2010 Fifth International Conference on Digital Information Management

Size: px
Start display at page:

Download "2010 Fifth International Conference on Digital Information Management"

Transcription

1 2010 Fifth International Conference on Digital Information Management (ICDIM 2010) Thunder Bay, Ontario, Canada 5 8 July 2010 IEEE Catalog Number: ISBN: CFP10DIM-PRT

2 TABLE OF CONTENTS DATA MINING LATENT SEMANTIC INDEXING AND LARGE DATASET: STUDY OF TERM-WEIGHTING SCHEMES... 1 A N K Zaman, Charles Grant Brown BEHAVIOR MINING OF FEMALE STUDENTS BY ANALYZING LOG FILES... 5 Rozita Jamili Oskouei PRESERVING OBJECT-RELATIONAL DATABASES FOR THE NEXT GENERATIONS Herna L Viktor, Bo Wang, Eric Paquet, Julie Doyle CLUSTERING APPROACHES FOR DATA WITH MISSING VALUES: COMPARISON AND EVALUATION Ludmila Himmelspach, Stefan Conrad REAL-TIME BUSINESS INTELLIGENCE SYSTEM ARCHITECTURE WITH STREAM MINING Yang Hang, Simon Fong DATA MINING AND AUTOMATIC OLAP SCHEMA GENERATION Muhammad Usman, Sohail Asghar, Simon Fong CLUSTERING MEDICAL DATA TO PREDICT THE LIKELIHOOD OF DISEASES Razan Paul, Abu Sayed Md. Latiful Hoque TOPIC DETECTION IN NOISY DATA SOURCES Kerstin Denecke, Marko Brosowski SYSTEM ARCHITECTURE FOR DATA ACQUISITION, EXTRACTION AND ANALYSIS FOR EXPERIMENTS WITH WEBLABS Marcelo Queiroz Leite, Leandro Halle Najm, Pedro Luiz Pizzigatti Correa, Ayrton Vollet Neto, Vera Lucia Imperatriz Fonseca MINING IRREGULAR ASSOCIATION RULES BASED ON ACTION & NON-ACTION TYPE DATA Razan Paul, Abu Sayed Md. Latiful Hoque PLASTIC COLOR MISMATCH CAUSES IDENTIFICATION USING OLAP AND DATA MINING Farid Bourennani, Ghaus M. Rizvi, Daniel Ross HIGH-ORDER FUNCTIONS AND THEIR ORDERING RELATIONS Kevin H. Xu, Jingsong Zhang, Shelby Gao FINDING SYMMETRIC ASSOCIATION RULES TO SUPPORT MEDICAL QUALITATIVE RESEARCH Razan Paul, Abu Sayed Md. Latiful Hoque REQUIREMENTS ANALYSIS FOR A TRACEABILITY SYSTEM FOR MANAGEMENT WOOD SUPPLY CHAIN ON AMAZON FOREST Daniel Lins Da Silva, Pedro Luiz Pizzigatti Correa, Leandro Halle Najm INFORMATION RETRIEVAL CLUSTERING SEARCH RESULTS OF NON-TEXT USER GENERATED CONTENT Pan Juasiripukdee, Lisa Wiyartanti, Laehyun Kim AUGMENTING THE VISUAL PRESENTATION OF WEB SEARCH RESULTS Anwar Alhenshiri, Carolyn Watters, Stephen Brooks, Michael Shepherd CONCEPTUAL FILE MANAGEMENT: REVISING THE STRUCTURE OF CLASSIFICATIONBASED INFORMATION RETRIEVAL Ali Sajedi Badashian, Seyyed Hamidreza Afzali, Morteza Ashurzad Delcheh, Mehregan Mahdavi, Mahdi Alipour A NOVEL SIMILARITY EVALUATING MODEL BASED ON RFCA AND ICS Chongyang Shi, Zhendong Niu NATURAL LANGUAGE PROCESSING USING CHINESE PART-OF-SPEECH PATTERNS FOR SENTIMENT PHRASE IDENTIFICATION AND OPINION EXTRACTION IN USER GENERATED REVIEWS Ting-Chun Peng, Chia-Chun Shih

3 QUANTITATIVE MEASUREMENTS OF COGNITIVE PROCESSING INVOLVED WITH GAZE FIXATIONS Quoc Hao Mach, Mathew D. Hunter, Ratvinder S. Grewal QUERY-RELEVANT DOCUMENT REPRESENTATION FOR TEXT CLUSTERING Masoud Makrehch FLATTEN HIERARCHIES FOR LARGE-SCALE HIERARCHICAL TEXT CATEGORIZATION Xiao-Lin Wang, Bao-Liang Lu RISK MANAGEMENT IN DYNAMIC ROLE BASED ACCESS CONTROL SYSTEMS J. Ma, K. Adi, L. Logrippo, Serge Mankovski MULTIMEDIA AND IMAGE PROCESSING A FEEDBACK-BASED METHOD FOR ADAPTIVE ROI PROTECTION IN H.264/AVC Yanchun Zhong, Heng Li, Jialei Bi FACIAL FEATURE EXTRACTION USING HYBRID GENETIC-SIMPLEX OPTIMIZATION IN MULTI-OBJECTIVE ACTIVE APPEARANCE MODEL Abdul Sattar, Renaud Seguier DESIGN AND DEVELOPMENT OF DIGITAL MOVIE GUIDE SERVICE FOR APPROACHING COMMUNITY COORDINATED MULTIMEDIA Jiehan Zhou, Jaakko Moisanen, Mika Rautiainen, Mika Ylianttila LOGO DETECTION AND RECOGNITION IN VIDEO STREAM Syed Yasser Arafat, Syed Afaq Husain, Iftikhar Azim Niaz, Muhammad Saleem BEST RANK-R TENSOR SELECTION USING GENETIC ALGORITHM FOR BETTER NOISE REDUCTION AND COMPRESSION OF HYPERSPECTRAL IMAGES A. Karami, M. Yazdi, A. Zolghadre Asli AN EFFICIENT FILTERING TECHNIQUE FOR SUPER-GRAPH QUERY PROCESSING Mohamed Saber, Mostafa Aref, Tarek F. Gha A NOVEL EIGENSPACE-BASED METHOD FOR HUMAN ACTION RECOGNITION Abdunnaser Diaf, Rachid Benlamri, Boubakeur Boufama, Riadh Ksantini A NEW COMBINED KSVM AND KFD MODEL FOR CLASSIFICATION AND RECOGNITION Riadh Ksantini, Boubaker Boufama, Imran Shafiq Ahmad, Naimul Mefraz Khan NATURAL LANGUAGE PROCESSING AND XML QUERY REFORMULATION STRATEGIES IN AN INTERDISCIPLINARY DIGITAL LIBRARY: THE CASE OF NANOSCIENCE AND TECHNOLOGY Ali Shiri DEAL WITH MULTIPLICITY AND DIVERSITY OF RELEVANCE FACTORS IN XML RETRIEVAL Bal Kamal, Nouali Omar A MODULO-BASED LABELING SCHEME FOR DYNAMICALLY ORDERED XML TREES Raed Al-Shaikh, Ghalib Hashim, Abdulrahman Binhuraib, Salahadin Mohammed ONTOLOGY DESIGN COMPLEMENTARITY OF PROCESS-ORIENTED AND ONTOLOGY-BASED CONTEXT MANAGERS TO IDENTIFY SITUATIONS Amel Bouzeghoub, Chantal Taconet, Amina Jarraya, Ngoc Kien Do, Denis Conan USING CONTRACT AND ONTOLOGY FOR PRIVACY PROTECTION IN SERVICE- ORIENTED ARCHITECTURE Diego Garcia, Miriam Capretz, M. Beatriz F. Toledo PROBABILISTIC MODAL LOGIC AS A FOUNDATION FOR KNOWLEDGE MANAGEMENT Nasser Noroozi MEASURING TAXONOMIC CONSISTENCY OF ONTOLOGIES USING LEXICAL SEMANTIC RELATEDNESS Zhao Lu, Zoltan Miklos, Songmei Cai, Junzhong Gu CONTEXT-RELEVANT CRITERIA FOR STARTING KNOWLEDGE MANAGEMENT INITIATIVES Ching-Cha Hsieh, Chai-Hui Lo, Y. H. Hung

