An Approximation Approach to Rank Closeness Centrality Measures in a Large-Scale Workflow Affiliation Network

Size: px
Start display at page:

Download "An Approximation Approach to Rank Closeness Centrality Measures in a Large-Scale Workflow Affiliation Network"

Transcription

1 KSII The 10 th Asia Pacific ternational Conference on formation Science and Technology(APIC-IST) Copyright c 2015 KSII 75 An Approximation Approach to Rank Closeness Centrality Measures in a Large-Scale Workflow Affiliation Network 1 Dokyoung Lee, 2 Hyun Ahn, 3 Ilkyeun Ra, 2 Kwanghoon Pio Kim 1 Collaboration Technology Research Lab Department of Management formation System KYONGGI UNIVERSITY, South Korea 2 Collaboration Technology Research Lab Department of Computer Science KYONGGI UNIVERSITY, South Korea 3 Department of Computer Science & Engineering UNIVERSITY OF COLORADO DENVER, USA [ {gaiety93, hahn, kwang}@kgu.ac.kr, ilkyen.ra@ucdenver.edu] *Corresponding author: Kwanghoon Pio Kim Abstract this paper, we propose an approximation approach to make a ranking list of workflow performers based on estimated closeness centralities measured on a large-scale workflow network. order to verify proposed approximation approach, we compare estimated to original in terms of size of a workflow network as well as sampling rate of a workflow network. As results of comparisons, average accuracies of estimated have improved 46.9% and 71.4% in cases of sizes from 120 performers to 2400 performers, and cases of sampling rates from 10% samples to 100% samples, respectively. Conclusively, we strongly believe that proposed approximation approach be reasonably acceptable as a closeness centrality ranking algorithm to be applied to large-scale workflow networks. Keywords: network, estimated closeness centrality, ranking algorithm 1. troduction competition industry, between organization to organization, and enterprise to enterprise collaborative activities are increasing to gain strategic position. The workflow-based social network's size is also increasing. For this issue, we use workflow management system to manage human resources based workflow network activity effectively. The workflow management System manages business processes, human resources, relevant data set, and application programs automatically. Through workflow-based social network which produced workflow management system we can get performer-oriented human resources and ir relevant information. Workflow-based network is one of specialized social networks, we comprehend information about activity patterns of human resource and cooperation relationships. The network is consist of performer group and activity group, so it can call two-mode network. The network can express bipartite graph and bipartite matrix, and analyze cooperation performer information of certain activity and cooperation activity information of certain performer. Along with increasing workflow-based organization scale, computational time of closeness centrality and ranking increases dramatically. This research was supported by a research grant from GRRC(Geyonggi Regional Research Center) at Kyonggi University

2 76 Dokyoung Lee e at al.: An Approximation Approach to Rank Closeness Centrality Measures According for collaborative business activities to be increased, workflow-based networks' sizess and ir human resources are increasing. To manage human resources of network more effectively and solve time complexity problem, I propose an approximation approach to measure closeness centrality ranking. this approximation approch[5], estimated closeness centrality of ranking algorithm[14] is a main point. Through this ranking algorithm, I can solve problem which occurs evaluating large-scale workflow -based network's ranking s r limitation. Also, I applied an example model to estimated closeness centrality-based ranking algorithm, and n analyze this algorithm's accuracy. 2. Relation Works information-oriented age of e 21 st century, information-overflow is a big issue. The whole world tries an effort to manage diverse information effectively and to gain accurate information which has reliability. The proposed ways for alternative, are Page Rank and search engine like Google provides optimized information and tries an effort to manage information effectively. The Page Rank computes ranking of web page through web graph based backlink. Backlink means a certain node received links, se links are lots of web nodes such as web page, directory, web site, domain. Through se links,, web graph iss made and n comprehends whichh web node is prefer and important, finally, we can measure importance between web pages[26]. The organizations and enterprises collaborative activities are increased and globlaized, se have made infinite resources. To managee se resources efficiently, some studys s on workflow mining[22]which found information from workflow model and log information, and business process intelligence like workflow discovery and rediscovery[23][24][25] have preceded. After, workflow-based social network framework[21] was proposed. The workflow collaborate network redefined an activity-performer network, and proposed activity-performerr bipartite matrix production algorithm[11] for analyzing activity-performer network. There are analyzing methods of network such as degree centrality, closeness centrality, betweenness centrality, eigenvector centrality [13]. this paper, produce a bipartite matrix from workflow network model using activity-performer bipartite matrix production algorithm[11]. For this bipartite matrix, we can calculate closeness centrality in a workflow network model and analyze a relationships between b activity or performer groups. Furrmore, I applied RAND algorithm which is a estimated methodd in workflow-based network to improve time complexity problem, and I will propose an estimated closeness centrality based on ranking algorithm. 3. Propose Estimated Algorithm this chapter, I explain a design and execution procedure of estimated closeness centrality ranking algorithm for analyzing enterprise workflow basedd network Design and implementation Before implementation estimated closeness centrality basedd ranking algorithm[15], I applies a workflow-based d network to t estimated closeness centrality based ranking algorithm, andd expresses a form of bipartite matrix which get values 1 or 0. If a certain c performer node or a certain activity node is affiliated, n it gets value 1, orwise, it gets value 0. (1) large scale s workflow-based network, I use a Floyd algorithm[17] to compute shortest path between nodes, this Floyd algorithm findss shortest pathh at a time between all nodes. Floydd algorithm has a weighted matrix as an initial value, v this weighted matrix's all diagonal matrixx values get 0, and except diagonal matrix, or values v get infinite. Result of Floyd algorithm, shortest-path matrix is made. Through this shortest-path s matrix, calculating estimated closeness centrality and original closeness centrality finds out rank by ranking algorithm, and n analyzes results. r The n network has two attribute,

