The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we introduce Natural Language Processing to network management by leveraging the capabilities of Natural Language Processing tools, such as speech recognition and text parsing, to extract useful information to build network tasks. We propose an intermediate network-agnostic layer that acts as the medium between natural language input (spoken or written) and different network implementations...
Crime analysis is a methodical approach for identifying and analyzing patterns and trends in crime. With the increasing origin of computerized systems, crime data analysts can help the Law enforcement officers to speed up the process of solving crimes. Using the concept of data mining, we can analyze previously unknown, useful information from an unstructured data. Predictive policing means, using...
In this paper, we addressed in social network visualization for people's interest in music. This visualization system designed for interest in music on social networks provides several capabilities: (A) visualization for friends who share the same interest in music, (B) to group people who share the same interest in music into categories, and (C) to recommend songs function for an increase in the...
Context: A key issue when dealing with the generalization threat of software engineering experiments is to use different subject types. Objective: In this paper, we aim to investigate which subject types are used in experiments and their impact on results. Method: We have performed a systematic mapping study by manually searching experiments published from January 2014 to June 2016 in six leading...
App store reviews are currently the main source of information for analyzing different aspects of app development and evolution. However, app users' feedback do not only occur on the app store. In fact, a large quantity of posts about apps are made daily on social media. In this paper, we study how Twitter can provide complementary information to support mobile app development. By analysing a total...
Recently, numerous leakage-resilient cryptographic schemes have been proposed to resist side-channel attacks which adopt several properties resulting from practical implementations of cryptographic protocols/schemes to leak partial information of secret (or private) keys. Certificateless public key cryptography solves both certificate management problem in conventional public key cryptography and...
Microblogging and social networking sites have become a popular means of communication channels among internet users. They provide tools for people to voice their opinions. These sites contain vast amounts of opinionated data, leading to an increased growth in research on sentiment analysis and opinion mining. The study aims at using Twitter, a major and popular platform for microblogging and social...
It is attractive to extract and determine the key features of traffic patterns for mitigating road congestion and predicting travel time of vehicles in traffic analysis. Based on previous works that is a scalable approach via Hadoop MapReduce programming model, and can extract maximal repeats from a huge amount of tagged sequences, this paper adapts that approach to extract significant patterns of...
The requirement and expanding needs of bridging the physical and cyber world promote the emergence of a new global internet-based information architecture, the Internet of Things. The main challenge in Internet of Things is how to make fast and accurate decisions based on multi-modal sensing data. In this paper, we put human into the process and formulate a closed-loop computing paradigm for IoT data...
Nowadays, along with the development of information technologies, storage and analysis of biomedical datasets are easy in health sector. In this area, Machine Learning methods provide a great contribution for evaluation and interpretation of data. In this paper, in addition to Support Vector Machines, Decision Tree, K-Nearest Neighbors, Naive Bayes and Dictionary Learning methods, Random Feature Subspaces...
With the goal of helping software engineering researchers understand how to improve their papers, Mary Shaw presented "Writing Good Software Engineering Research Papers" in 2003. Shaw analyzed the abstracts of the papers submitted to the 2002 International Conference of Software Engineering (ICSE) to determine trends in research question type, contribution type, and validation approach....
Learning to use existing or new software libraries is a difficult task for software developers, which would impede their productivity. Much existing work has provided different techniques to mine API usage patterns from client programs inorder to help developers on understanding and using existinglibraries. However, these techniques produce incomplete patterns, i.e., without temporal properties, or...
Crime pattern theory emphasize how crime appear from Spatio-temporal method. To get knowledge on crimes, it has to be studied in terms of space and time. Crime patterns and crime related activities research those spatio (location) distribution of crimes, omitting the temporal (time) dimensions. Exactly separation of crimes by space and time, example hour of a specific day, day of a specific week,...
Authorship analysis deals with the identification of authors which is a problem of text data mining and classification. There are numerous techniques and algorithms that have been published so far, in the field of stylometry. In this regard, the primary objective of the present review is to provide the status of the different studies carried out on authorship analysis based on the important research...
Mining high utility itemsets from a transactional database refers to the discovery of itemsets with high utility like profits. Although a number of relevant approaches have been proposed in recent years, but they incur the problem of producing a large number of candidate itemsets for high utility itemsets. Such a large number of candidate itemsets degrades the mining performance in terms of execution...
In current times, there has been a surge in the amount of collected data from computational systems. The vast amount of data can be useful in many applications and fields, particularly so in Big Data Analytics. However with a large collection of data there is a difficulty discovering important information. Automatic Document Summarization (ADS) systems are suitable for the task of outlining useful...
Recruiters evaluate and filter job seekers, ranking them on various criteria. This includes how much of the required and desired requirements are satisfied, ensuring the candidate is the “best match” to vacancy. However, most vacancies do not classify the set of skills as required and desired explicitly. Required skills are those skills a job seeker must have in order to be considered for the job...
Traumatic brain injury (TBI) and its complications, including intracranial hypertension, are one of the leading causes of mortality. Many proposed algorithms have attempted to overcome the invasiveness of intracranial pressure monitoring with limited clinical applications. In medical practices, changes of intracranial hypertension are perceived manually, by clinical experts, via surgical placement...
In many websites, data is ubiquitous and contains an abundance of valuable information. As researchers, we often first have to manually extract information from these websites and apply processing techniques to make information structured for further research. In this paper, we propose a smartphone recommendation system based on two websites: www.bestbuy.ca and www.tbaytel.net. The proposed system...
Maximal Clique Enumeration (MCE) is a long standing problem in database community. Though it is extensively studied, almost all researches focus on calculating maximal cliques as a one-time effort. MCE on dynamic graph has been rarely discussed so far, the only work on this topic is to maintain maximal cliques with graph evolving. The key within this problem is to find maximal cliques that contains...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.