Biologically Inspired Cognitive Architectures (BICA) for Young Scientists

Proceedings of the First International Early Research Career Enhancement School on BICA and Cybersecurity (FIERCES 2017)
 
 
Springer (Verlag)
  • erschienen am 25. Juli 2017
  • |
  • XIX, 358 Seiten
 
E-Book | PDF mit Adobe-DRM | Systemvoraussetzungen
E-Book | PDF mit Wasserzeichen-DRM | Systemvoraussetzungen
978-3-319-63940-6 (ISBN)
 

This book includes papers from the second year of the prestigious First International Early Research Career Enhancement School (FIERCES) series: a successful, new format that puts a school in direct connection with a conference and a social program, all dedicated to young scientists. Reflecting the friendly, social atmosphere of excitement and opportunity, the papers represent a good mixture of cutting-edge research focused on advances towards the most inspiring challenges of our time and first ambitious attempts at major challenges by as yet unknown, talented young scientists. In this second year of FIERCES, the BICA Challenge (to replicate all the essential aspects of the human mind in the digital environment) meets the Cybersecurity Challenge (to protect all the essential assets of the human mind in the digital environment), which is equally important in our age. As a result, the book fosters lively discussions on today's hot topics in science and technology, and stimulates the emergence of new cross-disciplinary, cross-generation and cross-cultural collaboration. FIERCES 2017, or the First International Early Research Career Enhancement School on Biologically Inspired Cognitive Architectures and Cybersecurity, was held on August 1-5 at the Baltschug Kempinski in Moscow, Russia.

