BLOOD DONATION SYSTEM FOR ONLINE USERS
|
|
|
- Jason Harmon
- 9 years ago
- Views:
Transcription
1 BLOOD DONATION SYSTEM FOR ONLINE USERS San San Tint 1 and Htoi Mai 2 1 Department of Research and Development II, University of Computer Studies, Mandalay, Myanmar 2 Master of Computer Science, University of computer Studies Mandalay, Myanmar Abstract Most of people desire to know about online blood donation to the patients at once. Patients want to get blood to live at emergency time. At present people are needed to know how to contact blood donors online. This system provides how to get blood at their serious time to be longer life time. Matcher system is implemented with Decision Tree and Decision Table by rules. This matcher applies the rules based on Blood Donation in Blood Bank in Myanmar. Information about donors and patients has been reserved in the system so that it is ready to donate blood instantly. Keywords Decision, Major, Matcher, Minor, Patient 1. Introduction The development of a Blood Donation System depends on web-based application. System has web-based matcher which acts as server to match donors and patient pair compatibly by using rule-based knowledge. All Clinic System should have patient and donor information control matcher system. Nowadays, computers are the most useful for all fields; they can also stand for information distributing, catching, matching, etc. All doctors who are system s members can see donors and patients data and matching information. The health systems using web based application were aided human beings. In this system, blood matcher can help donors and patients to get the best matcher. The establishment of web-based matcher for blood donation system is to encourage blood donor society. Current knowledge applications mainly focus on the discovery, creation, preservation, sharing and direct use of information. Web-based matcher is Web-based application by using knowledge rules, will help the cost of living and saving lives. 2. Background Theory 2.1. Web-based Application A web application is any application that uses a web browser as a client. Web based applications make effectiveness for our organization to take good profit. Opportunities come up from Web based application that can be accessed the information from anywhere in the world. It is also providing user to save time and money and making the interactivity better with customers and partners. It permits the administrative plan for staff to be better working from any location. Moreover, users can find to meet their purposes in time and they proceed ultimate aims without wasting valuable things like energy, time, even clothes. DOI : /caij
2 2.2. Rule-based Knowledge Methods frequently used for knowledge representation are: Rule-based Knowledge, Frame-based Knowledge, Semantic Network, Logic theory and Ontology theory. All of these, Rule-based Knowledge is the most usual use expressive method. Rules are used to support decision making in classification, regression and association tasks. Different types of rules are used to express different types of knowledge [1] [2] [3]. There are many types of rules as following: o Classical prepositional logic rules (C-rules), o Association rules (A-rules), o Fuzzy logic rules (F-rules), o M-of-N or threshold rules (T-rules), o Similarity or prototype-based rules (P-rules) Decision Branch for Tree Decision points typically have two or three branches [5]. At the ends of the branches are the outcomes of the decision process. The branch arrangement of a decision tree is as below Decision Tree Classifier for C Rule Figure 1. General Branch Arrangement of Decision Tree In general expressive power of C-rules is limited. Three other types of rules are fuzzy, threshold and prototype-based rules. Decision trees represent rules in a hierarchical structure with each path/branch giving single rule. Algorithms that simplify such rules converting it into logical rules are known, for example the C4 rules for the C4.5 decision trees [1] [6] Decision Table for System A decision table is a non-graphical way of representing the steps involved in making a decision [7]. 30
3 Issue area SYSTEM CONDITION SET SYSTEM ACTION SET SYSTEM CONDITION SPACE SYSTEM ACTION SPACE Figure 2. General Flow of a System's Decision Table The decision table is divided into three main areas: o System's Conditions o System's Actions o System's Rules Decision Table Development for Example There are five stages may be distinguished. o Definition of conditions, condition states, actions and action states for the specific choice issue; o Specification of the issue in terms of decision rules; o Building of the decision table on the basis of the decision rules; o Check for completeness, contradictions and correctness; o Simplification, optimization and depiction of the decision table. (a) Full table (b) Table contraction C 1 Y N C 2 Y N Y N C 3 Y N Y N Y N Y N A 1 X - X A 2 - X - X - X - X A 3 X X - X - R R 1 R 2 R 3 R 4 R 5 R 6 R 7 R 8 (c) Row order optimization C 1 Y N C 2 Y N - C 3 Y N Y N Y N A 1 X - X A 2 - X - X - X A 3 X X - R R 1 R 2 R 3 R 4 R 5 R 6 C 3 Y N C 1 Y N - C 2 Y N - - A 1 X X - - A X A 3 X - X - R R 1 R 2 R 3 R 4 Figure 3. Optimization of a Decision Table using Two Different Transformations for Example 31
4 Yes/No questions Conditions RULES Car is in good Y Y Y Y N N N N condition Its price is Y Y N N Y Y N N under $7500 Its registration Y N Y N Y N Y N is current Actions Purchase the X X X car Reject the car X X X X X Possible outcomes Y= Condition is true N= Condition is false X=This action matches the given rules Figure 4. Decision Table for Purchase Car with Conditions for Example 1. Identify conditions and their alternative values. o Gender s alternative values are: F and M. o City dweller s alternative values are: Y and N. o Age group s alternative values are: A, B, and C. 2. Compute max. number of rules. o 2 x 2 x 3 = 12. o Rule 4 corresponds to M, N, and A. Rule 5 corresponds to F, Y, and B. Rule 6 corresponds to M, Y, and B and so on. 3. Identify possible actions o Market product W, X, Y, or Z. 4. Match each of the actions to take given each rule. Table 1. Decision Table with Possible Actions Gender F M F M F M F M F M F M City Y Y N N Y Y N N Y Y N N Age A A A A B B B B C C C C MarketW X X X MarketX X X MarketY MarketZ X X X X X X X X X X X 32
