The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
As smartphones are going universal, the quantity of downloaded applications is rocketing. How to classify applications by page has been the major concern facing users. However, most cellphone-related designs are at the service of young generations, ignoring middle-aged groups who use cellphones at increasingly higher frequencies. This study, through literature review, focused on three paging styles...
We develop T2API, a context-sensitive, graph-based statisticaltranslation approach that takes as input an English description of aprogramming task and synthesizes the corresponding API code templatefor the task. We train T2API to statistically learn the alignmentsbetween English and APIs and determine the relevant API elements. Thetraining is done on StackOverflow, which is a bilingual corpus onwhich...
Feature-oriented software development (FOSD) has recently emerged as a promising approach for developing a collection of similar software products from a shared set of software assets. A well-recognized issue in FOSD is the analysis of feature interactions: cases where the integration of multiple features would alter the behavior of one or several of them. Existing approaches to detecting feature...
Given a current point, a final destination, and visiting data point categories on a trip, a sequenced route query finds the shortest route which meets the query condition. Several algorithms have been proposed targeting to this query. When this query is used in real applications, the popularity of the visiting points (for example, restaurant, shopping center, etc.) in a trip are also important besides...
While wearable devices have been the buzzword inthese days, they are still in the infant market stage. Thoughdemand for wearable devices has skyrocketed, the early abandonmentof devices become an important issue. Many studiesexamine the usage of wearable devices with user survey. However,it is essential to look at the real behavior of wearable users howand why wearable users enjoy or abandon devices...
In this paper we mainly introduce a method for mathematical formula script and type identification based on handcrafted features. Arabic/Latin scripts are discriminated by detecting specific symbols based on their pixel density and distribution. Once the formula script identified, we proposed to separate between machine-printed and handwritten formulas. For that, we analyzed the spaces between some...
Car automation and surveillance is an escalating trend in this decade. Smart Vehicle security is becoming an indispensable need as it makes it easier for the owners to ensure their automobile's safety wirelessly. The core elements in our system consists of a mini central processing unit, motion detecting sensor accompanied with a camera module and buzzer. Our security network can be used to monitor...
Authorship analysis deals with the identification of authors which is a problem of text data mining and classification. There are numerous techniques and algorithms that have been published so far, in the field of stylometry. In this regard, the primary objective of the present review is to provide the status of the different studies carried out on authorship analysis based on the important research...
Recruiters evaluate and filter job seekers, ranking them on various criteria. This includes how much of the required and desired requirements are satisfied, ensuring the candidate is the “best match” to vacancy. However, most vacancies do not classify the set of skills as required and desired explicitly. Required skills are those skills a job seeker must have in order to be considered for the job...
Extreme Learning machines (ELM) and Support Vector Machines have become two of the most widely used machine learning techniques for both classification and regression problems of recent. However the comparison of both ELM and SVM for classification and regression problems has often caught the attention of several researchers. In this work, an attempt has been made at investigating how SVM and ELM...
Social networks have become a vital mechanism to disseminate information to friends and colleagues. But the dynamic nature of information and user connectivity within these networks raised many new and challenging research problems. One of them is the query-related topic search in social networks. In this work, we investigate the important problem of the personalized influential topic search. There...
Data exchange is the process of generating an instance of a target schema from an instance of a source schema such that source data is reflected in the target. The prevailing approach for data exchange is based on schema mappings, which are high level expressions that describe relationships between database schemas [1]. However, schema-mapping based data exchange techniques suffer from two problems:...
Exploiting additional item meta-data is proposed in this paper for solving data sparsity and cold start problems found in item-based collaborative filtering (CF) techniques, which are employed in recommendation systems. Additional item meta-data provides the foundation for generating a heterogeneous information network (HIN). The proposed approach is to enrich the item-based CF with diverse types...
Locating arrays provide combinatorial test suites not only for detecting the presence of an interaction fault but also for locating the fault. Compared with test suites for ordinary combinatorial testing, however, the fault locating capabilityentails a substantial increase in the size of test suites. In this position paper, we consider the problem: how small can locating arrays be? To answer the question,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.