weitere Ausgaben werden ermittelt
  • Intro
  • Preface
  • Merging Biologically Inspired Cognitive Architectures and Cybersecurity
  • Organization
  • Program Committee
  • Core Organizing Committee of BICA 2017
  • Contents
  • Abstract
  • Biologically Inspired Cognitive Architectures
  • Task Planning in ``Block World'' with Deep Reinforcement Learning
  • 1 Introduction
  • 2 Problem Statement
  • 3 Experiments
  • 4 Reward Function
  • 5 Implemented Neural Architectures
  • 5.1 Convolutional Network
  • 5.2 Recurrent Net
  • 5.3 Q-Learning
  • 6 Testing the Hypothesis with Simple Model
  • 7 Conclusions
  • References
  • Discrete Modeling of Multi-transmitter Neural Networks with Neuronal Competition
  • Abstract
  • 1 Introduction
  • 2 Related Work
  • 3 Multitransmitter Neural System
  • 3.1 Main Definitions
  • 3.2 Excitation and Inhibition
  • 3.3 Neuronal Types
  • 3.4 Neuronal Competition and Model Dynamics
  • 4 Example: Snail Feeding Rhythm
  • 5 Conclusion
  • References
  • A Simple Virtual Actor Model Supporting Believable Character Reasoning in Virtual Environments
  • Abstract
  • 1 Introduction
  • 2 Virtual Actor Model
  • 3 The Teleport Paradigm
  • 4 Virtual Actor Embedded in the Teleport Paradigm
  • 4.1 General Description of the Model and Its Parameters
  • 4.2 Algorithms and Rules of Dynamics
  • 5 Experimental Testing
  • 5.1 Settings, Participants and Procedures
  • 5.2 Results and Discussion
  • 6 Conclusions
  • Acknowledgments
  • References
  • Intelligent Search System for Huge Non-structured Data Storages with Domain-Based Natural Language Interface
  • Abstract
  • 1 Introduction
  • 2 Natural Language Understanding and Processing
  • 3 Rectification of Queries with Semantic Mapping
  • 4 System Description
  • 5 Conclusion
  • Acknowledgements
  • References
  • Modeling Behavior of Virtual Actors: A Limited Turing Test for Social-Emotional Intelligence
  • Abstract
  • 1 Introduction
  • 2 Materials and Methods
  • 2.1 Virtual Environment Simulator
  • 2.2 Experimental Paradigm
  • 2.3 Data Acquisition and Analysis
  • 2.4 Virtual Actor
  • 2.5 Subjects and Procedure
  • 3 Result
  • 3.1 Result and Analysis
  • 4 Discussion
  • 4.1 Summary, Interpretation and Implications of the Outcome
  • 4.2 Future Work
  • 4.3 Conclusions
  • Acknowledgment
  • References
  • Rethinking BICA's R&D Challenges: Grief Revelations of an Upset Revisionist
  • Abstract
  • 1 Introduction
  • 2 What is Information?
  • 3 Rethinking BICA
  • 4 Conclusions
  • References
  • A Roadmap to Emotionally Intelligent Creative Virtual Assistants
  • Abstract
  • 1 Introduction
  • 2 The Concept of an Emotional Creative Assistant
  • 2.1 eRobodanza
  • 2.2 eArtist
  • 2.3 eActor
  • 3 Approach and Methodology
  • 3.1 From Robodanza to eRobodanza
  • 3.2 Cognitive Architecture
  • 3.3 Toward eArtist
  • 4 Concluding Outline of the Roadmap
  • 5 Discussion of Related Work
  • 6 Conclusions
  • Acknowledgments
  • References
  • Applying a Neural Network Architecture with Spatio-Temporal Connections to the Maze Exploration
  • 1 Introduction
  • 2 Formal Problem
  • 3 Neural Network Architecture
  • 3.1 Algorithm
  • 4 Experiments
  • 5 Conclusion
  • References
  • A Hands-on Laboratory Tutorial on Using CST to Build a Cognitive Architecture
  • 1 Introduction
  • 2 Basic Notions
  • 3 The Main Classes
  • 4 The WS3DApp Application
  • 5 Conclusion
  • References
  • Robot Navigation Based on an Artificial Somatosensorial System
  • 1 Introduction
  • 2 The Artificial Somatosensory System
  • 3 Experiments
  • 4 Conclusions and Future Work
  • References
  • About Realization of Aggressive Behavior Model in Group Robotics
  • Abstract
  • 1 Introduction
  • 2 Aggressive Behavior
  • 3 Aggressive Behavior Model
  • 4 Simulation Experiments
  • 5 Conclusion
  • Acknowledgements
  • References
  • Human Brain Structural Organization in Healthy Volunteers and Patients with Schizophrenia
  • Abstract
  • 1 Introduction
  • 2 Materials and Methods
