7,655 research outputs found

    Discovery Of Strain Support On Community Relatives In Social Networks

    Get PDF
    We offer a variety of algorithms to solve this new problem-solving process through three stages: pre-processing to find relevant topics, setting up sessions for multiple users, building all members STPs are the (expected) values ​​for individuals through the development of design, and selection in URSTPs Recipients of STPs. Critical and sensitive information, a detailed study is available. Supporting the assumptions is simply the standard measure for evaluating the consistency of a model, and it is understood that the amount or percentage of information involved in the design is in the underlying database. Acquired patterns are not particularly attractive for this purpose, as they are rare but very important for individuals to exhibit personal and negative behaviors that are complemented by reduced self-esteem. We propose a framework for solving this problem in practice, and designing appropriate algorithms to help. Initially, we provide first-hand treatment and evidence-based methods to cover the topic and plan the session. This method can be considered as a good match between the titles you purchased and endorsed by the STP and other topics that may have occurred in the purchases purchased by a particular class. The results suggest that our approach is able to capture and reveal the personal behavior of internet users in a transparent way

    CONFISCATION USER PERCEPTION OF SERIES PATTERNS IS RARE IN DOCUMENT STREAMS

    Get PDF
    We provide several algorithms to solve this innovative mining problem through three stages: processed to extract probabilistic issues and identify sessions for multiple users, generate all STP candidates with support values ​​(expected) for each user growth patterns, and decide on URSTP by searching for a rare user analysis Sensitive in derived STPs. Little information is inevitable, extensive survey is available. Easily support the idea of ​​the most popular scale to evaluate sequential pattern pattern, defined as the quantity or sequence ratio containing the pattern information in the target database. Patterns acquired are not always interesting for this purpose to be reduced rare but meaningful patterns representing custom and abnormal individual behaviors due to low support. We advised a framework for solving this issue in a practical way and designing algorithms to assist in the interview. In the beginning, we offer pre-treatment procedures with the extraction of heuristic methods and the identification of sessions. This identity method can be considered a sequence between the items purchased and selected by STP and the probabilistic issues that occur within the purchased documents related to a particular cycle. The results indicate that our approach can certainly capture personal behaviors of online users and express them in an understandable way

    INTRODUCTION CONSUMER RESPONSIVE RARE CHRONOLOGICAL TOPIC PATTERNS IN FILE STREAMS

    Get PDF
    We offer several algorithms to solve this innovative mining problem in three stages: pre-processing to extract probabilistic issues and identify sessions for multiple users, generate all STP candidates with support values ​​(expected) per user for pattern growth, and decide on URSTP by searching for rare analysis the user is sensitive in derived STPs. Little information is inevitable, extensive survey is available. Easily supporting the idea is the most common metric for evaluating sequence sequencing and is understood as the amount or proportion of the sequence of information contained within the target database. The acquired patterns are not always interesting for this purpose, because the rare but important patterns of individual and personal behaviors are reduced by reduced support. We recommend a framework to solve this problem pragmatically and design similar algorithms to help you. In the beginning, we offer pre-treatment procedures with the extraction of heuristic methods and the identification of sessions. This method can be considered as a sequential match between the purchased items identified by STP as well as the probabilistic problems that occur within the purchased documents that belong to a particular session. The results indicate that our approach can certainly capture personal behaviors of online users and express them in an understandable way

    CONFISCATION USER PERCEPTION OF SERIES PATTERNS IS RARE IN DOCUMENT STREAMS

    Get PDF
    We provide several algorithms to solve this innovative mining problem through three stages: processed to extract probabilistic issues and identify sessions for multiple users, generate all STP candidates with support values ​​(expected) for each user growth patterns, and decide on URSTP by searching for a rare user analysis Sensitive in derived STPs. Little information is inevitable, extensive survey is available. Easily support the idea of ​​the most popular scale to evaluate sequential pattern pattern, defined as the quantity or sequence ratio containing the pattern information in the target database. Patterns acquired are not always interesting for this purpose to be reduced rare but meaningful patterns representing custom and abnormal individual behaviors due to low support. We advised a framework for solving this issue in a practical way and designing algorithms to assist in the interview. In the beginning, we offer pre-treatment procedures with the extraction of heuristic methods and the identification of sessions. This identity method can be considered a sequence between the items purchased and selected by STP and the probabilistic issues that occur within the purchased documents related to a particular cycle. The results indicate that our approach can certainly capture personal behaviors of online users and express them in an understandable way

