Analysis of textual content as a mechanism for ensuring safety of the socio-cyberphysical system

Author(s):  
Anastasia Iskhakova ◽  
Roman Meshcheryakov ◽  
Andrey Iskhakov ◽  
Irina Kulagina
Author(s):  
M. Chaitanya ◽  
K. Durga Charan

Load balancing makes cloud computing greater knowledgeable and could increase client pleasure. At reward cloud computing is among the all most systems which offer garage of expertise in very lowers charge and available all the time over the net. However, it has extra vital hassle like security, load administration and fault tolerance. Load balancing inside the cloud computing surroundings has a large impact at the presentation. The set of regulations relates the sport idea to the load balancing manner to amplify the abilties in the public cloud environment. This textual content pronounces an extended load balance mannequin for the majority cloud concentrated on the cloud segregating proposal with a swap mechanism to select specific strategies for great occasions.


2013 ◽  
Vol 1 (1) ◽  
pp. 158-178
Author(s):  
Urcun John Tanik

Cyberphysical system design automation utilizing knowledge based engineering techniques with globally networked knowledge bases can tremendously improve the design process for emerging systems. Our goal is to develop a comprehensive architectural framework to improve the design process for cyberphysical systems (CPS) and implement a case study with Axiomatic Design Solutions Inc. to develop next generation toolsets utilizing knowledge-based engineering (KBE) systems adapted to multiple domains in the field of CPS design automation. The Cyberphysical System Design Automation Framework (CPSDAF) will be based on advances in CPS design theory based on current research and knowledge collected from global sources automatically via Semantic Web Services. A case study utilizing STEM students is discussed.


2020 ◽  
Author(s):  
Stuart Yeates

A brief introduction to acronyms is given and motivation for extracting them in a digital library environment is discussed. A technique for extracting acronyms is given with an analysis of the results. The technique is found to have a low number of false negatives and a high number of false positives. Introduction Digital library research seeks to build tools to enable access of content, while making as few as possible assumptions about the content, since assumptions limit the range of applicability of the tools. Generally, the broader the assumptions the more widely applicable the tools. For example, keyword based indexing [5] is based on communications theory and applies to all natural human textual languages (allowances for differences in character sets and similar localisation issues not withstanding) . The algorithm described in this paper makes much stronger assumptions about the content. It assumes textual content that contains acronyms, an assumption which is known to hold for...


The neural network models series used in the development of an aggregated digital twin of equipment as a cyber-physical system are presented. The twins of machining accuracy, chip formation and tool wear are examined in detail. On their basis, systems for stabilization of the chip formation process during cutting and diagnose of the cutting too wear are developed. Keywords cyberphysical system; neural network model of equipment; big data, digital twin of the chip formation; digital twin of the tool wear; digital twin of nanostructured coating choice


Author(s):  
Dong Wang ◽  
Raula Gaikovina Kula ◽  
Takashi Ishio ◽  
Kenichi Matsumoto

1978 ◽  
Vol 21 (4) ◽  
pp. 949-959
Author(s):  
J. Enoch Powell
Keyword(s):  

The letter dated 28 April 1882 which Parnell wrote in Kilmainham jail to Captain O'Shea has become indelibly known to history as the Kilmainham Treaty, with or without benefit of quotation marks or capital letters; and though probably few historians would today maintain that anything properly describable as a treaty was intended, let alone concluded, between Parnell and Gladstone, the influence of the name and myth persists. For example, the most recent and excellent biography of Parnell by Professor F. S. L. Lyons, while repudiating the existence of a bargain, nevertheless refers to ‘the Kilmainham settlement’ and even states that Parnell ‘negotiated the Kilmainham “treaty” that brought the ordeal [of the detainees] to an end’. A re-examination, however, of the original document, its textual content and its detailed circumstances casts a new and sinister light upon the letter, revealing Parnell as the victim of a series of malpractices by O'Shea, to which Joseph Chamberlain was at least partly privy.


2021 ◽  
pp. 002224372110444
Author(s):  
Zijun (June) Shi ◽  
Xiao Liu ◽  
Kannan Srinivasan

Consumers' choices about health products are heavily influenced by public information, such as news articles, research articles, online customer reviews, online product discussion, and TV shows. Dr. Oz, a celebrity doctor, often makes medical recommendations with limited or marginal scientific evidence. Although reputable news agencies have traditionally acted as gatekeepers of reliable information, they face the intense pressure of “the eyeball game.” Customer reviews, despite their authenticity, may come from deceived consumers. Therefore, it remains unclear whether public information sources can correct the misleading health information. In the context of over-the-counter weight loss products, the authors carefully analyze the cascading of information post endorsement. The analysis of extensive textual content with deep-learning methods reveals that legitimate news outlets respond to Dr. Oz's endorsement by generating more news articles about the ingredient; on average, articles after the endorsement contain a higher sentiment, so news agencies seem to amplify rather than rectify the misleading endorsement. The finding highlights a serious concern: the risk of hype news diffusion. Research articles react too slowly to mitigate the problem, and online customer reviews and product discussions provide only marginal corrections. The findings underscore the importance of oversight to mitigate the risk of cascading hype news.


2020 ◽  
Vol 1 (4) ◽  
pp. 419-441
Author(s):  
Caio L.M. Jeronimo ◽  
Leandro B. Marinho ◽  
Cclaudio E.C. Carmpelo ◽  
Adriano Veloso ◽  
Allan S. Da Costa Melo

While many works investigate spread patterns of fake news in social networks, we focus on the textual content. Instead of relying on syntactic representations of documents (aka Bag of Words) as many works do, we seek more robust representations that may better differentiate fake from legitimate news. We propose to consider the subjectivity of news under the assumption that the subjectivity levels of legitimate and fake news are significantly different. For computing the subjectivity level of news, we rely on a set subjectivity lexicons for both Brazilian Portuguese and English languages. We then build subjectivity feature vectors for each news article by calculating the Word Mover's Distance (WMD) between the news and these lexicons considering the embedding the news words lie in, in order to analyze and classify the documents. The results demonstrate that our method is robust, especially in scenarios where training and test domains are different.


Author(s):  
Aniruddha Sinha ◽  
Rikayan Chaki ◽  
Bikram De Kumar ◽  
Sanjoy Kumar Saha
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document