  • 3 Results
  • 4 Disscussion
  • Acknowledgments
  • References
  • No Two Brains Are Alike: Cloning a Hyperdimensional Associative Memory Using Cellular Automata Computations
  • 1 Introduction
  • 2 High-Dimensional Vectors and Related Operations
  • 2.1 VSA-based BICA
  • 3 Cellular Automata
  • 3.1 CA and Hyperdimensional Vectors
  • 4 Cloning of VSA-based Associative Memory with CA90 Computations
  • 4.1 Simulations
  • 5 Conclusions
  • References
  • Informative Characteristics of Brain Activity to Diagnose Functional Disorders in People with Stuttering
  • 1 Introduction
  • 2 Materials and Methods
  • 3 Results
  • 4 Discussion
  • References
  • Event-Related fMRI Analysis Based on the Eye Tracking and the Use of Ultrafast Sequences
  • 1 Introduction
  • 2 Materials and Methods
  • 2.1 Localizer and Free Viewing Experiments
  • 2.2 Data Analysis
  • 3 Results
  • 4 Discussion
  • References
  • The Presentation of Evolutionary Concepts
  • 1 Introduction
  • 2 Task to Develop a Model of Evolutionary Concepts
  • 3 Variable Domains in the Theory of Categories. Development of the Model for Support to Evolutionary Concepts
  • 3.1 Cartesian Closed Category
  • 3.2 Cartesian Product in a Functor Category
  • 3.3 The Exponential
  • 3.4 The Exponential in the Functor Category
  • 4 The Model of the Evolutionary Concepts
  • 5 Testing the Constructions of a Model
  • 6 Conclusion
  • References
  • Semantic Comprehension System for F-2 Emotional Robot
  • Abstract
  • 1 The Problem of Text Comprehension
  • 2 Approaches to Text Comprehension and Sentiment Analysis
  • 3 Parser Architecture
  • 3.1 Morphological Processing: Stemmer and Dictionary
  • 3.2 Syntactic Processing: syntXML
  • 3.3 Semantic Processing: Scripts
  • 4 Robot and the Transfer or Behavior
  • References
  • Methodology of Learning Curve Analysis for Development of Incoming Material Clustering Neural Network
  • Abstract
  • 1 Introduction
  • 2 Methodology
  • 3 Results and Discussion
  • 4 Conclusion
  • Acknowledgments
  • References
  • Modern Views on Visual Attention Mechanisms
  • 1 Introduction
  • 2 Basic Features of the Known Research on Visual Attention Mechanisms
  • 3 Towards Development of Biologically Inspired Models of Visual Attention
  • 4 Some Results of Our Psychophysical Tests
  • 5 Conclusion
  • References
  • Model of Interaction Between Learning and Evolution
  • Abstract
  • 1 Introduction
  • 2 Description of the Model
  • 3 Results of Computer Simulation
  • 3.1 Comparison of Regimes of Pure Evolution and Evolution Combined with Learning
  • 3.2 Hiding Effect
  • 3.3 Influence of the Learning Load on the Modeled Processes
  • 4 Conclusion
  • Acknowledgments
  • References
  • Intelligent Planning Methods and Features of Their Usage for Development Automation of Dynamic Integrated Expert Systems
  • 1 Introduction
  • 2 Intelligent Planning Methods and Features of Their Usage for Dynamic IES Development Automation
  • 3 Methods and Approaches Used in Basic Intelligent Programm Environment Components
  • 4 Conclusion
  • References
  • Ontological Approach for the Organization of Intelligent Tutoring on the Basis of Tutoring Integrated Expert Systems
  • 1 Introduction
  • 2 Basic Model of Ontology of Course/Discipline
  • 2.1 Integration Between Ontology Elements of Courses/Disciplines with Individual Models of Students and Adaptive Tutoring Models
  • 3 Conclusion
  • References
  • A Continuous-Attractor Model of Flip Cell Phenomena
  • Abstract
  • 1 Introduction: Head Direction and Flip Cells
  • 2 A Model-Based Interpretation of Flip Cell Phenomena
  • 3 Model Implementation and Simulation Details
  • 4 Simulation Results and Discussion
  • 5 Discussion
  • 5.1 Related Work and Predictions
  • 6 Conclusions
  • Acknowledgments
  • References
  • Neural Network Classification Method for Solution of the Problem of Monitoring Theremoval of the The ...
  • Abstract
  • 1 Introduction
  • 2 Experiment
  • 3 Results
