672 Hits in 5.2 sec

Automatic URL completion and prediction using fuzzy type-ahead search

Jiannan Wang, Guoliang Li, Jianhua Feng
2009 Proceedings of the 32nd international ACM SIGIR conference on Research and development in information retrieval - SIGIR '09  
In this paper we study the problem of automatic URL completion and prediction using fuzzy type-ahead search.  ...  Supporting fuzzy search is very important when the user has limited knowledge about URLs. We describe the design and implementation of our method, and report the experimental results on Firefox.  ...  To address these problems, we propose a fuzzy type-ahead technique to support automatic URL completion and prediction.  ... 
doi:10.1145/1571941.1572052 dblp:conf/sigir/WangLF09 fatcat:ynts476pn5gvbgjcchjflw44uu

Efficient fuzzy type-ahead search in TASTIER

Guoliang Li, Shengyue Ji, Chen Li, Jiannan Wang, Jianhua Feng
2010 2010 IEEE 26th International Conference on Data Engineering (ICDE 2010)  
In this paper we study how to support fuzzy type-ahead search in TASTIER.  ...  TASTIER is a research project on the new information-access paradigm called type-ahead search, in which systems find answers to a keyword query on-the-fly as users type in the query.  ...  INTRODUCTION Keyword search is important in information systems. When using most Web search systems, a user types a complete query and waits for results from the server.  ... 
doi:10.1109/icde.2010.5447804 dblp:conf/icde/LiJLWF10 fatcat:soypddticrf3hjflfkxzjxcgya

Supporting efficient top-k queries in type-ahead search

Guoliang Li, Jiannan Wang, Chen Li, Jianhua Feng
2012 Proceedings of the 35th international ACM SIGIR conference on Research and development in information retrieval - SIGIR '12  
We extend our techniques to support fuzzy type-ahead search which allows minor errors between query keywords and answers.  ...  Type-ahead search can on-the-fly find answers as a user types in a keyword query.  ...  FUZZY TYPE-AHEAD SEARCH In this section, we first define the problem of top-k queries in fuzzy type-ahead search [13] .  ... 
doi:10.1145/2348283.2348333 dblp:conf/sigir/LiWLF12 fatcat:hl2m2z5hmbdhteio6s7xwichpe

Bioinformatics in the Post-genome Era

Ung-Sik Yu, Sung-Hoon Lee, Young-Joo Kim, Sang-Soo Kim
2004 BMB Reports  
Here we review what computational challenges are ahead and what are the new exciting developments in this exciting field.  ...  Now with the complete genome sequences of human and other species in hand, detailed analyses of the genome sequences will undoubtedly improve our understanding of biological systems and at the same time  ...  Fig. 2 . 2 Protein structure prediction techniques are of three main types: comparative modeling, fold recognition, and de novo prediction.  ... 
doi:10.5483/bmbrep.2004.37.1.075 pmid:14761305 fatcat:bc5dliqnvfeonirhi57fks4f2i

MobiDB 3.0: more annotations for intrinsic disorder, conformational diversity and interactions in proteins

Damiano Piovesan, Francesco Tabaro, Lisanna Paladin, Marco Necci, Ivan Mičetić, Carlo Camilloni, Norman Davey, Zsuzsanna Dosztányi, Bálint Mészáros, Alexander M Monzon, Gustavo Parisi, Eva Schad (+5 others)
2017 Nucleic Acids Research  
Predictions have been expanded to provide new types of annotation on backbone rigidity, secondary structure preference and disordered binding regions.  ...  The MobiDB (URL: database of protein disorder and mobility annotations has been significantly updated and upgraded since its last major renewal in 2014.  ...  ACKNOWLEDGEMENTS We acknowledge ELIXIR-IIB (, the Italian Node of the European ELIXIR infrastructure (, for supporting the development and maintenance of MobiDB.  ... 
doi:10.1093/nar/gkx1071 pmid:29136219 pmcid:PMC5753340 fatcat:ctjxsg7edzee7mdg24psbx667u

