Ever since the evolution of Internet Information retrieval is being made by surfers in large amount. The data gets increased everyday as the thirst of acquiring knowledge by the users gets increased day-by-day. The da...
详细信息
ISBN:
(纸本)9789811031564;9789811031557
Ever since the evolution of Internet Information retrieval is being made by surfers in large amount. The data gets increased everyday as the thirst of acquiring knowledge by the users gets increased day-by-day. The data which is raw needs to be processed for usage which increases the potential value in all major areas like Education, Business etc. Therefore Text Mining is an emerging area where unstructured information were made as relevant information. Text mining process can be divided into Information Extraction, Topic Tracking, Summarization, Categorization, Clustering, concept Linkage and Information visualization. Even though all other things can be applied to text only properly it is extracted from the web. Using Pattern matching or String matching algorithms to retrieve proper results from the Sea of information. In this paper we discuss the three types of algorithms Aho Corasick, Wu Manber and Commentz Walter. The performance of the algorithms are identified by implementing it in Python language. Finally the suitable algorithm for extracting information is found.
丛书名:
International conference of Life System Modeling and Simulation,LSMS 2014 and International conference on intelligentcomputing for Sustainable Energy and Environment,ICSEE 2014,Shanghai,China,September 20-23,2014,Proceedings,Part II
This book constitutes the second part of the refereed proceedings of the International conference on Life System Modeling and Simulation, LSMS 2014, and of the International conference on intelligentcomputing for Sus...
ISBN:
(数字)9783662452615
ISBN:
(纸本)9783662452608;9783662452615
This book constitutes the second part of the refereed proceedings of the International conference on Life System Modeling and Simulation, LSMS 2014, and of the International conference on intelligentcomputing for Sustainable Energy and Environment, ICSEE 2014, held in Shanghai, China, in September 2014. The 159 revised full papers presented in the three volumes of CCIS 461-463 were carefully reviewed and selected from 572 submissions. The papers of this volume are organized in topical sections on advanced neural network theory and algorithms; advanced evolutionary computingtheory and algorithms, such as particle swarm optimization, differential evolution, ant colonies, artificial life, artificial immune systems and genetic algorithm; fuzzy, neural, and fuzzy-neuro hybrids; intelligent modeling, monitoring, and control of complex nonlinear systems; intelligent modeling and simulation of climate change; communication and control for distributed networked systems.
The SQL injection is a predominant type of attack and threat to web applications. This attack attempts to subvert the relationship between a webpage and its supporting database. Due to widespread availability of valua...
详细信息
ISBN:
(纸本)9789811031533;9789811031526
The SQL injection is a predominant type of attack and threat to web applications. This attack attempts to subvert the relationship between a webpage and its supporting database. Due to widespread availability of valuable data and automated tools on web, attackers are motivated to launch high profile attacks on targeted websites. This paper is an effort to know the current state of SQL injection attacks. Different Researchers have proposed various solutions to address SQL injection problems. In this research work, those countermeasures are identified and applied to a vulnerable application and database system, then result are illustrated.
One of the fundamental issues in cloud computing is the discovery of cloud services. Given the plethora and range of service offerings in the cloud, a cloud broker is vital in finding the services that meet the functi...
详细信息
ISBN:
(纸本)9788132226956;9788132226932
One of the fundamental issues in cloud computing is the discovery of cloud services. Given the plethora and range of service offerings in the cloud, a cloud broker is vital in finding the services that meet the functional and nonfunctional requirements of the user. Too much request to the broker increases the waiting time and hence the response time, resulting in a degraded performance. Mathematical formulation using the queuing model is used to show how the response time varies between a single broker system and a multiple broker system in a cloud-computing environment.
In this paper we implemented an Auto-exposure algorithm based on the False-position method in order to correctly expose the leather samples. Though we are doing this for the leather industry, we can directly use this ...
详细信息
ISBN:
(纸本)9783319029313;9783319029306
In this paper we implemented an Auto-exposure algorithm based on the False-position method in order to correctly expose the leather samples. Though we are doing this for the leather industry, we can directly use this false position based, auto exposure algorithm for the natural scenes. The main reason for choosing the False-position method is that, it converge the root values quickly when compared to bisection method. The implementation of our auto exposure algorithm is performed by using the point grey research programmable camera.