  • 3.1 ANN Training on the Complete Set of Input Features
  • 3.2 ANN Training After Significant Input Features Selection
  • 3.2.1 Cross-Correlation
  • 3.2.2 Cross-Entropy
  • 3.2.3 Standard Deviation
  • 3.2.4 Analysis of Weights of a Neural Network
  • 4 Conclusions
  • Acknowledgments
  • References
  • Realization of the Gesture Interface by Multifingered Robot Hand
  • 1 Introduction
  • 2 Problem Formulation
  • 3 Experiment
  • 4 Conclusion
  • References
  • A Conscious Robot that Can Venture into an Unknown Environment in Search of Pleasure
  • Abstract
  • 1 Mechanism of Searching the Unknown
  • 2 Conscious System that Ventures into Unknown Environments
  • 3 Robot Experiments
  • 4 Conclusions and Considerations
  • References
  • Algorithms for Intelligent Automated Evaluation of Relevance of Search Queries Results
  • Abstract
  • 1 Introduction
  • 2 Algorithm of Forming and Evaluating Results of a Search Output
  • 2.1 Data Processing
  • 2.2 Feature Generation
  • 2.3 Model Quality Analysis
  • 2.4 Assessors' Evaluation Quality Analysis
  • 3 Conclusions
  • Acknowledgments
  • References
  • "Re:ROS": Prototyping of Reinforcement Learning Environment for Asynchronous Cognitive Architecture
  • Abstract
  • 1 Introduction
  • 2 Elements of Reinforcement Learning
  • 2.1 RL with Asynchronous Distributed Systems
  • 2.2 Asynchronous Cognitive Architecture
  • 3 Elements of Re:ROS
  • 3.1 Re:ROS Packages
  • 4 Example
  • 5 Conclusion
  • References
  • Adaptive Control of Modular Robots
  • Abstract
  • 1 Introduction. Modular Robots
  • 2 Simulator
  • 3 Control System
  • 4 Snake-like Robot Locomotion Control System
  • 5 Multiped Robot Locomotion Control System
  • 6 Trunk-like Robot Locomotion Control System
  • References
  • Model of Heterogeneous Interactions Between Complex Agents. From a Neural to a Social Network
  • Abstract
  • 1 Introduction
  • 2 Model Description
  • 3 Model of a Social Network with Five Types of Agents
  • 3.1 States of Agents and Their Mutual Influence
  • 3.2 Types of Agents
  • 4 Conclusion
  • Acknowledgments
  • References
  • Methods of Artificial Intelligence in Cybersecurity
  • Stochastic Data Transformation Boxes for Information Security Applications
  • Abstract
  • 1 Introduction
  • 2 Stochastic Transformation Blocks. R-Boxes
  • 3 Conclusion
  • Acknowledgement
  • References
  • An Innovative Algorithm for Privacy Protection in a Voice Disorder Detection System
  • 1 Introduction
  • 2 Proposed Implementation in Healthcare System
  • 3 Proposed Zero-Watermarking Algorithm
  • 4 Experimental Results and Discussion
  • 5 Conclusion
  • References
  • Handwritten Signature Verification: The State of the Art
  • Abstract
  • 1 Introduction
  • 2 Related Works
  • 3 Analysis of the Main Verification Algorithms
  • 4 Conclusions
  • Acknowledgments
  • References
  • The Port-in-Use Covert Channel Attack
  • 1 Introduction
  • 2 Covert Channel Classification
  • 3 Attack Scenario
  • 4 Implementation Details
  • 5 Conclusion
  • References
  • Discovering and Clustering Hidden Time Patterns in Blockchain Ledger
  • Abstract
  • 1 Introduction
  • 2 Related Works
  • 3 Discovery of Hidden Patterns in Audit Logs
  • 4 Clustering Behavior Patterns
  • 5 Anomaly Detection in Behavior Patterns
  • 6 Conclusions
  • Acknowledgments
  • References
  • On Attribute-Based Encryption for Access Control to Multidimensional Data Structures
  • Abstract
  • 1 Introduction
  • 2 Preliminaries and Related Works
  • 3 Using of Attribute-Based Encryption for Multidimensional Datasets
  • 4 The Scheme of Attribute Management
  • 5 Conclusions
  • Acknowledgments
  • References
  • Gamma-Probe for Locating the Source of Ionizing Radiation
  • Abstract
  • 1 Introduction
  • 2 Gamma-Probe Prototype
  • 3 MK. I Device Description
  • 4 MK. II Amplifier Development
  • 5 Testing and Results
  • 6 Conclusions
  • Acknowledgments
  • References
  • New Life of Old Standard: Transition from One-Dimensional Version to 3D
  • Abstract
