Search results for "Software"

showing 10 items of 7396 documents

Application of neural network to predict purchases in online store

2016

A key ability of competitive online stores is effective prediction of customers’ purchase intentions as it makes it possible to apply personalized service strategy to convert visitors into buyers and increase sales conversion rates. Data mining and artificial intelligence techniques have proven to be successful in classification and prediction tasks in complex real-time systems, like e-commerce sites. In this paper we proposed a back-propagation neural network model aiming at predicting purchases in active user sessions in a Web store. The neural network training and evaluation was performed using a set of user sessions reconstructed from server log data. The proposed neural network was abl…

Web usage miningService strategyRecallArtificial neural networkWeb miningbusiness.industryComputer scienceneural networklog file analysisE-commerceServer logMachine learningcomputer.software_genreartificial intelligenceSet (abstract data type)Web miningonline storeKey (cryptography)e-commerceWeb storeArtificial intelligencebusinesscomputer
researchProduct

Using association rules to assess purchase probability in online stores

2016

The paper addresses the problem of e-customer behavior characterization based on Web server log data. We describe user sessions with the number of session features and aim to identify the features indicating a high probability of making a purchase for two customer groups: traditional customers and innovative customers. We discuss our approach aimed at assessing a purchase probability in a user session depending on categories of viewed products and session features. We apply association rule mining to real online bookstore data. The results show differences in factors indicating a high purchase probability in session for both customer types. The discovered association rules allow us to formu…

Web usage miningWeb serverclick-stream analysise-CommerceAssociation rule learningComputer sciencebusiness.industrylog file analysisdata mining02 engineering and technologyE-commercecomputer.software_genreSession (web analytics)association rulesWorld Wide WebWeb mining020204 information systemsLog dataClick stream analysis0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingbusinesscomputerInformation SystemsInformation Systems and e-Business Management
researchProduct

Identifying legitimate Web users and bots with different traffic profiles — an Information Bottleneck approach

2020

Abstract Recent studies reported that about half of Web users nowadays are intelligent agents (Web bots). Many bots are impersonators operating at a very high sophistication level, trying to emulate navigational behaviors of legitimate users (humans). Moreover, bot technology continues to evolve which makes bot detection even harder. To deal with this problem, many advanced methods for differentiating bots from humans have been proposed, a large part of which relies on supervised machine learning techniques. In this paper, we propose a novel approach to identify various profiles of bots and humans which combines feature selection and unsupervised learning of HTTP-level traffic patterns to d…

Web userInformation Systems and ManagementComputer scienceInternet robotFeature selection02 engineering and technologyMachine learningcomputer.software_genreUnsupervised learningSession (web analytics)Management Information SystemsIntelligent agentArtificial Intelligence020204 information systemsMachine learning0202 electrical engineering electronic engineering information engineeringCluster analysisBot detectionbusiness.industryInformation bottleneck methodWeb botServer logHierarchical clusteringUnsupervised learning020201 artificial intelligence & image processingArtificial intelligencebusinesscomputerSoftwareKnowledge-Based Systems
researchProduct

Definition of a Workflow for Web Browsing of 3D Models in Archaeology

2016

The Cultural Heritage (CH) is a fundamental element of promotion of territories and of tourism development. Publishing 3D models of archaeological sites and their three-dimensional reconstruction on the Web is one of the best ways to spread their knowledge. However, many recent scientific researches in this field have highlighted the limitations and difficulties related to the networking of interactive 3D models. The main difficulties are related to the complexity and the size of models, which influence the access speed, and the cost of software and hardware needed for the publication on the WEB. In light of this background, this article describes the further advances of research activities…

Web-based visualizationComputer scienceVirtual realityHTML501 natural sciencesVirtual realityWorld Wide WebDocumentationSoftware0103 physical sciencesWebGLWeb navigation010306 general physicsHTML5Archaeological sitebusiness.industry010401 analytical chemistryArchaeology0104 chemical sciencesCultural heritageWorkflowCultural heritagebusinessSettore ICAR/06 - Topografia E CartografiaTourism3DGeospatial DB
researchProduct

Restricted Decontamination for the Imbalanced Training Sample Problem

2003

The problem of imbalanced training data in supervised methods is currently receiving growing attention. Imbalanced data means that one class is much more represented than the others in the training sample. It has been observed that this situation, which arises in several practical domains, may produce an important deterioration of the classification accuracy, in particular with patterns belonging to the less represented classes. In the present paper, we report experimental results that point at the convenience of correctly downsizing the majority class while simultaneously increasing the size of the minority one in order to balance both classes. This is obtained by applying a modification o…

Weight functionTraining setPoint (typography)business.industryComputer scienceSupervised learningSample (statistics)Function (mathematics)Machine learningcomputer.software_genreSpeech processingClass (biology)Pattern recognition (psychology)Artificial intelligencebusinesscomputer
researchProduct

Optimization of conducting structures by using the homogenization method

2002

Approximation and numerical realization of a class of optimization problems with control variables represented by coefficients of linear elliptic state equations is considered. Convergence analysis of well-posed problems is performed by using one- and two-level approximation strategies. The latter is utilized in an optimization layout problem for two conductive constituents, for which the necessary steps to transfer the well-posed problem into a computational form are described and some numerical experiments are given.