5 5. Check that the actions given to each rule are correct. 6. Simplify the table. o o If so, remove those columns. In the example scenario, columns 2, 4, 6, 7, 10, and 12 have the same action. For rules 2, 6, and 10; the age group is a don t care. Table 2. Decision Table with Optimize Actions Gender F M F M F M F M F M City Y Y N N Y N N Y N N Age A A A B B B C C C MarketW X X X MarketX X X MarketY X MarketZ X X X X X X X X 3. Our System Figure 5. System Architecture of Blood Matcher 33
6 The system is designed to process as follows: two types of users are allowed in this system, the donor type and the patient type. For donor account, as input, the donor needs to enter the information needed for patient to inquire necessary blood. Then the matcher decided to accept the donation of donor or not by using their rules based knowledge. The architecture for Blood Donation System is as shown in Figure 5. There are three main roles and three main processes. The three main roles are donor, patient and matcher. The three main processes are record the memberships of donors and patients, acquire to get the donor s purification blood and matching the patient with related donors. It needs main database for requirements like specific rules for donors. Main rules are divided into two classes in which man and woman. In donation for blood, specifications for man are not same for woman. The system has three level specifications like major, minor and serious. Patients can search on this page for their needs when they want the blood seriously. Figure 6. Home Page of the Blood Donation System First of all, the system shows the home page Figure 6. The blood match table is shown on the left side of the page. And the right side of the page is included Donor Login!, Donor SignUp! for donors, Patient Login!, Patient Blood Request for patients, Donated List!, Home and About System for all. 34
7 Figure 7 (a). Major Facts Page Figure 7(b). Major Facts Page with Woman Sections 35
8 The Major Facts acquisition woman case will be answered for blood donor is a woman. Therefore, the questions for the woman are no need to answer for a man. But a man who is a blood donor makes a mistake that he fills the questions for the woman blood donor. Then the system automatically understands and these answers will be taken as don t care condition and operate the acquisition action as shown in Figure 7(a) and 7 (b). 4. Conclusion This system provides communication between the Blood Donors and Patients compatibly. Webbased matcher draws up acceptable Blood Donors information for Patient by using Knowledgebased Rules. Moreover, the Web-based system provides more suitable application for health care and life saving processes. This system can be extended to other welfare societies and health organizations. Acknowledgements Our heartfelt thanks go to all people, who support us at the University of Computer Studies, Mandalay, Myanmar. This paper is dedicated to our parents. Our special thanks go to all respectable persons who support for valuable suggestion in this paper. References [1] W. Duch, " Rule-Based Methods,Department of Informatics", Nicolaus Copernicus University, Poland, School of Computer Engineering, Nanyang Technological University, Singapore [email protected]. [2] Lecture 2 Rule-based Expert Systems, Negnevitsky, Person Education, [3] D. Partridge and K. M. Hussain, "Knowledge Based Information Systems", Mc-Graw Hill, [4] S. R. Safavian and D. Landgrebe, A Survey of Decision Tree Classifier Methodology, School of Electrical Engineering Purdue University, West Lafayette, [email protected]. [5] M. Verhelst, and De praktijk, "van beslissingstabellen. Deventer and Antwerp", Kluwer, [6] J. Vanthienen, "Automatiseringsaspecten van de specificatie, constructie en manipulatie van beslissingstabellen", Katholieke Universiteit Leuven, Departement Toegeapste Economische Wetenschappen, Ph.D. thesis, [7] J. Vanthienen, and G. Wets, "From decision tables to expert system shells ", Data & Knowledge Engineering, 13, , Authors She is Associate Professor, Head of Department of Research and Development II in University of Computer Studies, Mandalay, Myanmar. Her research areas include Information Retrieval, Cryptography and Network Security, Web Mining and Networking. She received her B. Sc. (Physics), M.Sc.(Physics) from Yangon University, Myanmar and M.A.Sc.(Computer Engineering) and Ph.D.( Information Technology) from University of Computer Studies, Yangon, Myanmar. Author studied computer science at the University of Computer Studies, lasho, Myanmar where she received her B.C.Sc Degree in She received B.C.Sc(Hons:) in computer science from the University of Computer Studies, Lasho, Myanmar in Since 2012, Au thor has studied computer science at the University of Computer Studies, Mandalay, Myanmar where her primary interests include web mining, graph clustering, grouping and web log analysis. 36
131-1. Adding New Level in KDD to Make the Web Usage Mining More Efficient. Abstract. 1. Introduction [1]. 1/10
1/10 131-1 Adding New Level in KDD to Make the Web Usage Mining More Efficient Mohammad Ala a AL_Hamami PHD Student, Lecturer m_ah_1@yahoocom Soukaena Hassan Hashem PHD Student, Lecturer soukaena_hassan@yahoocom
01219211 Software Development Training Camp 1 (0-3) Prerequisite : 01204214 Program development skill enhancement camp, at least 48 person-hours.
