Development of an Enhanced Web-based Automatic Customer Service System
|
|
- Andrew Barber
- 8 years ago
- Views:
Transcription
1 Development of an Enhanced Web-based Automatic Customer Service System Ji-Wei Wu, Chih-Chang Chang Wei and Judy C.R. Tseng Department of Computer Science and Information Engineering Chung Hua University Reporter: Judy C.R. Tseng
2 Outline Introduction Relevant Works Structure of The EACS Information Retrieval Algorithms of EACS Implementation and Evaluation Conclusions 2
3 Introduction [1/3] [/] ICESA 2007 International Conference on Enterprise Systems and Application Most existing web-based customer services heavily rely on manpower. It not only increases the service cost, but also delays the time for responding the service requests. In recent years, automatic customer service system has been discussed and presented. 3
4 Introduction [2/3] [/] ICESA 2007 International Conference on Enterprise Systems and Application Some problems still exist The keywords have to be set by a certain personnel. The knowledge and experience of the personnel will absolutely influence on the quality of the keyword set as well as the quality of the answers. The knowledge and experience of the personnel is not able to be efficiently kept in the system. The quality and the accuracy of the answers still have potential to be improved. 4
5 Introduction [3/3] [/] ICESA 2007 International Conference on Enterprise Systems and Application To cope with these problems, an Enhanced Automatic Customer Service system EACS is developed d in this paper. A new keyword weighting g method, called Importance Factor IMF, is also proposed. IMF is applied to develop an automatic keyword extraction system to achieve fully automation. IMF is also applied to an indexing method for FAQ to improve the accuracy of the automatic customer system. 5
6 Outline Introduction Relevant Works Structure of The EACS Information Retrieval Algorithms of EACS Implementation and Evaluation Conclusions 6
7 Relevant Works [1/2] [/] ICESA 2007 International Conference on Enterprise Systems and Application Researchers have proposed several development of intelligent customer service systems in recent years. Hoch 1994 Cohen 1996 Li and Tseng 2001 Tseng and Hwang 2007: ACSS Development of an Automatic Customer Service System on the Internet, Electronic Commerce Research and Applications. Vol. 6, No. 1, pp SSCI 7
8 Relevant Works [2/2] [/] ICESA 2007 International Conference on Enterprise Systems and Application Although the previously proposed automatic customer service systems can automatically handle customer requests. the keywords have to be set manually the accuracy of the answers still have potential to be improved 8
9 Outline Introduction Relevant Works Structure of The EACS Information Retrieval Algorithms of EACS Implementation and Evaluation Conclusions 9
10 Structure of The Enhanced Automatic Customer Service System EACS [1/7] 10
11 Structure of The Enhanced Automatic Customer Service System EACS [2/7] The Chinese Knowledge and Information Processing Database is a database of Chinese terms, containing general terms, proper p nouns and idioms etc. 11
12 Structure of The Enhanced Automatic Customer Service System EACS [3/7] The FAQ Database is a database of frequently asked questions. 12
13 Structure of The Enhanced Automatic Customer Service System EACS [4/7] The Automatic Keyword Extraction Module, uses the CKIP database to extracts the domainspecific keywords contained in FAQ to the Keyword Database. 13
14 Structure of The Enhanced Automatic Customer Service System EACS [5/7] For each FAQ, a Characteristic Vector CV is used dto represent tthe characteristics ti of fthe question, which is extracted by the Characteristic Extraction Module and maintained in the Characteristic Database. 14
15 Structure of The Enhanced Automatic Customer Service System EACS [6/7] Once a question is submitted by the customer, the Question Answering Module will search the FAQ Database to find the best-fit answer and sent it to the customer for reference. 15
16 Structure of The Enhanced Automatic Customer Service System EACS [7/7] The satisfaction analysis module will collect the user-feedbacks and record them in the Userfeedback Database. 16
17 Outline Abstract Introduction Relevant Works Structure t of The EACS Information Retrieval Algorithms of EACS Implementation and Evaluation Conclusions 17
18 The Importance Factor IMF [1/2] IMF is a novel modified d TF IDF scheme TF IDF term frequency inverse document frequency A well-known scheme for representing term weight. It is a statistical measure for evaluating the importance of a term to the corpus it contained. From experience, long keywords tend to be more important than short keywords Eg. Database v.s. Data However, the keyword length is not considered d in the original TFxIDF formula 18
19 The Importance Factor IMF [2/2] IMF Importance Factor L n j TFi, j IMF, = , = log / i j IDFj IDFj N C L i, max TF i,max i= 1 i, j IMF i,j : The weight of term j in the i-th question Q i in the FAQ database. L j : The length of the j-th term. L i,max : The maximum length of terms in Q i. TF i,j : The number of occurrences for term j in Q i. TF i,max : The maximum number of occurrences for the terms in Q i. N : The number of FAQ. C i,j : Equal to 1 if Q i contains term j; Equal to 0, otherwise. 19
