Research Monograph nr 172

Size: px
Start display at page:

Download "Research Monograph nr 172"

Transcription

1

2 MACIEJ MAJEWSKI Research Monograph nr 172 FUNDAMENTALS OF BUILDING INTELLIGENT INTERACTION SYSTEMS OF TECHNOLOGICAL DEVICES AND THEIR OPERATORS Abstract The book concerns fundamentals of building intelligent interaction systems of technological devices and their operators. The interaction systems are equipped with intelligent mechanisms for operator biometric identification, command meaning analysis, command effect analysis, command safety assessment, and technological process supervision.

3 The book introduces the principles of the work and its scope in the first chapter. The second chapter of the book discusses modelling of decision processes, particularly analysis of methods and models of decision processes, mathematical modelling of technological process accuracy, decision models of expert systems in the conditions of incoherent knowledge states, and selected problems of decision process modelling in technological processes of treated machine elements. Fundamentals of interaction of technical devices and their operators are the main focus in the third chapter. Included is a classification of human activity models, a mathematical model of information gathering by an operator, an information perception model and an assessment of human information burden. The decision process formalization, general models of operator activities in control systems, a model of realization of diagnostics tasks in human-technology systems is presented. Selected aspects of intelligent decision aiding systems in technological processes are presented in the fourth chapter. Discussed are the basis and methodology for the selection of tools, conditions and machining parameters through the application of artificial intelligence methods. The chapter also presents examples of automated grinding processes of small ceramic elements. Furthermore, discussion of problems of process quality assessment and decisions concerning tools and parameters of the process are included. In the following chapter, there is an analysis of usability of different methods of operator identification, and discussed are methods of biometric identification including methods consisting of the typing in of passwords. Selected problems of information processing are investigated in the sixth chapter, which among other things include: information entropy, relay of information between operator and technical devices, problems of operator efficiency assessment, processing of uncertain information by operator, and modelling of the interaction of operator and technical devices. In addition, fundamentals of intelligent methods of recognition of operator s handwriting are presented. The most important part of the book is the seventh chapter concerning development of fundamentals of building intelligent two-way voice communication systems between humans and technical devices. In the introduction, aspects of voice communication between humans and technical devices in a natural language are emphasized, and an analysis of the state of the art in the field of voice communication has been carried out. A concept of an intelligent layer of two-way voice communication of technological devices with their operators is presented, and the concept of modern supervision systems of automated production processes, also for mobile technologies. A detailed architecture of the intelligent two-way voice communication system of technological devices with the operator is

4 shown. Problems of intelligent assessment system of operator s ability for efficient processing of information streams from multiple sources are introduced. Problems involving recognition of commands issued by voice, and synthesis of voice messages to operator are characterized. Achievements in the field of recognition of operator s command meaning are presented. The chapter also describes operator s command effect analysis and safety assessment. Principles concerning execution of operator s commands, and experimental research on the system are also presented. In the conclusion, a summary is given which emphasizes the scientific significance of the work, and future directions for further development of interaction systems between humans and technical devices are described. Table of contents Table of abbreviations INTRODUCTION Principles of the work Scope of the work MODELLING OF DECISION PROCESSES Analysis of known methods and models of decision processes Mathematical modelling of technological process accuracy Modelling methods Effects of random disturbances and condition changes in the grinding process Decision models of expert systems in the conditions of incoherent knowledge states Consensus choice problem Quality analysis of expert information Selected problems of decision process modelling in technological processes Principal problems of decision process modelling in technological processes of treated machine elements Problems of decision process modelling in aspects of process quality with the use of probabilistic neural networks... 49

5 3. FUNDAMENTALS OF INTERACTION OF TECHNICAL DEVICES AND THEIR OPERATORS Classification of human activity models Mathematical model of information gathering by an operator Information perception model and an assessment of human information burden Decision process formalization General models of operator activities in control systems Model of realization of diagnostics tasks in human-technology systems INTELLIGENT DECISION AIDING SYSTEMS IN TECHNOLOGICAL PROCESSES Basis for the selection of tools, conditions and machining parameters through the application of artificial intelligence methods Automated grinding processes of small ceramic elements Operator s commands and messages of technological devices Example of machining method application Analysis of grinding processes of small ceramic elements in process supervision by an operator Methodology of tool selection through the application of artificial intelligence methods in grinding processes Methodology of parameter selection through the application of artificial intelligence methods in grinding processes of small ceramic elements Problems of process quality assessment Decisions concerning tools and parameters of the process

