Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Cold-Start is one of the most difficult problems faced by web companies today in the domain of recommendation system. Cold-Start problem refers to predicting the behavior of a new user/item having no history. Common algorithms used to predict users behavior fail at addressing the cold-start problem because the algorithms are based on the user history with the company. But in this paper, we successfully...
Integratedly use the knowledge of the social network theory based on the traditional trust, and compute the trust of the users of online auction transactions, because of lack of Intelligence, flexibility and initiative in current recommendation system, the Auction Mechanism Based Distributed Personalized Recommendation System was proposed. In this system, intelligent agent technology was used. The...
This paper presents the performance of credibility-based voting in a real volunteer computing (VC) system. In VC systems, a management node distributes a computation to multiple participants, collects the result candidates, and then performs a voting to eliminate incorrect results. In this paper, we focus on the credibility-based voting as the voting method, which is known to be an efficient method...
The requirement and characteristic in Computer Generated Forces behavior modeling were analyzed. From the design concept of American OneSAF system, a method for behavior modeling based on composability was proposed and the formalization description of behavior was given. Moreover, the Behavior Modeling Composer Tool was developed based on this method to assist the behavior modeling. Finally, an application...
Record linkage is the task of identifying which records from one or more data sources refer to the same person. Often, records do not have a common key and may contain typographical variations in identifier fields, in such a case, the Fellegi-Sunter probabilistic record linkage is a method commonly used. In this method, a weight is assigned for each pair of records. Record pairs with weights above...
Allocation of budget for acquisition of an academic library is an important initiative to enhance the efficiency of management, to accomplish the objectives ensuring the availability of materials in a library. Processing the circulation data of library, two important dimensions, namely, concentration and connection [1] could be explored among departments and library members. This can make the analysis...
This paper deals how genetic programming can be used for record de-duplication. Many systems rely on the data integrity for offering high quality services that may be affected by the existence of near-replicas, quasi-replicas, or replicas entries in their repositories. So, there has been a huge effort from private and public organizations for developing effective methods for removing duplicates from...
This paper explores the use of mismatch condition in speaker variability applied to Automatic Speaker Verification (ASV) defined as a classification task to decide whether a proclaimed identity is true or not. This paper proposes to model mismatch conditions in speaker variability from session to another. It was shown that the speaker recognition accuracy deteriorates when there is an acoustic mismatch...
Network theory has been used for modeling biological data as well as social networks, transportation logistics, business transcripts, and many other types of data sets. Identifying important features/parts of these networks for a multitude of applications is becoming increasingly significant as the need for big data analysis techniques grows. When analyzing a network of protein-protein interactions...
A new model of hybrid cloud computing architecture based on cloud bus is proposed. The system is based on local private cloud, combined with one or more type(s) of public cloud(s). The internal structures of private cloud and public cloud are the same, including infrastructure and virtualization layer, cloud platforms layer, cloud bus layer, cloud application layer, the management center and storage...
In this paper, we introduce a refined Educational Data Mining approach, which refrains from explicit learner modeling along with an evaluation concept. We use a Data Mining technology, which models students' learning characteristics by considering real data instead of deriving their characteristics explicitly. It aims at mining course characteristics similarities of former students' study traces and...
With the demand driven of Web-Based security and the privacy protection for sensitive information, the research on Fine-Grained mandatory access control for data resources in database is getting more attention. A Fine-Grained access control model with security label features (SL-FGAC) is proposed. The data resources are divided by granularity at least on column-level and record-level, where the record-level...
The skyline operation is a typical Multicriteria Decision Making (MCDM) that has been well studied in database context. The basic assumption of convention-al skyline operator is preference-ordered values within multi-dimensional decision tables. This assumption utilizes preference-ordered values to simplify the complex human preference, which is subject to big challenges in real applications. In this...
Nowadays, the exploding number of functionally similar Web services has led to a new challenge of selecting the most relevant services using quality of service (QoS) aspects. Traditionally, the relevance of a service is determined by computing an overall score that aggregates individual QoS values. Users are required to assign weights to QoS attributes. This is a rather demanding task and an imprecise...
Distributed network security assessment system is used for enterprise network security management needs. Fast, efficient enterprise network security assessment, complete control of enterprise network security state is the current hot topic. The paper points out that the current system of distributed network security assessment have deficiencies on communication and scheduling efficiency, and put forward...
Design pattern is a way of solution building on the common or recurring problems in software design, which can be combined with Unified Modeling Language (UML) to create a system framework. The UML is a semi-formal language which semantic part is described by natural language. So it will produce semantic inconsistency problem in the modeling process. Therefore, this paper proposes an object called...
Keyword search over databases, popularized by keyword search in WWW, allows ordinary users to access database information without the knowledge of structured query languages and database schemas. Most of the previous studies in this area use IR-style ranking, which fail to consider the importance of the query answers. In this paper, we propose \cirank, a new approach for keyword search in databases,...
Bottom-up visual saliency can be computed through information theoretic models but existing methods face significant computational challenges. Whilst nonparametric methods suffer from the curse of dimensionality problem and are computationally expensive, parametric approaches have the difficulty of determining the shape parameters of the distribution models. This paper makes two contributions to information...
The Model-Driven Software Development approach is becoming widely used as powerful model-driven tools are becoming available for the developer. Yet, it is not suitable to model, and therefore to generate the code, for all the aspects handled in the development stage. As a result, MDSD is not as widely used as it could. This paper presents a technique that extends the capabilities of Model-Driven Engineering...
Citizen Engineering (CE) is a concept that engages a cohort of physically dispersed citizens connected by the Internet to collaboratively solve real-world problems through massive cooperation. With advances in information technology, we can build transformative cyber-infrastructures to effectively leverage the ''wisdom of crowds''. Regarding the citizen engineers who function as main contributors,...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.