(International Program) 01219141 Object-Oriented Modeling and Programming 3 (3-0) Object concepts, object-oriented design and analysis, object-oriented analysis relating to developing conceptual models
FUZZY CLUSTERING ANALYSIS OF DATA MINING: APPLICATION TO AN ACCIDENT MINING SYSTEM
International Journal of Innovative Computing, Information and Control ICIC International c 0 ISSN 34-48 Volume 8, Number 8, August 0 pp. 4 FUZZY CLUSTERING ANALYSIS OF DATA MINING: APPLICATION TO AN ACCIDENT
This software agent helps industry professionals review compliance case investigations, find resolutions, and improve decision making.
Lost in a sea of data? Facing an external audit? Or just wondering how you re going meet the challenges of the next regulatory law? When you need fast, dependable support and company-specific solutions
KNOWLEDGE FACTORING USING NORMALIZATION THEORY
KNOWLEDGE FACTORING USING NORMALIZATION THEORY J. VANTHIENEN M. SNOECK Katholieke Universiteit Leuven Department of Applied Economic Sciences Dekenstraat 2, 3000 Leuven (Belgium) tel. (+32) 16 28 58 09
Mining for Web Engineering
Mining for Engineering A. Venkata Krishna Prasad 1, Prof. S.Ramakrishna 2 1 Associate Professor, Department of Computer Science, MIPGS, Hyderabad 2 Professor, Department of Computer Science, Sri Venkateswara
The University of Jordan
The University of Jordan Master in Web Intelligence Non Thesis Department of Business Information Technology King Abdullah II School for Information Technology The University of Jordan 1 STUDY PLAN MASTER'S
Data Mining for Customer Service Support. Senioritis Seminar Presentation Megan Boice Jay Carter Nick Linke KC Tobin
Data Mining for Customer Service Support Senioritis Seminar Presentation Megan Boice Jay Carter Nick Linke KC Tobin Traditional Hotline Services Problem Traditional Customer Service Support (manufacturing)
Practical Applications of DATA MINING. Sang C Suh Texas A&M University Commerce JONES & BARTLETT LEARNING
Practical Applications of DATA MINING Sang C Suh Texas A&M University Commerce r 3 JONES & BARTLETT LEARNING Contents Preface xi Foreword by Murat M.Tanik xvii Foreword by John Kocur xix Chapter 1 Introduction
CHAPTER 5 INTELLIGENT TECHNIQUES TO PREVENT SQL INJECTION ATTACKS
66 CHAPTER 5 INTELLIGENT TECHNIQUES TO PREVENT SQL INJECTION ATTACKS 5.1 INTRODUCTION In this research work, two new techniques have been proposed for addressing the problem of SQL injection attacks, one
Understanding Web personalization with Web Usage Mining and its Application: Recommender System
Understanding Web personalization with Web Usage Mining and its Application: Recommender System Manoj Swami 1, Prof. Manasi Kulkarni 2 1 M.Tech (Computer-NIMS), VJTI, Mumbai. 2 Department of Computer Technology,
Predictive Dynamix Inc
Predictive Modeling Technology Predictive modeling is concerned with analyzing patterns and trends in historical and operational data in order to transform data into actionable decisions. This is accomplished
Master of Science in Health Information Technology Degree Curriculum
Master of Science in Health Information Technology Degree Curriculum Core courses: 8 courses Total Credit from Core Courses = 24 Core Courses Course Name HRS Pre-Req Choose MIS 525 or CIS 564: 1 MIS 525
Federico Rajola. Customer Relationship. Management in the. Financial Industry. Organizational Processes and. Technology Innovation.
