PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

A Doctrine of Cognitive Informatics (CI)

Wybrane pełne teksty z tego czasopisma
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
Cognitive informatics (CI) is the transdisciplinary enquiry of cognitive and information sciences that investigates into the internal information processing mechanisms and processes of the brain and natural intelligence, and their engineering applications via an interdisciplinary approach. CI develops a coherent set of fundamental theories and denotational mathematics, which form the foundation for most information and knowledge based science and engineering disciplines such as computer science, cognitive science, neuropsychology, systems science, cybernetics, software engineering, knowledge engineering, and computational intelligence. This paper reviews the central doctrine of CI and its applications. The theoretical framework of CI is described on the architecture of CI and its denotational mathematic means. A set of theories and formal models of CI is presented in order to explore the natural and computational intelligence. A wide range of applications of CI are described in the areas of cognitive computers, cognitive properties of knowledge, simulations of human cognitive behaviors, cognitive complexity of software, autonomous agent systems, and computational intelligence.
Wydawca
Rocznik
Strony
203--228
Opis fizyczny
bibliogr. 76 poz., tab., wykr.
Twórcy
autor
autor
autor
autor
autor
autor
autor
autor
autor
autor
autor
  • Dept. of Electrical and Computer Engineering, Schulich School of Engineering University of Calgary, 2500 University Drive, NW, Calgary, Canada T2N 1N4
Bibliografia
  • [1] Anderson, J.A. (2005), Keynote: Cognitive Computation: The Ersatz Brain Project, Proc. 4th International Conference on Cognitive Informatics (ICCI'05), IEEE CS Press, Irvine, CA, USA, Aug., 1.
  • [2] Bell, D.A. (1953), Information Theory, Pitman, London.
  • [3] Bender, E.A. (1996), Mathematical Methods in Artificial Intelligence, IEEE CS Press, Los Alamitos, CA.
  • [4] Chan, C.W. (1992), Knowledge Acquisition by Conceptual Modeling, Applied Mathematics Letters Journal 3, 7-12.
  • [5] Chan, C.W. (1995), Development and Application of a Knowledge Modeling Technique, Journal of Experimental and Theoretical Artificial Intelligence 7(2), 217- 236.
  • [6] Chan, C.W. and M. Johnston (1996), Knowledge Modeling for Constructing an Expert System to Support Reforestation Decisions, Knowledge-Based Systems Journal 9, 41-59.
  • [7] Chan, C.W. (2002), Keynote: Cognitive Informatics: A Knowledge Engineering Perspective, First IEEE International Conference on Cognitive Informatics (ICCI'02), Alberta, Aug, 49-56.
  • [8] Chan, C., W. Kinsner, Y. Wang, and D.M. Miller eds. (2004), Proc. 3rd IEEE International Conference on Cognitive Informatics (ICCI'04), IEEE CS Press, Victoria, Canada, Aug.
  • [9] Dennett, D.C. (1991), Consciousness Explained, Little, Brown and Co., Boston.
  • [10] Driscoll, M. (1991), Psychology of Learning for Instruction, Allyn and Bacon.
  • [11] Gabrieli, J.D.E. (1998), Cognitive Neuroscience of Human Memory, Annual Review of Psychology, 49, 87-115.
  • [12] Gray, P. (1994), Psychology, 2nd ed., Worth Publishers, Inc., New York.
  • [13] IBM (2006), Autonomic ComputingWhite Paper: An Architectural Blueprint for Autonomic Computing, 4th ed., June, 1-37.
  • [14] Kephart, J. and D. Chess (2003), The Vision of Autonomic Computing, IEEE Computer, 26(1), Jan., 41-50.
  • [15] Kihlstrom, J.F. (1987), The Cognitive Unconscious, Science, 237, 1445-1452.
  • [16] Kinsner,W., D. Zhang, Y.Wang, and J. Tsai eds. (2005), Proc. 4th IEEE International Conference on Cognitive Informatics (ICCI'05), IEEE CS Press, Irvine, California, USA, Aug.
