AWERProcedia Information Technology & Computer Science

Size: px
Start display at page:

Download "AWERProcedia Information Technology & Computer Science"

Transcription

1 AWERProcedia Information Technology & Computer Science Vol 04 (2013) rd World Conference on Innovation and Computer Sciences 2013 Searching under uncertain conditions Bogdan Walek *, Department of Informatics and Computers, University of Ostrava, 30. dubna 22, Ostrava , Czech Republic. Pavel Smolka, Department of Informatics and Computers, University of Ostrava, 30. dubna 22, Ostrava , Czech Republic. Jiri Bartos, Department of Informatics and Computers, University of Ostrava, 30. dubna 22, Ostrava , Czech Republic. Cyril Klimes, Department of Informatics and Computers, University of Ostrava, 30. dubna 22, Ostrava , Czech Republic. Suggested Citation: Walek B., Smolka P, Bartos j. & Klimes. Searching under uncertain conditions. AWERProcedia Information Technology & Computer Science. [Online]. 2013, 04, pp Available from: Received December 06, 2012; revised February 28, 2013; accepted March 17, Selection and peer review under responsibility of Prof. Dr. Fahrettin Sadıkoglu, Near East University Academic World Education & Research Center. All rights reserved. Abstract In present days, there are a lot of structured data stored in information systems. On the other hand, information systems store huge amount of not clearly structured data. For not clearly structured data, the full-text search algorithms have some limits. Wide range of information sources, together with vaguely defined structure of resources, is the reasons for which this area can be claimed to be the search under uncertainty. For this reasons, the methodology for searching information sources under uncertain conditions is proposed. The paper identifies the fundamental sources of uncertainty in this problem domain. Subsequently, a model representing the search methodology over resources with static, dynamic and dynamic character with authorization is proposed. Then, the expert system with knowledge base composed of IF-THEN rules, is proposed. The model deals with uncertainties on several levels, so the paper is also identifying them. Keywords: fuzzy, uncertainty, search, information source, expert system, information system, data resources; *ADDRESSES FOR CORRESPONDANCE: Bogdan Walek, Department of Informatics and Computers, University of Ostrava, 30. dubna 22, Ostrava , Czech Republic, Address: bogdanwalek@gmail.com

2 1. Introduction Given the scope of information sources, search algorithms are one of the key elements of the current information system. With the growing scope of the information system is also the creation of data repositories that consist of structured data in the form of database structures and increasingly data that are not clearly structured, but whose value is yet noticeable. Character of the above sources of information limits search algorithm to full-text tools. Wide range of information sources, together with vaguely defined structure of resources, is the reasons for which this area can be claimed to be the search under uncertainty. 2. Problem formulation To search and analyse relevant data belonging to customer, product or project we can use full-text. When working with information resources in addition to extensive static storages, there are also resources that are dynamically generated and based on interaction with a specific user interface for this resource. The components that belong to this set of resources are ideally resources that are available to the user only after successful login of the user. According to a study by BrightPlanet [1] is the volume of this information five times higher than the volume of indexed information. The basic objective of each search process is to narrow the number offered addresses (or links) to resources based on keywords specified by user. The user then receives a set of available data, which applies to the final selection of addresses of information sources based on an assessment of its relevance for a search. From this perspective, every search engine solves the following problem areas: Knowing the content of all sources both structured and unstructured data. Being able to address these sources together with the user specified key words, with emphasis on the auxiliary apparatus of classification of these words. Dealing with uncertainties when entering keywords in the form of typos, bad spelling and mainly wrong choice of keywords. Returning a set of records and determining the relevance of matching addresses to individual sources and based on this relevance evaluation rearranging the target set. The first and the second addresses point is today provided by processes that provide download of the source (e.g. document), classification of its contents and definition of index. Index is such data structure that identifies each keyword and connects these words with addresses of relevant information sources. The evaluation of static information source is another process that takes place during indexing phase. Algorithm for evaluation and design of data structure that stores this assessment is generally dealing with the following range of parameters: Meta-information of the files. Relevance of resources based on network addresses and owners of resources. Technical quality of the information resource. Commercial validity of resource. Internal evaluation systems such as RANK addresses. 629

3 3. Problem solution As stated above it is obvious that the current search process must be very complex and involves several levels of sub-searches. Only one of these levels is search of resources. Comprehensive searching is possible to formalize by the following formula: FR = FRs + FRdf+ FRda, where: FR sum of all resources that were found FRs sum of resources of static nature that were found FRdf sum of dynamically generated resources that were found and are freely available FRda sum of dynamically generated resources that were found and are available after successful authentication Resource - the result of address that are linked to the actual data 3.1. Identification of the uncertainties in searching process There can be found several areas that are burdened by vagueness in the search processes. The main reason for the occurrence of vagueness in this area is the need to work with natural human language, especially with his grammar, although the grammar is often very clear and cover by logical rules. However, the grammar of natural language is not the only cause of the occurrence of uncertainty (in addition to coping with this kind of uncertainty is done typically by tools of NLP). In terms of the process of data indexing, the first occurrence of uncertainty can be found in indexing of addresses of resources. Because of the wide range of tools that acquire these resources, there is another potential source of vagueness during indexing. For these sources it is quite difficult to determine the proper structure and focus on key areas, yet the information value of these problematic resources is not so null. The second area where you the presence of uncertainty can be found is the area of classification (evaluation) of resources in terms of its relevance. The third and for us the most interesting area is the behavior of end users, respectively his inability to clearly and definitively specify keywords that are related to the search brings a great portion of uncertain information. 630

