Development of an Enhanced Web-based Automatic Customer Service System

Size: px
Start display at page:

Download "Development of an Enhanced Web-based Automatic Customer Service System"

Transcription

1 Development of an Enhanced Web-based Automatic Customer Service System Ji-Wei Wu, Chih-Chang Chang Wei and Judy C.R. Tseng Department of Computer Science and Information Engineering Chung Hua University Reporter: Judy C.R. Tseng

2 Outline Introduction Relevant Works Structure of The EACS Information Retrieval Algorithms of EACS Implementation and Evaluation Conclusions 2

3 Introduction [1/3] [/] ICESA 2007 International Conference on Enterprise Systems and Application Most existing web-based customer services heavily rely on manpower. It not only increases the service cost, but also delays the time for responding the service requests. In recent years, automatic customer service system has been discussed and presented. 3

4 Introduction [2/3] [/] ICESA 2007 International Conference on Enterprise Systems and Application Some problems still exist The keywords have to be set by a certain personnel. The knowledge and experience of the personnel will absolutely influence on the quality of the keyword set as well as the quality of the answers. The knowledge and experience of the personnel is not able to be efficiently kept in the system. The quality and the accuracy of the answers still have potential to be improved. 4

5 Introduction [3/3] [/] ICESA 2007 International Conference on Enterprise Systems and Application To cope with these problems, an Enhanced Automatic Customer Service system EACS is developed d in this paper. A new keyword weighting g method, called Importance Factor IMF, is also proposed. IMF is applied to develop an automatic keyword extraction system to achieve fully automation. IMF is also applied to an indexing method for FAQ to improve the accuracy of the automatic customer system. 5

6 Outline Introduction Relevant Works Structure of The EACS Information Retrieval Algorithms of EACS Implementation and Evaluation Conclusions 6

7 Relevant Works [1/2] [/] ICESA 2007 International Conference on Enterprise Systems and Application Researchers have proposed several development of intelligent customer service systems in recent years. Hoch 1994 Cohen 1996 Li and Tseng 2001 Tseng and Hwang 2007: ACSS Development of an Automatic Customer Service System on the Internet, Electronic Commerce Research and Applications. Vol. 6, No. 1, pp SSCI 7

8 Relevant Works [2/2] [/] ICESA 2007 International Conference on Enterprise Systems and Application Although the previously proposed automatic customer service systems can automatically handle customer requests. the keywords have to be set manually the accuracy of the answers still have potential to be improved 8

9 Outline Introduction Relevant Works Structure of The EACS Information Retrieval Algorithms of EACS Implementation and Evaluation Conclusions 9

10 Structure of The Enhanced Automatic Customer Service System EACS [1/7] 10

11 Structure of The Enhanced Automatic Customer Service System EACS [2/7] The Chinese Knowledge and Information Processing Database is a database of Chinese terms, containing general terms, proper p nouns and idioms etc. 11

12 Structure of The Enhanced Automatic Customer Service System EACS [3/7] The FAQ Database is a database of frequently asked questions. 12

13 Structure of The Enhanced Automatic Customer Service System EACS [4/7] The Automatic Keyword Extraction Module, uses the CKIP database to extracts the domainspecific keywords contained in FAQ to the Keyword Database. 13

14 Structure of The Enhanced Automatic Customer Service System EACS [5/7] For each FAQ, a Characteristic Vector CV is used dto represent tthe characteristics ti of fthe question, which is extracted by the Characteristic Extraction Module and maintained in the Characteristic Database. 14

15 Structure of The Enhanced Automatic Customer Service System EACS [6/7] Once a question is submitted by the customer, the Question Answering Module will search the FAQ Database to find the best-fit answer and sent it to the customer for reference. 15

16 Structure of The Enhanced Automatic Customer Service System EACS [7/7] The satisfaction analysis module will collect the user-feedbacks and record them in the Userfeedback Database. 16

17 Outline Abstract Introduction Relevant Works Structure t of The EACS Information Retrieval Algorithms of EACS Implementation and Evaluation Conclusions 17

18 The Importance Factor IMF [1/2] IMF is a novel modified d TF IDF scheme TF IDF term frequency inverse document frequency A well-known scheme for representing term weight. It is a statistical measure for evaluating the importance of a term to the corpus it contained. From experience, long keywords tend to be more important than short keywords Eg. Database v.s. Data However, the keyword length is not considered d in the original TFxIDF formula 18

19 The Importance Factor IMF [2/2] IMF Importance Factor L n j TFi, j IMF, = , = log / i j IDFj IDFj N C L i, max TF i,max i= 1 i, j IMF i,j : The weight of term j in the i-th question Q i in the FAQ database. L j : The length of the j-th term. L i,max : The maximum length of terms in Q i. TF i,j : The number of occurrences for term j in Q i. TF i,max : The maximum number of occurrences for the terms in Q i. N : The number of FAQ. C i,j : Equal to 1 if Q i contains term j; Equal to 0, otherwise. 19

20 The Automatic Keyword Extraction Algorithm [1/4] Based on the IMF formula Retrieve all the terms contained in each questions Q i in FAQ database by using the CKIP database. Calculate IMF ij i,j for each term T i contained in Q i. Sort IMF i,j descendantly and add the terms with the top P percent of the IMF s to the keyword database. 20

21 The Automatic Keyword Extraction Algorithm [2/4] Example: Assume that there are four FAQ s in the database. Serial number Q 1 Q 2 Q 3 Q 4 Content of the questions What is a business recovery plan, and what is its purpose? When considering the purchase of ready-made software, what is the purpose of the RFI request for information, and what is the purpose of the RFP request for proposal? What should the response to the RFP include? What are the goals of information security measures? What are the risks involved in purchasing ready-made software? 21

22 The Automatic Keyword Extraction Algorithm [3/4] Example: The statistical data relevant to IMF ID Keyword Number of Length of Max TF Max Length df i occurrences keyword T1 what T2 is T3 business T4 recovery T5 play

23 The Automatic Keyword Extraction Algorithm [4/4] Example: The IMF of the first five terms IMF 4 2 log 4 1, 1 = = = IMF 2 2 log 4 1, 2 = = = IMF 8 1 1, 3 = log4 = = IMF log 4 1, 4 = + = = IMF 4 1 log 4 1, 5 = = =

