Social Contact Management System for Memory Recall Enhancement

Size: px
Start display at page:

Download "Social Contact Management System for Memory Recall Enhancement"

Transcription

1 Social Contact Management System for Memory Recall Enhancement Nitin Ingle 1 Prof. Ayesha Butalia 2 Pune University, GHRCEM, Pune Pune University, GHRCEM, Pune Abstract Human memory regularly comes up short. Individuals are often overpowered with inquiries like "Who is that individual? I might have met him in Mumbai? Do I?" In the recall of names successfully, current memory aid tools can't help well. This paper will investigate the memory recall enhancement issue from the viewpoint of memory signal extraction and cooperative search, and proposes a naval technique to concentrate memory signs from heterogeneous, multimodel, physical/virtual information sources. Particularly, we utilize the contact name recall as a part of the scholastic group as the target application to showcase our proposed technique. We further create a smart social contact manager that backings 1) autogathering of rich contact information from a combo of pervasive sensors and Web Intelligence sources, and 2) acquainted pursuit of contacts when human memory comes up short. By testing the execution of contact information accumulation systems, this framework is approved. A precise client consider on contact memory recall is additionally directed, through which a few discoveries about contact remembering and recall are introduced. Excellent cognitive intelligence research hypotheses are utilized to decipher these discoveries. Keywords- Contact recall, memory aid, pervasive computing, social contact management, Web intelligence. 201 I. Introduction Memory tumble is a commonly occurred problem in almost every human being. In our day-to-day life, we face diverse forms of memory lapse, such as forgetting a contact id, name of a person, name of a document etc. These memory failures do invite many types of problems in our life and work. Hence, it becomes a basic and challenging problem to find the effective and efficient way to help the human memory. Memory recall enhancement is already having been studied in different fields for different reasons. Before the computer generations, these things were manual. But, these manual methods have some drawbacks, such as failure or damage and time consuming search support. The use of digital tools has raised much attraction with the development of information technology nowadays. But somehow, these digital tools silently face some problems, while enabling reliable storage and efficient support for query. The reliability of data retrieval is the most significant issue in these overall issues. Users must remember sufficient details about items they want to retrieve. So that they can construct a query to conduct searches on data retrieval tools. But somehow, people tend to remember different memory cues related to the items, rather than remembering precise details [1], and [2]. In memory lapse problem, it has been proved to be efficient to use the memory cues. To tackle diverse memory problems, several types of cues are used commonly. But somehow, the role that a memory cue plays in memory the recall is noticeably intricate and area related. This has been of modest apprehension in existing studies. Firstly, to enhance memory recall, cues in different forms have been used, in terms of the purposes and user groups. For scholarly analysts, even then, instructive foundation and investigation

2 hobbies get to be more critical data. This is in accord with the overview result reported by Elsweiler et al. [3], which demonstrates an extensive variety of overlooking practices and hence a requirement for distinctive sorts of devices to counteract memory malfunction. It might be less demanding for the client to use a few sorts of memories over others, dependent upon the connection of memory support consequently. Next is to develop memory recall utilizing specific memory cues, we have to collect this type of cues in relationship with the things in a data document for future retrieval. One rule to be taken after here is that we ought to lighten the load of clients on memory cue accumulation [4]. Then again, auto-collection of memory cues is nontrivial. It generally relies on upon the practices of the target client bunch and the accessibility of data sources. As it were, for diverse client assembles, the data that can be gathered is distinguishing. For the individuals who are dynamic in social media sites we can separate more data like, companion records, top choices about them from the Web. In what tails, we pick the contact name memory issue, and to represent the above issue utilizing the scholastic group. The prime aim of this paper is to use memory cues for enhancement of memory recall and explored the feature-specific nature of it. We have also proposed a naval methodology to gather the memory cues from various data sources. Basically, we intend to do the 3 things, they are: Firstly, translating the memory recall enhancement problem into a well managed collection of feature-specific memory cue and the management issue as well. Secondly, we propose a simple method for enhancing memory recall using extraction of memory cues from diverse data sources. And finally, to enhance the contact management and name recall processes, we propose to design and implement the Social Contact Manager (SCM). In near future the objectives that needed to be studied are: first, as reported in other studies, the quality of the photographs or videos taken by these wearable devices might be low, and the circumstance for face recognition most of the times are difficult. Secondly, an important issue for the usage of wearable sensors is secrecy [5], [6]. The remaining paper is organized as follows. The section II includes the survey of different methodologies that were been developed using different tactics has been discussed briefly. The section III concludes the paper in brief. II. Literature Survey Use of memory cues and the improvements in social contact management systems for the enhancement of memory recall has brought closer some related search directions: A. Digital Memory Aids Digital memory aid systems basically fell in to two categories depending upon the targeted memory issues. The issues are, Retrospective aid, and prospective aid [3]. Retrospective aid basically works with the recall of the past events, previously held events; whereas, the Prospective aid deals with remembering the future events. We have concentrated our study on the retrospective aid, rather than the prospective aid. Retrospective memory aid has two important application domains: i. Digital Object Re-finding The main focus of the Digital object refinding is on the storage and search of collections of heterogeneous digital objects. These objects are either generated by the users or been encountered at the time of work processes, like s, documents etc [7] [8] [9]. Metadata on the diverse aspects of an object s context like, when, where and relationships amongst them, is used commonly by tools. This makes the re-finding of the information much easier. ii. Life-Logging 202

3 Unlike the digital object re-finding, the Life-Logging extends beyond the storage of objects in closed environment, rather it moves in the real world. Because of this, it can capture our common activities. For Lifelogging, various systems have been developed. These systems commonly use the portable and sometimes wearable devices for capturing the data. A personal digital assistant [PDA] is used by the Forget-me-not [10]. Because of this, it can capture the activities of its users in the text form, i.e. user locations etc, daily. B. Human-Centric Computing The context-aware services are provided by the Human-centric computing with respect to the extracted information from the cyber-physical space about the user. There are two major sources for extracting the human information: web and pervasive sensors. Both these sources acquire the different attributes and strengths. The web is the best source for the static or slowly changing human information. This information may include the user profiles [11], social relationships etc. whereas; the pervasive sensing allows detecting the human activities, their social interactions [12], etc within the existent world. Combined data from these distinct sources allows exclusive opportunities to pervasive applications because of the diverse features [13]. But somehow, till the date, both these sources have followed the different research fields. Few systems have been developed in order to combine the power of these two data sources additionally. We have proposed a unique method to auto collect the digital traces of humans from the heterogeneous datasets. C. Social Contact Tools For getting the work done, personal contacts are critical. In social activities, for assisting the communication with contacts and the recommended contacts, many systems have been developed. i. Contact communication Environments suiting electronic communications like, s, instant messaging or social networking sites have become increasingly reliable for the modern work. An alternative representation of the s is provided by the ContactMap [14]. A problem that occurs regularly with such systems is that, they are strictly created for the communications between registered users in the virtual world. A general way of allowing people to create digital connections with their contacts is proposed by the Social Contact Manager (SCM). Exchanging the business cards in real world is the only source for connections ii. Contact recommendation Many systems have been developed to recommend the users with the new contacts. The recommendations are based on the background, social relationships, or context of the users. The users inside a public place, like hotels, can exchange the social network IDs by using their mobile phones and find someone of their interest. The WhozThat [15] provided this unique feature. Our system tends to support the management and already acquired information s recollection, rather than giving a social matching service. III. Existing Systems Bin Guo et al [1] proposed a system that enhanced the memory recall process using the memory cues. This system is shown in fig (1). In this system, the audio clips are used as an input. These audio clips 203

