Social Contact Management System for Memory Recall Enhancement
|
|
- Randolph McKenzie
- 8 years ago
- Views:
Transcription
1 Social Contact Management System for Memory Recall Enhancement Nitin Ingle 1 Prof. Ayesha Butalia 2 Pune University, GHRCEM, Pune Pune University, GHRCEM, Pune Abstract Human memory regularly comes up short. Individuals are often overpowered with inquiries like "Who is that individual? I might have met him in Mumbai? Do I?" In the recall of names successfully, current memory aid tools can't help well. This paper will investigate the memory recall enhancement issue from the viewpoint of memory signal extraction and cooperative search, and proposes a naval technique to concentrate memory signs from heterogeneous, multimodel, physical/virtual information sources. Particularly, we utilize the contact name recall as a part of the scholastic group as the target application to showcase our proposed technique. We further create a smart social contact manager that backings 1) autogathering of rich contact information from a combo of pervasive sensors and Web Intelligence sources, and 2) acquainted pursuit of contacts when human memory comes up short. By testing the execution of contact information accumulation systems, this framework is approved. A precise client consider on contact memory recall is additionally directed, through which a few discoveries about contact remembering and recall are introduced. Excellent cognitive intelligence research hypotheses are utilized to decipher these discoveries. Keywords- Contact recall, memory aid, pervasive computing, social contact management, Web intelligence. 201 I. Introduction Memory tumble is a commonly occurred problem in almost every human being. In our day-to-day life, we face diverse forms of memory lapse, such as forgetting a contact id, name of a person, name of a document etc. These memory failures do invite many types of problems in our life and work. Hence, it becomes a basic and challenging problem to find the effective and efficient way to help the human memory. Memory recall enhancement is already having been studied in different fields for different reasons. Before the computer generations, these things were manual. But, these manual methods have some drawbacks, such as failure or damage and time consuming search support. The use of digital tools has raised much attraction with the development of information technology nowadays. But somehow, these digital tools silently face some problems, while enabling reliable storage and efficient support for query. The reliability of data retrieval is the most significant issue in these overall issues. Users must remember sufficient details about items they want to retrieve. So that they can construct a query to conduct searches on data retrieval tools. But somehow, people tend to remember different memory cues related to the items, rather than remembering precise details [1], and [2]. In memory lapse problem, it has been proved to be efficient to use the memory cues. To tackle diverse memory problems, several types of cues are used commonly. But somehow, the role that a memory cue plays in memory the recall is noticeably intricate and area related. This has been of modest apprehension in existing studies. Firstly, to enhance memory recall, cues in different forms have been used, in terms of the purposes and user groups. For scholarly analysts, even then, instructive foundation and investigation
2 hobbies get to be more critical data. This is in accord with the overview result reported by Elsweiler et al. [3], which demonstrates an extensive variety of overlooking practices and hence a requirement for distinctive sorts of devices to counteract memory malfunction. It might be less demanding for the client to use a few sorts of memories over others, dependent upon the connection of memory support consequently. Next is to develop memory recall utilizing specific memory cues, we have to collect this type of cues in relationship with the things in a data document for future retrieval. One rule to be taken after here is that we ought to lighten the load of clients on memory cue accumulation [4]. Then again, auto-collection of memory cues is nontrivial. It generally relies on upon the practices of the target client bunch and the accessibility of data sources. As it were, for diverse client assembles, the data that can be gathered is distinguishing. For the individuals who are dynamic in social media sites we can separate more data like, companion records, top choices about them from the Web. In what tails, we pick the contact name memory issue, and to represent the above issue utilizing the scholastic group. The prime aim of this paper is to use memory cues for enhancement of memory recall and explored the feature-specific nature of it. We have also proposed a naval methodology to gather the memory cues from various data sources. Basically, we intend to do the 3 things, they are: Firstly, translating the memory recall enhancement problem into a well managed collection of feature-specific memory cue and the management issue as well. Secondly, we propose a simple method for enhancing memory recall using extraction of memory cues from diverse data sources. And finally, to enhance the contact management and name recall processes, we propose to design and implement the Social Contact Manager (SCM). In near future the objectives that needed to be studied are: first, as reported in other studies, the quality of the photographs or videos taken by these wearable devices might be low, and the circumstance for face recognition most of the times are difficult. Secondly, an important issue for the usage of wearable sensors is secrecy [5], [6]. The remaining paper is organized as follows. The section II includes the survey of different methodologies that were been developed using different tactics has been discussed briefly. The section III concludes the paper in brief. II. Literature Survey Use of memory cues and the improvements in social contact management systems for the enhancement of memory recall has brought closer some related search directions: A. Digital Memory Aids Digital memory aid systems basically fell in to two categories depending upon the targeted memory issues. The issues are, Retrospective aid, and prospective aid [3]. Retrospective aid basically works with the recall of the past events, previously held events; whereas, the Prospective aid deals with remembering the future events. We have concentrated our study on the retrospective aid, rather than the prospective aid. Retrospective memory aid has two important application domains: i. Digital Object Re-finding The main focus of the Digital object refinding is on the storage and search of collections of heterogeneous digital objects. These objects are either generated by the users or been encountered at the time of work processes, like s, documents etc [7] [8] [9]. Metadata on the diverse aspects of an object s context like, when, where and relationships amongst them, is used commonly by tools. This makes the re-finding of the information much easier. ii. Life-Logging 202