24 Information Retrieval Algorithms of EACS [1/5] The questions in FAQ are represented as some Characteristic Vectors CV. The CVs are sets of keyword-weight pairs. The CV of the question Q i and customer s request Q can be represented as Q = { K,W, K,W,..., K,W,... K } CV, i 1 i, 1 2 i, 2 j i,j n,wi,n K j : j-th keyword. W ij : The IMF value of K j in question Q i. When a user issues a question Q, the question is also represented as CVQ. 24

25 Information Retrieval Algorithms of EACS [2/5] By using inner product to compare the similarity between CVQ and CVQ i n D = i Wk Wik k= 1 the most similar question Q k can be found the answer A k of Q k is then retrieved and sent to the customer. 25

26 Information Retrieval Algorithms of EACS [3/5] Example: Suppose the CVs of the questions in previous example are represented as CVQ = {K, ,K CVQ = {K 6 2, ,K 8, }, ,K 10, } CVQ 3 = {K3, ,K4, ,K8, ,K9 CVQ = {K, K,K, } 4 = 5 0 7, } 26

27 Information Retrieval Algorithms of EACS [4/5] Example: When a customer issues a question to the system Question What are the risks involved in purchasing ready-made d software? the question is also represented as a CV CV Q = { K, } 5 27

28 Information Retrieval Algorithms of ICESA 2007 International Conference on Enterprise Systems and Application g EACS [5/5] Example: For the previous example, the similarity values by y y employing the inner product method D... D = = = + + = D..... D = + = = = D = + = 28

29 Outline Abstract Introduction Relevant Works Structure t of The EACS Information Retrieval Algorithms of EACS Implementation and Evaluation Conclusions 29

30 Implementation and Evaluation [1/9] The interface for maintaining the FAQ database 30

31 Implementation and Evaluation [2/9] Several experiments have been conducted to evaluate the performance of EACS. Two FAQ databases with different languages were adopted in the experiments The Yahoo!-Kimo database contained 578 FAQ s in Chinese. The MiTAC International Corp database contained 646 FAQ s in English. Three weighting methods, IMF, TFxIDF, and the weight method used in ACSS are compared. 31

32 Implementation and Evaluation [3/9] Several experiments have been conducted to evaluate the performance of EACS. Three types of requests are used to evaluate the performance of different approaches. Case1: All of the customer requests are similar to the question part of some FAQ s. Case2: All of the customer requests are quite different to the question part of any FAQ; however, the answers of the requests exist in the FAQ database. Case3: Customer requests are randomly selected from Case1 and Case2. 32

33 Implementation and Evaluation [4/9] Experiments for finding best-fit answers from Yahoo!KIMO FAQ database with Case % Accuracy of the answe ers 80.00% 00% 70.00% 60.00% 50.00% 00% 40.00% 50% 60% 70% 80% 90% 100% ACSS IMF TFIDF Keywords used 33

34 Implementation and Evaluation [5/9] Experiments for finding best-fit answers from Yahoo!KIMO FAQ database with Case % Accuracy of the answe ers 60.00% 50.00% 00% 40.00% 30.00% 50% 60% 70% 80% 90% 100% ACSS IMF TFIDF Keywords used 34

35 Implementation and Evaluation [6/9] Experiments for finding best-fit answers from Yahoo!KIMO FAQ database with Case % Accuracy of the answer rs 65.00% 55.00% 45.00% 35.00% 50% 60% 70% 80% 90% 100% ACSS IMF TFIDF Keywords used 35

36 Implementation and Evaluation [7/9] Experiments for finding best-fit answers from Mitac FAQ database with Case % Accuracy of the answer rs 90.00% 80.00% 00% 70.00% 60.00% 50% 60% 70% 80% 90% 100% ACSS IMF TFIDF Keywords used 36

37 Implementation and Evaluation [8/9] Experiments for finding best-fit answers from Mitac FAQ database with Case % Accuracy of the answe ers 80.00% 75.00% 70.00% 00% 65.00% 60.00% 55.00% 50% 60% 70% 80% 90% 100% ACSS IMF TFIDF Keywords used 37

38 Implementation and Evaluation [9/9] Experiments for finding best-fit answers from Mitac FAQ database with Case % Ac ccuracy of the answers 85.00% 80.00% 75.00% 70.00% 65.00% 60.00% 50% 60% 70% 80% 90% 100% ACSS IMF TFIDF Keywords used 38

39 Outline Abstract Introduction Relevant Works Structure t of The EACS Information Retrieval Algorithms of EACS Implementation and Evaluation Conclusions 39

40 Conclusions ICESA 2007 International Conference on Enterprise Systems and Application EACS can automatically reply customer requests by selecting the mostly feasible answers from the FAQ database. It not only reduces the service cost, but also increases the competition advantages of enterprises. Future Works We will incorporate query expansion techniques. The relevance feedbacks from the users will also be considered to adjust the system performance. 40

41 Thanks for your attention! 41

Automatic Mining of Internet Translation Reference Knowledge Based on Multiple Search Engines

Automatic Mining of Internet Translation Reference Knowledge Based on Multiple Search Engines , 22-24 October, 2014, San Francisco, USA Automatic Mining of Internet Translation Reference Knowledge Based on Multiple Search Engines Baosheng Yin, Wei Wang, Ruixue Lu, Yang Yang Abstract With the increasing

More information

1 o Semestre 2007/2008

1 o Semestre 2007/2008 Departamento de Engenharia Informática Instituto Superior Técnico 1 o Semestre 2007/2008 Outline 1 2 3 4 5 Outline 1 2 3 4 5 Exploiting Text How is text exploited? Two main directions Extraction Extraction

More information

Secure semantic based search over cloud

Secure semantic based search over cloud Volume: 2, Issue: 5, 162-167 May 2015 www.allsubjectjournal.com e-issn: 2349-4182 p-issn: 2349-5979 Impact Factor: 3.762 Sarulatha.M PG Scholar, Dept of CSE Sri Krishna College of Technology Coimbatore,

