5. Methodology Compare the performance of XCS with an implementation of C4.5, a decision tree algorithm called J48, on the reminder generation task. Exemplar.

Slides:



Advertisements
Similar presentations
Teaching an Agent by Playing a Multimodal Memory Game: Challenges for Machine Learners and Human Teachers AAAI 2009 Spring Symposium: Agents that Learn.
Advertisements

Genetic Algorithms Sushil J. Louis Evolutionary Computing Systems LAB Dept. of Computer Science University of Nevada, Reno
Chapter 4 DECISION SUPPORT AND ARTIFICIAL INTELLIGENCE
University of Minho School of Engineering Algoritmi Centre Uma Escola a Reinventar o Futuro – Semana da Escola de Engenharia - 24 a 27 de Outubro de 2011.
Artificial Intelligence
Friend Recommendations in Social Networks using Genetic Algorithms and Network Topology Jeff Naruchitparames, Mehmet Gunes, Sushil J. Louis University.
The Decision-Making Process IT Brainpower
Relational Data Mining in Finance Haonan Zhang CFWin /04/2003.
3. User Study Simulate an average research work- day activity of reading a research paper while listening to music and being interrupted with conversations.
Learning from Experience: Case Injected Genetic Algorithm Design of Combinational Logic Circuits Sushil J. Louis Genetic Algorithm Systems Lab(gaslab)
Genetic Learning from Experience Sushil J. Louis Evolutionary Computing Systems LAB Department of Computer Science University of Nevada, Reno
Genetic Algorithms Sushil J. Louis Evolutionary Computing Systems LAB Dept. of Computer Science University of Nevada, Reno
Classifier Systems Anil Shankar Dept. of Computer Science University of Nevada, Reno.
Ambient Displays of User Mood Tony Morelli Department of Computer Science, University of Nevada, Reno Abstract: Determining a user’s mood can be a very.
McGraw-Hill/Irwin ©2005 The McGraw-Hill Companies, All rights reserved ©2005 The McGraw-Hill Companies, All rights reserved McGraw-Hill/Irwin.
Smart Home Technologies CSE 4392 / CSE 5392 Spring 2006 Manfred Huber
A Survey of Mobile Phone Sensing Michael Ruffing CS 495.
Data Mining Techniques
A Survey on Context-Aware Computing Center for E-Business Technology Seoul National University Seoul, Korea 이상근, 이동주, 강승석, Babar Tareen Intelligent Database.
Ambulation : a tool for monitoring mobility over time using mobile phones Computational Science and Engineering, CSE '09. International Conference.
Chapter 10 Architectural Design
Recommender Systems on the Web: A Model-Driven Approach Gonzalo Rojas – Francisco Domínguez – Stefano Salvatori Department of Computer Science University.
What is UML? What is UP? [Arlow and Neustadt, 2005] January 23, 2014
Presentation Outline Motivation Basic concept Bakground Futur work Conclusion Nesrine MEZHOUDI User Interface Adaptation.
Cyber-Infrastructure for Agro-Threats Steve Goddard Computer Science & Engineering University of Nebraska-Lincoln.
Electronic Visualization Laboratory, University of Illinois at Chicago PAVIS Pervasive Adaptive Visualization and Interaction Service Javid Alimohideen.
Last Words COSC Big Data (frameworks and environments to analyze big datasets) has become a hot topic; it is a mixture of data analysis, data mining,
Chapter 11: Artificial Intelligence
Modeling Driver Behavior in a Cognitive Architecture
Four Types of Decisions (p p.130) Structured vs. Nonstructured(Examples?) –Structured: Follow rules and criteria. The right answer exists. No “feel”
Mining Minds Mr. Amjad UsmanMr. Amjad Usman19-July-2014KHU High-level Context Awareness.
Evolutionary Computing Systems Lab (ECSL), University of Nevada, Reno 1 Authors : Siming Liu, Christopher Ballinger, Sushil Louis
Efficient Interaction Strategies for Adaptive Reminding Julie S. Weber & Martha E. Pollack Adaptive Reminder Generation SignalingIntended Approach Learning.
Nov , 2006 The 2nd Korea-Sweden Workshop on Intelligent Systems for Societal Challenges of the 21st Century Pine Hall, 23F, Hotel The Silla Seoul,
Intelligent Database Systems Lab 國立雲林科技大學 National Yunlin University of Science and Technology 1 Wireless Sensor Network Wireless Sensor Network Based.
I Robot.
Model of the Human  Name Stan  Emotion Happy  Command Watch me  Face Location (x,y,z) = (122, 34, 205)  Hand Locations (x,y,z) = (85, -10, 175) (x,y,z)
REU 2004 Computer Science and Engineering Department The University of Texas at Arlington Research Experiences for Undergraduates in Distributed Rational.
Intelligent Robot Architecture (1-3)  Background of research  Research objectives  By recognizing and analyzing user’s utterances and actions, an intelligent.
Data Mining BY JEMINI ISLAM. Data Mining Outline: What is data mining? Why use data mining? How does data mining work The process of data mining Tools.
Mining Weather Data for Decision Support Roy George Army High Performance Computing Research Center Clark Atlanta University Atlanta, GA
Human-Computer Interaction at CMU Jodi Forlizzi Jason Hong.
CONCLUSIONS & CONTRIBUTIONS Ground-truth dataset, simulated search tasks environment Multiple everyday applications (MS Word, MS PowerPoint, Mozilla Browser)
Artificial Intelligence, Expert Systems, and Neural Networks Group 10 Cameron Kinard Leaundre Zeno Heath Carley Megan Wiedmaier.
Pertemuan 16 Materi : Buku Wajib & Sumber Materi :
REU 2007 Computer Science and Engineering Department The University of Texas at Arlington Research Experiences for Undergraduates in Information Processing.
Artificial Intelligence: Research and Collaborative Possibilities a presentation by: Dr. Ernest L. McDuffie, Assistant Professor Department of Computer.
Identifying “Best Bet” Web Search Results by Mining Past User Behavior Author: Eugene Agichtein, Zijian Zheng (Microsoft Research) Source: KDD2006 Reporter:
- How to draw a clear distinction between a client and a server(there is often no clear distinction) - A server may continuously act as a client - Distinction.
Computer Science and Engineering Department The University of Texas at Arlington MavHome: An Intelligent Home Environment.
Intelligent Control Methods Lecture 2: Artificial Intelligence Slovak University of Technology Faculty of Material Science and Technology in Trnava.
UCI Large-Scale Collection of Application Usage Data to Inform Software Development David M. Hilbert David F. Redmiles Information and Computer Science.
REU 2009 Computer Science and Engineering Department The University of Texas at Arlington Research Experiences for Undergraduates in Information Processing.
Evolutionary Computing Systems Lab (ECSL), University of Nevada, Reno 1 Authors : Siming Liu, Christopher Ballinger, Sushil Louis
Roslyn: A Tour Guide Robot Jared Rhizor, Timothy Sweet, Nishok Yadav Advisor: Dr. David Feil-Seifer Instructor: Dr. Sergiu Dascalu Department of Computer.
Data Mining is the process of analyzing data and summarizing it into useful information Data Mining is usually used for extremely large sets of data It.
Blue eyes ( blue eyes – Human operator monitoring system ) Presented by Shilpa.m(1rg07cs079) Under the guidence M. saranya M s. saranya Lecturer,cse dept.
The University of Nevada, Reno SYCOPHANT Sycophant A Context Based Generalized User-Modeling Framework for Desktop Applications Anil Shankar Evolutionary.
Perceptive Computing Democracy Communism Architecture The Steam Engine WheelFire Zero Domestication Iron Ships Electricity The Vacuum tube E=mc 2 The.
Chapter 11: Artificial Intelligence
Chapter 11: Artificial Intelligence
What is UML? What is UP? [Arlow and Neustadt, 2005] October 5, 2017
Context-Aware Computing
Waikato Environment for Knowledge Analysis
Louise Lawrence Supervisor: Dr Wolfgang Mayer
Introduction to Artificial Intelligence Instructor: Dr. Eduardo Urbina
Mapping GUIs to Auditory Interfaces
Technology of Data Glove
Presentation transcript:

5. Methodology Compare the performance of XCS with an implementation of C4.5, a decision tree algorithm called J48, on the reminder generation task. Exemplar from our context data-set: Sensor value grouping : Sensor-Count, Sensor-All5, Sensor-Any5, Sensor-All1, Sensor-Any1 and Sensor-Immediate. User1 – user name – appointment time 0, 0, 0, 0, 0, 0 – motion-sensor values 7, 0, 1, 0, 0, 0 – speech-sensor values 20, 1, 1, 1, 1, 1 – process-1 sensor values 20,1, 1, 1, 1, 1 - process-2 sensor values 20, 1, 1, 1, 1, 1 - process-3 sensor values 0, 0, 0, 0, 0, 0 - process-4 sensor values 20, 1, 1, 1, 1, 1 - process-5 sensor values 0, 0, 0, 0, 0, 0 – keyboard sensor values 0, 0, 0, 0, 0, 0 – mouse sensor values 3 – reminder type preferred by a user The same exemplar in a bit string representation for XCS :3 7. Discussions & Conclusions 2. Objectives Apply machine learning techniques to data gathered from simple context sensors to build improved human computer interfaces Use simple sensors to continuously gather data on a computer system’s internal and external environment Mine this context data for useful user-behavior patterns to better predict user preferences (behavior) and improve user interaction Apply XCS, a Genetics Based Machine Learning Technique to learn a mapping from user- related contextual features to reminder types 3. Our approach Integrates approaches in context aware systems and data mining Considers a computer as a stationary robot with simple sensors for sensing the external and internal environments Builds user-interfaces on this stationary model of a computer 4. Sycophant A simple calendaring application program that stores appointments and reminds a user using different reminder types Generates four types of reminders : visual (a pop-up window), speech (using a text-to-speech system), both, or neither Continuously gathers binary activity data from the keyboard, mouse, a motion detector, and a speech sensor; monitors the activity of five processes on the computer Generates a reminder and expects the user to indicate whether Sycophant used the correct reminder type Combine expert-generated rules with machine learned rules and use this combined knowledge to design better adaptive user interfaces Collect data from different users to scale up our research in the area of context learning applications and consider the possibility for personalization to individual users Fig.1 Architecture Fig.2 Sycophant – User Interface Fig.3 XCS Architecture Anil Shankar, Sushil J Louis Evolutionary Computing Systems Lab (ECSL) Dept. of Computer Science and Engineering, University of Nevada, Reno, USA Acknowledgments: This work was supported in part by contract number N from the Office of Naval Research. 6. Results XCS outperforms J48 on the test sets Current computer applications pay insufficient attention to a computer’s environment. These application programs lack context-awareness, and therefore they can only make weak attempts to adapt to individual user needs. Our approach is to: use simple sensors to collect data on a computer system’s internal and external environment. mine this contextual information for useful user-behavior patterns to better predict user preferences (behavior) and improve user interaction To substantiate our hypothesis, we have designed Sycophant, a context learning calendaring application program that learns a mapping from user-related contextual features to reminder actions 1. Motivation