Federico Rajola Customer Relationship Management in the Financial Industry Organizational Processes and Technology Innovation Second edition ^ Springer Contents 1 Introduction 1 1.1 Identification and
USABILITY OF A FILIPINO LANGUAGE TOOLS WEBSITE
USABILITY OF A FILIPINO LANGUAGE TOOLS WEBSITE Ria A. Sagum, MCS Department of Computer Science, College of Computer and Information Sciences Polytechnic University of the Philippines, Manila, Philippines
Towards Rule-based System for the Assembly of 3D Bricks
Universal Journal of Communications and Network 3(4): 77-81, 2015 DOI: 10.13189/ujcn.2015.030401 http://www.hrpub.org Towards Rule-based System for the Assembly of 3D Bricks Sanguk Noh School of Computer
DATA MINING TECHNOLOGY. Keywords: data mining, data warehouse, knowledge discovery, OLAP, OLAM.
DATA MINING TECHNOLOGY Georgiana Marin 1 Abstract In terms of data processing, classical statistical models are restrictive; it requires hypotheses, the knowledge and experience of specialists, equations,
The Design and Development of a Web-Based Virtual Closet: The Smart Closet Project
The Design and Development of a Web-Based Virtual Closet: The Smart Closet Project Noura N. Al-Omar King Saud University/Software Engineering Department, College of Computer and Information Sciences, Riyadh,
Patent Big Data Analysis by R Data Language for Technology Management
, pp. 69-78 http://dx.doi.org/10.14257/ijseia.2016.10.1.08 Patent Big Data Analysis by R Data Language for Technology Management Sunghae Jun * Department of Statistics, Cheongju University, 360-764, Korea
Meta-learning. Synonyms. Definition. Characteristics
Meta-learning Włodzisław Duch, Department of Informatics, Nicolaus Copernicus University, Poland, School of Computer Engineering, Nanyang Technological University, Singapore [email protected] (or search
The Data Mining Process
Sequence for Determining Necessary Data. Wrong: Catalog everything you have, and decide what data is important. Right: Work backward from the solution, define the problem explicitly, and map out the data
Creating a Database. Frank Friedenberg, MD
Creating a Database Frank Friedenberg, MD Classic Data Management Flow for Clinical Research Scientific Hypotheses Identify Specific Data Elements Required to Test Hypotheses Data Acquisition Instruments
Modeling and Design of Intelligent Agent System
International Journal of Control, Automation, and Systems Vol. 1, No. 2, June 2003 257 Modeling and Design of Intelligent Agent System Dae Su Kim, Chang Suk Kim, and Kee Wook Rim Abstract: In this study,
A Survey of Customer Relationship Management
A Survey of Customer Relationship Management RumaPanda 1, Dr. A. N. Nandakumar 2 1 Assistant Professor, Dept. of C.S.E. Vemana I T, VTU,Bangalore, Karnataka, India 2 Professor & Principal, R. L. Jalappa
DATA WAREHOUSE AND DATA MINING NECCESSITY OR USELESS INVESTMENT
Scientific Bulletin Economic Sciences, Vol. 9 (15) - Information technology - DATA WAREHOUSE AND DATA MINING NECCESSITY OR USELESS INVESTMENT Associate Professor, Ph.D. Emil BURTESCU University of Pitesti,
Research of Postal Data mining system based on big data
3rd International Conference on Mechatronics, Robotics and Automation (ICMRA 2015) Research of Postal Data mining system based on big data Xia Hu 1, Yanfeng Jin 1, Fan Wang 1 1 Shi Jiazhuang Post & Telecommunication
Website Personalization using Data Mining and Active Database Techniques Richard S. Saxe
Website Personalization using Data Mining and Active Database Techniques Richard S. Saxe Abstract Effective website personalization is at the heart of many e-commerce applications. To ensure that customers
Electronic Funds Transfer (EFT) Guide