4 3.2. Methodology proposal Figure 1. Diagram of proposed methodology Proposed methodology itself is based on a general model for decision-making process. This model is described in more detail here [3]. The general model was also published in [2], [4]. Process M1 M1: S x T x L Process of completion performs selecting of relevant data. Static resources are captured by the crawler on the basis of an existing source address S in time T and in the scope of trusted sources L [5]. Process M2 M2: M1 x P M2 is essentially the process of creating search engine index. Following the standard approaches the mapping of keywords to address sources is stored in a structure. An important feature of this phase is the evaluation of the relevance of information sources using the rules from the P set [2]. The rules of P are determining the credibility of the source (credibility c) on the grounds of three basic input variables: f frequency of key words in the source defined by the number from interval in the range <0.10> with discretization 200, p importance of place of occurrence, r technological relevance of the resource. 631

5 A set of IF - THEN rules for this area has been designed and tested using LFLC (Linguistic Fuzzy Logical Controller) developed by the Institute for Research and Applications of Fuzzy Modeling University of Ostrava [6]. Figure 2. IF-THEN for the credibility assessment of the resource The basic set of values that are being used for linguistic evaluation of inputs and outputs is shown below: sm small, me medium, bi big For these elementary set following linguistic modificators are used: ro roughly, vr very roughly, ml more or less, ve very The rules show in Figure 2 can be represented by following IF-THEN rules: IF frequency is small AND importance of place of occurrence is small AND rank is small THEN credibility is small IF frequency is big AND importance of place of occurrence is small AND rank is big THEN credibility is big Process M3 M3:M2xF Transformation from M2 to M3 is realized according to equation M2 x F -> M3 [5], where F is a set of all degreases of existence. The existence of all degreases of existence is the connection between records of indexes and outputs that are dynamically generated together with common user input that manifests when key words is being searched. The goal of this methodology is to propose fuzzy approach to selecting the keywords. The proposed approach can be shown as searching using keyword and rank of the keyword that is represented by linguistic variable. The set of ranks consists of following values: im (important) pa (partly) ma (marginally) Process M4 M4 process encapsulates the visualization of results. The need correlate set of results that exited the M3 process is the essential part goal of process M4. The very own sorting of results is done in accordance to the already gained rank and/or other commercial parameters (e.g. paid links etc.). 632

6 4. Conclusion The result of this paper is a comprehensive model representing the search methodology using combined information sources. The model integrates the work with the uncertainties that were identified in the analytical part. For the construction of knowledge base in the process of evaluation of static sources LFLC tool was used. Increased involvement of this tool in the examined problem domain is also a topic of further research direction. Acknowledgements The presented topic is also a part of the internal grant SGS10/PřF/2012, called Fuzzy-modeling tools for analysis and design of information systems, at the Department of Informatics and Computers, University of Ostrava. References Union, International Telecommunications. Internet World Stat. Internet World Stat Bartoš J., Walek B., Smolka P., Procházka J., Klimeš C., Fuzzy modeling tools for information system testing, 17th International Conference on Soft Computing Mendel 2011, Brno 2011, pp Klimeš C., Model of adaptation under indeterminacy, Kybernetika, Vol.47, No.3, 2011, pp Walek B., Klimes, C., Fuzzy tool for conceptual modeling under uncertainty, Fourth International Conference on Machine Vision, Bellingham, Walek B., Klimeš C., Conceptual modeling under uncertainty, 2nd World Conference on Information Technology, Antalya, 2011, to be published. Habiballa H., Novák V., Dvořák A., Pavliska V., Using software package LFLC 2000, 2nd International Conference Aplimat 2003, Bratislava, 2003, pp

A methodology for Data Migration between Different Database Management Systems

A methodology for Data Migration between Different Database Management Systems A methodology for Data Migration between Different Database Management Systems Bogdan Walek, Cyril Klimes Abstract In present days the area of data migration is very topical. Current tools for data migration

More information

AWERProcedia Information Technology & Computer Science

AWERProcedia Information Technology & Computer Science AWERProcedia Information Technology & Computer Science Vol 04 (2013) 764-769 3 rd World Conference on Innovation and Computer Sciences 2013 Turkish Speech Recognizing Voice Control of Television Nursel

More information

Data Migration between Document-Oriented and Relational Databases

Data Migration between Document-Oriented and Relational Databases Abstract Current tools for data migration between documentoriented and relational databases have several disadvantages. We propose a new approach for data migration between documentoriented and relational

More information

ROUGH SETS THEORY AND UNCERTAINTY INTO INFORMATION SYSTEM

ROUGH SETS THEORY AND UNCERTAINTY INTO INFORMATION SYSTEM ROUGH SETS THEORY AND UNCERTAINTY INTO INFORMATION SYSTEM Pavel Jirava Institute of System Engineering and Informatics Faculty of Economics and Administration, University of Pardubice Abstract: This article

More information

Generic and Domain Specific Ontology Collaboration Analysis

Generic and Domain Specific Ontology Collaboration Analysis Generic and Domain Specific Ontology Collaboration Analysis Frantisek Hunka, Steven J.H. van Kervel 2, Jiri Matula University of Ostrava, Ostrava, Czech Republic, {frantisek.hunka, jiri.matula}@osu.cz

More information

Evaluation and checking nonresponse data by soft computing approaches - case of business and trade statistics

Evaluation and checking nonresponse data by soft computing approaches - case of business and trade statistics Evaluation and checking nonresponse data by soft computing approaches - case of business and trade statistics Miroslav Hudec, Jana Juriová INFOSTAT Institute of Informatics and Statistics Brussels, 7.

More information

A Study on Website Quality Models

A Study on Website Quality Models International Journal of Scientific and Research Publications, Volume 4, Issue 12, December 2014 1 A Study on Website Quality Models R.Anusha Department of Information Systems Management, M.O.P Vaishnav

More information

2 The IBM Data Governance Unified Process

2 The IBM Data Governance Unified Process 2 The IBM Data Governance Unified Process The benefits of a commitment to a comprehensive enterprise Data Governance initiative are many and varied, and so are the challenges to achieving strong Data Governance.

