The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Word wide web is considered as the most important information store in recent years. Web development expands to a great extent with new technologies. Search engines are ineffective when the number of docs in the web is multiplied. In the same way, the retrieval of queries, most of which are not related to what the user was looking for. The documents are of varied and flexible web, there are tough...
Trust and reputation management is introduced tothe Online Social networks (OSNs) as a solution to promote ahealthy collaboration relationship among participants. Currently, most trust and reputation systems focus on evaluating thecredibility of the users. The reputation systems in OSNs have asobjective to help users to make difference between trustworthyand untrustworthy, and encourage honest users...
In this article, we explore the task of sentiment analysis for Ukrainian and Russian news, analyze different approaches and linguistics resources for sentiment analysis. We developed a corpus of Ukrainian and Russian news and annotated each text with three categories: positive, negative and neutral. Each text was marked by at least three independent annotators via the web interface and the texts marked...
Probabilistic methods of the automated formation of dynamic thesauri are considered on the basis of algorithms for processing, analyzing and classifying linguistic resources of a very large volume from heterogeneous data sources in application to the support systems of learning processes. Probabilistic methods are implemented in the automated software tool “Ontomaster-Ontology”. An essential feature...
In this paper identification of electroencephalogram (EEG) based brain-computer interface (BCI) for motor imagery (MI) task is planned by an efficient adaptive neuro-fuzzy classifier (NFC). The linguistic hedge (LH) is used for proper elicitation and pruning of the fuzzy rules and network is trained using scaled conjugate gradient (SCG) and speeding up SCG (SSCG) techniques. The performance of the...
This paper presents topic of data sharing algorithms used to management processes of strategic data. In this solution will be describe the cryptographic techniques dedicated to splitting and sharing processes. Also, safety analysis of these methods will be discussed. The safety analysis and standardization methods of data sharing algorithms for management processes are new solution and very important...
The vast and ever-increasing text posting in "social networks" such as Facebook and Twitter, during the last 15 years, has produced an immense and rich text repository for several areas of knowledge. Therefore, text mining has recently become a very active and attractive area of research in computer science. The limited current understanding of the knowledge represented in these repositories...
Automated or semi-automated analysis of requirements specification documents, expressed in Natural Language (NL), has always been desirable. An important precursor to this goal is the identification and correction of potentially ambiguous requirements statements. Pronominal Anaphora ambiguity is one such type of pragmatic or referential ambiguity in NL requirements, which needs attention. However,...
Short message service (SMS) has become a very popular medium for communication due to its convenience and low cost. SMS text messaging makes it easy to provide a false name, age, gender, and location in order to hide one's true identity. Consequently it has become important to establish new cyber forensics methods, such as detecting SMS message authors, as a post-hoc analysis technique deemed useful...
Document Classification has attracted several attentions from researchers due to the increase of digital form documents and the need of these documents' organization. One of the most popular approaches to deal with this problem is based on machine learning techniques [1]. However, the result of classification much depends on the linguistic preprocess and the document representation. The dependence...
This paper aims at construction of fuzzy linguistic variables by using rule induction and concept hierachy. Since representaiton of linguistic variables can be viewed as a linear combination of components, the algorithm is given as follows. First, domain knowledge (concept hiearchy) is used to transform an original dataset into transformed datasets. Contribution of a generalized concept to representation...
Application of attribute-oriented generalization to an informatation often lead to inconsistent results of rule induction, which can be viewed as generation of fuziness with partialization of attribute information. This paper focuses on fuzzy linguistic variables and proposes a solution for inconsistencies. The results show that domain ontology may play an important role in construction of linguistic...
Algorithmic composition is the process of creating musical material by means of formal methods. As a consequence of its design, algorithmic composition systems are (explicitly or implicitly) described in terms of parameters. Thus, parameter space exploration plays a key role in learning the system's capabilities. However, in the computer music field, this task has received little attention. This is...
Transfer learning framework is designed to use previously acquired knowledge to solve a new but somewhat related task (like humans do). Non-availability of sufficient and relevant information in building a learning model is a major bottleneck in this research area. However, such models are highly susceptible to negative transfer learning (NTL) during transferral of knowledge due to the hesitancy in...
Opinion or sentiment analysis has risen to extract useful information from a lot of unstructured text data, in the form of customer reviews on different products and their features or online SNS data respectively. Customer reviews are not only helpful for potential customers, but also are helpful for the manufacturers of the products to raise their products and services. The reviews conciseness takes...
In recent years, many successful machine learning applications have been developed. Classification & Clustering is one such. This application is cross-disciplinary, now that it is based on data mining algorithms on the technical side and on graphemes and morphophonemic on the linguistic side. It will thus map the correspondence between grapheme 〈y〉 and related phonemes via morphemes in a given...
The brain–computer interface (BCI) identifies brain patterns to translate thoughts into action. The identification relies on the performance of the classifier. In this paper, identification and monitoring of electroencephalogram-based BCI for motor imagery (MI) task is proposed by an efficient adaptive neuro-fuzzy classifier (NFC). The Jaya optimization algorithm is integrated with adaptive neuro-fuzzy...
The aim of this study is to improve a fuzzy rule based system that helps to manage heart failure patients in home telemonitoring. The system is intended to give notifications to a decision-making support system and medical experts when there is a possibility of death for a telemonitored patient. The improvement consists in inclusion of a formulated dissimilarity measure into the algorithm for creation...
As bilateral relation between Indonesia and Japan strengthens, the need of consistent term usage for both languages becomes important. In this paper, a new method for Indonesian-Japanese term extraction is presented. In general, this is done in 3 steps: (1) n-gram extraction for each language, (2) n-gram cross-pairing between both languages, and (3) classification. This method is aimed to be able...
A leading cause of hospital admission in the elderly is heart failure and it is considered a major financial burden since the hospitalization costs are high. This is intensified with a lack of medical professionals due to a continuing significant increase of patients with heart failure as a result of obesity, diabetes and aging population. Integration of an intelligent decision support system into...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.