4 are recorded during the meetings. The important phases of this system are: Fig (1) System architecture of Bin Gou 1. Pre-processing the audio clip: The pre-processing necessary for extracting the actual audio from the clip is the main feature of this phase. It includes, Framing, pre-emphasis, and FFT phase. 2. Feature Extraction: In this phase, the important features from the clip are extracted. These features will work as the memory cues. This includes few techniques for extracting the features, like Haar, SF, and ZCR etc. 3. Finally, The Decision Tree classier is used to generate the required output from the audio clips. 4. The main drawback of this system is it only works with the audio clips. The remaining information was needed to be filled manually by the user. Thus, a new system was needed. T. Kawamura et al [2] has proposed a system that is based on the object-triggered augmentation of the human memory system, called as Ubiquitous Memory. This system enables the user to directly store the experienced events by Touching operation in a physical object. Fig (2) sows the architecture of the system. Fig (2) Kawamura s Architecture The drawback of this system was the security. Y Chon et al [6] have proposed a system called CrowdSence@Place (CSP). This framework was used for categorization of the places, based on the sensor data. This data consist of opportunistically captured images and the audios from the users of Smartphone. The main objective of this paper was to collect the places and categorize them correctly. Fig (3) shows the architecture of the system. The main drawback faced by this system was the accuracy of the classification, which was not up to the needed level. 204

5 the purpose of data search, it uses traditional information search technique. Additionally, this system also gives the face detection feature. Fig (3) architecture IV. Proposed Work The major intend of this paper is to employ memory cues for enrichment of memory recall and explored the featureprecise characteristics of it. We have proposed a new technology to collect the memory cues in the form of Videos, Images, Audios and Texts from different sources of data. The meetings are recorded in some device which is connected to the mobile by some wireless technology. Then these videos are forwarded to the server. The location is also detected and sent using the GPS. The processing of these videos includes following steps: 1. These video clips are processed in order to extract the audio, images, from the file. These extracted audio clips and images, along with the original video are sent to server. 2. These data is then pre-processed using some tokenizing technique. 3. The framing is done on all these data, in order to extract the features. 4. These features are then stored in database, while, the useless data is neglected. This system also allows the user to share this information on the social networking sites. For Fig (2) Flow of Proposed system V. Conclusion The current paper reports our deliberations on memory recall utilizing memory cues. The approach we propose addresses the impacts of distinctive peculiarities to cue-based memory recall. What's more, the technique is proposed, which investigates a combination of both pervasive sensing and Web brainpower strategies to auto-accumulate memory cues from physical/virtual information resources. The process is exhibited through a research endeavor the Social Contact Management (SCM). The SCM was intended to address the successive contact name slipping issue. The MRSS methodology was investigated to record rich contact information from both true collaborations and the Web. Our framework can adequately concentrate contact cues from 205

6 heterogeneous sources as demonstrated by the assessment results. The increased contact recall strategy was approved through a client trial. Our study on increased memory recall is continuous. To begin with, as the ID of semantic relations among individuals is essential to utilize our SCN better, past the advisor student connection abused in this paper, we want to discover more social relationship data later on to broaden the SCM. Secondly, we will research the exploitation of diverse sorts of connections, to upgrade contact memory recall 206 References [1]. Bin Guo, Daqing Zhang, Dingqi Yang, Zhiwen Yu, and Xingshe Zhou, Enhancing Memory Recall via an Intelligent Social Contact Manage-ment System, IEEE Transactions On Human- Machine Systems, [2]. T. Kawamura, T. Fukuhara, H. Takeda, Y. Kono, andm. Kidode, Ubiquitous memories: A memory externalization system using physical objects, Pers. Ubiquitous Comput., [3]. D. Elsweiler, I. Ruthven, and C. Jones, Towards memory supporting personal information management tools, J. Amer. Soc. Inform. Sci. Technol., [4]. S. Whittaker, Q. Jones, B. Nardi, M. Creech, L. Teryeen, E. Isaacs, and J. Hainsworth, ContactMap: Organi-zing communication in a social desktop, ACM Trans. Computer-Human Interaction, [5]. S. Hodges, L. Williams, E. Berry, S. Izadi, J. Srinivasan, A. Butler, G. Smyth, N. Kapur, K. Wood, SenseCam: A retrospective memory aid, in Proc. UbiComp, [6]. Y. Chon, N. D. Lane, H. Cha, F. Zhao, Automatically characterizing places with oppotunistic crowdsensing using smartphones, in Proc. ACM UbiComp, [7]. D. Elsweiler, M. Baillie, and I. Ruthven, Exploring memory in refinding, ACM Trans. Inf. Syst., [8]. D. H. Chau, B. Myers, and A. Faulring, What to do when search fails: Finding information by association, in Proc. Conf. Human Factors Comput. Syst., [9]. D. Zhang, B. Guo, and Z. Yu, The emergence of social and community intelligence, IEEE Comput., [10]. M. Lamming and M. Flynn, Forgetme-not: Intimate computing in support of human memory, in Proc. FRIEND21, [11]. J. Tang, D. Zhang, and L. M. Yao, Social network extraction of academic researchers, in Proc. IEEE Int. Conf. Data Mining, [12]. D. Quercia, J. Ellis, and L. Capri, Nurturing social networks using mobile phones, IEEE Pervas. Comput., [13]. D. Zhang, B. Guo, and Z. Yu, The emergence of social and community intelligence, IEEE Comput., [14]. S. Whittaker, Q. Jones, B. Nardi, M. Creech, L. Teryeen, E. Isaacs, and J. Hainsworth, ContactMap: Organi-zing communication in a social desktop, ACM Trans. Computer-Human Interaction, [15]. A. Beach et al., WhozThat? Evolving an ecosystem for context-aware mobile social networks, IEEE Netw., 2008.