3 Unlike the digital object re-finding, the Life-Logging extends beyond the storage of objects in closed environment, rather it moves in the real world. Because of this, it can capture our common activities. For Lifelogging, various systems have been developed. These systems commonly use the portable and sometimes wearable devices for capturing the data. A personal digital assistant [PDA] is used by the Forget-me-not [10]. Because of this, it can capture the activities of its users in the text form, i.e. user locations etc, daily. B. Human-Centric Computing The context-aware services are provided by the Human-centric computing with respect to the extracted information from the cyber-physical space about the user. There are two major sources for extracting the human information: web and pervasive sensors. Both these sources acquire the different attributes and strengths. The web is the best source for the static or slowly changing human information. This information may include the user profiles [11], social relationships etc. whereas; the pervasive sensing allows detecting the human activities, their social interactions [12], etc within the existent world. Combined data from these distinct sources allows exclusive opportunities to pervasive applications because of the diverse features [13]. But somehow, till the date, both these sources have followed the different research fields. Few systems have been developed in order to combine the power of these two data sources additionally. We have proposed a unique method to auto collect the digital traces of humans from the heterogeneous datasets. C. Social Contact Tools For getting the work done, personal contacts are critical. In social activities, for assisting the communication with contacts and the recommended contacts, many systems have been developed. i. Contact communication Environments suiting electronic communications like, s, instant messaging or social networking sites have become increasingly reliable for the modern work. An alternative representation of the s is provided by the ContactMap [14]. A problem that occurs regularly with such systems is that, they are strictly created for the communications between registered users in the virtual world. A general way of allowing people to create digital connections with their contacts is proposed by the Social Contact Manager (SCM). Exchanging the business cards in real world is the only source for connections ii. Contact recommendation Many systems have been developed to recommend the users with the new contacts. The recommendations are based on the background, social relationships, or context of the users. The users inside a public place, like hotels, can exchange the social network IDs by using their mobile phones and find someone of their interest. The WhozThat [15] provided this unique feature. Our system tends to support the management and already acquired information s recollection, rather than giving a social matching service. III. Existing Systems Bin Guo et al [1] proposed a system that enhanced the memory recall process using the memory cues. This system is shown in fig (1). In this system, the audio clips are used as an input. These audio clips 203
4 are recorded during the meetings. The important phases of this system are: Fig (1) System architecture of Bin Gou 1. Pre-processing the audio clip: The pre-processing necessary for extracting the actual audio from the clip is the main feature of this phase. It includes, Framing, pre-emphasis, and FFT phase. 2. Feature Extraction: In this phase, the important features from the clip are extracted. These features will work as the memory cues. This includes few techniques for extracting the features, like Haar, SF, and ZCR etc. 3. Finally, The Decision Tree classier is used to generate the required output from the audio clips. 4. The main drawback of this system is it only works with the audio clips. The remaining information was needed to be filled manually by the user. Thus, a new system was needed. T. Kawamura et al [2] has proposed a system that is based on the object-triggered augmentation of the human memory system, called as Ubiquitous Memory. This system enables the user to directly store the experienced events by Touching operation in a physical object. Fig (2) sows the architecture of the system. Fig (2) Kawamura s Architecture The drawback of this system was the security. Y Chon et al [6] have proposed a system called CrowdSence@Place (CSP). This framework was used for categorization of the places, based on the sensor data. This data consist of opportunistically captured images and the audios from the users of Smartphone. The main objective of this paper was to collect the places and categorize them correctly. Fig (3) shows the architecture of the system. The main drawback faced by this system was the accuracy of the classification, which was not up to the needed level. 204
