Alazri A.S.,Applied Information Sciences
2016 11th International Conference for Internet Technology and Secured Transactions, ICITST 2016 | Year: 2016
This paper highlight the idea of submarine cables and its security trends. At the beginning , history of cables and its development have been introduced. The main structure of fiber optic have been discussed as well. Finally, threats and vulnerabilities of submarine cable introduced in details and supported by examples from the world such as natural disaster and habitats, commercial fishing, anchoring, oil and gas development. © 2016 Infonomics Society.
Prasomphan S.,Applied Information Sciences
Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST | Year: 2017
This research presents a novel algorithms for generating descriptions of stupa image such as stupa era, stupa architecture by using key points generated from SIFT algorithms and learning stupa description from the generated key points with artificial neural network. Neural network was used for being the classifier for generating the description. We have presented a new approach to feature extraction based on analysis of key points and descriptors of an image. The experimental results for stupa image content generator was analyze by using the classification results of the proposed algorithms to classify era and architecture of the tested stupa image. To test the performance of the purposed algorithms, images from the well-known historical area in Thailand were used which are image dataset in Phra Nakhon Si Ayutta province, Sukhothai province and Bangkok. The confusion matrix of the proposed algorithms gives the accuracy 80.67%, 79.35% and 82.47% in Ayutthaya era, Sukhothai era and Rattanakosin era. Results show that the proposed technique can efficiently find the correct descriptions compared to using the traditional method. © ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2017.
Wunck C.,Applied Information Sciences
Journal of Computational Methods in Sciences and Engineering | Year: 2017
A method to extract essential features from time domain process signals of injection moulding machines based on discrete wavelet transform is presented and compared to existing methods. The performance of the new method is assessed by comparing the goodness of fit of linear regression models to estimate final part quality. The results of the experiments show that the wavelet-based feature extraction method performs best regarding model performance and size. © 2017 - IOS Press and the authors. All rights reserved.
Francolino V.,Applied Information Sciences
ACM International Conference Proceeding Series | Year: 2017
Media and media content are of considerable social relevance. However, the systematic and automated extraction of media content is hardly a subject in the communication and media studies. This also applies to the potential use of computer-Assisted content analysis as an alternative or complement to manual coding in a media science context. My project aims to address this research gap and reduce labor-intensive processes by using machine learning methods and pooled computing resources to automatically extract topic related data from Twitter. As research topic the project intents to analyze the status quo of Swiss national media-criticism. This project combines the two research fields computer linguistics applied to media studies and examines the extent to which an automated process using a Naïve-Bayes algorithm can adequately identify content containing Swiss national media-criticism. To answer this question the results are validated by means of manual content analysis. © 2017 ACM.
Husevag A.-S.R.,Applied Information Sciences
CHIIR 2017 - Proceedings of the 2017 Conference Human Information Interaction and Retrieval | Year: 2017
Due to a major digitization effort, the Norwegian Broadcasting Corporation, NRK, has made Norwegian cultural heritage from the last century of radio and TV available to the public. It is impossible to manually go through and index all the digitized material, and automatic methods are required. This PhD project explores the possible role and usefulness of named entities in an automatic indexing process. This is done by annotating named entities in textual documents from NRK (textual description in metadata records and subtitles), analyzing differences in various genres and document types, and surveying potential users. Different methods for extracting the most salient named entities will be investigated. This project encompasses both multimedia indexing, information behavior and different forms of evaluation. Copyright is held by the owner/author(s).
Wunck C.,Applied Information Sciences
Proceedings of the International Conference on Industrial Engineering and Operations Management | Year: 2016
Current scenarios for the future of manufacturing focus on the flexible interconnection of manufacturing machines and devices. Though there is no doubt that the value added by incorporating ICT into manufacturing processes seems promising, there is no clear path visible how current manufacturers, in particular small and medium enterprises (SME), can migrate towards this bright future of manufacturing. This study proposes a bottom-up approach to smart manufacturing, taking into consideration what currently is feasible and desirable from the view of a manufacturing SME. The approach taken is illustrated by the implementation of an event monitoring agent for a manufacturing execution and intelligence system (MES). In contrast to many current works on multi-agent systems (MAS) and mobile agents, the author suggests the utilization of domain specific languages (DSL) to program the mobile agents present in a smart factory MES, thus mitigating security risks by software agents programmed using general-purpose languages. A case study on injection molding manufacturing shows how the concepts presented in this paper can be applied to current production settings. © IEOM Society International. © IEOM Society International.
