Search results for "Information science"

showing 10 items of 3627 documents

Des archives de chercheurs aux archives de la recherche : retour sur les expériences de la MSH de Dijon

2013

International audience

Archives[SHS.INFO]Humanities and Social Sciences/Library and information sciences[ SHS ] Humanities and Social Sciences[ SHS.INFO ] Humanities and Social Sciences/Library and information sciences[SHS] Humanities and Social Sciences[SHS.INFO] Humanities and Social Sciences/Library and information sciencesComputingMilieux_MISCELLANEOUS[SHS]Humanities and Social Sciences
researchProduct

Wireless Caching Aided 5G Networks

2018

Article SubjectComputer Networks and CommunicationsComputer science5G-tekniikka0102 computer and information sciences02 engineering and technology01 natural scienceslcsh:Technologylcsh:Telecommunicationlcsh:TK5101-67200202 electrical engineering electronic engineering information engineeringWirelessElectrical and Electronic Engineeringwireless cachingta213business.industrylcsh:T020206 networking & telecommunications010201 computation theory & mathematicsnetworksbusiness5G5Glangattomat verkotInformation SystemsComputer networkWireless Communications and Mobile Computing
researchProduct

Safer chemicals using less animals: kick-off of the European ONTOX project

2021

The 3Rs concept, calling for replacement, reduction and refinement of animal experimentation, is receiving increasing attention around the world, and has found its way to legislation, in particular in the European Union. This is aligned by continuing high-level efforts of the European Commission to support development and implementation of 3Rs methods. In this respect, the European project called "ONTOX: ontology-driven and artificial intelligence-based repeated dose toxicity testing of chemicals for next generation risk assessment" was recently initiated with the goal to provide a functional and sustainable solution for advancing human risk assessment of chemicals without the use of animal…

Artificial intelligenceComputer science010501 environmental sciencesOntology (information science)In Vitro TechniquesAnimal Testing AlternativesToxicology01 natural sciencesRisk Assessment3Rs03 medical and health sciencesIn vitroSAFERAdverse Outcome PathwayToxicity TestsEuropean projectmedia_common.cataloged_instanceAnimalsHumansComputer SimulationEuropean UnionAnimal testingEuropean union0105 earth and related environmental sciencesExposure assessmentmedia_common0303 health sciencesOntologyIn silico030311 toxicology3. Good healthVariety (cybernetics)Gene OntologyRisk analysis (engineering)Systemic toxicityONTOXRisk assessment
researchProduct

An ontology for cognitive mimetics

2018

AI and autonomous systems are intended to replace people in several jobs. People have worked in these jobs being able to execute the required information processing. This implies that new technical artefacts must be able to perform equitably effective information processing. Thus, it makes sense to develop the analysis of human information processing in designing intelligent systems. This approach has been termed cognitive mimetics. This paper studies how it would be practical to gain knowledge about human information processing and organize this knowledge using ontologies.

Artificial intelligenceComputer science05 social sciencesIntelligent decision support systemInformation processingExpert studiesCognitionCognitive mimetics02 engineering and technologyOntology (information science)Design methodsHuman–computer interactionAI0202 electrical engineering electronic engineering information engineeringOntology020201 artificial intelligence & image processing0501 psychology and cognitive sciencesProtocol analysis050107 human factors
researchProduct

State classification for autonomous gas sample taking using deep convolutional neural networks

2017

Despite recent rapid advances and successful large-scale application of deep Convolutional Neural Networks (CNNs) using image, video, sound, text and time-series data, its adoption within the oil and gas industry in particular have been sparse. In this paper, we initially present an overview of opportunities for deep CNN methods within oil and gas industry, followed by details on a novel development where deep CNN have been used for state classification of autonomous gas sample taking procedure utilizing an industrial robot. The experimental results — using a deep CNN containing six layers — show accuracy levels exceeding 99 %. In addition, the advantages of using parallel computing with GP…

Artificial neural networkComputer sciencebusiness.industryProperty (programming)Feature extraction0102 computer and information sciences02 engineering and technologyMachine learningcomputer.software_genre01 natural sciencesConvolutional neural networklaw.inventionImage (mathematics)Industrial robot020401 chemical engineeringComputer engineering010201 computation theory & mathematicslawProbability distributionArtificial intelligenceState (computer science)0204 chemical engineeringbusinesscomputer2017 25th Mediterranean Conference on Control and Automation (MED)
researchProduct

