<?xml version="1.0" encoding="UTF-8"?>
<rdf:RDF xmlns="http://purl.org/rss/1.0/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/">
<channel rdf:about="http://hdl.handle.net/10366/138330">
<title>ADCAIJ, Vol.7, n.1</title>
<link>http://hdl.handle.net/10366/138330</link>
<description/>
<items>
<rdf:Seq>
<rdf:li rdf:resource="http://hdl.handle.net/10366/138394"/>
<rdf:li rdf:resource="http://hdl.handle.net/10366/138393"/>
<rdf:li rdf:resource="http://hdl.handle.net/10366/138392"/>
<rdf:li rdf:resource="http://hdl.handle.net/10366/138391"/>
<rdf:li rdf:resource="http://hdl.handle.net/10366/138390"/>
<rdf:li rdf:resource="http://hdl.handle.net/10366/138389"/>
<rdf:li rdf:resource="http://hdl.handle.net/10366/138388"/>
<rdf:li rdf:resource="http://hdl.handle.net/10366/138387"/>
<rdf:li rdf:resource="http://hdl.handle.net/10366/138386"/>
</rdf:Seq>
</items>
<dc:date>2026-04-21T22:36:48Z</dc:date>
</channel>
<item rdf:about="http://hdl.handle.net/10366/138394">
<title>An extension of local mesh peak valley edge based feature descriptor for image retrieval in bio-medical images</title>
<link>http://hdl.handle.net/10366/138394</link>
<description>Various texture based approaches have been proposed for image indexing in bio-medical image processing and a precise description of image for indexing in bio-medical image database has always been a challenging task. In this paper, an extension of local mesh peak valley edge pattern (LMePVEP) has been proposed and its effectiveness is experimentally justified. The proposed algorithm explores the relationship of center pixel with the surrounding ones along with the relationship of pixels amongst each other in five different directions. It is then compared with the original LMePVEP as well as a directional local ternary quantized extrema pattern (DLTerQEP) based approach using two bench mark databases viz. ELCAP database for lungs and Wiki cancer data set for thyroid cancer. Further a live dataset for brain tumor is also used for experimental evaluation. The experimental results show that an average improvement of 11.16% in terms of average retrieval rate (ARR) and 5.37% in terms of average retrieval precision (ARP) is observed for proposed enhanced LMePVEP over conventional LMePVEP.
</description>
<dc:date>2018-02-23T00:00:00Z</dc:date>
</item>
<item rdf:about="http://hdl.handle.net/10366/138393">
<title>An Agent-based Environment for Dynamic Positioning of the Fogg Behavior Model Threshold Line</title>
<link>http://hdl.handle.net/10366/138393</link>
<description>In this paper, it is presented a mathematical modeling for the action line, or threshold line, of the Fogg Behavior Model (FBM) as well as an analysis of its positioning in relation to the dataset. According to the mathematical modeling formation process for both Motivation and Ability axes, the action line evaluation was performed by simulations via agents. This behavioral model is mainly used as an empirical evaluation method applied to processes based on persuasive technologies. The results showed that the threshold line should not be fixed, as originally proposed in the model, but dynamically allocated based on the Kolmogorov mean. This dynamic allocation ensures its use as a visual feature towards greater efficiency in triggers implementations. This work aims to contribute with an approach that transits between theoretical and practical when related to applications that requires the FBM, thus allowing the use of this behavioral model with higher degree of certainty and thus maximizing efficiency in the evaluation and implementation processes based on persuasive technologies.
</description>
<dc:date>2018-02-23T00:00:00Z</dc:date>
</item>
<item rdf:about="http://hdl.handle.net/10366/138392">
<title>Improving Intrusion Detection Systems Using Artificial Neural Networks</title>
<link>http://hdl.handle.net/10366/138392</link>
<description>In this paper, some of the methods used in the intrusion detection system were described using the neural network as a tool in intrusion detection system, which became very necessary in computer systems because it provides protection against attacks by hackers that are becoming increasingly destructive to computer systems./nThe Backpropagation Neural Network was chosen from among the neural networks due to its ability, speed and intelligence to recognize packet patterns captured from the network, providing the ability to detect intrusion of the system. The speed of the network in giving the diagnosis is one of the most important reasons for choosing the neural network. Therefore, many Attacks features have been analyzed of the standard packets that allow traffic through the network as well as the unusual packets, especially on these protocols (TCP, UDP).; /nThe results of these analyzes have been used to learn the neural network on the structure and pattern of standard and unusual packets. There are many algorithms for learning the neural network, but the researcher used the Standard Backpropagation Algorithm. Therefore, for increasing the intelligence and speed of the network and its ability to classify, the researcher used the Resilient Backpropagation Algorithm, provided by MATLAB programming language which is smarter and more accurate than the first algorithm.; /nThe output of this system can detect the standards packets from the unusual packets and classify them into five types with the efficiency up to 100% of the defined packets. However, the detection of the unknown attacks is not known, and rating score is zero.; /nThis paper contains a lot of tables and figures that illustrate the results and analysis of the results. It should be noted that any intrusion detection system must be up-to-date, as there is no effective and successful intrusion detection system without updating its database.