Mohammad A.H.,Applied Information Sciences |
Zitar R.A.,New York Institute of Technology
Applied Soft Computing Journal | Year: 2011
Spam is a serious universal problem which causes problems for almost all computer users. This issue not only affects normal users of the internet, but also causes a big problem for companies and organizations since it costs a huge amount of money in lost productivity, wasting users' time and network bandwidth. There are many studies on spam indicates that spam costs organizations billions of dollars yearly. This work presents a lot of modification on a machine learning method inspired by the human immune system called artificial immune system (AIS) which is a new emerging method that still needs more investigations and demonstrations. Core modifications were applied on the standard AIS with the aid of the Genetic Algorithm (GA). Also Artificial Neural Network (ANN) for spam detection is applied in a new manner. SpamAssassin corpus is used in all our simulations. In standard AIS several user defined parameters are used such as culling of old lymphocytes. Genetic optimized AIS is used to present culling time instead of using user defined value. Also, a new idea to check antibodies in AIS is introduced. This would make the system able to accept types of messages that were previously considered as spam. The idea is accomplished by introducing a new issue which we call "rebuild time". Moreover, an adaptive weighting of lymphocytes is used to modify selection opportunities for different gene fragments. In this work also, core modifications on ANN neurons are applied; these modifications allow neurons to be changed over time replacing useless layers. This approach is called Continuous Learning Approach Artificial Neural Network, CLA-ANN. The final results are compared and analyzed. Results show that both systems, optimized spam detection using GA and spam detection using ANN, achieved promising scores comparable to standard AIS and other known methods. © 2011 Elsevier B.V.
Wenk B.,Applied Information Sciences
2010 IEEE Education Engineering Conference, EDUCON 2010 | Year: 2010
Open educational resources (OER) can significantly reduce the time required to prepare lectures. The prerequisites are that a desired resource can be found quickly and that its adequacy for the intended purpose can be estimated easily. Eventually, the resource should also be suitable for modification. In the first part we outline the requirements for the sourcing, storing, retrieval and exchange of open educational resources considering technical and legal aspects. In the second part we present a case study focusing on the user level perspective. We describe the searching for a particular OER (an online Moodle tutorial), the analysis of the resource found, its modification and the publishing of the modified resource on a repository. © 2010 IEEE.
Evjen S.,Applied Information Sciences
Library and Information Science Research | Year: 2015
In terms of political perceptions, library building projects appear to be similar across different contexts. Qualitative interviews with local politicians were employed to examine attitudes towards public libraries and library development in three cities building new central libraries: Aarhus, Denmark; Birmingham, UK; and Oslo, Norway. Applying an institutional perspective, the analysis focuses on norms, legitimization, and organizational change. Findings show shared views on the role and mission of the library. The informants primarily pointed to citizens' democratic rights and their country's democratic tradition when legitimizing public funding for libraries in general. However, argumentation for local library building projects was connected to city development and the desire to portray a city as oriented towards knowledge and culture. © 2015 Elsevier Inc.
Tian T.,Applied Information Sciences |
Qi W.-F.,Applied Information Sciences
IEEE Transactions on Information Theory | Year: 2013
Let n be a positive integer. An NFSR of n stages is called irreducible if the family of output sequences of any NFSR of stages less than n is not included in that of the NFSR. In this paper, we prove that the density of the irreducible NFSRs of n stages is larger than 0.39. This implies that it is expected to find an irreducible NFSR of n stages among three randomly chosen NFSRs of n stages. © 1963-2012 IEEE.