More information

A framework for fuzzy models of multiple-criteria evaluation

A framework for fuzzy models of multiple-criteria evaluation INTERNATIONAL CONFERENCE ON FUZZY SET THEORY AND APPLICATIONS Liptovský Ján, Slovak Republic, January 30 - February 3, 2012 A framework for fuzzy models of multiple-criteria evaluation Jana Talašová, Ondřej

More information

Automatic Bangla Corpus Creation

Automatic Bangla Corpus Creation Automatic Bangla Corpus Creation Asif Iqbal Sarkar, Dewan Shahriar Hossain Pavel and Mumit Khan BRAC University, Dhaka, Bangladesh asif@bracuniversity.net, pavel@bracuniversity.net, mumit@bracuniversity.net

More information

IEEE Transactions on Fuzzy Systems (TFS) is published bi-monthly (February, April, June, August, October and December).

IEEE Transactions on Fuzzy Systems (TFS) is published bi-monthly (February, April, June, August, October and December). Scope IEEE Transactions on Fuzzy Systems (TFS) is published bi-monthly (February, April, June, August, October and December). TFS will consider papers that deal with the theory, design or applications

More information

Keywords: Algorithm, Sieve, Prime Number Mathematics Subject Classification (MSC) 2010 : 11Y11, 11Y16, 65Y04, 65Y20, 68Q25

Keywords: Algorithm, Sieve, Prime Number Mathematics Subject Classification (MSC) 2010 : 11Y11, 11Y16, 65Y04, 65Y20, 68Q25 American International Journal of Research in Formal, Applied & Natural Sciences Available online at http://www.iasir.net ISSN (Print): 2328-3777, ISSN (Online): 2328-3785, ISSN (CD-ROM): 2328-3793 AIJRFANS

More information

CoE CENTRE of EXCELLENCE ON DATA WAREHOUSING

CoE CENTRE of EXCELLENCE ON DATA WAREHOUSING in partnership with Overall handbook to set up a S-DWH CoE: Deliverable: 4.6 Version: 3.1 Date: 3 November 2017 CoE CENTRE of EXCELLENCE ON DATA WAREHOUSING Handbook to set up a S-DWH 1 version 2.1 / 4

More information

SISE Semantics Interpretation Concept

SISE Semantics Interpretation Concept SISE Semantics Interpretation Concept Karel Kisza 1 and Jiří Hřebíček 2 1 Masaryk University, Faculty of Infromatics, Botanická 68a Brno, Czech Republic kkisza@mail.muni.cz 2 Masaryk University, Faculty

More information

SOA Design Patterns (The Prentice Hall Service Technology Series From Thomas Erl) PDF

SOA Design Patterns (The Prentice Hall Service Technology Series From Thomas Erl) PDF SOA Design Patterns (The Prentice Hall Service Technology Series From Thomas Erl) PDF In cooperation with experts and practitioners throughout the SOA community, best-selling author Thomas Erl brings together

More information

CHAPTER 5 Querying of the Information Retrieval System

CHAPTER 5 Querying of the Information Retrieval System 5.1 Introduction CHAPTER 5 Querying of the Information Retrieval System Information search and retrieval involves finding out useful documents from a store of information. In any information search and

More information

Multimodal Information Spaces for Content-based Image Retrieval

Multimodal Information Spaces for Content-based Image Retrieval Research Proposal Multimodal Information Spaces for Content-based Image Retrieval Abstract Currently, image retrieval by content is a research problem of great interest in academia and the industry, due

More information

A Content Based Image Retrieval System Based on Color Features

A Content Based Image Retrieval System Based on Color Features A Content Based Image Retrieval System Based on Features Irena Valova, University of Rousse Angel Kanchev, Department of Computer Systems and Technologies, Rousse, Bulgaria, Irena@ecs.ru.acad.bg Boris

More information

Benchmarking Google Scholar with the New Zealand PBRF research assessment exercise

Benchmarking Google Scholar with the New Zealand PBRF research assessment exercise Benchmarking Google Scholar with the New Zealand PBRF research assessment exercise Alastair G Smith School of Information Management Victoria University of Wellington New Zealand alastair.smith@vuw.ac.nz

More information

Automated Item Banking and Test Development Model used at the SSAC.

Automated Item Banking and Test Development Model used at the SSAC. Automated Item Banking and Test Development Model used at the SSAC. Tural Mustafayev The State Student Admission Commission of the Azerbaijan Republic Item Bank Department Item Banking For many years tests

More information

Recordkeeping Standards Analysis of HealthConnect

Recordkeeping Standards Analysis of HealthConnect Recordkeeping Standards Analysis of HealthConnect Electronic Health Records: Achieving an Effective and Ethical Legal and Recordkeeping Framework Australian Research Council Discovery Grant, DP0208109

More information

RETRACTED ARTICLE. Web-Based Data Mining in System Design and Implementation. Open Access. Jianhu Gong 1* and Jianzhi Gong 2

RETRACTED ARTICLE. Web-Based Data Mining in System Design and Implementation. Open Access. Jianhu Gong 1* and Jianzhi Gong 2 Send Orders for Reprints to reprints@benthamscience.ae The Open Automation and Control Systems Journal, 2014, 6, 1907-1911 1907 Web-Based Data Mining in System Design and Implementation Open Access Jianhu

More information

Research and Design of Key Technology of Vertical Search Engine for Educational Resources

Research and Design of Key Technology of Vertical Search Engine for Educational Resources 2017 International Conference on Arts and Design, Education and Social Sciences (ADESS 2017) ISBN: 978-1-60595-511-7 Research and Design of Key Technology of Vertical Search Engine for Educational Resources