4 ONTOLOGY-BASED CLASSIFICATION OF UNSTRUCTURED INFORMATION Stefan Burger, Bernd Stieger MAINTAINING INTEGRITY CONSTRAINTS IN RELATIONAL TO OWL TRANSFORMATIONS Ming Fang, Weiling Li, Rajshekhar Sunderraman WEB CONTENT AND INFORMATION SOCIAL NETWORK COLLABORATIVE FILTERING FRAMEWORK AND ONLINE TRUST FACTORS: A CASE STUDY ON FACEBOOK Wei Chen, Simon Fong AN EFFICIENT PROJECTED DATABASE METHOD FOR MINING SEQUENTIAL ASSOCIATION RULES Yi-Chun Chen, Guanling Lee AN APPROACH IN WEB CONTENT MINING FOR CLUSTERING WEB PAGES R. Etemadi, N. Moghaddam MEASURING THE CREDIBILITY OF ARABIC TEXT CONTENT IN TWITTER Rasha M. Binsultan Al-Eidan, Hend S. Al-Khalifa, Abdulmalik S. Al-Salman EXPLOITING WIKIPEDIA IN QUERY UNDERSTANDING SYSTEMS Richard Khoury E-GOVERNMENT AND E-COMMERCE DIGITAL SOLUTIONS FOR INFERENCE RULES IN DECISION-SUPPORTING SYSTEMS Erika Matsak, Peeter Lorents AN ENTERPRISE BUSINESS INTELLIGENCE MATURITY MODEL (EBIMM): CONCEPTUAL FRAMEWORK Min-Hooi Chuah A TECHNIQUE TO OVERCOME THE PROBLEM OF SMALL SIZE DATABASE FOR AUTOMATIC SPEAKER RECOGNITION M. Alaulaiman, A. Mahmood, M. Ghulam, M. Bencherif, Y. Alotaibi GOVERNMENT ELECTRONIC SERVICE DELIVERY (ESD) AND PRIVACY IN ONTARIO Sandra J. Leonetti VISUALIZING E-GOVERNMENT PORTAL AND ITS PERFORMANCE IN WEBVS Ho Si Meng, Simon Fong PRICING-MODEL FOR MARKETING OF FERP WORKFLOW AS PRODUCT Evan Asfoura, Gamal Kassem, Naoum Jamous, Reiner Dumke FACTORS INFLUENCING EGOVERNANCE IMPLEMENTATION: ISSUES AND CHALLENGES IN PAKISTAN Syed Nayyer Abbas Kazmi SENSOR NETWORKS 3D-ADAL: A THREE-DIMENSIONAL DISTRIBUTED RANGE-FREE LOCALIZATION ALGORITHM FOR WIRELESS SENSOR NETWORKS BASED ON UNMANNED AERIAL VEHICLES E. Guerrero, J. Alvarez, L. Rivero DACS: A DYNAMIC APPROXIMATIVE CACHING SCHEME FOR WIRELESS SENSOR NETWORKS Nils Hoeller, Christoph Reinke, Jana Neumann, Sven Groppe, Florian Frischat, Volker Linnemann A LOAD BALANCING SCHEME FOR LATENCY OPTIMIZATION IN GRID NETWORKS O. A. Rahmeh, P. Johnson A VISION FOR WIRELESS SENSOR NETWORKS: HYBRID ARCHITECTURE, MODEL FRAMEWORK AND SERVICE BASED SYSTEMS Muhammad S. Aslam, Susan Rea, Dirk Pesch 2L-RBACG: A NEW FRAMEWORK FOR RESOURCE ACCESS CONTROL IN GRID ENVIRONMENTS Hakimeh Alemi Baktash, Mohammadreza Meybodi, Mohammadbagher Karimi, Asgarali Bouyer

5 WEB CONTENT & WEB SERVICES A REQUIREMENTS TAXONOMY AND RATING MODEL FOR SECURE AND USABLE B2C/C2C E-COMMERCE WEBSITES Ulises Ibarra Hernandez, Miguel Vargas Martin, Francisco J. Alvarez Rodriguez, Ricardo Mendoza Gonzalez, Fabio A. Garcia Toribio ADAPTIVE WORKFLOW MANAGEMENT TO ENSURE TRANSACTIONAL SERVICE COMPOSITION Katharina Hahn A SUPPLIERS PERSPECTIVE ON E-COMMERCE: SUPPLIERS RESPONSES TO CONSUMERS PERSPECTIVES ON E-COMMERCE ADOPTION IN DEVELOPING COUNTRIES - A SAUDI ARABIAN EMPIRICAL STUDY Fahad Abdulaziz Aleid, Simon Rogerson, Ben Fairweather ON INDEX MERGING FOR SEMANTIC WEB DATA Lubomir Stanchev CHARACTERIZING WEB PAGES BASED ON THE QUERY LIKELIHOODS OF NEIGHBORING PAGES Koya Tamura, Kenji Hatano, Hiroshi Yadohisa SECURITY A ROBUST BIOMETRIC WATERMARK-BASED AUTHENTICATION SCHEME T. Hoang Ngan Le, Kim Hung Nguyen, Hoai Bac Le FIBONACCI SEQUENCE AND EWMA FOR INTRUSION FORECASTING SYSTEM Elvis Pontes, Wagner L. Zucchi PENETRATION TEST: A CASE STUDY ON REMOTE COMMAND EXECUTION SECURITY HOLE S. Mohammada, Soulmaz Pourdavarb DETECTING INCOMPLETENESS IN ACCESS CONTROL POLICIES USING DATA CLASSIFICATION SCHEMES Riaz Ahmed Shaikh, Kamel Adi, Luigi Logrippo, Serge Mankovski UBIQUITOUS SYSTEMS FORMAL MODEL FOR ANALYSIS OF CONTEXT DEPENDENCIES IN UBIQUITOUS SYSTEMS Raheel Ali Baloch, Noel Crespi DYNAMIC RECONFIGURABLE SCREEN KEYBOARD GENERATION METHOD USING PROBE KEY TEST Seokhoon Ko, Seman Oh DYNAMIC USER-CENTRIC MOBILE CONTEXT MODEL Yu-Ling Chang, Eduardo Barrenechea, Paulo Alencar USING ASPECT ORIENTED SOFTWARE ARCHITECTURE FOR ENTERPRISE SYSTEMS DEVELOPMENT Pawan Kumar Verma, Deepak Dahiya, Pooja Jain TOWARDS A FRAMEWORK FOR COLLECTIVE INTELLIGENCE Jawad Berri E-LEARNING MODELING STUDENTS ACCEPTANCE OF E-LEARNING: A CASE OF THE KS UNIVERSITY Ali Aljumaah A NEW EFFICIENT BLENDED E-LEARNING MODEL AND FRAMEWORK FOR K12 AND HIGHER EDUCATION: DESIGN AND IMPLEMENTATION SUCCESS FACTORS Salah Al-Sharhan, Ahmed Al-Hunaiyyan, Hanaa Al-Sharah SECURING AJAX-ENRICHED MOBILE ENVIRONMENT FOR EXCHANGING SVG-BASED LEARNING MATERIALS Jinan Fiaidhi, Sabah Mohammed, David A. J. Thomas, Lyle F. Chamarette

