Showing 1177–1188 of 1348 results

  • Sentiment Analysis of Twitter Data

    0 out of 5
    4,500

    Sentiment Analysis of Twitter Data Abstract? We examine sentiment analysis on Twitter data. The contributions of this paper are: (1) We introduce POS-specific prior polarity features. (2) We explore the use of a tree kernel to obviate the need for tedious feature engineering. The new features (in conjunction with previously proposed features) and the tree…

  • Sentiment analysis: from opinion mining to human-agent interaction

    0 out of 5
    4,500

    Self-Sentiment analysis: from opinion mining to human-agent interaction AbstractSelf-Sentiment analysis: from opinion mining to human-agent interaction. The opinion mining and human-agent interaction communities are currently addressing sentiment analysis from different perspectives that comprise, on the one hand, disparate sentiment-related phenomena and computational representations, and on the other hand, different detection and dialog management methods. In…

  • Sentiview:Analysis on internet famous topics

    0 out of 5
    4,500

    Sentiview:Analysis on internet famous topics Abstract?There would be value to several domains in discovering and visualizing sentiments in online posts. This paper presents SentiView, an interactive visualization system that aims to analyze public sentiments for popular topics on the Internet. SentiView combines uncertainty modeling and model-driven adjustment. By searching and correlating frequent words in text…

  • SEPIA: Secure-PIN-Authentication-as-a-Service for ATM using Mobile and Wearable Devices

    0 out of 5
    4,500

    SEPIA: Secure-PIN-Authentication-as-a-Service for ATM using Mobile and Wearable Devices Abstract? Credit card fraud is a common problem in today?s world. Financial institutions have registered major loses till today due to users being exposed of their credit card information. Shoulder-sur?ng or observation attacks, including card skimming and video recording with hidden cameras while users perform PIN-based…

  • Sequence Pattern Mining with Variables

    0 out of 5
    4,500

    Sequence Pattern Mining with Variables Abstract-Sequence pattern mining (SPM) seeks to find multiple items that commonly occur together in a specific order. One common assumption is that the relevant differences between items are captured through creating distinct items. In some domains, this leads to an exponential increase in the number of items. This paper presents…

  • Sequence-Growth : A Scalable and Effective Frequent Itemset Mining Algorithm for Big Data Based on MapReduce Framework

    0 out of 5
    4,500

    Sequence-Growth : A Scalable and Effective Frequent Itemset Mining Algorithm for Big Data Based on MapReduce Framework Abstract? Frequent itemset mining FIM < Final Year Projects 2016 > is an important research topic because it is widely applied in real world to ?nd the frequent itemsets and to mine human behavior patterns. FIM process is…

  • Service Operator-Aware Trust Scheme for Resource Matchmaking across Multiple Clouds

    0 out of 5
    4,500

    Service Operator-Aware Trust Scheme for Resource Matchmaking across Multiple Clouds Abstract?A service operator-aware trust scheme SOTS for resource matchmaking across < Final Year Projects 2016 > multiple clouds. Through analyzing the built-in relationship between the users, the broker, and the service resources, this paper proposes a middleware framework of trust management that can effectively reduces…

  • Service-generated Big Data and Big Data-as-a-Service: An Overview

    0 out of 5
    4,500

    Service-generated Big Data and Big Data-as-a-Service: An Overview Abstract?The prevalence of service computing and cloud computing, more and more services are emerging on the Internet, generating huge volume of data, such as trace logs, QoS information, service relationship, etc. The overwhelming service-generated data become too large and complex difficult < Final Year Projects 2016 >…

  • Set Matching Measures for External Cluster Validity

    0 out of 5
    5,500

    Set Matching Measures for External Cluster Validity Abstract? Comparing two clustering results of a data set is a challenging task in cluster analysis. Many external validity measures have been proposed in the literature. A good measure should be invariant to the changes of data size, cluster size and number of clusters. We give an overview…

  • Set predicates in sql:Enabling set-level comparisons for dynamically formed groups

    0 out of 5
    4,500

    Set predicates in sql:Enabling set-level comparisons for dynamically formed groups Abstract?Set predicates in sql:Enabling set-level comparisons for dynamically formed groups. In data warehousing and OLAP applications, scalar-level predicates in SQL become increasingly inadequate to support a class of operations that require set-level comparison semantics, i.e., comparing a group of tuples with multiple values. Currently, complex…

  • Signature Seraching in a Networked Collection of files

    0 out of 5
    4,500

    Signature Seraching in a Networked Collection of files Abstract?Signature Seraching in a Networked Collection of files. A signature is a data pattern of interest in a large data file or set of large data files. Such signatures that need to be found arise in applications such as DNA sequence analysis, network intrusion detection, biometrics, <...

  • Similarity Based Rating Prediction For Cold Start User In Recommendation System

    0 out of 5
    4,500

    Similarity Based Rating Prediction For Cold Start User In Recommendation System Abstract-A recommender system (RS) aims to provide personalized recommendations to users for specific items (e.g., music, books). Popular techniques involve content-based (CB) models and collaborative filtering (CF) approaches. In this paper, we deal with a very important problem in RSs: The cold start problem….

End of content

End of content