The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we have proposed a novel mechanism to discover interests of authors taking into account the meaning of their publications words. For this aim, we have used Bayesian network and WordNet. WordNet is used for determining for each publication the different synsets of its words and its hypernyms (this list of concepts is considered as the possible topics of this publication). Bayesian Network...
As a member of the European Union, Hungary face different challenges, of which the most important are the transformation of the healthcare system, the Social Security and pension system and the system of taxation. These economic and social challenges require long-term governmental strategies, which should be modelled, tested, verified in some way. It is for this challenge that we find an efficient...
In this paper, we mainly study the approximate discrete-time model for stochastic nonlinear systems with Markovian switching (SNSwMS). The consistency condition between the approximate discrete-time model and the exact discrete-time model of systems is discussed and analyzed. Then, the quantitative relationship between the bound of the model error in mean square and the initial value and sampling...
This article aims to describe, in brief, the formation process of the Pedagogical Standard for the Analysis of Virtual Learning Environments. This Standard is a tool that is intended to aid subjects in the process of choosing a particular Virtual Learning Environment through an analysis including the pedagogical aspects of these environments. The qualitative approach was adopted in the methodological...
Recent research on Big Data proposed and evaluated a number of advanced techniques to gain meaningful information from the complex and large volume of data available on the World Wide Web. To achieve accurate text analysis, a process is usually initiated with a Text Classification (TC) method. Reviewing the very recent literature in this area shows that most studies are focused on English (and other...
The variation of spontaneous speech is much larger when compared to the planned speech because of speech disruption and a lot of ambiguities in conversations. These events cannot be properly evaluated during search and decoding in speech recognition systems and various errors occur in the output hypotheses. One possible solution is to include filled pauses and disfluent events into the training data...
Failure mode, effects analysis (FMEA) is widely recognized and applied in different fields, such as aviation, aerospace, automotive industries. And later FMEA has been extended to other industries, such as electronics, medical and so on. For key products, FMEA is an indispensable part in reliability analysis. However, many products are newly researched and developed, with high integrated level and...
The problem which companies want to face is the integration of the applications in an information system (IS) and the interconnection of the system itself with other information systems. The interoperability of IS constitutes, their ability to communicate and to inter-operate following a given model using a common language favoring the sharing of information for better performance and profitability...
This paper intends to enhance the simple interrogative sentence analysis , which leads question answering system to understand ”What is this question asking?”.[ Methods]Under the condition that simple interrogative sentence analysis is regarded as a sequence labelling problems, Conditional Random Field (CRF) model can process it well. [Results] Few manual label can lead to promoted result. [Limitations]For...
Predicting memory occupancy during the execution of large-scale analytical workloads becomes critical for in-memory databases. In particular, probabilistic performance measures for such systems are of interest, but difficult to model with analytical methods due to the highly variable threading levels in corresponding workloads. Since literature with queueing theoretic background largely ignores the...
Manually developing analytic performance models of operational systems can be challenging, time consuming, and costly. This paper describes a method that uses system logs and configuration files to automatically derive analytic performance models of operational systems. The method described here automatically determines: (1) the system software servers, (2) the system devices, (3) the deployment of...
A new automatic discrimination technique of various types of boat noise pulses and the dolphin clicks was developed for the evaluation of the boat traffic/noise effect on the dolphins' migration behavior. To make the automatic discrimination method work for general use, considering the ICI (Inter-Click Interval) and CF (Centroid Frequency) characteristics of the boat noise pulses and the dolphin clicks,...
Through the processes set out by Learning Analytics, this paper describes a decision making model which supports the managers of higher education institutions at the moment of making academic decisions. In the analysis and requirements phase, the importance of creating and categorizing indicators is presented in detail, thereby facilitating the finding of hidden patterns in the educational information...
With the development of internet, the network connection between Industrial Control System (ICS) and public internet has been becoming more and more closely. What's more, the traditional IT system attacks have been spread to ICS and become more frequently. However, the traditional security analysis of IT system is not enough to be applied to ICS. In this paper, we present a tool called Attack Path...
Frequent pattern mining is an important data mining task. Since its introduction, it has drawn attention from many researchers. Consequently, many frequent pattern mining algorithms have been proposed, which include level-wise Apriori-based algorithms, tree-based algorithms, and hyperlinked array structure based algorithms. While these algorithms are popular and benefit from a few advantages, they...
Nowadays, the methods and tools of the 3D technology and human body modeling are developed rapidly, learning and analyzing 3D body scans will accelerate the development of 3D modeling. In this research, a novel algorithm using intersection views is proposed for retrieving 3D body scans. An Asian Female Body Scan (AFBS) database is established by analyzing various 3D body scan data at first, and then,...
People with social communication difficulties tend to have superior skills using computers, and as a result computer-based social skills training systems are flourishing. Social skills training, performed by human trainers, is a well-established method to obtain appropriate skills in social interaction. Previous works have attempted to automate one or several parts of social skills training through...
This paper describes large-scale full-wave analyses of electromagnetic fields using numerical human body models. Recently, medical equipment using electromagnetic fields including hyperthermia is spreading. During treatment, it is effective to focus the electromagnetic field onto the lesions inside the human body. The purpose of this research is to accurately calculate the electromagnetic field inside...
In companies from retail banking or telecommunication sector are continually developed information systems (IS). The core of these IS resides in efficient and elegant usage of database tools. In this paper we present a new approach of analyzing database objects with DB Object Mapper Tool that is being developed for mapping objects from large and complex database systems. The term “object” in this...
When a data holder wants to share databases that contain personal attributes, individual privacy needs to be considered. Existing anonymization techniques, such as l-diversity, remove identifiers and generalize quasi-identifiers (QIDs) from the database to ensure that adversaries cannot specify each individual's sensitive attributes. Usually, the database is anonymized based on one-size-fits-all measures...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.