The data and information available in most community environments is complex in nature. Sentimental data resources may possibly consist of textual data collected from multiple information sources with different representations and usually handled by different analytical models. These types of data resource characteristics can form multi-view polarity textual data. However, knowledge creation from this type of sentimental textual data requires considerable analytical efforts and capabilities. In particular, data mining practices can provide exceptional results in handling textual data formats. Besides, in the case of the textual data exists as multi-view or unstructured data formats, the hybrid and integrated analysis efforts of text data mining algorithms are vital to get helpful results. The objective of this research is to enhance the knowledge discovery from sentimental multi-view textual data which can be considered as unstructured data format to classify the polarity information documents in the form of two different categories or types of useful information. A proposed framework with integrated data mining algorithms has been discussed in this paper, which is achieved through the application of X-means algorithm for clustering and HotSpot algorithm of association rules. The analysis results have shown improved accuracies of classifying the sentimental multi-view textual data into two categories through the application of the proposed framework on online polarity user-reviews dataset upon a given topics.
Abstract:In this article author proposes a new solution in the field of distributed computing needs, humans" requirements of new ways for developing technologies that increase information systems distribution horizontally and decrease the power consumption and delay time vertically. The author presents in detail the distributed computing concepts, types and some examples like Condor system of distribution and the proposal for developing.
Today an E-mail service is one principal tool in our daily work and life. We cannot dispense Email services. Spammers continue to develop their techniques to flood our inbox daily. On the other hand, websites are created to be in different types of different goals like news, sports, environments, staticialists, governments, etc. Websites may be in its environments, static sites, programs, or databases, and very often a combination of the three integrating relational databases as a back-end. Websites require intensive care in configuration and programming to assure a security factor, confidentiality, and trustworthiness of the published information. Most websites have many scripts that give visitors elastic options to share some subject's links URL with their friends one of that by using a tell a friend form. One of most well-known attacks over the internet is done by SQL-injection, though SQL-injections back to exploits, weak validation of textual input that is used to build tell friend scripts which cause dangerous attacks threat email user's privacy through cheating attacks. In this paper, the author aims to analyse a tell friend exploit and proposes a solution to stop this exploit. Category: Information Security.
In this paper, the author presents an abstract model of a computable machine that is passive to inputs. The model is conceptually a deaf machine that is basically an automaton that does not have any acceptance state. The Deaf machine may have one or more normal states and can even have infinite states (uncountable normal states). The Machine can not recognize any language either formal informal. The Proposed model is a finite state machine without the accept state and cannot recognize any language.
In this study, a general overview of the current trend wireless network has been presented the explosive parallel growth of both the Internet and cellular telephone services are becoming the two most important phenomena that impact the required modern feasible and secure telecommunications. A wireless service technology has become well-known in technology markets. WLAN implemented the development of the wired LAN. Industries produce the required components, which lead to the fast developments in designing and implementing of such networks. The merging of wireless network deemed to be a solution to some of the problems of the wired networks. In this survey study, we will try to discuss the advantages of wireless devices and indicate the challenges involved in this technology from the point of view of its foundation, architecture, requirements, its components, and protocols.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.