20 The Automatic Keyword Extraction Algorithm [1/4] Based on the IMF formula Retrieve all the terms contained in each questions Q i in FAQ database by using the CKIP database. Calculate IMF ij i,j for each term T i contained in Q i. Sort IMF i,j descendantly and add the terms with the top P percent of the IMF s to the keyword database. 20
21 The Automatic Keyword Extraction Algorithm [2/4] Example: Assume that there are four FAQ s in the database. Serial number Q 1 Q 2 Q 3 Q 4 Content of the questions What is a business recovery plan, and what is its purpose? When considering the purchase of ready-made software, what is the purpose of the RFI request for information, and what is the purpose of the RFP request for proposal? What should the response to the RFP include? What are the goals of information security measures? What are the risks involved in purchasing ready-made software? 21
22 The Automatic Keyword Extraction Algorithm [3/4] Example: The statistical data relevant to IMF ID Keyword Number of Length of Max TF Max Length df i occurrences keyword T1 what T2 is T3 business T4 recovery T5 play
23 The Automatic Keyword Extraction Algorithm [4/4] Example: The IMF of the first five terms IMF 4 2 log 4 1, 1 = = = IMF 2 2 log 4 1, 2 = = = IMF 8 1 1, 3 = log4 = = IMF log 4 1, 4 = + = = IMF 4 1 log 4 1, 5 = = =
24 Information Retrieval Algorithms of EACS [1/5] The questions in FAQ are represented as some Characteristic Vectors CV. The CVs are sets of keyword-weight pairs. The CV of the question Q i and customer s request Q can be represented as Q = { K,W, K,W,..., K,W,... K } CV, i 1 i, 1 2 i, 2 j i,j n,wi,n K j : j-th keyword. W ij : The IMF value of K j in question Q i. When a user issues a question Q, the question is also represented as CVQ. 24
25 Information Retrieval Algorithms of EACS [2/5] By using inner product to compare the similarity between CVQ and CVQ i n D = i Wk Wik k= 1 the most similar question Q k can be found the answer A k of Q k is then retrieved and sent to the customer. 25
26 Information Retrieval Algorithms of EACS [3/5] Example: Suppose the CVs of the questions in previous example are represented as CVQ = {K, ,K CVQ = {K 6 2, ,K 8, }, ,K 10, } CVQ 3 = {K3, ,K4, ,K8, ,K9 CVQ = {K, K,K, } 4 = 5 0 7, } 26
27 Information Retrieval Algorithms of EACS [4/5] Example: When a customer issues a question to the system Question What are the risks involved in purchasing ready-made d software? the question is also represented as a CV CV Q = { K, } 5 27
28 Information Retrieval Algorithms of ICESA 2007 International Conference on Enterprise Systems and Application g EACS [5/5] Example: For the previous example, the similarity values by y y employing the inner product method D... D = = = + + = D..... D = + = = = D = + = 28
29 Outline Abstract Introduction Relevant Works Structure t of The EACS Information Retrieval Algorithms of EACS Implementation and Evaluation Conclusions 29
30 Implementation and Evaluation [1/9] The interface for maintaining the FAQ database 30
31 Implementation and Evaluation [2/9] Several experiments have been conducted to evaluate the performance of EACS. Two FAQ databases with different languages were adopted in the experiments The Yahoo!-Kimo database contained 578 FAQ s in Chinese. The MiTAC International Corp database contained 646 FAQ s in English. Three weighting methods, IMF, TFxIDF, and the weight method used in ACSS are compared. 31
32 Implementation and Evaluation [3/9] Several experiments have been conducted to evaluate the performance of EACS. Three types of requests are used to evaluate the performance of different approaches. Case1: All of the customer requests are similar to the question part of some FAQ s. Case2: All of the customer requests are quite different to the question part of any FAQ; however, the answers of the requests exist in the FAQ database. Case3: Customer requests are randomly selected from Case1 and Case2. 32
33 Implementation and Evaluation [4/9] Experiments for finding best-fit answers from Yahoo!KIMO FAQ database with Case % Accuracy of the answe ers 80.00% 00% 70.00% 60.00% 50.00% 00% 40.00% 50% 60% 70% 80% 90% 100% ACSS IMF TFIDF Keywords used 33
34 Implementation and Evaluation [5/9] Experiments for finding best-fit answers from Yahoo!KIMO FAQ database with Case % Accuracy of the answe ers 60.00% 50.00% 00% 40.00% 30.00% 50% 60% 70% 80% 90% 100% ACSS IMF TFIDF Keywords used 34
35 Implementation and Evaluation [6/9] Experiments for finding best-fit answers from Yahoo!KIMO FAQ database with Case % Accuracy of the answer rs 65.00% 55.00% 45.00% 35.00% 50% 60% 70% 80% 90% 100% ACSS IMF TFIDF Keywords used 35
36 Implementation and Evaluation [7/9] Experiments for finding best-fit answers from Mitac FAQ database with Case % Accuracy of the answer rs 90.00% 80.00% 00% 70.00% 60.00% 50% 60% 70% 80% 90% 100% ACSS IMF TFIDF Keywords used 36
37 Implementation and Evaluation [8/9] Experiments for finding best-fit answers from Mitac FAQ database with Case % Accuracy of the answe ers 80.00% 75.00% 70.00% 00% 65.00% 60.00% 55.00% 50% 60% 70% 80% 90% 100% ACSS IMF TFIDF Keywords used 37
38 Implementation and Evaluation [9/9] Experiments for finding best-fit answers from Mitac FAQ database with Case % Ac ccuracy of the answers 85.00% 80.00% 75.00% 70.00% 65.00% 60.00% 50% 60% 70% 80% 90% 100% ACSS IMF TFIDF Keywords used 38
39 Outline Abstract Introduction Relevant Works Structure t of The EACS Information Retrieval Algorithms of EACS Implementation and Evaluation Conclusions 39
