keywords : Agent-based Negotiation, e-Marketplace, C-to-C Electronic Commerce
Abstract
Since people have come to access more and more information about products with the proliferation of the Internet, more and more customer-to-customer e-marketplaces are being introduced with rapidly increasing transaction volumes. As the role of customer-to-customer electronic commerce has become increasingly regarded as vital to the economy, much research has delved into developing intelligent agent systems to efficiently support customer-to-customer electronic commerce. Most of this research, however, has focused only on supporting simple negotiation for the price of common goods along the time span. To expand the negotiation object to the differentiated goods, the customer must be allowed to negotiate over multi-at-tributes of the product besides the price, including the attributes related to the transaction activity itself, such as delivery time and payment method. To satisfy this requirement, we propose an agent marketplace for differentiated goods where the agent of a customer can negotiate not only the price but also the various attributes of the product and the transaction in order to achieve a better utility level for both buyer and seller. The formal protocol and the architecture issues to support the proposed e-marketplace and agents are also addressed.
An Agent Application framework for Applications based on the Semantic Web
Jaeho Lee
Vol. 10, No. 3, Page: 91 ~ 103
Keywords : Agent Architecture, Multi-Agent Systems, Semantic Web
Abstract
Multi-agent systems for semantic web applications require efficient implementation of agent architectures without sacrificing the flexibility and the level of abstraction that agent architectures provide. In this paper, we present an agent system, called VivAce, which is implemented in Java to achieve both high efficiency and the level of abstraction provided by the BDI agent architecture. VivAce (Vivid Agent Computing Environment) has the characteristics of a vivid agent through the BDI agent model. A vivid agent is a software-controlled system whose state comprises the mental components of knowledge, perceptions, tasks, and intentions, and whose behavior is represented by means of action and reaction rules. We first identify the requirements for multi-agent systems and then present the relevant features of VivAce and experimental results.
Re-classifying Method for Face Recognition
Kyoung-Yul Bae
Vol. 10, No. 3, Page: 105 ~ 114
Keywords : Biometrics, Face Recognition, Data Classification, Face Data Re-Classification
Abstract
In the past year, the increasing concern about the biometric recognition makes the great activities on the security fields, such as the entrance control or user authentication. In particular, although the features of face recognition, such as user friendly and non-contact made it to be used widely, unhappily it has some disadvantages of low accuracy or low Re-attempts Rates. For this reason, I suggest the new approach to re-classify the classified data of recognition result data to solve the problems. For this study, I will use the typical appearance-based, PCA(Principal Component Analysis) algorithm and verify the performance improvement by adopting the re-classification approach using 200 peoples (10 pictures per one person).
Customer's Job Identification using the Usage Patterns of Mobile Telecommunication
Jae Sik Lee, and You Jung Cho
Vol. 10, No. 3, Page: 115 ~ 132
Keywords : Customer Relationship Management, Customer's Job Identification, Self-Organizing Map, Mobile Telecommunication Industry
Abstract
Recently, as most companies recognize the importance of the customer relationship management, they strongly believe that they must know who their customers are. The job of a customer is very important information for us to understand the customer. However, since most customers are reluctant to reveal them-selves, they do not let us know their jobs, and even provide false information about their jobs. The target domain of our research is mobile telecommunication. In this research, we developed a system that identifies the customer's job by utilizing the Call Detail Record. Using artificial neural networks, we developed a two-step Job Identification System. In the first step, it identifies the four job classes, then in the second step, it subdivides these four job classes into seven jobs. The accuracy of identifying the seven jobs was?71.9%.
Folder Recommendation Based on User Knowledge
Mee You, Joo Seok Park, and Jae Kyeong Kim
Vol. 10, No. 3, Page: 133 ~ 146
Keywords : TF-IDF, keyword affinity
Abstract
By the development of the network technology, the types and amount of information that users keep in contact with have been dramatically increased. As a result, users are consuming a lot of time and energy to find needed information. On this, this article presents a new methodology that can efficiently manage their information within small cost by using content-based recommendation method and keyword affinity method. By using keyword affinity method, this methodology solves the content-based recommendation method's weak point that the performance is not good within the environment that the preferences of users are rapidly changing and new contents are created continuously and the accuracy level is low until the information of preferences are sufficiently gathered. This article carried out research on the personal e-mail environment where new information is frequently created and disappeared. Also this article assists folder recommendation for the efficient management of e-mail and verified the methodology mentioned above by an experiment to compare the performance of existing folder recommendation methods with the performance of this new method.
1



Warning: include(/home/hosting_users/ev_jiisonline/www/admin/archive/advancedSearch.php) [function.include]: failed to open stream: No such file or directory in /home/hosting_users/ev_jiisonline/www/archive/subList.php on line 113

Warning: include() [function.include]: Failed opening '/home/hosting_users/ev_jiisonline/www/admin/archive/advancedSearch.php' for inclusion (include_path='.:/usr/local/php/lib/php') in /home/hosting_users/ev_jiisonline/www/archive/subList.php on line 113