6 5. OPERATOR IDENTIFICATION METHODS Analysis of usability of different methods of identification Operator identification with use of methods consisting of the typing in of passwords Methods of operator biometric identification SELECTED PROBLEMS OF INFORMATION PROCESSING BY HUMAN Information entropy Information relay between operator and technical devices Problems of operator efficiency assessment Operator processing of uncertain information Modelling of the interaction of operator and technical devices Operator s handwriting recognition INTELLIGENT TWO WAY VOICE COMMUNICATION SYSTEMS BETWEEN HUMANS AND TECHNICAL DEVICES Aspects of voice communication between humans and technical devices in a natural language Analysis of the state of the art in the field of voice communication Concept of modern supervision systems of technological devices and automated production processes Concept of an intelligent layer of two-way voice communication of technological devices with their operators Concept of modern supervision systems of automated production processes Architecture of intelligent two-way voice communication systems Fundamentals of building an intelligent two-way voice communication system of technological devices with the operator Intelligent assessment system of operator s ability for efficient processing of information streams from multiple sources Voice communication between operator and technological devices Recognition of commands issued by voice Synthesis of voice messages to operator Recognition of operator s command meaning Operator s command effect analysis and safety assessment

7 7.8. Command safety assessment in grinding process of small ceramic elements Statistical analysis of parameters for command safety assessment Safety analysis of selected commands considering realistic grinding process features Execution of operator s commands Simulation research on the system Research on recognition of operator s natural speech Research on recognition of operator s voice commands Research on the system using headset and directional microphone Research on the system with background noise Recognition of operator s command meaning Developed intelligent two-way voice communication system of technological devices with the operator SUMMARY Scientific significance of the work Application significance of the work Future directions for further development of interaction systems between humans and technical devices BIBLIOGRAPHY Abstract in Polish Abstract in English Department of Mechanical Engineering Koszalin University of Technology, Koszalin, Poland Koszalin 2010 ISSN ISBN Copyright Wydawnictwo Uczelniane Politechniki Koszalińskiej

Analecta Vol. 8, No. 2 ISSN 2064-7964

Analecta Vol. 8, No. 2 ISSN 2064-7964 EXPERIMENTAL APPLICATIONS OF ARTIFICIAL NEURAL NETWORKS IN ENGINEERING PROCESSING SYSTEM S. Dadvandipour Institute of Information Engineering, University of Miskolc, Egyetemváros, 3515, Miskolc, Hungary,

More information

Appendices master s degree programme Artificial Intelligence 2014-2015

Appendices master s degree programme Artificial Intelligence 2014-2015 Appendices master s degree programme Artificial Intelligence 2014-2015 Appendix I Teaching outcomes of the degree programme (art. 1.3) 1. The master demonstrates knowledge, understanding and the ability

More information

Appendices master s degree programme Human Machine Communication 2014-2015

Appendices master s degree programme Human Machine Communication 2014-2015 Appendices master s degree programme Human Machine Communication 2014-2015 Appendix I Teaching outcomes of the degree programme (art. 1.3) 1. The master demonstrates knowledge, understanding and the ability

More information

Requirements Analysis Concepts & Principles. Instructor: Dr. Jerry Gao

Requirements Analysis Concepts & Principles. Instructor: Dr. Jerry Gao Requirements Analysis Concepts & Principles Instructor: Dr. Jerry Gao Requirements Analysis Concepts and Principles - Requirements Analysis - Communication Techniques - Initiating the Process - Facilitated

More information

Study Plan for the Master Degree In Industrial Engineering / Management. (Thesis Track)

Study Plan for the Master Degree In Industrial Engineering / Management. (Thesis Track) Study Plan for the Master Degree In Industrial Engineering / Management (Thesis Track) Plan no. 2005 T A. GENERAL RULES AND CONDITIONS: 1. This plan conforms to the valid regulations of programs of graduate

More information

Agreement on Dual Degree Master Program in Computer Science. Politechnika Warszawska. Technische Universität Berlin

Agreement on Dual Degree Master Program in Computer Science. Politechnika Warszawska. Technische Universität Berlin Agreement on Dual Degree Master Program in Computer Science between Politechnika Warszawska Faculty of Electronics and Information Technology and Technische Universität Berlin School of Electrical Engineering

More information

Foundations of the Montessori Method (3 credits)

Foundations of the Montessori Method (3 credits) MO 634 Foundations of the Montessori Method This course offers an overview of human development through adulthood, with an in-depth focus on childhood development from birth to age six. Specific topics

More information

Applying Deep Learning to Car Data Logging (CDL) and Driver Assessor (DA) October 22-Oct-15

Applying Deep Learning to Car Data Logging (CDL) and Driver Assessor (DA) October 22-Oct-15 Applying Deep Learning to Car Data Logging (CDL) and Driver Assessor (DA) October 22-Oct-15 GENIVI is a registered trademark of the GENIVI Alliance in the USA and other countries Copyright GENIVI Alliance

More information

Reflection Report International Semester

Reflection Report International Semester Reflection Report International Semester Studying abroad at KTH Royal Institute of Technology Stockholm 18-01-2011 Chapter 1: Personal Information Name and surname: Arts, Rick G. B. E-mail address: Department:

More information

Environmental Decision Support Systems: A Human Factors Perspective

Environmental Decision Support Systems: A Human Factors Perspective Environmental Decision Support Systems: A Human Factors Perspective Prof. Dr. Steven P. Frysinger James Madison University Harrisonburg, Virginia USA and cismet GmbH EDSS Decision Support Systems attempt

More information

Curriculum of Electronics Engineering Program

Curriculum of Electronics Engineering Program Curriculum of Electronics Engineering Program FIRST ACADEMIC SEMESTER EB 0101 Workshop on Methods of University Studies 2 -- -- -- 4 EB 0102 Workshop on Oral and Written Communications 2 -- -- -- 4 EB

More information

Graduate Co-op Students Information Manual. Department of Computer Science. Faculty of Science. University of Regina

Graduate Co-op Students Information Manual. Department of Computer Science. Faculty of Science. University of Regina Graduate Co-op Students Information Manual Department of Computer Science Faculty of Science University of Regina 2014 1 Table of Contents 1. Department Description..3 2. Program Requirements and Procedures

More information

Padma Charan Das Dept. of E.T.C. Berhampur, Odisha, India

Padma Charan Das Dept. of E.T.C. Berhampur, Odisha, India Volume 5, Issue 3, March 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Measuring Quality

More information

USABILITY OF A FILIPINO LANGUAGE TOOLS WEBSITE

USABILITY OF A FILIPINO LANGUAGE TOOLS WEBSITE USABILITY OF A FILIPINO LANGUAGE TOOLS WEBSITE Ria A. Sagum, MCS Department of Computer Science, College of Computer and Information Sciences Polytechnic University of the Philippines, Manila, Philippines

More information

A secure face tracking system

A secure face tracking system International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 10 (2014), pp. 959-964 International Research Publications House http://www. irphouse.com A secure face tracking

More information

TIETS34 Seminar: Data Mining on Biometric identification

TIETS34 Seminar: Data Mining on Biometric identification TIETS34 Seminar: Data Mining on Biometric identification Youming Zhang Computer Science, School of Information Sciences, 33014 University of Tampere, Finland Youming.Zhang@uta.fi Course Description Content

More information

Advanced analytics at your hands

Advanced analytics at your hands 2.3 Advanced analytics at your hands Neural Designer is the most powerful predictive analytics software. It uses innovative neural networks techniques to provide data scientists with results in a way previously

More information

General syllabus for third-cycle courses and study programmes in

General syllabus for third-cycle courses and study programmes in ÖREBRO UNIVERSITY This is a translation of a Swedish document. In the event of a discrepancy, the Swedishlanguage version shall prevail. General syllabus for third-cycle courses and study programmes in

More information

In this presentation, you will be introduced to data mining and the relationship with meaningful use.

In this presentation, you will be introduced to data mining and the relationship with meaningful use. In this presentation, you will be introduced to data mining and the relationship with meaningful use. Data mining refers to the art and science of intelligent data analysis. It is the application of machine

More information

Establishing the Uniqueness of the Human Voice for Security Applications

Establishing the Uniqueness of the Human Voice for Security Applications Proceedings of Student/Faculty Research Day, CSIS, Pace University, May 7th, 2004 Establishing the Uniqueness of the Human Voice for Security Applications Naresh P. Trilok, Sung-Hyuk Cha, and Charles C.

More information

Stage III courses COMPSCI 314

Stage III courses COMPSCI 314 Stage III courses To major in Computer Science, you have to take four Stage III COMPSCI courses, plus one other Stage III course chosen from the BSc Schedule. This may be another Stage III COMPSCI course.

More information

Introduction to Machine Learning and Data Mining. Prof. Dr. Igor Trajkovski trajkovski@nyus.edu.mk

Introduction to Machine Learning and Data Mining. Prof. Dr. Igor Trajkovski trajkovski@nyus.edu.mk Introduction to Machine Learning and Data Mining Prof. Dr. Igor Trakovski trakovski@nyus.edu.mk Neural Networks 2 Neural Networks Analogy to biological neural systems, the most robust learning systems

More information

Network Machine Learning Research Group. Intended status: Informational October 19, 2015 Expires: April 21, 2016

Network Machine Learning Research Group. Intended status: Informational October 19, 2015 Expires: April 21, 2016 Network Machine Learning Research Group S. Jiang Internet-Draft Huawei Technologies Co., Ltd Intended status: Informational October 19, 2015 Expires: April 21, 2016 Abstract Network Machine Learning draft-jiang-nmlrg-network-machine-learning-00

More information

Page 1 of 5. (Modules, Subjects) SENG DSYS PSYS KMS ADB INS IAT

Page 1 of 5. (Modules, Subjects) SENG DSYS PSYS KMS ADB INS IAT Page 1 of 5 A. Advanced Mathematics for CS A1. Line and surface integrals 2 2 A2. Scalar and vector potentials 2 2 A3. Orthogonal curvilinear coordinates 2 2 A4. Partial differential equations 2 2 4 A5.

