Presentation is loading. Please wait.

Presentation is loading. Please wait.

Copyright 2003 AACS Idaho State University E. S. Lohse, PhD C. Schou, PhD D. Sammons, EdD R. Schlader,

Similar presentations

Presentation on theme: "Copyright 2003 AACS Idaho State University E. S. Lohse, PhD C. Schou, PhD D. Sammons, EdD R. Schlader,"— Presentation transcript:

1 Copyright 2003 AACS Idaho State University E. S. Lohse, PhD C. Schou, PhD D. Sammons, EdD R. Schlader, MS

2 Copyright 2003 Why Do It? Idaho State University Extant typologies are implicit and subjective Some have statistical bases and are replicable but cumbersome Experts not available in day to day contexts AI Neural Networks accurately represents expertise with statistical rigor and highlight necessity for rethinking


4 AACS Types Defined Triangular Forms

5 Copyright 2003 Current Activity Feeding SIGGI Feeding SIGGI authentic data Training SIGGI to make intelligent decisions Seeking more recent data to go beyond typology Evaluating quality of SIGGIs thinking and learning

6 AACS Neural Network Nucleus W W W W W Output INPUTSINPUTS

7 AACS Comparison Of Activation Functions

8 AACS Inputs Modified By Weights t Inputs t Hidden Layer t Outputs 3 12 0.3 -0.8 0.20.8 0.1 -0.1 0.4 0.9

9 AACS Training A Neural Network t Supervised t Unsupervised We use backpropagation

10 AACS Backpropagation 3 12 0.3 -0.8 0.20.8 0.1 -0.1 0.4 0.9


12 Types Defined Concepts - Triangular Relations

13 AACS Generating Input For The SIGGI

14 Copyright 2003 SIGGI Demo Movie


16 Definition Problems Rabbit Island StemmedMahkin Shouldered Lanceoalate

17 Copyright 2003 Uses Increases Research Cooperation Overcomes Islands Government Use Research Use Native American Use Public Education

18 AACS Research Databases Are Insular t Using this this technique –Each researcher has his own island of information –Building a unified database builds bridges –Each island retains identity t May have own bridge

19 AACS User 1 -- Government Managers t Point identification t Site information t Chronologies t Information management

20 AACS User 2 -- Researchers t Point Identification t Site Characteristics t Anthropological Questions

21 AACS User 3 -- Native American Users t Point identification t Cultural affinity t Heritage information

22 AACS User 4 -- Public Education t Point identification t Chronology t Culture history t Cool pictures!

23 AACS The Future t Attach a database to the interface to capture the outputs. t Modify the interface to allow for multiple artifact types and classification systems. t Design a web interface to allow secure sharing via internet access. –Three levels of availability research, private and public.

24 Copyright 2003 Information Assurance Keeping Private Thing Private Building the Database Information Assurance Access Control Discretionary Mandatory

25 AACS Building The Database Region Shape Size Outline Type Time Unit Culture Phase Provenience Artifact Site Repository Publications Repository DATABASEDATABASE

26 AACS Database System Requirements t Store image t Store location t Store characteristics t … t Keep private things private

27 AACS Private Information t The location for Wasden is –County Bonneville –Township T03N –Range R35E –Section S07 –Q1 SE –Q2 NW t Even more private –Easting 62965.55 –Northing 27700.78 t Or –Lat –Long

28 AACS Information Assurance Confidentiality Integrity Availability

29 AACS Identification And Authentication t Controls access to the system using a two step process t Identification –Telling the system who you are t Authentication –Proving to the system that you are who you say you are t Three classic ways of establishing proof –Something you know –Something you have –Something you are

30 AACS Discretionary Access Control t Capability lists –General schema Every object has a unique owner Owner possesses major access rights Owner may declare who has access Owner may revoke access One capability list per user Names all objects user is allowed access to Lists maintained by OS Users cannot access lists directly

31 AACS Mandatory Access Control t In addition the system will use mandatory access control t Implements both integrity and confidentiality –Makes sure that the data can be Modified only by authorized individuals Accessed only by authorized individuals t Compartments

32 AACS Examples t Levels = Research, Private, Public t Compartments = University, Company, Government, NA, EDU … t Users –Alice is logged in at a session level of Private- Company, NA" –Tim is logged in at a session level of Public- University, NA, EDU" –Anne is logged in at a session level of Research-EDU, NA"

33 Copyright 2003 AACS E. S. Lohse, PhD C. Schou, PhD D. Sammons, EdD R. Schlader, MS

Download ppt "Copyright 2003 AACS Idaho State University E. S. Lohse, PhD C. Schou, PhD D. Sammons, EdD R. Schlader,"

Similar presentations

Ads by Google