5 the purpose of data search, it uses traditional information search technique. Additionally, this system also gives the face detection feature. Fig (3) architecture IV. Proposed Work The major intend of this paper is to employ memory cues for enrichment of memory recall and explored the featureprecise characteristics of it. We have proposed a new technology to collect the memory cues in the form of Videos, Images, Audios and Texts from different sources of data. The meetings are recorded in some device which is connected to the mobile by some wireless technology. Then these videos are forwarded to the server. The location is also detected and sent using the GPS. The processing of these videos includes following steps: 1. These video clips are processed in order to extract the audio, images, from the file. These extracted audio clips and images, along with the original video are sent to server. 2. These data is then pre-processed using some tokenizing technique. 3. The framing is done on all these data, in order to extract the features. 4. These features are then stored in database, while, the useless data is neglected. This system also allows the user to share this information on the social networking sites. For Fig (2) Flow of Proposed system V. Conclusion The current paper reports our deliberations on memory recall utilizing memory cues. The approach we propose addresses the impacts of distinctive peculiarities to cue-based memory recall. What's more, the technique is proposed, which investigates a combination of both pervasive sensing and Web brainpower strategies to auto-accumulate memory cues from physical/virtual information resources. The process is exhibited through a research endeavor the Social Contact Management (SCM). The SCM was intended to address the successive contact name slipping issue. The MRSS methodology was investigated to record rich contact information from both true collaborations and the Web. Our framework can adequately concentrate contact cues from 205
6 heterogeneous sources as demonstrated by the assessment results. The increased contact recall strategy was approved through a client trial. Our study on increased memory recall is continuous. To begin with, as the ID of semantic relations among individuals is essential to utilize our SCN better, past the advisor student connection abused in this paper, we want to discover more social relationship data later on to broaden the SCM. Secondly, we will research the exploitation of diverse sorts of connections, to upgrade contact memory recall 206 References [1]. Bin Guo, Daqing Zhang, Dingqi Yang, Zhiwen Yu, and Xingshe Zhou, Enhancing Memory Recall via an Intelligent Social Contact Manage-ment System, IEEE Transactions On Human- Machine Systems, [2]. T. Kawamura, T. Fukuhara, H. Takeda, Y. Kono, andm. Kidode, Ubiquitous memories: A memory externalization system using physical objects, Pers. Ubiquitous Comput., [3]. D. Elsweiler, I. Ruthven, and C. Jones, Towards memory supporting personal information management tools, J. Amer. Soc. Inform. Sci. Technol., [4]. S. Whittaker, Q. Jones, B. Nardi, M. Creech, L. Teryeen, E. Isaacs, and J. Hainsworth, ContactMap: Organi-zing communication in a social desktop, ACM Trans. Computer-Human Interaction, [5]. S. Hodges, L. Williams, E. Berry, S. Izadi, J. Srinivasan, A. Butler, G. Smyth, N. Kapur, K. Wood, SenseCam: A retrospective memory aid, in Proc. UbiComp, [6]. Y. Chon, N. D. Lane, H. Cha, F. Zhao, Automatically characterizing places with oppotunistic crowdsensing using smartphones, in Proc. ACM UbiComp, [7]. D. Elsweiler, M. Baillie, and I. Ruthven, Exploring memory in refinding, ACM Trans. Inf. Syst., [8]. D. H. Chau, B. Myers, and A. Faulring, What to do when search fails: Finding information by association, in Proc. Conf. Human Factors Comput. Syst., [9]. D. Zhang, B. Guo, and Z. Yu, The emergence of social and community intelligence, IEEE Comput., [10]. M. Lamming and M. Flynn, Forgetme-not: Intimate computing in support of human memory, in Proc. FRIEND21, [11]. J. Tang, D. Zhang, and L. M. Yao, Social network extraction of academic researchers, in Proc. IEEE Int. Conf. Data Mining, [12]. D. Quercia, J. Ellis, and L. Capri, Nurturing social networks using mobile phones, IEEE Pervas. Comput., [13]. D. Zhang, B. Guo, and Z. Yu, The emergence of social and community intelligence, IEEE Comput., [14]. S. Whittaker, Q. Jones, B. Nardi, M. Creech, L. Teryeen, E. Isaacs, and J. Hainsworth, ContactMap: Organi-zing communication in a social desktop, ACM Trans. Computer-Human Interaction, [15]. A. Beach et al., WhozThat? Evolving an ecosystem for context-aware mobile social networks, IEEE Netw., 2008.
Literature Review on Smart Social Contact Management System for Better Memory Recall Shailesh U. Sambhe, Sachin Murab
Literature Review on Smart Social Contact Management System for Better Memory Recall Shailesh U. Sambhe, Sachin Murab Abstract-Memory of human being is usually poor and often fails. On some occasions,
More informationEmail and PIM: Problems and Possibilities
This is the final author s version of the article published in Communications of the ACM : Bellotti, V., Gwizdka, J., & Whittaker, S. (2006). Email in personal information management. Communications in
More informationEnhancing Spontaneous Interaction in Opportunistic Mobile Social Networks
Enhancing Spontaneous Interaction in Opportunistic Mobile Social Networks Bin Guo 1* Daqing Zhang 1,2 Zhiwen Yu 1 Xingshe Zhou 1 Zhangbing Zhou 2,3 1. Northwestern Polytechnical University, China 2. Institut
More informationIMPROVING BUSINESS PROCESS MODELING USING RECOMMENDATION METHOD
Journal homepage: www.mjret.in ISSN:2348-6953 IMPROVING BUSINESS PROCESS MODELING USING RECOMMENDATION METHOD Deepak Ramchandara Lad 1, Soumitra S. Das 2 Computer Dept. 12 Dr. D. Y. Patil School of Engineering,(Affiliated
More informationUnderstanding Web personalization with Web Usage Mining and its Application: Recommender System
Understanding Web personalization with Web Usage Mining and its Application: Recommender System Manoj Swami 1, Prof. Manasi Kulkarni 2 1 M.Tech (Computer-NIMS), VJTI, Mumbai. 2 Department of Computer Technology,
More informationShared PI: Sharing Personal Data to Support Reflection and Behaviour Change
Shared PI: Sharing Personal Data to Support Reflection and Behaviour Change Rowanne Fleck UCL Interaction Centre University College London Gower Street, London WC1E 6BT, UK r.fleck@ucl.ac.uk Daniel Harrison
More informationCollaborative Filteration for user behavior Prediction using Big Data Hadoop
Collaborative Filteration for user behavior Prediction using Big Data Hadoop Jayshri Manohar Somwanshi, Prof. Y. B. Gurav Department of Computer Engineering, P.V.P.I.T Bavdhan, Pune, Maharashtra, India
More informationUbiquitous Memories: Wearable Interface for Computational Augmentation of Human Memory based on Real World Objects