More information

Dragon Solutions Enterprise Profile Management

Dragon Solutions Enterprise Profile Management Dragon Solutions Enterprise Profile Management summary Simplifying System Administration and Profile Management for Enterprise Dragon Deployments In a distributed enterprise, IT professionals are responsible

More information

Cisco Unified Contact Center Planning and Design Service

Cisco Unified Contact Center Planning and Design Service Cisco Unified Contact Center Planning and Design Service Create unique customer experiences for your customers by exploring new possibilities and realizing the full potential of your contact center. Services

More information

Copyright. Network and Protocol Simulation. What is simulation? What is simulation? What is simulation? What is simulation?

Copyright. Network and Protocol Simulation. What is simulation? What is simulation? What is simulation? What is simulation? Copyright Network and Protocol Simulation Michela Meo Maurizio M. Munafò Michela.Meo@polito.it Maurizio.Munafo@polito.it Quest opera è protetta dalla licenza Creative Commons NoDerivs-NonCommercial. Per

More information

Decision Trees for Mining Data Streams Based on the Gaussian Approximation

Decision Trees for Mining Data Streams Based on the Gaussian Approximation International Journal of Computer Sciences and Engineering Open Access Review Paper Volume-4, Issue-3 E-ISSN: 2347-2693 Decision Trees for Mining Data Streams Based on the Gaussian Approximation S.Babu

More information

Core Curriculum to the Course:

Core Curriculum to the Course: Core Curriculum to the Course: Environmental Science Law Economy for Engineering Accounting for Engineering Production System Planning and Analysis Electric Circuits Logic Circuits Methods for Electric

More information

Optimizing the prediction models of the air quality state in cities

Optimizing the prediction models of the air quality state in cities Air Pollution XV 89 Optimizing the prediction models of the air quality state in cities J. Skrzypski, E. Jach-Szakiel & W. Kamiński Faculty of Process and Environmental Engineering, Technical University

More information

Masters in Information Technology

Masters in Information Technology Computer - Information Technology MSc & MPhil - 2015/6 - July 2015 Masters in Information Technology Programme Requirements Taught Element, and PG Diploma in Information Technology: 120 credits: IS5101

More information

Bachelor of Games and Virtual Worlds (Programming) Subject and Course Summaries

Bachelor of Games and Virtual Worlds (Programming) Subject and Course Summaries First Semester Development 1A On completion of this subject students will be able to apply basic programming and problem solving skills in a 3 rd generation object-oriented programming language (such as

More information

Using Artificial Intelligence to Manage Big Data for Litigation

Using Artificial Intelligence to Manage Big Data for Litigation FEBRUARY 3 5, 2015 / THE HILTON NEW YORK Using Artificial Intelligence to Manage Big Data for Litigation Understanding Artificial Intelligence to Make better decisions Improve the process Allay the fear

More information

Class of 2016 Second Year Common CORE - 2013-2014

Class of 2016 Second Year Common CORE - 2013-2014 2013-2014 Engineering and Applied Science Calendar Class of 2016 Second Year Common CORE - 2013-2014 APSC 200 Engineering Design and Practice II F 3-0-1 4 APSC 293 Engineering Communications F.25-0-.75

More information

General syllabus for doctoral studies in Computer Science and Engineering

General syllabus for doctoral studies in Computer Science and Engineering This is a translation of the approved general syllabus that is written in Swedish Reg nr: L 2015/92 Approved by FUN: 2015-06-04 Version nr: 3 General syllabus for doctoral studies in Computer Science and

More information

A Systemic Artificial Intelligence (AI) Approach to Difficult Text Analytics Tasks

A Systemic Artificial Intelligence (AI) Approach to Difficult Text Analytics Tasks A Systemic Artificial Intelligence (AI) Approach to Difficult Text Analytics Tasks Text Analytics World, Boston, 2013 Lars Hard, CTO Agenda Difficult text analytics tasks Feature extraction Bio-inspired

More information

Winter 2016 Course Timetable. Legend: TIME: M = Monday T = Tuesday W = Wednesday R = Thursday F = Friday BREATH: M = Methodology: RA = Research Area

Winter 2016 Course Timetable. Legend: TIME: M = Monday T = Tuesday W = Wednesday R = Thursday F = Friday BREATH: M = Methodology: RA = Research Area Winter 2016 Course Timetable Legend: TIME: M = Monday T = Tuesday W = Wednesday R = Thursday F = Friday BREATH: M = Methodology: RA = Research Area Please note: Times listed in parentheses refer to the

More information

CS Master Level Courses and Areas COURSE DESCRIPTIONS. CSCI 521 Real-Time Systems. CSCI 522 High Performance Computing

CS Master Level Courses and Areas COURSE DESCRIPTIONS. CSCI 521 Real-Time Systems. CSCI 522 High Performance Computing CS Master Level Courses and Areas The graduate courses offered may change over time, in response to new developments in computer science and the interests of faculty and students; the list of graduate

