The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In multiple studies, various implicit and explicit feedback types were used to quantify document quality and to identify user's interest in document content on both document and sub-document level. In this study we use eye movement data retrieved while reading a document to identify sections, user is most interested in. We describe multiple patterns in eye movement of users reading documents that...
Persistency of genomic data brings many research challenges. Among them, alternatives to the commonly used relational database systems should be evaluated, to deal with large volumes of data, in particular writing operations and specific modelling issues. In this paper, we present a NoSQL approach to treat genomic data (Cassandra database system), and evaluate both persistency and I/O operations in...
With development of Multicore clusters the taskscheduling problem in heterogeneous cluster has become hot point of research. The method to solve this problem in Cloud computing is virtualization, which can make the heterogeneous nodes being isomorphic and then using MapReduce model for task scheduling in isomorphic nodes. But the approach has some shortcomings: virtualization itself will cause the...
Social network like a corpus with valuable data, has attracted much attention from a various fields of researchers in recent years, especially in the subject of big data analytics. However, as the foundation, the part of efficient and accurate data collection has not been focused much in the past published works. During the data among the web increasing rapidly, this article will identify two major...
Modern enterprise computer networks rely on centrally managed authentication schemes that allow users to easily communicate access credentials to many computer systems and applications. The authentication events typically consist of a user connecting to a computer with an authorized credential. These credentials are often cached on the application servers which creates a risk that they may be stolen...
Gamification — the use of game design elements in non-game contexts — has seen rapid adoption in various areas in recent years. Its application in education is particularly promising, due to its potential to shape user behavior in desirable directions through increasing user motivation and engagement. This work-in-progress paper presents a course gamification platform aimed at supporting instructors...
Learner's knowledge assessment is very important in the e-learning system. Knowledge assessment is effective for knowledge gap discovery. Knowledge gap, Causes the learners do not understand educational content correctly. This paper presents a new method for learner's knowledge modeling based on knowledge gap discovery for concepts of educational content. There are two methods for learner's knowledge...
Due to the popularity and development of computer science, the connection between computer science and other disciplines became closer. The multidisciplinary crossing centered on computer science is gradually formed. Computer has unparalleled advantages in calculation, modeling, simulation and so on. It makes computer science hold a significant position in other disciplines. How to make students better...
In this paper, we propose a model which can measure players' interest in visited places based on visiting time and we apply the model to a typical location-based game. The results in the conducted experiments show that our model works well in both simulation and a real game and that it outperforms an existing model.
A Layered Hidden Markov Model (LHMM) has been usually used for recognizing various human activities. In such a LHMM, the performance tends to be improved than that of a single layered HMM. To further enhance the performance of such a LHMM, in this paper, we propose a brain-inspired feedback mechanism. For this achievement, the LHMM is first modeled using a set of training data that the semantic information...
Web log mining is the most important method in Web data mining, and data preprocessing is the primary work. In order to find more value access mode and reduce the data size from the Web, find the data of users and even between users, this paper puts forward a method of Web log data preprocessing based on user characteristic of interests, and then put forward some concepts such as user interest, user...
The network traffic generated by a computer, or a pair of computers, is often well modelled as a series of sessions. These are, roughly speaking, intervals of time during which a computer is engaging in the same, continued, activity. This article explores a variety of statistical approaches to re-discovering sessions from network flow data using timing alone. Solutions to this problem are essential...
In this paper, the main idea is to establish IoT structure for ubiquitous communications. This structure has been made by data type modelling. Type modeling is useful to construct homogeneous computational pattern. A design cycle has been introduced here. This cycle is a wizard to cluster and insert computational nodes. For IoT intentions, data that should be transmitted to the higher protocol layer,...
One of the most crucial components of modern Information Technology (IT) systems is data. It can be argued that the majority of IT systems are built to collect, store, modify, communicate and use data, enabling different data stakeholders to access and use it to achieve different business objectives. The confidentiality, integrity, availability, audit ability, privacy, and quality of the data is of...
We have been developing a new type of visualization software called "Fusion Visualization". It allows users to fuse latest volume to legacy surface rendering. This ombination makes users enable to select the best rendering technique according to the data size and the network speed if the data transfer is needed. This development was tarted on October 2012 as a project sponsored Japan Science...
With cloud computing and storage services, data is not only stored in the cloud, but routinely shared among a large number of users in a group. In this paper, we propose an oriented group provable data possession in public cloud and shared among a large number. We utilize group key agreement key as the foundation of the homomorphic authenticator, which enable any member of the group can verify data...
Cloud database usually refers to a database based on the cloud computing technology. However, as far as we know, pre-existing solutions of cloud database cannot integrate the data from multi-sourced heterogeneous databases, only supplying an isolated homogeneous database cluster. This paper presents a new implementation approach for cloud database: Sea Base, which integrates various data types into...
In order to quickly determine the distribution of anomaly detection model based on small amounts of collected data, the moving relative entropy density deviation method (MREDD) is introduced to test the power series distributed random sequence. Through the moving averages of data analysis and comparison, the anomaly detection models can quickly be established. Experimental results show that this method...
Factorization Machines [1, 2] is a new factorization model that can combine the merits of SVM model with matrix factorization models. It can model all the interactive actions using factorized parameters. So it could mimic most other matrix factorization models by feature engineering. Due to the superior flexible, Factorization Machines has already been widely used in many recommended algorithm competitions...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.