Ubiquitous Memories: Wearable Interface for Computational Augmentation of Human Memory based on Real World Objects Tatsuyuki Kawamura Graduate School of Information Science, Nara Institute of Science and
More informationThe Scientific Data Mining Process
Chapter 4 The Scientific Data Mining Process When I use a word, Humpty Dumpty said, in rather a scornful tone, it means just what I choose it to mean neither more nor less. Lewis Carroll [87, p. 214] In
More informationMobile Adaptive Opportunistic Junction for Health Care Networking in Different Geographical Region
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 4, Number 2 (2014), pp. 113-118 International Research Publications House http://www. irphouse.com /ijict.htm Mobile
More informationVibration-Based Surface Recognition for Smartphones
Vibration-Based Surface Recognition for Smartphones Jungchan Cho, Inhwan Hwang, and Songhwai Oh CPSLAB, ASRI School of Electrical Engineering and Computer Science Seoul National University, Seoul, Korea
More informationNatural Language to Relational Query by Using Parsing Compiler
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 3, March 2015,
More informationINTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK A SURVEY ON BIG DATA ISSUES AMRINDER KAUR Assistant Professor, Department of Computer
More informationSPATIAL DATA CLASSIFICATION AND DATA MINING
, pp.-40-44. Available online at http://www. bioinfo. in/contents. php?id=42 SPATIAL DATA CLASSIFICATION AND DATA MINING RATHI J.B. * AND PATIL A.D. Department of Computer Science & Engineering, Jawaharlal
More informationA UPS Framework for Providing Privacy Protection in Personalized Web Search
A UPS Framework for Providing Privacy Protection in Personalized Web Search V. Sai kumar 1, P.N.V.S. Pavan Kumar 2 PG Scholar, Dept. of CSE, G Pulla Reddy Engineering College, Kurnool, Andhra Pradesh,
More informationMobile Storage and Search Engine of Information Oriented to Food Cloud
Advance Journal of Food Science and Technology 5(10): 1331-1336, 2013 ISSN: 2042-4868; e-issn: 2042-4876 Maxwell Scientific Organization, 2013 Submitted: May 29, 2013 Accepted: July 04, 2013 Published:
More information131-1. Adding New Level in KDD to Make the Web Usage Mining More Efficient. Abstract. 1. Introduction [1]. 1/10
1/10 131-1 Adding New Level in KDD to Make the Web Usage Mining More Efficient Mohammad Ala a AL_Hamami PHD Student, Lecturer m_ah_1@yahoocom Soukaena Hassan Hashem PHD Student, Lecturer soukaena_hassan@yahoocom
More informationA Supervised Forum Crawler
International Journal of Computer Sciences and Engineering Open Access Research Paper Volume-4, Special Issue-2, April 2016 E-ISSN: 2347-2693 A Supervised Forum Crawler Sreeja S R 1, Sangita Chaudhari
More informationIntelligent Log Analyzer. André Restivo <andre.restivo@portugalmail.pt>
Intelligent Log Analyzer André Restivo 9th January 2003 Abstract Server Administrators often have to analyze server logs to find if something is wrong with their machines.
More informationHealthcare Measurement Analysis Using Data mining Techniques
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 03 Issue 07 July, 2014 Page No. 7058-7064 Healthcare Measurement Analysis Using Data mining Techniques 1 Dr.A.Shaik
More informationABSTRACT I. INTRODUCTION
Mobile Backup Web Application Using Image Processing Authentication 1 Walse Reshma S. 2 Khemnar Archana M. 3 Padir Maya S. 4 Prof.K.P.Somase Department Of Computer Engineering, Jcoe(Kuran),Tal:Junnar,Dist:Pune
More informationHow To Use Neural Networks In Data Mining
International Journal of Electronics and Computer Science Engineering 1449 Available Online at www.ijecse.org ISSN- 2277-1956 Neural Networks in Data Mining Priyanka Gaur Department of Information and
More informationIEEE International Conference on Computing, Analytics and Security Trends CAST-2016 (19 21 December, 2016) Call for Paper
IEEE International Conference on Computing, Analytics and Security Trends CAST-2016 (19 21 December, 2016) Call for Paper CAST-2015 provides an opportunity for researchers, academicians, scientists and
More informationMULTI AGENT-BASED DISTRIBUTED DATA MINING
MULTI AGENT-BASED DISTRIBUTED DATA MINING REECHA B. PRAJAPATI 1, SUMITRA MENARIA 2 Department of Computer Science and Engineering, Parul Institute of Technology, Gujarat Technology University Abstract:
More informationSocial Data Mining through Distributed Mobile Sensing: A Position Paper
Social Data Mining through Distributed Mobile Sensing: A Position Paper John Gekas, Eurobank Research, Athens, GR Abstract. In this article, we present a distributed framework for collecting and analyzing
More informationDesign of an Interface for Technology Supported Collaborative Learning the RAFT Approach
Design of an Interface for Technology Supported Collaborative Learning the RAFT Approach Lucia Terrenghi 1, Marcus Specht 1, Moritz Stefaner 2 1 Fraunhofer FIT, Institute for Applied Information Technology,
More informationAWERProcedia Information Technology & Computer Science
AWERProcedia Information Technology & Computer Science Vol 03 (2013) 1157-1162 3 rd World Conference on Information Technology (WCIT-2012) Webification of Software Development: General Outline and the
More informationUNIVERSITY OF INFINITE AMBITIONS. MASTER OF SCIENCE COMPUTER SCIENCE DATA SCIENCE AND SMART SERVICES
UNIVERSITY OF INFINITE AMBITIONS. MASTER OF SCIENCE COMPUTER SCIENCE DATA SCIENCE AND SMART SERVICES MASTER S PROGRAMME COMPUTER SCIENCE - DATA SCIENCE AND SMART SERVICES (DS3) This is a specialization
More informationInternational Journal of Scientific & Engineering Research, Volume 6, Issue 5, May-2015 1681 ISSN 2229-5518
International Journal of Scientific & Engineering Research, Volume 6, Issue 5, May-2015 1681 Software as a Model for Security in Cloud over Virtual Environments S.Vengadesan, B.Muthulakshmi PG Student,
More informationSoftware Engineering for Big Data. CS846 Paulo Alencar David R. Cheriton School of Computer Science University of Waterloo
Software Engineering for Big Data CS846 Paulo Alencar David R. Cheriton School of Computer Science University of Waterloo Big Data Big data technologies describe a new generation of technologies that aim
More informationDelivering Smart Answers!
