The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Since computing infrastructure has intrinsically a redundant logic, budget saving practices or understaffing of IT departments lead to an “emergency room” service paradigm. However, a treasure of information that could facilitate preemptive maintenance is buried in the logs and messages that are automatically generated by regular processes. Such information is typically ignored because of the shear...
Clinical summarization means the collection and synthesis of a patient's significant data, undertaken in order to support health-care providers in the process of patient care. Considering that medical information comes from multiple sources, a system for the automatic generation of problem lists could prove to be very effective in terms of saving time in the analysis of large amounts of medical data...
Avionics systems, along with their internal hardware and software components interfaces, must be well defined and specified (e.g., unambiguous, complete, verifiable, consistent, and traceable specification). Such a specification is usually written in the form of an Interface Control Document (ICD), and represents the cornerstone of the avionics system integration activities. However, there is no commonly...
Multiplayer Online Battle Arena (MOBA) games are very popular in the current eSport scenario, being highlighted in several competitions around the world. However, the domain of knowledge contained in these games is large, which makes it difficult to discover and predict the course of a match. The present work proposes the application of classification algorithms to determine the team with more chances...
Intrusion detection in computer networks is a important topic in information security. Due to numerous cases of security breaches that caused economic and social losses in recent years, this topic has been the subject of several studies in order to mitigate problems related to network intrusion and computer attacks. Information security systems have been using different techniques for network intrusion...
This paper aims to propose and discuss concepts of how users can recognise information seeking behaviour automatically and what implications such an automatic recognition can have. The authors develop the discussion around variables proposed in Wilson's second model of information behaviour and state how they can collect data necessary to recognise information behaviour automatically. The authors...
Extracting opinion words and product features is an important task in many sentiment analysis applications. Opinion lexicon also plays a very important role because it is very useful for a wide range of tasks. Although there are several opinion lexicons available, it is hard to maintain a universal opinion lexicon to cover all domains. So, it is necessary to expand a known opinion lexicon that are...
NewsOne is a dedicated platform that aggregates all the latest news updates from multiple national and international resources and summarizes them to present in a short and crisp words. This online platform provides a service oriented interaction among the users from across web. The main motto of this application is to access the news fast. It will bring news directly without wasting any time for...
We don't have a choice on whether we DO social media, the question is how well we DO it. To track the mood of people about any particular product by review we use opinion mining which is a natural language processing technique. Customer review analysis is most important only by which product is rated and it is a major problem today. Reviews from social media are collected manually and then pre-processed...
In current times, there has been a surge in the amount of collected data from computational systems. The vast amount of data can be useful in many applications and fields, particularly so in Big Data Analytics. However with a large collection of data there is a difficulty discovering important information. Automatic Document Summarization (ADS) systems are suitable for the task of outlining useful...
Recruiters evaluate and filter job seekers, ranking them on various criteria. This includes how much of the required and desired requirements are satisfied, ensuring the candidate is the “best match” to vacancy. However, most vacancies do not classify the set of skills as required and desired explicitly. Required skills are those skills a job seeker must have in order to be considered for the job...
In this paper we investigate a Persian search engine log and present a comprehensive analysis of question queries in three levels: structure, click and topic. By analyzing question queries characteristics, we explore behavior of Persian language users. Our experimental results show that question queries length are larger than normal queries. Most of these queries contained question words "How"...
Traumatic brain injury (TBI) and its complications, including intracranial hypertension, are one of the leading causes of mortality. Many proposed algorithms have attempted to overcome the invasiveness of intracranial pressure monitoring with limited clinical applications. In medical practices, changes of intracranial hypertension are perceived manually, by clinical experts, via surgical placement...
In many websites, data is ubiquitous and contains an abundance of valuable information. As researchers, we often first have to manually extract information from these websites and apply processing techniques to make information structured for further research. In this paper, we propose a smartphone recommendation system based on two websites: www.bestbuy.ca and www.tbaytel.net. The proposed system...
The data structure course is very important for information communication technology learning. However, some students can learn data structures well, but most students feel difficult to understand the contents of the data structure course. Therefore, a data structure exercise system applying self-regulated learning mechanism was used for students to learn by their own goals and strategies, and this...
The extracted product aspects (like “battery life”, “zoom”) from online customer reviews are dissimilar in their significances, some of these aspects have a great influence on the potential customer's decision likewise on the businesses' strategies for product enhancements. Supporting the probable customers with a list of the most representative product aspects will assist their purchasing decision...
For a large sum of data collected and stored continually, it is more and more necessary to mine association rules from database, and the Apriori algorithm of association rules mining is the most classical algorithm of database mining and is widely used. However, Apriori algorithm has some disadvantages such as low efficiency of candidate item sets and scanning data frequently. Support and confidence...
To aggregate opinions on aspects of entities mentioned in large-scale online reviews, it is important to automatically extract aspects of different granularities, identify associated opinions, especially aspect-specific opinions, and classify sentiment polarity. Recently, various topic models are proposed to process some of these tasks, but there is little work available to do all simultaneously....
Globally the internet is been accessed by enormous people within their restricted domains. When the client and server exchange messages among each other, there is an activity that can be observed in log files. Log files give a detailed description of the activities that occur in a network that shows the IP address, login and logout durations, the user's behavior etc. There are several types of attacks...
Data recovery process for magnetic hard disk drives has remained forensic friendly for digital investigation team. Since solid state drive (SSD) with transistor based storage started gaining popularity among desktop and laptop users, it has become challenging to recover data from SSD, due to its implementation of background garbage collection and wear leveling and TRIM command which sanitizes the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.