</description>
<dc:date>2018-02-23T00:00:00Z</dc:date>
</item>
<item rdf:about="http://hdl.handle.net/10366/138391">
<title>Sentiment Analysis from Facebook Comments  using Automatic Coding in NVivo 11</title>
<link>http://hdl.handle.net/10366/138391</link>
<description>The number and size of social networks have grown significantly as years have passed. With its 1.5 billion active users, Facebook is by far the most popular social networks on the planet. From kindergarten kids to grandparents to teenagers, Facebook attracts users of all ages, religions, personalities and social status. Facebook users are sharing their personal information, their lifestyle, their precious moments and their feelings online. In this paper, we download a set of comments from the page ‘Opposing Views’ from Facebook. These were then categorised into either a positive comment or a negative comment using the auto code feature in NVivo 11. Comments where no positive or negative sentiments are found are considered to be neutral. Out of 626 comments, 29.6% were found to contain positive sentiments while 62.0% were found to contain negative sentiments. The outcome of this work can be used by businesses to assess public reviews about their products. This will help them understand what is working and what is not. Thus, they can improve their products and respond to customer demands sufficiently quickly.
</description>
<dc:date>2018-02-23T00:00:00Z</dc:date>
</item>
<item rdf:about="http://hdl.handle.net/10366/138390">
<title>Ulises: An Agent-Based System For Timbre Classification</title>
<link>http://hdl.handle.net/10366/138390</link>
<description>The Sound and Music Computing (SMC) field has grown over the years and every time there are more conferences and specialized researchers in this area. The sub-field of Music Information Retrieval (MIR), one of the main research fields on SMC has focused on getting information from sound data. The most critical issue with regard to the human perception of sound is: what are the qualities of musical instrument sounds to perform recognition of its sound sources. There are four main sound dimensions: pitch, loudness, duration and timbre. The fourth dimension, timbre, is the most vague and complex dimension, a complex and high-level multidimensional property. Recognition of timbres is an area of high interest within MIR, being present in several papers state of the art on SMC. About Multi-Agent Systems (MAS), the term autonomous refers to the fact that the agents have their own existence, regardless of the existence of other agents, and are able to take own decisions without outside interference. Agents technology is particularly suitable for musical applications because of the possibility of associating a computational agent with the role of a singer or instrumentalist as can be seen in works state of art in SMC area. In this context, this paper proposes a agent-based approach to timbre recognition, focusing on the parallelization of the classification model. For this, we assign a method of recognition of timbres to different agents, where each agent is a specialized entity in a particular timbre, characteristic of a specific instrument, seeking a distributed solution for solving the timbre recognition problem.
</description>
<dc:date>2018-02-23T00:00:00Z</dc:date>
</item>
<item rdf:about="http://hdl.handle.net/10366/138389">
<title>Secure data access control with perception reasoning</title>
<link>http://hdl.handle.net/10366/138389</link>
<description>In spite of all security issues in the cloud system, distributed cloud environment requires an access control model which should be context aware to handle all issues intelligently. It must include role activation process based on the user's context information. In role activation process, the knowledge of reason used for data collection and usage is declared; this can allow the administrator to declare the policies which are context based. Therefore, there is dynamic activation of role permission due to the association of role with context. The complications in the role based access control model reduced by classifying the users into classes or groups having their own access control standards. Access to specific resources and granting/ denying is based on requesting the user identity. Cloud environments consist of different entities, number of resources and user where general access control model fails to cover all the aspects. Here, in the proposed access control with perception reasoning, entities are extended using Extensible Access Control Mark-up Language (XACML) where trust module monitors the random and dynamic behavior of the user with recognizing and restricting the malicious user for illegal data access. By issuing and identity tag to malicious user includes classification of task and data tag with data in the database.
</description>
<dc:date>2018-04-30T00:00:00Z</dc:date>
</item>
<item rdf:about="http://hdl.handle.net/10366/138388">
<title>The delimitation of freedom of speech on the Internet: the confrontation of rights and digital censorship</title>
<link>http://hdl.handle.net/10366/138388</link>
<description>With the emergence of the Internet, the exercise of freedom of opinion and information expanded to infinity, as well as the possibility of endless infractions and offenses derived from the unlimited use of freedom of speech. Given these circumstances, a proper delimitation is necessary between the use of freedom of speech on the Internet and the conflicts that occur. However, the legislator sometimes offers contradictory and ineffective solutions because they do not adapt clearly to this new social phenomenon. The current legislation will have to deal with major challenges especially related to the issue of attribution of responsibility for content dumping into the network, protection of minors and regulation of participation systems. It is also clear that in several current legislations, freedom of speech is a right that has been eroded since the emergence of the Internet. However, because of their international character and cultural differences between countries, such guidelines should not be uniform.
</description>
<dc:date>2018-04-30T00:00:00Z</dc:date>
</item>
<item rdf:about="http://hdl.handle.net/10366/138387">
<title>Staff</title>
<link>http://hdl.handle.net/10366/138387</link>
<dc:date>2018-04-30T00:00:00Z</dc:date>
</item>
<item rdf:about="http://hdl.handle.net/10366/138386">
<title>Index</title>
<link>http://hdl.handle.net/10366/138386</link>
<dc:date>2018-04-30T00:00:00Z</dc:date>
</item>
</rdf:RDF>