Well-posed problemMathematical optimizationControl and OptimizationOptimization problemNumerical analysisControl variableThermal conductionComputer Graphics and Computer-Aided DesignHomogenization (chemistry)Computer Science ApplicationsControl and Systems EngineeringHeat transferApplied mathematicsEngineering design processSoftwareMathematicsStructural and Multidisciplinary Optimization
researchProduct

Distance measures for biological sequences: Some recent approaches

2008

AbstractSequence comparison has become a very essential tool in modern molecular biology. In fact, in biomolecular sequences high similarity usually implies significant functional or structural similarity. Traditional approaches use techniques that are based on sequence alignment able to measure character level differences. However, the recent developments of whole genome sequencing technology give rise to need of similarity measures able to capture the rearrangements involving large segments contained in the sequences. This paper is devoted to illustrate different methods recently introduced for the alignment-free comparison of biological sequences. Goal of the paper is both to highlight t…

Whole genome sequencingComputer sciencebusiness.industryApplied MathematicsSequence alignmentMachine learningcomputer.software_genreBioinformaticsMeasure (mathematics)GenomeDistance measuresSimilitudeTheoretical Computer ScienceArtificial IntelligenceSimilarity (psychology)Metric (mathematics)Artificial intelligencebusinesscomputerSoftwareInternational Journal of Approximate Reasoning
researchProduct

Parallel and Distributed Resource Allocation With Minimum Traffic Disruption for Network Virtualization

2017

Wireless network virtualization has been advocated as one of the most promising technologies to provide multifarious services and applications for the future Internet by enabling multiple isolated virtual wireless networks to coexist and share the same physical wireless resources. Based on the multiple concurrent virtual wireless networks running on the shared physical substrate, service providers can independently manage and deploy different end-users services. This paper proposes a new formulation for bandwidth allocation and routing problem for multiple virtual wireless networks that operate on top of a single substrate network to minimize the operation cost of the substrate network. We …

Wi-Fi arrayComputer scienceDistributed computingNetwork virtualizationresource allocationresursointi02 engineering and technologywireless network virtualizationcomputer.software_genre0203 mechanical engineering0202 electrical engineering electronic engineering information engineeringpreventive traffic disruptionResource managementElectrical and Electronic Engineeringta113distributed algorithmreititysta213Wireless networkbusiness.industry020206 networking & telecommunications020302 automobile design & engineeringWireless WANService providerVirtualizationWireless site surveyBandwidth allocationroutingResource allocationMulti-frequency networkThe InternetbusinessADMMcomputerMunicipal wireless networkComputer networkIEEE Transactions on Communications
researchProduct

Security in Mobile Wireless Sensor Networks – A Survey

2011

Published version of an article in the journal: Journal of Communications. Also available from the publisher at: http://dx.doi.org/10.4304/jcm.6.2.128-142. OA Thanks to recent advances in robotics, sensors and wireless communications, it is feasible to develop a variety of new architectures for Mobile Wireless Sensor Networks (MWSNs) that play an important role in various applications such as battlefield surveillance, harbor monitoring, etc. However, due to the dynamic of mobile network topology in MWSNs, many new security challenges have emerged. In this article, we give a survey on the state of the art technologies in security aspects of MWSNs. We review existing work that provides securi…

Wi-Fi arrayComputer sciencebusiness.industryWireless networkWireless WANComputer securitycomputer.software_genreKey distribution in wireless sensor networksWireless site surveymobile Wireless Sensor Network security Wireless Sensor NetworkNetwork Access ControlVDP::Technology: 500::Information and communication technology: 550::Telecommunication: 552Mobile wireless sensor networkElectrical and Electronic EngineeringbusinesscomputerWireless sensor networkComputer networkJournal of Communications
researchProduct

Offshore wind metadata management

2014

Offshore wind energy is gaining more and more attention from industry and research community due to its high potential in producing green energy and lowering price on electricity consumption. However, offshore wind is facing many challenges, and hence it is still expensive to install in large scale. It therefore needs to be considered from different aspects of technologies in order to overcome these challenges. One of the problems of the offshore wind is that information comes from different sources with diversity in types and format. Besides, there are existing wind databases that should be utilised in order to enrich the knowledge base of the wind domain. This paper describes an approach …

Wind powerDatabaseComputer sciencebusiness.industryLibrary and Information SciencesOntology (information science)computer.software_genreComputer Science ApplicationsMetadataOffshore wind powerKnowledge baseMetadata managementSystems engineeringSemantic technologybusinesscomputerInformation SystemsData integrationInternational Journal of Metadata, Semantics and Ontologies
researchProduct