Literature Review on Smart Social Contact Management System for Better Memory Recall Shailesh U. Sambhe, Sachin Murab

Literature Review on Smart Social Contact Management System for Better Memory Recall Shailesh U. Sambhe, Sachin Murab Literature Review on Smart Social Contact Management System for Better Memory Recall Shailesh U. Sambhe, Sachin Murab Abstract-Memory of human being is usually poor and often fails. On some occasions,

More information

Email and PIM: Problems and Possibilities

Email and PIM: Problems and Possibilities This is the final author s version of the article published in Communications of the ACM : Bellotti, V., Gwizdka, J., & Whittaker, S. (2006). Email in personal information management. Communications in

More information

Enhancing Spontaneous Interaction in Opportunistic Mobile Social Networks

Enhancing Spontaneous Interaction in Opportunistic Mobile Social Networks Enhancing Spontaneous Interaction in Opportunistic Mobile Social Networks Bin Guo 1* Daqing Zhang 1,2 Zhiwen Yu 1 Xingshe Zhou 1 Zhangbing Zhou 2,3 1. Northwestern Polytechnical University, China 2. Institut

More information

IMPROVING BUSINESS PROCESS MODELING USING RECOMMENDATION METHOD

IMPROVING BUSINESS PROCESS MODELING USING RECOMMENDATION METHOD Journal homepage: www.mjret.in ISSN:2348-6953 IMPROVING BUSINESS PROCESS MODELING USING RECOMMENDATION METHOD Deepak Ramchandara Lad 1, Soumitra S. Das 2 Computer Dept. 12 Dr. D. Y. Patil School of Engineering,(Affiliated

More information

Understanding Web personalization with Web Usage Mining and its Application: Recommender System

Understanding Web personalization with Web Usage Mining and its Application: Recommender System Understanding Web personalization with Web Usage Mining and its Application: Recommender System Manoj Swami 1, Prof. Manasi Kulkarni 2 1 M.Tech (Computer-NIMS), VJTI, Mumbai. 2 Department of Computer Technology,

More information

Shared PI: Sharing Personal Data to Support Reflection and Behaviour Change

Shared PI: Sharing Personal Data to Support Reflection and Behaviour Change Shared PI: Sharing Personal Data to Support Reflection and Behaviour Change Rowanne Fleck UCL Interaction Centre University College London Gower Street, London WC1E 6BT, UK r.fleck@ucl.ac.uk Daniel Harrison

More information

Collaborative Filteration for user behavior Prediction using Big Data Hadoop

Collaborative Filteration for user behavior Prediction using Big Data Hadoop Collaborative Filteration for user behavior Prediction using Big Data Hadoop Jayshri Manohar Somwanshi, Prof. Y. B. Gurav Department of Computer Engineering, P.V.P.I.T Bavdhan, Pune, Maharashtra, India

More information

Ubiquitous Memories: Wearable Interface for Computational Augmentation of Human Memory based on Real World Objects

Ubiquitous Memories: Wearable Interface for Computational Augmentation of Human Memory based on Real World Objects Ubiquitous Memories: Wearable Interface for Computational Augmentation of Human Memory based on Real World Objects Tatsuyuki Kawamura Graduate School of Information Science, Nara Institute of Science and

More information

The Scientific Data Mining Process

The Scientific Data Mining Process Chapter 4 The Scientific Data Mining Process When I use a word, Humpty Dumpty said, in rather a scornful tone, it means just what I choose it to mean neither more nor less. Lewis Carroll [87, p. 214] In

More information

Mobile Adaptive Opportunistic Junction for Health Care Networking in Different Geographical Region

Mobile Adaptive Opportunistic Junction for Health Care Networking in Different Geographical Region International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 4, Number 2 (2014), pp. 113-118 International Research Publications House http://www. irphouse.com /ijict.htm Mobile

More information

Vibration-Based Surface Recognition for Smartphones

Vibration-Based Surface Recognition for Smartphones Vibration-Based Surface Recognition for Smartphones Jungchan Cho, Inhwan Hwang, and Songhwai Oh CPSLAB, ASRI School of Electrical Engineering and Computer Science Seoul National University, Seoul, Korea

More information

Natural Language to Relational Query by Using Parsing Compiler

Natural Language to Relational Query by Using Parsing Compiler Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 3, March 2015,

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK A SURVEY ON BIG DATA ISSUES AMRINDER KAUR Assistant Professor, Department of Computer

More information

SPATIAL DATA CLASSIFICATION AND DATA MINING

SPATIAL DATA CLASSIFICATION AND DATA MINING , pp.-40-44. Available online at http://www. bioinfo. in/contents. php?id=42 SPATIAL DATA CLASSIFICATION AND DATA MINING RATHI J.B. * AND PATIL A.D. Department of Computer Science & Engineering, Jawaharlal

More information

A UPS Framework for Providing Privacy Protection in Personalized Web Search

A UPS Framework for Providing Privacy Protection in Personalized Web Search A UPS Framework for Providing Privacy Protection in Personalized Web Search V. Sai kumar 1, P.N.V.S. Pavan Kumar 2 PG Scholar, Dept. of CSE, G Pulla Reddy Engineering College, Kurnool, Andhra Pradesh,

More information

Mobile Storage and Search Engine of Information Oriented to Food Cloud

Mobile Storage and Search Engine of Information Oriented to Food Cloud Advance Journal of Food Science and Technology 5(10): 1331-1336, 2013 ISSN: 2042-4868; e-issn: 2042-4876 Maxwell Scientific Organization, 2013 Submitted: May 29, 2013 Accepted: July 04, 2013 Published:

More information

131-1. Adding New Level in KDD to Make the Web Usage Mining More Efficient. Abstract. 1. Introduction [1]. 1/10

131-1. Adding New Level in KDD to Make the Web Usage Mining More Efficient. Abstract. 1. Introduction [1]. 1/10 1/10 131-1 Adding New Level in KDD to Make the Web Usage Mining More Efficient Mohammad Ala a AL_Hamami PHD Student, Lecturer m_ah_1@yahoocom Soukaena Hassan Hashem PHD Student, Lecturer soukaena_hassan@yahoocom

More information

A Supervised Forum Crawler

A Supervised Forum Crawler International Journal of Computer Sciences and Engineering Open Access Research Paper Volume-4, Special Issue-2, April 2016 E-ISSN: 2347-2693 A Supervised Forum Crawler Sreeja S R 1, Sangita Chaudhari

More information

Intelligent Log Analyzer. André Restivo <andre.restivo@portugalmail.pt>

Intelligent Log Analyzer. André Restivo <andre.restivo@portugalmail.pt> Intelligent Log Analyzer André Restivo 9th January 2003 Abstract Server Administrators often have to analyze server logs to find if something is wrong with their machines.