More information

Master of Science in Computer Science

Master of Science in Computer Science Master of Science in Computer Science Background/Rationale The MSCS program aims to provide both breadth and depth of knowledge in the concepts and techniques related to the theory, design, implementation,

More information

ASSESSMENT PLAN: M.S. in Computer Science

ASSESSMENT PLAN: M.S. in Computer Science Department of Mathematics, CSCI ASSESSMENT PLAN: M.S. in Computer Science Updated Date: Winter 2015 by Matt Johnson PROGRAM MISSION CSUEB Missions, Commitments, and ILOs, 2012 CSUEB Computer Science Program

More information

THE BUSINESS VALUE OF AN ERP SYSTEM

THE BUSINESS VALUE OF AN ERP SYSTEM THE BUSINESS VALUE OF AN ERP SYSTEM AJMAL BEG THE BUSINESS VALUE OF AN ERP SYSTEM AJMAL BEG ii Copyright c 2010 by Ajmal Beg. All rights reserved. This technology described in this publication is based

More information

Self-Improving Supply Chains

Self-Improving Supply Chains Self-Improving Supply Chains Cyrus Hadavi Ph.D. Adexa, Inc. All Rights Reserved January 4, 2016 Self-Improving Supply Chains Imagine a world where supply chain planning systems can mold themselves into

More information

NEURAL NETWORKS A Comprehensive Foundation

NEURAL NETWORKS A Comprehensive Foundation NEURAL NETWORKS A Comprehensive Foundation Second Edition Simon Haykin McMaster University Hamilton, Ontario, Canada Prentice Hall Prentice Hall Upper Saddle River; New Jersey 07458 Preface xii Acknowledgments

More information

What is Artificial Intelligence?

What is Artificial Intelligence? CSE 3401: Intro to Artificial Intelligence & Logic Programming Introduction Required Readings: Russell & Norvig Chapters 1 & 2. Lecture slides adapted from those of Fahiem Bacchus. 1 What is AI? What is

More information

Position Classification Flysheet for Computer Science Series, GS-1550. Table of Contents

Position Classification Flysheet for Computer Science Series, GS-1550. Table of Contents Position Classification Flysheet for Computer Science Series, GS-1550 Table of Contents SERIES DEFINITION... 2 OCCUPATIONAL INFORMATION... 2 EXCLUSIONS... 4 AUTHORIZED TITLES... 5 GRADE LEVEL CRITERIA...

More information

How To Use Neural Networks In Data Mining

How To Use Neural Networks In Data Mining International Journal of Electronics and Computer Science Engineering 1449 Available Online at www.ijecse.org ISSN- 2277-1956 Neural Networks in Data Mining Priyanka Gaur Department of Information and

More information

01219211 Software Development Training Camp 1 (0-3) Prerequisite : 01204214 Program development skill enhancement camp, at least 48 person-hours.

01219211 Software Development Training Camp 1 (0-3) Prerequisite : 01204214 Program development skill enhancement camp, at least 48 person-hours. (International Program) 01219141 Object-Oriented Modeling and Programming 3 (3-0) Object concepts, object-oriented design and analysis, object-oriented analysis relating to developing conceptual models

More information

CITY OF KENT POSITION DESCRIPTION

CITY OF KENT POSITION DESCRIPTION CITY OF KENT POSITION DESCRIPTION Position Inventory Number: Classification Specification: TECHNICAL SUPPORT SPECIALIST Salary Range: NR32 Position Description: Technical Support Specialist II Incumbent:

More information

THE FUTURE OF WAREHOUSE EFFICIENCY

THE FUTURE OF WAREHOUSE EFFICIENCY THE FUTURE OF WAREHOUSE EFFICIENCY RAPID GROWTH OF DATA COLLECTION TECHNOLOGIES White Paper DELIVERING RELIABLE DATA COLLECTION SOLUTIONS What Does the Future of Warehousing Look Like? In the next several

More information

Using Software Agents to Simulate How Investors Greed and Fear Emotions Explain the Behavior of a Financial Market

Using Software Agents to Simulate How Investors Greed and Fear Emotions Explain the Behavior of a Financial Market Using Software Agents to Simulate How Investors Greed and Fear Emotions Explain the Behavior of a Financial Market FILIPPO NERI University of Naples Department of Computer Science 80100 Napoli ITALY filipponeri@yahoo.com

More information

Online Tuning of Artificial Neural Networks for Induction Motor Control

Online Tuning of Artificial Neural Networks for Induction Motor Control Online Tuning of Artificial Neural Networks for Induction Motor Control A THESIS Submitted by RAMA KRISHNA MAYIRI (M060156EE) In partial fulfillment of the requirements for the award of the Degree of MASTER

More information

Artificial Neural Network for Speech Recognition

Artificial Neural Network for Speech Recognition Artificial Neural Network for Speech Recognition Austin Marshall March 3, 2005 2nd Annual Student Research Showcase Overview Presenting an Artificial Neural Network to recognize and classify speech Spoken

