The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The amount of data circulating on the Internet is increasing day by day. With the increasing use of social media in particular, the importance of analyzing these data is increasing. The use of machine learning approaches to analyze large amounts of data is still popular today. Today, the social network Facebook is the most popular social networking sites. In this study, some data taken on Facebook...
Cloud computing enables end users to execute high-performance computing applications by renting the required computing power. This pay-for-use approach enables small enterprises and startups to run HPC-related businesses with a significant saving in capital investment and a short time to market. When deploying an application in the cloud, the users may a) fail to understand the interactions of the...
In order to be considered as Linked Data, the datasets on the web must be linked to other datasets. Current studies on dataset interlinking prediction researches do not distinguish the type of links, which are of less help for real application scenarios, as dataset publishers still do not know what kinds of RDF links can be established and furthermore how to configure the data linking algorithms....
Mandible bone segmentation from computed tomography (CT) scans is challenging due to mandible's structural irregularities, complex shape patterns, and lack of contrast in joints. Furthermore, connections of teeth to mandible and mandible to remaining parts of the skull make it extremely difficult to identify mandible boundary automatically. This study addresses these challenges by proposing a novel...
The ability of an intrusion detection system (IDS) to accurately detect potential attacks is crucial in protecting network resources and data from the attack's destructive effects. Among many techniques available for incorporation into IDS to improve its accuracy, classification algorithms have been demonstrated to produce impressive and efficient results in detecting IPv4-based attacks but have not...
When Business support systems (BSS) suffer poor performance, the system administrator has to spot the problem of BSS as soon as possible. The monitoring system is a great help to quickly gain insight of the system from all sides. By the monitoring system, the administrator can evaluate various metrics on the different fields in one single arranged page and understands the whole picture of current...
In this paper we present an empirical evaluation of various techniques for feature selection that are applicable for analysis of funding decisions - whether of not to award funding to a specific scientific project. Input data are a set of review forms (questionnaires), filled in by domain experts, with final decisions of the expert committee about project funding. The data was provided by the Russian...
Due to its economical and environmental benefits to society and industry, integrating solar power is continuously growing in many utilities and Independent System Operators (ISOs). However, the intermittent nature of the renewable energy brings new challenges to the system operators. One key to resolve this problem is to have a ubiquitously efficient solar power output forecasting system, so as to...
Error tolerant graph matching is required not only in many realistic object recognition scenarios, but also in different domains such as document analysis and mechanical drawings. This paper presents such a technique using a distortion-free graph embedding, reformulating the problem as that of finding errortolerant point matching in the geometric space. The embedding works by finding the distance...
Clustering is a widely used technique in data mining applications for discovering patterns in underlying data. Most traditional clustering algorithms are limited to handling datasets that contain either numeric or categorical attributes. However, data sets with mixed types of attributes are common in real life data mining applications. In this paper, we introduce a new framework for clustering mixed...
This work combines model-based local shape analysis and data-driven local contextual feature learning for improved detection of pulmonary nodules in low dose computed tomography (LDCT) chest scans. We reduce orientation-induced appearance variability by performing intensity-weighted principal component analysis (PCA) to estimate the local orientation at each candidate location. Random comparison primitives...
When using electronic health record (EHR) data to build models for predicting adverse drug effects (ADEs), one is typically facing the problem of data sparsity, i.e., Drugs and diagnosis codes that could be used for predicting a certain ADE are absent for most observations. For such tasks, the ability to effectively handle sparsity by the employed machine learning technique is crucial. The state-of-the-art...
With the rapid development of the usage of digital imaging and communication technologies, there appears to be a great demand for fast and practical approaches for image quality assessment (IQA) algorithms that can match human judgements. In this paper, we propose a novel general-purpose no-reference IQA (NR-IQA) framework by means of learning quality-aware filters (QAF). Using these filters for image...
In this paper, we present an automatic approach for facial expression recognition from 3-D video sequences. In the proposed solution, the 3-D faces are represented by collections of radial curves and a Riemannian shape analysis is applied to effectively quantify the deformations induced by the facial expressions in a given subsequence of 3-D frames. This is obtained from the dense scalar field, which...
Keystroke Biometrics is a new authentication technique to identify legitimate users via their typing behavior, which are in turn derived from the timestamps of key-press and keyrelease events in the keyboard while typing their password. Many researchers have explored this domain, with mixed results, but few have examined the relatively impoverished results for digits only password, so that the input...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.