Essays about: "Classification Scheme"

Showing result 1 - 5 of 62 essays containing the words Classification Scheme.

  1. 1. Erratic Patterns : Unravelling the Cultural Transfers of Library Classifiers

    University essay from Uppsala universitet/Institutionen för ABM

    Author : Keeley Lindkvist; [2023]
    Keywords : Library classifier; library classification; classification; cultural transfer; classification and culture; Library of Congress Classifi-cation Scheme LCC ; knowledge organisation; knowledge organization; The Swedish Institute in Rome ISVRoma ; Biblioteksklassificerare; biblioteksklassificering; kulturell överföring; klassificering och kultur; Library of Congress klassificeringsschema LCC ; kunskapsorganisation; Svenska institutet i Rom ISVRoma ;

    Abstract : This thesis investigates the oft-overlooked influence of the classifier's input during the assignment of library classifications and draws upon cultural transfer theory to shed light on the underlying principles that guide the process. Classifiers' personal knowledge, experience, and beliefs, have a critical role in determining the 'aboutness' of a work and its subsequent classification. READ MORE

  2. 2. Preserving Privacy in Cloud Services by Using an Explainable Deep-Learning Model for Anomaly Detection

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Shiwei Dong; [2023]
    Keywords : ;

    Abstract : As cloud services become increasingly popular, ensuring their privacy and security has become a significant concern for users. Cloud computing involves Data Service Outsourcing and Computation Outsourcing, which require additional security considerations compared to traditional computing. READ MORE

  3. 3. Privacy Preserving Biometric Multi-factor Authentication

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Emil Gedenryd; [2023]
    Keywords : Fully Homomorphic Encryption; Machine Learning; Biometric Authentication; Technology and Engineering;

    Abstract : This thesis investigates the viability of using Fully Homomorphic Encryption and Machine Learning to construct a privacy-preserving biometric multi-factor authentication system. The system is based on the architecture described as ”Model K - Store distributed, compare distributed” in ISO/IEC 24745:2022 and uses the Torus Fully Homomorphic Encryption scheme proposed by Chillotti et al. READ MORE

  4. 4. Evaluation of the Proof-of-Location Scheme Vouch : in a Real-World Environment

    University essay from Linköpings universitet/Programvara och system

    Author : Felix Säfström; [2022]
    Keywords : vouch; proof-of-location; VANET; staleness; 5G; mobility-aware classification; detection accuracy;

    Abstract : This work first implements a prototype of the proof-of-location scheme Vouch in order for an evaluation to be conducted in a real-world environment. With simulations of the scheme showing promising results, the next step would be an evaluation of the schemes performance in the real-world. READ MORE

  5. 5. Investigating Tweet Propagation via Dynamical Models and Influencer Analysis

    University essay from Linköpings universitet/Reglerteknik

    Author : Joel Nilsson; [2022]
    Keywords : Social Media Analysis; Dynamical Models; Data Mining;

    Abstract : Social media consume an increasing portion of people’s daily lives and are important platforms in the realms of politics and marketing for reaching out to voters and consumers. Describing and predicting the behaviour of users on social media is thus of interest for companies and politicians, as well as researchers studying information diffusion and human behaviour. READ MORE