Electronic Funds Transfer (EFT) Guide 121613 2013 Blackbaud, Inc. This publication, or any part thereof, may not be reproduced or transmitted in any form or by any means, electronic, or mechanical, including
SYSTEM DEVELOPMENT AND IMPLEMENTATION
CHAPTER 6 SYSTEM DEVELOPMENT AND IMPLEMENTATION 6.0 Introduction This chapter discusses about the development and implementation process of EPUM web-based system. The process is based on the system design
Volume 4, Issue 1, January 2016 International Journal of Advance Research in Computer Science and Management Studies
Volume 4, Issue 1, January 2016 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online at: www.ijarcsms.com Spam
Explorer's Guide to the Semantic Web
Explorer's Guide to the Semantic Web THOMAS B. PASSIN 11 MANNING Greenwich (74 w. long.) contents preface xiii acknowledgments xv about this booh xvii The Semantic Web 1 1.1 What is the Semantic Web? 3
ISSN: 2321-7782 (Online) Volume 3, Issue 4, April 2015 International Journal of Advance Research in Computer Science and Management Studies
ISSN: 2321-7782 (Online) Volume 3, Issue 4, April 2015 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online
Fast and Easy Delivery of Data Mining Insights to Reporting Systems
Fast and Easy Delivery of Data Mining Insights to Reporting Systems Ruben Pulido, Christoph Sieb [email protected], [email protected] Abstract: During the last decade data mining and predictive
ONLINE EXERCISE SYSTEM A Web-Based Tool for Administration and Automatic Correction of Exercises
ONLINE EXERCISE SYSTEM A Web-Based Tool for Administration and Automatic Correction of Exercises Daniel Baudisch, Manuel Gesell and Klaus Schneider Embedded Systems Group, University of Kaiserslautern,
.LRN - Course Management System at AUBG
.LRN - Course Management System at AUBG What is.lrn?.lrn is a web-based portal system for course management, online communications, and collaboration. It was developed as a production unit by the Sloan
Facilitating Business Process Discovery using Email Analysis
Facilitating Business Process Discovery using Email Analysis Matin Mavaddat [email protected] Stewart Green Stewart.Green Ian Beeson Ian.Beeson Jin Sa Jin.Sa Abstract Extracting business process
A Survey on Web Mining From Web Server Log
A Survey on Web Mining From Web Server Log Ripal Patel 1, Mr. Krunal Panchal 2, Mr. Dushyantsinh Rathod 3 1 M.E., 2,3 Assistant Professor, 1,2,3 computer Engineering Department, 1,2 L J Institute of Engineering
Experiments in Web Page Classification for Semantic Web
Experiments in Web Page Classification for Semantic Web Asad Satti, Nick Cercone, Vlado Kešelj Faculty of Computer Science, Dalhousie University E-mail: {rashid,nick,vlado}@cs.dal.ca Abstract We address
How To Get A Computer Engineering Degree
COMPUTER ENGINEERING GRADUTE PROGRAM FOR MASTER S DEGREE (With Thesis) PREPARATORY PROGRAM* COME 27 Advanced Object Oriented Programming 5 COME 21 Data Structures and Algorithms COME 22 COME 1 COME 1 COME
Using reporting and data mining techniques to improve knowledge of subscribers; applications to customer profiling and fraud management
Using reporting and data mining techniques to improve knowledge of subscribers; applications to customer profiling and fraud management Paper Jean-Louis Amat Abstract One of the main issues of operators
ISSUES ON FORMING METADATA OF EDITORIAL SYSTEM S DOCUMENT MANAGEMENT
ISSN 1392 124X INFORMATION TECHNOLOGY AND CONTROL, 2005, Vol.34, No.4 ISSUES ON FORMING METADATA OF EDITORIAL SYSTEM S DOCUMENT MANAGEMENT Marijus Bernotas, Remigijus Laurutis, Asta Slotkienė Information
PSG College of Technology, Coimbatore-641 004 Department of Computer & Information Sciences BSc (CT) G1 & G2 Sixth Semester PROJECT DETAILS.
