The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We present a desktop monitoring application that combines keyboard, mouse, desktop and application-level activities. It has been developed to discover differences in cognitive functioning amongst older computer users indicative of mild cognitive impairment (MCI). Following requirements capture from clinical domain experts, the tool collects all Microsoft Windows events deemed potentially useful for...
Nowadays, large volumes of data and measurements are being continuously generated by computer and telecommunication networks, but such volumes make it difficult to extract meaningful knowledge from them. This paper presents SaFe-NeC, an innovative methodology for analyzing network traffic by exploiting data mining techniques, i.e. clustering and classification algorithms, focusing on self-learning...
Recently, games have started to be used in the educational field to teach different subjects. In fact, according to different research works, educational games have made learners more motivated and interested in learning. At the same time, learning analytics is gaining an increasing attention because it supports evaluating the learner, the given courses and the learning environment. This paper presents...
One of the most important areas of optimizing the learning environment in distance education is to analyze the behavior of students in eLearning courses. The aim of the paper is to summarize the field of Educational data mining, analyze the behavior of students in e-course Computer data analysis and to present a few cases of a similar analysis of the behavior of students. The results of the analysis...
The vigorous growth of big data has triggered both opportunities and challenges in business and industry. However, Web big data distributed in diverse sources with multiple data structures frequently conflict with each other, i.e. inconsistency in cross-source Web big data. In this paper, we propose a state-of-the-art architecture of auto-discovering inconsistency with Web big data. Our contributions...
Social Network Analysis (SNA) is a field of study that focuses on analyzing user profiles and participations on social network channels in order to model relationships between people and to predict certain behaviors or knowledge. To achieve their goals, researchers, interested in SNA, have to extract content and structure from the numerous social networks available today. Existing tools, which help...
Database audit logs contain the information about database operations which are helpful to verify accuracy, lawfulness and to report risks. In financial systems, the audit logs should be monitored on continuous basis in order to detect and take action against any reasonably abnormal behavior. Outlier detection is a very important concept in the data mining which is useful in data analysis. Nowadays,...
In the paper, an overview of the Copernicus system from the classification ability perspective is given. Copernicus is a tool for computer-aided diagnosis of mental disorders based on data coming from the Minnesota Multiphasic Personality Inventory (MMPI) test. MMPI is one of the most frequently used personality tests in clinical mental health as well as psychopathology (mental and behavioural disorders)...
Positive emotions have been proven to be a key factor for successful learning. In modern personalized learning environments informal learning takes a prominent role and with this the use of computer-mediated communication. Communication data, like for example chat logs, can be harvested for sentiments. Most sentiment analyses operate processing only verbal information. But the messages exchanged in...
In the paper, a general overview of the Copernicus system is given. Copernicus is a tool for computer-aided diagnosis of mental disorders based on personality inventories. The tool was designed for the Java platform. There have been selected and implemented different quantitative groups of methods useful for differential interprofile diagnosis. The aim of this paper is to present the capabilities...
Most of the effort in today's digital investigations centres on the data collection and analysis of existing information from the hard disks of computer systems. Little has been done on the level of information that can be recovered from only the computer system memory (RAM) while the application is still running. In this paper, we present the results of an investigation into the extraction of forensically...
Networked computer systems continue to grow in scale and in the complexity of their components and interactions. Component failures become norms instead of exceptions in these environments. A failure will cause one or multiple computer(s) to be unavailable, which affects the resource utilization and system throughput. When a computer fails to function properly, health-related data are valuable for...
The aim of this research is to use a data analysis/mining approach to extract information from a large number of failure equipment notifications, form a fuzzy system that would be capable of learning and optimizing the knowledge from historical evidence, and subsequently use it as a guiding tool in decision making processes.
With the high development of Internet, e-commerce websites now routinely have to work with log datasets which are up to a few terabytes in size. How to remove messy data timely with low cost and find out useful information is a problem we have to face. The mining process involves several steps from pre-processing the raw data to establishing the final models. In this paper we describe our method to...
In order to solve practical problems in network teaching data analysis ,the web-based instruction data of mathematical models and model framework was build. In the core process that data scoop out, the main adoption the classification method based on the continuity of data. It firstly gains the class-contained from the sample, and then obtains the standard category through the degree of support, finally...
Concept lattice is a new mathematical tool for data analysis and knowledge processing. Attribute reduction is very important in the theory of concept lattice because it can make the discovery of implicit knowledge in data easier and the representation simpler. In this paper the reduction of the concept lattice was investigated. First, we present a close-degree of concept to measure the close-degree...
Computer forensics is the traces collection and processing, which is the offender to remain in the computer or network system, and as a legally binding evidence in the proceedings available to the court, so that suspects would be brought to justice. It mainly includes data protection, data collection, data analysis, the evidence presented in such processes. the data analysis is the key to computer...
Considering the consistency of instance level, we come up with a Holistic Data Instance Matching Approach (HIMA). Firstly, we measure the similarity of instances with the algorithm of string distances. HIMA makes use of the clustering algorithm, which it can handle, a large scale of data source holistically. In addition, we use the keyword extracting method, which is based on the maximum entropy model,...
Computer forensics is the traces collection and processing, which is the offender to remain in the computer or network system, and as legally binding evidence in the proceedings available to the court, so that suspects would be brought to justice. It mainly includes data protection, data collection, data analysis, the evidence presented in such processes. The data analysis is the key to computer forensics...
Using data cube to analysis historical fact data online more faster than Ad-Hoc queries, but it need very large external storage. In DSMS (Data Stream Management System), due to capacity of memory is much smaller than disk, we meet even more problem in analyzing stream data by in-memory StreamCube. So, we compress StreamCube to gain more information about stream data in certain storage. We implement...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.