The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Diversification of results in web search engines is a very attractive area for researchers now a days. Information retrieval techniques mainly focus on the relevance of the documents retrieved but these techniques often fail to satisfy each user. In this work, we present a coverage based diversification using post retrieval clustering. We model clusters corresponding to the query based on the features...
There is continues capture of large streaming data vital for application such as intensive health care system, Sensor networks, Object tracking etc.,. Data reduction of these huge data stream is carried out by similarity join processing which tracks the abnormal contents in real time data. The identification of anomalies such as abnormalities in Electro Cardio Gram (ECG) of an heart patient, predicting...
Words, sentences, paragraphs and documents is an important component in the data mining application area such as information retrieval, text summarization etc. And finding the similarity value between these components is an important action. Nowaday, there are various matching techniques are present which are very helpful for finding the similarity between the ontology. In this survey paper discusses...
A recommendation system's ability to instill trust in its users and convince them about the recommendations provided is found to be effective using suitable explanations. Although the majority of existing research focus on the algorithm used to provide an explanation, our algorithm focuses on the presentation of explanation interface for making the user understand the recommendations and its explanation...
One of the Association rule mining (ARM) algorithm, Apriori, is most popular algorithm. Pruning approach used in this algorithm differentiates between potential frequent and infrequent itemset well before verifying them in the given database. An alternate approach known as filtration does the same. In this paper, five experiments are carried out to prove that filtration approach works as efficient...
Traditional k-means algorithm has been used successfully to various problems but its application is restricted to small datasets. Online websites like twitter have large amount of data that has to be handled properly. So, there is a need of a platform that can perform faster data clustering which leds to the development of Mahout/Hadoop. Mahout is machine learning library approach to parallel clustering...
Exploring and identifying novel aging genes has been the current area of interest in Gerontology. A variety of techniques have been proposed to identify the genes that affect the centenarians and the focus is on the study of genes of interest affecting older population. However the study of aging related pathways using computational methods has not been discussed explicitly so far. In this paper,...
Refactoring leads to more maintainable software. To refactor the code, it must be known which part of code needs to be refactored. For this purpose code smells are used. Detecting code smells in itself is a challenging task. In this paper we propose a technique based on dynamic analysis for the detection of Feature Envy code smell. Feature envy is a method level smell and occurs when a method is more...
A bug in a software application may be a requirement bug, development bug, testing bug or security bug, etc. To prediet the bug numbers accurately is a challenging task. Advance knowledge about bug numbers will help the software managers to take decision on resource allocation and effort investments. The developers will be aware of the number of bugs in advance and can take effective steps to reduce...
This paper describes the development of parser algorithm which is used for Hindi-English machine translation (MT). Machine translation requires analysis, transfer and generation steps to produce target language output from a source language input. Structural representation of Hindi sentences codes the information of Hindi sentences and a transfer module can be designed to generate English sentences...
In this paper we introduce a new stochastic greedy heuristic algorithm for the orienteering problem (OP) which is an NP-Hard combinatorial optimization graph problem. The goal of OP is to determine a Hamiltonian path that connects the specified source and target, includes a set of control points and achieves the best possible total collected score within the fixed time frame. This problem finds application...
Identification and authentication is done using various biometric sign like fingerprints. The recognition rate of correct person is depending on quality of fingerprints images. Fingerprints quality also varying from rural and urban population. Rural population having more physical work than urban population. Therefore the ridges, valleys, bifurcation, joints, minutia etc. features are not good quality...
Regression analysis is one of the techniques of data mining and is used to generate futuristic model for a given problem. One of the major challenge in the study of Regression analysis is to reduce the Outlier values. But the inherent complex and flexible nature of web data makes it difficult for various regression algorithms to propose an ideal futuristic model. This paper discusses a method that...
Cloud computing is one of the promising technology in current day scenario. Job scheduling in cloud environment is an important issue where the main aim is to schedule the jobs appropriately in order to effectively utilize the resources and also meet the user's satisfaction. Cloud provider has to consider various aspects like number of cloud users requesting for a service at the same time, availability...
Now-a-days cloud computing is the most emerging technology due to its elasticity of resource provisioning and the pay-as-you-go pricing model which enables users to pay only according to their need. As cloud can be accessed anytime and anywhere through commodity hardware only its demand is increasing day by day. So it must provide high performance gain to the user and at the same time must be beneficial...
Image Registration is the key step of Image Processing as it is the process to locate most accurate relative orientation among two or more images, captured at the same or different times by distinguishable or indistinguishable sensors to increase the information content. For speed optimization of Image Registration, There have been developed numerous approaches till now based on CPU platforms, GPU,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.