More information

6 GOOGLE ENABLES MULTIPLE ADWORDS ACCOUNT LOGINS GOOGLE FINALLY ROLLS OUT THE PENGUIN 3.0 UPDATE

6 GOOGLE ENABLES MULTIPLE ADWORDS ACCOUNT LOGINS GOOGLE FINALLY ROLLS OUT THE PENGUIN 3.0 UPDATE 1 GOOGLE FINALLY ROLLS OUT THE PENGUIN 3.0 UPDATE 2 GOOGLE MY BUSINESS ADDS AWESOME FEATURES FOR BUSINESSES 3 GOOGLE PROVIDES GREAT NEW MOBILE USABILITY REPORT 4 CLAIM YOUR APPLE MAPS LISTING TODAY 5 FACEBOOK

More information

Designing a System Engineering Environment in a structured way

Designing a System Engineering Environment in a structured way Designing a System Engineering Environment in a structured way Anna Todino Ivo Viglietti Bruno Tranchero Leonardo-Finmeccanica Aircraft Division Torino, Italy Copyright held by the authors. Rubén de Juan

More information

---(Slide 0)--- Let s begin our prior art search lecture.

---(Slide 0)--- Let s begin our prior art search lecture. ---(Slide 0)--- Let s begin our prior art search lecture. ---(Slide 1)--- Here is the outline of this lecture. 1. Basics of Prior Art Search 2. Search Strategy 3. Search tool J-PlatPat 4. Search tool PATENTSCOPE

More information

Research on Applications of Data Mining in Electronic Commerce. Xiuping YANG 1, a

Research on Applications of Data Mining in Electronic Commerce. Xiuping YANG 1, a International Conference on Education Technology, Management and Humanities Science (ETMHS 2015) Research on Applications of Data Mining in Electronic Commerce Xiuping YANG 1, a 1 Computer Science Department,

More information

CLEF-IP 2009: Exploring Standard IR Techniques on Patent Retrieval

CLEF-IP 2009: Exploring Standard IR Techniques on Patent Retrieval DCU @ CLEF-IP 2009: Exploring Standard IR Techniques on Patent Retrieval Walid Magdy, Johannes Leveling, Gareth J.F. Jones Centre for Next Generation Localization School of Computing Dublin City University,

More information

V. Thulasinath M.Tech, CSE Department, JNTU College of Engineering Anantapur, Andhra Pradesh, India

V. Thulasinath M.Tech, CSE Department, JNTU College of Engineering Anantapur, Andhra Pradesh, India International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2017 IJSRCSEIT Volume 2 Issue 5 ISSN : 2456-3307 Natural Language Interface to Database Using Modified

More information

Graphical Support of the Traffic Simulation System

Graphical Support of the Traffic Simulation System Graphical Support of the Traffic Simulation System Jana Hájková hajkovaj@students.zcu.cz Department of Computer Science and Engineering Faculty of Applied Sciences University of West Bohemia Pilsen, Czech

More information

Applying Auto-Data Classification Techniques for Large Data Sets

Applying Auto-Data Classification Techniques for Large Data Sets SESSION ID: PDAC-W02 Applying Auto-Data Classification Techniques for Large Data Sets Anchit Arora Program Manager InfoSec, Cisco The proliferation of data and increase in complexity 1995 2006 2014 2020

More information

Design and Implementation of Search Engine Using Vector Space Model for Personalized Search

Design and Implementation of Search Engine Using Vector Space Model for Personalized Search Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 1, January 2014,

More information

Meta-Content framework for back index generation

Meta-Content framework for back index generation Meta-Content framework for back index generation Tripti Sharma, Assistant Professor Department of computer science Chhatrapati Shivaji Institute of Technology. Durg, India triptisharma@csitdurg.in Sarang

More information

AWERProcedia Information Technology & Computer Science

AWERProcedia Information Technology & Computer Science AWERProcedia Information Technology & Computer Science 2 (2012) 419-423 2nd World Conference on Innovation and Computer Sciences - 2012 An Assessment of Infrastructure Readiness for Private Telecommunication

More information

INFORMATION RETRIEVAL SYSTEM USING FUZZY SET THEORY - THE BASIC CONCEPT

INFORMATION RETRIEVAL SYSTEM USING FUZZY SET THEORY - THE BASIC CONCEPT ABSTRACT INFORMATION RETRIEVAL SYSTEM USING FUZZY SET THEORY - THE BASIC CONCEPT BHASKAR KARN Assistant Professor Department of MIS Birla Institute of Technology Mesra, Ranchi The paper presents the basic

More information

Using DSM to Generate Database Schema and Data Management

Using DSM to Generate Database Schema and Data Management Using DSM to Generate Database Schema and Data Management Jaroslav Zacek 1, Zdenek Melis 2, Frantisek Hunka 2, Bogdan Walek 1 1 Centre of Excellence IT4Innovations, Faculty of Science, University of Ostrava

More information

The Procedure Proposal of Manufacturing Systems Management by Using of Gained Knowledge from Production Data

The Procedure Proposal of Manufacturing Systems Management by Using of Gained Knowledge from Production Data The Procedure Proposal of Manufacturing Systems Management by Using of Gained Knowledge from Production Data Pavol Tanuska Member IAENG, Pavel Vazan, Michal Kebisek, Milan Strbo Abstract The paper gives

More information

FSC MARKETING TOOLKIT USER STARTER GUIDE

FSC MARKETING TOOLKIT USER STARTER GUIDE FSC MARKETING TOOLKIT USER STARTER GUIDE 1 How to log in 2 How to find your credentials and your first login 3 Navigate the Toolkit to see what s in it 4 New functionalities 5 Toolkit s scope of applications

More information

Taxonomies and controlled vocabularies best practices for metadata

Taxonomies and controlled vocabularies best practices for metadata Original Article Taxonomies and controlled vocabularies best practices for metadata Heather Hedden is the taxonomy manager at First Wind Energy LLC. Previously, she was a taxonomy consultant with Earley

More information

BSc (Hons) Information Systems - IC 311

BSc (Hons) Information Systems - IC 311 BSc (Hons) Information Systems - IC 311 1. Context and Objectives The field of Information systems (IS) focuses on technology-enabled business development whereby IS professionals require both technical

More information

Social Business Intelligence in Action

Social Business Intelligence in Action Social Business Intelligence in ction Matteo Francia, nrico Gallinucci, Matteo Golfarelli, Stefano Rizzi DISI University of Bologna, Italy Introduction Several Social-Media Monitoring tools are available

More information

Knowledge Retrieval. Franz J. Kurfess. Computer Science Department California Polytechnic State University San Luis Obispo, CA, U.S.A.