Companion for SharePoint Topic Analyst Companion for SharePoint All Your Information Enterprise-ready Enrich SharePoint, your central place for document and workflow management, not only with an improved
More informationKNOWLEDGE DISCOVERY FOR SUPPLY CHAIN MANAGEMENT SYSTEMS: A SCHEMA COMPOSITION APPROACH
KNOWLEDGE DISCOVERY FOR SUPPLY CHAIN MANAGEMENT SYSTEMS: A SCHEMA COMPOSITION APPROACH Shi-Ming Huang and Tsuei-Chun Hu* Department of Accounting and Information Technology *Department of Information Management
More informationFinancial Trading System using Combination of Textual and Numerical Data
Financial Trading System using Combination of Textual and Numerical Data Shital N. Dange Computer Science Department, Walchand Institute of Rajesh V. Argiddi Assistant Prof. Computer Science Department,
More informationMobile Image Offloading Using Cloud Computing
Mobile Image Offloading Using Cloud Computing Chintan Shah, Aruna Gawade Student, Dept. of Computer., D.J.Sanghvi College of Engineering, Mumbai University, Mumbai, India Assistant Professor, Dept. of
More informationImproving context-aware applications for the well-being domain Model-driven design guided by medical knowledge
Improving contextaware applications for the wellbeing domain Modeldriven design guided by medical knowledge Steven Bosems and Marten van Sinderen Faculty of Electrical Engineering, Mathematics and Computer
More informationSCOUT: A Framework for Personalized Context- Aware Mobile Applications
SCOUT: A Framework for Personalized Context- Aware Mobile Applications William Van Woensel 1, Sven Casteleyn 1,2, Olga De Troyer 1,2 1 Vrije Universiteit Brussel, Pleinlaan 2, 1050 Brussel, Belgium {William.Van.Woensel,
More informationSensor Information Representation for the Internet of Things
Sensor Information Representation for the Internet of Things Jiehan Zhou Jiehan.zhou@ee.oulu.fi University of Oulu, Finland Carleton University, Canada Agenda Internet of Things and Challenges Application
More informationInternational Journal of Advance Research in Computer Science and Management Studies
Volume 3, Issue 11, November 2015 ISSN: 2321 7782 (Online) International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online
More informationDYNAMIC QUERY FORMS WITH NoSQL
IMPACT: International Journal of Research in Engineering & Technology (IMPACT: IJRET) ISSN(E): 2321-8843; ISSN(P): 2347-4599 Vol. 2, Issue 7, Jul 2014, 157-162 Impact Journals DYNAMIC QUERY FORMS WITH
More informationA MACHINE LEARNING APPROACH TO FILTER UNWANTED MESSAGES FROM ONLINE SOCIAL NETWORKS
A MACHINE LEARNING APPROACH TO FILTER UNWANTED MESSAGES FROM ONLINE SOCIAL NETWORKS Charanma.P 1, P. Ganesh Kumar 2, 1 PG Scholar, 2 Assistant Professor,Department of Information Technology, Anna University
More informationDiscovery of User Groups within Mobile Data
Discovery of User Groups within Mobile Data Syed Agha Muhammad Technical University Darmstadt muhammad@ess.tu-darmstadt.de Kristof Van Laerhoven Darmstadt, Germany kristof@ess.tu-darmstadt.de ABSTRACT
More informationResearch and Development of Data Preprocessing in Web Usage Mining
Research and Development of Data Preprocessing in Web Usage Mining Li Chaofeng School of Management, South-Central University for Nationalities,Wuhan 430074, P.R. China Abstract Web Usage Mining is the
More informationSemantically Enhanced Web Personalization Approaches and Techniques
Semantically Enhanced Web Personalization Approaches and Techniques Dario Vuljani, Lidia Rovan, Mirta Baranovi Faculty of Electrical Engineering and Computing, University of Zagreb Unska 3, HR-10000 Zagreb,
More informationINTEROPERABLE FEATURES CLASSIFICATION TECHNIQUE FOR CLOUD BASED APPLICATION USING FUZZY SYSTEMS
INTEROPERABLE FEATURES CLASSIFICATION TECHNIQUE FOR CLOUD BASED APPLICATION USING FUZZY SYSTEMS * C. Saravanakumar 1 and C. Arun 2 1 Department of Computer Science and Engineering, Sathyabama University,
More informationFramework for Biometric Enabled Unified Core Banking
Proc. of Int. Conf. on Advances in Computer Science and Application Framework for Biometric Enabled Unified Core Banking Manohar M, R Dinesh and Prabhanjan S Research Candidate, Research Supervisor, Faculty
More informationIntinno: A Web Integrated Digital Library and Learning Content Management System
Intinno: A Web Integrated Digital Library and Learning Content Management System Synopsis of the Thesis to be submitted in Partial Fulfillment of the Requirements for the Award of the Degree of Master
More informationUser Modeling in Big Data. Qiang Yang, Huawei Noah s Ark Lab and Hong Kong University of Science and Technology 杨 强, 华 为 诺 亚 方 舟 实 验 室, 香 港 科 大
User Modeling in Big Data Qiang Yang, Huawei Noah s Ark Lab and Hong Kong University of Science and Technology 杨 强, 华 为 诺 亚 方 舟 实 验 室, 香 港 科 大 Who we are: Noah s Ark LAB Have you watched the movie 2012?
More informationDATA MINING TECHNOLOGY. Keywords: data mining, data warehouse, knowledge discovery, OLAP, OLAM.