More information

Automatic Text Analysis Using Drupal

Automatic Text Analysis Using Drupal Automatic Text Analysis Using Drupal By Herman Chai Computer Engineering California Polytechnic State University, San Luis Obispo Advised by Dr. Foaad Khosmood June 14, 2013 Abstract Natural language processing

More information

A Health Degree Evaluation Algorithm for Equipment Based on Fuzzy Sets and the Improved SVM

A Health Degree Evaluation Algorithm for Equipment Based on Fuzzy Sets and the Improved SVM Journal of Computational Information Systems 10: 17 (2014) 7629 7635 Available at http://www.jofcis.com A Health Degree Evaluation Algorithm for Equipment Based on Fuzzy Sets and the Improved SVM Tian

More information

A SHORT NOTE ON RELIABILITY OF SECURITY SYSTEMS

A SHORT NOTE ON RELIABILITY OF SECURITY SYSTEMS A SHORT NOTE ON RELIABILITY OF SECURITY SYSTEMS Jóźwiak Ireneusz J., Laskowski Wojciech Wroclaw University of Technology, Wroclaw, Poland Keywords computer security, reliability, computer incidents Abstract

More information

Agreement on. Dual Degree Master Program in Computer Science KAIST. Technische Universität Berlin

Agreement on. Dual Degree Master Program in Computer Science KAIST. Technische Universität Berlin Agreement on Dual Degree Master Program in Computer Science between KAIST Department of Computer Science and Technische Universität Berlin Fakultät für Elektrotechnik und Informatik (Fakultät IV) 1 1 Subject

More information

The multilayer sentiment analysis model based on Random forest Wei Liu1, Jie Zhang2

The multilayer sentiment analysis model based on Random forest Wei Liu1, Jie Zhang2 2nd International Conference on Advances in Mechanical Engineering and Industrial Informatics (AMEII 2016) The multilayer sentiment analysis model based on Random forest Wei Liu1, Jie Zhang2 1 School of

More information

A Content based Spam Filtering Using Optical Back Propagation Technique

A Content based Spam Filtering Using Optical Back Propagation Technique A Content based Spam Filtering Using Optical Back Propagation Technique Sarab M. Hameed 1, Noor Alhuda J. Mohammed 2 Department of Computer Science, College of Science, University of Baghdad - Iraq ABSTRACT

More information

International Journal of Computer Trends and Technology (IJCTT) volume 4 Issue 8 August 2013

International Journal of Computer Trends and Technology (IJCTT) volume 4 Issue 8 August 2013 A Short-Term Traffic Prediction On A Distributed Network Using Multiple Regression Equation Ms.Sharmi.S 1 Research Scholar, MS University,Thirunelvelli Dr.M.Punithavalli Director, SREC,Coimbatore. Abstract:

More information

Data Mining: A Preprocessing Engine

Data Mining: A Preprocessing Engine Journal of Computer Science 2 (9): 735-739, 2006 ISSN 1549-3636 2005 Science Publications Data Mining: A Preprocessing Engine Luai Al Shalabi, Zyad Shaaban and Basel Kasasbeh Applied Science University,

More information

School of Computer Science

School of Computer Science School of Computer Science Head of School Professor S Linton Taught Programmes M.Sc. Advanced Computer Science Artificial Intelligence Computing and Information Technology Information Technology Human

More information

Implementing an In-Service, Non- Intrusive Measurement Device in Telecommunication Networks Using the TMS320C31

Implementing an In-Service, Non- Intrusive Measurement Device in Telecommunication Networks Using the TMS320C31 Disclaimer: This document was part of the First European DSP Education and Research Conference. It may have been written by someone whose native language is not English. TI assumes no liability for the

More information

Design call center management system of e-commerce based on BP neural network and multifractal

Design call center management system of e-commerce based on BP neural network and multifractal Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2014, 6(6):951-956 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 Design call center management system of e-commerce

More information

Detection. Perspective. Network Anomaly. Bhattacharyya. Jugal. A Machine Learning »C) Dhruba Kumar. Kumar KaKta. CRC Press J Taylor & Francis Croup

Detection. Perspective. Network Anomaly. Bhattacharyya. Jugal. A Machine Learning »C) Dhruba Kumar. Kumar KaKta. CRC Press J Taylor & Francis Croup Network Anomaly Detection A Machine Learning Perspective Dhruba Kumar Bhattacharyya Jugal Kumar KaKta»C) CRC Press J Taylor & Francis Croup Boca Raton London New York CRC Press is an imprint of the Taylor

More information

Contact Center Automation

Contact Center Automation Frequently Asked Questions on Contact Center Automation Summary Uniphore Software Systems, a pioneer in providing voice-based mobility solutions has integrated its Contact Center Automation solutions to

More information

Research Methodology Part III: Thesis Proposal. Dr. Tarek A. Tutunji Mechatronics Engineering Department Philadelphia University - Jordan

