The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the advent of e-commerce, there are hundreds of websites being deployed and each site offers millions of products. This means that a substantial amount of information is being provided by these websites which cause the problem of information overload and in turn results in reduced customer satisfaction and interest. Recommender systems are designed to overcome such problems. They are intelligent...
In software development process, developers often seek solutions to the technical problems they encounter by searching relevant questions on Q&A sites. When developers fail to find solutions on Q&A sites in their native language (e.g., Chinese), they could translate their query and search on the Q&A sites in another language (e.g., English). However, developers who are non-native English...
The growing crime rate of any country is always one of the biggest obstacles to its growth and development. With more manpower it certainly helps to keep the crime rate at bay, but is manpower the ideal solution? No. This may come as a surprise that despite Big Data being the boom of the century is yet to take firm roots when it comes to helping solve a Criminal Investigation. With the aim of changing...
This paper gives details about web-based department automation system which will be implemented at educational institution level for maintaining faculty details and records. The proposed application aims at providing efficient and hassle-free working environment for faculty of the organization as it reduces the amount of paperwork involved. This system is based on the modern approach of data mining...
Undoubtedly, Cloud computing is the ongoing trend that robbed the widespread concern. In fact, it succeeded in discharging users from computational and storage burden to offer them as services following pay-as-you-go principle. The substantial feature of Cloud is the ability to scale up with the rise of users' demands. However, Cloud performance falls into the duty of scaling up to fulfill the user...
Association Rule Mining is the most powerful technique in data mining. Generation of rule involves two phases where first phase finds the frequent itemsets and second phase generates the rule. Many algorithms are specified to find frequent item set from the sequential patterns. There are mainly two approaches for finding frequent item sets. First approach is with candidate sequence generation i.e...
Frequent subgraph mining (FSM) may be a crucial task for beta data analysis on graph data. Over the years, several algorithms area unit planned to resolve this task. These algorithms assume that the knowledge structure of the mining task is tiny enough to suit inside the most memory of a computer. However, as a result of the real-world graph data grows, every in size and quantity, such academic degree...
Recommender systems are proven to be valuable in course of time. From the development of web and ecommerce, the amount of online information has grown rapidly, which produces the big data analysis problem. Conventional recommender systems undergoes through scalability and inefficiency problems in processing of big data. Besides, most of existing recommendation systems present the same static ratings...
High volumes of a wide variety of valuable data can be easily collected and generated from a broad range of data sources of different veracities at a high velocity. In the current era of big data, many traditional data management and analytic approaches may not be suitable for handling the big data due to their well-known 5V's characteristics. Over the past few years, several systems and applications...
With the rapidly growth of technology, used Internet become an important part in human life it used in many sectors of society, communicating over global network, sending or receiving sensitive data is risk because different techniques are used by attackers to intercept and exposed data. As a result, strong security technique is required to guaranteeing the user data. Many methods proposed to improve...
Meeting is a gathering of people to exchange information and plan joint activities for achieving a goal through verbal interactions. In a good meeting, participants' ideas are heard, decisions are made through discussions and activities are focused on desired results. The challenging part is to mine the most relevant interaction pattern from the meeting. Tree structures are not able to capture all...
Recently Lu et al. proposed a modified anonymous two-factor authenticated key exchange protocol to eliminate the security weaknesses of Xie et al.'s scheme. They hence claimed that their scheme is immune to possible well-known attacks. However, we found that Lu et al.'s protocol is still insecure against the outsider attack, user impersonation attack, and off-line password guessing attack. To overcome...
The opinion mining is very much essential in e-commerce websites, furthermore advantageous with individual. An ever increasing amount of results are stored in the web as well as the amount of people would acquiring items from web are increasing. As a result, the users' reviews or posts are increasing day by day. The reviews toward shipper sites express their feeling. Any organization for example,...
Cryptocurrencies have emerged as important financial software systems. They rely on a secure distributed ledger data structure; mining is an integral part of such systems. Mining adds records of past transactions to the distributed ledger known as Blockchain, allowing users to reach secure, robust consensus for each transaction. Mining also introduces wealth in the form of new units of currency. Cryptocurrencies...
Apple claims that iPhone 6, which is equipped with iOS 8.0 and later version, is secure enough to prevent a user's private data from law enforcement or malicious intruders. In pre-iOS 8.0 operating systems, a user's data were only encrypted by hardware-based keys, which can be obtained by Apple. But in iOS 8.0 and later version, the private data on the iPhone are protected by a secret key that is...
Many colleges have accumulated a large amount of information, such as achievement data and consumption records. According to the above information, we attempt to identify the student group from various aspects. Given this, we can acquire the characteristics of students in different groups. In this way, the college can have a better understanding of students to accomplish the reasonable management...
Object errors affect the time cost and effectiveness in uncertain data clustering. For decreasing the time cost and increasing the effectiveness, we propose two mechanisms for the centroid based clustering, UKmeans. The first mechanism is an improved similarity. Similarity is an intuitive factor that immediately affects the time cost and effectiveness. For example, similarity calculations with integration...
Algorithms for mining very large graphs, such as those representing online social networks, to discover the relative frequency of small subgraphs within them are of high interest to sociologists, computer scientists and marketeers alike. However, the computation of these network motif statistics via naive enumeration is infeasible for either its prohibitive computational costs or access restrictions...
In this paper, we aimed to guide about latest development and studies about students' performance analysis and Learning Analytics in Massively Open Online Courses (MOOCs) for researchers related with the topics. For this purpose short review for usage of performance prediction and Learning Analytics in MOOCs is investigated In our study, to help readers get familiar with our topic, firstly literature...
Recent studies show structured atomic event information is beneficial to represent the discourse semantic. However, extracting useful structured representation of events from open domain is a challenging problem. On one hand, previous event extraction methods on special domain, cannot be directly used for open domain because of domain limitation and predefined event pattern. On the other hand, atomic...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.