Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
In recent years, the State Grid has built amounts of business systems, e.g. OA, marketing and MIS systems. And it gradually developed into big data. However, with the construction of information increasingly deepening and a sharp increase of data volume, new challenges and inconvenience have been brought out for data seekers. In this paper, an architecture model of data integration in power field...
Nowadays, the attacks on the Internet are becoming more complex, advanced and concealed. A large number of security threats arise. The signature-based detection technology is efficient and simple which is widely used for malicious codes detection system. In this paper, we firstly focus on the principle of the method, and summarize the specific steps to implement it, especially feature extraction,...
Data analysis plays an indispensable role in the knowledge discovery process of extracting of interesting patterns or knowledge for understanding various phenomena or wide applications. Visual Data Mining is further presenting implicit but useful knowledge from large data sets using visualization techniques, to create visual images which aid in the understanding of complex, often massive representations...
The next technological disruption in the field of Internet of Things (IoT) is the predictive analytics on IoT. The predictive analytics on IoT not only helps us in achieving the goal of smart IoT devices but also reduces the time required to configure the IOT appliances. The branch of predictive analytics came into existence very recently after extensive research in the field of Data Analytics. Although...
In this digital world, we are facing the flood of data, but depriving for knowledge. The eminent need of mining is useful to extract the hidden pattern from the wide availability of vast amount of data. Clustering is one such useful mining tool to handle this unfavorable situation by carrying out crucial steps refers as cluster analysis. It is the process of a grouping of patterns into clusters based...
In this paper, we present an application designed to analyze news articles from Romanian mass media and extract opinions about political entities relevant to the major political stage. The application was created with the desire to study media polarization around important political events, such as legislative or presidential elections. The application uses different crawlers to extract the data from...
In this paper, we addressed in social network visualization for people's interest in music. This visualization system designed for interest in music on social networks provides several capabilities: (A) visualization for friends who share the same interest in music, (B) to group people who share the same interest in music into categories, and (C) to recommend songs function for an increase in the...
The back-end database is pivotal to the storage of the massive size of big data Internet exchanges stemming from cloud-hosted web applications to Internet of Things (IoT) smart devices. Structured Query Language (SQL) Injection Attack (SQLIA) remains an intruder's exploit of choice on vulnerable web applications to pilfer confidential data from the database with potentially damaging consequences....
Oriented graphs belong to a part of Mathematics - Combinatorics called Graph Theory. One of the fundamental terms here is a tree. The tree structures have widespread use not only in Mathematics. They can be used in Decision Theory as data mining tools as well. In the present paper we point out to the use of decision trees as models for financial services, namely, by credit scoring, fraud and churn...
Development of a computer system integrating modern bio- and chem-information, and cognitive technologies, such as hybrid production-frame knowledge representation, neural networks, and graph databases. The project intends to provide intellectual analysis and rational selection for the synthesis parameters of antifungal drug preparations that is possible to create through synthesis or chemical modification.
Intrusion detection in computer networks is a important topic in information security. Due to numerous cases of security breaches that caused economic and social losses in recent years, this topic has been the subject of several studies in order to mitigate problems related to network intrusion and computer attacks. Information security systems have been using different techniques for network intrusion...
Due to advances in medicine, the societies have become aging, which leads to the problem of missing teeth. Missing teeth negatively affects not only external appearance but also personal dietary habits. Therefore, it has become an important issue in dentistry to solve the problem of missing teeth. In Taiwan, dental prostheses for missing teeth are produced by dental technicians in dental laboratories...
Nowadays, in the period of the digitalization and knowledge economy development, majority of activities result in the increase of data that should be captured. In each area of business, there is an increasing urge to extract the knowledge from data in a timely manner in order to be able to make shifts that ensure a competitive advantage. Thus, the knowledge of methods and techniques of big data processing...
In today's world virtual online educational platforms emerge literally on daily bases and many offer MOOC-based courses. With the appearance of MOOC, educational platforms have gained an additional boost, a new aspect in their evolutionary process, which has opened a new field of research thanking to the extraction of logging information within the frames of data mining. It has become clear that educators...
Web data acquisition is the foundation of Web data mining. Web crawler is an important tool for Web data acquisition, but the frequent updates of Web data structures, data sources and distribution channels, resulted in high costs of crawler program development and maintenance. In order to solve this problem, this paper designed and implemented an intelligent dynamic crawler, which stored the data...
Sharing outsourced data between owners and data mining experts is becoming a challenging issue in biomedical and healthcare fields. Watermarking has been proved as a right-protection mechanism that can provide detectable evidence for the legal ownership of a shared dataset, without compromising its usability. However, the main disadvantage of these conventional techniques is unintelligent, rule-based...
In education system, students' feedback is important to measure the quality of teaching. Students' feedback can be analyzed using lexicon based approach to identify the students' positive or negative attitude. In most of the existing teaching evaluation system, the intensifier words and blind negation words are not considered. The level of opinion result isn't displayed: whether positive or negative...
Our aim is to evaluate fundamental parameters from the analysis of the electromagnetic spectra of stars. We may use 103–105 spectra; each spectrum being a vector with 102–104 coordinates. We thus face the so-called “curse of dimensionality”. We look for a method to reduce the size of this data-space, keeping only the most relevant information. As a reference method, we use principal component analysis...
The Unified Modeling Language (UML) is widely taught in academia and has good acceptance in industry. However, there is not an ample dataset of UML diagrams publicly available. Our aim is to offer a dataset of UML files, together with meta-data of the software projects where the UML files belong to. Therefore, we have systematically mined over 12 million GitHub projects to find UML files in them....
The paper explains an approach that tries to predict the gestational diabetes of the patient using association rule mining. We address the basic risk factors in Gestational Diabetes Mellitus of pregnant ladies leading to abnormality in delivery and post and pre-delivery conditions. The existing approaches deal with social economy conditions of the GEM patients. Medical examinations records can be...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.