40 Conclusions ICESA 2007 International Conference on Enterprise Systems and Application EACS can automatically reply customer requests by selecting the mostly feasible answers from the FAQ database. It not only reduces the service cost, but also increases the competition advantages of enterprises. Future Works We will incorporate query expansion techniques. The relevance feedbacks from the users will also be considered to adjust the system performance. 40
41 Thanks for your attention! 41
Automatic Mining of Internet Translation Reference Knowledge Based on Multiple Search Engines
, 22-24 October, 2014, San Francisco, USA Automatic Mining of Internet Translation Reference Knowledge Based on Multiple Search Engines Baosheng Yin, Wei Wang, Ruixue Lu, Yang Yang Abstract With the increasing
More information1 o Semestre 2007/2008
Departamento de Engenharia Informática Instituto Superior Técnico 1 o Semestre 2007/2008 Outline 1 2 3 4 5 Outline 1 2 3 4 5 Exploiting Text How is text exploited? Two main directions Extraction Extraction
More informationSecure semantic based search over cloud
Volume: 2, Issue: 5, 162-167 May 2015 www.allsubjectjournal.com e-issn: 2349-4182 p-issn: 2349-5979 Impact Factor: 3.762 Sarulatha.M PG Scholar, Dept of CSE Sri Krishna College of Technology Coimbatore,
More informationLarge-Scale Data Sets Clustering Based on MapReduce and Hadoop
Journal of Computational Information Systems 7: 16 (2011) 5956-5963 Available at http://www.jofcis.com Large-Scale Data Sets Clustering Based on MapReduce and Hadoop Ping ZHOU, Jingsheng LEI, Wenjun YE
More informationData Pre-Processing in Spam Detection
IJSTE - International Journal of Science Technology & Engineering Volume 1 Issue 11 May 2015 ISSN (online): 2349-784X Data Pre-Processing in Spam Detection Anjali Sharma Dr. Manisha Manisha Dr. Rekha Jain
More informationAn Information Retrieval using weighted Index Terms in Natural Language document collections
Internet and Information Technology in Modern Organizations: Challenges & Answers 635 An Information Retrieval using weighted Index Terms in Natural Language document collections Ahmed A. A. Radwan, Minia
More informationInteractive Recovery of Requirements Traceability Links Using User Feedback and Configuration Management Logs
Interactive Recovery of Requirements Traceability Links Using User Feedback and Configuration Management Logs Ryosuke Tsuchiya 1, Hironori Washizaki 1, Yoshiaki Fukazawa 1, Keishi Oshima 2, and Ryota Mibe
More informationTF-IDF. David Kauchak cs160 Fall 2009 adapted from: http://www.stanford.edu/class/cs276/handouts/lecture6-tfidf.ppt
TF-IDF David Kauchak cs160 Fall 2009 adapted from: http://www.stanford.edu/class/cs276/handouts/lecture6-tfidf.ppt Administrative Homework 3 available soon Assignment 2 available soon Popular media article
More informationHomework 2. Page 154: Exercise 8.10. Page 145: Exercise 8.3 Page 150: Exercise 8.9
Homework 2 Page 110: Exercise 6.10; Exercise 6.12 Page 116: Exercise 6.15; Exercise 6.17 Page 121: Exercise 6.19 Page 122: Exercise 6.20; Exercise 6.23; Exercise 6.24 Page 131: Exercise 7.3; Exercise 7.5;
More informationSearch Engines. Stephen Shaw <stesh@netsoc.tcd.ie> 18th of February, 2014. Netsoc
Search Engines Stephen Shaw Netsoc 18th of February, 2014 Me M.Sc. Artificial Intelligence, University of Edinburgh Would recommend B.A. (Mod.) Computer Science, Linguistics, French,
More informationStemming Methodologies Over Individual Query Words for an Arabic Information Retrieval System
Stemming Methodologies Over Individual Query Words for an Arabic Information Retrieval System Hani Abu-Salem* and Mahmoud Al-Omari Department of Computer Science, Mu tah University, P.O. Box (7), Mu tah,
More informationA Proposed Algorithm for Spam Filtering Emails by Hash Table Approach
International Research Journal of Applied and Basic Sciences 2013 Available online at www.irjabs.com ISSN 2251-838X / Vol, 4 (9): 2436-2441 Science Explorer Publications A Proposed Algorithm for Spam Filtering
More informationDevelopment of Secure Multikeyword Retrieval Methodology for Encrypted Cloud Data
Development of Secure Multikeyword Retrieval Methodology for Encrypted Cloud Data Deepak I M 1, K.R. Shylaja 2, Ravinandan M E 3 1 M.Tech IV Sem, Dept. of CSE, Dr. Ambedkar Institute of Technology, Bangalore,
More informationClustering Technique in Data Mining for Text Documents
Clustering Technique in Data Mining for Text Documents Ms.J.Sathya Priya Assistant Professor Dept Of Information Technology. Velammal Engineering College. Chennai. Ms.S.Priyadharshini Assistant Professor
More informationBisecting K-Means for Clustering Web Log data
Bisecting K-Means for Clustering Web Log data Ruchika R. Patil Department of Computer Technology YCCE Nagpur, India Amreen Khan Department of Computer Technology YCCE Nagpur, India ABSTRACT Web usage mining
More informationUsing Wikipedia to Translate OOV Terms on MLIR
Using to Translate OOV Terms on MLIR Chen-Yu Su, Tien-Chien Lin and Shih-Hung Wu* Department of Computer Science and Information Engineering Chaoyang University of Technology Taichung County 41349, TAIWAN
More informationEnhancing the relativity between Content, Title and Meta Tags Based on Term Frequency in Lexical and Semantic Aspects
Enhancing the relativity between Content, Title and Meta Tags Based on Term Frequency in Lexical and Semantic Aspects Mohammad Farahmand, Abu Bakar MD Sultan, Masrah Azrifah Azmi Murad, Fatimah Sidi me@shahroozfarahmand.com
More informationIndex Terms Domain name, Firewall, Packet, Phishing, URL.