Knowledge Retrieval. Franz J. Kurfess. Computer Science Department California Polytechnic State University San Luis Obispo, CA, U.S.A. Knowledge Retrieval Franz J. Kurfess Computer Science Department California Polytechnic State University San Luis Obispo, CA, U.S.A. 1 Acknowledgements This lecture series has been sponsored by the European

More information

Domain-specific Concept-based Information Retrieval System

Domain-specific Concept-based Information Retrieval System Domain-specific Concept-based Information Retrieval System L. Shen 1, Y. K. Lim 1, H. T. Loh 2 1 Design Technology Institute Ltd, National University of Singapore, Singapore 2 Department of Mechanical

More information

CURRICULUM The Architectural Technology and Construction. programme

CURRICULUM The Architectural Technology and Construction. programme CURRICULUM The Architectural Technology and Construction Management programme CONTENT 1 PROGRAMME STRUCTURE 5 2 CURRICULUM COMMON PART 7 2.1 Core areas in the study programme 7 2.1.1 General 7 2.1.2 Company

More information

SEMANTIC WEB POWERED PORTAL INFRASTRUCTURE

SEMANTIC WEB POWERED PORTAL INFRASTRUCTURE SEMANTIC WEB POWERED PORTAL INFRASTRUCTURE YING DING 1 Digital Enterprise Research Institute Leopold-Franzens Universität Innsbruck Austria DIETER FENSEL Digital Enterprise Research Institute National

More information

Developing a Test Collection for the Evaluation of Integrated Search Lykke, Marianne; Larsen, Birger; Lund, Haakon; Ingwersen, Peter

Developing a Test Collection for the Evaluation of Integrated Search Lykke, Marianne; Larsen, Birger; Lund, Haakon; Ingwersen, Peter university of copenhagen Københavns Universitet Developing a Test Collection for the Evaluation of Integrated Search Lykke, Marianne; Larsen, Birger; Lund, Haakon; Ingwersen, Peter Published in: Advances

More information

Fuzzy Set Theory and Its Applications. Second, Revised Edition. H.-J. Zimmermann. Kluwer Academic Publishers Boston / Dordrecht/ London

Fuzzy Set Theory and Its Applications. Second, Revised Edition. H.-J. Zimmermann. Kluwer Academic Publishers Boston / Dordrecht/ London Fuzzy Set Theory and Its Applications Second, Revised Edition H.-J. Zimmermann KM ff Kluwer Academic Publishers Boston / Dordrecht/ London Contents List of Figures List of Tables Foreword Preface Preface

More information

Categorizing Migrations

Categorizing Migrations What to Migrate? Categorizing Migrations A version control repository contains two distinct types of data. The first type of data is the actual content of the directories and files themselves which are

More information

Flexibility and Robustness of Hierarchical Fuzzy Signature Structures with Perturbed Input Data

Flexibility and Robustness of Hierarchical Fuzzy Signature Structures with Perturbed Input Data Flexibility and Robustness of Hierarchical Fuzzy Signature Structures with Perturbed Input Data B. Sumudu U. Mendis Department of Computer Science The Australian National University Canberra, ACT 0200,

More information

Modeling Systems Using Design Patterns

Modeling Systems Using Design Patterns Modeling Systems Using Design Patterns Jaroslav JAKUBÍK Slovak University of Technology Faculty of Informatics and Information Technologies Ilkovičova 3, 842 16 Bratislava, Slovakia jakubik@fiit.stuba.sk

More information

Mechanics ISSN Transport issue 1, 2008 Communications article 0215

Mechanics ISSN Transport issue 1, 2008 Communications article 0215 Mechanics ISSN 1312-3823 Transport issue 1, 2008 Communications article 0215 Academic journal http://www.mtc-aj.com FUZZY FUNCTION APPROXIMATION WITH RECTANGLE OR ELLIPSOIDAL RULES Oktavián Strádal, Radovan

More information

Exemplar Candidate Work Part 1 of 2 GCE in Applied ICT. OCR Advanced GCE in Applied ICT: H715 Unit G057: Database design

Exemplar Candidate Work Part 1 of 2 GCE in Applied ICT. OCR Advanced GCE in Applied ICT: H715 Unit G057: Database design Exemplar Candidate Work Part 1 of 2 GCE in Applied ICT OCR Advanced GCE in Applied ICT: H715 Unit G057: Database design OCR 2011 Contents Contents 2 Introduction 3 Moderator s Commentary: G057 Database

More information

APPROACHES TO THE PROCESS CAPABILITY ANALYSIS IN THE CASE OF NON- NORMALLY DISTRIBUTED PRODUCT QUALITY CHARACTERISTIC

APPROACHES TO THE PROCESS CAPABILITY ANALYSIS IN THE CASE OF NON- NORMALLY DISTRIBUTED PRODUCT QUALITY CHARACTERISTIC APPROACHES TO THE PROCESS CAPABILITY ANALYSIS IN THE CASE OF NON- NORMALLY DISTRIBUTED PRODUCT QUALITY CHARACTERISTIC Jiří PLURA, Milan ZEMEK, Pavel KLAPUT VŠB-Technical University of Ostrava, Faculty

More information

In the previous lecture we went over the process of building a search. We identified the major concepts of a topic. We used Boolean to define the

In the previous lecture we went over the process of building a search. We identified the major concepts of a topic. We used Boolean to define the In the previous lecture we went over the process of building a search. We identified the major concepts of a topic. We used Boolean to define the relationships between concepts. And we discussed common

More information

Lies, Damned Lies and Statistics Using Data Mining Techniques to Find the True Facts.

