The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Taking care and maintenance of a healthy population is the Strategy of each country. Information and communication technologies in the health care system have led to many changes in order to improve the quality of health care services to patients, rational spending time and reduce costs. In the booming field of IT research, the reach of drug delivery, information on grouping of similar drugs has been...
This paper presents die storage improvement for a case study company, who is a manufacturer of made-to-order paper packaging product. One of the critical equipment used to produce paper packaging is the dies used in die cutting machine. These dies are stored in the separate storage room and they are placed on any available shelf slot. Due to the wide variety of product design, number of die stored...
Trait is a particular characteristic that can produce a particular type of behavior. The email which is written communication medium among the people is the source, to identif1y the writing traits of the person. This paper proposes a novel approach to identify the writing traits of person from their email communication. The proposed technique is combination of an unsupervised k-means clustering algorithm...
Most personal computers are underutilized in most time. Collaborative cloud computing (CCC) is an emerging paradigm, which can organize and integrate these idle computing or storage resources scattered around the world. In this paradigm, due to individual capacity limitation, multiple participants (nodes) need to cooperate with each other to complete complicated tasks. Considering the heterogeneities...
Roles have turned into the de facto standard for access control in enterprise identity management systems. However, as roles evolve over time, companies struggle to develop and maintain a consistent role model. Up to now, the core challenge of measuring the current quality of a role model and selecting criteria for its optimization remains unsolved. In this paper, we conduct a survey of existing role...
HyperLogLog Counting is widely used in cardinality estimation. It is the foundation of many algorithms in data analysis, commodity recommendation and database optimization. Facing the large scale internet business like electronic commerce, internet companies have an urgent requirement of distributed real-time cardinality estimation with high accuracy and low time cost. In this paper, we propose a...
Being directed against the bottleneck assignment problem in operational research, a new method called Matrix Elimination Method based on cost matrix transformation is proposed, and an example analysis is used to prove the validity of the algorithm and the resolution is optimal substructure, moreover, the method is illustrated more efficient than other methods by comparison.
Social networks have been popular platforms for information propagation. An important use case is viral marketing: given a promotion budget, an advertiser can choose some influential users as the seed set and provide them free or discounted sample products; in this way, the advertiser hopes to increase the popularity of the product in the users' friend circles by the world-of-mouth effect, and thus...
Online forum provides a popular platform for users to communicate and share experiences. Comparing to the social networks which require users to register with their real identities, online forum has no such requirement which makes its users more willing to speak the truth. Unfortunately, the anonymity makes online forum more likely to be abused by malicious users. Internet water army is a typical...
In our paper we overview methods and tools within traditional, semi-automatic, and automatic approaches towards evaluation of website usability, which continues to gain in importance since the major search engines intensify its consideration it their results rankings. We note certain persisting ambiguities in usability conceptualization for quantitative measurement and a certain gap between its more...
The citation network is the social network made up of papers and their citation relationships. A key task of the citation network is to find influential papers in the network. Traditional properties such as centralities can not reflect the influence of papers comprehensive, since it does not take the authority of the paper and the transfer effect into account. Other algorithms such as PageRank and...
Proliferation of web as an easily accessible information resource has led many corporations to gather competitor intelligence from the internet. While collection of such information is easy from internet, the collation and structuring of them for perusal of business decision makers, is a real trouble. Text clustering based topic identification techniques are expected to be very useful for such application...
Demand side management(DSM) is one of the most important concepts in present restructured market, which tries to maximize benefits for both suppliers and consumers. DSM could be implemented in two ways: model-driven and data-driven methods. in the first case, a model is provided by using dataset related to previous records and in the second case, analysis is done by real-time data. In this way, energy...
The Indian Stock market, with over 5000 listed companies, where sorting of companies requires analysis of numerous financial parameters and ratios, is an example of a database from which single sub set or group of companies need to be found out for investing. With growing popularity of artificial intelligence in stock trading, it has been applied heavily into stock market for picking stocks. We apply...
In the situation that 4PL takes the logistics task of many supply-demand pairs, in order to provide efficient and timely logistics services, the problem of 4PL many-to-many network design with delivery time considered is studied. An optimization model is formulated, which minimizes the total logistics costs with the delivery time of the supply-demand pairs satisfying the required value. According...
It is well known that excessive intelligence is mandatory in military procedures, in companies to know about competitors, as well as in markets to decide where to invest in. However, this information is not always fully reliable since it might be given by others with conflicting interests. Consequently, there is no guarantee that the supplied information has not been maliciously crafted to produce...
The income of telecommunication companies depends on the accurate analysis of customer behavior, on subsequent adaptation of the company to the technological advances in the competitive GSM market, and on marketing new products and services. However, the analysis of sensitive customer data outside these companies is problematic, as it is not usually possible to get informed consent of the customers...
This study demonstrates how to extract essential information from a set of financial and non-financial business indicators, leading to a better understanding of company performance. The use of Rough Set Theory and the Dominance principle associated with the probabilistic relationship between conditions and decisions in decision algorithms, is justified by the possibility of there being uncertain data...
XMART is a retail company that has sold more than 5,500 products. The company intends to increase sales of products with a promotion. XMART has a history of sales up to more than 10,000,000 records. The data can then be processed with the technique used association rules by applying a priori algorithm to obtain the value of the support and confidence of every association rules. The association rules...
The seismological acquisition and processing at the Egyptian National Seismic Network (ENSN) is a fully automated network system dedicated to the digital acquisition and real-time processing of seismological data. Data are digitized at a sampling rate of 100 samples per second with a High Resolution Digitizer (HRD) or Trident Digitizer from NANOMETRICS. A new algorithm is proposed for the digitized...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.