DATA MINING TECHNOLOGY Georgiana Marin 1 Abstract In terms of data processing, classical statistical models are restrictive; it requires hypotheses, the knowledge and experience of specialists, equations,
More informationelfa2015 Pedagogical Implications of a Crossword Puzzle Mobile Application for Language Learning
elfa2015 Pedagogical Implications of a Crossword Puzzle Mobile Application for Language Learning Dr. Ronnie H. Shroff Prof. Christopher Keyes Dave Fung Hong Kong Baptist University Outline Identify the
More informationSEMANTIC WEB BASED INFERENCE MODEL FOR LARGE SCALE ONTOLOGIES FROM BIG DATA
SEMANTIC WEB BASED INFERENCE MODEL FOR LARGE SCALE ONTOLOGIES FROM BIG DATA J.RAVI RAJESH PG Scholar Rajalakshmi engineering college Thandalam, Chennai. ravirajesh.j.2013.mecse@rajalakshmi.edu.in Mrs.
More informationHow To Use Data Mining For Knowledge Management In Technology Enhanced Learning
Proceedings of the 6th WSEAS International Conference on Applications of Electrical Engineering, Istanbul, Turkey, May 27-29, 2007 115 Data Mining for Knowledge Management in Technology Enhanced Learning
More informationDevelopment of Integrated Management System based on Mobile and Cloud service for preventing various dangerous situations
Development of Integrated Management System based on Mobile and Cloud service for preventing various dangerous situations Ryu HyunKi, Moon ChangSoo, Yeo ChangSub, and Lee HaengSuk Abstract In this paper,
More informationAugmented Search for Web Applications. New frontier in big log data analysis and application intelligence
Augmented Search for Web Applications New frontier in big log data analysis and application intelligence Business white paper May 2015 Web applications are the most common business applications today.
More informationData Mining for Manufacturing: Preventive Maintenance, Failure Prediction, Quality Control
Data Mining for Manufacturing: Preventive Maintenance, Failure Prediction, Quality Control Andre BERGMANN Salzgitter Mannesmann Forschung GmbH; Duisburg, Germany Phone: +49 203 9993154, Fax: +49 203 9993234;
More informationTaxonomy Enterprise System Search Makes Finding Files Easy
Taxonomy Enterprise System Search Makes Finding Files Easy 1 Your Regular Enterprise Search System Can be Improved by Integrating it With the Taxonomy Enterprise Search System Regular Enterprise Search
More informationHELP DESK SYSTEMS. Using CaseBased Reasoning
HELP DESK SYSTEMS Using CaseBased Reasoning Topics Covered Today What is Help-Desk? Components of HelpDesk Systems Types Of HelpDesk Systems Used Need for CBR in HelpDesk Systems GE Helpdesk using ReMind
More informationA Knowledge Management Framework Using Business Intelligence Solutions
www.ijcsi.org 102 A Knowledge Management Framework Using Business Intelligence Solutions Marwa Gadu 1 and Prof. Dr. Nashaat El-Khameesy 2 1 Computer and Information Systems Department, Sadat Academy For
More informationFlorida International University - University of Miami TRECVID 2014
Florida International University - University of Miami TRECVID 2014 Miguel Gavidia 3, Tarek Sayed 1, Yilin Yan 1, Quisha Zhu 1, Mei-Ling Shyu 1, Shu-Ching Chen 2, Hsin-Yu Ha 2, Ming Ma 1, Winnie Chen 4,
More informationScholars Journal of Arts, Humanities and Social Sciences
Scholars Journal of Arts, Humanities and Social Sciences Sch. J. Arts Humanit. Soc. Sci. 2014; 2(3B):440-444 Scholars Academic and Scientific Publishers (SAS Publishers) (An International Publisher for
More informationFiltering Noisy Contents in Online Social Network by using Rule Based Filtering System
Filtering Noisy Contents in Online Social Network by using Rule Based Filtering System Bala Kumari P 1, Bercelin Rose Mary W 2 and Devi Mareeswari M 3 1, 2, 3 M.TECH / IT, Dr.Sivanthi Aditanar College
More informationKEY KNOWLEDGE MANAGEMENT TECHNOLOGIES IN THE INTELLIGENCE ENTERPRISE
KEY KNOWLEDGE MANAGEMENT TECHNOLOGIES IN THE INTELLIGENCE ENTERPRISE RAMONA-MIHAELA MATEI Ph.D. student, Academy of Economic Studies, Bucharest, Romania ramona.matei1982@gmail.com Abstract In this rapidly
More informationA Tool for Exploratory Visualization of Bus Mobility and Ridership: A case study of Lisbon, Portugal
A Tool for Exploratory Visualization of Bus Mobility and Ridership: A case study of Lisbon, Portugal Chalermpong Somdulyawat chalermpong_s@cmu.ac.th Piyawat Pongjitpak piyawat_p@cmu.ac.th Santi Phithakkitnukoon
More informationThe Application Method of CRM as Big Data: Focused on the Car Maintenance Industry
, pp.93-97 http://dx.doi.org/10.14257/astl.2015.84.19 The Application Method of CRM as Big Data: Focused on the Car Maintenance Industry Dae-Hyun Jung 1, Lee-Sang Jung 2 {San 30, Jangjeon-dong, Geumjeonggu,