PSG College of Technology, Coimbatore-641 004 Department of Computer & Information Sciences BSc (CT) G1 & G2 Sixth Semester PROJECT DETAILS Project Project Title Area of Abstract No Specialization 1. Software
Development of Content Management System with Animated Graph
Development of Content Management System with Animated Graph Saipunidzam Mahamad, Mohammad Noor Ibrahim, Rozana Kasbon, and Chap Samol Abstract Animated graph gives some good impressions in presenting
Analysis of Data Mining Concepts in Higher Education with Needs to Najran University
590 Analysis of Data Mining Concepts in Higher Education with Needs to Najran University Mohamed Hussain Tawarish 1, Farooqui Waseemuddin 2 Department of Computer Science, Najran Community College. Najran
Knowledge Discovery from patents using KMX Text Analytics
Knowledge Discovery from patents using KMX Text Analytics Dr. Anton Heijs [email protected] Treparel Abstract In this white paper we discuss how the KMX technology of Treparel can help searchers
MC EDT Designee Maintenance Procedure Summary. Ministry of Health and Long-Term Care
MC EDT Designee Maintenance Procedure Summary Ministry of Health and Long-Term Care Version 6.0 June 2013 Designee Maintenance (Refer to Medical Claims Electronic Data Transfer (MC EDT) Reference Manual
Fahad H.Alshammari, Rami Alnaqeib, M.A.Zaidan, Ali K.Hmood, B.B.Zaidan, A.A.Zaidan
WWW.JOURNALOFCOMPUTING.ORG 85 New Quantitative Study for Dissertations Repository System Fahad H.Alshammari, Rami Alnaqeib, M.A.Zaidan, Ali K.Hmood, B.B.Zaidan, A.A.Zaidan Abstract In the age of technology,
Ontological Model of Educational Programs in Computer Science (Bachelor and Master Degrees)
Ontological Model of Educational Programs in Computer Science (Bachelor and Master Degrees) Sharipbay A., Razakhova B., Bekmanova G., Omarbekova A., Khassenov Ye., and Turebayeva R. Abstract In this work
Intrusion Detection System using Log Files and Reinforcement Learning
Intrusion Detection System using Log Files and Reinforcement Learning Bhagyashree Deokar, Ambarish Hazarnis Department of Computer Engineering K. J. Somaiya College of Engineering, Mumbai, India ABSTRACT
Journal of Global Research in Computer Science RESEARCH SUPPORT SYSTEMS AS AN EFFECTIVE WEB BASED INFORMATION SYSTEM
Volume 2, No. 5, May 2011 Journal of Global Research in Computer Science REVIEW ARTICLE Available Online at www.jgrcs.info RESEARCH SUPPORT SYSTEMS AS AN EFFECTIVE WEB BASED INFORMATION SYSTEM Sheilini
2. A typical business process
I. Basic Concepts on ERP 1. Enterprise resource planning (ERP) Enterprise resource planning (ERP) is the planning of how business resources (materials, employees, customers etc.) are acquired and moved
An Ontology-based e-learning System for Network Security
An Ontology-based e-learning System for Network Security Yoshihito Takahashi, Tomomi Abiko, Eriko Negishi Sendai National College of Technology [email protected] Goichi Itabashi Graduate School
RISK ASSESSMENT BASED UPON FUZZY SET THEORY
RISK ASSESSMENT BASED UPON FUZZY SET THEORY László POKORÁDI, professor, University of Debrecen [email protected] KEYWORDS: risk management; risk assessment; fuzzy set theory; reliability. Abstract:
ISSN: 2348 9510. A Review: Image Retrieval Using Web Multimedia Mining
A Review: Image Retrieval Using Web Multimedia Satish Bansal*, K K Yadav** *, **Assistant Professor Prestige Institute Of Management, Gwalior (MP), India Abstract Multimedia object include audio, video,
ProM 6 Exercises. J.C.A.M. (Joos) Buijs and J.J.C.L. (Jan) Vogelaar {j.c.a.m.buijs,j.j.c.l.vogelaar}@tue.nl. August 2010
ProM 6 Exercises J.C.A.M. (Joos) Buijs and J.J.C.L. (Jan) Vogelaar {j.c.a.m.buijs,j.j.c.l.vogelaar}@tue.nl August 2010 The exercises provided in this section are meant to become more familiar with ProM
Feature. Applications of Business Process Analytics and Mining for Internal Control. World
Feature Filip Caron is a doctoral researcher in the Department of Decision Sciences and Information Management, Information Systems Group, at the Katholieke Universiteit Leuven (Flanders, Belgium). Jan
Test Design Strategies
Test Design Strategies Louise Tamres, CSQE ASQ Software Division Webinar 18 July 2008 1 Objectives Translate requirements into test cases Improve communication by producing models Identify incomplete requirements
ANALYTICS IN BIG DATA ERA
ANALYTICS IN BIG DATA ERA ANALYTICS TECHNOLOGY AND ARCHITECTURE TO MANAGE VELOCITY AND VARIETY, DISCOVER RELATIONSHIPS AND CLASSIFY HUGE AMOUNT OF DATA MAURIZIO SALUSTI SAS Copyr i g ht 2012, SAS Ins titut