3 The 10 th Asia Pacificc ternational Conference on formation Science and Technology(APIC-IST) 2015, July performer and activity, so when I apply estimated closeness centrality based ranking algorithm, I can gain two type of information. Fig. 1 is an estimated closeness c centrality ranking algorithm which combines c estimated closeness centrality algorithm and original closeness algorithm[2]. The estimated closeness centrality ranking algorithm startss when I decide type of ranking nodes and number off sampling nodes for RAND algorithm. When type of ranking nodes are performers, each node calculates estimated closeness centrality and original closeness centrality through ranking algorithm, and finds out rank of value by descending order. Finally, returned value of closeness centrality and estimated closeness c centrality. At last compare closenesss centrality rank and n estimated closeness centrality rank and n, algorithm is completed. Table 1 is ranking results of workflow performers based on estimated closeness centrality ranking algorithm. I evaluated algorithm in same envrionment, number of performer model nodes is 2400, number of ranking nodes is i 20 and sampling rate is 20%. I set number of o rank nodess to 20, so we can c see ranking just top 20. All of envrionemnt factors are changeable. A node 1821 get firstt grade and its estimated closeness centrality is Some nodes have same estimated closenss centrality, beacause of input workflow model. When I made an exam model, I extended model m like multiplication. So, y have same closenesss centrality value, inevitably. But,, this limit of algorithm is caused c by workflow model which inputs algorithm. If you use this algorithm, using real workflow model, n its results were diffierent. Table 1. Estimated Closeness Centrality Rankings Result of Estimated Closeness Centrality Ranking Performerr Size=2400, Rank Size=20 Closenesss node id rank Centralityy Measurements node 1821 node 2037 node 453, node 681 node 549 node 1065 node 657, node 140 1, node 1881, node , node 2133 node 501, node , node 2121, node node 729 node 2001, node 224 1, node 2265 no 1 2 3~ ~11 12~ ~ ode 153 Fig. 1. Estimated Closeness Centrality Ranking Algorithm 3..2 The Approximation Approach The computing closeness centrality of network means finding out single source shortest path[3] between certain node and or nodes in t network. There is a limitation when I compute shortest path between all nodes to all nodes because of f workfloww based network size becomes bigger and bigger. The (2)( is an estimated closeness centrality mamatical formula.

4 KSII The 10 th Asia Pacific ternational Conference onn formation Science and Technology(APIC-IST) Copyright c 2015 KSII 78 sample matrix s_avg. Table 2. Accuracy analysis of estimated closeness centrality ranking algorithm 10% 20% % 40% % 50% 60% 70% % 90% % 100% m_avg (2) The part of d, means average of shortest path between one node and all nodes in network. Draw estimated closeness centrality throughh RAND algorithm can save more time than original closeness centrality calculating time,, this approach solvess problem in accordance with network's scale. 4. Accuracy Analysis of Estimated Algorithm this paper, I verified reliabilityy of a proposed estimated closeness centrality based ranking algorithm and applied example model to algorithm and n, implemented. The estimated closeness centrality based ranking algorithm can analyze as two perspectives. One is an accuracy analysis of t matrix size, or is an accuracy analaysis of sampling rate. The evaluating accuracy environment conditions are all equal, type of example node is performer, number of ranking node is 20. To evaulate reliablity of accuracy, compare result of estimated closeness centrality ranking withh result of original closeness centrality ranking. And n, evaluating how much se results are equivalent, degree of t equivalent can interprete its degree of reliability. Table 2 is result of accuracy analysis of estimated closeness centrality ranking algorithm. Fig. 2 is analyzing result of accuracy of matrixx size. As a result, in case of sample rate=40% %, if matrix size=120 n, its accuracy is 56%, since Fig. 2. Accuracy analysis in matrix sizes matrix size=1200, its accuracies are 100%. As you can see in Table 2, case of matrix size=120, accuracy average of matrix size is 52.7% and case of matrix size=2400, accuracy average of matrix size is 99.6%. e or words, accruacy average of matrix size raise 46.9%. conclusion, as matrix size became bigger, estimated closeness centrality based ranking algorithm saw accuracy more higher, regardless of sampling rate. Fig. 3. Average accuracy analysis in samplingg rates

5 The 10 th Asia Pacific ternational Conference on formation Science and Technology(APIC-IST) 2015, July Fig. 3 is a graph of accuracy average of sampling rate. case of sampling rate=10%, its average accuracy is 27.8%, whereas sampling rate=100%, its accuracy average is 99.2%. It improved average accuracy about 71.4%. or words, sampling rate become larger, n average of accuracy become higher. conclusion, as workflow- supported network scale became enlarge and randomly selected sampling rate became higher, it saw higher accuracy. 5. Conclusions As workflow-supported networks enlarge, human resources such as a large amount of activity patterns and information of task and performer are overflowed. To solve this problem, I have proposed approximation approach[5] to evaluate ranking of workflow performers based on estimated closeness centrality algorithm[14]. Also, I have analyzed accuracy of estimated closeness centrality based ranking algorithm to verify its reliability. conclusion, as size of workflow supported network and sampling rate are increased, I have attained high degree of accuracy. or words, we strongly believe that proposed approximation approach be reasonably acceptable as closeness centrality ranking algorithm to be applied to large-scale workflow networks. Acknowledgement This research was supported by contents convergence software research center at Kyonggi University funded by GRRC program of Gyeonggi Province, Sourth Korea. References [1] K. Okamoto, W. Chen and X.Y. Li, Ranking of Closeness Centrality for Large-Scale Social Networks, Lecture Notes in Computer Science of Frontiers in Algorithmics, Vol 50, No. 59, pp , [2] A. Battestseg, H. Ahn, Y. Lee, M. Park, H. Kim, W. Yoon, K. Kim, Organizational Closeness Centrality Analysis on Workflow-supported Activity-Performer Affiliation Networks, Proceedings of 15th ternational Conference on Advanced Communication Technology, pp , [3] E. W. Dijkstra, A Note on Two Problems in connextion with Graphs, Numerische Mamatik, Vol. 1, ino. 1, pp , [4] Phillip Bonacich, Power and Centrality: A Family of Measures, American Journal of Sociology, Vol. 92, No. 5, pp , [5] D. Eppsten, J. Wang, Fast Approximation of Centrality, Journal of Graph Algorithms and Applications, Vol. 8, No. 1, pp , [6] K. Faust, Centrality in netwokrs, Social Networks, Vol. 19, No. 2, pp , [7] Borgatti, Stephen P., and Daniel S. Halgin, "Analyzing networks." The Sage handbook of social network analysis, pp , [8] H. Ahn, C. Park, K. Kim, "A correspondence analysis framework for workflow-supported performer-activity networks", Advanced Communication Technology (ICACT), th ternational Conference on. IEEE, [9] E. Yan, D. Ying, "Applying centrality measures to impact analysis: A coauthorship network analysis." Journal of American Society for formation Science and Technology, Vol. 60, No. 10, pp , [10] T. Frank, "A Family of Affiliation dices for Two-Mode Networks." Journal of Social Structure Vol. 14, [11] H. Ahn, K. Kim, An Activity-Performer Bipartite Matrix Generation Algorithm for Analyzing Workflow-supported Human-Resource Affiliations, Journal of Korean Society for ternet formation, Vol. 14, No. 2, pp , [12]K. Kim, Discovering Activity-Performer Affiliation Knowledge on ICN-based Workflow Models, Journal of formation Science and Engineering, Vol. 29, No. 1, pp , [13] D. Knoke, S. Yang, SOCIAL NETWORK ANALYSIS - Edition, Series : Quantitative

