| Title | 1 |
---|
| Preface | 5 |
---|
| Organization | 7 |
---|
| Contents | 13 |
---|
| Chapter 1 Machine Learning and Intelligence | 16 |
---|
| An Incremental Density-Based Clustering Technique for Large Datasets | 17 |
| Introduction | 17 |
| What Is DBSCAN? | 18 |
| Related Work | 19 |
| Incremental DBSCAN Algorithm | 20 |
| Dataset Sorting | 20 |
| Region Query | 20 |
| Cluster Merging | 21 |
| Computational Complexity | 23 |
| Experimental Details | 23 |
| Conclusion and Future Work | 24 |
| References | 24 |
| BSDT ROC and Cognitive Learning Hypothesis | 26 |
| Introduction | 26 |
| BSDT Coding-Decoding and Performance | 27 |
| BSDT Cognitive Learning Hypothesis | 28 |
| BSDT ROC Fitting Procedure | 29 |
| BSDT ROCs for Patients with Brain Damage | 32 |
| Discussion and Conclusions | 33 |
| References | 35 |
| Evolving Fuzzy Classifier for Data Mining - an Information Retrieval Approach | 37 |
| Introduction | 37 |
| Fuzzy Information Retrieval | 38 |
| Genetic Algorithms and Genetic Programming | 39 |
| GP for the Evolutionary Query Optimization | 40 |
| Genetic Evolution of Fuzzy Classifier | 41 |
| Conclusions | 43 |
| References | 44 |
| Mereotopological Analysis of Formal Concepts in Security Ontologies | 45 |
| Introduction | 45 |
| Knowledge Representation in Security Ontologies | 46 |
| Representability of Security Issues | 47 |
| Ontology Visualization Based on Reasoning Services | 48 |
| Paella Tool | 49 |
| Analysis with Paella of Ontologies on Security | 51 |
| Final Remarks and Future Work | 51 |
| References | 52 |
| Chapter 2 Agents and Multi-Agent Systems | 53 |
---|
| A Multi-agent Data Mining System for Defect Forecasting in a Decentralized Manufacturing Environment | 54 |
| Introduction | 55 |
| Agents Devoted to Render the Internal and Superficial Defects Maps | 56 |
| Agents Devoted to Develop and Maintain the Learning Context | 58 |
| Agents Devoted to Evaluate the Coils Entering the Pickling Line and to Forecast the Remaining Defects | 59 |
| Conclusions | 61 |
| References | 61 |
| A Distributed Hierarchical Multi-agent Architecture for Detecting Injections in SQL Queries | 62 |
| Introduction | 62 |
| A Multi-agent Architecture for the Detection of SQL Injection | 63 |
| Classifier CBR Agent | 65 |
| Retrieve | 66 |
| Reuse | 66 |
| Revise | 67 |
| Retain | 67 |
| Results and Conclusions | 68 |
| References | 69 |
| Incorporating Temporal Constraints in the Analysis Task of a Hybrid Intelligent IDS | 71 |
| Introduction | 71 |
| MOVICAB-IDS | 72 |
| Time-Bounding the MOVICAB-IDS Analyzer Agents | 74 |
| Temporal Bounded CBR | 75 |
| Integrating TB-CBR into the MOVICAB-IDS Analyzer Agent | 76 |
| Experimental Results | 77 |
| Conclusions | 78 |
| References | 78 |
| Chapter 3 Image, Video and Speech Processing | 80 |
---|
| Performances of Speech Signal Biometric Systems B
|