Bisecting K-Means for Clustering Web Log data
Bisecting K-Means for Clustering Web Log data Ruchika R. Patil Department of Computer Technology YCCE Nagpur, India Amreen Khan Department of Computer Technology YCCE Nagpur, India ABSTRACT Web usage mining
Recovering Business Rules from Legacy Source Code for System Modernization
Recovering Business Rules from Legacy Source Code for System Modernization Erik Putrycz, Ph.D. Anatol W. Kark Software Engineering Group National Research Council, Canada Introduction Legacy software 000009*
SuperViz: An Interactive Visualization of Super-Peer P2P Network
SuperViz: An Interactive Visualization of Super-Peer P2P Network Anthony (Peiqun) Yu [email protected] Abstract: The Efficient Clustered Super-Peer P2P network is a novel P2P architecture, which overcomes
Artificial Intelligence & Knowledge Management
Artificial Intelligence & Knowledge Management Nick Bassiliades, Ioannis Vlahavas, Fotis Kokkoras Aristotle University of Thessaloniki Department of Informatics Programming Languages and Software Engineering
Pattern Insight Clone Detection
Pattern Insight Clone Detection TM The fastest, most effective way to discover all similar code segments What is Clone Detection? Pattern Insight Clone Detection is a powerful pattern discovery technology
DATA MINING IN FINANCE
DATA MINING IN FINANCE Advances in Relational and Hybrid Methods by BORIS KOVALERCHUK Central Washington University, USA and EVGENII VITYAEV Institute of Mathematics Russian Academy of Sciences, Russia
Enhancing Dataset Processing in Hadoop YARN Performance for Big Data Applications
Enhancing Dataset Processing in Hadoop YARN Performance for Big Data Applications Ahmed Abdulhakim Al-Absi, Dae-Ki Kang and Myong-Jong Kim Abstract In Hadoop MapReduce distributed file system, as the input
Data Mining Cluster Analysis: Basic Concepts and Algorithms. Lecture Notes for Chapter 8. Introduction to Data Mining
Data Mining Cluster Analysis: Basic Concepts and Algorithms Lecture Notes for Chapter 8 Introduction to Data Mining by Tan, Steinbach, Kumar Tan,Steinbach, Kumar Introduction to Data Mining 4/8/2004 Hierarchical
Data mining techniques: decision trees
Data mining techniques: decision trees 1/39 Agenda Rule systems Building rule systems vs rule systems Quick reference 2/39 1 Agenda Rule systems Building rule systems vs rule systems Quick reference 3/39
EFFECTIVE CONSTRUCTIVE MODELS OF IMPLICIT SELECTION IN BUSINESS PROCESSES. Nataliya Golyan, Vera Golyan, Olga Kalynychenko
380 International Journal Information Theories and Applications, Vol. 18, Number 4, 2011 EFFECTIVE CONSTRUCTIVE MODELS OF IMPLICIT SELECTION IN BUSINESS PROCESSES Nataliya Golyan, Vera Golyan, Olga Kalynychenko
HELP DESK SYSTEMS. Using CaseBased Reasoning
HELP DESK SYSTEMS Using CaseBased Reasoning Topics Covered Today What is Help-Desk? Components of HelpDesk Systems Types Of HelpDesk Systems Used Need for CBR in HelpDesk Systems GE Helpdesk using ReMind
SEMANTIC WEB BASED INFERENCE MODEL FOR LARGE SCALE ONTOLOGIES FROM BIG DATA
SEMANTIC WEB BASED INFERENCE MODEL FOR LARGE SCALE ONTOLOGIES FROM BIG DATA J.RAVI RAJESH PG Scholar Rajalakshmi engineering college Thandalam, Chennai. [email protected] Mrs.
Association rules for improving website effectiveness: case analysis
Association rules for improving website effectiveness: case analysis Maja Dimitrijević, The Higher Technical School of Professional Studies, Novi Sad, Serbia, [email protected] Tanja Krunić, The
Dimension: Data Handling Module: Organization and Representation of data Unit: Construction and Interpretation of Simple Diagrams and Graphs
Topic: Stem and Leaf Diagrams S1 Topic 13 Level: Key Stage 3 Dimension: Data Handling Module: Organization and Representation of data Unit: Construction and Interpretation of Simple Diagrams and Graphs
The Predictive Data Mining Revolution in Scorecards:
January 13, 2013 StatSoft White Paper The Predictive Data Mining Revolution in Scorecards: Accurate Risk Scoring via Ensemble Models Summary Predictive modeling methods, based on machine learning algorithms
IEEE International Conference on Computing, Analytics and Security Trends CAST-2016 (19 21 December, 2016) Call for Paper
IEEE International Conference on Computing, Analytics and Security Trends CAST-2016 (19 21 December, 2016) Call for Paper CAST-2015 provides an opportunity for researchers, academicians, scientists and
