The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In the era of Internet and electronic devices bullying shifted its place from schools and backyards into the cyberspace; it is now known as Cyberbullying. Children of the Arab countries are suffering from cyberbullying same as children worldwide. Thus concerns from cyberbullying are elevating. A lot of research is done for the purpose of handling this situation. The current research is focusing on...
Multiplayer Online Battle Arena (MOBA) games are very popular in the current eSport scenario, being highlighted in several competitions around the world. However, the domain of knowledge contained in these games is large, which makes it difficult to discover and predict the course of a match. The present work proposes the application of classification algorithms to determine the team with more chances...
Extracting opinion words and product features is an important task in many sentiment analysis applications. Opinion lexicon also plays a very important role because it is very useful for a wide range of tasks. Although there are several opinion lexicons available, it is hard to maintain a universal opinion lexicon to cover all domains. So, it is necessary to expand a known opinion lexicon that are...
We don't have a choice on whether we DO social media, the question is how well we DO it. To track the mood of people about any particular product by review we use opinion mining which is a natural language processing technique. Customer review analysis is most important only by which product is rated and it is a major problem today. Reviews from social media are collected manually and then pre-processed...
Extreme Learning machines (ELM) and Support Vector Machines have become two of the most widely used machine learning techniques for both classification and regression problems of recent. However the comparison of both ELM and SVM for classification and regression problems has often caught the attention of several researchers. In this work, an attempt has been made at investigating how SVM and ELM...
One of the dominant causes of visual impairment worldwide is Cataract. It causes a blurred and foggy vision which can lead to partial or complete loss of eyesight. A protein layer is developed gradually and the lens becomes cloudy over a long period of time which reduces vision and leads to blindness. Early treatment can lessen the difficulties faced by cataract patients and avert visual impairment...
Nowadays, the consumer reviews for various products are playing a very important role not only for consumers but also for the firms. A large collection of consumer reviews is now available on the internet. These reviews are very helpful to get quality information about the products. The consumer reviews are used as a feedback by the firms in their product development strategies and consumer relationship...
Linear Discriminant Analysis (LDA) is a popular technique in pattern recognition. This paper presents a linear discriminant analysis for classification. Firstly, linear discriminant Analysis is introduced. The optimum design procedure is demonstrated in order to calculate the error minimization. Next, linear classifier based on desired outputs is derived to get the desired classification. Also, the...
The opinion mining is very much essential in e-commerce websites, furthermore advantageous with individual. An ever increasing amount of results are stored in the web as well as the amount of people would acquiring items from web are increasing. As a result, the users' reviews or posts are increasing day by day. The reviews toward shipper sites express their feeling. Any organization for example,...
This paper presents a comparison of Electroencephalogram (EEG) signals classification for Brain Computer-Interfaces (BCI). At present, it is a challenging task to extract the meaningful EEG signal patterns from a large volume of poor quality data and simultaneously with the presence of artifacts noises. Selection of the effective classification technique of the EEG signals at classification stage...
The demand for Solid-State drives (SSDs) has risen as their speed, size, and architecture have improved. SSDs introduce a security risk because they contain a separate processor to optimize the SSD's lifespan. The lack of transparency of the operations conducted by this onboard processor creates a challenge to users, particularly in digital forensics settings. This paper utilizes non-destructive voltage...
Botnets, networks of compromised devices, are considered as one of the most costly incidents in network security. Since the botnets are able to obfuscate firewalls, interconnect to vast networks, attack enterprise systems, and lead to massive damages, it is getting more urgent to detect the botnets. Some detection mechanisms have been proposed, particularly applying machine learning techniques into...
Analysis of Arabic language has become a necessity because of its big evolution; we propose in this paper a novel classification algorithm called EST.Stemmer of Arabic text, it presents many important improvement areas which deals with some issues in Heavy Stemmers and Light Stemmers.
Data classification in medical field is distinct from that in other fields, because the medical data are heterogeneous, skewed and complex in nature and medical data classification involves multi class classification. In this paper we present the experimental analysis of well-known traditional classification algorithms on bio-medical datasets in order to observe their performance. This experimental...
In the recent few years several efforts were dedicated for mining opinions and sentiment automatically from natural language in online networking messages, news and business product reviews. In this paper, we have explored sentiment orientation considering the positive and negative sentiments using film user reviews. We applied the technique Naive Bayes' classifier.). We have performed the sentiment...
BCI (Brain Computer Interface) can act as permanent solution and new approach of communication through which subject can communicate with the system and can directly control devices which maximizes the capability of individual. As BCI does not require for any exterior muscular activity, there it develops a possibility for a device to be regulated by the human brain (waves) by Brain Computer Interface...
In this work, we address the issue of automatic assessment for programming assignments. The objective is to provide immediate feedback to the learners and save teachers from manually managing all the students' solutions. We will present a method merging results from dynamic and static analysis to ensure a reliable and objective evaluation job. While dynamic analysis is based on unit testing framework,...
Decision trees are common algorithms in machine learning. Traditionally, these algorithms make trees recursively and at each step, they inspect data to induce the part of the tree. However decision trees are famous for their instability and high variance in error. In this paper a solution which adds error correction rule to a traditional decision tree algorithm is examined. In fact an algorithm which...
Segmentation of manually written record photos into content material traces and words is a crucial undertaking for optical character acknowledgment. However, for the reason that elements of written by hand record are abnormal and various depending at the character, so far it is considered as a challenging issue. A good way to deal with the hassle, we formulate the word segmentation problem as a binary...
In recent years, community detection in overlapping weighted network became a research challenge. In real networks, a node can belong to two or more communities. Therefore, in this paper, we aim to address the above-mentioned problem by proposing a method to improve the modularity in overlapping weighted networks. The proposed method is based on optimizing a fitness function and fuzzy belonging degree...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.