6 DESIGNING A COLLABORATIVE EDUCATIONAL SYSTEM: A COMPETITIVE APPROACH TO E-LEARNING Ali Sajedi Badashian, Asghar Dehghani Firouzabadi, Morteza Ashurzad Delcheh, Seyyed Hamidreza Afzali, Mehregan Mahdavi SIMULATION INTEGRATION FOR HEALTHCARE EDUCATION, TRAINING AND ASSESSMENT Rachel H. Ellaway, Jeremy R. Cooperstock, Bruce Spencer OPENLABYRINTH: AN ABSTRACT PATHWAY-BASED SERIOUS GAME ENGINE FOR PROFESSIONAL EDUCATION Rachel H. Ellaway INTELLIGENT DIGITAL TECHNOLOGIES CONTEXT-BASED SPECIFICATION OFWEB SERVICE POLICIES USING WSPL Hamdi Yahyaoui, Mohammed Almulla ENVIRONMENT SOUND RECOGNITION USING ZERO CROSSING FEATURES AND MPEG Mubarak Obaid Alqahtani, Ghulam Muhammad, Yousef Ajami Alotaibi TOWARDS A GENERIC TECHNIQUE FOR ANALYSING INTERACTIONS BETWEEN ASPECTS AT REQUIREMENT PHASE Amel Boubendir, Allaoua Chaoui TEXT DATA COMPRESSION RATIO AS A TEXT ATTRIBUTE FOR A LANGUAGE- INDEPENDENT TEXT ART EXTRACTION METHOD Tetsuya Suzuki, Kazuyuki Hayashi PATIENT DATA MANAGEMENT SYSTEM PERIODIC MODEL USING GSM Anup. B. Goutham, Manjunath Iyer B. S, Rajiv R HYBRID DWT-SVD AUDIO WATERMARKING Ali Al-Haj, Christina Twal, Ahmad Mohammad TOWARDS DECENTRALIZED GRID AGENT MODELS FOR CONTINUOUS RESOURCE DISCOVERY OF INTEROPERABLE GRID VIRTUAL ORGANISATIONS Stelios Sotiriadis, Nik Bessis, Ye Huang, Paul Sant, Carsten Maple CUSTOMIZING INTERACTIVE PATIENT S DIAGNOSIS USER INTERFACE Ejaz Ahmed, Nik Bessis, Yong Yue COLLABORATION OF HETEROGENOUS METAHEURISTIC AGENTS Mehmet E. Aydin A NEW PARTICLE SWARM OPTIMIZATION ALGORITHM FOR DYNAMIC IMAGE CLUSTERING Salima Ouadfel, Mohamed Batouche, Abdelmalik Taleb-Ahmed CO-AUTHORING AN ADAPTIVE EDUCATIONAL HYPERMEDIA Talhi Said, Ouadfel Salima, Behaz Amel, Djoudi Mahieddine Author Index

Information Retrieval System Based on Context-aware in Internet of Things. Ma Junhong 1, a *

Information Retrieval System Based on Context-aware in Internet of Things. Ma Junhong 1, a * Information Retrieval System Based on Context-aware in Internet of Things Ma Junhong 1, a * 1 Xi an International University, Shaanxi, China, 710000 a sufeiya913@qq.com Keywords: Context-aware computing,

More information

DOTNET PROJECTS. DOTNET Projects. I. IEEE based IOT IEEE BASED CLOUD COMPUTING

DOTNET PROJECTS. DOTNET Projects. I. IEEE based IOT IEEE BASED CLOUD COMPUTING DOTNET PROJECTS I. IEEE based IOT 1. A Fuzzy Model-based Integration Framework for Vision-based Intelligent Surveillance Systems 2. Learning communities in social networks and their relationship with the

More information

AUTOMATIC VISUAL CONCEPT DETECTION IN VIDEOS

AUTOMATIC VISUAL CONCEPT DETECTION IN VIDEOS AUTOMATIC VISUAL CONCEPT DETECTION IN VIDEOS Nilam B. Lonkar 1, Dinesh B. Hanchate 2 Student of Computer Engineering, Pune University VPKBIET, Baramati, India Computer Engineering, Pune University VPKBIET,

More information

Elysium Technologies Private Limited::IEEE Final year Project

Elysium Technologies Private Limited::IEEE Final year Project Elysium Technologies Private Limited::IEEE Final year Project - o n t e n t s Data mining Transactions Rule Representation, Interchange, and Reasoning in Distributed, Heterogeneous Environments Defeasible

More information

Learning to Match. Jun Xu, Zhengdong Lu, Tianqi Chen, Hang Li

Learning to Match. Jun Xu, Zhengdong Lu, Tianqi Chen, Hang Li Learning to Match Jun Xu, Zhengdong Lu, Tianqi Chen, Hang Li 1. Introduction The main tasks in many applications can be formalized as matching between heterogeneous objects, including search, recommendation,

More information

IEEE Project Titles

IEEE Project Titles www.chennaisunday.com PH:9566137117 IEEE Project Titles -2018 S.No Project Title Year CLOUD COMPUTING 1 A Collaborative Key Management Protocol in Ciphertext Policy Attribute-Based Encryption for Cloud

More information

TriRank: Review-aware Explainable Recommendation by Modeling Aspects

TriRank: Review-aware Explainable Recommendation by Modeling Aspects TriRank: Review-aware Explainable Recommendation by Modeling Aspects Xiangnan He, Tao Chen, Min-Yen Kan, Xiao Chen National University of Singapore Presented by Xiangnan He CIKM 15, Melbourne, Australia

