The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Knowledge graphs have been shown to play an important role in recent knowledge mining and discovery, for example in the field of life sciences or bioinformatics. Although a lot of research has been done on the field of query optimization, query transformation and of course in storing and retrieving large scale knowledge graphs the field of algorithmic optimization is still a major challenge and a...
Presently, there are still many problems on acquiring patent information from the Website ,we can't acquire a large number of information efficiently and accurately. In this paper, use the two-tiered scheduling Multi-Agent to design the patent information acquisition system. The process of acquisition patent information from United States Patent and Trademark Office (USPTO) web database which includes...
In order to overcome this shortage of general rough set theory, the elementary concept of tolerance rough set theory is proposed, and the theory is employed to build objects' tolerance relations that can correctly classify objects in system. First, we use genetic algorithms to search for the optimal thresholds, then construct special matrix for attributes and objects. Thus we can get the relations...
This paper proposes a new method to cluster law texts based on referential relation of laws. We extract law entities (an entity represents a law) and their referential relation from law texts. Then SimRank algorithm is applied to calculate law entity's similarity through referential relation and law clustering is carried out based on the SimRank similarity. This is the first time to apply SimRank...
In this paper, we have we have introduced a new intelligent soft-computing method of neutrosophic search with ranks and a new neutrosophic rank sets for neutrosophic relational data model (NRDM). Essentially the data and documents on the Web are heterogeneous; inconsistency is unavoidable in Web mining. Using the presentation and reasoning method of our data model, it is easier to capture imperfect...
Combining with the data mining application in database intrusion detection, for the most representative association rule Apriori algorithm in the data mining technology, this paper presents an improved association rule algorithm, based on which constructs a database intrusion detection system on the basis of association rules, and carries out a small range test. Experimental results show that the...
Data mining techniques are able to derive highly sensitive knowledge from unclassified data that is not even known to database holders. Usually, data mining contains the secured information such as financial and healthcare records. To handle such large private database with, data mining algorithms with privacy is required. The privacy preserving becomes important concern when we dealing security related...
One of the major concepts in business analytics is to identify the anomalies over time, also called as trend analysis. This can be easily done in pivot tables by using time as one of the dimensions, usually across columns. However, the trending information itself is insufficient to make any quick and insightful observations. Ranking the time series to identify the similar units of information can...
A collaborative emergency call taking information system in the Czech Republic processes calls from the European 112 emergency number. Large amounts of various incident records are stored in its databases. The data can be used for mining spatial and temporal anomalies. When such an anomalous situation is detected so that the system could suffer from local or temporal performance decrease, either a...
The modeling data is very important in building systems, it gives an idea of the complete operation and helps in the process of mining data. From this information, a system was developed to facilitate the clinical management in primary health care, improving efficiency in reducing the morbidity and mortality. The software is focused on major cardiovascular risk factors: diabetes, hypertension, dyslipidemia...
Research in the area of optimizing databases in any Database Management System (DBMS) has been evolving constantly. Today, programming languages are being integrated into database systems to help professional programmers develop software quickly to meet deadlines. Therefore, the design of a database must cater to both the needs of customers and the efficiency of database processes. In this paper,...
Mutant protein hSKCa3 responsible for Schizophrenia is taken from NCBI's Entrez database; its 3D structure is determined by homology modelling. The conotoxin protein is taken from NCBI's Entrez database & its 3D structure is established. The structure of Withanolide is determined and docked with conotoxin protein; this combination is docked with hSKCa3 protein, hence establishing a remedy.
Many frequent sequential traversal pattern mining algorithms have been developed which mine the set of frequent subsequences traversal pattern satisfying a minimum support constraint in a session database. However, previous frequent sequential traversal pattern mining algorithms give equal weightage to sequential traversal patterns while the pages in sequential traversal patterns have different importance...
With the emergence of Web service mashups, selecting the appropriate Web services from the vast amount of available services has emphasized the role of service discovery. In this research, we present a new way of enhancing Web services semantically using WordNet concepts (synsets). The important advantage of our solution is that it allows developers to enhance Web services with semantic information...
Biomedical professionals have at their disposal a huge amount of data, such as literature, i.e. textual contents, or databases, i.e. structured contents. But when they have a question, they often have to deal with too many documents in order to efficiently find the appropriate answer in a reasonable time. We have developed a Question Answering system which aims to analyze the user's question, to retrieve...
Following the application of a large number of neural network schemes that have been applied to a large data base of pregnant women, aiming at generating a predictor for the risk of preeclampsia occurrence at an early stage, we investigated the importance of the parameters of smoking and alcohol intake on the classification yield. A number of feedforward neural structures, both standard multilayer...
Finding the large item set fast is the crucial step in the association rule algorithm. In this paper we apply granular computing and quotient space to frequent item set discovering , by partition the information system to information granule and mapping granule object sets, the algorithm reduced the number of database scanning and reduced object sets required when computing support of candidate item,...
Web sites have become a mission critical component of the organization as more and more businesses have come to rely on it. In this paper, a framework has been introduced to be used to evaluate the quality, completeness of the monitoring and to measure effectiveness of e-learning Web site which has three areas of focus infrastructure, applications, and business functions. Each area is different; they...
The type of the workload is one of the key factors on database management system (DBMS) tuning. Different types of workload (OLTP, online transaction processing and OLAP, online analytical processing) mean different resource allocation strategies. In this paper, we present an approach to automatically identify a DBMS workload as either OLTP or OLAP. We use C5.0 algorithm to construct a set of classifiers...
Manually tuning tens to hundreds of configuration parameters in a complex software system like a database or an application server is an arduous task. Recent work has looked into automated approaches for recommending good configuration settings that adaptively search the full space of possible configurations. These approaches are based on conducting experiments where each experiment runs the system...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.