Lies, Damned Lies and Statistics Using Data Mining Techniques to Find the True Facts. Lies, Damned Lies and Statistics Using Data Mining Techniques to Find the True Facts. BY SCOTT A. BARNES, CPA, CFF, CGMA The adversarial nature of the American legal system creates a natural conflict between

More information

DEVELOPING AND REMOTE CONTROL OF WEB INFORMATION SYSTEMS

DEVELOPING AND REMOTE CONTROL OF WEB INFORMATION SYSTEMS International Carpathian Control Conference ICCC 2002 MALENOVICE, CZECH REPUBLIC May 27-30, 2002 DEVELOPING AND REMOTE CONTROL OF WEB INFORMATION SYSTEMS Radim FARANA 1 and Lubomír SMUTNÝ 2 1 Department

More information

Web Usage Mining: A Research Area in Web Mining

Web Usage Mining: A Research Area in Web Mining Web Usage Mining: A Research Area in Web Mining Rajni Pamnani, Pramila Chawan Department of computer technology, VJTI University, Mumbai Abstract Web usage mining is a main research area in Web mining

More information

CCP: Conflicts Check Protocol for Bitcoin Block Security 1

CCP: Conflicts Check Protocol for Bitcoin Block Security 1 CCP: Conflicts Check Protocol for Bitcoin Block Security Chen Yang Peking University, China yc900@pku.edu.cn Abstract In this work, we present our early stage results on a Conflicts Check Protocol (CCP)

More information

Utilization of Soft Computing to Improve Cooperative Management Efficiency

Utilization of Soft Computing to Improve Cooperative Management Efficiency Utilization of Soft Computing to Improve Cooperative Management Efficiency School of Computing and Mathematics University of Western Sydney Locked Bag 1797, Penrith South DC NSW 1797, AUSTRALIA seyed@computer.org

More information

Databases and Information Retrieval Integration TIETS42. Kostas Stefanidis Autumn 2016

Databases and Information Retrieval Integration TIETS42. Kostas Stefanidis Autumn 2016 + Databases and Information Retrieval Integration TIETS42 Autumn 2016 Kostas Stefanidis kostas.stefanidis@uta.fi http://www.uta.fi/sis/tie/dbir/index.html http://people.uta.fi/~kostas.stefanidis/dbir16/dbir16-main.html

More information

CHAPTER-26 Mining Text Databases

CHAPTER-26 Mining Text Databases CHAPTER-26 Mining Text Databases 26.1 Introduction 26.2 Text Data Analysis and Information Retrieval 26.3 Basle Measures for Text Retrieval 26.4 Keyword-Based and Similarity-Based Retrieval 26.5 Other

More information

ReadyGEN Grade 2, 2016

ReadyGEN Grade 2, 2016 A Correlation of ReadyGEN Grade 2, 2016 To the Introduction This document demonstrates how meets the College and Career Ready. Correlation page references are to the Unit Module Teacher s Guides and are

More information

Notes on Photoshop s Defect in Simulation of Global Motion-Blurring

Notes on Photoshop s Defect in Simulation of Global Motion-Blurring Notes on Photoshop s Defect in Simulation of Global Motion-Blurring Li-Dong Cai Department of Computer Science, Jinan University Guangzhou 510632, CHINA ldcai@21cn.com ABSTRACT In restoration of global

More information

Modelling Structures in Data Mining Techniques

Modelling Structures in Data Mining Techniques Modelling Structures in Data Mining Techniques Ananth Y N 1, Narahari.N.S 2 Associate Professor, Dept of Computer Science, School of Graduate Studies- JainUniversity- J.C.Road, Bangalore, INDIA 1 Professor

More information

Lecture notes. Com Page 1

Lecture notes. Com Page 1 Lecture notes Com Page 1 Contents Lectures 1. Introduction to Computational Intelligence 2. Traditional computation 2.1. Sorting algorithms 2.2. Graph search algorithms 3. Supervised neural computation

More information

Verification and Validation of X-Sim: A Trace-Based Simulator

Verification and Validation of X-Sim: A Trace-Based Simulator http://www.cse.wustl.edu/~jain/cse567-06/ftp/xsim/index.html 1 of 11 Verification and Validation of X-Sim: A Trace-Based Simulator Saurabh Gayen, sg3@wustl.edu Abstract X-Sim is a trace-based simulator

More information

TOPSIS Modification with Interval Type-2 Fuzzy Numbers

TOPSIS Modification with Interval Type-2 Fuzzy Numbers BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 6, No 2 Sofia 26 Print ISSN: 3-972; Online ISSN: 34-48 DOI:.55/cait-26-2 TOPSIS Modification with Interval Type-2 Fuzzy Numbers

More information

Quality Assessment of Power Dispatching Data Based on Improved Cloud Model

Quality Assessment of Power Dispatching Data Based on Improved Cloud Model Quality Assessment of Power Dispatching Based on Improved Cloud Model Zhaoyang Qu, Shaohua Zhou *. School of Information Engineering, Northeast Electric Power University, Jilin, China Abstract. This paper

More information

Development of Educational Software

Development of Educational Software Development of Educational Software Rosa M. Reis Abstract The use of computer networks and information technology are becoming an important part of the everyday work in almost all professions, especially

More information

Electrical engineering. data management. A practical foundation for a true mechatronic data model

Electrical engineering. data management. A practical foundation for a true mechatronic data model W H I T E P A P E R Z u k e n T h e P a r t n e r f o r S u c c e s s Electrical engineering data management A practical foundation for a true mechatronic data model d a t a m a n a g e m e n t z u k e