More information

Introduction to Text Mining. Hongning Wang

Introduction to Text Mining. Hongning Wang Introduction to Text Mining Hongning Wang CS@UVa Who Am I? Hongning Wang Assistant professor in CS@UVa since August 2014 Research areas Information retrieval Data mining Machine learning CS@UVa CS6501:

More information

Void main Technologies

Void main Technologies SNO TITLE Domain 1. A Hybrid Approach for Detecting Automated Spammers in Twitter Data mining 2. A Key-Policy Attribute-Based Temporary Keyword Search scheme for Secure Storage 3. A Lightweight Secure

More information

A Bayesian Approach to Hybrid Image Retrieval

A Bayesian Approach to Hybrid Image Retrieval A Bayesian Approach to Hybrid Image Retrieval Pradhee Tandon and C. V. Jawahar Center for Visual Information Technology International Institute of Information Technology Hyderabad - 500032, INDIA {pradhee@research.,jawahar@}iiit.ac.in

More information

Multimodal Information Spaces for Content-based Image Retrieval

Multimodal Information Spaces for Content-based Image Retrieval Research Proposal Multimodal Information Spaces for Content-based Image Retrieval Abstract Currently, image retrieval by content is a research problem of great interest in academia and the industry, due

More information

Web Service Discovery with Implicit QoS Filtering

Web Service Discovery with Implicit QoS Filtering Web Service Discovery with Implicit QoS Filtering Natallia Kokash DIT - University of Trento, Via Sommarive, 14, 38050 Trento, Italy email: natallia.kokash@dit.unitn.it Abstract. Web Service (WS) discovery

More information

Overview of Web Mining Techniques and its Application towards Web

Overview of Web Mining Techniques and its Application towards Web Overview of Web Mining Techniques and its Application towards Web *Prof.Pooja Mehta Abstract The World Wide Web (WWW) acts as an interactive and popular way to transfer information. Due to the enormous

More information

An efficient face recognition algorithm based on multi-kernel regularization learning

An efficient face recognition algorithm based on multi-kernel regularization learning Acta Technica 61, No. 4A/2016, 75 84 c 2017 Institute of Thermomechanics CAS, v.v.i. An efficient face recognition algorithm based on multi-kernel regularization learning Bi Rongrong 1 Abstract. A novel

More information

An ontology based approach for data integration in regionally interoperable healthcare systems

An ontology based approach for data integration in regionally interoperable healthcare systems An ontology based approach for data integration in regionally interoperable healthcare systems Conference or Workshop Item Accepted Version Yang, H. and Li, W. (2009) An ontology based approach for data

More information

A Novel Categorized Search Strategy using Distributional Clustering Neenu Joseph. M 1, Sudheep Elayidom 2

A Novel Categorized Search Strategy using Distributional Clustering Neenu Joseph. M 1, Sudheep Elayidom 2 A Novel Categorized Search Strategy using Distributional Clustering Neenu Joseph. M 1, Sudheep Elayidom 2 1 Student, M.E., (Computer science and Engineering) in M.G University, India, 2 Associate Professor

More information

A Study on Different Challenges in Facial Recognition Methods

A Study on Different Challenges in Facial Recognition Methods Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 6, June 2015, pg.521

More information

Void main Technologies

Void main Technologies Sno Title Domain 1. A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specification and Verification 2. A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing 3. A Modified

More information

INTRODUCTION TO BIG DATA, DATA MINING, AND MACHINE LEARNING

INTRODUCTION TO BIG DATA, DATA MINING, AND MACHINE LEARNING CS 7265 BIG DATA ANALYTICS INTRODUCTION TO BIG DATA, DATA MINING, AND MACHINE LEARNING * Some contents are adapted from Dr. Hung Huang and Dr. Chengkai Li at UT Arlington Mingon Kang, PhD Computer Science,

More information

Fast Grain Shape Determination Algorithm Based on Parallel Processing

Fast Grain Shape Determination Algorithm Based on Parallel Processing 39 3 Vol.39, No.3 3 Opto-Electronic Engineering March, 3 5X(3 66 6,,,, (. ( Britton Chance 4374. 4374 (GPU (CUDA GPU (CPU 4 TP39 A.3969/j.issn.3-5X..3. Fast Grain Shape Determination Algorithm Based on

More information

Computer-based Tracking Protocols: Improving Communication between Databases

Computer-based Tracking Protocols: Improving Communication between Databases Computer-based Tracking Protocols: Improving Communication between Databases Amol Deshpande Database Group Department of Computer Science University of Maryland Overview Food tracking and traceability

More information

DOTNET Projects. DotNet Projects IEEE I. DOTNET based CLOUD COMPUTING. DOTNET based ARTIFICIAL INTELLIGENCE

DOTNET Projects. DotNet Projects IEEE I. DOTNET based CLOUD COMPUTING. DOTNET based ARTIFICIAL INTELLIGENCE DOTNET Projects I. DOTNET based CLOUD COMPUTING 1. Enabling Cloud Storage Auditing with VerifiableOutsourcing of Key Updates (IEEE 2. Conjunctive Keyword Search with Designated Tester and Timing Enabled

More information

Gender Classification Technique Based on Facial Features using Neural Network

Gender Classification Technique Based on Facial Features using Neural Network Gender Classification Technique Based on Facial Features using Neural Network Anushri Jaswante Dr. Asif Ullah Khan Dr. Bhupesh Gour Computer Science & Engineering, Rajiv Gandhi Proudyogiki Vishwavidyalaya,

More information

Management Information Systems MANAGING THE DIGITAL FIRM, 12 TH EDITION FOUNDATIONS OF BUSINESS INTELLIGENCE: DATABASES AND INFORMATION MANAGEMENT

Management Information Systems MANAGING THE DIGITAL FIRM, 12 TH EDITION FOUNDATIONS OF BUSINESS INTELLIGENCE: DATABASES AND INFORMATION MANAGEMENT MANAGING THE DIGITAL FIRM, 12 TH EDITION Chapter 6 FOUNDATIONS OF BUSINESS INTELLIGENCE: DATABASES AND INFORMATION MANAGEMENT VIDEO CASES Case 1: Maruti Suzuki Business Intelligence and Enterprise Databases

More information

SK International Journal of Multidisciplinary Research Hub Research Article / Survey Paper / Case Study Published By: SK Publisher

SK International Journal of Multidisciplinary Research Hub Research Article / Survey Paper / Case Study Published By: SK Publisher ISSN: 2394 3122 (Online) Volume 2, Issue 1, January 2015 Research Article / Survey Paper / Case Study Published By: SK Publisher P. Elamathi 1 M.Phil. Full Time Research Scholar Vivekanandha College of

More information

ISSN: , (2015): DOI:

ISSN: , (2015): DOI: www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 6 Issue 6 June 2017, Page No. 21737-21742 Index Copernicus value (2015): 58.10 DOI: 10.18535/ijecs/v6i6.31 A