More information

Large-Scale Data Sets Clustering Based on MapReduce and Hadoop

Large-Scale Data Sets Clustering Based on MapReduce and Hadoop Journal of Computational Information Systems 7: 16 (2011) 5956-5963 Available at http://www.jofcis.com Large-Scale Data Sets Clustering Based on MapReduce and Hadoop Ping ZHOU, Jingsheng LEI, Wenjun YE

More information

Data Pre-Processing in Spam Detection

Data Pre-Processing in Spam Detection IJSTE - International Journal of Science Technology & Engineering Volume 1 Issue 11 May 2015 ISSN (online): 2349-784X Data Pre-Processing in Spam Detection Anjali Sharma Dr. Manisha Manisha Dr. Rekha Jain

More information

An Information Retrieval using weighted Index Terms in Natural Language document collections

An Information Retrieval using weighted Index Terms in Natural Language document collections Internet and Information Technology in Modern Organizations: Challenges & Answers 635 An Information Retrieval using weighted Index Terms in Natural Language document collections Ahmed A. A. Radwan, Minia

More information

Interactive Recovery of Requirements Traceability Links Using User Feedback and Configuration Management Logs

Interactive Recovery of Requirements Traceability Links Using User Feedback and Configuration Management Logs Interactive Recovery of Requirements Traceability Links Using User Feedback and Configuration Management Logs Ryosuke Tsuchiya 1, Hironori Washizaki 1, Yoshiaki Fukazawa 1, Keishi Oshima 2, and Ryota Mibe

More information

TF-IDF. David Kauchak cs160 Fall 2009 adapted from: http://www.stanford.edu/class/cs276/handouts/lecture6-tfidf.ppt

TF-IDF. David Kauchak cs160 Fall 2009 adapted from: http://www.stanford.edu/class/cs276/handouts/lecture6-tfidf.ppt TF-IDF David Kauchak cs160 Fall 2009 adapted from: http://www.stanford.edu/class/cs276/handouts/lecture6-tfidf.ppt Administrative Homework 3 available soon Assignment 2 available soon Popular media article

More information

Homework 2. Page 154: Exercise 8.10. Page 145: Exercise 8.3 Page 150: Exercise 8.9

Homework 2. Page 154: Exercise 8.10. Page 145: Exercise 8.3 Page 150: Exercise 8.9 Homework 2 Page 110: Exercise 6.10; Exercise 6.12 Page 116: Exercise 6.15; Exercise 6.17 Page 121: Exercise 6.19 Page 122: Exercise 6.20; Exercise 6.23; Exercise 6.24 Page 131: Exercise 7.3; Exercise 7.5;

More information

Search Engines. Stephen Shaw <stesh@netsoc.tcd.ie> 18th of February, 2014. Netsoc

Search Engines. Stephen Shaw <stesh@netsoc.tcd.ie> 18th of February, 2014. Netsoc Search Engines Stephen Shaw Netsoc 18th of February, 2014 Me M.Sc. Artificial Intelligence, University of Edinburgh Would recommend B.A. (Mod.) Computer Science, Linguistics, French,

More information

Stemming Methodologies Over Individual Query Words for an Arabic Information Retrieval System

Stemming Methodologies Over Individual Query Words for an Arabic Information Retrieval System Stemming Methodologies Over Individual Query Words for an Arabic Information Retrieval System Hani Abu-Salem* and Mahmoud Al-Omari Department of Computer Science, Mu tah University, P.O. Box (7), Mu tah,

More information

A Proposed Algorithm for Spam Filtering Emails by Hash Table Approach

A Proposed Algorithm for Spam Filtering Emails by Hash Table Approach International Research Journal of Applied and Basic Sciences 2013 Available online at www.irjabs.com ISSN 2251-838X / Vol, 4 (9): 2436-2441 Science Explorer Publications A Proposed Algorithm for Spam Filtering

More information

Development of Secure Multikeyword Retrieval Methodology for Encrypted Cloud Data

Development of Secure Multikeyword Retrieval Methodology for Encrypted Cloud Data Development of Secure Multikeyword Retrieval Methodology for Encrypted Cloud Data Deepak I M 1, K.R. Shylaja 2, Ravinandan M E 3 1 M.Tech IV Sem, Dept. of CSE, Dr. Ambedkar Institute of Technology, Bangalore,

More information

Clustering Technique in Data Mining for Text Documents

Clustering Technique in Data Mining for Text Documents Clustering Technique in Data Mining for Text Documents Ms.J.Sathya Priya Assistant Professor Dept Of Information Technology. Velammal Engineering College. Chennai. Ms.S.Priyadharshini Assistant Professor

More information

Bisecting K-Means for Clustering Web Log data

Bisecting K-Means for Clustering Web Log data Bisecting K-Means for Clustering Web Log data Ruchika R. Patil Department of Computer Technology YCCE Nagpur, India Amreen Khan Department of Computer Technology YCCE Nagpur, India ABSTRACT Web usage mining

More information

Using Wikipedia to Translate OOV Terms on MLIR

Using Wikipedia to Translate OOV Terms on MLIR Using to Translate OOV Terms on MLIR Chen-Yu Su, Tien-Chien Lin and Shih-Hung Wu* Department of Computer Science and Information Engineering Chaoyang University of Technology Taichung County 41349, TAIWAN

More information

Enhancing the relativity between Content, Title and Meta Tags Based on Term Frequency in Lexical and Semantic Aspects

Enhancing the relativity between Content, Title and Meta Tags Based on Term Frequency in Lexical and Semantic Aspects Enhancing the relativity between Content, Title and Meta Tags Based on Term Frequency in Lexical and Semantic Aspects Mohammad Farahmand, Abu Bakar MD Sultan, Masrah Azrifah Azmi Murad, Fatimah Sidi me@shahroozfarahmand.com

More information

Index Terms Domain name, Firewall, Packet, Phishing, URL.

