The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper presents a method of applying text mining techniques and data mining tools for pharmaceutical spam detection from Twitter data. A simple method based on a manually selected list of 65 pharmaceutical discriminating words is used for labeling spam training tweets. Preliminary experimental results show that J48 decision tree classifier has better performance over Naïve Bayesian algorithm.
This paper presents a new algorithm for nighttime contrast enhancement. The proposed algorithm modifies the traditional histogram equalization algorithm to maintain the color information of the original nighttime images. The algorithm has a low computational cost that makes it suitable for real-time hardware implementation. In addition, its efficient hardware implementation is detailed on a Xilinx...
In BCI research community, EEG based self-paced brain-computer interfaces (SBCI) have been widely researched in the past several years. SBCI systems allow individuals to control outside device using EEG signals at their own pace. But the performance of current SBCI technology is not suitable for most applications due to the difficult in detection of the non-periodic intentionally brain state changing...
This paper describes basic categories of evaluation tasks, which can be used in area of computer science education process. The goals and weaknesses of automatic testing process by using computer based on automatic evaluation rules are discussed here. Article describes basic areas for testing in education, divides tasks into groups with same semantic and structure. Important part is oriented to describe...
This paper describes a practical and reliable solution/approach to achieve a semi-automated sewer pipeline inspection. The central goal of this work is to detect faults in the sewer lines which are a potential threat for underground drainage system. The major challenge for sewer line inspection is the classification and interpretation of the image data that are captured mainly by CCTV cameras mounted...
In this study, we present the Big Bang-Big Crunch (BB-BC) method to solve the post-enrolment course timetabling problem. This method is derived from one of the evolution of the universe theories in physics and astronomy. The BB-BC theory involves two phases (Big Bang and Big Crunch). The Big Bang phase feeds the Big Crunch phase with many inputs and the Big Crunch phase is the shrinking destiny of...
Recently, Wang et al. showed that Das et al.'s dynamic ID-based remote user authentication scheme is vulnerable to an impersonation attack and can not achieve mutual authentication. Consequently, a more efficient and secure dynamic ID-based remote user authentication scheme was proposed and claimed that it was now secure and of practical value. However, in this paper, we will show that Wang et al...
A discussion on involvement of knowledge based methods in implementation of user friendly computer programs for disabled people is the goal of this paper. The paper presents a concept of a computer program that is aimed to aid blind people dealing with music and music notation. The concept is solely based on computational intelligence methods involved in implementation of the computer program. The...
Applications with street navigation have been recently introduced on mobile phone devices. A major part of existing systems use integrated GPS as input for indicating the location. However, these systems often fail or make abrupt shifts in urban environment due to occlusion of satellites. Furthermore, they only give the position of a person and not the object of his attention, which is just as important...
This article presents a clustering-based approach to fuzzy system identification. In order to construct an effective initial fuzzy model, this article tries to present a modular method to identify fuzzy systems based on a hybrid clustering-based technique. Moreover, the determination of the proper number of clusters and the appropriate location of clusters are one of primary considerations on constructing...
Many approaches for preserving association rule privacy, such as association rule mining outsourcing, association rule hiding, and anonymity, have been proposed. In particular, association rule hiding on single transaction table has been well studied. However, hiding multi-relational association rule in data warehouses is not yet investigated. This work presents a novel algorithm to hide predictive...
In this paper we propose a new approach based on Symbolic Aggregate approximation (SAX), called improved iSAX to recognize efficient and accurate discovery of the important patterns, essential for time series data. The original SAX approach allows a very high-quality dimensionality reduction and distance measures to be defined on the symbolic approach and it is based on PAA (Piecewise Aggregate Approximation)...
Spino Cerebellar Ataxia type 2 is an autosomal dominant cerebellar hereditary ataxia with the highest prevalence in Cuba. Typical symptoms in patients of SCA2 ataxia include modifications in latency, peak velocity, and deviation in visual saccadic movements. After applying some electro-oculography based tests to both healthy and SCA2 afflicted individuals, differences in saccade morphology were found,...
Digitization of real objects into 3D models is a rapidly expanding field, with ever increasing range of applications. The most interesting area of its application is in the creation of realistic 3D scenes, i.e. virtual reality. It can be used in the entertainment industry, design, architecture and scientific research. This paper provides a brief summary of current 3D scanning technologies, deals with...
The web is one of the most important mean of disseminating maps to users worldwide. These maps are commonly generated, on-the-fly, by extracting and displaying pre-processed data which is stored beforehand in specific databases. Though rapid, this approach lacks flexibility and does not necessarily provide the user with all the relevant spatial data at the right time and in the right way. Indeed,...
Healthcare organisations using the European Foundation for Quality Management (EFQM) Excellence Model for self-assessment have found an opportunity to work more effectively and a powerful driver for improvement. Nevertheless, when these organisations address self-assessment processes for the first time the initial effort needed presents many difficulties. The aim of this paper is to offer a consensus...
This paper presents a comparative assessment of Pole Placement and Linear Quadratic Regulator to control a balancing of two wheels mobile robot. Disturbance is applied to to test the balancing of the robot. The mathematical model of this robot which is highly nonlinear is derived. The final model is then represented in state space form using MATLAB/Simulink application. Simulation on MATLAB application...
With the fast growing development of the Web, the adoption of ontologies to improve the exploitation of information resources, is already heralded as a promising model of representation. However, the relevance of information that they contain requires regular updating, and specifically, the addition of new knowledge. Recently, new research approaches were defined in order to automatically enrich ontology...
The lack of a software tool to automate the creation of a well-defined, Natural Language Software Requirements Specification (SRS) document is an obstacle to the process of efficient Requirements Engineering (RE). This paper provides an overview of a methodology and a novel software tool that attempt to formalize and automate the RE process, and it expands on the use of the SRS Documentation component...
In this paper we will present an account of the phenomenon of split-ergativity in using the theory of phases (i.e. syntactic domains, also understood as computational units) on the one hand and the mechanism of feature inheritance on the other. Precisely, we will argue that each phase heads (i.e. the head of the phrase that projects its category, in this case: C and v) carry specific uninterpretable...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.