More information

Hex-Grid Based Relay Node Deployment for Assuring Coverage and Connectivity in a Wireless Sensor Network

Hex-Grid Based Relay Node Deployment for Assuring Coverage and Connectivity in a Wireless Sensor Network ISBN 978-93-84422-8-6 17th IIE International Conference on Computer, Electrical, Electronics and Communication Engineering (CEECE-217) Pattaya (Thailand) Dec. 28-29, 217 Relay Node Deployment for Assuring

More information

Research on Heterogeneous Communication Network for Power Distribution Automation

Research on Heterogeneous Communication Network for Power Distribution Automation 3rd International Conference on Material, Mechanical and Manufacturing Engineering (IC3ME 2015) Research on Heterogeneous Communication Network for Power Distribution Automation Qiang YU 1,a*, Hui HUANG

More information

KEY BASED APPROACH FOR INTEGRATION OF HETEROGENEOUS DATA SOURCES

KEY BASED APPROACH FOR INTEGRATION OF HETEROGENEOUS DATA SOURCES KEY BASED APPROACH FOR INTEGRATION OF HETEROGENEOUS DATA SOURCES 1 KAMSURIAH AHMAD, 1 TENGKU SITI FATIMAH TENGKU WOOK, 2 REDUAN SAMAD 1 Strategic Management Research Group Faculty of Information Science

More information

ROUTING PROJECT LIST

ROUTING PROJECT LIST ROUTING PROJECT LIST Branches {Computer Science (CS), Information Science(IS), Software Engineering(SE),Electronics & Communication(EC), Telecommunication (TE),Information Technology(IT),Digital Communication(DCE),Digital

More information

Available online at ScienceDirect. Procedia Computer Science 52 (2015 )

Available online at  ScienceDirect. Procedia Computer Science 52 (2015 ) Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 52 (2015 ) 1071 1076 The 5 th International Symposium on Frontiers in Ambient and Mobile Systems (FAMS-2015) Health, Food

More information

Enhancing applications with Cognitive APIs IBM Corporation

Enhancing applications with Cognitive APIs IBM Corporation Enhancing applications with Cognitive APIs After you complete this section, you should understand: The Watson Developer Cloud offerings and APIs The benefits of commonly used Cognitive services 2 Watson

More information

Text Mining: A Burgeoning technology for knowledge extraction

Text Mining: A Burgeoning technology for knowledge extraction Text Mining: A Burgeoning technology for knowledge extraction 1 Anshika Singh, 2 Dr. Udayan Ghosh 1 HCL Technologies Ltd., Noida, 2 University School of Information &Communication Technology, Dwarka, Delhi.

More information

Grid Resources Search Engine based on Ontology

Grid Resources Search Engine based on Ontology based on Ontology 12 E-mail: emiao_beyond@163.com Yang Li 3 E-mail: miipl606@163.com Weiguang Xu E-mail: miipl606@163.com Jiabao Wang E-mail: miipl606@163.com Lei Song E-mail: songlei@nudt.edu.cn Jiang

More information

Table of Contents 1 Introduction A Declarative Approach to Entity Resolution... 17

Table of Contents 1 Introduction A Declarative Approach to Entity Resolution... 17 Table of Contents 1 Introduction...1 1.1 Common Problem...1 1.2 Data Integration and Data Management...3 1.2.1 Information Quality Overview...3 1.2.2 Customer Data Integration...4 1.2.3 Data Management...8

More information

Urban Scene Segmentation, Recognition and Remodeling. Part III. Jinglu Wang 11/24/2016 ACCV 2016 TUTORIAL

Urban Scene Segmentation, Recognition and Remodeling. Part III. Jinglu Wang 11/24/2016 ACCV 2016 TUTORIAL Part III Jinglu Wang Urban Scene Segmentation, Recognition and Remodeling 102 Outline Introduction Related work Approaches Conclusion and future work o o - - ) 11/7/16 103 Introduction Motivation Motivation

More information

ACIT'2015. Conference Program. Under the Patronage of Her Excellency Mrs. Majd Shweikeh Minister of Telecommunications and Information Technology

ACIT'2015. Conference Program. Under the Patronage of Her Excellency Mrs. Majd Shweikeh Minister of Telecommunications and Information Technology ACIT'2015 Conference Program Under the Patronage of Her Excellency Mrs. Majd Shweikeh Minister of Telecommunications and Information Technology Day 1 (Tuesday 15 December 2015) Registration Opening session

More information

WEB PAGE RE-RANKING TECHNIQUE IN SEARCH ENGINE

WEB PAGE RE-RANKING TECHNIQUE IN SEARCH ENGINE WEB PAGE RE-RANKING TECHNIQUE IN SEARCH ENGINE Ms.S.Muthukakshmi 1, R. Surya 2, M. Umira Taj 3 Assistant Professor, Department of Information Technology, Sri Krishna College of Technology, Kovaipudur,

More information

Proceedings of The Second International Conference on Web Information Systems Engineering

Proceedings of The Second International Conference on Web Information Systems Engineering Proceedings of The Second International Conference on Web Information Systems Engineering Volume 1 (Main Program) 3-6 December 2001 Kyoto, Japan Editors Tamer Ozsu Hans-Jorg Schek Katsumi Tanaka Yanchun

More information

DAISY Data Analysis and Information SecuritY Lab

DAISY Data Analysis and Information SecuritY Lab DAISY Data Analysis and Information SecuritY Lab Mobile Phone Enabled Social Community Extraction for Controlling of Disease Propagation in Healthcare Yingying (Jennifer) Chen Director of Data Analysis

More information

Chapter 6 VIDEO CASES

Chapter 6 VIDEO CASES Chapter 6 Foundations of Business Intelligence: Databases and Information Management VIDEO CASES Case 1a: City of Dubuque Uses Cloud Computing and Sensors to Build a Smarter, Sustainable City Case 1b:

More information

Density Based Clustering using Modified PSO based Neighbor Selection

Density Based Clustering using Modified PSO based Neighbor Selection Density Based Clustering using Modified PSO based Neighbor Selection K. Nafees Ahmed Research Scholar, Dept of Computer Science Jamal Mohamed College (Autonomous), Tiruchirappalli, India nafeesjmc@gmail.com

More information

Survey on Recommendation of Personalized Travel Sequence

Survey on Recommendation of Personalized Travel Sequence Survey on Recommendation of Personalized Travel Sequence Mayuri D. Aswale 1, Dr. S. C. Dharmadhikari 2 ME Student, Department of Information Technology, PICT, Pune, India 1 Head of Department, Department

More information

Competitive Intelligence and Web Mining:

Competitive Intelligence and Web Mining: Competitive Intelligence and Web Mining: Domain Specific Web Spiders American University in Cairo (AUC) CSCE 590: Seminar1 Report Dr. Ahmed Rafea 2 P age Khalid Magdy Salama 3 P age Table of Contents Introduction

More information

Name of the lecturer Doç. Dr. Selma Ayşe ÖZEL

Name of the lecturer Doç. Dr. Selma Ayşe ÖZEL Y.L. CENG-541 Information Retrieval Systems MASTER Doç. Dr. Selma Ayşe ÖZEL Information retrieval strategies: vector space model, probabilistic retrieval, language models, inference networks, extended