Mobile ad-hoc network operates with no pre-setup infrastructure and is one of the most active research areas. In this kind of network mobile nodes are completely independent, self managed and they are highly dynamic i...
详细信息
ISBN:
(纸本)9783319029313;9783319029306
Mobile ad-hoc network operates with no pre-setup infrastructure and is one of the most active research areas. In this kind of network mobile nodes are completely independent, self managed and they are highly dynamic in nature. Therefore, traditional routing cannot work properly in this environment. Besides this, Quality of Service (QoS) of the network is very important for real time and multimedia applications for providing better throughput. But providing QoS in routing is a challenging task. Thus in this paper we introduce a novel QoS aware multipath routing algorithm IWDRA, which is based on intelligent Water Drop (IWD) algorithm and here packets follow the basic IWD properties among neighbor nodes. It provides better QoS of network which will increase network lifetime, network stability, packet delivery rate and it is also a highly adaptive routing which will support dynamic topology like MANET.
Soft computing techniques are widely used for the research in various fields nowadays. Artificial Neural Networks and various other soft computing techniques can be used for handling large data for diagnosis of partic...
详细信息
ISBN:
(纸本)9783319029313;9783319029306
Soft computing techniques are widely used for the research in various fields nowadays. Artificial Neural Networks and various other soft computing techniques can be used for handling large data for diagnosis of particular disease. The increasing demand of Artificial Neural Network application for predicting the disease shows better performance in the field of medical decision making. The rough set theory proposed by Pawlak is one of the widely used research area nowadays. Rough set theory can be used for handling impression and uncertainty in data;therefore it can be used for medical diagnosis systems. This paper represents the use of artificial neural networks in predicting disease i.e. diagnosis, and use of Rough Set theory for finding the indicators in diagnosis of Nephritis. The proposed technique involves training a Multi Layer Perceptron with a BP learning algorithm to recognize a pattern for the diagnosis and prediction of Nephritis and calculating significance factor using Rough Set theory to find indicators. In this paper, a brief introduction about soft computing techniques used nowadays for diagnosis of disease is given. The other part introduces Nephritis and the proposed method for diagnosis of Nephritis.
This paper presents an intelligent control system for robust and adaptive control of non-linear, time-variant systems operating under uncertain conditions. The approach is based on Dempster-Shafer theory of evidence a...
详细信息
ISBN:
(纸本)0819453447
This paper presents an intelligent control system for robust and adaptive control of non-linear, time-variant systems operating under uncertain conditions. The approach is based on Dempster-Shafer theory of evidence and Dempster's rule for combining beliefs. The approach can handle systems with multiple sensors and multiple sources of disturbance. Sensor with different and nonlinear characteristics can also be integrated in this approach.
Information aggregation has a long history of studies. It has been used in decision-making, sensor fusion, information retrieval, affective intelligence and many other applications for combining certainties, reliabili...
详细信息
ISBN:
(纸本)9781538626337
Information aggregation has a long history of studies. It has been used in decision-making, sensor fusion, information retrieval, affective intelligence and many other applications for combining certainties, reliabilities, sentiments and other degrees of information to judge something in the real world. The paper dares to revisit a traditional and seemingly forgotten representation of uncertainty called Certainty Factors, and discusses a new interpretation with Possibility theory and causation events. Then it develops a few aggregation functions of uncertainties derived from distinct pieces of evidence. The Certainty Factors had been criticized due to lack of sound mathematical interpretation from the viewpoint of Probability theory. Thus, the paper first tries to establish a theory for a sound interpretation using Possibility theory. Then it examines the aggregation based on the interpretation. It proposes four combination functions with sound theoretical basis, one of which is exactly the same as the combination criticized for long time.
This paper deals about the implication of quantum game theory with the basis of Artificial Intelligence in real time scenario. Though game theory ideas are basically handled with Al techniques, the radiation of quantu...
详细信息
ISBN:
(纸本)9783642274428
This paper deals about the implication of quantum game theory with the basis of Artificial Intelligence in real time scenario. Though game theory ideas are basically handled with Al techniques, the radiation of quantum computing gives effective and efficient solutions to the classical games and also in various fields like economics, finance etc., The paper focuses on the following issues: study of quantum strategies in game theoryapplications and analysis of an application of game theory to solve the real time problem of Task Allocation. The strategies, that we have developed, comprise of different meticulous frame work applied in the field of artificial intelligence.
暂无评论