Index Terms Domain name, Firewall, Packet, Phishing, URL. BDD for Implementation of Packet Filter Firewall and Detecting Phishing Websites Naresh Shende Vidyalankar Institute of Technology Prof. S. K. Shinde Lokmanya Tilak College of Engineering Abstract Packet

More information

A Personalized Spam Filtering Approach Utilizing Two Separately Trained Filters

A Personalized Spam Filtering Approach Utilizing Two Separately Trained Filters 2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology A Personalized Spam Filtering Approach Utilizing Two Separately Trained Filters Wei-Lun Teng, Wei-Chung Teng

More information

American Journal of Engineering Research (AJER) 2013 American Journal of Engineering Research (AJER) e-issn: 2320-0847 p-issn : 2320-0936 Volume-2, Issue-4, pp-39-43 www.ajer.us Research Paper Open Access

More information

A FUZZY BASED APPROACH TO TEXT MINING AND DOCUMENT CLUSTERING

A FUZZY BASED APPROACH TO TEXT MINING AND DOCUMENT CLUSTERING A FUZZY BASED APPROACH TO TEXT MINING AND DOCUMENT CLUSTERING Sumit Goswami 1 and Mayank Singh Shishodia 2 1 Indian Institute of Technology-Kharagpur, Kharagpur, India sumit_13@yahoo.com 2 School of Computer

More information

Dissecting the Learning Behaviors in Hacker Forums

Dissecting the Learning Behaviors in Hacker Forums Dissecting the Learning Behaviors in Hacker Forums Alex Tsang Xiong Zhang Wei Thoo Yue Department of Information Systems, City University of Hong Kong, Hong Kong inuki.zx@gmail.com, xionzhang3@student.cityu.edu.hk,

More information

Semantic Concept Based Retrieval of Software Bug Report with Feedback

Semantic Concept Based Retrieval of Software Bug Report with Feedback Semantic Concept Based Retrieval of Software Bug Report with Feedback Tao Zhang, Byungjeong Lee, Hanjoon Kim, Jaeho Lee, Sooyong Kang, and Ilhoon Shin Abstract Mining software bugs provides a way to develop

More information

FUZZY CLUSTERING ANALYSIS OF DATA MINING: APPLICATION TO AN ACCIDENT MINING SYSTEM

FUZZY CLUSTERING ANALYSIS OF DATA MINING: APPLICATION TO AN ACCIDENT MINING SYSTEM International Journal of Innovative Computing, Information and Control ICIC International c 0 ISSN 34-48 Volume 8, Number 8, August 0 pp. 4 FUZZY CLUSTERING ANALYSIS OF DATA MINING: APPLICATION TO AN ACCIDENT

More information

Intelligent Learning Content Management System based on SCORM Standard. Dr. Shian-Shyong Tseng

Intelligent Learning Content Management System based on SCORM Standard. Dr. Shian-Shyong Tseng Intelligent Learning Content Management System based on SCORM Standard Dr. Shian-Shyong Tseng Department of Computer Science, National Chiao Tung University (NCTU), Taiwan (R.O.C) 2008 Researching Topics

More information

Application of Automatic Variable Password Technique in Das s Remote System Authentication Scheme Using Smart Card

Application of Automatic Variable Password Technique in Das s Remote System Authentication Scheme Using Smart Card Application of Automatic Variable Password Technique in Das s Remote System Authentication Scheme Using Smart Card C. Koner, Member, IACSIT, C. T. Bhunia, Sr. Member, IEEE and U. Maulik, Sr. Member, IEEE

More information

Medical Information-Retrieval Systems. Dong Peng Medical Informatics Group

Medical Information-Retrieval Systems. Dong Peng Medical Informatics Group Medical Information-Retrieval Systems Dong Peng Medical Informatics Group Outline Evolution of medical Information-Retrieval (IR). The information retrieval process. The trend of medical information retrieval

More information

Cloud Storage-based Intelligent Document Archiving for the Management of Big Data

Cloud Storage-based Intelligent Document Archiving for the Management of Big Data Cloud Storage-based Intelligent Document Archiving for the Management of Big Data Keedong Yoo Dept. of Management Information Systems Dankook University Cheonan, Republic of Korea Abstract : The cloud

More information

Incorporating Window-Based Passage-Level Evidence in Document Retrieval

Incorporating Window-Based Passage-Level Evidence in Document Retrieval Incorporating -Based Passage-Level Evidence in Document Retrieval Wensi Xi, Richard Xu-Rong, Christopher S.G. Khoo Center for Advanced Information Systems School of Applied Science Nanyang Technological

More information

Mining Text Data: An Introduction

Mining Text Data: An Introduction Bölüm 10. Metin ve WEB Madenciliği http://ceng.gazi.edu.tr/~ozdemir Mining Text Data: An Introduction Data Mining / Knowledge Discovery Structured Data Multimedia Free Text Hypertext HomeLoan ( Frank Rizzo

More information

CO-OCCURRENCE EXTRACTOR

CO-OCCURRENCE EXTRACTOR Page 1 of 7 CO-OCCURRENCE EXTRACTOR Sede opertiva: Piazza Vermicelli 87036 Rende (CS), Italy Page 2 of 7 TABLE OF CONTENTS 1 APP DOCUMENTATION... 3 1.1 HOW IT WORKS 3 1.2 Input data 4 1.3 Output data 4

More information

Optimization of Search Results with Duplicate Page Elimination using Usage Data A. K. Sharma 1, Neelam Duhan 2 1, 2

Optimization of Search Results with Duplicate Page Elimination using Usage Data A. K. Sharma 1, Neelam Duhan 2 1, 2 Optimization of Search Results with Duplicate Page Elimination using Usage Data A. K. Sharma 1, Neelam Duhan 2 1, 2 Department of Computer Engineering, YMCA University of Science & Technology, Faridabad,

More information

Wikipedia and Web document based Query Translation and Expansion for Cross-language IR

Wikipedia and Web document based Query Translation and Expansion for Cross-language IR Wikipedia and Web document based Query Translation and Expansion for Cross-language IR Ling-Xiang Tang 1, Andrew Trotman 2, Shlomo Geva 1, Yue Xu 1 1Faculty of Science and Technology, Queensland University

More information

Research and Implementation of Agricultural Science and Technology Consulting System Based on Ajax and Improved VSM

Research and Implementation of Agricultural Science and Technology Consulting System Based on Ajax and Improved VSM Research and Implementation of Agricultural Science and Technology Consulting System Based on Ajax and Improved VSM Sufen SUN, Junfeng ZHANG, Changshou LUO*, Qingfeng WEI Institute of Information on Science

More information

CSCI 5417 Information Retrieval Systems Jim Martin!