BDD for Implementation of Packet Filter Firewall and Detecting Phishing Websites Naresh Shende Vidyalankar Institute of Technology Prof. S. K. Shinde Lokmanya Tilak College of Engineering Abstract Packet
More informationA Personalized Spam Filtering Approach Utilizing Two Separately Trained Filters
2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology A Personalized Spam Filtering Approach Utilizing Two Separately Trained Filters Wei-Lun Teng, Wei-Chung Teng
More informationAmerican Journal of Engineering Research (AJER) 2013 American Journal of Engineering Research (AJER) e-issn: 2320-0847 p-issn : 2320-0936 Volume-2, Issue-4, pp-39-43 www.ajer.us Research Paper Open Access
More informationA FUZZY BASED APPROACH TO TEXT MINING AND DOCUMENT CLUSTERING
A FUZZY BASED APPROACH TO TEXT MINING AND DOCUMENT CLUSTERING Sumit Goswami 1 and Mayank Singh Shishodia 2 1 Indian Institute of Technology-Kharagpur, Kharagpur, India sumit_13@yahoo.com 2 School of Computer
More informationDissecting the Learning Behaviors in Hacker Forums
Dissecting the Learning Behaviors in Hacker Forums Alex Tsang Xiong Zhang Wei Thoo Yue Department of Information Systems, City University of Hong Kong, Hong Kong inuki.zx@gmail.com, xionzhang3@student.cityu.edu.hk,
More informationSemantic Concept Based Retrieval of Software Bug Report with Feedback
Semantic Concept Based Retrieval of Software Bug Report with Feedback Tao Zhang, Byungjeong Lee, Hanjoon Kim, Jaeho Lee, Sooyong Kang, and Ilhoon Shin Abstract Mining software bugs provides a way to develop
More informationFUZZY CLUSTERING ANALYSIS OF DATA MINING: APPLICATION TO AN ACCIDENT MINING SYSTEM
International Journal of Innovative Computing, Information and Control ICIC International c 0 ISSN 34-48 Volume 8, Number 8, August 0 pp. 4 FUZZY CLUSTERING ANALYSIS OF DATA MINING: APPLICATION TO AN ACCIDENT
More informationIntelligent Learning Content Management System based on SCORM Standard. Dr. Shian-Shyong Tseng
Intelligent Learning Content Management System based on SCORM Standard Dr. Shian-Shyong Tseng Department of Computer Science, National Chiao Tung University (NCTU), Taiwan (R.O.C) 2008 Researching Topics
More informationApplication of Automatic Variable Password Technique in Das s Remote System Authentication Scheme Using Smart Card
Application of Automatic Variable Password Technique in Das s Remote System Authentication Scheme Using Smart Card C. Koner, Member, IACSIT, C. T. Bhunia, Sr. Member, IEEE and U. Maulik, Sr. Member, IEEE
More informationMedical Information-Retrieval Systems. Dong Peng Medical Informatics Group
Medical Information-Retrieval Systems Dong Peng Medical Informatics Group Outline Evolution of medical Information-Retrieval (IR). The information retrieval process. The trend of medical information retrieval
More informationCloud Storage-based Intelligent Document Archiving for the Management of Big Data
Cloud Storage-based Intelligent Document Archiving for the Management of Big Data Keedong Yoo Dept. of Management Information Systems Dankook University Cheonan, Republic of Korea Abstract : The cloud
More informationIncorporating Window-Based Passage-Level Evidence in Document Retrieval
Incorporating -Based Passage-Level Evidence in Document Retrieval Wensi Xi, Richard Xu-Rong, Christopher S.G. Khoo Center for Advanced Information Systems School of Applied Science Nanyang Technological
More informationMining Text Data: An Introduction
Bölüm 10. Metin ve WEB Madenciliği http://ceng.gazi.edu.tr/~ozdemir Mining Text Data: An Introduction Data Mining / Knowledge Discovery Structured Data Multimedia Free Text Hypertext HomeLoan ( Frank Rizzo
More informationCO-OCCURRENCE EXTRACTOR
Page 1 of 7 CO-OCCURRENCE EXTRACTOR Sede opertiva: Piazza Vermicelli 87036 Rende (CS), Italy Page 2 of 7 TABLE OF CONTENTS 1 APP DOCUMENTATION... 3 1.1 HOW IT WORKS 3 1.2 Input data 4 1.3 Output data 4
More informationOptimization of Search Results with Duplicate Page Elimination using Usage Data A. K. Sharma 1, Neelam Duhan 2 1, 2
Optimization of Search Results with Duplicate Page Elimination using Usage Data A. K. Sharma 1, Neelam Duhan 2 1, 2 Department of Computer Engineering, YMCA University of Science & Technology, Faridabad,
More informationWikipedia and Web document based Query Translation and Expansion for Cross-language IR
Wikipedia and Web document based Query Translation and Expansion for Cross-language IR Ling-Xiang Tang 1, Andrew Trotman 2, Shlomo Geva 1, Yue Xu 1 1Faculty of Science and Technology, Queensland University
More informationResearch and Implementation of Agricultural Science and Technology Consulting System Based on Ajax and Improved VSM
Research and Implementation of Agricultural Science and Technology Consulting System Based on Ajax and Improved VSM Sufen SUN, Junfeng ZHANG, Changshou LUO*, Qingfeng WEI Institute of Information on Science
More informationCSCI 5417 Information Retrieval Systems Jim Martin!