Research Methodology Part III: Thesis Proposal. Dr. Tarek A. Tutunji Mechatronics Engineering Department Philadelphia University - Jordan Research Methodology Part III: Thesis Proposal Dr. Tarek A. Tutunji Mechatronics Engineering Department Philadelphia University - Jordan Outline Thesis Phases Thesis Proposal Sections Thesis Flow Chart

More information

Prediction of Heart Disease Using Naïve Bayes Algorithm

Prediction of Heart Disease Using Naïve Bayes Algorithm Prediction of Heart Disease Using Naïve Bayes Algorithm R.Karthiyayini 1, S.Chithaara 2 Assistant Professor, Department of computer Applications, Anna University, BIT campus, Tiruchirapalli, Tamilnadu,

More information

MS1b Statistical Data Mining

MS1b Statistical Data Mining MS1b Statistical Data Mining Yee Whye Teh Department of Statistics Oxford http://www.stats.ox.ac.uk/~teh/datamining.html Outline Administrivia and Introduction Course Structure Syllabus Introduction to

More information

E-learning for Graphical System Design Courses: A Case Study

E-learning for Graphical System Design Courses: A Case Study E-learning for Graphical System Design Courses: A Case Study Yucel Ugurlu Education & Research Programs National Instruments Japan Corporation Tokyo, Japan e-mail: yucel.ugurlu@ni.com Hiroshi Sakuta Department

More information

Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government

Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government Briefing W. Frisch 1 Outline Digital Identity Management Identity Theft Management

More information

CSC384 Intro to Artificial Intelligence

CSC384 Intro to Artificial Intelligence CSC384 Intro to Artificial Intelligence What is Artificial Intelligence? What is Intelligence? Are these Intelligent? CSC384, University of Toronto 3 What is Intelligence? Webster says: The capacity to

More information

Big6 Science Fair Project Organizer

Big6 Science Fair Project Organizer Big6 Science Fair Project Organizer Name: Big6 #1 Task Definition 1. Choose a topic for study. Here is a way to start: Observe the world around you. What interests you about it? What hobbies do you like

More information

EFFECTIVENESS OF ARTIFICIAL INTELLIGENCE BASED

EFFECTIVENESS OF ARTIFICIAL INTELLIGENCE BASED Ain Shams University Women s College For Arts, Science and Education Curricula & Teaching Methods Dept. EFFECTIVENESS OF ARTIFICIAL INTELLIGENCE BASED ON ADAPTIVE FEEDBACK VERSUS FIXED FEEDBACK IN MASTERING

More information

Mathematical models to estimate the quality of monitoring software systems for electrical substations

Mathematical models to estimate the quality of monitoring software systems for electrical substations Mathematical models to estimate the quality of monitoring software systems for electrical substations MIHAIELA ILIESCU 1, VICTOR URSIANU 2, FLORICA MOLDOVEANU 2, RADU URSIANU 2, EMILIANA URSIANU 3 1 Faculty

More information

Open Access Research on Application of Neural Network in Computer Network Security Evaluation. Shujuan Jin *

Open Access Research on Application of Neural Network in Computer Network Security Evaluation. Shujuan Jin * Send Orders for Reprints to reprints@benthamscience.ae 766 The Open Electrical & Electronic Engineering Journal, 2014, 8, 766-771 Open Access Research on Application of Neural Network in Computer Network

More information

NON FUNCTIONAL REQUIREMENT TRACEABILITY AUTOMATION-AN MOBILE MULTIMEDIA APPROACH

NON FUNCTIONAL REQUIREMENT TRACEABILITY AUTOMATION-AN MOBILE MULTIMEDIA APPROACH Journal of Computer Science 2012, 8 (11), 1803-1808 ISSN 1549-3636 2012 doi:10.3844/jcssp.2012.1803.1808 Published Online 8 (11) 2012 (http://www.thescipub.com/jcs.toc) NON FUNCTIONAL REQUIREMENT TRACEABILITY

More information

1. Classification problems

1. Classification problems Neural and Evolutionary Computing. Lab 1: Classification problems Machine Learning test data repository Weka data mining platform Introduction Scilab 1. Classification problems The main aim of a classification

More information

Promoting hygiene. 9.1 Assessing hygiene practices CHAPTER 9

Promoting hygiene. 9.1 Assessing hygiene practices CHAPTER 9 74 CHAPTER 9 Promoting hygiene The goal of hygiene promotion is to help people to understand and develop good hygiene practices, so as to prevent disease and promote positive attitudes towards cleanliness.