More information

Healthcare Measurement Analysis Using Data mining Techniques

Healthcare Measurement Analysis Using Data mining Techniques www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 03 Issue 07 July, 2014 Page No. 7058-7064 Healthcare Measurement Analysis Using Data mining Techniques 1 Dr.A.Shaik

More information

ABSTRACT I. INTRODUCTION

ABSTRACT I. INTRODUCTION Mobile Backup Web Application Using Image Processing Authentication 1 Walse Reshma S. 2 Khemnar Archana M. 3 Padir Maya S. 4 Prof.K.P.Somase Department Of Computer Engineering, Jcoe(Kuran),Tal:Junnar,Dist:Pune

More information

How To Use Neural Networks In Data Mining

How To Use Neural Networks In Data Mining International Journal of Electronics and Computer Science Engineering 1449 Available Online at www.ijecse.org ISSN- 2277-1956 Neural Networks in Data Mining Priyanka Gaur Department of Information and

More information

IEEE International Conference on Computing, Analytics and Security Trends CAST-2016 (19 21 December, 2016) Call for Paper

IEEE International Conference on Computing, Analytics and Security Trends CAST-2016 (19 21 December, 2016) Call for Paper IEEE International Conference on Computing, Analytics and Security Trends CAST-2016 (19 21 December, 2016) Call for Paper CAST-2015 provides an opportunity for researchers, academicians, scientists and

More information

MULTI AGENT-BASED DISTRIBUTED DATA MINING

MULTI AGENT-BASED DISTRIBUTED DATA MINING MULTI AGENT-BASED DISTRIBUTED DATA MINING REECHA B. PRAJAPATI 1, SUMITRA MENARIA 2 Department of Computer Science and Engineering, Parul Institute of Technology, Gujarat Technology University Abstract:

More information

Social Data Mining through Distributed Mobile Sensing: A Position Paper

Social Data Mining through Distributed Mobile Sensing: A Position Paper Social Data Mining through Distributed Mobile Sensing: A Position Paper John Gekas, Eurobank Research, Athens, GR Abstract. In this article, we present a distributed framework for collecting and analyzing

More information

Design of an Interface for Technology Supported Collaborative Learning the RAFT Approach

Design of an Interface for Technology Supported Collaborative Learning the RAFT Approach Design of an Interface for Technology Supported Collaborative Learning the RAFT Approach Lucia Terrenghi 1, Marcus Specht 1, Moritz Stefaner 2 1 Fraunhofer FIT, Institute for Applied Information Technology,

More information

AWERProcedia Information Technology & Computer Science

AWERProcedia Information Technology & Computer Science AWERProcedia Information Technology & Computer Science Vol 03 (2013) 1157-1162 3 rd World Conference on Information Technology (WCIT-2012) Webification of Software Development: General Outline and the

More information

UNIVERSITY OF INFINITE AMBITIONS. MASTER OF SCIENCE COMPUTER SCIENCE DATA SCIENCE AND SMART SERVICES

UNIVERSITY OF INFINITE AMBITIONS. MASTER OF SCIENCE COMPUTER SCIENCE DATA SCIENCE AND SMART SERVICES UNIVERSITY OF INFINITE AMBITIONS. MASTER OF SCIENCE COMPUTER SCIENCE DATA SCIENCE AND SMART SERVICES MASTER S PROGRAMME COMPUTER SCIENCE - DATA SCIENCE AND SMART SERVICES (DS3) This is a specialization

More information

International Journal of Scientific & Engineering Research, Volume 6, Issue 5, May-2015 1681 ISSN 2229-5518

International Journal of Scientific & Engineering Research, Volume 6, Issue 5, May-2015 1681 ISSN 2229-5518 International Journal of Scientific & Engineering Research, Volume 6, Issue 5, May-2015 1681 Software as a Model for Security in Cloud over Virtual Environments S.Vengadesan, B.Muthulakshmi PG Student,

More information

Software Engineering for Big Data. CS846 Paulo Alencar David R. Cheriton School of Computer Science University of Waterloo

Software Engineering for Big Data. CS846 Paulo Alencar David R. Cheriton School of Computer Science University of Waterloo Software Engineering for Big Data CS846 Paulo Alencar David R. Cheriton School of Computer Science University of Waterloo Big Data Big data technologies describe a new generation of technologies that aim

More information

Delivering Smart Answers!

Delivering Smart Answers! Companion for SharePoint Topic Analyst Companion for SharePoint All Your Information Enterprise-ready Enrich SharePoint, your central place for document and workflow management, not only with an improved

More information

KNOWLEDGE DISCOVERY FOR SUPPLY CHAIN MANAGEMENT SYSTEMS: A SCHEMA COMPOSITION APPROACH

KNOWLEDGE DISCOVERY FOR SUPPLY CHAIN MANAGEMENT SYSTEMS: A SCHEMA COMPOSITION APPROACH KNOWLEDGE DISCOVERY FOR SUPPLY CHAIN MANAGEMENT SYSTEMS: A SCHEMA COMPOSITION APPROACH Shi-Ming Huang and Tsuei-Chun Hu* Department of Accounting and Information Technology *Department of Information Management

More information

Financial Trading System using Combination of Textual and Numerical Data

Financial Trading System using Combination of Textual and Numerical Data Financial Trading System using Combination of Textual and Numerical Data Shital N. Dange Computer Science Department, Walchand Institute of Rajesh V. Argiddi Assistant Prof. Computer Science Department,

More information

Mobile Image Offloading Using Cloud Computing

Mobile Image Offloading Using Cloud Computing Mobile Image Offloading Using Cloud Computing Chintan Shah, Aruna Gawade Student, Dept. of Computer., D.J.Sanghvi College of Engineering, Mumbai University, Mumbai, India Assistant Professor, Dept. of

More information

Improving context-aware applications for the well-being domain Model-driven design guided by medical knowledge

