Search
Now showing items 311-320 of 3042
A Mood Analysis on Youtube Comments and a Method for Improved Social Spam Detection
(Springer, 2018)
In the same manner that Online Social Networks (OSN) usage increases, non-legitimate campaigns over these types of web services are growing. This is the reason why signi cant number of users are affected by social spam ...
Short Messages Spam Filtering Using Sentiment Analysis
(Springer International Publishing, 2016)
In the same way that short instant messages are more and more used, spam and non-legitimate campaigns through this type of communication systems are growing up. Those campaigns, besides being an illegal online activity, ...
On the Feasibility of Distinguishing Between Process Disturbances and Intrusions in Process Control Systems using Multivariate Statistical Process Control
(IEEE, 2016)
Process Control Systems (PCSs) are the operat-ing core of Critical Infrastructures (CIs). As such, anomalydetection has been an active research field to ensure CInormal operation. Previous ...
The use of 3D surface topography analysis techniques to analyse and predict the alteration of endosseous titanium dental implants generated during the surgical insertion
(Mondragon Unibertsitatea. Goi Eskola Politeknikoa, 2015)
Dental implants have emerged as the preferred choice for tooth replacement, reaching about one million implantations per year. Among factors affecting dental implant success, surface topography has been recognised as an ...
The MANTIS Reference Architecture
(River Publishers, 2018)
Business model innovation through industry 4.0: a review
(Elsevier B.V., 2018)
The following article presents a brief literature review conducted to extend our knowledge about how Industry 4.0 affects business models and to identify business model innovations derived in consequence. Based on the ...
Null is Not Always Empty: Monitoring the Null Space for Field-Level Anomaly Detection in Industrial IoT Environments
(IEEE, 2018)
Industrial environments have vastly changed sincethe conception of initial primitive and isolated networks. Thecurrent full interconnection paradigm, where connectivity be-tween different devices and the Internet has become ...
Analysis of One-Way and Two-Way FSI Approaches to Characterise the Flow Regime and the Mechanical Behaviour during Closing Manoeuvring Operation of a Butterfly Valve
(World Academy of Science, Engineering and Technology, 2018)
Butterfly valves are widely used industrial piping components as on-off and flow controlling devices. The main challenge in the design process of this type of valves is the correct dimensioning to ensure ...
Implementation of a Reference Architecture for Cyber Physical Systems to support Condition Based Maintenance
(2018)
This paper presents the implementation of a refer-ence architecture for Cyber Physical Systems (CPS) to supportCondition Based Maintenance (CBM) of industrial assets. The article focuses on describing how the MANTIS ...