  • 1 Introduction
  • 2 GOST 28147-89
  • 3 3D GOST
  • 4 Conclusions
  • Acknowledgments
  • References
  • Algorithmic Foundation for Benchmarking of Computational Platforms Running Asymmetric Cipher Systems
  • 1 Introduction
  • 2 Known Knapsack Problem Solution Methods
  • 3 Forming the Algorithmic Foundation
  • 4 Summary
  • References
  • Analysis of SIEM Systems and Their Usage in Security Operations and Security Intelligence Centers
  • Abstract
  • 1 Introduction
  • 2 SIEM Concept
  • 3 SOCs and SIEM 1.0
  • 4 SICs and SIEM 2.0
  • 5 Conclusion
  • Acknowledgments
  • References
  • Organization's Business Continuity in Cyberspace
  • Abstract
  • 1 Introduction
  • 2 Business Processes
  • 3 Business Continuity Concept
  • 4 Business Continuity Management in Cyberspace
  • 5 Conclusion
  • Acknowledgments
  • References
  • DLP Systems as a Modern Information Security Control
  • Abstract
  • 1 Introduction
  • 2 About the Terminology
  • 3 DLP System's Functionality
  • 4 One Example of DLP System
  • 5 Conclusion
  • Acknowledgments
  • References
  • Cognitive Data Visualization of Chirality-Dependent Carbon Nanotubes Thermal and Electrical Properties
  • Abstract
  • 1 Introduction
  • 2 The Use of Color Transparency in Chirality-Dependent Carbon Nanotube Properties Visualization
  • 3 3D Representation of Chirality-Dependent Carbon Nanotubes Properties
  • 4 Cognitive Representation of Chirality-Dependent Thermal Properties of Carbon Nanotubes
  • 5 Conclusion
  • References
  • Security Module Protecting the Privacy of Mobile Communication
  • Abstract
  • 1 Introduction
  • 2 Security Connection Module
  • 3 Testing
  • 4 Conclusions
  • Acknowledgments
  • References
  • Extracting of High-Level Structural Representation from VLSI Circuit Description Using Tangled Logic ...
  • Abstract
  • 1 Introduction
  • 2 Related Work
  • 3 A Method to Find Functional Groups
  • 4 Experimental Results
  • 5 Conclusions
  • Acknowledgment
  • References
  • Medical Knowledge-Based Decision Support System
  • Abstract
  • 1 Introduction
  • 2 Classification and Operation Principles of Decision Support System in Healthcare
  • 2.1 Classification
  • 2.2 Logical Model
  • 3 Conclusions
  • Acknowledgments
  • References
  • Copyright Protection for Video Content Based on Digital Watermarking
  • Abstract
  • 1 Introduction
  • 2 Embedding Methods
  • 3 DEW Algorithm
  • 4 Robustness Research
  • 5 Conclusions
  • Acknowledgments
  • References
  • Method for Early Cognition of Unloyal Behaviour by Combining Analysis of Natural and Artificial Detection Methods
  • Abstract
  • 1 Introduction
  • 2 Choosing Methods for Personnel Check
  • 3 Methods Classification by Examined Features
  • 4 Choice of a Rational Set of Methods
  • 5 The Example How to Apply the Methodology
  • 6 Common Recommendations for Applying This Methodology
  • 7 Conclusion
  • Acknowledgment
  • References
  • Probabilistic Assessment of the Organization of Tournaments and Examinations Using Paired Comparisons
  • Abstract
  • 1 Introduction
  • 2 Discrete Distribution of Player's State and Density of Probability Distribution of the Number of Points
  • 3 The Density of Distribution of the Number of Points Scored at the End of the Tournament and Round Tournament
  • 4 Conclusions
  • Acknowledgments
  • References
  • Criteria for Assessing the Results of Production Activities of Automobile Gas Filling Compressor Sta ...
  • Abstract
  • 1 Conceptual Bases of Research
  • 2 Structure and Methods of Research
  • 3 Results of the Study
  • 4 Conclusions
  • Acknowledgments
  • References
  • Correction to: Gamma-Probe for Locating the Source of Ionizing Radiation
  • Correction to: Chapter "Gamma-Probe for Locating the Source of Ionizing Radiation" in: A.V. Samsonovich and V.V. Klimov (eds.), Biologically Inspired Cognitive Architectures (BICA) for Young Scientists, Advances in Intelligent Systems and Computing 636, https://doi.org/10.1007/978-3-319-63940-6_37
  • Author Index