CSCI 5417 Information Retrieval Systems Jim Martin! CSCI 5417 Information Retrieval Systems Jim Martin! Lecture 9 9/20/2011 Today 9/20 Where we are MapReduce/Hadoop Probabilistic IR Language models LM for ad hoc retrieval 1 Where we are... Basics of ad

More information

ENHANCED WEB IMAGE RE-RANKING USING SEMANTIC SIGNATURES

ENHANCED WEB IMAGE RE-RANKING USING SEMANTIC SIGNATURES International Journal of Computer Engineering & Technology (IJCET) Volume 7, Issue 2, March-April 2016, pp. 24 29, Article ID: IJCET_07_02_003 Available online at http://www.iaeme.com/ijcet/issues.asp?jtype=ijcet&vtype=7&itype=2

More information

Diagnosis Code Assignment Support Using Random Indexing of Patient Records A Qualitative Feasibility Study

Diagnosis Code Assignment Support Using Random Indexing of Patient Records A Qualitative Feasibility Study Diagnosis Code Assignment Support Using Random Indexing of Patient Records A Qualitative Feasibility Study Aron Henriksson 1, Martin Hassel 1, and Maria Kvist 1,2 1 Department of Computer and System Sciences

More information

A Framework for Personalized Healthcare Service Recommendation

A Framework for Personalized Healthcare Service Recommendation A Framework for Personalized Healthcare Service Recommendation Choon-oh Lee, Minkyu Lee, Dongsoo Han School of Engineering Information and Communications University (ICU) Daejeon, Korea {lcol, niklaus,

More information

Wadala, Mumbai-037, India Wadala, Mumbai-037, India Wadala, Mumbai-037, India

Wadala, Mumbai-037, India Wadala, Mumbai-037, India Wadala, Mumbai-037, India Volume 3, Issue 12, December 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Interactive

More information

Identifying At-Risk Students Using Machine Learning Techniques: A Case Study with IS 100

Identifying At-Risk Students Using Machine Learning Techniques: A Case Study with IS 100 Identifying At-Risk Students Using Machine Learning Techniques: A Case Study with IS 100 Erkan Er Abstract In this paper, a model for predicting students performance levels is proposed which employs three

More information

PDF hosted at the Radboud Repository of the Radboud University Nijmegen

PDF hosted at the Radboud Repository of the Radboud University Nijmegen PDF hosted at the Radboud Repository of the Radboud University Nijmegen The following full text is an author's version which may differ from the publisher's version. For additional information about this

More information

Optimization of Internet Search based on Noun Phrases and Clustering Techniques

Optimization of Internet Search based on Noun Phrases and Clustering Techniques Optimization of Internet Search based on Noun Phrases and Clustering Techniques R. Subhashini Research Scholar, Sathyabama University, Chennai-119, India V. Jawahar Senthil Kumar Assistant Professor, Anna

More information

Anti-Spam Filter Based on Naïve Bayes, SVM, and KNN model

Anti-Spam Filter Based on Naïve Bayes, SVM, and KNN model AI TERM PROJECT GROUP 14 1 Anti-Spam Filter Based on,, and model Yun-Nung Chen, Che-An Lu, Chao-Yu Huang Abstract spam email filters are a well-known and powerful type of filters. We construct different

More information

Business Challenges and Research Directions of Management Analytics in the Big Data Era

Business Challenges and Research Directions of Management Analytics in the Big Data Era Business Challenges and Research Directions of Management Analytics in the Big Data Era Abstract Big data analytics have been embraced as a disruptive technology that will reshape business intelligence,

More information

SEARCH ENGINE WITH PARALLEL PROCESSING AND INCREMENTAL K-MEANS FOR FAST SEARCH AND RETRIEVAL

SEARCH ENGINE WITH PARALLEL PROCESSING AND INCREMENTAL K-MEANS FOR FAST SEARCH AND RETRIEVAL SEARCH ENGINE WITH PARALLEL PROCESSING AND INCREMENTAL K-MEANS FOR FAST SEARCH AND RETRIEVAL Krishna Kiran Kattamuri 1 and Rupa Chiramdasu 2 Department of Computer Science Engineering, VVIT, Guntur, India

More information

Latent Semantic Indexing with Selective Query Expansion Abstract Introduction

Latent Semantic Indexing with Selective Query Expansion Abstract Introduction Latent Semantic Indexing with Selective Query Expansion Andy Garron April Kontostathis Department of Mathematics and Computer Science Ursinus College Collegeville PA 19426 Abstract This article describes

More information

Analysis of Tweets for Prediction of Indian Stock Markets

Analysis of Tweets for Prediction of Indian Stock Markets Analysis of Tweets for Prediction of Indian Stock Markets Phillip Tichaona Sumbureru Department of Computer Science and Engineering, JNTU College of Engineering Hyderabad, Kukatpally, Hyderabad-500 085,

More information

Eng. Mohammed Abdualal

Eng. Mohammed Abdualal Islamic University of Gaza Faculty of Engineering Computer Engineering Department Information Storage and Retrieval (ECOM 5124) IR HW 5+6 Scoring, term weighting and the vector space model Exercise 6.2

More information

Social Media Monitoring by Using Data Mining. Fuat Basık

Social Media Monitoring by Using Data Mining. Fuat Basık Social Media Monitoring by Using Data Mining Fuat Basık Presentation Plan Introduc0on Mo0va0on Stream Processing Data Set Turkish Language Pre Processing and Stemming Term Frequency and Inverse Document

More information

Inverted Indexes: Trading Precision for Efficiency

Inverted Indexes: Trading Precision for Efficiency Inverted Indexes: Trading Precision for Efficiency Yufei Tao KAIST April 1, 2013 After compression, an inverted index is often small enough to fit in memory. This benefits query processing because it avoids

