The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A lot of products are sold on electronic commerce websites. There are many customer reviews available on the Internet. Users read them to select a product to purchase. However, going through the reviews is time-consuming because the number of reviews is large for each product. It is important to reflect reviews in a ranking to make a decision easily. The aim of this research is ranking products based...
Cyber attacks on network communication are executed against companies, governments, and even individuals. A number of these attacks is drastically increased over the last decade. Nowadays, protecting private data, latest research data, etc. is a crucial problem. Therefore, developing an intelligent system to detect the attacks is required. In this paper, we propose an anomaly based network intrusion...
The architectural and user interface patterns of mobile applications are well established for most popular software types. However, it is still challenging to design a mobile application for a use scenario beyond typical daily tasks. In this paper, we describe the challenges and design decision of mobile WordBricks software -- a virtual lab-like environment for natural language grammar acquisition...
Nowadays, people purchase a lot of products from online shopping sites. To support customers in decision making, some sites collect and provide user reviews on products. However, contents of the user reviews are too abundant for customers to analyze them in a short period of time. The automatic analysis of reviews is important to provide users with valuable information about goods of any category...
Nowadays, people purchase a lot of products from online shopping sites. To support customers in decision making, some sites collect and provide user reviews on products. However, contents of the user reviews are too abundant for customers to analyze them in a short period of time. The automatic analysis of reviews is important to provide users with valuable information about goods of any category...
In this paper, we discuss an approach used to develop a schedule management system which is manageable at low cost. It is designed using Google App Engine (GAE) and the Go programming language. The system is available for general purposes. GAE provides the execution environment, database called BigTable, and development tools. Developers can concentrate on writing applications because they can skip...
In recent yeas a lot of web applications have been released in the world. At the same time, cyber attacks against web application vulnerabilities have also increased. In such a situation, it is necessary to make web applications more secure. However checking all web vulnerabilities by hand is very difficult and time-consuming. Therefore, we need a web application vulnerability scanner. In this work,...
The Internet is an important source to get information about everything in human lives. Developing websites is one of the best ways to give information to people. Nowadays, there is a rapidly growing number of websites for many purposes. The websites of university laboratories are the examples. Usually university laboratories have websites to provide information to students, laboratory members, visitors,...
Distributed Denial of Service (DDoS) attacks are a serious threat to network security. Servers of many companies and/or governments have been victims of such attacks. DDoS attacks jam the network service of the target using multiple bots hijacked by crackers and send numerous packets to the target server. In such an attack, detecting the crackers is extremely difficult, because they only send a command...
With the rapid advance in information technology, more and more information exchange platforms appear. People can freely exchange information on these platforms. However, not all information is reliable. To make correct decisions, it is necessary to detect and remove unreliable information. The main purpose of this study is to improve the reliability of hotel ranking by detecting and deleting outlier...
Go is a new programming language developed by Google. Although it is still young compared to other programming languages, it already has modern and powerful features inherited from existing programming languages, and some of these are similar to Java. Go is designed for quick time development. Concurrency is the one of the main its features. In this paper, we analyze the performance of Go, and compare...
In recent years there is growing interest to the opinion mining applications in numerous areas of information and social science. In this paper we investigate main problems in opinion mining and sentiment analysis systems development. We review examples of difficulties in process of opinion extraction and introduce essential multidimensionality of opinion mining. We carried out a series of experiments...
Nowadays, there are a lot of news about hacking attacks over the Internet against companies and government organization Web sites in the world. Victims are big companies such as Evernote, Facebook, Google and others. Web server providers understand that the current authentication systems and passwords should be strong. The end users who are not specialists in the security should understand how to...
We report on experiments that demonstrate the relevance of our AntiSocial Behavior (ASB) corpus as a machine learning resource to detect antisocial behavior from text. We first describe the corpus and then, by using the corpus for training machine learning algorithms, we build a set of binary classifiers. Experimental evaluations revealed that classifiers built based on the ASB corpus produce reliable...
A significant number of elders live with memory impairment issues, as a result of the normal aging process. Therefore various kinds of supporting systems have been developed to help the elders, who have mild memory problems. In this paper we propose a Smart Reminder System for reminding forgotten complex activities, in home environment. Subjected complex activities are the activities, which should...
In this review paper we classified and described measures and approaches for document relatedness evaluation. For the reviewed measures we pointed out the reasons of their construction and usage limitations. We concluded this research with a discourse on challenges of the day in estimating document appropriateness in the domain of information retrieval.
This paper introduces a new technique to select candidate sentences for alignment from bilingual comparable corpora. Tests were done utilizing Wikipedia as a source for bilingual data. Our test languages are English and Chinese. A high quality of sentence alignment is illustrated by a machine translation application.
This paper investigates the efficiency of the EWC semantic relatedness measure in an ad-hoc retrieval task. This measure combines the Wikipedia-based Explicit Semantic Analysis measure, the WordNet path measure and the mixed collocation index. In the experiments, the open source search engine Terrier was utilised as a tool to index and retrieve data. The proposed technique was tested on the NTCIR...
Nowadays, Internet users are familiar with the Web searching process; and searching is the most common task performed on the Web. However, the web search is especially difficult for beginners when they try to utilize a keyword query language. Subsequently, beginners usually try to find information with ambiguous queries. Users receive non-relevant information in response to queries. Our goal is to...
General purpose search engines utilize a very simple view on text documents: They consider them as bags of words. It results that after indexing, the semantics of documents is lost. In this paper, we introduce a novel approach to improve the accuracy of Web retrieval. We utilize the WordNet and WordNet SenseRelate All Words Software as main tools to preserve the semantics of the sentences of documents...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.