Improving context-aware applications for the well-being domain Model-driven design guided by medical knowledge Improving contextaware applications for the wellbeing domain Modeldriven design guided by medical knowledge Steven Bosems and Marten van Sinderen Faculty of Electrical Engineering, Mathematics and Computer

More information

SCOUT: A Framework for Personalized Context- Aware Mobile Applications

SCOUT: A Framework for Personalized Context- Aware Mobile Applications SCOUT: A Framework for Personalized Context- Aware Mobile Applications William Van Woensel 1, Sven Casteleyn 1,2, Olga De Troyer 1,2 1 Vrije Universiteit Brussel, Pleinlaan 2, 1050 Brussel, Belgium {William.Van.Woensel,

More information

Sensor Information Representation for the Internet of Things

Sensor Information Representation for the Internet of Things Sensor Information Representation for the Internet of Things Jiehan Zhou Jiehan.zhou@ee.oulu.fi University of Oulu, Finland Carleton University, Canada Agenda Internet of Things and Challenges Application

More information

International Journal of Advance Research in Computer Science and Management Studies

International Journal of Advance Research in Computer Science and Management Studies Volume 3, Issue 11, November 2015 ISSN: 2321 7782 (Online) International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online

More information

DYNAMIC QUERY FORMS WITH NoSQL

DYNAMIC QUERY FORMS WITH NoSQL IMPACT: International Journal of Research in Engineering & Technology (IMPACT: IJRET) ISSN(E): 2321-8843; ISSN(P): 2347-4599 Vol. 2, Issue 7, Jul 2014, 157-162 Impact Journals DYNAMIC QUERY FORMS WITH

More information

A MACHINE LEARNING APPROACH TO FILTER UNWANTED MESSAGES FROM ONLINE SOCIAL NETWORKS

A MACHINE LEARNING APPROACH TO FILTER UNWANTED MESSAGES FROM ONLINE SOCIAL NETWORKS A MACHINE LEARNING APPROACH TO FILTER UNWANTED MESSAGES FROM ONLINE SOCIAL NETWORKS Charanma.P 1, P. Ganesh Kumar 2, 1 PG Scholar, 2 Assistant Professor,Department of Information Technology, Anna University

More information

Discovery of User Groups within Mobile Data

Discovery of User Groups within Mobile Data Discovery of User Groups within Mobile Data Syed Agha Muhammad Technical University Darmstadt muhammad@ess.tu-darmstadt.de Kristof Van Laerhoven Darmstadt, Germany kristof@ess.tu-darmstadt.de ABSTRACT

More information

Research and Development of Data Preprocessing in Web Usage Mining

Research and Development of Data Preprocessing in Web Usage Mining Research and Development of Data Preprocessing in Web Usage Mining Li Chaofeng School of Management, South-Central University for Nationalities,Wuhan 430074, P.R. China Abstract Web Usage Mining is the

More information

Semantically Enhanced Web Personalization Approaches and Techniques

Semantically Enhanced Web Personalization Approaches and Techniques Semantically Enhanced Web Personalization Approaches and Techniques Dario Vuljani, Lidia Rovan, Mirta Baranovi Faculty of Electrical Engineering and Computing, University of Zagreb Unska 3, HR-10000 Zagreb,

More information

INTEROPERABLE FEATURES CLASSIFICATION TECHNIQUE FOR CLOUD BASED APPLICATION USING FUZZY SYSTEMS

INTEROPERABLE FEATURES CLASSIFICATION TECHNIQUE FOR CLOUD BASED APPLICATION USING FUZZY SYSTEMS INTEROPERABLE FEATURES CLASSIFICATION TECHNIQUE FOR CLOUD BASED APPLICATION USING FUZZY SYSTEMS * C. Saravanakumar 1 and C. Arun 2 1 Department of Computer Science and Engineering, Sathyabama University,

More information

Framework for Biometric Enabled Unified Core Banking

Framework for Biometric Enabled Unified Core Banking Proc. of Int. Conf. on Advances in Computer Science and Application Framework for Biometric Enabled Unified Core Banking Manohar M, R Dinesh and Prabhanjan S Research Candidate, Research Supervisor, Faculty

More information

Intinno: A Web Integrated Digital Library and Learning Content Management System

Intinno: A Web Integrated Digital Library and Learning Content Management System Intinno: A Web Integrated Digital Library and Learning Content Management System Synopsis of the Thesis to be submitted in Partial Fulfillment of the Requirements for the Award of the Degree of Master

More information

User Modeling in Big Data. Qiang Yang, Huawei Noah s Ark Lab and Hong Kong University of Science and Technology 杨 强, 华 为 诺 亚 方 舟 实 验 室, 香 港 科 大

User Modeling in Big Data. Qiang Yang, Huawei Noah s Ark Lab and Hong Kong University of Science and Technology 杨 强, 华 为 诺 亚 方 舟 实 验 室, 香 港 科 大 User Modeling in Big Data Qiang Yang, Huawei Noah s Ark Lab and Hong Kong University of Science and Technology 杨 强, 华 为 诺 亚 方 舟 实 验 室, 香 港 科 大 Who we are: Noah s Ark LAB Have you watched the movie 2012?

More information

DATA MINING TECHNOLOGY. Keywords: data mining, data warehouse, knowledge discovery, OLAP, OLAM.

DATA MINING TECHNOLOGY. Keywords: data mining, data warehouse, knowledge discovery, OLAP, OLAM. DATA MINING TECHNOLOGY Georgiana Marin 1 Abstract In terms of data processing, classical statistical models are restrictive; it requires hypotheses, the knowledge and experience of specialists, equations,

More information

elfa2015 Pedagogical Implications of a Crossword Puzzle Mobile Application for Language Learning

elfa2015 Pedagogical Implications of a Crossword Puzzle Mobile Application for Language Learning elfa2015 Pedagogical Implications of a Crossword Puzzle Mobile Application for Language Learning Dr. Ronnie H. Shroff Prof. Christopher Keyes Dave Fung Hong Kong Baptist University Outline Identify the

More information

SEMANTIC WEB BASED INFERENCE MODEL FOR LARGE SCALE ONTOLOGIES FROM BIG DATA

SEMANTIC WEB BASED INFERENCE MODEL FOR LARGE SCALE ONTOLOGIES FROM BIG DATA SEMANTIC WEB BASED INFERENCE MODEL FOR LARGE SCALE ONTOLOGIES FROM BIG DATA J.RAVI RAJESH PG Scholar Rajalakshmi engineering college Thandalam, Chennai. ravirajesh.j.2013.mecse@rajalakshmi.edu.in Mrs.