  • [17] Kinsner, W. (2006), Keynote: Towards Cognitive Machines: Multiscale Measures and Analysis, Proc. 5th InternationalConference on Cognitive Informatics (ICCI'06), IEEE CS Press, Beijing, China, July, 8-14.
  • [18] Latombe, J.C. (2006), Keynote: Probabilistic Roadmaps: A Motion Planning Approach Based on Active Learning, Proc. 5th International Conference on Cognitive Informatics (ICCI'06), IEEE CS Press, Beijing, China, July, 1.
  • [19] Leahey, T.H. (1997), A History of Psychology: Main Currents in Psychological Thoughts, 4th ed., Prentice Hall, Upper Saddle River, N.J.
  • [20] Marieb, E.N. (1992), Human Anatomy and Physiology, 2nd ed., The Benjamin/Cummings Publishing Co., Inc., Redwood City, CA.
  • [21] Mizoguchi, R. K. Kozaki, T. Sano and Y. Kitamura (2000), Construction and deployment of a plant ontology, Proc. 12th International Conference on Knowledge Engineering and Knowledge Management - Methods, Models, and Tools (EKAW'00), 113-128.
  • [22] Patel, D., S. Patel, and Y.Wang eds. (2003), Cognitive Informatics: Proc. 2nd IEEE International Conference (ICCI'03), IEEE CS Press, London, UK, Aug.
  • [23] Pedrycz,W. ed. (2001), Granular Computing: An Emerging Paradigm, Physica-Verlag, Heidelberg.
  • [24] Pinel, J.P.J. (1997), Biopsychology, 3rd ed., Allyn and Bacon, Needham Heights, MA.
  • [25] Reisberg, D. (2001), Cognition, second edition, Exploring the science of the mind,W.W. Norton & Company, Inc.
  • [26] Shannon, C.E. (1948), A Mathematical Theory of Communication, Bell System Technical Journal, 27, 379-423 and 623-656.
  • [27] Smith, R.E. (1993), Psychology,West Publishing Co., St. Paul, MN.
  • [28] Solso, R.L. ed. (1999), Mind and Brain Science in the 21st Century, The MIT Press, Cambridge, MS.
  • [29] Sternberg, R.J. (1998), In Search of the Human Mind, 2nd ed., Harcourt Brace & Co., Orlando, FL.
  • [30] Tsai, J.J.P. and P.S. Yu (2008),Machine Learning in Cyber Trust: Security, Privacy, and Reliability, Springer, New York.
  • [31] von Neumann, J. (1946), The Principles of Large-Scale Computing Machines, reprinted in Annals of History of Computers, 3(3), 263-273.
  • [32] Wang, Y. (2002a), Keynote: On Cognitive Informatics, Keynote, Proc. 1st IEEE International Conference on Cognitive Informatics (ICCI'02), Calgary, Canada, IEEE CS Press, August, 34-42.
  • [33] Wang, Y. (2002b), The Real-Time Process Algebra (RTPA), Annals of Software Engineering, Springer, USA, 14, 235-274.
  • [34] Wang, Y. (2003a),Cognitive Informatics:A New Transdisciplinary Research Field, Brain andMind: A Transdisciplinary Journal of Neuroscience and Neurophilosophy, 4(2), 115-127.
  • [35] Wang, Y. (2003b), On Cognitive Informatics, Brain and Mind: A Transdisciplinary Journal of Neuroscience and Neurophilosophy, 4(2), 151-167.
  • [36] Wang, Y. (2006a), Keynote: Cognitive Informatics - Towards the Future Generation Computers that Think and Feel, Proc. 5th IEEE International Conference on Cognitive Informatics (ICCI'06), Beijing, China, IEEE CS Press, July, 3-7.
  • [37] Wang, Y. (2006b), On the Informatics Laws and Deductive Semantics of Software, IEEE Transactions on Systems, Man, and Cybernetics (Part C), 36(2), 161-171.
  • [38] Wang, Y. (2007a), Software Engineering Foundations: A Software Science Perspective, CRC Series in Software Engineering, Vol. II, CRC Press, USA, July.