More information

Literature Survey on Various Recommendation Techniques in Collaborative Filtering

Literature Survey on Various Recommendation Techniques in Collaborative Filtering Literature Survey on Various Recommendation Techniques in Collaborative Filtering Mr. T. Sunil Reddy #, Mr. M. Dileep Kumar *, Mr.N. Vijaya sunder sagar # # M.Tech., Dept. of CSE, Ashoka Institute of Engineering

More information

A Study of Pattern-based Subtopic Discovery and Integration in the Web Track

A Study of Pattern-based Subtopic Discovery and Integration in the Web Track A Study of Pattern-based Subtopic Discovery and Integration in the Web Track Wei Zheng and Hui Fang Department of ECE, University of Delaware Abstract We report our systems and experiments in the diversity

More information

WEB SEARCH, FILTERING, AND TEXT MINING: TECHNOLOGY FOR A NEW ERA OF INFORMATION ACCESS

WEB SEARCH, FILTERING, AND TEXT MINING: TECHNOLOGY FOR A NEW ERA OF INFORMATION ACCESS 1 WEB SEARCH, FILTERING, AND TEXT MINING: TECHNOLOGY FOR A NEW ERA OF INFORMATION ACCESS BRUCE CROFT NSF Center for Intelligent Information Retrieval, Computer Science Department, University of Massachusetts,

More information

Detection of Missing Values from Big Data of Self Adaptive Energy Systems

Detection of Missing Values from Big Data of Self Adaptive Energy Systems Detection of Missing Values from Big Data of Self Adaptive Energy Systems MVD tool detect missing values in timeseries energy data Muhammad Nabeel Computer Science Department, SST University of Management

More information

Mir Abolfazl Mostafavi Centre for research in geomatics, Laval University Québec, Canada

Mir Abolfazl Mostafavi Centre for research in geomatics, Laval University Québec, Canada Mir Abolfazl Mostafavi Centre for research in geomatics, Laval University Québec, Canada Mohamed Bakillah and Steve H.L. Liang Department of Geomatics Engineering University of Calgary, Alberta, Canada

More information

HFCT: A Hybrid Fuzzy Clustering Method for Collaborative Tagging

HFCT: A Hybrid Fuzzy Clustering Method for Collaborative Tagging 007 International Conference on Convergence Information Technology HFCT: A Hybrid Fuzzy Clustering Method for Collaborative Tagging Lixin Han,, Guihai Chen Department of Computer Science and Engineering,

More information

D B M G Data Base and Data Mining Group of Politecnico di Torino

D B M G Data Base and Data Mining Group of Politecnico di Torino DataBase and Data Mining Group of Data mining fundamentals Data Base and Data Mining Group of Data analysis Most companies own huge databases containing operational data textual documents experiment results

More information

ITEE Journal. Information Technology & Electrical Engineering

ITEE Journal. Information Technology & Electrical Engineering An Overview of QoE for 5G Networks 1 Hajra Masood, 2 Safdar Rizvi, 3 Bilal Muhammad Iqbal Department of Computer Sciences, Bahria University, Karachi, Pakistan E-mail: 1 Hajra.cs@gmail.com, 2 dr.safdar@bimcs.edu.pk,

More information

DATA MINING. 3. ITDDM03 A Probabilistic Model of Social Working Memory for Information Retrieval in Social Interactions

DATA MINING. 3. ITDDM03 A Probabilistic Model of Social Working Memory for Information Retrieval in Social Interactions DATA MINING 1. ITDDM01 Reducing Uncertainty of Probabilistic Top-k Ranking via Pairwise Crowd sourcing 2. ITDDM02 An Approach for Building Efficient and Accurate Social Recommender Systems using Individual

More information

Open Access Research on the Prediction Model of Material Cost Based on Data Mining

Open Access Research on the Prediction Model of Material Cost Based on Data Mining Send Orders for Reprints to reprints@benthamscience.ae 1062 The Open Mechanical Engineering Journal, 2015, 9, 1062-1066 Open Access Research on the Prediction Model of Material Cost Based on Data Mining

More information

A study of Video Response Spam Detection on YouTube

A study of Video Response Spam Detection on YouTube A study of Video Response Spam Detection on YouTube Suman 1 and Vipin Arora 2 1 Research Scholar, Department of CSE, BITS, Bhiwani, Haryana (India) 2 Asst. Prof., Department of CSE, BITS, Bhiwani, Haryana

More information

CV of Qixiang Ye. University of Chinese Academy of Sciences

CV of Qixiang Ye. University of Chinese Academy of Sciences 2012-12-12 University of Chinese Academy of Sciences Qixiang Ye received B.S. and M.S. degrees in mechanical & electronic engineering from Harbin Institute of Technology (HIT) in 1999 and 2001 respectively,

More information

International Journal of Advanced Research in. Computer Science and Engineering

International Journal of Advanced Research in. Computer Science and Engineering Volume 4, Issue 1, January 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Design and Architecture

More information

The University of Jordan. Accreditation & Quality Assurance Center. Curriculum for Doctorate Degree

The University of Jordan. Accreditation & Quality Assurance Center. Curriculum for Doctorate Degree Accreditation & Quality Assurance Center Curriculum for Doctorate Degree 1. Faculty King Abdullah II School for Information Technology 2. Department Computer Science الدكتوراة في علم الحاسوب (Arabic).3

More information

A Framework on Ontology Based Classification and Clustering for Grouping Research Proposals

A Framework on Ontology Based Classification and Clustering for Grouping Research Proposals A Framework on Ontology Based Classification and Clustering for Grouping Research Proposals KODAM ANUSHA* 1 PG Scholar, Dept of CSE, Kakatiya Institute of Technology and Science, Warangal. Abstract- The

More information

An Approach to Manage and Search for Software Components *

An Approach to Manage and Search for Software Components * An Approach to Manage and Search for Software Components * 1 College of Information Engineering, Shenzhen University, Shenzhen, 518060, P.R.China Hao Chen 1, Zhong Ming 1, Shi Ying 2 2 State Key Lab. of

More information

COMPUTER SCIENCE (CSCI)

COMPUTER SCIENCE (CSCI) Bucknell University 1 COMPUTER SCIENCE (CSCI) Faculty Professors: Xiannong Meng, Luiz Felipe Perrone Associate Professors: Stephen M. Guattery (Chair), Brian R. King, Lea D. Wittie Assistant Professors:

More information

Deploying Access Control using Extended XACML in Open Web Service Environment

Deploying Access Control using Extended XACML in Open Web Service Environment Deploying Access Control using Extended XACML in Open Web Service Environment Thirumaran.M Pondicherry Engg College Dhavachelvan.P Pondicherry University Divya.A Pondicherry Engg College ABSTRACT Now a

More information

Chapter 3. Foundations of Business Intelligence: Databases and Information Management

Chapter 3. Foundations of Business Intelligence: Databases and Information Management Chapter 3 Foundations of Business Intelligence: Databases and Information Management THE DATA HIERARCHY TRADITIONAL FILE PROCESSING Organizing Data in a Traditional File Environment Problems with the traditional

More information

Who Should Read this Book?