6 80 Dokyoung Lee at al.: An Approximation Approach to Rank Closeness Centrality Measures Applications in Social Science, SAGE Publications, [14] D. Lee, H. Ahn, H. Kim, K. Kim, A Ranking Algorithm of Closeness Centralities for Large-Scale Workflow-supported Affiliation Networks, Korean Society for ternet formation, Vol. 15, No. 1, pp [15] D. Lee, H. Ahn, H. Kim, K. Kim, Accuracy Analysis of an Estimated Closeness Centrality based Ranking Algorithm in Large Scale Workflow-supported Affiliation Networks, Korean Society for ternet formation, Vol. 15, No. 2, pp , [16] H. Ahn, K. Kim, A Workflow-based Affiliation Analysis Algorithm, Korean Society for ternet formation, Vol. 12, No. 2, pp , [17] A. Aini, A. Salehipour, "Speeding up Floyd Warshall algorithm for cycled shortest path problem.", Applied Mamatics Letters Vol. 25, No. 1, pp. 1-5, [18] H. Ahn, A. Battestseg, M. Park, H. Kim, and K. Kim, "A Workflow-supported Activity-Performer Affiliation Network Model", Proceedings of ternational Conference on Computer, Networks, Systems, and dustrial Applications, pp , [19] H. Kim, H. Ahn, K. Kim, "A Workflow Affiliation Network Discovery Algorithm", ICIC Express Letters(SCOPUS), Vol. 6, No. 3, pp , [20] H. Kim, H. Ahn, K. Kim, "Modeling, Discovering, Modeling and Visualizing Workflow Performer-Role Affiliation Networking Knowledge", KSII Transactions on ternet and formation Systems(SCIE, IF:0.560), Vol. 8, No. 2, pp , [21] J. Song, M. Kim, H. Kim, K. Kim, A Framework : Workflow-based Social Network Discovery and Analysis, Proceedings of 13th ternational Conference on Computational Science and Engineering, pp , [22] Van Der Aalst, W. M, H. A. Reijers, and M. Song., "Discovering social networks from event logs." Journal of Computer Supported Cooperative Work (CSCW), Vol. 14, No. 6, pp , [23] M. Park, K. Kim, Control-Path Oriented Workflow telligence Analysis, Journal of formation Science and Engineering, Vol. 24, No. 2, pp , [24] M. Park, K. Kim, A Workflow Event Logging Mechanism and Its Implications on Quality of Workflows, Journal of formation Science and Eingineering, Vol. 26, No. 5, pp , [25] K. Kim, C.A. ELLIS, Workflow Reduction for Reachable-path Rediscovery in Workflow Mining, Foundations and Novel Approaches in Data Mining, Vol. 9, pp , [26] Page, Lawrence, et al., "The PageRank citation ranking: Bringing order to web.", 1999.

Reality Mining Via Process Mining

Reality Mining Via Process Mining Reality Mining Via Process Mining O. M. Hassan, M. S. Farag, and M. M. Mohie El-Din Abstract Reality mining project work on Ubiquitous Mobile Systems (UMSs) that allow for automated capturing of events.

More information

Reality Mining Via Process Mining

Reality Mining Via Process Mining Reality Mining Via Process Mining O. M. Hassan, M. S. Farag, M. M. MohieEl-Din Department of Mathematics, Facility of Science Al-Azhar University Cairo, Egypt {ohassan, farag.sayed, mmeldin}@azhar.edu.eg

More information

Structural Analysis of Paper Citation and Co-Authorship Networks using Network Analysis Techniques

Structural Analysis of Paper Citation and Co-Authorship Networks using Network Analysis Techniques Structural Analysis of Paper Citation and Co-Authorship Networks using Network Analysis Techniques Kouhei Sugiyama, Hiroyuki Ohsaki and Makoto Imase Graduate School of Information Science and Technology,

More information

Exam IST 441 Spring 2011

Exam IST 441 Spring 2011 Exam IST 441 Spring 2011 Last name: Student ID: First name: I acknowledge and accept the University Policies and the Course Policies on Academic Integrity This 100 point exam determines 30% of your grade.

More information

Exam IST 441 Spring 2013

Exam IST 441 Spring 2013 Exam IST 441 Spring 2013 Last name: Student ID: First name: I acknowledge and accept the University Policies and the Course Policies on Academic Integrity This 100 point exam determines 30% of your grade.

More information

Towards Secure Virtual Machine Migration in Vehicular Cloud Environment

Towards Secure Virtual Machine Migration in Vehicular Cloud Environment , pp.85-89 http://dx.doi.org/10.14257/astl.2014.66.21 Towards Secure Virtual Machine Migration in Vehicular Cloud Environment Nkenyereye Lewis and Kyung Hyune Rhee 1 1 Department of IT Convergence and

More information

Investigating the Effects of User Age on Readability

Investigating the Effects of User Age on Readability Investigating the Effects of User Age on Readability Kyung Hoon Hyun, Ji-Hyun Lee, and Hwon Ihm Korea Advanced Institute of Science and Technology, Korea {hellohoon,jihyunl87,raccoon}@kaist.ac.kr Abstract.

More information

Finding Topic-centric Identified Experts based on Full Text Analysis

Finding Topic-centric Identified Experts based on Full Text Analysis Finding Topic-centric Identified Experts based on Full Text Analysis Hanmin Jung, Mikyoung Lee, In-Su Kang, Seung-Woo Lee, Won-Kyung Sung Information Service Research Lab., KISTI, Korea jhm@kisti.re.kr

More information

Development of an Optimization Software System for Nonlinear Dynamics using the Equivalent Static Loads Method

Development of an Optimization Software System for Nonlinear Dynamics using the Equivalent Static Loads Method 10 th World Congress on Structural and Multidisciplinary Optimization May 19-24, 2013, Orlando, Florida, USA Development of an Optimization Software System for Nonlinear Dynamics using the Equivalent Static

More information

HIPRank: Ranking Nodes by Influence Propagation based on authority and hub

HIPRank: Ranking Nodes by Influence Propagation based on authority and hub HIPRank: Ranking Nodes by Influence Propagation based on authority and hub Wen Zhang, Song Wang, GuangLe Han, Ye Yang, Qing Wang Laboratory for Internet Software Technologies Institute of Software, Chinese

More information

A Personal Information Retrieval System in a Web Environment

A Personal Information Retrieval System in a Web Environment Vol.87 (Art, Culture, Game, Graphics, Broadcasting and Digital Contents 2015), pp.42-46 http://dx.doi.org/10.14257/astl.2015.87.10 A Personal Information Retrieval System in a Web Environment YoungDeok

More information

A NOVEL FILTERING TECHNIQUE FOR REDUCING REDUNDANT UNICAST TRAFFIC IN HSR NETWORKS

A NOVEL FILTERING TECHNIQUE FOR REDUCING REDUNDANT UNICAST TRAFFIC IN HSR NETWORKS A NOVEL FILTERING TECHNIQUE FOR REDUCING REDUNDANT UNICAST TRAFFIC IN HSR NETWORKS 1 NGUYEN XUAN TIEN, 2 JONG MYUNG RHEE, 3,* SANG YOON PARK 1 Assistant Professor, Myongji University, Department of Information

More information

Collaboration Strategy for ODA Project using Social Network Analysis

Collaboration Strategy for ODA Project using Social Network Analysis CCC 2018 Proceedings of the Creative Construction Conference (2018) Edited by: Miroslaw J. Skibniewski & Miklos Hajdu Creative Construction Conference 2018, CCC 2018, 30 June - 3 July 2018, Ljubljana,

More information

Depth Propagation with Key-Frame Considering Movement on the Z-Axis

Depth Propagation with Key-Frame Considering Movement on the Z-Axis , pp.131-135 http://dx.doi.org/10.1457/astl.014.47.31 Depth Propagation with Key-Frame Considering Movement on the Z-Axis Jin Woo Choi 1, Taeg Keun Whangbo 1 Culture Technology Institute, Gachon University,

More information

Proximity Prestige using Incremental Iteration in Page Rank Algorithm

Proximity Prestige using Incremental Iteration in Page Rank Algorithm Indian Journal of Science and Technology, Vol 9(48), DOI: 10.17485/ijst/2016/v9i48/107962, December 2016 ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 Proximity Prestige using Incremental Iteration

More information

JOYCE JIYOUNG WHANG EDUCATION

JOYCE JIYOUNG WHANG EDUCATION JOYCE JIYOUNG WHANG Assistant Professor Department of Computer Science and Engineering Sungkyunkwan University (SKKU) Office: Engineering Building 2, #27326 Lab: Engineering Building 2, #26315B (Big Data

More information

JOYCE JIYOUNG WHANG. June 2008 May 2010: Undergraduate Research Assistant, Department of Computer Science and Engineering, Ewha Womans University.

JOYCE JIYOUNG WHANG. June 2008 May 2010: Undergraduate Research Assistant, Department of Computer Science and Engineering, Ewha Womans University. JOYCE JIYOUNG WHANG Assistant Professor Department of Computer Science and Engineering Sungkyunkwan University (SKKU) Office: Engineering Building 2, #27326 Lab: Engineering Building 2, #26315B (Big Data

More information

Automated and Massive-scale CCNx Experiments with Software-Defined SmartX Boxes

Automated and Massive-scale CCNx Experiments with Software-Defined SmartX Boxes Network Research Workshop Proceedings of the Asia-Pacific Advanced Network 2014 v. 38, p. 29-33. http://dx.doi.org/10.7125/apan.38.5 ISSN 2227-3026 Automated and Massive-scale CCNx Experiments with Software-Defined

More information

Development of Building Information Management System with Data Collecting Functions Based on IoT Technology

Development of Building Information Management System with Data Collecting Functions Based on IoT Technology Development of Building Information Management System with Data Collecting Functions Based on IoT Technology Yuki Nakama 1, Yasunobu Onishi 2, Kazuhisa Iki 3 1,2,3 Kumamoto University, Japan 1 nakama@tech.eng.kumamoto-u.ac.jp

More information

Target Tracking in Wireless Sensor Network

Target Tracking in Wireless Sensor Network International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 6 (2014), pp. 643-648 International Research Publications House http://www. irphouse.com Target Tracking in

More information

Competitive Intelligence and Web Mining:

Competitive Intelligence and Web Mining: Competitive Intelligence and Web Mining: Domain Specific Web Spiders American University in Cairo (AUC) CSCE 590: Seminar1 Report Dr. Ahmed Rafea 2 P age Khalid Magdy Salama 3 P age Table of Contents Introduction

More information

SOMSN: An Effective Self Organizing Map for Clustering of Social Networks

SOMSN: An Effective Self Organizing Map for Clustering of Social Networks SOMSN: An Effective Self Organizing Map for Clustering of Social Networks Fatemeh Ghaemmaghami Research Scholar, CSE and IT Dept. Shiraz University, Shiraz, Iran Reza Manouchehri Sarhadi Research Scholar,

More information

Improvement of Matrix Factorization-based Recommender Systems Using Similar User Index

Improvement of Matrix Factorization-based Recommender Systems Using Similar User Index , pp. 71-78 http://dx.doi.org/10.14257/ijseia.2015.9.3.08 Improvement of Matrix Factorization-based Recommender Systems Using Similar User Index Haesung Lee 1 and Joonhee Kwon 2* 1,2 Department of Computer

More information

Data Model and Software Architecture for Business Process Model Generator

Data Model and Software Architecture for Business Process Model Generator VOL 2 (2018) NO 4-2 e-issn : 2549-9904 ISSN : 2549-9610 INTERNATIONAL JOURNAL ON INFORMATICS VISUALIZATION Data Model and Software Architecture for Business Process Model Generator Ivaylo Kamenarov #,

More information

2015 International Conference on Computer, Control, Informatics and Its Applications

2015 International Conference on Computer, Control, Informatics and Its Applications 2015 International Conference on Computer, Control, Informatics and Its Applications Business Process Optimization from Single Timestamp Event Log Riyanarto Sarno *, Fitrianing Haryadita, Kartini, Sarwosri

More information

Web Structure Mining using Link Analysis Algorithms

Web Structure Mining using Link Analysis Algorithms Web Structure Mining using Link Analysis Algorithms Ronak Jain Aditya Chavan Sindhu Nair Assistant Professor Abstract- The World Wide Web is a huge repository of data which includes audio, text and video.

More information

Supplementary Information

Supplementary Information 1 2 3 4 5 6 7 8 9 10 11 12 Supplementary Information Competition-Based Benchmarking of Influence Ranking Methods in Social Networks Alexandru Topîrceanu Contents 1 Node overlapping correlation change as

More information

Social Network Analysis

Social Network Analysis Social Network Analysis Mathematics of Networks Manar Mohaisen Department of EEC Engineering Adjacency matrix Network types Edge list Adjacency list Graph representation 2 Adjacency matrix Adjacency matrix

More information

The Study of Genetic Algorithm-based Task Scheduling for Cloud Computing

The Study of Genetic Algorithm-based Task Scheduling for Cloud Computing The Study of Genetic Algorithm-based Task Scheduling for Cloud Computing Sung Ho Jang, Tae Young Kim, Jae Kwon Kim and Jong Sik Lee School of Information Engineering Inha University #253, YongHyun-Dong,

More information

A SOCIAL NETWORK ANALYSIS APPROACH TO ANALYZE ROAD NETWORKS INTRODUCTION

A SOCIAL NETWORK ANALYSIS APPROACH TO ANALYZE ROAD NETWORKS INTRODUCTION A SOCIAL NETWORK ANALYSIS APPROACH TO ANALYZE ROAD NETWORKS Kyoungjin Park Alper Yilmaz Photogrammetric and Computer Vision Lab Ohio State University park.764@osu.edu yilmaz.15@osu.edu ABSTRACT Depending