More information

Management and Organizational Behavior. Historical Foundations. Classical Approaches. Historical Foundations of Management - 2

Management and Organizational Behavior. Historical Foundations. Classical Approaches. Historical Foundations of Management - 2 Management and Organizational Behavior Historical Foundations of Management - 2 Historical Foundations Classical Approaches to Management Behavioral Approaches to Management Modern Approaches to Management

More information

Computer Information Systems

Computer Information Systems Computer Information System Courses Description 0309331 0306331 0309332 0306332 0309334 0306334 0309341 0306341 0309353 0306353 Database Systems Introduction to database systems, entity-relationship data

More information

Information Technology Career Field Pathways and Course Structure

Information Technology Career Field Pathways and Course Structure Information Technology Career Field Pathways and Course Structure Courses in Information Support and Services (N0) Computer Hardware 2 145025 Computer Software 145030 Networking 2 145035 Network Operating

More information

About the Studio. Outsourcing Offer May 9 th, 2016 2/10. About the Studio. Artificial Intelligence. Backend and Networking.

About the Studio. Outsourcing Offer May 9 th, 2016 2/10. About the Studio. Artificial Intelligence. Backend and Networking. Outsourcing Offer Raving Bots is a team of talented and motivated people, whose goal is to forge their raving ideas into raving games that they wish to play while raving. However, it is a long-term undertaking

More information

LOUGHBOROUGH UNIVERSITY

LOUGHBOROUGH UNIVERSITY LOUGHBOROUGH UNIVERSITY Programme Specification Computer Science Please note: This specification provides a concise summary of the main features of the programme and the learning outcomes that a typical

More information

Machine Learning. 01 - Introduction

Machine Learning. 01 - Introduction Machine Learning 01 - Introduction Machine learning course One lecture (Wednesday, 9:30, 346) and one exercise (Monday, 17:15, 203). Oral exam, 20 minutes, 5 credit points. Some basic mathematical knowledge

More information

WebEx. Network Bandwidth White Paper. WebEx Communications Inc. - 1 -

WebEx. Network Bandwidth White Paper. WebEx Communications Inc. - 1 - WebEx Network Bandwidth White Paper WebEx Communications Inc. - 1 - Copyright WebEx Communications, Inc. reserves the right to make changes in the information contained in this publication without prior

More information

Abbreviation Acknowledgements. The History Analysis of the Consumer Applicatl.o Using ASR to drive Ship, One Application Example

Abbreviation Acknowledgements. The History Analysis of the Consumer Applicatl.o Using ASR to drive Ship, One Application Example Contents Preface Abbreviation Acknowledgements xv xix xxiii 1. INTRODUCTION 1 1.1 NEW TIME WITH NEW REQUIREMENT 1 1.2 THE ASR APPLICATIONS 2 The History Analysis of the Consumer Applicatl.o Using ASR to

More information

Big Data with Rough Set Using Map- Reduce

Big Data with Rough Set Using Map- Reduce Big Data with Rough Set Using Map- Reduce Mr.G.Lenin 1, Mr. A. Raj Ganesh 2, Mr. S. Vanarasan 3 Assistant Professor, Department of CSE, Podhigai College of Engineering & Technology, Tirupattur, Tamilnadu,

More information

Knowledge Discovery from Data Bases Proposal for a MAP-I UC

Knowledge Discovery from Data Bases Proposal for a MAP-I UC Knowledge Discovery from Data Bases Proposal for a MAP-I UC P. Brazdil 1, João Gama 1, P. Azevedo 2 1 Universidade do Porto; 2 Universidade do Minho; 1 Knowledge Discovery from Data Bases We are deluged

More information

Quantitative and qualitative methods in process improvement and product quality assessment.

Quantitative and qualitative methods in process improvement and product quality assessment. Quantitative and qualitative methods in process improvement and product quality assessment. Anna Bobkowska Abstract Successful improvement of the development process and product quality assurance should

More information

EMC CAPTIVA SOLUTIONS FOR HEALTHCARE

EMC CAPTIVA SOLUTIONS FOR HEALTHCARE EMC CAPTIVA SOLUTIONS FOR HEALTHCARE Major advances in medical technology within the last several years have led members of an aging population to significantly raise expectations for the quality of care

More information

ARTIFICIALLY INTELLIGENT COLLEGE ORIENTED VIRTUAL ASSISTANT

ARTIFICIALLY INTELLIGENT COLLEGE ORIENTED VIRTUAL ASSISTANT ARTIFICIALLY INTELLIGENT COLLEGE ORIENTED VIRTUAL ASSISTANT Vishmita Yashwant Shetty, Nikhil Uday Polekar, Sandipan Utpal Das, Prof. Suvarna Pansambal Department of Computer Engineering, Atharva College

More information

The Masters of Science in Information Systems & Technology

The Masters of Science in Information Systems & Technology The Masters of Science in Information Systems & Technology College of Engineering and Computer Science University of Michigan-Dearborn A Rackham School of Graduate Studies Program PH: 313-593-5361; FAX:

More information

Study Regulations for the Master Course Visual Computing

Study Regulations for the Master Course Visual Computing Study Regulations for the Master Course Visual Computing As of January 26 th, 2006 Pursuant to 54 of Act No. 1556 on Saarland University (University Act UG) from June 23 rd, 2004 (Official Gazette p. 1782)

More information