نتایج جستجو برای: inference strategy

تعداد نتایج: 438359  

2012
Caixia Li Sreenatha Gopalarao Anavatti Tapabrata Ray

Caixia Li , Sreenatha Gopalarao Anavatti, Tapabrata Ray University of New South Wales @ Australian Defence Force Academy [email protected] Abstract-This paper focuses on the design and implementation of the analytical hierarchy process (AHP) using Fuzzy inference techniques. This AHP-FUZZY approach is a multi-criteria combination system. The nature of the AHP-FUZZY approach is pair-...

2015
Agnieszka Nowak-Brzezinska Alicja Wakulicz-Deja

In this paper, we discuss some issues related to exploration of knowledge bases inspired by the rough set theory, which emerged 30 years ago, and is nowadays a rapidly developing branch of artificial intelligence. The partition of rules approach allows us to divide a large set of rules into smaller subsets that are easier to manage. Optimisation relies on reducing the number of rules searched i...

2017
Thomas H. B. FitzGerald Dorothea Hämmerer Karl J. Friston Shu-Chen Li Raymond J. Dolan

Normative models of human cognition often appeal to Bayesian filtering, which provides optimal online estimates of unknown or hidden states of the world, based on previous observations. However, in many cases it is necessary to optimise beliefs about sequences of states rather than just the current state. Importantly, Bayesian filtering and sequential inference strategies make different predict...

Journal: :IJIIT 2008
Xiangyang Li

Bayesian networks have been extensively used in active information fusion that selects the best sensor based on expected utility calculation. However, inference degradation happens when the same sensors are selected repeatedly over time if the applied strategy is not well designed to consider the history of sensor engagement. This phenomenon decreases fusion accuracy and efficiency, in direct c...

2012
Peng Zhou Xiapu Luo Rocky K. C. Chang

Trust-based onion routing employs users’ own trust to circumvent compromised onion routers. However, it runs a high risk of being deanonymized by the inference attacks based on a priori trust relationships. In this paper, we first observe that the onion routers with higher trust degrees (e.g., those that are trusted by more other users) are more effective in defending against the inference atta...

2008
DIMITAR LAKOV STANISLAV VASILEV

The paper presents fuzzy navigation system for a mobile robot. This navigation is based on fuzzy inference machine that performs path planning and obstacle avoidance in arbitrary complex environments. The system is built as two-level hierarchical system. On the higher level there is a controlling PC that is connected with robot control unit through duplex, wireless communication channel. A sens...

2005
Stefano Ferilli Teresa Maria Altomare Basile Nicola Di Mauro Floriana Esposito

Traditional Machine Learning approaches are based on single inference mechanisms. A step forward concerned the integration of multiple inference strategies within a first-order logic learning framework, taking advantage of the benefits that each approach can bring. Specifically, abduction is exploited to complete the incoming information in order to handle cases of missing knowledge, and abstra...

2012
José Eduardo Ochoa Luna Kate Revoredo Fábio Gagliardi Cozman

In previous work, we presented an approach for link prediction using a probabilistic description logic, named crALC. Inference in crALC, considering all the social network individuals, was used for suggesting or not a link. Despite the preliminary experiments have shown the potential of the approach, it seems unsuitable for real world scenarios, since in the presence of a social network with ma...

2012
Naoya Inoue Kentaro Inui

Abduction is inference to the best explanation. Abduction has long been studied intensively in a wide range of contexts, from artificial intelligence research to cognitive science. While recent advances in large-scale knowledge acquisition warrant applying abduction with large knowledge bases to real-life problems, as of yet no existing approach to abduction has achieved both the efficiency and...

2011
Shasha Liao Ralph Grishman

Annotating training data for event extraction is tedious and labor-intensive. Most current event extraction tasks rely on hundreds of annotated documents, but this is often not enough. In this paper, we present a novel self-training strategy, which uses Information Retrieval (IR) to collect a cluster of related documents as the resource for bootstrapping. Also, based on the particular character...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید