“Crowdsourced Misuse Detection in Dynamic Spectrum Sharing Wireless Networks”
نویسندگان
چکیده
Most studies on analyzing essay revisions focus on revision operation, or revision purpose, and very few of them focus on the improvement or quality of the revision. In this work, we focus on sentence-level revision quality, and develop a model to automatically predict revision improvement. We explore two datasets, one revised by non-expert writers and another revised by expert writers. We examine existing novel features to develop our classification model. Our study shows future direction for revision improvement prediction with promising results. “Written in the Rock: Engaging Student Organizations at Slippery Rock University” Amy Brunner, MLIS Advisor: Stacy Wood Abstract: During my final semester at Slippery Rock University, I combined my work in the university archives with my Public History class to attempt to engage student organizations and encourage them to donate inactive records to the archives. The poster describes my work to create, advertise, and give a presentation designed to increase student interest in the university archives. I became interested in the idea due to the lack of recent (within the past fifteen years) records in the archives from student organizations, especially from organizations that had been established in the past ten years and felt that an outreach presentation would be an unofficial “capstone” to my previous four semesters of work at the University Archives. I wanted to help students become excited about their archives and let them know how they could leave a lasting mark on the university through the archives. During my final semester at Slippery Rock University, I combined my work in the university archives with my Public History class to attempt to engage student organizations and encourage them to donate inactive records to the archives. The poster describes my work to create, advertise, and give a presentation designed to increase student interest in the university archives. I became interested in the idea due to the lack of recent (within the past fifteen years) records in the archives from student organizations, especially from organizations that had been established in the past ten years and felt that an outreach presentation would be an unofficial “capstone” to my previous four semesters of work at the University Archives. I wanted to help students become excited about their archives and let them know how they could leave a lasting mark on the university through the archives. “Word Prediction in Aphasia Patients’ Procedural Discourse” Karen Cox, PhD in Computer Science Advisor: Taieb Znati Abstract: Aphasia patients often experience difficulty in finding the right word. Can technology help predict the words that patients intend to say? As an initial step in a longer term project, we consider the problem of identifying the best approach to word prediction in patients' transcribed descriptions of how to perform a simple task. We describe our plans to implement a simple initial NGram model, and then augment this approach with greater domain-specific knowledge in future work. Aphasia patients often experience difficulty in finding the right word. Can technology help predict the words that patients intend to say? As an initial step in a longer term project, we consider the problem of identifying the best approach to word prediction in patients' transcribed descriptions of how to perform a simple task. We describe our plans to implement a simple initial NGram model, and then augment this approach with greater domain-specific knowledge in future work.
منابع مشابه
The Role of Regulatory in Price Control and Spectrum Allocation to Competing Wireless Access Networks
With the rapid growth of wireless access networks, various providers offer their services using different technologies such as Wi-Fi, Wimax, 3G, 4G and so on. These networks compete for the scarce wireless spectrum. The spectrum is considered to be a scarce resource moderated by the spectrum allocation regulatory (“regulatory” for short) which is the governance body aiming to maximize the socia...
متن کاملSecuring Cluster-heads in Wireless Sensor Networks by a Hybrid Intrusion Detection System Based on Data Mining
Cluster-based Wireless Sensor Network (CWSN) is a kind of WSNs that because of avoiding long distance communications, preserve the energy of nodes and so is attractive for related applications. The criticality of most applications of WSNs and also their unattended nature, makes sensor nodes often susceptible to many types of attacks. Based on this fact, it is clear that cluster heads (CHs) are ...
متن کاملSpectrum Sharing Security and Attacks in CRNs: a Review
Cognitive Radio plays a major part in communication technology by resolving the shortage of the spectrum through usage of dynamic spectrum access and artificial intelligence characteristics. The element of spectrum sharing in cognitive radio is a fundamental approach in utilising free channels. Cooperatively communicating cognitive radio devices use the common control channel of the cognitive r...
متن کاملSpectrum Sharing in Dynamic Spectrum Access Networks: WPE-II Written Report
A study by Federal Communication Commission shows that most of the spectrum in current wireless networks is unused most of the time, while some spectrum is heavily used. Recently dynamic spectrum access (DSA) has been proposed to solve this spectrum inefficiency problem, by allowing users to opportunistically access to unused spectrum. One important question in DSA is how to efficiently share s...
متن کاملAn Efficient Spectrum Sharing Method Based on Genetic Algorithm in Heterogeneous Wireless Network
With advances in wireless communication technologies, users can have rich contents not only via wired networks but also via wireless networks such as Cellular, WiFi, and WiMAX. On the other hand, however, lack of spectrum resources becomes an important problem for future wireless networks. To overcome this problem, dynamic spectrum access technology receives much attention. In this paper, we pr...
متن کاملIntrusion Detection in Wireless Sensor Networks using Genetic Algorithm
Wireless sensor networks, due to the characteristics of sensors such as wireless communication channels, the lack of infrastructure and targeted threats, are very vulnerable to the various attacks. Routing attacks on the networks, where a malicious node from sending data to the base station is perceived. In this article, a method that can be used to transfer the data securely to prevent attacks...
متن کامل