Journal of Japan Society for Fuzzy Theory and Intelligent Informatics
Online ISSN : 1881-7203
Print ISSN : 1347-7986
ISSN-L : 1347-7986
Volume 19, Issue 3
Displaying 1-22 of 22 articles from this issue
Special Issue: Security and Trust
Original Papers
  • Takahiro FUKUSHIMA, Akira UTSUMI
    2007 Volume 19 Issue 3 Pages 239-249
    Published: June 15, 2007
    Released on J-STAGE: August 24, 2007
    JOURNAL FREE ACCESS
    This paper proposes a computational method for estimating Web page credibility based on the properties of a Web page or its text. The proposed method consists of two processes: the process of judging whether a given Web page has each of the properties influencing Web page credibility and the process of assessing the degree of Web credibility using the properties judged to be possessed by the given Web page. Concerning what properties really influence people's judgment of Web page credibility, we conducted a questionnaire survey and obtained 68 properties and their degree of influence on credibility. We then developed a method for judging the presence or absence of 40 properties. As a method for assessing the degree of Web credibility, we also developed an aggregative method (i.e., calculating the sum of the degree of influence) and a machine learning method using Support Vector Machine (SVM). We then conducted an evaluation experiment for binary classification of credible or incredible Web pages and verified the effectiveness of the proposed method.
    Download PDF (5746K)
Short Notes
  • Natsuko HIKAGE, Yuko MURAYAMA
    2007 Volume 19 Issue 3 Pages 250-255
    Published: June 15, 2007
    Released on J-STAGE: August 24, 2007
    JOURNAL FREE ACCESS
    In this research, we propose a quantitative model of evaluating security systems in terms of sense of security. This paper starts with our original Anshin evaluation model and reports on its verification. We conducted a questionnaire survey about sense of security to make a statistical survey using factor analysis. Factor analysis showed following factors; 1) trust and security by user expectation, 2) satisfaction of user interface, and 3) understanding of risk and threat by user experience and prior knowledge. In terms of factor analysis, this survey showed that theoretical three factors in the structure of a sense of security were significant statistically. Future works are needed to discuss about some quantitative methods to evaluate for sense of security.
    Download PDF (3476K)
  • Davar PISHVA
    2007 Volume 19 Issue 3 Pages 256-263
    Published: June 15, 2007
    Released on J-STAGE: August 24, 2007
    JOURNAL FREE ACCESS
    This paper describes the feasibility of enhancing existing biometrics technology with a spectroscopic method in order to prevent spoofing. It goes beyond the simple approach of an aliveness detection technique and proposes the implementation of verification of a person's unique `spectral signatures' or `factors' in addition to currently employed methodologies in a multi-factor manner to reduce the likelihood of an imposter getting authenticated. This paper also shows how to augment two widely used biometrics systems (fingerprint and iris recognition devices) with spectral biometrics capabilities in a practical manner and without creating much overhead or inconveniencing their users.
    Download PDF (4468K)
Regular
Original Papers
  • Shigeru OKUBO, Takao SHIMIZU
    2007 Volume 19 Issue 3 Pages 269-275
    Published: June 15, 2007
    Released on J-STAGE: August 24, 2007
    JOURNAL FREE ACCESS
    The fractal is researched and used in various fields now. However, very few studies have been reported on the using the fractal to design the array antenna. In addition, the method of controlling the radiation pattern of fractal array antenna has not been established. In this paper, we propose the method of controlling the radiation pattern of fractal array antenna. The fractal array antenna is made by using the fractal figure for the element position decision. In this work we applied the cantorl set to the controlling of fractal array antenna. The radiation pattern can be obtained by controlling the amplitudes only, it can be designed by using the digitally controlled attenuators. Then the effects of quantisation error on the radiation pattern are verified.
    Download PDF (3685K)
  • Yuji MATSUMOTO, Motohide UMANO, Masahiro TOMARU, Kazuhisa SETA
    2007 Volume 19 Issue 3 Pages 276-286
    Published: June 15, 2007
    Released on J-STAGE: August 24, 2007
    JOURNAL FREE ACCESS
    When we solve a problem, we initially have no knowledge and we memorize the raw data. Finally we have general knowledge for solving the problem. To simulate this learning process, we propose a learning method by switching different levels of knowledge representations, each has a knowledge-set, a knowledge generation method and several reasoning methods. The system reasons the class of given data and the successive incorrect classifications trigger to learn with switching the reasoning method to another, reconstructing the knowledge-set, or switching the knowledge representation to the suitable one for the given data. We implement a prototype of the system and apply it to Pen-Based Recognition of Handwritten Digits in UCI Machine Learning Repository. In the simulation, the system can switch suitable knowledge representations from the raw data to general knowledge such as fuzzy rules with a good rate correctly classified and a small amount of knowledge.
    Download PDF (5394K)
  • Ryo UESUGI, Katsuhiro HONDA, Hidetomo ICHIHASHI, Akira NOTSU
    2007 Volume 19 Issue 3 Pages 287-298
    Published: June 15, 2007
    Released on J-STAGE: August 24, 2007
    JOURNAL FREE ACCESS
    Fuzzy c-Varieties(FCV) is a tool for linear fuzzy clustering and is also applicable to local principal component analysis (local PCA), in which each low-dimensional subspace is estimated considering data partition. Although the clustering criterion in FCV is distances between data points and prototypical linear varieties, the criterion can also be defined based on least square approximation. Optimal scaling is a useful approach to multivariate analysis for mixed databases and has been applied to linear model estimation. This paper proposes two formulations of local PCA for mixed databases based on optimal scaling, in which a conventional FCV and linear fuzzy clustering using least square approximation are enhanced. The proposed algorithms include a step of calculating numerical scores of categorical variables in addition to the ordinary alternative optimization.
    Download PDF (6313K)
  • - Application to A Music Composition System Using Chaotic Neural Network with Rememorizing Patterns -
    Masataka TOKUMARU, Noriaki MURANAKA, Shigeru IMANISHI
    2007 Volume 19 Issue 3 Pages 299-312
    Published: June 15, 2007
    Released on J-STAGE: August 24, 2007
    JOURNAL FREE ACCESS
    Chaotic Neural Network is well known as associative memory. In addition, it has an interesting behavior that it outputs some new interesting patterns with characteristics of multiple memorized patterns during remembrance process. This paper proposes a system that continues expressing new pattern which continue changing gradually while repeating memory and forgetfulness using the chaotic neural network. This system continues outputting new patterns by a rememorizing algorithm that replaces one of memorized patterns with new interesting pattern output by the system. In this way, the system continues remembering new patterns in sequence while changing characteristics of remembrance patterns gradually. It is expected to apply the system to the field of entertainment. In this paper, we make an application system that continues composing and playing music whose atmosphere has gradual change automatically. Some questionnaire results show that the system can compose music that is more interesting and more comfortable to some people than a simple music played repeating several measures melody.
    Download PDF (6905K)
feedback
Top