Models of E-Democracy

2006

Pulished article in Communications of the Association for Information Systems, 17 (1), 818-840. Also available from the publisher: http://aisel.aisnet.org/cais/vol17/iss1/37/ Several theories of E-Democracy have been presented, and implementations of and experiments in E-Democracy emerged. However, existing literature on the subject appears rather non-comprehensive, lacking an integrated basis, for gathering knowledge in the future. After an analysis of theories of E-Democracy versus implementations reported in related literature, we address the need for a model generally absent from contemporary theoretical literature: the Partisan model of E-Democracy. We aim to simplify the current "jung…

Association (object-oriented programming)Political scienceE-Democracy democracy models literature reviewInformation systemVDP::Social science: 200::Library and information science: 320::Information and communication systems: 321Social scienceE-democracyInformation SystemsPeer review
researchProduct

Los sistemas de información y la auditoría informática aplicados a una institución fiscalizadora subestatal: la Sindicatura de Comptes de la Comunida…

2020

La digitalización es un fenómeno global que afecta a todas las actividades humanas. Las administraciones públicas también han incorporado a sus estructuras las nuevas tecnologías de la información y la comunicación, de manera que el sector público se ha informatizado completamente. En este contexto digital, la auditoría informática es una herramienta que permite fiscalizar las administraciones públicas y, a la vez, mejora la rendición de cuentas. Este artículo examina las principales ventajas y riesgos de la digitalización y ofrece un estudio de caso centrado en una institución fiscalizadora pública española que ha implementado la auditoría informática para auditar todas las operaciones de …

Auditoría informáticaCybersecurity[SHS.INFO]Humanities and Social Sciences/Library and information sciencesGeneral EngineeringComputer auditEnfoque de RiesgosAbordagem de riscoAuditoría Informática[SHS.SCIPO]Humanities and Social Sciences/Political scienceEnfoque de riesgosCiberseguridadAuditoria por computadorCíber segurançaPolitical scienceDigitalizaciónCiencia Política y de la AdministraciónSistemas de informaçãoCiencia Política y Ciencia de la AdministraciónHumanitiesDigitalización; Auditoría Informática; Ciberseguridad; Enfoque de RiesgosInformation SystemsRisk ApproachRevista Gestão e Secretariado – GESEC
researchProduct

Using continuous user authentication to detect masqueraders

2003

Nowadays computer and network intrusions have become more common and more complicated, challenging the intrusion detection systems. Also, network traffic has been constantly increasing. As a consequence, the amount of data to be processed by an intrusion detection system has been growing, making it difficult to efficiently detect intrusions online. Proposes an approach for continuous user authentication based on the user’s behaviour, aiming at development of an efficient and portable anomaly intrusion detection system. A prototype of a host‐based intrusion detection system was built. It detects masqueraders by comparing the current user behaviour with his/her stored behavioural model. The m…

AuthenticationUser profileComputer scienceAnomaly-based intrusion detection systemReal-time computingIntrusion detection systemLibrary and Information SciencesManagement Science and Operations ResearchComputer securitycomputer.software_genreManagement Information SystemsInformation protection policyHost-based intrusion detection systemSystems architectureBusiness and International ManagementHost (network)computerInformation Management & Computer Security
researchProduct

Azerbaidžānas, Baltkrievijas un Uzbekistānas informācijas centri

2018

Azerbaidžānas informācijas centrsUzbekistānas informācijas centrsbibliotēkas krājumsLatvijas Universitātes Akadēmiskā bibliotēka:SOCIAL SCIENCES::Other social sciences::Library and information science [Research Subject Categories]Baltkrievijas informācijas centrs
researchProduct

N. S. Galgano, I precetti della dea. Non essere e contraddizione in Parmenide di Elea, Diogene Multimedia, Bologna 2017. ISBN 978- 8893630863

2020

B1-5802Ontology (information science)Philosophy (General)HumanitiesParmenides ontology meontology psychology Goddess non-beingRevista de Filosofia Antiga
researchProduct