Who Should Read this Book? Preface A course in Multimedia is rapidly becoming a necessity in Computer Science and Engineering curricula, especially now that multimedia touches most aspects of these fields. Multimedia was originally

More information

Tag Based Image Search by Social Re-ranking

Tag Based Image Search by Social Re-ranking Tag Based Image Search by Social Re-ranking Vilas Dilip Mane, Prof.Nilesh P. Sable Student, Department of Computer Engineering, Imperial College of Engineering & Research, Wagholi, Pune, Savitribai Phule

More information

Chapter 27 Introduction to Information Retrieval and Web Search

Chapter 27 Introduction to Information Retrieval and Web Search Chapter 27 Introduction to Information Retrieval and Web Search Copyright 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Chapter 27 Outline Information Retrieval (IR) Concepts Retrieval

More information

A Survey of Parallel Social Spider Optimization Algorithm based on Swarm Intelligence for High Dimensional Datasets

A Survey of Parallel Social Spider Optimization Algorithm based on Swarm Intelligence for High Dimensional Datasets International Journal of Computational Intelligence Research ISSN 0973-1873 Volume 13, Number 9 (2017), pp. 2259-2265 Research India Publications http://www.ripublication.com A Survey of Parallel Social

More information

SEMANTIC SUPPORT FOR MEDICAL IMAGE SEARCH AND RETRIEVAL

SEMANTIC SUPPORT FOR MEDICAL IMAGE SEARCH AND RETRIEVAL SEMANTIC SUPPORT FOR MEDICAL IMAGE SEARCH AND RETRIEVAL Wang Wei, Payam M. Barnaghi School of Computer Science and Information Technology The University of Nottingham Malaysia Campus {Kcy3ww, payam.barnaghi}@nottingham.edu.my

More information

A FRAMEWORK FOR KNOWLEDGE-BASED CONFIGURATION OF PROJECT MANAGEMENT INFORMATION SYSTEMS

A FRAMEWORK FOR KNOWLEDGE-BASED CONFIGURATION OF PROJECT MANAGEMENT INFORMATION SYSTEMS A FRAMEWORK FOR KNOWLEDGE-BASED CONFIGURATION OF PROJECT MANAGEMENT INFORMATION SYSTEMS Solvita Berzisa, Janis Grabis Riga Technical University, Faculty of Computer Science and Information Technology,

More information

Table Of Contents: xix Foreword to Second Edition

Table Of Contents: xix Foreword to Second Edition Data Mining : Concepts and Techniques Table Of Contents: Foreword xix Foreword to Second Edition xxi Preface xxiii Acknowledgments xxxi About the Authors xxxv Chapter 1 Introduction 1 (38) 1.1 Why Data

More information

DEVELOPMENT OF ONTOLOGY-BASED INTELLIGENT SYSTEM FOR SOFTWARE TESTING

DEVELOPMENT OF ONTOLOGY-BASED INTELLIGENT SYSTEM FOR SOFTWARE TESTING Abstract DEVELOPMENT OF ONTOLOGY-BASED INTELLIGENT SYSTEM FOR SOFTWARE TESTING A. Anandaraj 1 P. Kalaivani 2 V. Rameshkumar 3 1 &2 Department of Computer Science and Engineering, Narasu s Sarathy Institute

More information

A Compatible Public Service Platform for Multi-Electronic Certification Authority

A Compatible Public Service Platform for Multi-Electronic Certification Authority Applied Mechanics and Materials Submitted: 2014-04-26 ISSN: 1662-7482, Vol. 610, pp 579-583 Accepted: 2014-05-26 doi:10.4028/www.scientific.net/amm.610.579 Online: 2014-08-11 2014 Trans Tech Publications,

More information

SURVEY ON SMART ANALYSIS OF CCTV SURVEILLANCE

SURVEY ON SMART ANALYSIS OF CCTV SURVEILLANCE International Journal of Computer Engineering and Applications, Volume XI, Special Issue, May 17, www.ijcea.com ISSN 2321-3469 SURVEY ON SMART ANALYSIS OF CCTV SURVEILLANCE Nikita Chavan 1,Mehzabin Shaikh

More information

A SURVEY ON CLOUD RESOURCE ALLOCATION STRATEGIES

A SURVEY ON CLOUD RESOURCE ALLOCATION STRATEGIES A SURVEY ON CLOUD RESOURCE ALLOCATION STRATEGIES K.Padmaveni 1, E.R. Naganathan 2 1 Asst. Professor, CSE, Hindustan University, (India) 2 Professor, CSE, Hindustan University, (India) ABSTRACT Cloud computing

More information

Contributors. Acknowledgements Abbreviations

Contributors. Acknowledgements Abbreviations Contributors Foreword Acknowledgements Abbreviations xi xvii xix xxi 1 Introduction 1 Chimay J. Anumba and Kirti Ruikar 1.1 Context 1 1.2 Structure of the book 2 References 4 2 Fundamentals of e-business

More information

Information mining and information retrieval : methods and applications

Information mining and information retrieval : methods and applications Information mining and information retrieval : methods and applications J. Mothe, C. Chrisment Institut de Recherche en Informatique de Toulouse Université Paul Sabatier, 118 Route de Narbonne, 31062 Toulouse

More information

A Recommender System Based on Improvised K- Means Clustering Algorithm

A Recommender System Based on Improvised K- Means Clustering Algorithm A Recommender System Based on Improvised K- Means Clustering Algorithm Shivani Sharma Department of Computer Science and Applications, Kurukshetra University, Kurukshetra Shivanigaur83@yahoo.com Abstract:

More information

Classification-based Retrieval Methods to Enhance Information Discovery on the Web

Classification-based Retrieval Methods to Enhance Information Discovery on the Web Classification-based Retrieval Methods to Enhance Information Discovery on the Web Yogendra Kumar Jain 1 and Sandeep Wadekar 2 1 Head of Department, Computer Science & Engineering Samrat Ashok Technological

More information

VIDEO MINING AND ANOMALY DETECTION SURVEY

VIDEO MINING AND ANOMALY DETECTION SURVEY Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 2, February 2014,

More information

Keywords Data alignment, Data annotation, Web database, Search Result Record

Keywords Data alignment, Data annotation, Web database, Search Result Record Volume 5, Issue 8, August 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Annotating Web

More information

Restricted Nearest Feature Line with Ellipse for Face Recognition

Restricted Nearest Feature Line with Ellipse for Face Recognition Journal of Information Hiding and Multimedia Signal Processing c 2012 ISSN 2073-4212 Ubiquitous International Volume 3, Number 3, July 2012 Restricted Nearest Feature Line with Ellipse for Face Recognition