More information

TREC 2003 Question Answering Track at CAS-ICT

TREC 2003 Question Answering Track at CAS-ICT TREC 2003 Question Answering Track at CAS-ICT Yi Chang, Hongbo Xu, Shuo Bai Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China changyi@software.ict.ac.cn http://www.ict.ac.cn/

More information

Continuous Fastest Path Planning in Road Networks by Mining Real-Time Traffic Event Information

Continuous Fastest Path Planning in Road Networks by Mining Real-Time Traffic Event Information Continuous Fastest Path Planning in Road Networks by Mining Real-Time Traffic Event Information Eric Hsueh-Chan Lu Chi-Wei Huang Vincent S. Tseng Institute of Computer Science and Information Engineering

More information

Efficient Query Optimizing System for Searching Using Data Mining Technique

Efficient Query Optimizing System for Searching Using Data Mining Technique Vol.1, Issue.2, pp-347-351 ISSN: 2249-6645 Efficient Query Optimizing System for Searching Using Data Mining Technique Velmurugan.N Vijayaraj.A Assistant Professor, Department of MCA, Associate Professor,

More information

Customized Efficient Collection of Big Data for Advertising Services

Customized Efficient Collection of Big Data for Advertising Services , pp.36-41 http://dx.doi.org/10.14257/astl.2015.94.09 Customized Efficient Collection of Big Data for Advertising Services Jun-Soo Yun 1, Jin-Tae Park 1, Hyun-Seo Hwang 1, Il-Young Moon 1 1 1600 Chungjeol-ro,

More information

Research on Sentiment Classification of Chinese Micro Blog Based on

Research on Sentiment Classification of Chinese Micro Blog Based on Research on Sentiment Classification of Chinese Micro Blog Based on Machine Learning School of Economics and Management, Shenyang Ligong University, Shenyang, 110159, China E-mail: 8e8@163.com Abstract

More information

Finding Advertising Keywords on Web Pages. Contextual Ads 101

Finding Advertising Keywords on Web Pages. Contextual Ads 101 Finding Advertising Keywords on Web Pages Scott Wen-tau Yih Joshua Goodman Microsoft Research Vitor R. Carvalho Carnegie Mellon University Contextual Ads 101 Publisher s website Digital Camera Review The

More information

Revenue Optimization with Relevance Constraint in Sponsored Search

Revenue Optimization with Relevance Constraint in Sponsored Search Revenue Optimization with Relevance Constraint in Sponsored Search Yunzhang Zhu Gang Wang Junli Yang Dakan Wang Jun Yan Zheng Chen Microsoft Resarch Asia, Beijing, China Department of Fundamental Science,

More information

Information Technology Support System of Supply Chain Management

Information Technology Support System of Supply Chain Management Proceedings of the 11th WSEAS International Conference on APPLIED MATHEMATICS, Dallas, Texas, USA, March 22-24, 2007 138 Information Technology Support System of Supply Chain Management HUA JIANG,JING

More information

Credit Card Fraud Detection Using Self Organised Map

Credit Card Fraud Detection Using Self Organised Map International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 13 (2014), pp. 1343-1348 International Research Publications House http://www. irphouse.com Credit Card Fraud

More information

Introduction to Information Retrieval http://informationretrieval.org

Introduction to Information Retrieval http://informationretrieval.org Introduction to Information Retrieval http://informationretrieval.org IIR 6&7: Vector Space Model Hinrich Schütze Institute for Natural Language Processing, University of Stuttgart 2011-08-29 Schütze:

More information

INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET)

INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 6367(Print), ISSN 0976 6367(Print) ISSN 0976 6375(Online)

More information

Ranked Search over Encrypted Cloud Data using Multiple Keywords

Ranked Search over Encrypted Cloud Data using Multiple Keywords Ranked Search over Encrypted Cloud Data using Multiple Keywords [1] Nita Elizabeth Samuel, [2] Revathi B. R, [3] Sangeetha.M, [4] SreelekshmySelvin, [5] Dileep.V.K [1][2][3][4] LBS Institute of Technology

More information

Comparing IPL2 and Yahoo! Answers: A Case Study of Digital Reference and Community Based Question Answering

Comparing IPL2 and Yahoo! Answers: A Case Study of Digital Reference and Community Based Question Answering Comparing and : A Case Study of Digital Reference and Community Based Answering Dan Wu 1 and Daqing He 1 School of Information Management, Wuhan University School of Information Sciences, University of

More information

Distributed Computing and Big Data: Hadoop and MapReduce

Distributed Computing and Big Data: Hadoop and MapReduce Distributed Computing and Big Data: Hadoop and MapReduce Bill Keenan, Director Terry Heinze, Architect Thomson Reuters Research & Development Agenda R&D Overview Hadoop and MapReduce Overview Use Case:

More information

Recommendation Tool Using Collaborative Filtering

Recommendation Tool Using Collaborative Filtering Recommendation Tool Using Collaborative Filtering Aditya Mandhare 1, Soniya Nemade 2, M.Kiruthika 3 Student, Computer Engineering Department, FCRIT, Vashi, India 1 Student, Computer Engineering Department,

More information

Simulation and Analysis of Parameter Identification Techniques for Induction Motor Drive

Simulation and Analysis of Parameter Identification Techniques for Induction Motor Drive International Journal of Electronic and Electrical Engineering. ISSN 0974-2174 Volume 7, Number 10 (2014), pp. 1027-1035 International Research Publication House http://www.irphouse.com Simulation and

More information

Use of group discussion and learning portfolio to build knowledge for managing web group learning

Use of group discussion and learning portfolio to build knowledge for managing web group learning Use of group discussion and learning portfolio to build knowledge for managing web group learning Gwo-Dong Chen,Kuo-Liang Ou, Chin-Yeh Wang Department of Computer Science and Information Engineering National

More information

DYNAMIC QUERY FORMS WITH NoSQL

DYNAMIC QUERY FORMS WITH NoSQL IMPACT: International Journal of Research in Engineering & Technology (IMPACT: IJRET) ISSN(E): 2321-8843; ISSN(P): 2347-4599 Vol. 2, Issue 7, Jul 2014, 157-162 Impact Journals DYNAMIC QUERY FORMS WITH

