Copyright 2003 AACS Idaho State University E. S. Lohse, PhD lohserne@isu.edu C. Schou, PhD...

Post on 28-Mar-2015

213 views 0 download

Tags:

Transcript of Copyright 2003 AACS Idaho State University E. S. Lohse, PhD lohserne@isu.edu C. Schou, PhD...

Copyright 2003

AACS

Idaho State University

E. S. Lohse, PhD lohserne@isu.eduC. Schou, PhD schou@mentor.netD. Sammons, EdD sammdott@isu.eduR. Schlader, MS schlrobe@isu.edu

Copyright 2003

Why Do It?

Idaho State University

• Extant typologies are implicit and subjective• Some have statistical

bases and are replicable but cumbersome

• Experts not available in day to day contexts

• AI Neural Networks accurately represents expertise with statistical rigor and highlight necessity for rethinking

AACS

Types Defined LANCEOLATE

AACS

Types Defined Triangular Forms

Copyright 2003

Current Activity

Feeding SIGGI

• Feeding SIGGI authentic data

• Training SIGGI to make intelligent decisions

• Seeking more recent data to go beyond typology

• Evaluating quality of SIGGI’s thinking and learning

AACS

Neural Network

Nucleus

W

W

W

W

W

Output

INPUTS

AACS

Comparison Of Activation Functions

AACS

Inputs Modified By Weights

Inputs

Hidden Layer

Outputs3

1 20.3

-0.8

0.2 0.8

0.1

-0.1

0.4 0.9

AACS

Training A Neural Network

Supervised Unsupervised

We use backpropagation

AACS

Backpropagation

3

1 20.3

-0.8

0.2 0.8

0.1

-0.1

0.4 0.9

AACS

AACS

Types Defined Concepts -Triangular Relations

AACS

Generating Input For The SIGGI

Copyright 2003

SIGGI Demo

Movie

AACS

AACS

Definition Problems

Rabbit Island Stemmed Mahkin Shouldered Lanceoalate

Copyright 2003

Uses

Increases Research Cooperation

Overcomes Islands

Government Use

Research Use

Native American Use

Public Education

AACS

Research Databases Are Insular

Using this this technique– Each researcher has his

own island of information

– Building a unified database builds bridges

– Each island retains identity

May have own bridge

AACS

User 1 -- Government Managers

Point identification Site information Chronologies Information

management

AACS

User 2 -- Researchers

Point Identification Site Characteristics Anthropological

Questions

AACS

User 3 -- Native American Users

Point identification Cultural affinity Heritage information

AACS

User 4 -- Public Education

Point identification Chronology Culture history Cool pictures!

AACS

The Future

Attach a database to the interface to capture the outputs.

Modify the interface to allow for multiple artifact types and classification systems.

Design a web interface to allow secure sharing via internet access.– Three levels of availability research, private

and public.

Copyright 2003

Information Assurance

Keeping Private Thing Private

Building the Database

Information Assurance

Access Control

Discretionary

Mandatory

AACS

Building The Database

Region

Shape

Size

Outline

Type

Time Unit

Culture Phase

Provenience

Artifact

Site

Repository

Publications

Repository

DATABASE

AACS

Database System Requirements

Store image Store location Store characteristics … Keep private things

private

AACS

Private Information

The location for Wasden is– County Bonneville

– Township T03N

– Range R35E

– Section S07

– Q1 SE

– Q2 NW

Even more private– Easting 62965.55

– Northing 27700.78 Or

– Lat

– Long

AACS

Information Assurance

Confidentiality Integrity

Availability

AACS

Identification And Authentication

Controls access to the system using a two step process

Identification– Telling the system who you are

Authentication– Proving to the system that you are who you say you are

Three classic ways of establishing proof– Something you know– Something you have– Something you are

AACS

Discretionary Access Control

Capability lists– General schema

• Every object has a unique owner

• Owner possesses major access rights

• Owner may declare who has access

• Owner may revoke access

• One capability list per user

• Names all objects user is allowed access to

• Lists maintained by OS

• Users cannot access lists directly

AACS

Mandatory Access Control

In addition the system will use mandatory access control

Implements both integrity and confidentiality– Makes sure that the data can be

• Modified only by authorized individuals

• Accessed only by authorized individuals

Compartments

AACS

Examples

Levels = Research, Private, Public Compartments = University, Company,

Government, NA, EDU … Users

– Alice is logged in at a session level of “Private-Company, NA"

– Tim is logged in at a session level of “Public-University, NA, EDU"

– Anne is logged in at a session level of “Research-EDU, NA"

Copyright 2003

AACS

E. S. Lohse, PhD lohserne@isu.edu

C. Schou, PhD schou@mentor.net

D. Sammons, EdD sammdott@isu.edu

R. Schlader, MS schlrobe@isu.edu