More information

Semantic Web Mining and its application in Human Resource Management

Semantic Web Mining and its application in Human Resource Management International Journal of Computer Science & Management Studies, Vol. 11, Issue 02, August 2011 60 Semantic Web Mining and its application in Human Resource Management Ridhika Malik 1, Kunjana Vasudev 2

More information

Industry Adoption of Semantic Web Technology

Industry Adoption of Semantic Web Technology IBM China Research Laboratory Industry Adoption of Semantic Web Technology Dr. Yue Pan panyue@cn.ibm.com Outline Business Drivers Industries as early adopters A Software Roadmap Conclusion Data Semantics

More information

SIDDHARTH GROUP OF INSTITUTIONS :: PUTTUR Siddharth Nagar, Narayanavanam Road QUESTION BANK (DESCRIPTIVE)

SIDDHARTH GROUP OF INSTITUTIONS :: PUTTUR Siddharth Nagar, Narayanavanam Road QUESTION BANK (DESCRIPTIVE) SIDDHARTH GROUP OF INSTITUTIONS :: PUTTUR Siddharth Nagar, Narayanavanam Road 517583 QUESTION BANK (DESCRIPTIVE) Subject with Code : Data Warehousing and Mining (16MC815) Year & Sem: II-MCA & I-Sem Course

More information

Department of Computer Science and Engineering B.E/B.Tech/M.E/M.Tech : B.E. Regulation: 2013 PG Specialisation : _

Department of Computer Science and Engineering B.E/B.Tech/M.E/M.Tech : B.E. Regulation: 2013 PG Specialisation : _ COURSE DELIVERY PLAN - THEORY Page 1 of 6 Department of Computer Science and Engineering B.E/B.Tech/M.E/M.Tech : B.E. Regulation: 2013 PG Specialisation : _ LP: CS6007 Rev. No: 01 Date: 27/06/2017 Sub.

More information

Ontology based Web Page Topic Identification

Ontology based Web Page Topic Identification Ontology based Web Page Topic Identification Abhishek Singh Rathore Department of Computer Science & Engineering Maulana Azad National Institute of Technology Bhopal, India Devshri Roy Department of Computer

More information

Adversarial Machine Learning An Introduction. With slides from: Binghui Wang

Adversarial Machine Learning An Introduction. With slides from: Binghui Wang Adversarial Machine Learning An Introduction With slides from: Binghui Wang Outline Machine Learning (ML) Adversarial ML Attack Taxonomy Capability Adversarial Training Conclusion Outline Machine Learning

More information

A service based on Linked Data to classify Web resources using a Knowledge Organisation System

A service based on Linked Data to classify Web resources using a Knowledge Organisation System A service based on Linked Data to classify Web resources using a Knowledge Organisation System A proof of concept in the Open Educational Resources domain Abstract One of the reasons why Web resources

More information

A Brief Review of Representation Learning in Recommender 赵鑫 RUC

A Brief Review of Representation Learning in Recommender 赵鑫 RUC A Brief Review of Representation Learning in Recommender Systems @ 赵鑫 RUC batmanfly@qq.com Representation learning Overview of recommender systems Tasks Rating prediction Item recommendation Basic models

More information

The 2018 (14th) International Conference on Data Science (ICDATA)

The 2018 (14th) International Conference on Data Science (ICDATA) CALL FOR PAPERS LATE BREAKING PAPERS, POSITION PAPERS, ABSTRACTS, POSTERS Paper Submission Deadline: May 20, 2018 The 2018 (14th) International Conference on Data Science (ICDATA) (former International

More information

E6885 Network Science Lecture 11: Knowledge Graphs

E6885 Network Science Lecture 11: Knowledge Graphs E 6885 Topics in Signal Processing -- Network Science E6885 Network Science Lecture 11: Knowledge Graphs Ching-Yung Lin, Dept. of Electrical Engineering, Columbia University November 25th, 2013 Course

More information

Kuan-Wen Chen SUMMARY RESEARCH INTERESTS EDUCATION #31648

Kuan-Wen Chen SUMMARY RESEARCH INTERESTS EDUCATION #31648 Kuan-Wen Chen Assistant Professor Department of Computer Science National Chiao Tung University Hsinchu, Taiwan +886-3-5712121#31648 kuanwen@cs.nctu.edu.tw SUMMARY Expertise in computer vision, pattern

More information

Ontology Molecule Theory-based Information Integrated Service for Agricultural Risk Management

Ontology Molecule Theory-based Information Integrated Service for Agricultural Risk Management 2154 JOURNAL OF SOFTWARE, VOL. 6, NO. 11, NOVEMBER 2011 Ontology Molecule Theory-based Information Integrated Service for Agricultural Risk Management Qin Pan College of Economics Management, Huazhong

More information

1 Copyright 2011, Oracle and/or its affiliates. All rights reserved.

1 Copyright 2011, Oracle and/or its affiliates. All rights reserved. 1 Copyright 2011, Oracle and/or its affiliates. All rights reserved. Integrating Complex Financial Workflows in Oracle Database Xavier Lopez Seamus Hayes Oracle PolarLake, LTD 2 Copyright 2011, Oracle

More information

Object Tracking using Superpixel Confidence Map in Centroid Shifting Method

Object Tracking using Superpixel Confidence Map in Centroid Shifting Method Indian Journal of Science and Technology, Vol 9(35), DOI: 10.17485/ijst/2016/v9i35/101783, September 2016 ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 Object Tracking using Superpixel Confidence

More information

Poster Spotlights. Session: Motion and Tracking I: Tracking People, Tue 14 June 2010, 1:40-3:20 pm

Poster Spotlights. Session: Motion and Tracking I: Tracking People, Tue 14 June 2010, 1:40-3:20 pm The Twenty-Third IEEE Conference on Computer Vision and Pattern Recognition Poster Spotlights Session: Motion and Tracking I: Tracking People, Tue 14 June 2010, 1:40-3:20 pm Efficient Extraction of Human

More information

Taxonomy Tools: Collaboration, Creation & Integration. Dow Jones & Company

Taxonomy Tools: Collaboration, Creation & Integration. Dow Jones & Company Taxonomy Tools: Collaboration, Creation & Integration Dave Clarke Global Taxonomy Director dave.clarke@dowjones.com Dow Jones & Company Introduction Software Tools for Taxonomy 1. Collaboration 2. Creation

More information

Implementation and Design of Security Configuration Check Toolkit for Classified Evaluation of Information System

Implementation and Design of Security Configuration Check Toolkit for Classified Evaluation of Information System National Conference on Information Technology and Computer Science (CITCS 2012) Implementation and Design of Security Configuration Check Toolkit for Classified Evaluation of Information System WANG Tian

More information

Cellular Learning Automata-Based Color Image Segmentation using Adaptive Chains

Cellular Learning Automata-Based Color Image Segmentation using Adaptive Chains Cellular Learning Automata-Based Color Image Segmentation using Adaptive Chains Ahmad Ali Abin, Mehran Fotouhi, Shohreh Kasaei, Senior Member, IEEE Sharif University of Technology, Tehran, Iran abin@ce.sharif.edu,

More information