CSCI 5417 Information Retrieval Systems Jim Martin! Lecture 9 9/20/2011 Today 9/20 Where we are MapReduce/Hadoop Probabilistic IR Language models LM for ad hoc retrieval 1 Where we are... Basics of ad
More informationENHANCED WEB IMAGE RE-RANKING USING SEMANTIC SIGNATURES
International Journal of Computer Engineering & Technology (IJCET) Volume 7, Issue 2, March-April 2016, pp. 24 29, Article ID: IJCET_07_02_003 Available online at http://www.iaeme.com/ijcet/issues.asp?jtype=ijcet&vtype=7&itype=2
More informationDiagnosis Code Assignment Support Using Random Indexing of Patient Records A Qualitative Feasibility Study
Diagnosis Code Assignment Support Using Random Indexing of Patient Records A Qualitative Feasibility Study Aron Henriksson 1, Martin Hassel 1, and Maria Kvist 1,2 1 Department of Computer and System Sciences
More informationA Framework for Personalized Healthcare Service Recommendation
A Framework for Personalized Healthcare Service Recommendation Choon-oh Lee, Minkyu Lee, Dongsoo Han School of Engineering Information and Communications University (ICU) Daejeon, Korea {lcol, niklaus,
More informationWadala, Mumbai-037, India Wadala, Mumbai-037, India Wadala, Mumbai-037, India
Volume 3, Issue 12, December 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Interactive
More informationIdentifying At-Risk Students Using Machine Learning Techniques: A Case Study with IS 100
Identifying At-Risk Students Using Machine Learning Techniques: A Case Study with IS 100 Erkan Er Abstract In this paper, a model for predicting students performance levels is proposed which employs three
More informationPDF hosted at the Radboud Repository of the Radboud University Nijmegen
PDF hosted at the Radboud Repository of the Radboud University Nijmegen The following full text is an author's version which may differ from the publisher's version. For additional information about this
More informationOptimization of Internet Search based on Noun Phrases and Clustering Techniques
Optimization of Internet Search based on Noun Phrases and Clustering Techniques R. Subhashini Research Scholar, Sathyabama University, Chennai-119, India V. Jawahar Senthil Kumar Assistant Professor, Anna
More informationAnti-Spam Filter Based on Naïve Bayes, SVM, and KNN model
AI TERM PROJECT GROUP 14 1 Anti-Spam Filter Based on,, and model Yun-Nung Chen, Che-An Lu, Chao-Yu Huang Abstract spam email filters are a well-known and powerful type of filters. We construct different
More informationBusiness Challenges and Research Directions of Management Analytics in the Big Data Era
Business Challenges and Research Directions of Management Analytics in the Big Data Era Abstract Big data analytics have been embraced as a disruptive technology that will reshape business intelligence,
More informationSEARCH ENGINE WITH PARALLEL PROCESSING AND INCREMENTAL K-MEANS FOR FAST SEARCH AND RETRIEVAL
SEARCH ENGINE WITH PARALLEL PROCESSING AND INCREMENTAL K-MEANS FOR FAST SEARCH AND RETRIEVAL Krishna Kiran Kattamuri 1 and Rupa Chiramdasu 2 Department of Computer Science Engineering, VVIT, Guntur, India
More informationLatent Semantic Indexing with Selective Query Expansion Abstract Introduction
Latent Semantic Indexing with Selective Query Expansion Andy Garron April Kontostathis Department of Mathematics and Computer Science Ursinus College Collegeville PA 19426 Abstract This article describes
More informationAnalysis of Tweets for Prediction of Indian Stock Markets
Analysis of Tweets for Prediction of Indian Stock Markets Phillip Tichaona Sumbureru Department of Computer Science and Engineering, JNTU College of Engineering Hyderabad, Kukatpally, Hyderabad-500 085,
More informationEng. Mohammed Abdualal
Islamic University of Gaza Faculty of Engineering Computer Engineering Department Information Storage and Retrieval (ECOM 5124) IR HW 5+6 Scoring, term weighting and the vector space model Exercise 6.2
More informationSocial Media Monitoring by Using Data Mining. Fuat Basık
Social Media Monitoring by Using Data Mining Fuat Basık Presentation Plan Introduc0on Mo0va0on Stream Processing Data Set Turkish Language Pre Processing and Stemming Term Frequency and Inverse Document
More informationInverted Indexes: Trading Precision for Efficiency
Inverted Indexes: Trading Precision for Efficiency Yufei Tao KAIST April 1, 2013 After compression, an inverted index is often small enough to fit in memory. This benefits query processing because it avoids
More informationTREC 2003 Question Answering Track at CAS-ICT
TREC 2003 Question Answering Track at CAS-ICT Yi Chang, Hongbo Xu, Shuo Bai Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China changyi@software.ict.ac.cn http://www.ict.ac.cn/
More informationContinuous Fastest Path Planning in Road Networks by Mining Real-Time Traffic Event Information