More information

developer.* The Independent Magazine for Software Professionals

developer.* The Independent Magazine for Software Professionals developer.* The Independent Magazine for Software Professionals Improving Developer Productivity With Domain-Specific Modeling Languages by Steven Kelly, PhD According to Software Productivity Research,

More information

A Practical Look into GDPR for IT

A Practical Look into GDPR for IT Andrea Pasquinucci, March 2017 pag. 1 / 7 A Practical Look into GDPR for IT Part 1 Abstract This is the first article in a short series about the new EU General Data Protection Regulation (GDPR) looking,

More information

DLV02.01 Business processes. Study on functional, technical and semantic interoperability requirements for the Single Digital Gateway implementation

DLV02.01 Business processes. Study on functional, technical and semantic interoperability requirements for the Single Digital Gateway implementation Study on functional, technical and semantic interoperability requirements for the Single Digital Gateway implementation 18/06/2018 Table of Contents 1. INTRODUCTION... 7 2. METHODOLOGY... 8 2.1. DOCUMENT

More information

Improving object cache performance through selective placement

Improving object cache performance through selective placement University of Wollongong Research Online Faculty of Informatics - Papers (Archive) Faculty of Engineering and Information Sciences 2006 Improving object cache performance through selective placement Saied

More information

DITA for Enterprise Business Documents Sub-committee Proposal Background Why an Enterprise Business Documents Sub committee

DITA for Enterprise Business Documents Sub-committee Proposal Background Why an Enterprise Business Documents Sub committee DITA for Enterprise Business Documents Sub-committee Proposal Background Why an Enterprise Business Documents Sub committee Documents initiate and record business change. It is easy to map some business

More information

Academic Course Description

Academic Course Description BEC502 MICROPROCESSOR AND MICROCONTROLLER Course (catalog) description Academic Course Description BHARATH UNIVERSITY Faculty of Engineering and Technology Department of Electronics and Communication Engineering

More information

SOFTWARE REQUIREMENT REUSE MODEL BASED ON LEVENSHTEIN DISTANCES

SOFTWARE REQUIREMENT REUSE MODEL BASED ON LEVENSHTEIN DISTANCES SOFTWARE REQUIREMENT REUSE MODEL BASED ON LEVENSHTEIN DISTANCES 1 WONG PO HUI, 2,* WAN MOHD NAZMEE WAN ZAINON School of Computer Sciences, Universiti Sains Malaysia, 118 Penang, Malaysia 1 wphui.ucom12@student.usm.my,

More information

The Establishment of Large Data Mining Platform Based on Cloud Computing. Wei CAI

The Establishment of Large Data Mining Platform Based on Cloud Computing. Wei CAI 2017 International Conference on Electronic, Control, Automation and Mechanical Engineering (ECAME 2017) ISBN: 978-1-60595-523-0 The Establishment of Large Data Mining Platform Based on Cloud Computing

More information

Curriculum for the Academy Profession Degree Programme in Multimedia Design & Communication National section. September 2014

Curriculum for the Academy Profession Degree Programme in Multimedia Design & Communication National section. September 2014 Curriculum for the Academy Profession Degree Programme in Multimedia Design & Communication National section September 2014 1 Table of contents 1. Programme structure... 3 1.1 The programme is regulated

More information

FAULT DETECTION ON RADIAL POWER DISTRIBUTION SYSTEMS USING FUZZY LOGIC.

FAULT DETECTION ON RADIAL POWER DISTRIBUTION SYSTEMS USING FUZZY LOGIC. FAULT DETECTION ON RADIAL POWER DISTRIBUTION SYSTEMS USING FUZZY LOGIC. Nitish Kumar 1, Manish Sharma 2, Ayush Sinha 3,Indu Bhushan 4 1, 2,3 Students, Electrical Engineering Department Greater Noida Institutes

More information

Web Data mining-a Research area in Web usage mining

Web Data mining-a Research area in Web usage mining IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 13, Issue 1 (Jul. - Aug. 2013), PP 22-26 Web Data mining-a Research area in Web usage mining 1 V.S.Thiyagarajan,

More information

FACETs. Technical Report 05/19/2010

FACETs. Technical Report 05/19/2010 F3 FACETs Technical Report 05/19/2010 PROJECT OVERVIEW... 4 BASIC REQUIREMENTS... 4 CONSTRAINTS... 5 DEVELOPMENT PROCESS... 5 PLANNED/ACTUAL SCHEDULE... 6 SYSTEM DESIGN... 6 PRODUCT AND PROCESS METRICS...

More information

(Refer Slide Time: 1:27)

(Refer Slide Time: 1:27) Data Structures and Algorithms Dr. Naveen Garg Department of Computer Science and Engineering Indian Institute of Technology, Delhi Lecture 1 Introduction to Data Structures and Algorithms Welcome to data

More information

Automatic Metadata Generation By Clustering Extracted Representative Keywords From Heterogeneous Sources

Automatic Metadata Generation By Clustering Extracted Representative Keywords From Heterogeneous Sources ALI RIDHO BARAKBAH 106 Automatic Metadata Generation By Clustering Extracted Representative Keywords From Heterogeneous Sources Ali Ridho Barakbah Abstract In the information retrieval, the generation

More information

Lecture: Simulation. of Manufacturing Systems. Sivakumar AI. Simulation. SMA6304 M2 ---Factory Planning and scheduling. Simulation - A Predictive Tool

Lecture: Simulation. of Manufacturing Systems. Sivakumar AI. Simulation. SMA6304 M2 ---Factory Planning and scheduling. Simulation - A Predictive Tool SMA6304 M2 ---Factory Planning and scheduling Lecture Discrete Event of Manufacturing Systems Simulation Sivakumar AI Lecture: 12 copyright 2002 Sivakumar 1 Simulation Simulation - A Predictive Tool Next

More information

Guiding System Modelers in Multi View Environments: A Domain Engineering Approach

