CINXE.COM

Search results for: attribute based access control

<!DOCTYPE html> <html lang="en" dir="ltr"> <head> <!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-P63WKM1TM1"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-P63WKM1TM1'); </script> <!-- Yandex.Metrika counter --> <script type="text/javascript" > (function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)}; m[i].l=1*new Date(); for (var j = 0; j < document.scripts.length; j++) {if (document.scripts[j].src === r) { return; }} k=e.createElement(t),a=e.getElementsByTagName(t)[0],k.async=1,k.src=r,a.parentNode.insertBefore(k,a)}) (window, document, "script", "https://mc.yandex.ru/metrika/tag.js", "ym"); ym(55165297, "init", { clickmap:false, trackLinks:true, accurateTrackBounce:true, webvisor:false }); </script> <noscript><div><img src="https://mc.yandex.ru/watch/55165297" style="position:absolute; left:-9999px;" alt="" /></div></noscript> <!-- /Yandex.Metrika counter --> <!-- Matomo --> <!-- End Matomo Code --> <title>Search results for: attribute based access control</title> <meta name="description" content="Search results for: attribute based access control"> <meta name="keywords" content="attribute based access control"> <meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1, user-scalable=no"> <meta charset="utf-8"> <link href="https://cdn.waset.org/favicon.ico" type="image/x-icon" rel="shortcut icon"> <link href="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/css/bootstrap.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/plugins/fontawesome/css/all.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/css/site.css?v=150220211555" rel="stylesheet"> </head> <body> <header> <div class="container"> <nav class="navbar navbar-expand-lg navbar-light"> <a class="navbar-brand" href="https://waset.org"> <img src="https://cdn.waset.org/static/images/wasetc.png" alt="Open Science Research Excellence" title="Open Science Research Excellence" /> </a> <button class="d-block d-lg-none navbar-toggler ml-auto" type="button" data-toggle="collapse" data-target="#navbarMenu" aria-controls="navbarMenu" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="w-100"> <div class="d-none d-lg-flex flex-row-reverse"> <form method="get" action="https://waset.org/search" class="form-inline my-2 my-lg-0"> <input class="form-control mr-sm-2" type="search" placeholder="Search Conferences" value="attribute based access control" name="q" aria-label="Search"> <button class="btn btn-light my-2 my-sm-0" type="submit"><i class="fas fa-search"></i></button> </form> </div> <div class="collapse navbar-collapse mt-1" id="navbarMenu"> <ul class="navbar-nav ml-auto align-items-center" id="mainNavMenu"> <li class="nav-item"> <a class="nav-link" href="https://waset.org/conferences" title="Conferences in 2024/2025/2026">Conferences</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/disciplines" title="Disciplines">Disciplines</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/committees" rel="nofollow">Committees</a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" id="navbarDropdownPublications" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> Publications </a> <div class="dropdown-menu" aria-labelledby="navbarDropdownPublications"> <a class="dropdown-item" href="https://publications.waset.org/abstracts">Abstracts</a> <a class="dropdown-item" href="https://publications.waset.org">Periodicals</a> <a class="dropdown-item" href="https://publications.waset.org/archive">Archive</a> </div> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/page/support" title="Support">Support</a> </li> </ul> </div> </div> </nav> </div> </header> <main> <div class="container mt-4"> <div class="row"> <div class="col-md-9 mx-auto"> <form method="get" action="https://publications.waset.org/abstracts/search"> <div id="custom-search-input"> <div class="input-group"> <i class="fas fa-search"></i> <input type="text" class="search-query" name="q" placeholder="Author, Title, Abstract, Keywords" value="attribute based access control"> <input type="submit" class="btn_search" value="Search"> </div> </div> </form> </div> </div> <div class="row mt-3"> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Commenced</strong> in January 2007</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Frequency:</strong> Monthly</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Edition:</strong> International</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Paper Count:</strong> 37523</div> </div> </div> </div> <h1 class="mt-3 mb-3 text-center" style="font-size:1.6rem;">Search results for: attribute based access control</h1> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">37523</span> RAPDAC: Role Centric Attribute Based Policy Driven Access Control Model</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Jamil%20Ahmed">Jamil Ahmed</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Access control models aim to decide whether a user should be denied or granted access to the user‟s requested activity. Various access control models have been established and proposed. The most prominent of these models include role-based, attribute-based, policy based access control models as well as role-centric attribute based access control model. In this paper, a novel access control model is presented called “Role centric Attribute based Policy Driven Access Control (RAPDAC) model”. RAPDAC incorporates the concept of “policy” in the “role centric attribute based access control model”. It leverages the concept of "policy‟ by precisely combining the evaluation of conditions, attributes, permissions and roles in order to allow authorization access. This approach allows capturing the "access control policy‟ of a real time application in a well defined manner. RAPDAC model allows making access decision at much finer granularity as illustrated by the case study of a real time library information system. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=authorization" title="authorization">authorization</a>, <a href="https://publications.waset.org/abstracts/search?q=access%20control%20model" title=" access control model"> access control model</a>, <a href="https://publications.waset.org/abstracts/search?q=role%20based%20access%20control" title=" role based access control"> role based access control</a>, <a href="https://publications.waset.org/abstracts/search?q=attribute%20based%20access%20control" title=" attribute based access control"> attribute based access control</a> </p> <a href="https://publications.waset.org/abstracts/129022/rapdac-role-centric-attribute-based-policy-driven-access-control-model" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/129022.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">159</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">37522</span> An Attribute Based Access Control Model with POL Module for Dynamically Granting and Revoking Authorizations</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Gang%20Liu">Gang Liu</a>, <a href="https://publications.waset.org/abstracts/search?q=Huimin%20Song"> Huimin Song</a>, <a href="https://publications.waset.org/abstracts/search?q=Can%20Wang"> Can Wang</a>, <a href="https://publications.waset.org/abstracts/search?q=Runnan%20Zhang"> Runnan Zhang</a>, <a href="https://publications.waset.org/abstracts/search?q=Lu%20Fang"> Lu Fang</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Currently, resource sharing and system security are critical issues. This paper proposes a POL module composed of PRIV ILEGE attribute (PA), obligation and log which improves attribute based access control (ABAC) model in dynamically granting authorizations and revoking authorizations. The following describes the new model termed PABAC in terms of the POL module structure, attribute definitions, policy formulation and authorization architecture, which demonstrate the advantages of it. The POL module addresses the problems which are not predicted before and not described by access control policy. It can be one of the subject attributes or resource attributes according to the practical application, which enhances the flexibility of the model compared with ABAC. A scenario that illustrates how this model is applied to the real world is provided. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=access%20control" title="access control">access control</a>, <a href="https://publications.waset.org/abstracts/search?q=attribute%20based%20access%20control" title=" attribute based access control"> attribute based access control</a>, <a href="https://publications.waset.org/abstracts/search?q=granting%20authorizations" title=" granting authorizations"> granting authorizations</a>, <a href="https://publications.waset.org/abstracts/search?q=privilege" title=" privilege"> privilege</a>, <a href="https://publications.waset.org/abstracts/search?q=revoking%20authorizations" title=" revoking authorizations"> revoking authorizations</a>, <a href="https://publications.waset.org/abstracts/search?q=system%20security" title=" system security"> system security</a> </p> <a href="https://publications.waset.org/abstracts/65275/an-attribute-based-access-control-model-with-pol-module-for-dynamically-granting-and-revoking-authorizations" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/65275.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">359</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">37521</span> Component Lifecycle and Concurrency Model in Usage Control (UCON) System</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=P.%20Ghann">P. Ghann</a>, <a href="https://publications.waset.org/abstracts/search?q=J.%20Shiguang"> J. Shiguang</a>, <a href="https://publications.waset.org/abstracts/search?q=C.%20Zhou"> C. Zhou</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Access control is one of the most challenging issues facing information security. Access control is defined as, the ability to permit or deny access to a particular computational resource or digital information by an unauthorized user or subject. The concept of usage control (UCON) has been introduced as a unified approach to capture a number of extensions for access control models and systems. In UCON, an access decision is determined by three factors: Authorizations, obligations and conditions. Attribute mutability and decision continuity are two distinct characteristics introduced by UCON for the first time. An observation of UCON components indicates that, the components are predefined and static. In this paper, we propose a new and flexible model of usage control for the creation and elimination of some of these components; for example new objects, subjects, attributes and integrate these with the original UCON model. We also propose a model for concurrent usage scenarios in UCON. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=access%20control" title="access control">access control</a>, <a href="https://publications.waset.org/abstracts/search?q=concurrency" title=" concurrency"> concurrency</a>, <a href="https://publications.waset.org/abstracts/search?q=digital%20container" title=" digital container"> digital container</a>, <a href="https://publications.waset.org/abstracts/search?q=usage%20control" title=" usage control"> usage control</a> </p> <a href="https://publications.waset.org/abstracts/3175/component-lifecycle-and-concurrency-model-in-usage-control-ucon-system" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/3175.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">320</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">37520</span> SPBAC: A Semantic Policy-Based Access Control for Database Query</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Aaron%20Zhang">Aaron Zhang</a>, <a href="https://publications.waset.org/abstracts/search?q=Alimire%20Kahaer"> Alimire Kahaer</a>, <a href="https://publications.waset.org/abstracts/search?q=Gerald%20Weber"> Gerald Weber</a>, <a href="https://publications.waset.org/abstracts/search?q=Nalin%20Arachchilage"> Nalin Arachchilage</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Access control is an essential safeguard for the security of enterprise data, which controls users’ access to information resources and ensures the confidentiality and integrity of information resources [1]. Research shows that the more common types of access control now have shortcomings [2]. In this direction, to improve the existing access control, we have studied the current technologies in the field of data security, deeply investigated the previous data access control policies and their problems, identified the existing deficiencies, and proposed a new extension structure of SPBAC. SPBAC extension proposed in this paper aims to combine Policy-Based Access Control (PBAC) with semantics to provide logically connected, real-time data access functionality by establishing associations between enterprise data through semantics. Our design combines policies with linked data through semantics to create a "Semantic link" so that access control is no longer per-database and determines that users in each role should be granted access based on the instance policy, and improves the SPBAC implementation by constructing policies and defined attributes through the XACML specification, which is designed to extend on the original XACML model. While providing relevant design solutions, this paper hopes to continue to study the feasibility and subsequent implementation of related work at a later stage. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=access%20control" title="access control">access control</a>, <a href="https://publications.waset.org/abstracts/search?q=semantic%20policy-based%20access%20control" title=" semantic policy-based access control"> semantic policy-based access control</a>, <a href="https://publications.waset.org/abstracts/search?q=semantic%20link" title=" semantic link"> semantic link</a>, <a href="https://publications.waset.org/abstracts/search?q=access%20control%20model" title=" access control model"> access control model</a>, <a href="https://publications.waset.org/abstracts/search?q=instance%20policy" title=" instance policy"> instance policy</a>, <a href="https://publications.waset.org/abstracts/search?q=XACML" title=" XACML"> XACML</a> </p> <a href="https://publications.waset.org/abstracts/168587/spbac-a-semantic-policy-based-access-control-for-database-query" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/168587.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">91</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">37519</span> Access Control System for Big Data Application</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Winfred%20Okoe%20Addy">Winfred Okoe Addy</a>, <a href="https://publications.waset.org/abstracts/search?q=Jean%20Jacques%20Dominique%20Beraud"> Jean Jacques Dominique Beraud</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Access control systems (ACs) are some of the most important components in safety areas. Inaccuracies of regulatory frameworks make personal policies and remedies more appropriate than standard models or protocols. This problem is exacerbated by the increasing complexity of software, such as integrated Big Data (BD) software for controlling large volumes of encrypted data and resources embedded in a dedicated BD production system. This paper proposes a general access control strategy system for the diffusion of Big Data domains since it is crucial to secure the data provided to data consumers (DC). We presented a general access control circulation strategy for the Big Data domain by describing the benefit of using designated access control for BD units and performance and taking into consideration the need for BD and AC system. We then presented a generic of Big Data access control system to improve the dissemination of Big Data. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=access%20control" title="access control">access control</a>, <a href="https://publications.waset.org/abstracts/search?q=security" title=" security"> security</a>, <a href="https://publications.waset.org/abstracts/search?q=Big%20Data" title=" Big Data"> Big Data</a>, <a href="https://publications.waset.org/abstracts/search?q=domain" title=" domain"> domain</a> </p> <a href="https://publications.waset.org/abstracts/132951/access-control-system-for-big-data-application" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/132951.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">134</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">37518</span> Research and Implementation of Cross-domain Data Sharing System in Net-centric Environment</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Xiaoqing%20Wang">Xiaoqing Wang</a>, <a href="https://publications.waset.org/abstracts/search?q=Jianjian%20Zong"> Jianjian Zong</a>, <a href="https://publications.waset.org/abstracts/search?q=Li%20Li"> Li Li</a>, <a href="https://publications.waset.org/abstracts/search?q=Yanxing%20Zheng"> Yanxing Zheng</a>, <a href="https://publications.waset.org/abstracts/search?q=Jinrong%20Tong"> Jinrong Tong</a>, <a href="https://publications.waset.org/abstracts/search?q=Mao%20Zhan"> Mao Zhan </a> </p> <p class="card-text"><strong>Abstract:</strong></p> With the rapid development of network and communication technology, a great deal of data has been generated in different domains of a network. These data show a trend of increasing scale and more complex structure. Therefore, an effective and flexible cross-domain data-sharing system is needed. The Cross-domain Data Sharing System(CDSS) in a net-centric environment is composed of three sub-systems. The data distribution sub-system provides data exchange service through publish-subscribe technology that supports asynchronism and multi-to-multi communication, which adapts to the needs of the dynamic and large-scale distributed computing environment. The access control sub-system adopts Attribute-Based Access Control(ABAC) technology to uniformly model various data attributes such as subject, object, permission and environment, which effectively monitors the activities of users accessing resources and ensures that legitimate users get effective access control rights within a legal time. The cross-domain access security negotiation subsystem automatically determines the access rights between different security domains in the process of interactive disclosure of digital certificates and access control policies through trust policy management and negotiation algorithms, which provides an effective means for cross-domain trust relationship establishment and access control in a distributed environment. The CDSS’s asynchronous,multi-to-multi and loosely-coupled communication features can adapt well to data exchange and sharing in dynamic, distributed and large-scale network environments. Next, we will give CDSS new features to support the mobile computing environment. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=data%20sharing" title="data sharing">data sharing</a>, <a href="https://publications.waset.org/abstracts/search?q=cross-domain" title=" cross-domain"> cross-domain</a>, <a href="https://publications.waset.org/abstracts/search?q=data%20exchange" title=" data exchange"> data exchange</a>, <a href="https://publications.waset.org/abstracts/search?q=publish-subscribe" title=" publish-subscribe"> publish-subscribe</a> </p> <a href="https://publications.waset.org/abstracts/138191/research-and-implementation-of-cross-domain-data-sharing-system-in-net-centric-environment" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/138191.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">124</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">37517</span> The Effectiveness of Computerized Dynamic Listening Assessment Informed by Attribute-Based Mediation Model</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Yaru%20Meng">Yaru Meng</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The study contributes to the small but growing literature around computerized approaches to dynamic assessment (C-DA), wherein individual items are accompanied by mediating prompts. Mediation in the current computerized dynamic listening assessment (CDLA) was informed by an attribute-based mediation model (AMM) that identified the underlying L2 listening cognitive abilities and associated descriptors. The AMM served to focus mediation during C-DA on particular cognitive abilities with a goal of specifying areas of learner difficulty. 86 low-intermediate L2 English learners from a university in China completed three listening assessments, with an experimental group receiving the CLDA system and a control group a non-dynamic assessment. As an assessment, the use of the AMM in C-DA generated detailed diagnoses for each learner. In addition, both within- and between-group repeated ANOVA found greater gains at the level of specific attributes among C-DA learners over the course of a 5-week study. Directions for future research are discussed. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=computerized%20dynamic%20assessment" title="computerized dynamic assessment">computerized dynamic assessment</a>, <a href="https://publications.waset.org/abstracts/search?q=effectiveness" title=" effectiveness"> effectiveness</a>, <a href="https://publications.waset.org/abstracts/search?q=English%20as%20foreign%20language%20listening" title=" English as foreign language listening"> English as foreign language listening</a>, <a href="https://publications.waset.org/abstracts/search?q=attribute-based%20mediation%20model" title=" attribute-based mediation model"> attribute-based mediation model</a> </p> <a href="https://publications.waset.org/abstracts/132564/the-effectiveness-of-computerized-dynamic-listening-assessment-informed-by-attribute-based-mediation-model" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/132564.