Search results for "Information science"
showing 10 items of 3627 documents
Des archives de chercheurs aux archives de la recherche : retour sur les expériences de la MSH de Dijon
2013
International audience
Wireless Caching Aided 5G Networks
2018
Safer chemicals using less animals: kick-off of the European ONTOX project
2021
The 3Rs concept, calling for replacement, reduction and refinement of animal experimentation, is receiving increasing attention around the world, and has found its way to legislation, in particular in the European Union. This is aligned by continuing high-level efforts of the European Commission to support development and implementation of 3Rs methods. In this respect, the European project called "ONTOX: ontology-driven and artificial intelligence-based repeated dose toxicity testing of chemicals for next generation risk assessment" was recently initiated with the goal to provide a functional and sustainable solution for advancing human risk assessment of chemicals without the use of animal…
An ontology for cognitive mimetics
2018
AI and autonomous systems are intended to replace people in several jobs. People have worked in these jobs being able to execute the required information processing. This implies that new technical artefacts must be able to perform equitably effective information processing. Thus, it makes sense to develop the analysis of human information processing in designing intelligent systems. This approach has been termed cognitive mimetics. This paper studies how it would be practical to gain knowledge about human information processing and organize this knowledge using ontologies.
State classification for autonomous gas sample taking using deep convolutional neural networks
2017
Despite recent rapid advances and successful large-scale application of deep Convolutional Neural Networks (CNNs) using image, video, sound, text and time-series data, its adoption within the oil and gas industry in particular have been sparse. In this paper, we initially present an overview of opportunities for deep CNN methods within oil and gas industry, followed by details on a novel development where deep CNN have been used for state classification of autonomous gas sample taking procedure utilizing an industrial robot. The experimental results — using a deep CNN containing six layers — show accuracy levels exceeding 99 %. In addition, the advantages of using parallel computing with GP…
Models of E-Democracy
2006
Pulished article in Communications of the Association for Information Systems, 17 (1), 818-840. Also available from the publisher: http://aisel.aisnet.org/cais/vol17/iss1/37/ Several theories of E-Democracy have been presented, and implementations of and experiments in E-Democracy emerged. However, existing literature on the subject appears rather non-comprehensive, lacking an integrated basis, for gathering knowledge in the future. After an analysis of theories of E-Democracy versus implementations reported in related literature, we address the need for a model generally absent from contemporary theoretical literature: the Partisan model of E-Democracy. We aim to simplify the current "jung…
Los sistemas de información y la auditoría informática aplicados a una institución fiscalizadora subestatal: la Sindicatura de Comptes de la Comunida…
2020
La digitalización es un fenómeno global que afecta a todas las actividades humanas. Las administraciones públicas también han incorporado a sus estructuras las nuevas tecnologías de la información y la comunicación, de manera que el sector público se ha informatizado completamente. En este contexto digital, la auditoría informática es una herramienta que permite fiscalizar las administraciones públicas y, a la vez, mejora la rendición de cuentas. Este artículo examina las principales ventajas y riesgos de la digitalización y ofrece un estudio de caso centrado en una institución fiscalizadora pública española que ha implementado la auditoría informática para auditar todas las operaciones de …
Using continuous user authentication to detect masqueraders
2003
Nowadays computer and network intrusions have become more common and more complicated, challenging the intrusion detection systems. Also, network traffic has been constantly increasing. As a consequence, the amount of data to be processed by an intrusion detection system has been growing, making it difficult to efficiently detect intrusions online. Proposes an approach for continuous user authentication based on the user’s behaviour, aiming at development of an efficient and portable anomaly intrusion detection system. A prototype of a host‐based intrusion detection system was built. It detects masqueraders by comparing the current user behaviour with his/her stored behavioural model. The m…