The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Extracting opinion words and product features is an important task in many sentiment analysis applications. Opinion lexicon also plays a very important role because it is very useful for a wide range of tasks. Although there are several opinion lexicons available, it is hard to maintain a universal opinion lexicon to cover all domains. So, it is necessary to expand a known opinion lexicon that are...
Recruiters evaluate and filter job seekers, ranking them on various criteria. This includes how much of the required and desired requirements are satisfied, ensuring the candidate is the “best match” to vacancy. However, most vacancies do not classify the set of skills as required and desired explicitly. Required skills are those skills a job seeker must have in order to be considered for the job...
Recent studies show structured atomic event information is beneficial to represent the discourse semantic. However, extracting useful structured representation of events from open domain is a challenging problem. On one hand, previous event extraction methods on special domain, cannot be directly used for open domain because of domain limitation and predefined event pattern. On the other hand, atomic...
The advancement in the world of internet has made information retrieval an easy task. Search engines provide users the information they need but not in specific form, instead floods the user with lots of documents/web pages that contain the information required by user. User waste their time to scan all documents in order to retrieve the needed information. Question Answering System reduces this drawback...
An effective method for highlight generation from basketball sports videos is proposed in this paper. Video shot classification is done which classify video into three categories that is close-up view, far view and replay. For close-up and far view detection we have proposed the feature based on the percentage of edge pixels to classify the frame into Far or close-up view. A pair of logos determines...
This work presents a novel writing style-based approach to detect multi-account users on User-Generated Content (UGC) sites. Unlike existing works which emphasize feasibility and privacy leakage, we focus on precise writing style-based multi-account detection. Specifically, we leverage a one-class classification-based approach to detect multi-account behaviors, in which a mutual similarity measurement...
Malware is a computer program or a piece of software that is designed to penetrate and detriment computers without owner's permission. There are different malware types such as viruses, rootkits, keyloggers, worms, trojans, spywares, ransomware, backdoors, bots, logic bomb, etc. Volume, Variant and speed of propagation of malwares are increasing every year. Antivirus companies are receiving thousands...
Even today, a large number of organizations collect data using paper forms. However, it can be difficult to aggregate, and analyze the data collected using paper forms. Better management and processing of forms and applications is indispensable to improving customer experience. But, typing the form data into a spreadsheet is time-consuming, mundane and may result in errors. Various attempts have been...
Financial stock Data Analysis and future prediction in terms of Sentiments is great challenge in the big data research. Among the unlabelled opinion, opinion classification in terms of unsupervised learning algorithm will lead to classification error as data is sparse and high dimensional. To overcome this problem, the sentiment analysis to extract the opinion of each word in the stock data has been...
Cloud computing has gain wide-spread popularity in recent years. Despite its numerous advantages, security is still one of the most challenging issues associated with it. An intrusion detection system (IDS), as a common security tool, can be used to increase the level of security in cloud computing. An IDS need to be accurate, efficient, adaptive and extensible. Cloud features, such as being highly...
Internet and mobile computing have become a major societal force in that down-to-earth problems and issues are being addressed and sorted out. For this to be effective, information and content extraction need to be at a basic generic level to address different sources and types of web documents and preferably not dependent on any major software. The present study is a development in this direction...
In this paper, a new technique is presented for mining key domain areas from scientific publications. A domain refers to a particular branch of scientific knowledge and hence largely defines the theme of any scientific research paper. The proposed technique stems from a fusion of knowledge derived from natural language processing and machine learning. Some words or phrases are extracted based on their...
Social Network Analysis (SNA) is a field of study that focuses on analyzing user profiles and participations on social network channels in order to model relationships between people and to predict certain behaviors or knowledge. To achieve their goals, researchers, interested in SNA, have to extract content and structure from the numerous social networks available today. Existing tools, which help...
With the increasing popularity of location-based social networks, a large number of users have been involved in the check-ins. The venues where the user frequently repeats check-ins tend to play a very important role in his daily life, as they not only dominate the user's mobility behavior but also imply the user's personal preferences. Therefore, fast discerning of such check-in venues could enable...
A video is made up of frames. Generally few video processing applications demand to process each video frame one by one, but processing each frame consumes lot of video content summarization helps in improvising the processing speed for such applications. Key frames in video are considered for content summarization. Key frame is a frame in which there is a major change as compared to the previous...
Classification of Network Traffic is one of most important issue in network management and detection of Intrusion attacks play a vital role in it. To have a holistic picture of the network intrusion detection, selection of appropriate feature is very important; it reduces analysis effort and time too. Data mining can be very fruitful for feature selection and intrusion detection. In this paper, Tcpdump...
Image based text extraction is one of the fastest growing research areas in the field of multimedia technology. The extraction of text from a complex or more colorful images is a challenging problem. Text data present in images contains useful information for habitual explanation, indexing, and structuring of images. Extraction of this information involves detection, localization, tracking, extraction,...
Theory of "embodied cognition" suggests that a variety of mental activities are reflected in states of the body, such as postures, arm movements and facial expressions. The present study investigates the extent to which profiles of computer users -- their gender, feelings, and emotional experience -- can be assessed from movements of computer cursors. In one experiment, participants (N =...
Physical memory forensic« has grown in popularity in recent years. Since malware typically operate in user space, it is important to reconstruct and track their process behavior. This paper focuses on detecting malware through a comparison of the information in the user space memory data structures. In order to expedite information extraction and ensure accuracy, the data in multiple memory management...
One of the common methods in the area of combating with malwares is the use of opcodes-sequence exist in the malwares' assembly code. In this study, a new method has been used based on the structural classification of opcodes to detect malwares and its efficiency has also been put into investigation compared to the opcodes method. For this purpose, two different methods are to be applied for eliciting...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.