More information

Structure Mining for Intellectual Networks

Structure Mining for Intellectual Networks Structure Mining for Intellectual Networks Ryutaro Ichise 1, Hideaki Takeda 1, and Kosuke Ueyama 2 1 National Institute of Informatics, 2-1-2 Chiyoda-ku Tokyo 101-8430, Japan, {ichise,takeda}@nii.ac.jp

More information

Research on Social Relationship Network System based on MongoDB

Research on Social Relationship Network System based on MongoDB Research on Social Relationship Network System based on MongoDB Yingyan Long School of Educational Sciences Shaanxi University of Technology Han Zhong, Shaanxi, China Abstract The relationship between

More information

Research on Autonomic Control System Connection Goal-model and Fault-tree

Research on Autonomic Control System Connection Goal-model and Fault-tree , pp.47-53 http://dx.doi.org/10.14257/astl.2016.129.10 Research on Autonomic Control System Connection Goal-model and Fault-tree Dongbeom Ko 1, Teayoung Kim 1, Sungjoo Kang 2, Ingeol Chun 2, Jeongmin Park

More information

Characteristics of Preferentially Attached Network Grown from. Small World

Characteristics of Preferentially Attached Network Grown from. Small World Characteristics of Preferentially Attached Network Grown from Small World Seungyoung Lee Graduate School of Innovation and Technology Management, Korea Advanced Institute of Science and Technology, Daejeon

More information

Cemetery Navigation and Information Query System Based on Android and Java Web

Cemetery Navigation and Information Query System Based on Android and Java Web 2017 3rd International Conference on Computational Systems and Communications (ICCSC 2017) Cemetery Navigation and Information Query System Based on Android and Java Web Chao Ding1, a, Yongjie Yang1, b,

More information

Research on Cloud Resource Scheduling Algorithm based on Ant-cycle Model

Research on Cloud Resource Scheduling Algorithm based on Ant-cycle Model , pp.427-432 http://dx.doi.org/10.14257/astl.2016.139.85 Research on Cloud Resource Scheduling Algorithm based on Ant-cycle Model Yang Zhaofeng, Fan Aiwan Computer School, Pingdingshan University, Pingdingshan,

More information

Web Service Usage Mining: Mining For Executable Sequences

Web Service Usage Mining: Mining For Executable Sequences 7th WSEAS International Conference on APPLIED COMPUTER SCIENCE, Venice, Italy, November 21-23, 2007 266 Web Service Usage Mining: Mining For Executable Sequences MOHSEN JAFARI ASBAGH, HASSAN ABOLHASSANI

More information

Discovering Hierarchical Process Models Using ProM

Discovering Hierarchical Process Models Using ProM Discovering Hierarchical Process Models Using ProM R.P. Jagadeesh Chandra Bose 1,2, Eric H.M.W. Verbeek 1 and Wil M.P. van der Aalst 1 1 Department of Mathematics and Computer Science, University of Technology,

More information

Definition: Implications: Analysis:

Definition: Implications: Analysis: Analyzing Two mode Network Data Definition: One mode networks detail the relationship between one type of entity, for example between people. In contrast, two mode networks are composed of two types of

More information

A study on improvement of evaluation method on web accessibility automatic evaluation tool's <IMG> alternative texts based on OCR

A study on improvement of evaluation method on web accessibility automatic evaluation tool's <IMG> alternative texts based on OCR , pp.162-166 http://dx.doi.org/10.14257/astl.2015.113.33 A study on improvement of evaluation method on web accessibility automatic evaluation tool's alternative texts based on OCR Eunju Park 1,1,

More information

Graph-based Entity Linking using Shortest Path

Graph-based Entity Linking using Shortest Path Graph-based Entity Linking using Shortest Path Yongsun Shim 1, Sungkwon Yang 1, Hyunwhan Joe 1, Hong-Gee Kim 1 1 Biomedical Knowledge Engineering Laboratory, Seoul National University, Seoul, Korea {yongsun0926,

More information

Application of Dijkstra s Algorithm in the Smart Exit Sign

Application of Dijkstra s Algorithm in the Smart Exit Sign The 31st International Symposium on Automation and Robotics in Construction and Mining (ISARC 2014) Application of Dijkstra s Algorithm in the Smart Exit Sign Jehyun Cho a, Ghang Lee a, Jongsung Won a

More information

Information Retrieval Lecture 4: Web Search. Challenges of Web Search 2. Natural Language and Information Processing (NLIP) Group

Information Retrieval Lecture 4: Web Search. Challenges of Web Search 2. Natural Language and Information Processing (NLIP) Group Information Retrieval Lecture 4: Web Search Computer Science Tripos Part II Simone Teufel Natural Language and Information Processing (NLIP) Group sht25@cl.cam.ac.uk (Lecture Notes after Stephen Clark)

More information

Lecture Notes: Social Networks: Models, Algorithms, and Applications Lecture 28: Apr 26, 2012 Scribes: Mauricio Monsalve and Yamini Mule

Lecture Notes: Social Networks: Models, Algorithms, and Applications Lecture 28: Apr 26, 2012 Scribes: Mauricio Monsalve and Yamini Mule Lecture Notes: Social Networks: Models, Algorithms, and Applications Lecture 28: Apr 26, 2012 Scribes: Mauricio Monsalve and Yamini Mule 1 How big is the Web How big is the Web? In the past, this question

More information

AN OPTIMIZATION GENETIC ALGORITHM FOR IMAGE DATABASES IN AGRICULTURE

AN OPTIMIZATION GENETIC ALGORITHM FOR IMAGE DATABASES IN AGRICULTURE AN OPTIMIZATION GENETIC ALGORITHM FOR IMAGE DATABASES IN AGRICULTURE Changwu Zhu 1, Guanxiang Yan 2, Zhi Liu 3, Li Gao 1,* 1 Department of Computer Science, Hua Zhong Normal University, Wuhan 430079, China

More information

ICN-based Workflow Model and Its Advances

ICN-based Workflow Model and Its Advances ICN-based Workflow Model and Its Advances Kwanghoon Kim and Clarence A. Ellis Collaboration Technology Research Lab. Contents Convergence Software Research Center Department of Computer Science KYONGGI

More information

Implementation of Semantic Information Retrieval. System in Mobile Environment

Implementation of Semantic Information Retrieval. System in Mobile Environment Contemporary Engineering Sciences, Vol. 9, 2016, no. 13, 603-608 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ces.2016.6447 Implementation of Semantic Information Retrieval System in Mobile

More information

A Hybrid Routing Algorithm for an Efficient Shortest Path Decision in Network Routing

A Hybrid Routing Algorithm for an Efficient Shortest Path Decision in Network Routing A Hybrid Routing Algorithm for an Efficient Shortest Path Decision in Network Routing Taehwan Cho, Kyeongseob Kim, Wanoh Yoon and Sangbang Choi* Department of Electronics Engineering, Inha University,

