The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper aims to propose and discuss concepts of how users can recognise information seeking behaviour automatically and what implications such an automatic recognition can have. The authors develop the discussion around variables proposed in Wilson's second model of information behaviour and state how they can collect data necessary to recognise information behaviour automatically. The authors...
In current times, there has been a surge in the amount of collected data from computational systems. The vast amount of data can be useful in many applications and fields, particularly so in Big Data Analytics. However with a large collection of data there is a difficulty discovering important information. Automatic Document Summarization (ADS) systems are suitable for the task of outlining useful...
In the wide growth of information technology, security has one challenging phase for computer and networks. Attacks on the web are increasing day-by-day. Intrusion detection system is used to detect several types of malicious attacks that can compromise the security of a computer system. Data mining techniques are used to monitor and analyze large amount of network data & classify these network...
Analysts of different fields have shown a good interest in data mining. Data mining is the process of inferring useful patterns from the huge amount of data. Regarding data storage and management process, classical statistical models are however protective. Big data is a popular terminology which is intermittently discussed in the present day, used to describe the enormous quantity of data that may...
Instead of hybrid recommendation, recommendation system research mainly focused on improving the traditional algorithm. So, this paper proposes the hybrid recommendation model of commodity based on parallel computing. This model improves the results of the recommendation through combining various ways that have existed in the main e-commerce websites. In this model, there is one big problem that the...
Enzymes play an important role in metabolism that helps in catalyzing bio-chemical reactions. A computational method is required to predict the function of enzymes. Many feature selection technique have been used in this paper by examining many previous research paper. This paper presents a comparative analysis of different supervised machine learning approach to predict the functional classes of...
Besides required courses which are compulsory for each student to be taken, universities also offer elective courses chosen by the students themselves. In their undergraduate study, since students are not guided about the elective courses, they lack information about the description and content of the course and generally fail to take the appropriate ones for their course of study. As a solution,...
Inquiry based Inductive learning methodology is one of the best technique especially for the engineering students who are expected to solve real world problems. But it is very difficult to standardize a particular learning methodology for an institution with diverse attitude, diverse characteristics, diverse languages, diverse financial back grounds, and diverse cultural scenario with variable educational...
Since past few years there is tremendous advancement in electronic commerce technology, and the use of credit cards has increased dramatically. As credit card becomes the most popular mode of payment for both online as well as regular purchase, cases of fraud associated with it are also rising. In this paper the authors present the underlying theory of a hybrid model of an Intelligent Fraudulent Detection...
K-means is the most widely used clustering algorithm due to its fairly straightforward implementations in various problems. Meanwhile, when the number of clusters increase, the number of iterations also tend to slightly increase. However there are still opportunities for improvement as some studies in the literature indicate. In this study, improved implementations of k-means algorithm with a centroid...
The paper presents an analysis of directions of development of cognitive information technologies for mathematical education. Two aspects of the problem are highlighted, they are a simulation of mental processes of a student and a modeling of a subject area. The proposed concept of development of cognitive informational technologies is confirmed by a retrospective analysis of information technologies...
According to the traditional sequential pattern mining algorithm with high complexity and not suitable for massive data, this paper puts forward Ha-GSP, which is a sequential pattern mining algorithm based on cloud computing platform Hadoop. On the basis of GSP algorithm, this paper researchs on implementation of GSP algorithm on Hadoop platform, and uses MapReduce model to solve the problem of massive...
The ability to predict one's academic performance is a great asset for both the students and the institution administrators. For the students, they can adjust workload, career direction, etc. If they are aware of their capability. For the administrators and instructors, early warnings would facilitate intervention thus enabling a more successful academic environment. In addition, institutional resources...
Integratedly use the knowledge of the social network theory based on the traditional trust, and compute the trust of the users of online auction transactions, because of lack of Intelligence, flexibility and initiative in current recommendation system, the Auction Mechanism Based Distributed Personalized Recommendation System was proposed. In this system, intelligent agent technology was used. The...
Computer controlled machinery is perceived as a cyber-physical system. Such systems are vulnerable to cyber attacks of ever-growing sophistication with potentially severe consequences. To address this threat advanced security/status monitoring measures are to be developed and deployed within the framework of industrial control systems. A system diagnostic approach based on modeling and assessment...
The prevalent use of computer applications and communication technologies has rising the numbers of network intrusion attempts. These malicious attempts including hacking, botnets and works are pushing organization networks to a risky atmosphere where the intruder tries to compromise the confidentiality, integrity and availability of resources. In order to detect these malicious activities, Intrusion...
Frequent pattern mining has a critical role in mining associations, sequential patterns, correlations, causality, episodes, multidimensional patterns, emerging patterns, and many other significant data mining tasks. With the exponential growth of available data, most of the traditional frequent pattern mining algorithms become ineffective due to either huge resource requirements or large communications...
This article first introduce the Core Architecture and operational mechanism of cloud computing and HADOOP platform, then put forward the technical architecture of data mining platform Based on HADOOP. After a thorough understanding to the Map Reduce programming pattern, HSPRINT algorithm is realized in the decision tree. At last the effectiveness of the algorithm is verified through experiments.
Data Visualization and Visual Analytics (DVVA) techniques help human to extract essential information and knowledge from large and complex data sets, and then represent them clearly and comprehensively in the graphic format for better understanding. These techniques have been successfully applied in many areas, including the application in computer forensic science. This paper discusses the background,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.