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">224</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">37516</span> Enhance Security in XML Databases: XLog File for Severity-Aware Trust-Based Access Control</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=A%3A%20Asmawi">A: Asmawi</a>, <a href="https://publications.waset.org/abstracts/search?q=L.%20S.%20Affendey"> L. S. Affendey</a>, <a href="https://publications.waset.org/abstracts/search?q=N.%20I.%20Udzir"> N. I. Udzir</a>, <a href="https://publications.waset.org/abstracts/search?q=R.%20Mahmod"> R. Mahmod</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The topic of enhancing security in XML databases is important as it includes protecting sensitive data and providing a secure environment to users. In order to improve security and provide dynamic access control for XML databases, we presented XLog file to calculate user trust values by recording users’ bad transaction, errors and query severities. Severity-aware trust-based access control for XML databases manages the access policy depending on users' trust values and prevents unauthorized processes, malicious transactions and insider threats. Privileges are automatically modified and adjusted over time depending on user behaviour and query severity. Logging in database is an important process and is used for recovery and security purposes. In this paper, the Xlog file is presented as a dynamic and temporary log file for XML databases to enhance the level of security. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=XML%20database" title="XML database">XML database</a>, <a href="https://publications.waset.org/abstracts/search?q=trust-based%20access%20control" title=" trust-based access control"> trust-based access control</a>, <a href="https://publications.waset.org/abstracts/search?q=severity-aware" title=" severity-aware"> severity-aware</a>, <a href="https://publications.waset.org/abstracts/search?q=trust%20values" title=" trust values"> trust values</a>, <a href="https://publications.waset.org/abstracts/search?q=log%20file" title=" log file"> log file</a> </p> <a href="https://publications.waset.org/abstracts/11637/enhance-security-in-xml-databases-xlog-file-for-severity-aware-trust-based-access-control" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/11637.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">300</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">37515</span> Application of Hyperbinomial Distribution in Developing a Modified p-Chart</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Shourav%20Ahmed">Shourav Ahmed</a>, <a href="https://publications.waset.org/abstracts/search?q=M.%20Gulam%20Kibria"> M. Gulam Kibria</a>, <a href="https://publications.waset.org/abstracts/search?q=Kais%20Zaman"> Kais Zaman</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Control charts graphically verify variation in quality parameters. Attribute type control charts deal with quality parameters that can only hold two states, e.g., good or bad, yes or no, etc. At present, p-control chart is most commonly used to deal with attribute type data. In construction of p-control chart using binomial distribution, the value of proportion non-conforming must be known or estimated from limited sample information. As the probability distribution of fraction non-conforming (p) is considered in hyperbinomial distribution unlike a constant value in case of binomial distribution, it reduces the risk of false detection. In this study, a statistical control chart is proposed based on hyperbinomial distribution when prior estimate of proportion non-conforming is unavailable and is estimated from limited sample information. We developed the control limits of the proposed modified p-chart using the mean and variance of hyperbinomial distribution. The proposed modified p-chart can also utilize additional sample information when they are available. The study also validates the use of modified p-chart by comparing with the result obtained using cumulative distribution function of hyperbinomial distribution. The study clearly indicates that the use of hyperbinomial distribution in construction of p-control chart yields much accurate estimate of quality parameters than using binomial distribution. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=binomial%20distribution" title="binomial distribution">binomial distribution</a>, <a href="https://publications.waset.org/abstracts/search?q=control%20charts" title=" control charts"> control charts</a>, <a href="https://publications.waset.org/abstracts/search?q=cumulative%20distribution%20function" title=" cumulative distribution function"> cumulative distribution function</a>, <a href="https://publications.waset.org/abstracts/search?q=hyper%20binomial%20distribution" title=" hyper binomial distribution"> hyper binomial distribution</a> </p> <a href="https://publications.waset.org/abstracts/90750/application-of-hyperbinomial-distribution-in-developing-a-modified-p-chart" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/90750.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">279</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">37514</span> Survey of Access Controls in Cloud Computing</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Monirah%20Alkathiry">Monirah Alkathiry</a>, <a href="https://publications.waset.org/abstracts/search?q=Hanan%20Aljarwan"> Hanan Aljarwan</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Cloud computing is one of the most significant technologies that the world deals with, in different sectors with different purposes and capabilities. The cloud faces various challenges in securing data from unauthorized access or modification. Consequently, security risks and levels have greatly increased. Therefore, cloud service providers (CSPs) and users need secure mechanisms that ensure that data are kept secret and safe from any disclosures or exploits. For this reason, CSPs need a number of techniques and technologies to manage and secure access to the cloud services to achieve security goals, such as confidentiality, integrity, identity access management (IAM), etc. Therefore, this paper will review and explore various access controls implemented in a cloud environment that achieve different security purposes. The methodology followed in this survey was conducting an assessment, evaluation, and comparison between those access controls mechanisms and technologies based on different factors, such as the security goals it achieves, usability, and cost-effectiveness. This assessment resulted in the fact that the technology used in an access control affects the security goals it achieves as well as there is no one access control method that achieves all security goals. Consequently, such a comparison would help decision-makers to choose properly the access controls that meet their requirements. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=access%20controls" title="access controls">access controls</a>, <a href="https://publications.waset.org/abstracts/search?q=cloud%20computing" title=" cloud computing"> cloud computing</a>, <a href="https://publications.waset.org/abstracts/search?q=confidentiality" title=" confidentiality"> confidentiality</a>, <a href="https://publications.waset.org/abstracts/search?q=identity%20and%20access%20management" title=" identity and access management"> identity and access management</a> </p> <a href="https://publications.waset.org/abstracts/125048/survey-of-access-controls-in-cloud-computing" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/125048.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">131</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">37513</span> Fuzzy Population-Based Meta-Heuristic Approaches for Attribute Reduction in Rough Set Theory</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mafarja%20Majdi">Mafarja Majdi</a>, <a href="https://publications.waset.org/abstracts/search?q=Salwani%20Abdullah"> Salwani Abdullah</a>, <a href="https://publications.waset.org/abstracts/search?q=Najmeh%20S.%20Jaddi"> Najmeh S. Jaddi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> One of the global combinatorial optimization problems in machine learning is feature selection. It concerned with removing the irrelevant, noisy, and redundant data, along with keeping the original meaning of the original data. Attribute reduction in rough set theory is an important feature selection method. Since attribute reduction is an NP-hard problem, it is necessary to investigate fast and effective approximate algorithms. In this paper, we proposed two feature selection mechanisms based on memetic algorithms (MAs) which combine the genetic algorithm with a fuzzy record to record travel algorithm and a fuzzy controlled great deluge algorithm to identify a good balance between local search and genetic search. In order to verify the proposed approaches, numerical experiments are carried out on thirteen datasets. The results show that the MAs approaches are efficient in solving attribute reduction problems when compared with other meta-heuristic approaches. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=rough%20set%20theory" title="rough set theory">rough set theory</a>, <a href="https://publications.waset.org/abstracts/search?q=attribute%20reduction" title=" attribute reduction"> attribute reduction</a>, <a href="https://publications.waset.org/abstracts/search?q=fuzzy%20logic" title=" fuzzy logic"> fuzzy logic</a>, <a href="https://publications.waset.org/abstracts/search?q=memetic%20algorithms" title=" memetic algorithms"> memetic algorithms</a>, <a href="https://publications.waset.org/abstracts/search?q=record%20to%20record%20algorithm" title=" record to record algorithm"> record to record algorithm</a>, <a href="https://publications.waset.org/abstracts/search?q=great%20deluge%20algorithm" title=" great deluge algorithm"> great deluge algorithm</a> </p> <a href="https://publications.waset.org/abstracts/33663/fuzzy-population-based-meta-heuristic-approaches-for-attribute-reduction-in-rough-set-theory" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/33663.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">454</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">37512</span> Green Design Study of Prefabricated Community Control Measures in Response to Public Health Emergencies</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Enjia%20Zhang">Enjia Zhang</a> </p> <p class="card-text"><strong>Abstract:</strong></p> During the prevention and control of the COVID-19 pandemic, all communities in China were gated and under strict management, which was highly effective in preventing the spread of the epidemic from spreading. Based on the TRIZ theory, this paper intends to propose green design strategies of community control in response to public health emergencies and to optimize community control facilities according to the principle of minimum transformation. Through the questionnaire method, this paper investigates and summarizes the situation and problems of community control during the COVID-19 pandemic. Based on these problems, the TRIZ theory is introduced to figure out the problems and associates them with prefabricated facilities. Afterward, the innovation points and solutions of prefabricated community control measures are proposed by using the contradiction matrix. This paper summarizes the current situation of community control under public health emergencies and concludes the problems such as simple forms of temporary roadblocks, sudden increase of community traffic pressure, and difficulties to access public spaces. The importance of entrance and exit control in community control is emphasized. Therefore, the community control measures are supposed to focus on traffic control, and the external access control measures, including motor vehicles, non-motor vehicles, residents and non-residents access control, and internal public space access control measures, including public space control shared with the society or adjacent communities, are proposed in order to make the community keep the open characteristics and have the flexibility to deal with sudden public health emergencies in the future. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=green%20design" title="green design">green design</a>, <a href="https://publications.waset.org/abstracts/search?q=community%20control" title=" community control"> community control</a>, <a href="https://publications.waset.org/abstracts/search?q=prefabricated%20structure" title=" prefabricated structure"> prefabricated structure</a>, <a href="https://publications.waset.org/abstracts/search?q=public%20health%20emergency" title=" public health emergency"> public health emergency</a> </p> <a href="https://publications.waset.org/abstracts/130026/green-design-study-of-prefabricated-community-control-measures-in-response-to-public-health-emergencies" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/130026.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">129</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">37511</span> Clustering-Based Computational Workload Minimization in Ontology Matching</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mansir%20Abubakar">Mansir Abubakar</a>, <a href="https://publications.waset.org/abstracts/search?q=Hazlina%20Hamdan"> Hazlina Hamdan</a>, <a href="https://publications.waset.org/abstracts/search?q=Norwati%20Mustapha"> Norwati Mustapha</a>, <a href="https://publications.waset.org/abstracts/search?q=Teh%20Noranis%20Mohd%20Aris"> Teh Noranis Mohd Aris</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In order to build a matching pattern for each class correspondences of ontology, it is required to specify a set of attribute correspondences across two corresponding classes by clustering. Clustering reduces the size of potential attribute correspondences considered in the matching activity, which will significantly reduce the computation workload; otherwise, all attributes of a class should be compared with all attributes of the corresponding class. Most existing ontology matching approaches lack scalable attributes discovery methods, such as cluster-based attribute searching. This problem makes ontology matching activity computationally expensive. It is therefore vital in ontology matching to design a scalable element or attribute correspondence discovery method that would reduce the size of potential elements correspondences during mapping thereby reduce the computational workload in a matching process as a whole. The objective of this work is 1) to design a clustering method for discovering similar attributes correspondences and relationships between ontologies, 2) to discover element correspondences by classifying elements of each class based on element’s value features using K-medoids clustering technique. Discovering attribute correspondence is highly required for comparing instances when matching two ontologies. During the matching process, any two instances across two different data sets should be compared to their attribute values, so that they can be regarded to be the same or not. Intuitively, any two instances that come from classes across which there is a class correspondence are likely to be identical to each other. Besides, any two instances that hold more similar attribute values are more likely to be matched than the ones with less similar attribute values. Most of the time, similar attribute values exist in the two instances across which there is an attribute correspondence. This work will present how to classify attributes of each class with K-medoids clustering, then, clustered groups to be mapped by their statistical value features. We will also show how to map attributes of a clustered group to attributes of the mapped clustered group, generating a set of potential attribute correspondences that would be applied to generate a matching pattern. The K-medoids clustering phase would largely reduce the number of attribute pairs that are not corresponding for comparing instances as only the coverage probability of attributes pairs that reaches 100% and attributes above the specified threshold can be considered as potential attributes for a matching. Using clustering will reduce the size of potential elements correspondences to be considered during mapping activity, which will in turn reduce the computational workload significantly. Otherwise, all element of the class in source ontology have to be compared with all elements of the corresponding classes in target ontology. K-medoids can ably cluster attributes of each class, so that a proportion of attribute pairs that are not corresponding would not be considered when constructing the matching pattern. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=attribute%20correspondence" title="attribute correspondence">attribute correspondence</a>, <a href="https://publications.waset.org/abstracts/search?q=clustering" title=" clustering"> clustering</a>, <a href="https://publications.waset.org/abstracts/search?q=computational%20workload" title=" computational workload"> computational workload</a>, <a href="https://publications.waset.org/abstracts/search?q=k-medoids%20clustering" title=" k-medoids clustering"> k-medoids clustering</a>, <a href="https://publications.waset.org/abstracts/search?q=ontology%20matching" title=" ontology matching"> ontology matching</a> </p> <a href="https://publications.waset.org/abstracts/78369/clustering-based-computational-workload-minimization-in-ontology-matching" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/78369.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">248</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">37510</span> Design Elements: Examining Product Design Attribute That Make Sweets Appear More Delicious to Foreign Patrons</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Kazuko%20Sakamoto">Kazuko Sakamoto</a>, <a href="https://publications.waset.org/abstracts/search?q=Keiichiro%20Kawarabayashi"> Keiichiro Kawarabayashi</a>, <a href="https://publications.waset.org/abstracts/search?q=Yoji%20Kitani"> Yoji Kitani</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Japanese sweets are one of the important elements of the Chur Japan strategy. In this research, we investigated what kind of sweets are liked to the Chinese tourist. What is generally eaten is influenced by culture, a sense of values, and business practice. Therefore, what was adapted there is sold. However, when traveling, what its country does not have is called for. Then, how far should we take in Chinese people's taste in a design? This time, the design attribute (a color and a form) which leads to sweets "being delicious" was clarified by rough aggregate theory.As a result, the difference in the taste of Chinese people and Japanese people became clear. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=design%20attribute" title="design attribute">design attribute</a>, <a href="https://publications.waset.org/abstracts/search?q=international%20comparison" title=" international comparison"> international comparison</a>, <a href="https://publications.waset.org/abstracts/search?q=taste%20by%20appearance" title=" taste by appearance"> taste by appearance</a>, <a href="https://publications.waset.org/abstracts/search?q=design%20attribute" title=" design attribute"> design attribute</a> </p> <a href="https://publications.waset.org/abstracts/10772/design-elements-examining-product-design-attribute-that-make-sweets-appear-more-delicious-to-foreign-patrons" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/10772.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">422</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">37509</span> Intelligent Recognition of Diabetes Disease via FCM Based Attribute Weighting</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Kemal%20Polat">Kemal Polat</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this paper, an attribute weighting method called fuzzy C-means clustering based attribute weighting (FCMAW) for classification of Diabetes disease dataset has been used. The aims of this study are to reduce the variance within attributes of diabetes dataset and to improve the classification accuracy of classifier algorithm transforming from non-linear separable datasets to linearly separable datasets. Pima Indians Diabetes dataset has two classes including normal subjects (500 instances) and diabetes subjects (268 instances). Fuzzy C-means clustering is an improved version of K-means clustering method and is one of most used clustering methods in data mining and machine learning applications. In this study, as the first stage, fuzzy C-means clustering process has been used for finding the centers of attributes in Pima Indians diabetes dataset and then weighted the dataset according to the ratios of the means of attributes to centers of theirs. Secondly, after weighting process, the classifier algorithms including support vector machine (SVM) and k-NN (k- nearest neighbor) classifiers have been used for classifying weighted Pima Indians diabetes dataset. Experimental results show that the proposed attribute weighting method (FCMAW) has obtained very promising results in the classification of Pima Indians diabetes dataset. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=fuzzy%20C-means%20clustering" title="fuzzy C-means clustering">fuzzy C-means clustering</a>, <a href="https://publications.waset.org/abstracts/search?q=fuzzy%20C-means%20clustering%20based%20attribute%20weighting" title=" fuzzy C-means clustering based attribute weighting"> fuzzy C-means clustering based attribute weighting</a>, <a href="https://publications.waset.org/abstracts/search?q=Pima%20Indians%20diabetes" title=" Pima Indians diabetes"> Pima Indians diabetes</a>, <a href="https://publications.waset.org/abstracts/search?q=SVM" title=" SVM"> SVM</a> </p> <a href="https://publications.waset.org/abstracts/46171/intelligent-recognition-of-diabetes-disease-via-fcm-based-attribute-weighting" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/46171.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">413</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">37508</span> Development of a Sequential Multimodal Biometric System for Web-Based Physical Access Control into a Security Safe</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Babatunde%20Olumide%20Olawale">Babatunde Olumide Olawale</a>, <a href="https://publications.waset.org/abstracts/search?q=Oyebode%20Olumide%20Oyediran"> Oyebode Olumide Oyediran</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The security safe is a place or building where classified document and precious items are kept. To prevent unauthorised persons from gaining access to this safe a lot of technologies had been used. But frequent reports of an unauthorised person gaining access into security safes with the aim of removing document and items from the safes are pointers to the fact that there is still security gap in the recent technologies used as access control for the security safe. In this paper we try to solve this problem by developing a multimodal biometric system for physical access control into a security safe using face and voice recognition. The safe is accessed by the combination of face and speech pattern recognition and also in that sequential order. User authentication is achieved through the use of camera/sensor unit and a microphone unit both attached to the door of the safe. The user face was captured by the camera/sensor while the speech was captured by the use of the microphone unit. The Scale Invariance Feature Transform (SIFT) algorithm was used to train images to form templates for the face recognition system while the Mel-Frequency Cepitral Coefficients (MFCC) algorithm was used to train the speech recognition system to recognise authorise user’s speech. Both algorithms were hosted in two separate web based servers and for automatic analysis of our work; our developed system was simulated in a MATLAB environment. The results obtained shows that the developed system was able to give access to authorise users while declining unauthorised person access to the security safe. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=access%20control" title="access control">access control</a>, <a href="https://publications.waset.org/abstracts/search?q=multimodal%20biometrics" title=" multimodal biometrics"> multimodal biometrics</a>, <a href="https://publications.waset.org/abstracts/search?q=pattern%20recognition" title=" pattern recognition"> pattern recognition</a>, <a href="https://publications.waset.org/abstracts/search?q=security%20safe" title=" security safe"> security safe</a> </p> <a href="https://publications.waset.org/abstracts/73150/development-of-a-sequential-multimodal-biometric-system-for-web-based-physical-access-control-into-a-security-safe" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/73150.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">334</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">37507</span> Structured Access Control Mechanism for Mesh-based P2P Live Streaming Systems</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Chuan-Ching%20Sue">Chuan-Ching Sue</a>, <a href="https://publications.waset.org/abstracts/search?q=Kai-Chun%20Chuang"> Kai-Chun Chuang</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Peer-to-Peer (P2P) live streaming systems still suffer a challenge when thousands of new peers want to join into the system in a short time, called flash crowd, and most of new peers suffer long start-up delay. Recent studies have proposed a slot-based user access control mechanism, which periodically determines a certain number of new peers to enter the system, and a user batch join mechanism, which divides new peers into several tree structures with fixed tree size. However, the slot-based user access control mechanism is difficult for accurately determining the optimal time slot length, and the user batch join mechanism is hard for determining the optimal tree size. In this paper, we propose a structured access control (SAC) mechanism, which constructs new peers to a multi-layer mesh structure. The SAC mechanism constructs new peer connections layer by layer to replace periodical access control, and determines the number of peers in each layer according to the system’s remaining upload bandwidth and average video rate. Furthermore, we propose an analytical model to represent the behavior of the system growth if the system can utilize the upload bandwidth efficiently. The analytical result has shown the similar trend in system growth as the SAC mechanism. Additionally, the extensive simulation is conducted to show the SAC mechanism outperforms two previously proposed methods in terms of system growth and start-up delay. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=peer-to-peer" title="peer-to-peer">peer-to-peer</a>, <a href="https://publications.waset.org/abstracts/search?q=live%20video%20streaming%20system" title=" live video streaming system"> live video streaming system</a>, <a href="https://publications.waset.org/abstracts/search?q=flash%20crowd" title=" flash crowd"> flash crowd</a>, <a href="https://publications.waset.org/abstracts/search?q=start-up%20delay" title=" start-up delay"> start-up delay</a>, <a href="https://publications.waset.org/abstracts/search?q=access%20control" title=" access control"> access control</a> </p> <a href="https://publications.waset.org/abstracts/24987/structured-access-control-mechanism-for-mesh-based-p2p-live-streaming-systems" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/24987.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">317</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">37506</span> Proficient Estimation Procedure for a Rare Sensitive Attribute Using Poisson Distribution</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=S.%20Suman">S. Suman</a>, <a href="https://publications.waset.org/abstracts/search?q=G.%20N.%20Singh"> G. N. Singh </a> </p> <p class="card-text"><strong>Abstract:</strong></p> The present manuscript addresses the estimation procedure of population parameter using Poisson probability distribution when characteristic under study possesses a rare sensitive attribute. The generalized form of unrelated randomized response model is suggested in order to acquire the truthful responses from respondents. The resultant estimators have been proposed for two situations when the information on an unrelated rare non-sensitive characteristic is known as well as unknown. The properties of the proposed estimators are derived, and the measure of confidentiality of respondent is also suggested for respondents. Empirical studies are carried out in the support of discussed theory. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Poisson%20distribution" title="Poisson distribution">Poisson distribution</a>, <a href="https://publications.waset.org/abstracts/search?q=randomized%20response%20model" title=" randomized response model"> randomized response model</a>, <a href="https://publications.waset.org/abstracts/search?q=rare%20sensitive%20attribute" title=" rare sensitive attribute"> rare sensitive attribute</a>, <a href="https://publications.waset.org/abstracts/search?q=non-sensitive%20attribute" title=" non-sensitive attribute"> non-sensitive attribute</a> </p> <a href="https://publications.waset.org/abstracts/95219/proficient-estimation-procedure-for-a-rare-sensitive-attribute-using-poisson-distribution" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/95219.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">266</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">37505</span> An Information-Based Approach for Preference Method in Multi-Attribute Decision Making</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Serhat%20Tuzun">Serhat Tuzun</a>, <a href="https://publications.waset.org/abstracts/search?q=Tufan%20Demirel"> Tufan Demirel</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Multi-Criteria Decision Making (MCDM) is the modelling of real-life to solve problems we encounter. It is a discipline that aids decision makers who are faced with conflicting alternatives to make an optimal decision. MCDM problems can be classified into two main categories: Multi-Attribute Decision Making (MADM) and Multi-Objective Decision Making (MODM), based on the different purposes and different data types. Although various MADM techniques were developed for the problems encountered, their methodology is limited in modelling real-life. Moreover, objective results are hard to obtain, and the findings are generally derived from subjective data. Although, new and modified techniques are developed by presenting new approaches such as fuzzy logic; comprehensive techniques, even though they are better in modelling real-life, could not find a place in real world applications for being hard to apply due to its complex structure. These constraints restrict the development of MADM. This study aims to conduct a comprehensive analysis of preference methods in MADM and propose an approach based on information. For this purpose, a detailed literature review has been conducted, current approaches with their advantages and disadvantages have been analyzed. Then, the approach has been introduced. In this approach, performance values of the criteria are calculated in two steps: first by determining the distribution of each attribute and standardizing them, then calculating the information of each attribute as informational energy. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=literature%20review" title="literature review">literature review</a>, <a href="https://publications.waset.org/abstracts/search?q=multi-attribute%20decision%20making" title=" multi-attribute decision making"> multi-attribute decision making</a>, <a href="https://publications.waset.org/abstracts/search?q=operations%20research" title=" operations research"> operations research</a>, <a href="https://publications.waset.org/abstracts/search?q=preference%20method" title=" preference method"> preference method</a>, <a href="https://publications.waset.org/abstracts/search?q=informational%20energy" title=" informational energy"> informational energy</a> </p> <a href="https://publications.waset.org/abstracts/73395/an-information-based-approach-for-preference-method-in-multi-attribute-decision-making" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/73395.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">224</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">37504</span> Facial Recognition Technology in Institutions of Higher Learning: Exploring the Use in Kenya</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Samuel%20Mwangi">Samuel Mwangi</a>, <a href="https://publications.waset.org/abstracts/search?q=Josephine%20K.%20Mule"> Josephine K. Mule</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Access control as a security technique regulates who or what can access resources. It is a fundamental concept in security that minimizes risks to the institutions that use access control. Regulating access to institutions of higher learning is key to ensure only authorized personnel and students are allowed into the institutions. The use of biometrics has been criticized due to the setup and maintenance costs, hygiene concerns, and trepidations regarding data privacy, among other apprehensions. Facial recognition is arguably a fast and accurate way of validating identity in order to guard protected areas. It guarantees that only authorized individuals gain access to secure locations while requiring far less personal information whilst providing an additional layer of security beyond keys, fobs, or identity cards. This exploratory study sought to investigate the use of facial recognition in controlling access in institutions of higher learning in Kenya. The sample population was drawn from both private and public higher learning institutions. The data is based on responses from staff and students. Questionnaires were used for data collection and follow up interviews conducted to understand responses from the questionnaires. 80% of the sampled population indicated that there were many security breaches by unauthorized people, with some resulting in terror attacks. These security breaches were attributed to stolen identity cases, where staff or student identity cards were stolen and used by criminals to access the institutions. These unauthorized accesses have resulted in losses to the institutions, including reputational damages. The findings indicate that security breaches are a major problem in institutions of higher learning in Kenya. Consequently, access control would be beneficial if employed to curb security breaches. We suggest the use of facial recognition technology, given its uniqueness in identifying users and its non-repudiation capabilities. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=facial%20recognition" title="facial recognition">facial recognition</a>, <a href="https://publications.waset.org/abstracts/search?q=access%20control" title=" access control"> access control</a>, <a href="https://publications.waset.org/abstracts/search?q=technology" title=" technology"> technology</a>, <a href="https://publications.waset.org/abstracts/search?q=learning" title=" learning"> learning</a> </p> <a href="https://publications.waset.org/abstracts/127591/facial-recognition-technology-in-institutions-of-higher-learning-exploring-the-use-in-kenya" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/127591.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">125</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">37503</span> Attribute Based Comparison and Selection of Modular Self-Reconfigurable Robot Using Multiple Attribute Decision Making Approach</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Manpreet%20Singh">Manpreet Singh</a>, <a href="https://publications.waset.org/abstracts/search?q=V.%20P.%20Agrawal"> V. P. Agrawal</a>, <a href="https://publications.waset.org/abstracts/search?q=Gurmanjot%20Singh%20Bhatti"> Gurmanjot Singh Bhatti</a> </p> <p class="card-text"><strong>Abstract:</strong></p> From the last decades, there is a significant technological advancement in the field of robotics, and a number of modular self-reconfigurable robots were introduced that can help in space exploration, bucket to stuff, search, and rescue operation during earthquake, etc. As there are numbers of self-reconfigurable robots, choosing the optimum one is always a concern for robot user since there is an increase in available features, facilities, complexity, etc. The objective of this research work is to present a multiple attribute decision making based methodology for coding, evaluation, comparison ranking and selection of modular self-reconfigurable robots using a technique for order preferences by similarity to ideal solution approach. However, 86 attributes that affect the structure and performance are identified. A database for modular self-reconfigurable robot on the basis of different pertinent attribute is generated. This database is very useful for the user, for selecting a robot that suits their operational needs. Two visual methods namely linear graph and spider chart are proposed for ranking of modular self-reconfigurable robots. Using five robots (Atron, Smores, Polybot, M-Tran 3, Superbot), an example is illustrated, and raking of the robots is successfully done, which shows that Smores is the best robot for the operational need illustrated, and this methodology is found to be very effective and simple to use. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=self-reconfigurable%20robots" title="self-reconfigurable robots">self-reconfigurable robots</a>, <a href="https://publications.waset.org/abstracts/search?q=MADM" title=" MADM"> MADM</a>, <a href="https://publications.waset.org/abstracts/search?q=TOPSIS" title=" TOPSIS"> TOPSIS</a>, <a href="https://publications.waset.org/abstracts/search?q=morphogenesis" title=" morphogenesis"> morphogenesis</a>, <a href="https://publications.waset.org/abstracts/search?q=scalability" title=" scalability"> scalability</a> </p> <a href="https://publications.waset.org/abstracts/90771/attribute-based-comparison-and-selection-of-modular-self-reconfigurable-robot-using-multiple-attribute-decision-making-approach" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/90771.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">222</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">37502</span> Channels Splitting Strategy for Optical Local Area Networks of Passive Star Topology</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Peristera%20Baziana">Peristera Baziana</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this paper, we present a network configuration for a WDM LANs of passive star topology that assume that the set of data WDM channels is split into two separate sets of channels, with different access rights over them. Especially, a synchronous transmission WDMA access algorithm is adopted in order to increase the probability of successful transmission over the data channels and consequently to reduce the probability of data packets transmission cancellation in order to avoid the data channels collisions. Thus, a control pre-transmission access scheme is followed over a separate control channel. An analytical Markovian model is studied and the average throughput is mathematically derived. The performance is studied for several numbers of data channels and various values of control phase duration. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=access%20algorithm" title="access algorithm">access algorithm</a>, <a href="https://publications.waset.org/abstracts/search?q=channels%20division" title=" channels division"> channels division</a>, <a href="https://publications.waset.org/abstracts/search?q=collisions%20avoidance" title=" collisions avoidance"> collisions avoidance</a>, <a href="https://publications.waset.org/abstracts/search?q=wavelength%20division%20multiplexing" title=" wavelength division multiplexing"> wavelength division multiplexing</a> </p> <a href="https://publications.waset.org/abstracts/63025/channels-splitting-strategy-for-optical-local-area-networks-of-passive-star-topology" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/63025.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">296</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">37501</span> A Multi-Attribute Utility Model for Performance Evaluation of Sustainable Banking</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sonia%20Rebai">Sonia Rebai</a>, <a href="https://publications.waset.org/abstracts/search?q=Mohamed%20Naceur%20Azaiez"> Mohamed Naceur Azaiez</a>, <a href="https://publications.waset.org/abstracts/search?q=Dhafer%20Saidane"> Dhafer Saidane</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this study, we develop a performance evaluation model based on a multi-attribute utility approach aiming at reaching the sustainable banking (SB) status. This model is built accounting for various banks’ stakeholders in a win-win paradigm. In addition, it offers the opportunity for adopting a global measure of performance as an indication of a bank’s sustainability degree. This measure is referred to as banking sustainability performance index (BSPI). This index may constitute a basis for ranking banks. Moreover, it may constitute a bridge between the assessment types of financial and extra-financial rating agencies. A real application is performed on three French banks. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=multi-attribute%20utility%20theory" title="multi-attribute utility theory">multi-attribute utility theory</a>, <a href="https://publications.waset.org/abstracts/search?q=performance" title=" performance"> performance</a>, <a href="https://publications.waset.org/abstracts/search?q=sustainable%20banking" title=" sustainable banking"> sustainable banking</a>, <a href="https://publications.waset.org/abstracts/search?q=financial%20rating" title=" financial rating "> financial rating </a> </p> <a href="https://publications.waset.org/abstracts/10643/a-multi-attribute-utility-model-for-performance-evaluation-of-sustainable-banking" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/10643.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">467</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">37500</span> Research of Data Cleaning Methods Based on Dependency Rules</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Yang%20Bao">Yang Bao</a>, <a href="https://publications.waset.org/abstracts/search?q=Shi%20Wei%20Deng"> Shi Wei Deng</a>, <a href="https://publications.waset.org/abstracts/search?q=WangQun%20Lin"> WangQun Lin</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper introduces the concept and principle of data cleaning, analyzes the types and causes of dirty data, and proposes several key steps of typical cleaning process, puts forward a well scalability and versatility data cleaning framework, in view of data with attribute dependency relation, designs several of violation data discovery algorithms by formal formula, which can obtain inconsistent data to all target columns with condition attribute dependent no matter data is structured (SQL) or unstructured (NoSQL), and gives 6 data cleaning methods based on these algorithms. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=data%20cleaning" title="data cleaning">data cleaning</a>, <a href="https://publications.waset.org/abstracts/search?q=dependency%20rules" title=" dependency rules"> dependency rules</a>, <a href="https://publications.waset.org/abstracts/search?q=violation%20data%20discovery" title=" violation data discovery"> violation data discovery</a>, <a href="https://publications.waset.org/abstracts/search?q=data%20repair" title=" data repair"> data repair</a> </p> <a href="https://publications.waset.org/abstracts/31348/research-of-data-cleaning-methods-based-on-dependency-rules" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/31348.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">564</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">37499</span> Mask-Prompt-Rerank: An Unsupervised Method for Text Sentiment Transfer</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Yufen%20Qin">Yufen Qin</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Text sentiment transfer is an important branch of text style transfer. The goal is to generate text with another sentiment attribute based on a text with a specific sentiment attribute while maintaining the content and semantic information unrelated to sentiment unchanged in the process. There are currently two main challenges in this field: no parallel corpus and text attribute entanglement. In response to the above problems, this paper proposed a novel solution: Mask-Prompt-Rerank. Use the method of masking the sentiment words and then using prompt regeneration to transfer the sentence sentiment. Experiments on two sentiment benchmark datasets and one formality transfer benchmark dataset show that this approach makes the performance of small pre-trained language models comparable to that of the most advanced large models, while consuming two orders of magnitude less computing and memory. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=language%20model" title="language model">language model</a>, <a href="https://publications.waset.org/abstracts/search?q=natural%20language%20processing" title=" natural language processing"> natural language processing</a>, <a href="https://publications.waset.org/abstracts/search?q=prompt" title=" prompt"> prompt</a>, <a href="https://publications.waset.org/abstracts/search?q=text%20sentiment%20transfer" title=" text sentiment transfer"> text sentiment transfer</a> </p> <a href="https://publications.waset.org/abstracts/173904/mask-prompt-rerank-an-unsupervised-method-for-text-sentiment-transfer" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/173904.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">81</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">37498</span> The Role of Access Control Techniques in Creating a Safe Cyberspace for Children</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sara%20Muslat%20Alsahali">Sara Muslat Alsahali</a>, <a href="https://publications.waset.org/abstracts/search?q=Nout%20Mohammed%20Alqahtani"> Nout Mohammed Alqahtani</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Digital technology has changed the world, and with the increasing number of children accessing the Internet, it has now become an integral part of children's lives from their early years. With the rapid development of digital technology, the risks children face on the internet also evolve from cyberbullying to misuse, sexual exploitation, and abuse of their private information over the Internet. Digital technology, with its advantages and disadvantages, is now a fact of our life. Therefore, knowledge of how to reduce its risks and maximize its benefits will help shape the growth and future of a new generation of digital citizens. This paper will discuss access control techniques that help to create secure cyberspace where children can be safe without depriving them of their rights and freedom to use the internet and preventing them from its benefits. Also, it sheds light on its challenges and problems by classifying the methods of parental controlling into two possibilities asynchronous and synchronous techniques and choosing YouTube as a case study of access control techniques. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=access%20control" title="access control">access control</a>, <a href="https://publications.waset.org/abstracts/search?q=cyber%20security" title=" cyber security"> cyber security</a>, <a href="https://publications.waset.org/abstracts/search?q=kids" title=" kids"> kids</a>, <a href="https://publications.waset.org/abstracts/search?q=parental%20monitoring" title=" parental monitoring"> parental monitoring</a> </p> <a href="https://publications.waset.org/abstracts/125012/the-role-of-access-control-techniques-in-creating-a-safe-cyberspace-for-children" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/125012.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">137</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">37497</span> Attribute Index and Classification Method of Earthquake Damage Photographs of Engineering Structure</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ming%20Lu">Ming Lu</a>, <a href="https://publications.waset.org/abstracts/search?q=Xiaojun%20Li"> Xiaojun Li</a>, <a href="https://publications.waset.org/abstracts/search?q=Bodi%20Lu"> Bodi Lu</a>, <a href="https://publications.waset.org/abstracts/search?q=Juehui%20Xing"> Juehui Xing</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Earthquake damage phenomenon of each large earthquake gives comprehensive and profound real test to the dynamic performance and failure mechanism of different engineering structures. Cognitive engineering structure characteristics through seismic damage phenomenon are often far superior to expensive shaking table experiments. After the earthquake, people will record a variety of different types of engineering damage photos. However, a large number of earthquake damage photographs lack sufficient information and reduce their using value. To improve the research value and the use efficiency of engineering seismic damage photographs, this paper objects to explore and show seismic damage background information, which includes the earthquake magnitude, earthquake intensity, and the damaged structure characteristics. From the research requirement in earthquake engineering field, the authors use the 2008 China Wenchuan M8.0 earthquake photographs, and provide four kinds of attribute indexes and classification, which are seismic information, structure types, earthquake damage parts and disaster causation factors. The final object is to set up an engineering structural seismic damage database based on these four attribute indicators and classification, and eventually build a website providing seismic damage photographs. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=attribute%20index" title="attribute index">attribute index</a>, <a href="https://publications.waset.org/abstracts/search?q=classification%20method" title=" classification method"> classification method</a>, <a href="https://publications.waset.org/abstracts/search?q=earthquake%20damage%20picture" title=" earthquake damage picture"> earthquake damage picture</a>, <a href="https://publications.waset.org/abstracts/search?q=engineering%20structure" title=" engineering structure"> engineering structure</a> </p> <a href="https://publications.waset.org/abstracts/66126/attribute-index-and-classification-method-of-earthquake-damage-photographs-of-engineering-structure" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/66126.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">765</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">37496</span> Emotion Mining and Attribute Selection for Actionable Recommendations to Improve Customer Satisfaction</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Jaishree%20Ranganathan">Jaishree Ranganathan</a>, <a href="https://publications.waset.org/abstracts/search?q=Poonam%20Rajurkar"> Poonam Rajurkar</a>, <a href="https://publications.waset.org/abstracts/search?q=Angelina%20A.%20Tzacheva"> Angelina A. Tzacheva</a>, <a href="https://publications.waset.org/abstracts/search?q=Zbigniew%20W.%20Ras"> Zbigniew W. Ras</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In today’s world, business often depends on the customer feedback and reviews. Sentiment analysis helps identify and extract information about the sentiment or emotion of the of the topic or document. Attribute selection is a challenging problem, especially with large datasets in actionable pattern mining algorithms. Action Rule Mining is one of the methods to discover actionable patterns from data. Action Rules are rules that help describe specific actions to be made in the form of conditions that help achieve the desired outcome. The rules help to change from any undesirable or negative state to a more desirable or positive state. In this paper, we present a Lexicon based weighted scheme approach to identify emotions from customer feedback data in the area of manufacturing business. Also, we use Rough sets and explore the attribute selection method for large scale datasets. Then we apply Actionable pattern mining to extract possible emotion change recommendations. This kind of recommendations help business analyst to improve their customer service which leads to customer satisfaction and increase sales revenue. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=actionable%20pattern%20discovery" title="actionable pattern discovery">actionable pattern discovery</a>, <a href="https://publications.waset.org/abstracts/search?q=attribute%20selection" title=" attribute selection"> attribute selection</a>, <a href="https://publications.waset.org/abstracts/search?q=business%20data" title=" business data"> business data</a>, <a href="https://publications.waset.org/abstracts/search?q=data%20mining" title=" data mining"> data mining</a>, <a href="https://publications.waset.org/abstracts/search?q=emotion" title=" emotion"> emotion</a> </p> <a href="https://publications.waset.org/abstracts/126886/emotion-mining-and-attribute-selection-for-actionable-recommendations-to-improve-customer-satisfaction" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/126886.