588 research outputs found

    Big Data Analytics Using Neural networks

    Get PDF
    Machine learning is a branch of artificial intelligence in which the system is made to learn from data which can be used to make predictions, real world simulations, pattern recognitions and classifications of the input data. Among the various machine learning approaches in the sub-field of data classification, neural-network methods have been found to be an useful alternatives to the statistical techniques. An artificial neural network is a mathematical model, inspired by biological neural networks, are used for modeling complex relationships between inputs and outputs or to find patterns in data. The goal of the project is to construct a system capable of analyzing and predicting the output for the evaluation dataset provided by the IBM Watson: The Great Mind Challenge organized by IBM Research and InnoCentive INSTINCT (Investigating Novel Statistical Techniques to Identify Neurophysiological Correlates of Trustworthiness) : The IARPA Trustworthiness Challenge organized by the office of The Director Of National Intelligence. The objective of this paper is to understand the machine learning using neural networks. At the end of the paper, the comparison between different learning strategies have been shown which are used to increase the accuracy of the predictions. From the trained neural network up to a satisfactory level, we will be able to classify any generalized input, process often termed as generalization capability of the learning system

    M.S.L.A.P. Modular Spectral Line Analysis Program documentation

    Get PDF
    MSLAP is a software for analyzing spectra, providing the basic structure to identify spectral features, to make quantitative measurements of this features, and to store the measurements for convenient access. MSLAP can be used to measure not only the zeroth moment (equivalent width) of a profile, but also the first and second moments. Optical depths and the corresponding column densities across the profile can be measured as well for sufficiently high resolution data. The software was developed for an interactive, graphical analysis where the computer carries most of the computational and data organizational burden and the investigator is responsible only for all judgement decisions. It employs sophisticated statistical techniques for determining the best polynomial fit to the continuum and for calculating the uncertainties

    Student Family Support Services Initiative: Final Evaluation Report

    Get PDF
    The Student Family Support Services Initiative (SFSI) provided intensive case management and housing assistance to families with children who were identified as residing in "doubled-up" living situations (e.g. living with relatives or friends because they had lost stable housing but were not yet in homeless shelters or cycled out of shelters) and considered at risk of becoming homeless by the Chicago Public Schools (CPS) in 2009 and 2010. The program offered case management, housing assistance, and a menu of services that families might need to stabilize in housing including therapeutic services, employment services, and asset building. The theory of change was that addressing a family's primary housing and employment needs would positively impact the educational stability and achievement of students, while at the same time benefiting the family overall. This report, prepared by the Social IMPACT Research Center, presents a final evaluation of the initiative

    An architecture for secure searchable cloud storage

    Get PDF
    Includes abstract.Includes bibliographical references.Cloud Computing is a relatively new and appealing concept; however, users may not fully trust Cloud Providers with their data and can be reluctant to store their files on Cloud Storage Services. The problem is that Cloud Providers allow users to store their information on the provider's infrastructure with compliance to their terms and conditions, however all security is handled by the provider and generally the details of how this is done are not disclosed. This thesis describes a solution that allows users to securely store data all a public cloud, while also providing a mechanism to allow for searchability through their encrypted data. Users are able to submit encrypted keyword queries and, through a symmetric searchable encryption scheme, the system retrieves a list of files with such keywords contained within the cloud storage medium

    Gaze, volume 11, number 9

    Get PDF
    Co-Editors: Allen Cook, John Stilwell. Staff Writers: Vincent Astor, Becky Caperton, Renee Greene. Typesetting and Layout: Allen Cook, John Stilwell, Vincent Astor, Bryan Feuerhelm. Circulation: Cecil McLeod, John Stilwell. Advertising: Vincent Astor. Special thanks to Rhodes College and the Paul Barret Jr. Library for providing initial scanning of this collection.https://digitalcommons.memphis.edu/speccoll-mss-outmemphis3/1115/thumbnail.jp

    Daily Eastern News: April 09, 1987

    Get PDF
    https://thekeep.eiu.edu/den_1987_apr/1006/thumbnail.jp

    Snake-Oil Security Claims the Systematic Misrepresentation of Product Security in the E-Commerce Arena

    Get PDF
    The modern commercial systems and software industry in the United States have grown up in a snake-oil salesman\u27s paradise. The largest sector of this industry by far is composed of standard commercial systems that are marketed to provide specified functionality (e.g. Internet web server, firewall, router, etc.) Such products are generally provided with a blanket disclaimer stating that the purchaser must evaluate the suitability of the product for use, and that the user assumes all liability for product behavior. In general, users cannot evaluate and cannot be expected to evaluate the security claims of a product. The ability to analyze security claims is important because a consumer may place unwarranted trust in the security abilities of a web server (or other computer device) to perform its stated purpose, thereby putting his own organization at risk, as well as third parties (consumers, business partners, etc.) All but the largest and most capable organizations lack the resources or expertise to evaluate the security claims of a product. More importantly, no reasonable and knowledgeable person would expect them to be able to do so. The normal legal presumptions of approximate equality of bargaining power and comparable sophistication in evaluating benefits and risks are grievously unjust in the context of software security. In these transactions, it is far wiser to view the general purchaser, even if that purchaser is a sizable corporation, as an ignorant consumer. Hence, often purchasers accept what appear to be either implied merchantability claims of the vendor or claims of salespersons\u27 made outside of the context of a written document. These claims frequently have little, if any, basis in fact. These standard commercial systems form the bulk of the critical infrastructure of existing Internet functionality and e-commerce systems. Often, these systems are not trustworthy, yet the use of these systems by misinformed purchasers created massive vulnerability for both purchasers and third parties (including a substantial fraction of both U.S. and international citizens). The frequent disclosure of individual credit card information from supposedly secure commercial systems illustrates an aspect of this vulnerability and raises serious questions concerning the merchantability of these systems. While it is impossible to avoid all risks, they can be reduced to a very small fraction of their current level. Vendors have willfully taken approaches and used processes that do not allow assurance of appropriate security properties, while simultaneously and recklessly misrepresenting the security properties of their products to their customers

    Daily Eastern News: April 16, 1987

    Get PDF
    https://thekeep.eiu.edu/den_1987_apr/1011/thumbnail.jp
    corecore