Dateiformat: PDF
Kopierschutz: Adobe-DRM (Digital Rights Management)

Systemvoraussetzungen:

Computer (Windows; MacOS X; Linux): Installieren Sie bereits vor dem Download die kostenlose Software Adobe Digital Editions (siehe E-Book Hilfe).

Tablet/Smartphone (Android; iOS): Installieren Sie bereits vor dem Download die kostenlose App Adobe Digital Editions (siehe E-Book Hilfe).

E-Book-Reader: Bookeen, Kobo, Pocketbook, Sony, Tolino u.v.a.m. (nicht Kindle)

Das Dateiformat PDF zeigt auf jeder Hardware eine Buchseite stets identisch an. Daher ist eine PDF auch für ein komplexes Layout geeignet, wie es bei Lehr- und Fachbüchern verwendet wird (Bilder, Tabellen, Spalten, Fußnoten). Bei kleinen Displays von E-Readern oder Smartphones sind PDF leider eher nervig, weil zu viel Scrollen notwendig ist. Mit Adobe-DRM wird hier ein "harter" Kopierschutz verwendet. Wenn die notwendigen Voraussetzungen nicht vorliegen, können Sie das E-Book leider nicht öffnen. Daher müssen Sie bereits vor dem Download Ihre Lese-Hardware vorbereiten.

Bitte beachten Sie bei der Verwendung der Lese-Software Adobe Digital Editions: wir empfehlen Ihnen unbedingt nach Installation der Lese-Software diese mit Ihrer persönlichen Adobe-ID zu autorisieren!

Weitere Informationen finden Sie in unserer E-Book Hilfe.


Dateiformat: PDF
Kopierschutz: Wasserzeichen-DRM (Digital Rights Management)

Systemvoraussetzungen:

Computer (Windows; MacOS X; Linux): Verwenden Sie zum Lesen die kostenlose Software Adobe Reader, Adobe Digital Editions oder einen anderen PDF-Viewer Ihrer Wahl (siehe E-Book Hilfe).

Tablet/Smartphone (Android; iOS): Installieren Sie die kostenlose App Adobe Digital Editions oder eine andere Lese-App für E-Books (siehe E-Book Hilfe).

E-Book-Reader: Bookeen, Kobo, Pocketbook, Sony, Tolino u.v.a.m. (nur bedingt: Kindle)

Das Dateiformat PDF zeigt auf jeder Hardware eine Buchseite stets identisch an. Daher ist eine PDF auch für ein komplexes Layout geeignet, wie es bei Lehr- und Fachbüchern verwendet wird (Bilder, Tabellen, Spalten, Fußnoten). Bei kleinen Displays von E-Readern oder Smartphones sind PDF leider eher nervig, weil zu viel Scrollen notwendig ist. Mit Wasserzeichen-DRM wird hier ein "weicher" Kopierschutz verwendet. Daher ist technisch zwar alles möglich - sogar eine unzulässige Weitergabe. Aber an sichtbaren und unsichtbaren Stellen wird der Käufer des E-Books als Wasserzeichen hinterlegt, sodass im Falle eines Missbrauchs die Spur zurückverfolgt werden kann.

Weitere Informationen finden Sie in unserer E-Book Hilfe.


Download (sofort verfügbar)

213,99 €
inkl. 7% MwSt.
Download / Einzel-Lizenz
PDF mit Adobe-DRM
siehe Systemvoraussetzungen
E-Book bestellen

213,99 €
inkl. 7% MwSt.
Download / Einzel-Lizenz
PDF mit Wasserzeichen-DRM
siehe Systemvoraussetzungen
E-Book bestellen