Continuous Fastest Path Planning in Road Networks by Mining Real-Time Traffic Event Information Eric Hsueh-Chan Lu Chi-Wei Huang Vincent S. Tseng Institute of Computer Science and Information Engineering
More informationEfficient Query Optimizing System for Searching Using Data Mining Technique
Vol.1, Issue.2, pp-347-351 ISSN: 2249-6645 Efficient Query Optimizing System for Searching Using Data Mining Technique Velmurugan.N Vijayaraj.A Assistant Professor, Department of MCA, Associate Professor,
More informationCustomized Efficient Collection of Big Data for Advertising Services
, pp.36-41 http://dx.doi.org/10.14257/astl.2015.94.09 Customized Efficient Collection of Big Data for Advertising Services Jun-Soo Yun 1, Jin-Tae Park 1, Hyun-Seo Hwang 1, Il-Young Moon 1 1 1600 Chungjeol-ro,
More informationResearch on Sentiment Classification of Chinese Micro Blog Based on
Research on Sentiment Classification of Chinese Micro Blog Based on Machine Learning School of Economics and Management, Shenyang Ligong University, Shenyang, 110159, China E-mail: 8e8@163.com Abstract
More informationFinding Advertising Keywords on Web Pages. Contextual Ads 101
Finding Advertising Keywords on Web Pages Scott Wen-tau Yih Joshua Goodman Microsoft Research Vitor R. Carvalho Carnegie Mellon University Contextual Ads 101 Publisher s website Digital Camera Review The
More informationRevenue Optimization with Relevance Constraint in Sponsored Search
Revenue Optimization with Relevance Constraint in Sponsored Search Yunzhang Zhu Gang Wang Junli Yang Dakan Wang Jun Yan Zheng Chen Microsoft Resarch Asia, Beijing, China Department of Fundamental Science,
More informationInformation Technology Support System of Supply Chain Management
Proceedings of the 11th WSEAS International Conference on APPLIED MATHEMATICS, Dallas, Texas, USA, March 22-24, 2007 138 Information Technology Support System of Supply Chain Management HUA JIANG,JING
More informationCredit Card Fraud Detection Using Self Organised Map
International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 13 (2014), pp. 1343-1348 International Research Publications House http://www. irphouse.com Credit Card Fraud
More informationIntroduction to Information Retrieval http://informationretrieval.org
Introduction to Information Retrieval http://informationretrieval.org IIR 6&7: Vector Space Model Hinrich Schütze Institute for Natural Language Processing, University of Stuttgart 2011-08-29 Schütze:
More informationINTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET)
INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 6367(Print), ISSN 0976 6367(Print) ISSN 0976 6375(Online)
More informationRanked Search over Encrypted Cloud Data using Multiple Keywords
Ranked Search over Encrypted Cloud Data using Multiple Keywords [1] Nita Elizabeth Samuel, [2] Revathi B. R, [3] Sangeetha.M, [4] SreelekshmySelvin, [5] Dileep.V.K [1][2][3][4] LBS Institute of Technology
More informationComparing IPL2 and Yahoo! Answers: A Case Study of Digital Reference and Community Based Question Answering
Comparing and : A Case Study of Digital Reference and Community Based Answering Dan Wu 1 and Daqing He 1 School of Information Management, Wuhan University School of Information Sciences, University of
More informationDistributed Computing and Big Data: Hadoop and MapReduce
Distributed Computing and Big Data: Hadoop and MapReduce Bill Keenan, Director Terry Heinze, Architect Thomson Reuters Research & Development Agenda R&D Overview Hadoop and MapReduce Overview Use Case:
More informationRecommendation Tool Using Collaborative Filtering
Recommendation Tool Using Collaborative Filtering Aditya Mandhare 1, Soniya Nemade 2, M.Kiruthika 3 Student, Computer Engineering Department, FCRIT, Vashi, India 1 Student, Computer Engineering Department,
More informationSimulation and Analysis of Parameter Identification Techniques for Induction Motor Drive
International Journal of Electronic and Electrical Engineering. ISSN 0974-2174 Volume 7, Number 10 (2014), pp. 1027-1035 International Research Publication House http://www.irphouse.com Simulation and
More informationUse of group discussion and learning portfolio to build knowledge for managing web group learning
Use of group discussion and learning portfolio to build knowledge for managing web group learning Gwo-Dong Chen,Kuo-Liang Ou, Chin-Yeh Wang Department of Computer Science and Information Engineering National
More informationDYNAMIC QUERY FORMS WITH NoSQL
IMPACT: International Journal of Research in Engineering & Technology (IMPACT: IJRET) ISSN(E): 2321-8843; ISSN(P): 2347-4599 Vol. 2, Issue 7, Jul 2014, 157-162 Impact Journals DYNAMIC QUERY FORMS WITH
More informationResearch on Trust Management Strategies in Cloud Computing Environment