More information

How To Use Data Mining For Knowledge Management In Technology Enhanced Learning

How To Use Data Mining For Knowledge Management In Technology Enhanced Learning Proceedings of the 6th WSEAS International Conference on Applications of Electrical Engineering, Istanbul, Turkey, May 27-29, 2007 115 Data Mining for Knowledge Management in Technology Enhanced Learning

More information

Development of Integrated Management System based on Mobile and Cloud service for preventing various dangerous situations

Development of Integrated Management System based on Mobile and Cloud service for preventing various dangerous situations Development of Integrated Management System based on Mobile and Cloud service for preventing various dangerous situations Ryu HyunKi, Moon ChangSoo, Yeo ChangSub, and Lee HaengSuk Abstract In this paper,

More information

Augmented Search for Web Applications. New frontier in big log data analysis and application intelligence

Augmented Search for Web Applications. New frontier in big log data analysis and application intelligence Augmented Search for Web Applications New frontier in big log data analysis and application intelligence Business white paper May 2015 Web applications are the most common business applications today.

More information

Data Mining for Manufacturing: Preventive Maintenance, Failure Prediction, Quality Control

Data Mining for Manufacturing: Preventive Maintenance, Failure Prediction, Quality Control Data Mining for Manufacturing: Preventive Maintenance, Failure Prediction, Quality Control Andre BERGMANN Salzgitter Mannesmann Forschung GmbH; Duisburg, Germany Phone: +49 203 9993154, Fax: +49 203 9993234;

More information

Taxonomy Enterprise System Search Makes Finding Files Easy

Taxonomy Enterprise System Search Makes Finding Files Easy Taxonomy Enterprise System Search Makes Finding Files Easy 1 Your Regular Enterprise Search System Can be Improved by Integrating it With the Taxonomy Enterprise Search System Regular Enterprise Search

More information

HELP DESK SYSTEMS. Using CaseBased Reasoning

HELP DESK SYSTEMS. Using CaseBased Reasoning HELP DESK SYSTEMS Using CaseBased Reasoning Topics Covered Today What is Help-Desk? Components of HelpDesk Systems Types Of HelpDesk Systems Used Need for CBR in HelpDesk Systems GE Helpdesk using ReMind

More information

A Knowledge Management Framework Using Business Intelligence Solutions

A Knowledge Management Framework Using Business Intelligence Solutions www.ijcsi.org 102 A Knowledge Management Framework Using Business Intelligence Solutions Marwa Gadu 1 and Prof. Dr. Nashaat El-Khameesy 2 1 Computer and Information Systems Department, Sadat Academy For

More information

Florida International University - University of Miami TRECVID 2014

Florida International University - University of Miami TRECVID 2014 Florida International University - University of Miami TRECVID 2014 Miguel Gavidia 3, Tarek Sayed 1, Yilin Yan 1, Quisha Zhu 1, Mei-Ling Shyu 1, Shu-Ching Chen 2, Hsin-Yu Ha 2, Ming Ma 1, Winnie Chen 4,

More information

Scholars Journal of Arts, Humanities and Social Sciences

Scholars Journal of Arts, Humanities and Social Sciences Scholars Journal of Arts, Humanities and Social Sciences Sch. J. Arts Humanit. Soc. Sci. 2014; 2(3B):440-444 Scholars Academic and Scientific Publishers (SAS Publishers) (An International Publisher for

More information

Filtering Noisy Contents in Online Social Network by using Rule Based Filtering System

Filtering Noisy Contents in Online Social Network by using Rule Based Filtering System Filtering Noisy Contents in Online Social Network by using Rule Based Filtering System Bala Kumari P 1, Bercelin Rose Mary W 2 and Devi Mareeswari M 3 1, 2, 3 M.TECH / IT, Dr.Sivanthi Aditanar College

More information

KEY KNOWLEDGE MANAGEMENT TECHNOLOGIES IN THE INTELLIGENCE ENTERPRISE

KEY KNOWLEDGE MANAGEMENT TECHNOLOGIES IN THE INTELLIGENCE ENTERPRISE KEY KNOWLEDGE MANAGEMENT TECHNOLOGIES IN THE INTELLIGENCE ENTERPRISE RAMONA-MIHAELA MATEI Ph.D. student, Academy of Economic Studies, Bucharest, Romania ramona.matei1982@gmail.com Abstract In this rapidly

More information

A Tool for Exploratory Visualization of Bus Mobility and Ridership: A case study of Lisbon, Portugal

A Tool for Exploratory Visualization of Bus Mobility and Ridership: A case study of Lisbon, Portugal A Tool for Exploratory Visualization of Bus Mobility and Ridership: A case study of Lisbon, Portugal Chalermpong Somdulyawat chalermpong_s@cmu.ac.th Piyawat Pongjitpak piyawat_p@cmu.ac.th Santi Phithakkitnukoon

More information

The Application Method of CRM as Big Data: Focused on the Car Maintenance Industry

The Application Method of CRM as Big Data: Focused on the Car Maintenance Industry , pp.93-97 http://dx.doi.org/10.14257/astl.2015.84.19 The Application Method of CRM as Big Data: Focused on the Car Maintenance Industry Dae-Hyun Jung 1, Lee-Sang Jung 2 {San 30, Jangjeon-dong, Geumjeonggu,

More information

MALLET-Privacy Preserving Influencer Mining in Social Media Networks via Hypergraph

MALLET-Privacy Preserving Influencer Mining in Social Media Networks via Hypergraph MALLET-Privacy Preserving Influencer Mining in Social Media Networks via Hypergraph Janani K 1, Narmatha S 2 Assistant Professor, Department of Computer Science and Engineering, Sri Shakthi Institute of

More information

The preliminary design of a wearable computer for supporting Construction Progress Monitoring

The preliminary design of a wearable computer for supporting Construction Progress Monitoring The preliminary design of a wearable computer for supporting Construction Progress Monitoring 1 Introduction Jan Reinhardt, TU - Dresden Prof. James H. Garrett,Jr., Carnegie Mellon University Prof. Raimar

More information

Advanced Peer to Peer Discovery and Interaction Framework

Advanced Peer to Peer Discovery and Interaction Framework Advanced Peer to Peer Discovery and Interaction Framework Peeyush Tugnawat J.D. Edwards and Company One, Technology Way, Denver, CO 80237 peeyush_tugnawat@jdedwards.com Mohamed E. Fayad Computer Engineering