More information

Research on Trust Management Strategies in Cloud Computing Environment

Research on Trust Management Strategies in Cloud Computing Environment Journal of Computational Information Systems 8: 4 (2012) 1757 1763 Available at http://www.jofcis.com Research on Trust Management Strategies in Cloud Computing Environment Wenjuan LI 1,2,, Lingdi PING

More information

A Visualization System and Monitoring Tool to Measure Concurrency in MPICH Programs

A Visualization System and Monitoring Tool to Measure Concurrency in MPICH Programs A Visualization System and Monitoring Tool to Measure Concurrency in MPICH Programs Michael Scherger Department of Computer Science Texas Christian University Email: m.scherger@tcu.edu Zakir Hussain Syed

More information

An ontology-based approach for semantic ranking of the web search engines results

An ontology-based approach for semantic ranking of the web search engines results An ontology-based approach for semantic ranking of the web search engines results Editor(s): Name Surname, University, Country Solicited review(s): Name Surname, University, Country Open review(s): Name

More information

An Improved VSM-based Post-Requirements Traceability Recovery Approach Using Context Analysis

An Improved VSM-based Post-Requirements Traceability Recovery Approach Using Context Analysis An Improved VSM-based Post-Requirements Traceability Recovery Approach Using Context Analysis Jiale Zhou, Yue Lu, Kristina Lundqvist Mälardalen Real-Time Research Centre, Mälardalen University, Västerås,

More information

IDENTIFIC ATION OF SOFTWARE EROSION USING LOGISTIC REGRESSION

IDENTIFIC ATION OF SOFTWARE EROSION USING LOGISTIC REGRESSION http:// IDENTIFIC ATION OF SOFTWARE EROSION USING LOGISTIC REGRESSION Harinder Kaur 1, Raveen Bajwa 2 1 PG Student., CSE., Baba Banda Singh Bahadur Engg. College, Fatehgarh Sahib, (India) 2 Asstt. Prof.,

More information

Performance Evaluation On Human Resource Management Of China S Commercial Banks Based On Improved Bp Neural Networks

Performance Evaluation On Human Resource Management Of China S Commercial Banks Based On Improved Bp Neural Networks Performance Evaluation On Human Resource Management Of China S *1 Honglei Zhang, 2 Wenshan Yuan, 1 Hua Jiang 1 School of Economics and Management, Hebei University of Engineering, Handan 056038, P. R.

More information

IDENTIFYING CONSTRUCTION PROBLEM-SOLVING PATTERNS OF LESSONS LEARNED WITH TEXT MINING METHOD

IDENTIFYING CONSTRUCTION PROBLEM-SOLVING PATTERNS OF LESSONS LEARNED WITH TEXT MINING METHOD IDENTIFYING CONSTRUCTION PROBLEM-SOLVING PATTERNS OF LESSONS LEARNED WITH TEXT MINING METHOD Pei-lun Chang 1 *, Wen-der Yu 2, and Shun-min Lee 3 1 CECI Engineering Consultants, Inc., Taiwan, Taipei/ Chung

More information

Linear programming approach for online advertising

Linear programming approach for online advertising Linear programming approach for online advertising Igor Trajkovski Faculty of Computer Science and Engineering, Ss. Cyril and Methodius University in Skopje, Rugjer Boshkovikj 16, P.O. Box 393, 1000 Skopje,

More information

Performance Workload Design

Performance Workload Design Performance Workload Design The goal of this paper is to show the basic principles involved in designing a workload for performance and scalability testing. We will understand how to achieve these principles

More information

Chapter 7. Feature Selection. 7.1 Introduction

Chapter 7. Feature Selection. 7.1 Introduction Chapter 7 Feature Selection Feature selection is not used in the system classification experiments, which will be discussed in Chapter 8 and 9. However, as an autonomous system, OMEGA includes feature

More information

Why is Internal Audit so Hard?

Why is Internal Audit so Hard? Why is Internal Audit so Hard? 2 2014 Why is Internal Audit so Hard? 3 2014 Why is Internal Audit so Hard? Waste Abuse Fraud 4 2014 Waves of Change 1 st Wave Personal Computers Electronic Spreadsheets

More information

W. Heath Rushing Adsurgo LLC. Harness the Power of Text Analytics: Unstructured Data Analysis for Healthcare. Session H-1 JTCC: October 23, 2015

W. Heath Rushing Adsurgo LLC. Harness the Power of Text Analytics: Unstructured Data Analysis for Healthcare. Session H-1 JTCC: October 23, 2015 W. Heath Rushing Adsurgo LLC Harness the Power of Text Analytics: Unstructured Data Analysis for Healthcare Session H-1 JTCC: October 23, 2015 Outline Demonstration: Recent article on cnn.com Introduction

More information

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Karagpur

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Karagpur Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Karagpur Lecture No. #06 Cryptanalysis of Classical Ciphers (Refer

More information

E- Customer Care Service System for Benin Electricity Distribution Company

E- Customer Care Service System for Benin Electricity Distribution Company E- Customer Care Service System for Benin Electricity Distribution Company Olutayo Boyinbode Department of Computer Science, Federal University of Technology, Akure Olufemi Akinyede Department of Computer

More information

Available online at www.sciencedirect.com Available online at www.sciencedirect.com. Advanced in Control Engineering and Information Science

Available online at www.sciencedirect.com Available online at www.sciencedirect.com. Advanced in Control Engineering and Information Science Available online at www.sciencedirect.com Available online at www.sciencedirect.com Procedia Procedia Engineering Engineering 00 (2011) 15 (2011) 000 000 1822 1826 Procedia Engineering www.elsevier.com/locate/procedia

More information

International Journal of Research in Advent Technology Available Online at: http://www.ijrat.org

International Journal of Research in Advent Technology Available Online at: http://www.ijrat.org IMPROVING PEFORMANCE OF BAYESIAN SPAM FILTER Firozbhai Ahamadbhai Sherasiya 1, Prof. Upen Nathwani 2 1 2 Computer Engineering Department 1 2 Noble Group of Institutions 1 firozsherasiya@gmail.com ABSTARCT:

More information

Comparison of Standard and Zipf-Based Document Retrieval Heuristics

Comparison of Standard and Zipf-Based Document Retrieval Heuristics Comparison of Standard and Zipf-Based Document Retrieval Heuristics Benjamin Hoffmann Universität Stuttgart, Institut für Formale Methoden der Informatik Universitätsstr. 38, D-70569 Stuttgart, Germany

More information

Domain Classification of Technical Terms Using the Web

Domain Classification of Technical Terms Using the Web Systems and Computers in Japan, Vol. 38, No. 14, 2007 Translated from Denshi Joho Tsushin Gakkai Ronbunshi, Vol. J89-D, No. 11, November 2006, pp. 2470 2482 Domain Classification of Technical Terms Using

More information

Establishment of Fire Control Management System in Building Information Modeling Environment

Establishment of Fire Control Management System in Building Information Modeling Environment Establishment of Fire Control Management System in Building Information Modeling Environment Yan-Chyuan Shiau 1, Chong-Teng Chang 2 Department of Construction Management, Chung Hua University, 707, Wu-Fu

More information

Approaches of Using a Word-Image Ontology and an Annotated Image Corpus as Intermedia for Cross-Language Image Retrieval

Approaches of Using a Word-Image Ontology and an Annotated Image Corpus as Intermedia for Cross-Language Image Retrieval Approaches of Using a Word-Image Ontology and an Annotated Image Corpus as Intermedia for Cross-Language Image Retrieval Yih-Chen Chang and Hsin-Hsi Chen Department of Computer Science and Information

More information

A linear algebraic method for pricing temporary life annuities

A linear algebraic method for pricing temporary life annuities A linear algebraic method for pricing temporary life annuities P. Date (joint work with R. Mamon, L. Jalen and I.C. Wang) Department of Mathematical Sciences, Brunel University, London Outline Introduction

More information

Link Processing for Fuzzy Web Pages Clustering and Classification

Link Processing for Fuzzy Web Pages Clustering and Classification European Journal of Scientific Research ISSN 1450-216X Vol.27 No.4 (2009), pp.620-627 EuroJournals Publishing, Inc. 2009 http://www.eurojournals.com/ejsr.htm Link Processing for Fuzzy Web Pages Clustering

More information

Adaptive Demand-Forecasting Approach based on Principal Components Time-series an application of data-mining technique to detection of market movement

Adaptive Demand-Forecasting Approach based on Principal Components Time-series an application of data-mining technique to detection of market movement Adaptive Demand-Forecasting Approach based on Principal Components Time-series an application of data-mining technique to detection of market movement Toshio Sugihara Abstract In this study, an adaptive

More information

Recognition. Sanja Fidler CSC420: Intro to Image Understanding 1 / 28

Recognition. Sanja Fidler CSC420: Intro to Image Understanding 1 / 28 Recognition Topics that we will try to cover: Indexing for fast retrieval (we still owe this one) History of recognition techniques Object classification Bag-of-words Spatial pyramids Neural Networks Object

More information

Analysis of Software Project Reports for Defect Prediction Using KNN

Analysis of Software Project Reports for Defect Prediction Using KNN , July 2-4, 2014, London, U.K. Analysis of Software Project Reports for Defect Prediction Using KNN Rajni Jindal, Ruchika Malhotra and Abha Jain Abstract Defect severity assessment is highly essential

More information

Fault Analysis in Software with the Data Interaction of Classes

Fault Analysis in Software with the Data Interaction of Classes , pp.189-196 http://dx.doi.org/10.14257/ijsia.2015.9.9.17 Fault Analysis in Software with the Data Interaction of Classes Yan Xiaobo 1 and Wang Yichen 2 1 Science & Technology on Reliability & Environmental

More information

CINDOR Conceptual Interlingua Document Retrieval: TREC-8 Evaluation.

CINDOR Conceptual Interlingua Document Retrieval: TREC-8 Evaluation. CINDOR Conceptual Interlingua Document Retrieval: TREC-8 Evaluation. Miguel Ruiz, Anne Diekema, Páraic Sheridan MNIS-TextWise Labs Dey Centennial Plaza 401 South Salina Street Syracuse, NY 13202 Abstract:

More information

Sentiment analysis on tweets in a financial domain

Sentiment analysis on tweets in a financial domain Sentiment analysis on tweets in a financial domain Jasmina Smailović 1,2, Miha Grčar 1, Martin Žnidaršič 1 1 Dept of Knowledge Technologies, Jožef Stefan Institute, Ljubljana, Slovenia 2 Jožef Stefan International

More information

Open Access A Facial Expression Recognition Algorithm Based on Local Binary Pattern and Empirical Mode Decomposition

Open Access A Facial Expression Recognition Algorithm Based on Local Binary Pattern and Empirical Mode Decomposition Send Orders for Reprints to reprints@benthamscience.ae The Open Electrical & Electronic Engineering Journal, 2014, 8, 599-604 599 Open Access A Facial Expression Recognition Algorithm Based on Local Binary

More information

Framework model on enterprise information system based on Internet of things

Framework model on enterprise information system based on Internet of things International Journal of Intelligent Information Systems 2014; 3(6): 55-59 Published online December 22, 2014 (http://www.sciencepublishinggroup.com/j/ijiis) doi: 10.11648/j.ijiis.20140306.11 ISSN: 2328-7675

More information

Topic Matching Based Change Impact Analysis from Feature on User Interface of Mobile Apps

Topic Matching Based Change Impact Analysis from Feature on User Interface of Mobile Apps Topic Matching Based Change Impact Analysis from Feature on User Interface of Mobile Apps Qiwen Zou 1, Xiangping Chen 2,, Yuan Huang 1,3 1 School of Information Science and Technology, Sun Yat-sen University,

More information

Considerations of Modeling in Keyword Bidding (Google:AdWords) Xiaoming Huo Georgia Institute of Technology August 8, 2012

Considerations of Modeling in Keyword Bidding (Google:AdWords) Xiaoming Huo Georgia Institute of Technology August 8, 2012 Considerations of Modeling in Keyword Bidding (Google:AdWords) Xiaoming Huo Georgia Institute of Technology August 8, 2012 8/8/2012 1 Outline I. Problem Description II. Game theoretical aspect of the bidding

More information