    Corporate Smart Content Evaluation

    Get PDF
    Nowadays, a wide range of information sources are available due to the evolution of web and collection of data. Plenty of these information are consumable and usable by humans but not understandable and processable by machines. Some data may be directly accessible in web pages or via data feeds, but most of the meaningful existing data is hidden within deep web databases and enterprise information systems. Besides the inability to access a wide range of data, manual processing by humans is effortful, error-prone and not contemporary any more. Semantic web technologies deliver capabilities for machine-readable, exchangeable content and metadata for automatic processing of content. The enrichment of heterogeneous data with background knowledge described in ontologies induces re-usability and supports automatic processing of data. The establishment of “Corporate Smart Content” (CSC) - semantically enriched data with high information content with sufficient benefits in economic areas - is the main focus of this study. We describe three actual research areas in the field of CSC concerning scenarios and datasets applicable for corporate applications, algorithms and research. Aspect- oriented Ontology Development advances modular ontology development and partial reuse of existing ontological knowledge. Complex Entity Recognition enhances traditional entity recognition techniques to recognize clusters of related textual information about entities. Semantic Pattern Mining combines semantic web technologies with pattern learning to mine for complex models by attaching background knowledge. This study introduces the afore-mentioned topics by analyzing applicable scenarios with economic and industrial focus, as well as research emphasis. Furthermore, a collection of existing datasets for the given areas of interest is presented and evaluated. The target audience includes researchers and developers of CSC technologies - people interested in semantic web features, ontology development, automation, extracting and mining valuable information in corporate environments. The aim of this study is to provide a comprehensive and broad overview over the three topics, give assistance for decision making in interesting scenarios and choosing practical datasets for evaluating custom problem statements. Detailed descriptions about attributes and metadata of the datasets should serve as starting point for individual ideas and approaches

    A Survey of Location Prediction on Twitter

    Full text link
    Locations, e.g., countries, states, cities, and point-of-interests, are central to news, emergency events, and people's daily lives. Automatic identification of locations associated with or mentioned in documents has been explored for decades. As one of the most popular online social network platforms, Twitter has attracted a large number of users who send millions of tweets on daily basis. Due to the world-wide coverage of its users and real-time freshness of tweets, location prediction on Twitter has gained significant attention in recent years. Research efforts are spent on dealing with new challenges and opportunities brought by the noisy, short, and context-rich nature of tweets. In this survey, we aim at offering an overall picture of location prediction on Twitter. Specifically, we concentrate on the prediction of user home locations, tweet locations, and mentioned locations. We first define the three tasks and review the evaluation metrics. By summarizing Twitter network, tweet content, and tweet context as potential inputs, we then structurally highlight how the problems depend on these inputs. Each dependency is illustrated by a comprehensive review of the corresponding strategies adopted in state-of-the-art approaches. In addition, we also briefly review two related problems, i.e., semantic location prediction and point-of-interest recommendation. Finally, we list future research directions.Comment: Accepted to TKDE. 30 pages, 1 figur

    An Efficient Information Extraction Mechanism with Page Ranking and a Classification Strategy based on Similarity Learning of Web Text Documents

    Get PDF
    Users have recently had more access to information thanks to the growth of the www information system. In these situations, search engines have developed into an essential tool for consumers to find information in a big space. The difficulty of handling this wealth of knowledge grows more difficult every day. Although search engines are crucial for information gathering, many of the results they offer are not required by the user because they are ranked according on user string matches. As a result, there were semantic disparities between the terms used in the user inquiry and the importance of catch phrases in the results. The problem of grouping relevant information into categories of related topics hasn't been solved. A Ranking Based Similarity Learning Approach and SVM based classification frame work of web text to estimate the semantic comparison between words to improve extraction of information is proposed in the work. The results of the experiment suggest improvisation in order to obtain better results by retrieving more relevant results

    Data science applications to connected vehicles: Key barriers to overcome

    Get PDF
    The connected vehicles will generate huge amount of pervasive and real time data, at very high frequencies. This poses new challenges for Data science. How to analyse these data and how to address short-term and long-term storage are some of the key barriers to overcome.JRC.C.6-Economics of Climate Change, Energy and Transpor
    corecore