More information

Decision Trees for Mining Data Streams Based on the Gaussian Approximation

Decision Trees for Mining Data Streams Based on the Gaussian Approximation International Journal of Computer Sciences and Engineering Open Access Review Paper Volume-4, Issue-3 E-ISSN: 2347-2693 Decision Trees for Mining Data Streams Based on the Gaussian Approximation S.Babu

More information

A Framework of User-Driven Data Analytics in the Cloud for Course Management

A Framework of User-Driven Data Analytics in the Cloud for Course Management A Framework of User-Driven Data Analytics in the Cloud for Course Management Jie ZHANG 1, William Chandra TJHI 2, Bu Sung LEE 1, Kee Khoon LEE 2, Julita VASSILEVA 3 & Chee Kit LOOI 4 1 School of Computer

More information

A Noble Integrated Management System based on Mobile and Cloud service for preventing various hazards

A Noble Integrated Management System based on Mobile and Cloud service for preventing various hazards , pp.166-171 http://dx.doi.org/10.14257/astl.205.98.42 A Noble Integrated Management System based on Mobile and Cloud service for preventing various hazards Yeo ChangSub 1, Ryu HyunKi 1 and Lee HaengSuk

More information

Large-Scale Data Sets Clustering Based on MapReduce and Hadoop

Large-Scale Data Sets Clustering Based on MapReduce and Hadoop Journal of Computational Information Systems 7: 16 (2011) 5956-5963 Available at http://www.jofcis.com Large-Scale Data Sets Clustering Based on MapReduce and Hadoop Ping ZHOU, Jingsheng LEI, Wenjun YE

More information

Big Data Classification: Problems and Challenges in Network Intrusion Prediction with Machine Learning

Big Data Classification: Problems and Challenges in Network Intrusion Prediction with Machine Learning Big Data Classification: Problems and Challenges in Network Intrusion Prediction with Machine Learning By: Shan Suthaharan Suthaharan, S. (2014). Big data classification: Problems and challenges in network

More information

Database Marketing, Business Intelligence and Knowledge Discovery

Database Marketing, Business Intelligence and Knowledge Discovery Database Marketing, Business Intelligence and Knowledge Discovery Note: Using material from Tan / Steinbach / Kumar (2005) Introduction to Data Mining,, Addison Wesley; and Cios / Pedrycz / Swiniarski

More information

Mining Signatures in Healthcare Data Based on Event Sequences and its Applications

Mining Signatures in Healthcare Data Based on Event Sequences and its Applications Mining Signatures in Healthcare Data Based on Event Sequences and its Applications Siddhanth Gokarapu 1, J. Laxmi Narayana 2 1 Student, Computer Science & Engineering-Department, JNTU Hyderabad India 1

More information

Dynamic Data in terms of Data Mining Streams

Dynamic Data in terms of Data Mining Streams International Journal of Computer Science and Software Engineering Volume 2, Number 1 (2015), pp. 1-6 International Research Publication House http://www.irphouse.com Dynamic Data in terms of Data Mining

More information

Data Refinery with Big Data Aspects

Data Refinery with Big Data Aspects International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 3, Number 7 (2013), pp. 655-662 International Research Publications House http://www. irphouse.com /ijict.htm Data

More information

Information Visualization WS 2013/14 11 Visual Analytics

Information Visualization WS 2013/14 11 Visual Analytics 1 11.1 Definitions and Motivation Lot of research and papers in this emerging field: Visual Analytics: Scope and Challenges of Keim et al. Illuminating the path of Thomas and Cook 2 11.1 Definitions and

More information

A Search Engine to Categorize LOs

A Search Engine to Categorize LOs A Search Engine to Categorize LOs Gianni Fenu Abstract The main purpose of this paper is to analyze the state of the art of search engines in e-learning platforms, and to elaborate a new model that exploits

More information

Enhanced Boosted Trees Technique for Customer Churn Prediction Model

Enhanced Boosted Trees Technique for Customer Churn Prediction Model IOSR Journal of Engineering (IOSRJEN) ISSN (e): 2250-3021, ISSN (p): 2278-8719 Vol. 04, Issue 03 (March. 2014), V5 PP 41-45 www.iosrjen.org Enhanced Boosted Trees Technique for Customer Churn Prediction

More information

TECHNOLOGY ANALYSIS FOR INTERNET OF THINGS USING BIG DATA LEARNING

TECHNOLOGY ANALYSIS FOR INTERNET OF THINGS USING BIG DATA LEARNING TECHNOLOGY ANALYSIS FOR INTERNET OF THINGS USING BIG DATA LEARNING Sunghae Jun 1 1 Professor, Department of Statistics, Cheongju University, Chungbuk, Korea Abstract The internet of things (IoT) is an

More information

A Collaborative Approach to Building Personal Knowledge Networks or How to Build a Knowledge Advantage Machine?

A Collaborative Approach to Building Personal Knowledge Networks or How to Build a Knowledge Advantage Machine? A Collaborative Approach to Building Personal Knowledge Networks or How to Build a Knowledge Advantage Machine? Ramana Reddy SIP Lab, CSEE, West Virginia University Morgantown, WV, USA Ramana.Reddy@mail.wvu.edu

More information

My good old Kodak: Understanding the

My good old Kodak: Understanding the UBICOMP '14 ADJUNCT, SEPTEMBER 13-17, 2014, SEATTLE, WA, USA My good old Kodak: Understanding the impact of having only 24 pictures to take Evangelos Niforatos Università della Svizzera italiana (USI)

More information

TRENDS IN THE DEVELOPMENT OF BUSINESS INTELLIGENCE SYSTEMS

TRENDS IN THE DEVELOPMENT OF BUSINESS INTELLIGENCE SYSTEMS 9 8 TRENDS IN THE DEVELOPMENT OF BUSINESS INTELLIGENCE SYSTEMS Assist. Prof. Latinka Todoranova Econ Lit C 810 Information technology is a highly dynamic field of research. As part of it, business intelligence

More information

Ubiquitous Analytics: Interacting with Big Data Anywhere, Anytime

Ubiquitous Analytics: Interacting with Big Data Anywhere, Anytime Ubiquitous Analytics: Interacting with Big Data Anywhere, Anytime Niklas Elmqvist (Purdue University) and Pourang Irani (University of Manitoba) Ubiquitous analytics amplifies human cognition by embedding

More information

Bisecting K-Means for Clustering Web Log data

Bisecting K-Means for Clustering Web Log data Bisecting K-Means for Clustering Web Log data Ruchika R. Patil Department of Computer Technology YCCE Nagpur, India Amreen Khan Department of Computer Technology YCCE Nagpur, India ABSTRACT Web usage mining