More information

An Efficient Provable Data Possession Scheme based on Counting Bloom Filter for Dynamic Data in the Cloud Storage

An Efficient Provable Data Possession Scheme based on Counting Bloom Filter for Dynamic Data in the Cloud Storage , pp. 9-16 http://dx.doi.org/10.14257/ijmue.2016.11.4.02 An Efficient Provable Data Possession Scheme based on Counting Bloom Filter for Dynamic Data in the Cloud Storage Eunmi Jung 1 and Junho Jeong 2

More information

GOVERNMENT IT: FOCUSING ON 5 TECHNOLOGY PRIORITIES

GOVERNMENT IT: FOCUSING ON 5 TECHNOLOGY PRIORITIES GOVERNMENT IT: FOCUSING ON 5 TECHNOLOGY PRIORITIES INSIGHTS FROM PUBLIC SECTOR IT LEADERS DISCOVER NEW POSSIBILITIES. New network technology is breaking down barriers in government offices, allowing for

More information

Using Google s PageRank Algorithm to Identify Important Attributes of Genes

Using Google s PageRank Algorithm to Identify Important Attributes of Genes Using Google s PageRank Algorithm to Identify Important Attributes of Genes Golam Morshed Osmani Ph.D. Student in Software Engineering Dept. of Computer Science North Dakota State Univesity Fargo, ND 58105

More information

Ranking Techniques in Search Engines

Ranking Techniques in Search Engines Ranking Techniques in Search Engines Rajat Chaudhari M.Tech Scholar Manav Rachna International University, Faridabad Charu Pujara Assistant professor, Dept. of Computer Science Manav Rachna International

More information

The application of Randomized HITS algorithm in the fund trading network

The application of Randomized HITS algorithm in the fund trading network The application of Randomized HITS algorithm in the fund trading network Xingyu Xu 1, Zhen Wang 1,Chunhe Tao 1,Haifeng He 1 1 The Third Research Institute of Ministry of Public Security,China Abstract.

More information

Colorado PROFILES. An Introduction

Colorado PROFILES. An Introduction Colorado PROFILES An Introduction About Profiles Profiles is a research networking and expertise mining software tool. It not only shows traditional directory information, but also illustrates how each

More information

Application of isight for Optimal Tip Design of Complex Tool Holder Spindle

Application of isight for Optimal Tip Design of Complex Tool Holder Spindle Application of isight for Optimal Tip Design of Complex Tool Holder Spindle WMSCI 2010 Author: Koo Hong Kwon Won Jee Chung Ki Beom Park School of Mechatronics, Changwon National University Email: goodgoohong@hanmail.net

More information

UMCS. Annales UMCS Informatica AI 7 (2007) Data mining techniques for portal participants profiling. Danuta Zakrzewska *, Justyna Kapka

UMCS. Annales UMCS Informatica AI 7 (2007) Data mining techniques for portal participants profiling. Danuta Zakrzewska *, Justyna Kapka Annales Informatica AI 7 (2007) 153-161 Annales Informatica Lublin-Polonia Sectio AI http://www.annales.umcs.lublin.pl/ Data mining techniques for portal participants profiling Danuta Zakrzewska *, Justyna

More information

Taccumulation of the social network data has raised

Taccumulation of the social network data has raised International Journal of Advanced Research in Social Sciences, Environmental Studies & Technology Hard Print: 2536-6505 Online: 2536-6513 September, 2016 Vol. 2, No. 1 Review Social Network Analysis and

More information

Dealing with Artifact-Centric Systems: a Process Mining Approach

Dealing with Artifact-Centric Systems: a Process Mining Approach Dealing with Artifact-Centric Systems: a Process Mining Approach Guangming Li and Renata Medeiros de Carvalho 2 Abstract: Process mining provides a series of techniques to analyze business processes based

More information

INFORMATION SECURITY MANAGEMENT SYSTEMS CERTIFICATION RESEARCH IN THE ROMANIAN ORGANIZATIONS

INFORMATION SECURITY MANAGEMENT SYSTEMS CERTIFICATION RESEARCH IN THE ROMANIAN ORGANIZATIONS U.P.B. Sci. Bull., Series D, Vol. 77, Iss. 4, 2015 ISSN 1454-2358 INFORMATION SECURITY MANAGEMENT SYSTEMS CERTIFICATION RESEARCH IN THE ROMANIAN ORGANIZATIONS Bogdan ŢIGĂNOAIA 1, Anca-Alexandra PURCĂREA

More information

Introduction To Graphs and Networks. Fall 2013 Carola Wenk

Introduction To Graphs and Networks. Fall 2013 Carola Wenk Introduction To Graphs and Networks Fall 203 Carola Wenk On the Internet, links are essentially weighted by factors such as transit time, or cost. The goal is to find the shortest path from one node to

More information

An Area-Efficient BIRA With 1-D Spare Segments

An Area-Efficient BIRA With 1-D Spare Segments 206 IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, VOL. 26, NO. 1, JANUARY 2018 An Area-Efficient BIRA With 1-D Spare Segments Donghyun Kim, Hayoung Lee, and Sungho Kang Abstract The

More information

Storage Architecture and Software Support for SLC/MLC Combined Flash Memory

Storage Architecture and Software Support for SLC/MLC Combined Flash Memory Storage Architecture and Software Support for SLC/MLC Combined Flash Memory Soojun Im and Dongkun Shin Sungkyunkwan University Suwon, Korea {lang33, dongkun}@skku.edu ABSTRACT We propose a novel flash

More information

Multidimensional Process Mining with PMCube Explorer

Multidimensional Process Mining with PMCube Explorer Multidimensional Process Mining with PMCube Explorer Thomas Vogelgesang and H.-Jürgen Appelrath Department of Computer Science University of Oldenburg, Germany thomas.vogelgesang@uni-oldenburg.de Abstract.

More information

Detection and Mitigation of Web Application Vulnerabilities Based on Security Testing *

Detection and Mitigation of Web Application Vulnerabilities Based on Security Testing * Detection and Mitigation of Web Application Vulnerabilities Based on Security Testing * Taeseung Lee 1, Giyoun Won 2, Seongje Cho 2, Namje Park 3, and Dongho Won 1,** 1 College of Information and Communication

More information

Lecture 9: I: Web Retrieval II: Webology. Johan Bollen Old Dominion University Department of Computer Science

Lecture 9: I: Web Retrieval II: Webology. Johan Bollen Old Dominion University Department of Computer Science Lecture 9: I: Web Retrieval II: Webology Johan Bollen Old Dominion University Department of Computer Science jbollen@cs.odu.edu http://www.cs.odu.edu/ jbollen April 10, 2003 Page 1 WWW retrieval Two approaches

More information

An Improved Computation of the PageRank Algorithm 1

An Improved Computation of the PageRank Algorithm 1 An Improved Computation of the PageRank Algorithm Sung Jin Kim, Sang Ho Lee School of Computing, Soongsil University, Korea ace@nowuri.net, shlee@computing.ssu.ac.kr http://orion.soongsil.ac.kr/ Abstract.