  • [39] Wang, Y. (2007b), The Theoretical Framework of Cognitive Informatics, International Journal of Cognitive Informatics and Natural Intelligence, IGI Publishing, USA, 1(1), 1-27.
  • [40] Wang, Y. (2007c), The OAR Model of Neural Informatics for Internal Knowledge Representation in the Brain, International Journal of Cognitive Informatics and Natural Intelligence, IGI Publishing, USA, 1(3), pp. 64-75.
  • [41] Wang, Y. (2007d), Keynote: On Theoretical Foundations of Software Engineering and Denotational Mathematics, Proc. 5th Asian Workshop on Foundations of Software, Xiamen, China, 99-102.
  • [42] Wang, Y. (2007e), The Cognitive Processes of Formal Inferences, International Journal of Cognitive Informatics and Natural Intelligence, IGI Publishing, USA, 1(4), Dec., 75-86.
  • [43] Wang, Y. (2007f), Towards Theoretical Foundations of Autonomic Computing, International Journal of Cognitive Informatics and Natural Intelligence, IGI Publishing, USA, 1(3), 1-16.
  • [44] Wang, Y. (2007g), On the Cognitive Processes of Human Perception with Emotions, Motivations, and Attitudes, International Journal of Cognitive Informatics and Natural Intelligence, IGI Publishing, USA, 1(4), 1-13.
  • [45] Wang, Y. (2007h), Keynote: Cognitive Informatics Foundations of Nature and Machine Intelligence, Proc. 6th IEEE International Conference on Cognitive Informatics (ICCI'07), IEEE CS Press, Lake Tahoe, CA, USA, July, August, 3-12.
  • [46] Wang, Y. (2008a),On ContemporaryDenotationalMathematics for Computational Intelligence, Transactions on Computational Science, Springer, Aug., 2, 6-29.
  • [47] Wang, Y. (2008b),On ConceptAlgebra:A DenotationalMathematical Structure for Knowledge and Software Modeling, International Journal of Cognitive Informatics and Natural Intelligence, IGI Publishing, USA, 2(2), 1-19.
  • [48] Wang, Y. (2008c), On System Algebra: A Denotational Mathematical Structure for Abstract System modeling, International Journal of Cognitive Informatics and Natural Intelligence, IGI Publishing, USA, 2(2), 20-42.
  • [49] Wang, Y. (2008d), RTPA: A Denotational Mathematics for Manipulating Intelligent and Computational Behaviors, International Journal of Cognitive Informatics and Natural Intelligence, IGI Publishing, USA, 2(2), 44-62.
  • [50] Wang, Y. (2008e),Deductive Semantics of RTPA, International Journal of Cognitive Informatics and Natural Intelligence, IGI Publishing, USA, 2(2), 95-121.
  • [51] Wang, Y. (2008f), On the Big-R Notation for Describing Iterative and Recursive Behaviors, International Journal of Cognitive Informatics and Natural Intelligence, IGI Publishing, USA, 2(1), 17-28.
  • [52] Wang, Y. (2008g), On Visual Semantic Algebra (VSA) and the Cognitive Process of Pattern Recognition, Proc. 7th International Conference on Cognitive Informatics (ICCI'08), IEEE CS Press, Stanford University, CA, Aug., 384-393.
  • [53] Wang, Y. (2008h), The Theoretical Framework and Cognitive Process of Learning, Proc. 6th International Conference on Cognitive Informatics (ICCI'07), IEEE CS Press, Lake Tahoe, CA, Aug., 470-479.
  • [54] Wang, Y. (2008i), Mathematical Laws of Software, Transactions of Computational Science, Springer, Aug., 2, 46-83.
  • [55] Wang, Y. (2009a), On Abstract Intelligence: Toward a Unified Theory of Natural, Artificial, Machinable, and Computational Intelligence, International Journal of Software Science and Computational Intelligence, IGI, USA, 1(1), 1-17.
  • [56] Wang, Y. (2009b), A Cognitive Informatics Reference Model of Autonomous Agent Systems (AAS), International Journal of Cognitive Informatics and Natural Intelligence, 3(1), 1-16.