Analysis and Design of Knowledge Management Systems for School of Information System at XYZ University (A Case Study Approach)
, pp. 229240 http://dx.doi.org/10.14257/ijmue.2014.9.12.21 Analysis and Design of Management Systems for School of Information System at XYZ University (A Case Study Approach) Yohannes Kurniawan and Siti
Semantic Concept Based Retrieval of Software Bug Report with Feedback
Semantic Concept Based Retrieval of Software Bug Report with Feedback Tao Zhang, Byungjeong Lee, Hanjoon Kim, Jaeho Lee, Sooyong Kang, and Ilhoon Shin Abstract Mining software bugs provides a way to develop
Reusable Knowledge-based Components for Building Software. Applications: A Knowledge Modelling Approach
Reusable Knowledge-based Components for Building Software Applications: A Knowledge Modelling Approach Martin Molina, Jose L. Sierra, Jose Cuena Department of Artificial Intelligence, Technical University
DYNAMIC FUZZY PATTERN RECOGNITION WITH APPLICATIONS TO FINANCE AND ENGINEERING LARISA ANGSTENBERGER
DYNAMIC FUZZY PATTERN RECOGNITION WITH APPLICATIONS TO FINANCE AND ENGINEERING LARISA ANGSTENBERGER Kluwer Academic Publishers Boston/Dordrecht/London TABLE OF CONTENTS FOREWORD ACKNOWLEDGEMENTS XIX XXI
STATISTICA. Clustering Techniques. Case Study: Defining Clusters of Shopping Center Patrons. and
Clustering Techniques and STATISTICA Case Study: Defining Clusters of Shopping Center Patrons STATISTICA Solutions for Business Intelligence, Data Mining, Quality Control, and Web-based Analytics Table
The Implementation of Wiki-based Knowledge Management Systems for Small Research Groups
International Journal of Computer Information Systems and Industrial Management Applications (IJCISIM) ISSN 2150-7988 Vol.1 (2009), pp. 68 75 http://www.mirlabs.org/ijcisim The Implementation of Wiki-based
2 SYSTEM DESCRIPTION TECHNIQUES
2 SYSTEM DESCRIPTION TECHNIQUES 2.1 INTRODUCTION Graphical representation of any process is always better and more meaningful than its representation in words. Moreover, it is very difficult to arrange
IFS-8000 V2.0 INFORMATION FUSION SYSTEM
IFS-8000 V2.0 INFORMATION FUSION SYSTEM IFS-8000 V2.0 Overview IFS-8000 v2.0 is a flexible, scalable and modular IT system to support the processes of aggregation of information from intercepts to intelligence
How To Improve Cloud Computing With An Ontology System For An Optimal Decision Making
International Journal of Computational Engineering Research Vol, 04 Issue, 1 An Ontology System for Ability Optimization & Enhancement in Cloud Broker Pradeep Kumar M.Sc. Computer Science (AI) Central
Data Mining Applications in Fund Raising
Data Mining Applications in Fund Raising Nafisseh Heiat Data mining tools make it possible to apply mathematical models to the historical data to manipulate and discover new information. In this study,
Monitoring Web Browsing Habits of User Using Web Log Analysis and Role-Based Web Accessing Control. Phudinan Singkhamfu, Parinya Suwanasrikham
Monitoring Web Browsing Habits of User Using Web Log Analysis and Role-Based Web Accessing Control Phudinan Singkhamfu, Parinya Suwanasrikham Chiang Mai University, Thailand 0659 The Asian Conference on
Identifying At-Risk Students Using Machine Learning Techniques: A Case Study with IS 100
Identifying At-Risk Students Using Machine Learning Techniques: A Case Study with IS 100 Erkan Er Abstract In this paper, a model for predicting students performance levels is proposed which employs three
Data Mining III: Numeric Estimation
Data Mining III: Numeric Estimation Computer Science 105 Boston University David G. Sullivan, Ph.D. Review: Numeric Estimation Numeric estimation is like classification learning. it involves learning a
Ontology for Home Energy Management Domain
Ontology for Home Energy Management Domain Nazaraf Shah 1,, Kuo-Ming Chao 1, 1 Faculty of Engineering and Computing Coventry University, Coventry, UK {nazaraf.shah, k.chao}@coventry.ac.uk Abstract. This
ON INTEGRATING UNSUPERVISED AND SUPERVISED CLASSIFICATION FOR CREDIT RISK EVALUATION
ISSN 9 X INFORMATION TECHNOLOGY AND CONTROL, 00, Vol., No.A ON INTEGRATING UNSUPERVISED AND SUPERVISED CLASSIFICATION FOR CREDIT RISK EVALUATION Danuta Zakrzewska Institute of Computer Science, Technical
Towards applying Data Mining Techniques for Talent Mangement
2009 International Conference on Computer Engineering and Applications IPCSIT vol.2 (2011) (2011) IACSIT Press, Singapore Towards applying Data Mining Techniques for Talent Mangement Hamidah Jantan 1,
