The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In the world of education, the success of knowledge sharing will help students in realizing and developing their potential. Sharing knowledge is the most important and influential process in knowledge management. The importance of knowledge management can produce value that can be used to make decisions or take action. This study aims to analyze individual and technological factors on knowledge sharing...
Machine learning has its tentacles spread over all major areas of science. The current rise in the amount of data being generated as necessitated its adoption in virtually all aspects including chemoinformatics. Several machine learning methods have been applied to the drug discovery process due to the importance of prediction of bioactivity before the release of drug into the market. The need for...
Online opinions play an important role in supporting consumers make decisions about purchasing products or services. In addition, customer reviews allow companies to understand the strengths and limitations of their products and services, which aids in improving their marketing campaigns. Such valuable information can only be obtained via appropriate analysis of the opinions provided by customers...
Twitter is a popular microblogging service that allows its users to view and share limited character messages (known as “tweets”) with the public. This paper proposes a tweet sentiment classification framework which pre-processes information from Emoticon and Emoji in such way that their textual representation is included to enrich the tweet. Once the tweets are pre-processed, a hybrid computational...
Cuckoo Search is a recent nature-inspired metaheuristic algorithm, inspired by the cuckoo birds' aggressive strategy to breeding. The Cuckoo Search algorithm iteratively uses a Lévy flight random walk to explore a search space. The Lévy flight mechanism takes sudden turns of 90 degrees and consequently the Cuckoo's Search strategy does not carefully search around the cuckoos' nest, and hence it suffers...
The growth of social media has been exponential in the recent years. Immense amount of data is being put out onto the public domain through social media. This huge publicly available data can be used for research and a variety of applications. The objective of this paper is to counter problems with the social media dataset, namely : short text nature - the limited quantity of text data (140 to 160...
Presents the introductory welcome message from the conference proceedings. May include the conference officers' congratulations to all involved with the conference event and publication of the proceedings record.
Increasing attention is being paid to the open learning environments (i.e., Massive Open Online Courses MOOCs) which offer so many courses in different domains by a number of the top universities around the world. Furthermore, users with different background and experience are able to browse and follow different online courses. However, richness of such courses could be also a weakness point. For...
In this paper, we obtain approximate solutions of a variable-volatility option pricing model (VVOPM) built upon the classical Black-Scholes option pricing model via the inclusion of variable volatility function. Projected Differential Transform Method (PDTM) is proposed as a method of solution. For effectiveness and robustness of the proposed method, an illustrative case is considered based on some...
In order to solve the problem of lacking shear wave velocity information in oil and gas field, based on conventional logging data, a support vector machine(SVM) model is used to map the relationship between shear wave velocity and natural gamma, acoustic time difference and resistivity of shale, and then a machine learning method for shear wave velocity prediction is proposed. The model was trained...
This paper presents a Six Sigma approach for reducing the interruption in power distribution. The objective is to improve the overall service, reduce operating costs, and to increase customer satisfaction. A case study of current interruption in power distribution at a local utility company is used to illustrate the Six Sigma application. The company has been experiencing unexpected increase in power...
Since the rise of low-cost airline, air transportation has become one of the most popular trends in travelling over the world. This factor makes the competition in airline industry very intense. From airline market report, it showed that the revenue growth rate in the airline industry has been increasing over 30% in the last few years. For this reason, many airline brands seek for good strategies...
This Soundtracks are information rich; knowledge can be extracted and discovered from them. Audio signals may be broadly divided into three classes: speech, music and events. Dedicated recognition algorithms are typically used to extract semantic data for further knowledge discovery. A preprocessor to classify and segment audio into these three classes is essential. Current practice often neglects...
One can only control what he can measure. Measuring ontologies in general and inter-organizational ontologies in special is necessary to evaluate ontologies during cooperative development and evolution processes. A software metric is a standard of measuring the degree to which a software system and process possess some property. Metrics help to estimate the progress, quality, and health of a software...
It is a well-known fact that nowadays access to sensitive information is being performed through the use of a three-tier-architecture. Web applications have become a handy interface between users and data. As database-driven web applications are being used more and more every day, web applications are being seen as a good target for attackers with the aim of accessing sensitive data. If an organization...
The flourishing of social networking applications (SNA) in recent years has revolutionized the way we live. On the other hand, SNA are also used for malicious activities. Identifying the physical person behind a SNA account is a challenge task in investigations of SNA-involved criminal cases. As one way to address this challenge, automatic user attribute inference, which is also referred to as user...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.