Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 10 of 10

Full-Text Articles in Physical Sciences and Mathematics

Development Of A Workflow For The Comparison Of Classification Techniques, Zanifa Omary Sep 2008

Development Of A Workflow For The Comparison Of Classification Techniques, Zanifa Omary

Masters

As the interest in machine learning and data mining springs up, the problem of how to assess learning algorithms and compare classifiers become more pressing. This has been associated with the lack of comprehensive and complete workflow depending on the project scale to provide guidance to its users. This means the success or failure of the project can be highly dependent on the person or team carrying it. The standard practice adopted by many researchers and experimenters has been to follow steps or phases from existing workflows such as CRISP-DM, KDD and SASSEMMA. However, as machine learning and data mining …


A Web-Based And Mobile Environmental Management System, James Carswell, Keith Gardiner, Michela Bertolotto, Andrea Rizzini, A Mandrak Sep 2008

A Web-Based And Mobile Environmental Management System, James Carswell, Keith Gardiner, Michela Bertolotto, Andrea Rizzini, A Mandrak

Articles

This paper describes a Web-based and mobile system specifically developed to monitor fish species at risk. Such a system integrates spatial functionality to allow users not only to visualise maps and metadata of the area of concern but also to perform context-aware queries and updating of spatial datasets. The spatial datasets are provided by the Canadian Department of Fisheries and Oceans (DFO) and the prototype is customised to the specific needs of the Great Lakes Laboratory for Fisheries and Aquatic Sciences (GLLFAS) Fish Habitat Section requirements for fish species at risk assessment. Currently, researchers, habitat biologists and enforcement officers have …


A Generic Approach And Framework For Managing Complex Information, Essam Mansour Aug 2008

A Generic Approach And Framework For Managing Complex Information, Essam Mansour

Doctoral

Several application domains, such as healthcare, incorporate domain knowledge into their day-to-day activities to standardise and enhance their performance. Such incorporation produces complex information, which contains two main clusters (active and passive) of information that have internal connections between them. The active cluster determines the recommended procedure that should be taken as a reaction to specific situations. The passive cluster determines the information that describes these situations and other descriptive information plus the execution history of the complex information. In the healthcare domain, a medical patient plan is an example for complex information produced during the disease management activity from …


Knowledge Management For Disparate Etruscan Cultural Heritage, John Mcauley, James Carswell Feb 2008

Knowledge Management For Disparate Etruscan Cultural Heritage, John Mcauley, James Carswell

Conference papers

This paper introduces the TARCHNA approach to managing and presenting contextualised heritage content. The system uses the CIDOC CRM ontology to consolidate a virtual repository of geographically disparate heritage databases and present a holistic view of a fragmented heritage. While previous approaches to presenting heritage collections have focused on the browse and search paradigm, the TARCHNA system uses narrative concepts as a means of presenting and re-using contextualised heritage artefacts within a broader cultural setting.


Referring Expression Generation Challenge 2008 Dit System Descriptions (Dit-Fbi, Dit-Tvas, Dit-Cbsr, Dit-Rbr, Dit-Fbi-Cbsr, Dit-Tvas-Rbr), John D. Kelleher, Brian Mac Namee Jan 2008

Referring Expression Generation Challenge 2008 Dit System Descriptions (Dit-Fbi, Dit-Tvas, Dit-Cbsr, Dit-Rbr, Dit-Fbi-Cbsr, Dit-Tvas-Rbr), John D. Kelleher, Brian Mac Namee

Conference papers

This papers desibes a set of systems developed at DIT for the Referring Expression Generation challenage at INLG 2008.In Proceedings of the 5th International Natural Language Generation Conference (INLG-08)


Object Detection And Classification With Applications To Skin Cancer Screening, Jonathan Blackledge, Dmitryi Dubovitskiy Jan 2008

Object Detection And Classification With Applications To Skin Cancer Screening, Jonathan Blackledge, Dmitryi Dubovitskiy

Articles

This paper discusses a new approach to the processes of object detection, recognition and classification in a digital image. The classification method is based on the application of a set of features which include fractal parameters such as the Lacunarity and Fractal Dimension. Thus, the approach used, incorporates the characterisation of an object in terms of its texture.

The principal issues associated with object recognition are presented which includes two novel fast segmentation algorithms for which C++ code is provided. The self-learning procedure for designing a decision making engine using fuzzy logic and membership function theory is also presented and …


Covert Encryption And Document Authentication Using Texture Coding, Jonathan Blackledge, Mary Hallot Jan 2008

Covert Encryption And Document Authentication Using Texture Coding, Jonathan Blackledge, Mary Hallot

Articles

With the improvements in the quality of Commercial-Off-The-Shelf (COTS) printing and scanning devices, the ability to counterfeit documents has become a widespread problem. Consequently, there has been an increasing demand to develop digital watermarking techniques which can be applied to both electronic and printed images (and documents) that can be authenticated, prevent unauthorized copying and withstand abuse and degradation. In this paper , a new approach to digital watermarking is presented and a range of possible applications are considered. The process is defined by using concepts and techniques borrowed from Cryptography. It is based on computing a 'scramble image' by …


Medical Language Processing For Patient Diagnosis Using Text Classification And Negation Labelling, Brian Mac Namee, John D. Kelleher, Sarah Jane Delany Jan 2008

Medical Language Processing For Patient Diagnosis Using Text Classification And Negation Labelling, Brian Mac Namee, John D. Kelleher, Sarah Jane Delany

Conference papers

This paper describes the approach of the DIT AIGroup to the i2b2 Obesity Challenge to build a system to diagnose obesity and related co-morbidities from narrative, unstructured patient records. Based on experimental results a system was developed which used knowledge-light text classification using decision trees, and negation labelling.


A Translation Mechanism For Recommendations, Pierpaolo Dondio, Luca Longo, Stephen Barrett Jan 2008

A Translation Mechanism For Recommendations, Pierpaolo Dondio, Luca Longo, Stephen Barrett

Conference papers

An important class of distributed Trust-based solutions is based on the information sharing. A basic requirement of such systems is the ability of participating agents to effectively communicate, receiving and sending messages that can be interpreted correctly. Unfortunately, in open systems it is not possible to postulate a common agreement about the representation of a rating, its semantic meaning and cognitive and computational mechanisms behind a trust-rating formation. Social scientists agree to consider unqualified trust values not transferable, but a more pragmatic approach would conclude that qualified trust judgments are worth being transferred as far as decisions taken considering others’ …


Anti-Phishing Models: Main Challenges, Edina Hatunic-Webster Jan 2008

Anti-Phishing Models: Main Challenges, Edina Hatunic-Webster

Conference papers

Phishing is a form of online identity theft in which the attacker attempts to fraudulently retrieve a legitimate user's account information, logon credentials or identity information in general. The compromised information is then used for withdrawing money online, taking out cash advances, or making purchases of goods and services on the accounts. Various solutions have been proposed and developed in response to phishing. As phishing is a business problem, the solutions target both non-technical and technical areas. This paper investigates the current anti-phishing solutions and critically reviews their usage, security weaknesses and their effectiveness. The analysis of these models points …