Journal of Computational Information Systems 8: 4 (2012) 1757 1763 Available at http://www.jofcis.com Research on Trust Management Strategies in Cloud Computing Environment Wenjuan LI 1,2,, Lingdi PING
More informationA Visualization System and Monitoring Tool to Measure Concurrency in MPICH Programs
A Visualization System and Monitoring Tool to Measure Concurrency in MPICH Programs Michael Scherger Department of Computer Science Texas Christian University Email: m.scherger@tcu.edu Zakir Hussain Syed
More informationAn ontology-based approach for semantic ranking of the web search engines results
An ontology-based approach for semantic ranking of the web search engines results Editor(s): Name Surname, University, Country Solicited review(s): Name Surname, University, Country Open review(s): Name
More informationAn Improved VSM-based Post-Requirements Traceability Recovery Approach Using Context Analysis
An Improved VSM-based Post-Requirements Traceability Recovery Approach Using Context Analysis Jiale Zhou, Yue Lu, Kristina Lundqvist Mälardalen Real-Time Research Centre, Mälardalen University, Västerås,
More informationIDENTIFIC ATION OF SOFTWARE EROSION USING LOGISTIC REGRESSION
http:// IDENTIFIC ATION OF SOFTWARE EROSION USING LOGISTIC REGRESSION Harinder Kaur 1, Raveen Bajwa 2 1 PG Student., CSE., Baba Banda Singh Bahadur Engg. College, Fatehgarh Sahib, (India) 2 Asstt. Prof.,
More informationPerformance Evaluation On Human Resource Management Of China S Commercial Banks Based On Improved Bp Neural Networks
Performance Evaluation On Human Resource Management Of China S *1 Honglei Zhang, 2 Wenshan Yuan, 1 Hua Jiang 1 School of Economics and Management, Hebei University of Engineering, Handan 056038, P. R.
More informationIDENTIFYING CONSTRUCTION PROBLEM-SOLVING PATTERNS OF LESSONS LEARNED WITH TEXT MINING METHOD
IDENTIFYING CONSTRUCTION PROBLEM-SOLVING PATTERNS OF LESSONS LEARNED WITH TEXT MINING METHOD Pei-lun Chang 1 *, Wen-der Yu 2, and Shun-min Lee 3 1 CECI Engineering Consultants, Inc., Taiwan, Taipei/ Chung
More informationLinear programming approach for online advertising
Linear programming approach for online advertising Igor Trajkovski Faculty of Computer Science and Engineering, Ss. Cyril and Methodius University in Skopje, Rugjer Boshkovikj 16, P.O. Box 393, 1000 Skopje,
More informationPerformance Workload Design
Performance Workload Design The goal of this paper is to show the basic principles involved in designing a workload for performance and scalability testing. We will understand how to achieve these principles
More informationChapter 7. Feature Selection. 7.1 Introduction
Chapter 7 Feature Selection Feature selection is not used in the system classification experiments, which will be discussed in Chapter 8 and 9. However, as an autonomous system, OMEGA includes feature
More informationWhy is Internal Audit so Hard?
Why is Internal Audit so Hard? 2 2014 Why is Internal Audit so Hard? 3 2014 Why is Internal Audit so Hard? Waste Abuse Fraud 4 2014 Waves of Change 1 st Wave Personal Computers Electronic Spreadsheets
More informationW. Heath Rushing Adsurgo LLC. Harness the Power of Text Analytics: Unstructured Data Analysis for Healthcare. Session H-1 JTCC: October 23, 2015
W. Heath Rushing Adsurgo LLC Harness the Power of Text Analytics: Unstructured Data Analysis for Healthcare Session H-1 JTCC: October 23, 2015 Outline Demonstration: Recent article on cnn.com Introduction
More informationCryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Karagpur
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Karagpur Lecture No. #06 Cryptanalysis of Classical Ciphers (Refer
More informationE- Customer Care Service System for Benin Electricity Distribution Company
E- Customer Care Service System for Benin Electricity Distribution Company Olutayo Boyinbode Department of Computer Science, Federal University of Technology, Akure Olufemi Akinyede Department of Computer
More informationAvailable online at www.sciencedirect.com Available online at www.sciencedirect.com. Advanced in Control Engineering and Information Science
Available online at www.sciencedirect.com Available online at www.sciencedirect.com Procedia Procedia Engineering Engineering 00 (2011) 15 (2011) 000 000 1822 1826 Procedia Engineering www.elsevier.com/locate/procedia
More informationInternational Journal of Research in Advent Technology Available Online at: http://www.ijrat.org
IMPROVING PEFORMANCE OF BAYESIAN SPAM FILTER Firozbhai Ahamadbhai Sherasiya 1, Prof. Upen Nathwani 2 1 2 Computer Engineering Department 1 2 Noble Group of Institutions 1 firozsherasiya@gmail.com ABSTARCT:
More informationComparison of Standard and Zipf-Based Document Retrieval Heuristics