More information

Improvement of Buffer Scheme for Delay Tolerant Networks

Improvement of Buffer Scheme for Delay Tolerant Networks Improvement of Buffer Scheme for Delay Tolerant Networks Jian Shen 1,2, Jin Wang 1,2, Li Ma 1,2, Ilyong Chung 3 1 Jiangsu Engineering Center of Network Monitoring, Nanjing University of Information Science

More information

CS224W Final Report Emergence of Global Status Hierarchy in Social Networks

CS224W Final Report Emergence of Global Status Hierarchy in Social Networks CS224W Final Report Emergence of Global Status Hierarchy in Social Networks Group 0: Yue Chen, Jia Ji, Yizheng Liao December 0, 202 Introduction Social network analysis provides insights into a wide range

More information

The multi-perspective process explorer

The multi-perspective process explorer The multi-perspective process explorer Mannhardt, F.; de Leoni, M.; Reijers, H.A. Published in: Proceedings of the Demo Session of the 13th International Conference on Business Process Management (BPM

More information

A Network Intrusion Detection System Architecture Based on Snort and. Computational Intelligence

A Network Intrusion Detection System Architecture Based on Snort and. Computational Intelligence 2nd International Conference on Electronics, Network and Computer Engineering (ICENCE 206) A Network Intrusion Detection System Architecture Based on Snort and Computational Intelligence Tao Liu, a, Da

More information

ECNU at 2017 ehealth Task 2: Technologically Assisted Reviews in Empirical Medicine

ECNU at 2017 ehealth Task 2: Technologically Assisted Reviews in Empirical Medicine ECNU at 2017 ehealth Task 2: Technologically Assisted Reviews in Empirical Medicine Jiayi Chen 1, Su Chen 1, Yang Song 1, Hongyu Liu 1, Yueyao Wang 1, Qinmin Hu 1, Liang He 1, and Yan Yang 1,2 Department

More information

CALCULATION OF INFORMATION CONTENT IN AXIOMATIC DESIGN

CALCULATION OF INFORMATION CONTENT IN AXIOMATIC DESIGN Proceedings of ICD4 ICD-4- CLCULTION OF INFORMTION CONTENT IN XIOMTIC DESIGN Gwang-Sub Shin g.shin@samsung.com Sang-Il Yi mechanic99@ihanyang.ac.kr Gyung-Jin Park gjpark@hanyang.ac.kr Department of Mechanical

More information

Classification of N-Screen Services and its Standardization

Classification of N-Screen Services and its Standardization Classification of N-Screen Services and its Standardization Changwoo Yoon, Taiwon Um, Hyunwoo Lee *Electronics & Telecommunications Research Institute, Daejeon, Korea cwyoon@etri.re.kr, twum@etri.re.kr,

More information

FSRM Feedback Algorithm based on Learning Theory

FSRM Feedback Algorithm based on Learning Theory Send Orders for Reprints to reprints@benthamscience.ae The Open Cybernetics & Systemics Journal, 2015, 9, 699-703 699 FSRM Feedback Algorithm based on Learning Theory Open Access Zhang Shui-Li *, Dong

More information

Information modeling and reengineering for product development process

Information modeling and reengineering for product development process ISSN 1 746-7233, England, UK International Journal of Management Science and Engineering Management Vol. 2 (2007) No. 1, pp. 64-74 Information modeling and reengineering for product development process

More information

Context-based Roles and Competencies of Data Curators in Supporting Data Lifecycle: Multi-Case Study in China

Context-based Roles and Competencies of Data Curators in Supporting Data Lifecycle: Multi-Case Study in China Submitted on: 29.05.2017 Context-based Roles and Competencies of Data Curators in Supporting Data Lifecycle: Multi-Case Study in China Zhenjia Fan Department of Information Resources Management, Business

More information

3D Grid Size Optimization of Automatic Space Analysis for Plant Facility Using Point Cloud Data

3D Grid Size Optimization of Automatic Space Analysis for Plant Facility Using Point Cloud Data 33 rd International Symposium on Automation and Robotics in Construction (ISARC 2016) 3D Grid Size Optimization of Automatic Space Analysis for Plant Facility Using Point Cloud Data Gyu seong Choi a, S.W.

More information

International Journal of Advance Engineering and Research Development. A Review Paper On Various Web Page Ranking Algorithms In Web Mining

International Journal of Advance Engineering and Research Development. A Review Paper On Various Web Page Ranking Algorithms In Web Mining Scientific Journal of Impact Factor (SJIF): 4.14 International Journal of Advance Engineering and Research Development Volume 3, Issue 2, February -2016 e-issn (O): 2348-4470 p-issn (P): 2348-6406 A Review

More information

On Finding Power Method in Spreading Activation Search

On Finding Power Method in Spreading Activation Search On Finding Power Method in Spreading Activation Search Ján Suchal Slovak University of Technology Faculty of Informatics and Information Technologies Institute of Informatics and Software Engineering Ilkovičova

More information

The Workflow-Based Modelling Method for Spacecraft Automatic Testing Process

The Workflow-Based Modelling Method for Spacecraft Automatic Testing Process The Workflow-Based Modelling Method for Spacecraft Automatic Testing Process YU Dan 1, LI Zhong-wen 2, YE Gang 3 and MA Shi-long 4 1,2,3,4 National Lab of Software Development Environment, BeihangUniversity,

More information

Iterative Removing Salt and Pepper Noise based on Neighbourhood Information

Iterative Removing Salt and Pepper Noise based on Neighbourhood Information Iterative Removing Salt and Pepper Noise based on Neighbourhood Information Liu Chun College of Computer Science and Information Technology Daqing Normal University Daqing, China Sun Bishen Twenty-seventh

More information

Social-Network Graphs

Social-Network Graphs Social-Network Graphs Mining Social Networks Facebook, Google+, Twitter Email Networks, Collaboration Networks Identify communities Similar to clustering Communities usually overlap Identify similarities

More information

Deadlock-free XY-YX router for on-chip interconnection network

Deadlock-free XY-YX router for on-chip interconnection network LETTER IEICE Electronics Express, Vol.10, No.20, 1 5 Deadlock-free XY-YX router for on-chip interconnection network Yeong Seob Jeong and Seung Eun Lee a) Dept of Electronic Engineering Seoul National Univ

More information

Improved MAC protocol for urgent data transmission in wireless healthcare monitoring sensor networks