More informationMALLET-Privacy Preserving Influencer Mining in Social Media Networks via Hypergraph
MALLET-Privacy Preserving Influencer Mining in Social Media Networks via Hypergraph Janani K 1, Narmatha S 2 Assistant Professor, Department of Computer Science and Engineering, Sri Shakthi Institute of
More informationThe preliminary design of a wearable computer for supporting Construction Progress Monitoring
The preliminary design of a wearable computer for supporting Construction Progress Monitoring 1 Introduction Jan Reinhardt, TU - Dresden Prof. James H. Garrett,Jr., Carnegie Mellon University Prof. Raimar
More informationAdvanced Peer to Peer Discovery and Interaction Framework
Advanced Peer to Peer Discovery and Interaction Framework Peeyush Tugnawat J.D. Edwards and Company One, Technology Way, Denver, CO 80237 peeyush_tugnawat@jdedwards.com Mohamed E. Fayad Computer Engineering
More informationDecision Trees for Mining Data Streams Based on the Gaussian Approximation
International Journal of Computer Sciences and Engineering Open Access Review Paper Volume-4, Issue-3 E-ISSN: 2347-2693 Decision Trees for Mining Data Streams Based on the Gaussian Approximation S.Babu
More informationA Framework of User-Driven Data Analytics in the Cloud for Course Management
A Framework of User-Driven Data Analytics in the Cloud for Course Management Jie ZHANG 1, William Chandra TJHI 2, Bu Sung LEE 1, Kee Khoon LEE 2, Julita VASSILEVA 3 & Chee Kit LOOI 4 1 School of Computer
More informationA Noble Integrated Management System based on Mobile and Cloud service for preventing various hazards
, pp.166-171 http://dx.doi.org/10.14257/astl.205.98.42 A Noble Integrated Management System based on Mobile and Cloud service for preventing various hazards Yeo ChangSub 1, Ryu HyunKi 1 and Lee HaengSuk
More informationLarge-Scale Data Sets Clustering Based on MapReduce and Hadoop
Journal of Computational Information Systems 7: 16 (2011) 5956-5963 Available at http://www.jofcis.com Large-Scale Data Sets Clustering Based on MapReduce and Hadoop Ping ZHOU, Jingsheng LEI, Wenjun YE
More informationBig Data Classification: Problems and Challenges in Network Intrusion Prediction with Machine Learning
Big Data Classification: Problems and Challenges in Network Intrusion Prediction with Machine Learning By: Shan Suthaharan Suthaharan, S. (2014). Big data classification: Problems and challenges in network
More informationDatabase Marketing, Business Intelligence and Knowledge Discovery
Database Marketing, Business Intelligence and Knowledge Discovery Note: Using material from Tan / Steinbach / Kumar (2005) Introduction to Data Mining,, Addison Wesley; and Cios / Pedrycz / Swiniarski
More informationMining Signatures in Healthcare Data Based on Event Sequences and its Applications
Mining Signatures in Healthcare Data Based on Event Sequences and its Applications Siddhanth Gokarapu 1, J. Laxmi Narayana 2 1 Student, Computer Science & Engineering-Department, JNTU Hyderabad India 1
More informationDynamic Data in terms of Data Mining Streams
International Journal of Computer Science and Software Engineering Volume 2, Number 1 (2015), pp. 1-6 International Research Publication House http://www.irphouse.com Dynamic Data in terms of Data Mining
More informationData Refinery with Big Data Aspects
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 3, Number 7 (2013), pp. 655-662 International Research Publications House http://www. irphouse.com /ijict.htm Data
More informationInformation Visualization WS 2013/14 11 Visual Analytics
1 11.1 Definitions and Motivation Lot of research and papers in this emerging field: Visual Analytics: Scope and Challenges of Keim et al. Illuminating the path of Thomas and Cook 2 11.1 Definitions and
More informationA Search Engine to Categorize LOs
A Search Engine to Categorize LOs Gianni Fenu Abstract The main purpose of this paper is to analyze the state of the art of search engines in e-learning platforms, and to elaborate a new model that exploits
More informationEnhanced Boosted Trees Technique for Customer Churn Prediction Model
IOSR Journal of Engineering (IOSRJEN) ISSN (e): 2250-3021, ISSN (p): 2278-8719 Vol. 04, Issue 03 (March. 2014), V5 PP 41-45 www.iosrjen.org Enhanced Boosted Trees Technique for Customer Churn Prediction
More informationTECHNOLOGY ANALYSIS FOR INTERNET OF THINGS USING BIG DATA LEARNING
TECHNOLOGY ANALYSIS FOR INTERNET OF THINGS USING BIG DATA LEARNING Sunghae Jun 1 1 Professor, Department of Statistics, Cheongju University, Chungbuk, Korea Abstract The internet of things (IoT) is an
More informationA Collaborative Approach to Building Personal Knowledge Networks or How to Build a Knowledge Advantage Machine?
