The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Migraine is a common disease throughout the world. Not only does it affect the life of people tremendously, but it also leads to high costs, e.g. due to inability to work or various required drug-taking cycles for finding the best drug for a patient. Solving the latter aspect could help to improve the life of patients and decrease the impact of the other consequences. Therefore, in this paper, we...
Educational Data Mining is a prominent area to explore information in educational fields using data mining algorithms. In this paper we have used few learning algorithms to effectively rate the faculty belonging to an educational institute on the basis of feedback submitted by the students. Our proposed model uses sentimental analysis and machine learning classifier algorithms for capturing the emotions...
In many real life situations end results and basic starting data are known. To deduce conclusive evidence or to build holistic picture one needs to find out hidden information and missing text. This research paper delivers a novel algorithm (Probabilistic Intent-Action Ontology and Tone Matching Algorithm) to map multiple events on time line by determining their interdependency to predict the most...
The importance of data security and confidentiality increases day by day, since for most companies and organizations data remains as the most important asset. Standard database security measures like access control mechanisms, authentication and encryption technologies are of little help when it comes to preventing data theft from insiders. By incorporating intrusion detection mechanisms, we can improve...
Pattern extraction is one of the major topics in Knowledge Discovery. Out of numerous data mining techniques we propose to use a new approach: Formal Concept Analysis (FCA) together with Graph Databases with the implementation Neo4j. FCA is a prominent field of applied mathematics using maximal clusters of object-attribute relationships to discover and represent knowledge structures. The use of FCA...
No Evidence of Disease (NED) is breast cancer patient condition status which it indicates that they can life, no find the cancer by tested, and without any symptoms of cancer in period of times, after they received primary treatment. NED is a critical status, because it involves the treatment type and patient cancer condition factors. This paper examines about breast cancer problem in data mining...
In previous works we have presented Cross Motif Search (CMS), a MP/MPI parallel tool for geometrical motif extraction in the secondary structure of proteins. We proved that our algorithm is capable of retrieving previously unknown motifs, thanks to its innovative approach based on the generalized Hough transform. We have also presented a GUI to CMS, called MotifVisualizer, which was introduced to...
Recent developments in the storage of system data in the Navy's data repository, LEAPS, using the FOCUS product meta-model have opened the doors to graph-theory applications in the design of Navy ship systems in the early stages of design. In this paper, we demonstrate the ability to extract graphs from ship data and present pertinent applications of such graphs including a vulnerability metric for...
Electronic health record (EHR) serves to capture the patients' medical conditions and detailed visits information. The structured part of EHR can be used to serve administrative and financial management of patients. However, the unstructured part, that contains the interventions applied to the patient and transcribed in textual format, have unexplored knowledge due to the narrative format. Unlike...
In recent years, personal genomic data can be quickly generated in an affordable price. Abundant research results on genetic diseases have also been published in the past two decade. Therefore, it is desired to utilize updated genetic disease research results into personal genomic data analysis and apply them into genomics-based personalized healthcare. However, this is a challenging task for current...
Neuroscience researchers have a keen interest in finding the connection between various brain regions of an organism. Researchers all across the globe are finding new connections everyday and it is very difficult to keep track of all those, so it is important to create a centralized system which is able to give the relation between brain entities. Databases like PubMed contains abstracts and references...
Indonesian text data from social media is one of large text data that interesting to be mined. Mining the insight knowledge from large text data need more effort and time to processed. Moreover, Indonesian text data from social media contains natural language, including slang that require special treatment. We propose incremental technique for more efficient mining process of large text data with...
The authors discuss the problem of distributed knowledge acquisition for the construction of complete and consistent knowledge bases in integrated expert systems, in particular dynamic integrated expert systems, via sharing of knowledge sources of different topologies (databases as electronic media, experts and problem-oriented texts). This work is focused on models and methods of distributed knowledge...
In this paper, automatic speaker verification using normal and whispered speech is explored. Typically, for speaker verification systems, varying vocal effort inputs during the testing stage significantly degrades system performance. Solutions such as feature mapping or addition of multi-style data during training and enrollment stages have been proposed but do not show similar advantages for the...
In this paper, we propose a cost function that corresponds to the mean square errors between estimated values and true values of conditional probability in a discrete distribution. We then obtain the values that minimize the cost function. This minimization approach can be regarded as the direct estimation of likelihood ratios because the estimation of conditional probability can be regarded as the...
The system from the point of view, follows the principles of the software engineering of. Net framework and ASP web design technology, data mining technology, the XML data description and manipulation techniques in legal business training system application, using the prototype method and object-oriented system analysis method, a comprehensive analysis of the legal practice teaching business functional...
Along with the popularity of the internet, contents inside web databases also increase quickly. These data, hidden behind the query interfaces, are called deep web. These contents normally are not collected by the search engines. Many deep web contents related applications, like contents collection, topic-focused crawling, and data integration, are based on understanding the schema of these query...
In this study, we present a method for extracting and representing knowledge of presentation slide creators based on the slide contents that are published on a slide sharing service. The proposed method regards the number of views, downloads, and likes from other users as the users rating for a presentation slide, and extract knowledge of the slide creator in terms of the usefulness and knowledge...
In order to extract useful information from massive data, the researchers proposed data mining technology, one of the most critical technology is clustering analysis technology. In this paper, an improved clustering algorithm based on shared nearest neighbor is proposed for the existing shared clustering algorithm, and the improved algorithm is applied to fingerprint localization. The algorithm reduces...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.