Comparison of Standard and Zipf-Based Document Retrieval Heuristics Benjamin Hoffmann Universität Stuttgart, Institut für Formale Methoden der Informatik Universitätsstr. 38, D-70569 Stuttgart, Germany
More informationDomain Classification of Technical Terms Using the Web
Systems and Computers in Japan, Vol. 38, No. 14, 2007 Translated from Denshi Joho Tsushin Gakkai Ronbunshi, Vol. J89-D, No. 11, November 2006, pp. 2470 2482 Domain Classification of Technical Terms Using
More informationEstablishment of Fire Control Management System in Building Information Modeling Environment
Establishment of Fire Control Management System in Building Information Modeling Environment Yan-Chyuan Shiau 1, Chong-Teng Chang 2 Department of Construction Management, Chung Hua University, 707, Wu-Fu
More informationApproaches of Using a Word-Image Ontology and an Annotated Image Corpus as Intermedia for Cross-Language Image Retrieval
Approaches of Using a Word-Image Ontology and an Annotated Image Corpus as Intermedia for Cross-Language Image Retrieval Yih-Chen Chang and Hsin-Hsi Chen Department of Computer Science and Information
More informationA linear algebraic method for pricing temporary life annuities
A linear algebraic method for pricing temporary life annuities P. Date (joint work with R. Mamon, L. Jalen and I.C. Wang) Department of Mathematical Sciences, Brunel University, London Outline Introduction
More informationLink Processing for Fuzzy Web Pages Clustering and Classification
European Journal of Scientific Research ISSN 1450-216X Vol.27 No.4 (2009), pp.620-627 EuroJournals Publishing, Inc. 2009 http://www.eurojournals.com/ejsr.htm Link Processing for Fuzzy Web Pages Clustering
More informationAdaptive Demand-Forecasting Approach based on Principal Components Time-series an application of data-mining technique to detection of market movement
Adaptive Demand-Forecasting Approach based on Principal Components Time-series an application of data-mining technique to detection of market movement Toshio Sugihara Abstract In this study, an adaptive
More informationRecognition. Sanja Fidler CSC420: Intro to Image Understanding 1 / 28
Recognition Topics that we will try to cover: Indexing for fast retrieval (we still owe this one) History of recognition techniques Object classification Bag-of-words Spatial pyramids Neural Networks Object
More informationAnalysis of Software Project Reports for Defect Prediction Using KNN
, July 2-4, 2014, London, U.K. Analysis of Software Project Reports for Defect Prediction Using KNN Rajni Jindal, Ruchika Malhotra and Abha Jain Abstract Defect severity assessment is highly essential
More informationFault Analysis in Software with the Data Interaction of Classes
, pp.189-196 http://dx.doi.org/10.14257/ijsia.2015.9.9.17 Fault Analysis in Software with the Data Interaction of Classes Yan Xiaobo 1 and Wang Yichen 2 1 Science & Technology on Reliability & Environmental
More informationCINDOR Conceptual Interlingua Document Retrieval: TREC-8 Evaluation.
CINDOR Conceptual Interlingua Document Retrieval: TREC-8 Evaluation. Miguel Ruiz, Anne Diekema, Páraic Sheridan MNIS-TextWise Labs Dey Centennial Plaza 401 South Salina Street Syracuse, NY 13202 Abstract:
More informationSentiment analysis on tweets in a financial domain
Sentiment analysis on tweets in a financial domain Jasmina Smailović 1,2, Miha Grčar 1, Martin Žnidaršič 1 1 Dept of Knowledge Technologies, Jožef Stefan Institute, Ljubljana, Slovenia 2 Jožef Stefan International
More informationOpen Access A Facial Expression Recognition Algorithm Based on Local Binary Pattern and Empirical Mode Decomposition
Send Orders for Reprints to reprints@benthamscience.ae The Open Electrical & Electronic Engineering Journal, 2014, 8, 599-604 599 Open Access A Facial Expression Recognition Algorithm Based on Local Binary
More informationFramework model on enterprise information system based on Internet of things
International Journal of Intelligent Information Systems 2014; 3(6): 55-59 Published online December 22, 2014 (http://www.sciencepublishinggroup.com/j/ijiis) doi: 10.11648/j.ijiis.20140306.11 ISSN: 2328-7675
More informationTopic Matching Based Change Impact Analysis from Feature on User Interface of Mobile Apps
Topic Matching Based Change Impact Analysis from Feature on User Interface of Mobile Apps Qiwen Zou 1, Xiangping Chen 2,, Yuan Huang 1,3 1 School of Information Science and Technology, Sun Yat-sen University,
More informationConsiderations of Modeling in Keyword Bidding (Google:AdWords) Xiaoming Huo Georgia Institute of Technology August 8, 2012
Considerations of Modeling in Keyword Bidding (Google:AdWords) Xiaoming Huo Georgia Institute of Technology August 8, 2012 8/8/2012 1 Outline I. Problem Description II. Game theoretical aspect of the bidding
More information