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">199</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">37495</span> Oman’s Position in U.S. Tourists’ Mind: The Use of Importance-Performance Analysis on Destination Attributes</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mohammed%20Gamil%20Montasser">Mohammed Gamil Montasser</a>, <a href="https://publications.waset.org/abstracts/search?q=Angelo%20Battaglia"> Angelo Battaglia</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Tourism is making its presence felt across the Sultanate of Oman. The story is one of the most recognized phenomena as a sustainable solid growth and is considered a remarkable outcome for any destination. The competitive situation and challenges within the tourism industry worldwide entail a better understanding of the destination position and its image to achieve Oman&rsquo;s aspiration to retain its international reputation as one of the most desirable destinations in the Middle East. To access general perceptions of Oman&rsquo;s attributes, their importance and their influences among U.S. tourists, an online survey was conducted with 522 American travelers who have traveled internationally, including non-visitors, virtual-visitors and visitors to Oman. This research involved a total of 36 attributes in the survey. Participants were asked to rate their agreement on how each attribute represented Oman and how important each attribute was for selecting destinations on 5- point Likert Scale. They also indicated if each attribute has a positive, neutral or negative influence on their destination selection. Descriptive statistics and importance performance analysis (IPA) were conducted. IPA illustrated U.S. tourists&rsquo; perceptions of Oman&rsquo;s destination attributes and their importance in destination selection on a matrix with four quadrants, divided by actual mean value in each grid for importance (M=3.51) and performance (M=3.57). Oman tourism organizations and destination managers may use these research findings for future marketing and management efforts toward the U.S. travel market. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=analysis%20of%20importance" title="analysis of importance">analysis of importance</a>, <a href="https://publications.waset.org/abstracts/search?q=performance" title=" performance"> performance</a>, <a href="https://publications.waset.org/abstracts/search?q=destination%20attributes" title=" destination attributes"> destination attributes</a>, <a href="https://publications.waset.org/abstracts/search?q=Oman%27s%20position" title=" Oman&#039;s position"> Oman&#039;s position</a>, <a href="https://publications.waset.org/abstracts/search?q=U.S.%20tourists" title=" U.S. tourists"> U.S. tourists</a> </p> <a href="https://publications.waset.org/abstracts/49595/omans-position-in-us-tourists-mind-the-use-of-importance-performance-analysis-on-destination-attributes" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/49595.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">306</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">37494</span> Research on Urban Point of Interest Generalization Method Based on Mapping Presentation</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Chengming%20Li">Chengming Li</a>, <a href="https://publications.waset.org/abstracts/search?q=Yong%20Yin"> Yong Yin</a>, <a href="https://publications.waset.org/abstracts/search?q=Peipei%20Guo"> Peipei Guo</a>, <a href="https://publications.waset.org/abstracts/search?q=Xiaoli%20Liu"> Xiaoli Liu</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Without taking account of the attribute richness of POI (point of interest) data and spatial distribution limited by roads, a POI generalization method considering both attribute information and spatial distribution has been proposed against the existing point generalization algorithm merely focusing on overall information of point groups. Hierarchical characteristic of urban POI information expression has been firstly analyzed to point out the measurement feature of the corresponding hierarchy. On this basis, an urban POI generalizing strategy has been put forward: POIs urban road network have been divided into three distribution pattern; corresponding generalization methods have been proposed according to the characteristic of POI data in different distribution patterns. Experimental results showed that the method taking into account both attribute information and spatial distribution characteristics of POI can better implement urban POI generalization in the mapping presentation. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=POI" title="POI">POI</a>, <a href="https://publications.waset.org/abstracts/search?q=road%20network" title=" road network"> road network</a>, <a href="https://publications.waset.org/abstracts/search?q=selection%20method" title=" selection method"> selection method</a>, <a href="https://publications.waset.org/abstracts/search?q=spatial%20information%20expression" title=" spatial information expression"> spatial information expression</a>, <a href="https://publications.waset.org/abstracts/search?q=distribution%20pattern" title=" distribution pattern"> distribution pattern</a> </p> <a href="https://publications.waset.org/abstracts/70683/research-on-urban-point-of-interest-generalization-method-based-on-mapping-presentation" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/70683.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">410</span> </span> </div> </div> <ul class="pagination"> <li class="page-item disabled"><span class="page-link">&lsaquo;</span></li> <li class="page-item active"><span class="page-link">1</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=attribute%20based%20access%20control&amp;page=2">2</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=attribute%20based%20access%20control&amp;page=3">3</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=attribute%20based%20access%20control&amp;page=4">4</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=attribute%20based%20access%20control&amp;page=5">5</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=attribute%20based%20access%20control&amp;page=6">6</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=attribute%20based%20access%20control&amp;page=7">7</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=attribute%20based%20access%20control&amp;page=8">8</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=attribute%20based%20access%20control&amp;page=9">9</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=attribute%20based%20access%20control&amp;page=10">10</a></li> <li class="page-item disabled"><span class="page-link">...</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=attribute%20based%20access%20control&amp;page=1250">1250</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=attribute%20based%20access%20control&amp;page=1251">1251</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=attribute%20based%20access%20control&amp;page=2" rel="next">&rsaquo;</a></li> </ul> </div> </main> <footer> <div id="infolinks" class="pt-3 pb-2"> <div class="container"> <div style="background-color:#f5f5f5;" class="p-3"> <div class="row"> <div class="col-md-2"> <ul class="list-unstyled"> About <li><a href="https://waset.org/page/support">About Us</a></li> <li><a href="https://waset.org/page/support#legal-information">Legal</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/WASET-16th-foundational-anniversary.pdf">WASET celebrates its 16th foundational anniversary</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Account <li><a href="https://waset.org/profile">My Account</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Explore <li><a href="https://waset.org/disciplines">Disciplines</a></li> <li><a href="https://waset.org/conferences">Conferences</a></li> <li><a href="https://waset.org/conference-programs">Conference Program</a></li> <li><a href="https://waset.org/committees">Committees</a></li> <li><a href="https://publications.waset.org">Publications</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Research <li><a href="https://publications.waset.org/abstracts">Abstracts</a></li> <li><a href="https://publications.waset.org">Periodicals</a></li> <li><a href="https://publications.waset.org/archive">Archive</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Open Science <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Philosophy.pdf">Open Science Philosophy</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Award.pdf">Open Science Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Society-Open-Science-and-Open-Innovation.pdf">Open Innovation</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Postdoctoral-Fellowship-Award.pdf">Postdoctoral Fellowship Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Scholarly-Research-Review.pdf">Scholarly Research Review</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Support <li><a href="https://waset.org/page/support">Support</a></li> <li><a href="https://waset.org/profile/messages/create">Contact Us</a></li> <li><a href="https://waset.org/profile/messages/create">Report Abuse</a></li> </ul> </div> </div> </div> </div> </div> <div class="container text-center"> <hr style="margin-top:0;margin-bottom:.3rem;"> <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank" class="text-muted small">Creative Commons Attribution 4.0 International License</a> <div id="copy" class="mt-2">&copy; 2024 World Academy of Science, Engineering and Technology</div> </div> </footer> <a href="javascript:" id="return-to-top"><i class="fas fa-arrow-up"></i></a> <div class="modal" id="modal-template"> <div class="modal-dialog"> <div class="modal-content"> <div class="row m-0 mt-1"> <div class="col-md-12"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">&times;</span></button> </div> </div> <div class="modal-body"></div> </div> </div> </div> <script src="https://cdn.waset.org/static/plugins/jquery-3.3.1.min.js"></script> <script src="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/js/bootstrap.bundle.min.js"></script> <script src="https://cdn.waset.org/static/js/site.js?v=150220211556"></script> <script> jQuery(document).ready(function() { /*jQuery.get("https://publications.waset.org/xhr/user-menu", function (response) { jQuery('#mainNavMenu').append(response); });*/ jQuery.get({ url: "https://publications.waset.org/xhr/user-menu", cache: false }).then(function(response){ jQuery('#mainNavMenu').append(response); }); }); </script> </body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10