Guiding System Modelers in Multi View Environments: A Domain Engineering Approach Guiding System Modelers in Multi View Environments: A Domain Engineering Approach Arnon Sturm Department of Information Systems Engineering Ben-Gurion University of the Negev, Beer Sheva 84105, Israel

More information

Turn Your Content Into a Marketing Machine. How to Make Your Content Found Online

Turn Your Content Into a Marketing Machine. How to Make Your Content Found Online Turn Your Content Into a Marketing Machine How to Make Your Content Found Online Why Should I Put Content in a Digital Publishing Platform? Your Digital Publishing Platform has the potential of becoming

More information

In the recent past, the World Wide Web has been witnessing an. explosive growth. All the leading web search engines, namely, Google,

In the recent past, the World Wide Web has been witnessing an. explosive growth. All the leading web search engines, namely, Google, 1 1.1 Introduction In the recent past, the World Wide Web has been witnessing an explosive growth. All the leading web search engines, namely, Google, Yahoo, Askjeeves, etc. are vying with each other to

More information

International Journal of Modern Trends in Engineering and Research e-issn No.: , Date: 2-4 July, 2015

International Journal of Modern Trends in Engineering and Research   e-issn No.: , Date: 2-4 July, 2015 International Journal of Modern Trends in Engineering and Research www.ijmter.com e-issn No.:2349-9745, Date: 2-4 July, 2015 Privacy Preservation Data Mining Using GSlicing Approach Mr. Ghanshyam P. Dhomse

More information

Retrieval Evaluation. Hongning Wang

Retrieval Evaluation. Hongning Wang Retrieval Evaluation Hongning Wang CS@UVa What we have learned so far Indexed corpus Crawler Ranking procedure Research attention Doc Analyzer Doc Rep (Index) Query Rep Feedback (Query) Evaluation User

More information

Integration of INSPIRE & SDMX data infrastructures for the 2021 population and housing census

Integration of INSPIRE & SDMX data infrastructures for the 2021 population and housing census Integration of INSPIRE & SDMX data infrastructures for the 2021 population and housing census Nadezhda VLAHOVA, Fabian BACH, Ekkehard PETRI *, Vlado CETL, Hannes REUTER European Commission (*ekkehard.petri@ec.europa.eu

More information

Search Tips. Basic Search:

Search Tips. Basic Search: Search Tips There are several ways in which to search the Daily Mail Historical Archive. The Basic Search provides broad search options either by searching every word in an article or searching article

More information

SEPTEMBER 2018

SEPTEMBER 2018 www.prismlit.com SEPTEMBER 2018 Don t Stop Believin : The Staying Power of Search Term Optimization Since the first model T rolled off of Henry Ford s assembly line, all cars have been made with a steering

More information

Agenda. Why choose our specification The GCSE reforms Changes to all GCSEs in Business Our new GCSE (9-1) qualification

Agenda. Why choose our specification The GCSE reforms Changes to all GCSEs in Business Our new GCSE (9-1) qualification Launch event Agenda Why choose our specification The GCSE reforms Changes to all GCSEs in Business Our new GCSE (9-1) qualification Overview Content Assessment Support Contact details and next steps 2

More information

Risk Informed Cyber Security for Nuclear Power Plants

Risk Informed Cyber Security for Nuclear Power Plants Risk Informed Cyber Security for Nuclear Power Plants Phillip L. Turner, Timothy A. Wheeler, Matt Gibson Sandia National Laboratories Electric Power Research Institute Albuquerque, NM USA Charlotte, NC

More information

CHAPTER 4 FUZZY LOGIC, K-MEANS, FUZZY C-MEANS AND BAYESIAN METHODS

CHAPTER 4 FUZZY LOGIC, K-MEANS, FUZZY C-MEANS AND BAYESIAN METHODS CHAPTER 4 FUZZY LOGIC, K-MEANS, FUZZY C-MEANS AND BAYESIAN METHODS 4.1. INTRODUCTION This chapter includes implementation and testing of the student s academic performance evaluation to achieve the objective(s)

More information

OPTIMAL PATH PROBLEM WITH POSSIBILISTIC WEIGHTS. Jan CAHA 1, Jiří DVORSKÝ 2

OPTIMAL PATH PROBLEM WITH POSSIBILISTIC WEIGHTS. Jan CAHA 1, Jiří DVORSKÝ 2 OPTIMAL PATH PROBLEM WITH POSSIBILISTIC WEIGHTS Jan CAHA 1, Jiří DVORSKÝ 2 1,2 Department of Geoinformatics, Faculty of Science, Palacký University in Olomouc, 17. listopadu 50, 771 46, Olomouc, Czech

More information

Questions Answered at the Click of a Mouse

Questions Answered at the Click of a Mouse Questions Answered at the Click of a Mouse Sharing technical information in a digital world Lin Carson, PhD BAKERpedia CEO Founder 1 Who is BAKERpedia? The only global online commercial digital baking

More information

CE4031 and CZ4031 Database System Principles

CE4031 and CZ4031 Database System Principles CE4031 and CZ4031 Database System Principles Academic AY1819 Semester 1 CE/CZ4031 Database System Principles s CE/CZ2001 Algorithms; CZ2007 Introduction to Databases CZ4033 Advanced Data Management (not

More information

Exam Ref Programming In HTML5 With JavaScript And CSS3 (MCSD): Programming In HTML5 With JavaScript And CSS3 Free Ebooks PDF

Exam Ref Programming In HTML5 With JavaScript And CSS3 (MCSD): Programming In HTML5 With JavaScript And CSS3 Free Ebooks PDF Exam Ref 70-480 Programming In HTML5 With JavaScript And CSS3 (MCSD): Programming In HTML5 With JavaScript And CSS3 Free Ebooks PDF Prepare for Microsoft Exam 70-480â and help demonstrate your real-world

More information