A Collaborative Approach to Building Personal Knowledge Networks or How to Build a Knowledge Advantage Machine? Ramana Reddy SIP Lab, CSEE, West Virginia University Morgantown, WV, USA Ramana.Reddy@mail.wvu.edu
More informationMy good old Kodak: Understanding the
UBICOMP '14 ADJUNCT, SEPTEMBER 13-17, 2014, SEATTLE, WA, USA My good old Kodak: Understanding the impact of having only 24 pictures to take Evangelos Niforatos Università della Svizzera italiana (USI)
More informationTRENDS IN THE DEVELOPMENT OF BUSINESS INTELLIGENCE SYSTEMS
9 8 TRENDS IN THE DEVELOPMENT OF BUSINESS INTELLIGENCE SYSTEMS Assist. Prof. Latinka Todoranova Econ Lit C 810 Information technology is a highly dynamic field of research. As part of it, business intelligence
More informationUbiquitous Analytics: Interacting with Big Data Anywhere, Anytime
Ubiquitous Analytics: Interacting with Big Data Anywhere, Anytime Niklas Elmqvist (Purdue University) and Pourang Irani (University of Manitoba) Ubiquitous analytics amplifies human cognition by embedding
More informationBisecting K-Means for Clustering Web Log data
Bisecting K-Means for Clustering Web Log data Ruchika R. Patil Department of Computer Technology YCCE Nagpur, India Amreen Khan Department of Computer Technology YCCE Nagpur, India ABSTRACT Web usage mining
More informationENHANCED WEB IMAGE RE-RANKING USING SEMANTIC SIGNATURES
International Journal of Computer Engineering & Technology (IJCET) Volume 7, Issue 2, March-April 2016, pp. 24 29, Article ID: IJCET_07_02_003 Available online at http://www.iaeme.com/ijcet/issues.asp?jtype=ijcet&vtype=7&itype=2
More informationInternational Journal of Scientific & Engineering Research, Volume 5, Issue 4, April-2014 442 ISSN 2229-5518
International Journal of Scientific & Engineering Research, Volume 5, Issue 4, April-2014 442 Over viewing issues of data mining with highlights of data warehousing Rushabh H. Baldaniya, Prof H.J.Baldaniya,
More informationIoT is a King, Big data is a Queen and Cloud is a Palace
IoT is a King, Big data is a Queen and Cloud is a Palace Abdur Rahim Innotec21 GmbH, Germany Create-Net, Italy Acknowledgements- ikaas Partners (KDDI and other partnes) Intelligent Knowledge-as-a-Service
More informationUbiquitous Learning Project Using Life-logging Technology in Japan
Ogata, H., Houb, B., Li, M., Uosakic, N., Mouri, K., & Liu, S. (2014). Ubiquitous Learning Project Using Life-logging Technology in Japan. Educational Technology & Society, 17 (2), 85 100. Ubiquitous Learning
More informationMicro-Environment Sensor based Android Application More Ketan Dadasaheb 1 Computer Department SCSCOE Pune, India Jagtap Pravin Vitthal 3
Volume 3, Issue 1, January 2015 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online at: www.ijarcsms.com ISSN:
More informationSearch Result Optimization using Annotators
Search Result Optimization using Annotators Vishal A. Kamble 1, Amit B. Chougule 2 1 Department of Computer Science and Engineering, D Y Patil College of engineering, Kolhapur, Maharashtra, India 2 Professor,
More informationDistributed Framework for Data Mining As a Service on Private Cloud
RESEARCH ARTICLE OPEN ACCESS Distributed Framework for Data Mining As a Service on Private Cloud Shraddha Masih *, Sanjay Tanwani** *Research Scholar & Associate Professor, School of Computer Science &
More informationHadoop Technology for Flow Analysis of the Internet Traffic
Hadoop Technology for Flow Analysis of the Internet Traffic Rakshitha Kiran P PG Scholar, Dept. of C.S, Shree Devi Institute of Technology, Mangalore, Karnataka, India ABSTRACT: Flow analysis of the internet
More informationOptimized Offloading Services in Cloud Computing Infrastructure
Optimized Offloading Services in Cloud Computing Infrastructure 1 Dasari Anil Kumar, 2 J.Srinivas Rao 1 Dept. of CSE, Nova College of Engineerng & Technology,Vijayawada,AP,India. 2 Professor, Nova College
More informationSupply Chain Platform as a Service: a Cloud Perspective on Business Collaboration
Supply Chain Platform as a Service: a Cloud Perspective on Business Collaboration Guopeng Zhao 1, 2 and Zhiqi Shen 1 1 Nanyang Technological University, Singapore 639798 2 HP Labs Singapore, Singapore
More informationRequirements Analysis Concepts & Principles. Instructor: Dr. Jerry Gao
Requirements Analysis Concepts & Principles Instructor: Dr. Jerry Gao Requirements Analysis Concepts and Principles - Requirements Analysis - Communication Techniques - Initiating the Process - Facilitated
More informationDo you know? "7 Practices" for a Reliable Requirements Management. by Software Process Engineering Inc. translated by Sparx Systems Japan Co., Ltd.
Do you know? "7 Practices" for a Reliable Requirements Management by Software Process Engineering Inc. translated by Sparx Systems Japan Co., Ltd. In this white paper, we focus on the "Requirements Management,"
More informationIntelligent Human Machine Interface Design for Advanced Product Life Cycle Management Systems
Intelligent Human Machine Interface Design for Advanced Product Life Cycle Management Systems Zeeshan Ahmed Vienna University of Technology Getreidemarkt 9/307, 1060 Vienna Austria Email: zeeshan.ahmed@tuwien.ac.at
More informationA Case Study of Question Answering in Automatic Tourism Service Packaging
BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 13, Special Issue Sofia 2013 Print ISSN: 1311-9702; Online ISSN: 1314-4081 DOI: 10.2478/cait-2013-0045 A Case Study of Question
More informationModern Agricultural Digital Management Network Information System of Heilongjiang Reclamation Area Farm
Modern Agricultural Digital Management Network Information System of Heilongjiang Reclamation Area Farm Xi Wang, Chun Wang, Wei Dong Zhuang, and Hui Yang Engineering Collage, Heilongjiang August the First
More information01219211 Software Development Training Camp 1 (0-3) Prerequisite : 01204214 Program development skill enhancement camp, at least 48 person-hours.
(International Program) 01219141 Object-Oriented Modeling and Programming 3 (3-0) Object concepts, object-oriented design and analysis, object-oriented analysis relating to developing conceptual models
More information