  • [57] Wang, Y., R. Johnston, and M. Smith eds. (2002), Cognitive Informatics: Proc. 1st IEEE International Conference (ICCI'02), IEEE CS Press, Calgary, AB, Canada, August.
  • [58] Wang, Y., D. Liu, and Y. Wang (2003), Discovering the Capacity of Human Memory, Brain and Mind: A Transdisciplinary Journal of Neuroscience and Neurophilosophy, 4(2), 189-198.
  • [59] Wang, Y. andW. Kinsner (2006), Recent Advances in Cognitive Informatics, IEEE Transactions on Systems, Man, and Cybernetics (Part C), 36(2),March, 121-123.
  • [60] Wang, Y., Y. Wang, S. Patel, and D. Patel (2006), A Layered Reference Model of the Brain (LRMB), IEEE Transactions on Systems, Man, and Cybernetics (Part C), 36(2), March, 124-133.
  • [61] Wang, Y. and Y.Wang (2006), On Cognitive InformaticsModels of the Brain, IEEE Transactions on Systems, Man, and Cybernetics, 36(2), March, 203-207.
  • [62] Wang. Y. and Y. Wang (2008), The Cognitive Processes of Consciousness and Attention, Proc. 7th International Conference on Cognitive Informatics (ICCI'08), IEEE CS Press, Stanford University, CA, Aug., 30-39.
  • [63] Wang, Y., D. Zhang, J.C. Latombe, andW. Kinsner eds. (2008), Proc. 7th IEEE International Conference on Cognitive Informatics (ICCI'08), IEEE CS Press, Stanford University, CA, USA, July.
  • [64] Wang, Y., L.A. Zadeh, and Y. Yao (2009), On the System Algebra Foundations for Granular Computing, International Journal of Software Science and Computational Intelligence, IGI, USA, Jan., 1(1), 64-86.
  • [65] Wilson, R.A. and F.C. Keil (2001), The MIT Encyclopedia of the Cognitive Sciences, MIT Press.
  • [66] Yao, Y., Z. Shi., Y.Wang, andW. Kinsner eds. (2006), Proc. 5th IEEE International Conference on Cognitive Informatics (ICCI'06), IEEE CS Press, Beijing, China, July.
  • [67] Yu, Z. and J.J.P. Tsai (2006), An Efficient Intrusion Detection System using Boosting-Based Learning Algorithm, International Journal of Computer Applications in Technology, 27(4), Dec., 223-231.
  • [68] Yu, Z., J.J.P. Tsai, and T. Weigert (2007), Automatically Tuning Intrusion Detection System, IEEE Transactions on System, Man, and Cybernetics (Part B), 37(2), April, 373-384.
  • [69] Yu, Z., J.J.P. Tsai, and T. Weigert (2008), An Adaptive Automatically Tuning Intrusion Detection System, ACM Transactions on Autonomous and Adaptive Systems, 3(3), July.
  • [70] Zadeh, L.A. (1965), Fuzzy Sets and Systems, in J. Fox ed., Systems Theory, Polytechnic Press, Brooklyn NY, 29-37.
  • [71] Zadeh, L.A. (1975), Fuzzy Logic and Approximate Reasoning, Syntheses, 30, 407-428.
  • [72] Zadeh, L.A (2008), Toward human level machine intelligence - Is it achievable? Proc. 7th International Conference on Cognitive Informatics (ICCI'08), IEEE CS Press, Stanford University, CA, Aug.
  • [73] Zhang, D., Y. Wang, and Kinsner eds. (2007), Proc. 6th IEEE International Conference on Cognitive Informatics (ICCI'07), IEEE CS Press, Lake Tahoe, CA, USA, July.
  • [74] Zhang, D. and J.J.P. Tsai (2003), Machine Learning and Software Engineering, Software Quality Journal, Kluwer Academic Pub., 11(2), 87-119.
  • [75] Zhang, D. and J.J.P. Tsai (2005), Machine Learning Applications in Software Engineering, World Scientific Inc.
  • [76] Zhang, D. and J.J.P. Tsai (2007), Advances in Machine Learning Applications in Software Engineering, IGI Publishing Inc., PA.
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-article-BUS8-0004-0015
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.