The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Internet is an integral part of modern life. Users often visit many different websites regularly in the course of their daily lives. As the number of websites that a typical user visits increases, so does the need to effectively manage these sites should the user want to re-visit them later. Most users simply rely on the bookmarking or favourite features of the browser they use to manage these sites...
In recent years, more and more experts find that events have more semantic means than any other features, such as, characters, terms and concepts. This paper described a method which used event features to classify Chinese Web pages talking about personality in SVM classifier. Firstly, we explained how to represent Chinese documents by event features. Secondly, we constructed event ontology about...
Today, the Internet is used to offer different services to users. Most of these services are designed for human users, but unfortunately some computer programs are designed which abuse these services. CAPTCHA (completely automated public Turing test to tell computers and human apart) systems are designed to automatically distinguish between human users and computer programs and block such computer...
Ontology is applied to a real-world Web intelligent question answering system in PC troubleshooting domain as an improvement, so semantic relations need to be extracted to construct ontology semi-automatically. The paper mainly pays attention to "product-trouble" relation and "product-attribute" relation. A two stage semantic relation extraction method is proposed. In stage one,...
Processing huge amount of collected network data to identify network intrusions needs high computational cost. Reducing features in the collected data may therefore solve the problem. We proposed an approach for obtaining optimal number of features to build an efficient model for intrusion detection system (IDS). Two feature selection algorithms were involved to generate two feature sets. These two...
Current search engines have two problems, losing useful information and including useless information. These two problems are aroused by the keyword matching retrieval model, which is adopted by almost all search engines. We introduce the conception of category attribute of a word. According to the category attribute of a word, the useless results can be removed from the search results and the retrieval...
Intrusion detection is the art of detecting computer abuse and any attempt to break into networks. As a field of research, it must continuously change and evolve to keep up with new types of attacks or adversaries and the ever-changing environment of the Internet. To render networks more secure, intrusion-detection systems (IDSs) aim to recognize attacks within constraints of two major performance...
In this work we look into analyzing blogs to classify products according to users' query. Blogs can be found over the Internet where buyers share their opinions on different products that are available in the market. Such pages may prove to be good guides for a prospective buyer. However, going through a large number of blogs and to convert their opinions into a meaningful decision is often difficult...
Retrieval thesaurus (RT) is an important part of information search and retrieval on Web. This article provides the architecture of retrieval thesaurus that had been created based on association conception. Some algorithms of establishing retrieval thesaurus are described.
E-commerce, or business done on the Internet has become more and more popular. Meanwhile, the number of customer reviews for products on the internet grows rapidly. For a popular product, the number of reviews can be in hundreds. As a result, the problem of ??opinion mining?? has seen increasing attention over several years. In this paper, we proposed a statistical method to extract product features...
It is important to reduce the dimensionality of features in Web Chinese text categorization. Isomap algorithm is an unsupervised manifold learning technique. SIIsomap algorithm, an extension of Isomap to supervised feature extraction, is proposed in this paper. It uses adding constant method and a direct embedding technique of Isomap algorithm for testing data to make the embedding more reasonable...
An amount of information on the Web has been increased explosively with the growth of information technology. In the area of electronic commerce, the recommender systems that provide personalized content are crucial research issue. The analysis of efficient user preference is important for improving the recommendation accuracy. Existing recommendation system has used implicit feedback for analyzing...
The art of computer-based game production is an aspiring goal and a challenging task. It involves many different activities, expertise and skills into many different areas such as: game theory, programming skills, multimedia, 2D/3D graphics and animation, sound engineering, story writing, project design and management, physics, logic design, interface programming, artificial intelligence (AI) and...
Despite of the advances in the e-learning domain during the last decades, there is a lack of suitable mechanism to carry out assessment with the appropriate measures to avoid cheating. Current LMSs do not provide the needed features to check that the intended student is taking the online exam by himself, or even to know if he has spent the whole session time in front of the computer. This paper presents...
The 3 most important issues for anomaly detection based intrusion detection systems by using data mining methods are: feature selection, data value normalization, and the choice of data mining algorithms. In this paper, we study primarily the feature selection of network traffic and its impact on the detection rates. We use KDD CUP 1999 dataset as the sample for the study. We group the features of...
Style-based text authorship identification extracts features from authorship-known texts, constructs classifier and then identifies disputed texts. Authorship identification belongs to the domain of style classification and is a branch of text classification. In contrast with text classification which deals with the content of texts, authorship identification focuses on the form property of texts...
Intelligent surveillance systems have become an important research issue recently. They can provide an early warning or help us to retrieve interested video frames. The motion detection techniques play an important role in these two applications. In this paper, we propose an effective surveillance video retrieval method based upon the motion detection technology. We can use this method to search frames...
Sem@ntica is a system for extracting the information contained in collections of documents into a knowledge base. It combines high quality conventional named entity analysis with an ontology class labeling capability for open class words. The ontology comprises an upper ontology and one or more domain ontologies. The system has tools for rapidly designing the ontology and mapping segments of Word...
Port state control (PSC) inspection is the most important mechanism to ensure world marine safe. Recently, some SVM-based risk assessment systems have been presented in the world. They estimate the risk of each candidate ship based on its generic factors and history inspection factors to select high-risk one before conducting on-board PSC inspection. However, how to improve the performance of the...
In this paper, a new on-line signature verification system using neural network is presented. The proposed system is based-on a newly developed Spatio-Temporal Artificial Neuron (SPAN), which is well adapted for the verification of Spatio-Temporal patterns. In this model, the strokes of a signature generated by a digitizing tablet is presented in form of a sequence of spikes corresponding to displacement...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.