More information

ENHANCED WEB IMAGE RE-RANKING USING SEMANTIC SIGNATURES

ENHANCED WEB IMAGE RE-RANKING USING SEMANTIC SIGNATURES International Journal of Computer Engineering & Technology (IJCET) Volume 7, Issue 2, March-April 2016, pp. 24 29, Article ID: IJCET_07_02_003 Available online at http://www.iaeme.com/ijcet/issues.asp?jtype=ijcet&vtype=7&itype=2

More information

International Journal of Scientific & Engineering Research, Volume 5, Issue 4, April-2014 442 ISSN 2229-5518

International Journal of Scientific & Engineering Research, Volume 5, Issue 4, April-2014 442 ISSN 2229-5518 International Journal of Scientific & Engineering Research, Volume 5, Issue 4, April-2014 442 Over viewing issues of data mining with highlights of data warehousing Rushabh H. Baldaniya, Prof H.J.Baldaniya,

More information

IoT is a King, Big data is a Queen and Cloud is a Palace

IoT is a King, Big data is a Queen and Cloud is a Palace IoT is a King, Big data is a Queen and Cloud is a Palace Abdur Rahim Innotec21 GmbH, Germany Create-Net, Italy Acknowledgements- ikaas Partners (KDDI and other partnes) Intelligent Knowledge-as-a-Service

More information

Ubiquitous Learning Project Using Life-logging Technology in Japan

Ubiquitous Learning Project Using Life-logging Technology in Japan Ogata, H., Houb, B., Li, M., Uosakic, N., Mouri, K., & Liu, S. (2014). Ubiquitous Learning Project Using Life-logging Technology in Japan. Educational Technology & Society, 17 (2), 85 100. Ubiquitous Learning

More information

Micro-Environment Sensor based Android Application More Ketan Dadasaheb 1 Computer Department SCSCOE Pune, India Jagtap Pravin Vitthal 3

Micro-Environment Sensor based Android Application More Ketan Dadasaheb 1 Computer Department SCSCOE Pune, India Jagtap Pravin Vitthal 3 Volume 3, Issue 1, January 2015 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online at: www.ijarcsms.com ISSN:

More information

Search Result Optimization using Annotators

Search Result Optimization using Annotators Search Result Optimization using Annotators Vishal A. Kamble 1, Amit B. Chougule 2 1 Department of Computer Science and Engineering, D Y Patil College of engineering, Kolhapur, Maharashtra, India 2 Professor,

More information

Distributed Framework for Data Mining As a Service on Private Cloud

Distributed Framework for Data Mining As a Service on Private Cloud RESEARCH ARTICLE OPEN ACCESS Distributed Framework for Data Mining As a Service on Private Cloud Shraddha Masih *, Sanjay Tanwani** *Research Scholar & Associate Professor, School of Computer Science &

More information

Hadoop Technology for Flow Analysis of the Internet Traffic

Hadoop Technology for Flow Analysis of the Internet Traffic Hadoop Technology for Flow Analysis of the Internet Traffic Rakshitha Kiran P PG Scholar, Dept. of C.S, Shree Devi Institute of Technology, Mangalore, Karnataka, India ABSTRACT: Flow analysis of the internet

More information

Optimized Offloading Services in Cloud Computing Infrastructure

Optimized Offloading Services in Cloud Computing Infrastructure Optimized Offloading Services in Cloud Computing Infrastructure 1 Dasari Anil Kumar, 2 J.Srinivas Rao 1 Dept. of CSE, Nova College of Engineerng & Technology,Vijayawada,AP,India. 2 Professor, Nova College

More information

Supply Chain Platform as a Service: a Cloud Perspective on Business Collaboration

Supply Chain Platform as a Service: a Cloud Perspective on Business Collaboration Supply Chain Platform as a Service: a Cloud Perspective on Business Collaboration Guopeng Zhao 1, 2 and Zhiqi Shen 1 1 Nanyang Technological University, Singapore 639798 2 HP Labs Singapore, Singapore

More information

Requirements Analysis Concepts & Principles. Instructor: Dr. Jerry Gao

Requirements Analysis Concepts & Principles. Instructor: Dr. Jerry Gao Requirements Analysis Concepts & Principles Instructor: Dr. Jerry Gao Requirements Analysis Concepts and Principles - Requirements Analysis - Communication Techniques - Initiating the Process - Facilitated

More information

Do you know? "7 Practices" for a Reliable Requirements Management. by Software Process Engineering Inc. translated by Sparx Systems Japan Co., Ltd.

Do you know? 7 Practices for a Reliable Requirements Management. by Software Process Engineering Inc. translated by Sparx Systems Japan Co., Ltd. Do you know? "7 Practices" for a Reliable Requirements Management by Software Process Engineering Inc. translated by Sparx Systems Japan Co., Ltd. In this white paper, we focus on the "Requirements Management,"

More information

Intelligent Human Machine Interface Design for Advanced Product Life Cycle Management Systems

Intelligent Human Machine Interface Design for Advanced Product Life Cycle Management Systems Intelligent Human Machine Interface Design for Advanced Product Life Cycle Management Systems Zeeshan Ahmed Vienna University of Technology Getreidemarkt 9/307, 1060 Vienna Austria Email: zeeshan.ahmed@tuwien.ac.at

More information

A Case Study of Question Answering in Automatic Tourism Service Packaging

A Case Study of Question Answering in Automatic Tourism Service Packaging BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 13, Special Issue Sofia 2013 Print ISSN: 1311-9702; Online ISSN: 1314-4081 DOI: 10.2478/cait-2013-0045 A Case Study of Question

More information

Modern Agricultural Digital Management Network Information System of Heilongjiang Reclamation Area Farm

Modern Agricultural Digital Management Network Information System of Heilongjiang Reclamation Area Farm Modern Agricultural Digital Management Network Information System of Heilongjiang Reclamation Area Farm Xi Wang, Chun Wang, Wei Dong Zhuang, and Hui Yang Engineering Collage, Heilongjiang August the First

More information

01219211 Software Development Training Camp 1 (0-3) Prerequisite : 01204214 Program development skill enhancement camp, at least 48 person-hours.

01219211 Software Development Training Camp 1 (0-3) Prerequisite : 01204214 Program development skill enhancement camp, at least 48 person-hours. (International Program) 01219141 Object-Oriented Modeling and Programming 3 (3-0) Object concepts, object-oriented design and analysis, object-oriented analysis relating to developing conceptual models

More information