Improved MAC protocol for urgent data transmission in wireless healthcare monitoring sensor networks , pp.282-286 http://dx.doi.org/10.14257/astl.2015.116.57 Improved MAC protocol for urgent data transmission in wireless healthcare monitoring sensor networks Rae Hyeon Kim, Jeong Gon Kim 1 Department of

More information

APPLICATION OF FLOYD-WARSHALL LABELLING TECHNIQUE: IDENTIFICATION OF CONNECTED PIXEL COMPONENTS IN BINARY IMAGE. Hyunkyung Shin and Joong Sang Shin

APPLICATION OF FLOYD-WARSHALL LABELLING TECHNIQUE: IDENTIFICATION OF CONNECTED PIXEL COMPONENTS IN BINARY IMAGE. Hyunkyung Shin and Joong Sang Shin Kangweon-Kyungki Math. Jour. 14 (2006), No. 1, pp. 47 55 APPLICATION OF FLOYD-WARSHALL LABELLING TECHNIQUE: IDENTIFICATION OF CONNECTED PIXEL COMPONENTS IN BINARY IMAGE Hyunkyung Shin and Joong Sang Shin

More information

Research on the Performance of JavaScript-based IoT Service Platform

Research on the Performance of JavaScript-based IoT Service Platform International Journal of Control Theory and Applications ISSN : 0974-5572 International Science Press Volume 9 Number 44 2016 Research on the Performance of JavaScript-based IoT Service Platform Jin-Tae

More information

Random Generation of the Social Network with Several Communities

Random Generation of the Social Network with Several Communities Communications of the Korean Statistical Society 2011, Vol. 18, No. 5, 595 601 DOI: http://dx.doi.org/10.5351/ckss.2011.18.5.595 Random Generation of the Social Network with Several Communities Myung-Hoe

More information

Weighted Page Rank Algorithm Based on Number of Visits of Links of Web Page

Weighted Page Rank Algorithm Based on Number of Visits of Links of Web Page International Journal of Soft Computing and Engineering (IJSCE) ISSN: 31-307, Volume-, Issue-3, July 01 Weighted Page Rank Algorithm Based on Number of Visits of Links of Web Page Neelam Tyagi, Simple

More information

INFORMATION-ORIENTED DESIGN MANAGEMENT SYSTEM PROTOTYPE

INFORMATION-ORIENTED DESIGN MANAGEMENT SYSTEM PROTOTYPE Second International Conference World of Construction Project Management 2007 Shin, Jae Won, Ryu, Han-Guk, Lee, Dong-Ryul CSRI, HanmiParsons Co., Ltd. INFORMATION-ORIENTED DESIGN MANAGEMENT SYSTEM PROTOTYPE

More information

Information Visualization Theorem for Battlefield Screen

Information Visualization Theorem for Battlefield Screen Journal of Computer and Communications, 2016, 4, 73-78 Published Online May 2016 in SciRes. http://www.scirp.org/journal/jcc http://dx.doi.org/10.4236/jcc.2016.45011 Information Visualization Theorem for

More information

Critical Path Based Approach for Predicting Temporal Exceptions in Resource Constrained Concurrent Workflows

Critical Path Based Approach for Predicting Temporal Exceptions in Resource Constrained Concurrent Workflows International Journal of Information Technology and Web Engineering, 5(3), 27-48, July-September 2010 27 Critical Path Based Approach for Predicting Temporal Exceptions in Resource Constrained Concurrent

More information

Object-oriented modeling of construction operations for schedule-cost integrated planning, based on BIM

Object-oriented modeling of construction operations for schedule-cost integrated planning, based on BIM icccbe 2010 Nottingham University Press Proceedings of the International Conference on Computing in Civil and Building Engineering W Tizani (Editor) Object-oriented modeling of construction operations

More information

An Intelligent Clustering Algorithm for High Dimensional and Highly Overlapped Photo-Thermal Infrared Imaging Data

An Intelligent Clustering Algorithm for High Dimensional and Highly Overlapped Photo-Thermal Infrared Imaging Data An Intelligent Clustering Algorithm for High Dimensional and Highly Overlapped Photo-Thermal Infrared Imaging Data Nian Zhang and Lara Thompson Department of Electrical and Computer Engineering, University

More information

Multimodal Information Spaces for Content-based Image Retrieval

Multimodal Information Spaces for Content-based Image Retrieval Research Proposal Multimodal Information Spaces for Content-based Image Retrieval Abstract Currently, image retrieval by content is a research problem of great interest in academia and the industry, due

More information

Exam IST 441 Spring 2014

Exam IST 441 Spring 2014 Exam IST 441 Spring 2014 Last name: Student ID: First name: I acknowledge and accept the University Policies and the Course Policies on Academic Integrity This 100 point exam determines 30% of your grade.

More information

Information Push Service of University Library in Network and Information Age

Information Push Service of University Library in Network and Information Age 2013 International Conference on Advances in Social Science, Humanities, and Management (ASSHM 2013) Information Push Service of University Library in Network and Information Age Song Deng 1 and Jun Wang

More information

Sentiment Analysis for Customer Review Sites

Sentiment Analysis for Customer Review Sites Sentiment Analysis for Customer Review Sites Chi-Hwan Choi 1, Jeong-Eun Lee 2, Gyeong-Su Park 2, Jonghwa Na 3, Wan-Sup Cho 4 1 Dept. of Bio-Information Technology 2 Dept. of Business Data Convergence 3

More information

RESEARCH ANALYTICS From Web of Science to InCites. September 20 th, 2010 Marta Plebani

RESEARCH ANALYTICS From Web of Science to InCites. September 20 th, 2010 Marta Plebani RESEARCH ANALYTICS From Web of Science to InCites September 20 th, 2010 Marta Plebani marta.plebani@thomsonreuters.com Web Of Science: main purposes Find high-impact articles and conference proceedings.

More information

WEB STRUCTURE MINING USING PAGERANK, IMPROVED PAGERANK AN OVERVIEW

WEB STRUCTURE MINING USING PAGERANK, IMPROVED PAGERANK AN OVERVIEW ISSN: 9 694 (ONLINE) ICTACT JOURNAL ON COMMUNICATION TECHNOLOGY, MARCH, VOL:, ISSUE: WEB STRUCTURE MINING USING PAGERANK, IMPROVED PAGERANK AN OVERVIEW V Lakshmi Praba and T Vasantha Department of Computer

More information

Shin Hong. Assistant Professor Handong Global University (HGU) Pohang, Kyongbuk, South Korea (37554)

Shin Hong. Assistant Professor Handong Global University (HGU) Pohang, Kyongbuk, South Korea (37554) Shin Hong Assistant Professor hongshin@handong.edu +82-54-260-1409 School of Computer Science & Electrical Engineering 113 NMH, 558 Handong-ro, Buk-gu, Handong Global University (HGU) Pohang, Kyongbuk,

More information