Scalable Models For Probabilistic Forecasting With Fuzzy Time Series

Petrônio Cândido De Lima E Silva, Frederico Gadelha Guimarões, Hossein Javedani Sadaei
2019 Zenodo  
forecasting of mono and multivariate time series, for oneto many steps ahead.  ...  Finally the proposed methods are compared with the mainFuzzy Time Series techniques and other literature approaches using environmental andstock market data.  ...  The complete hyper-parameter optimization method also requires the choosing of the distribution type and the parameters presented in Table 29 .  ... 
doi:10.5281/zenodo.3374641 fatcat:u7adfrsuyvgsfh37g4ushe7tey

Detecting Cross-Site Scripting in Web Applications Using Fuzzy Inference System

Bakare K. Ayeni, Junaidu B. Sahalu, Kolawole R. Adeyanju
2018 Journal of Computer Networks and Communications  
This paper describes the method implemented based on fuzzy logic to detect classic XSS weaknesses and to provide some results on experimentations.  ...  With improvement in computing and technological advancements, web-based applications are now ubiquitous on the Internet.  ...  Among the several types of fuzzy inference systems, the Mamdani fuzzy inference system is the most popular, powerful, and widely used methodology in developing fuzzy models and analyzing data [15] .  ... 
doi:10.1155/2018/8159548 fatcat:v3w6wyo4u5h43fxazm6wgd6o3i

The Fuzzy Experiment Approach for Detection and Prevention of Phishing attacks in online Domain

Bashir ., Tenuche Agbata B.C, Emmanuel Ogala, William Obeng-Denteh
2020 East African Scholars Journal of Engineering and Computer Sciences  
The proposed model uses fuzzy logic to define rules and assign linguistic indicators in the form of if-then rules to each phishing criteria.  ...  The use of blacklists and whitelists has their limitations due to poor scalability and time constraint.  ...  The URL address is used here and a plot of the fuzzy membership functions displayed.  ... 
doi:10.36349/easjecs.2020.v03i10.001 fatcat:lacvr6aoxjg4xp474uez2nd6bu

The Cluster Algorithm by View Degree Matrix and the Application for the Recommend of Tourism Product Marketing

Xiu Zhiying
2016 International Journal of Database Theory and Application  
of mathematical method, the paper uses the k-means clustering algorithm to realize the tourists clustering, to get the tourists' demand and then to realize the intelligent push.  ...  and the actual situation of tourism product marketing at home and abroad, under the premise of the tourists demands, the paper builds the matrix about tourism product view degree, and through a series  ...  Acknowledgments We acknowledgment the foundation of the research projects: the key technology research project of Jilin province Science and Technology Agency named "The research and development of Jinlin  ... 
doi:10.14257/ijdta.2016.9.9.23 fatcat:5sp3t7uey5cb5efrwyyjhschva

Automated Kernel Independent Component Analysis Based Two Variable Weighted Multi-view Clustering for Complete and Incomplete Dataset

M. Kalaiarasu, R. Radhakrishnan
2015 Research Journal of Applied Sciences Engineering and Technology  
The NSTVWC framework is to bid a remedy for the mixed attributes multiview clustering problem, the potential of various mode of existing clustering algorithms and features of different types of complete  ...  For view and variable weight estimation, centroid values of the subspace clustering methods are optimized based on Stepsizesteepest descent (SSD) and Fuzzy Artificial Fish Swarm (FAFS) Optimization algorithm  ...  Generalization to over two types of complete and incomplete dataset with one complete and remaining incomplete dataset can be performed in aanalogous way.  ... 
doi:10.19026/rjaset.9.2611 fatcat:e5ffpc5nfvgeniejisuyklhjje

Requisite for Web Usage Mining – A Survey

Sindhu P Menon, Nagaratna P Hegde
2013 International Journal of Computer Science and Informatics  
An indispensable tool for the webmaster, it has, nevertheless, a long road ahead in which visualisation plays an important role.  ...  The World Wide Web (Web) has been providing an important and indispensable platform for receiving information and disseminating information as well as interacting with society on the Internet.  ...  This can further be divided into Hyperlinks and Document Structure based on the type of structural data used.  ... 
doi:10.47893/ijcsi.2013.1120 fatcat:ejp2crvfijcgfnjb4booepkcp4

Efficient fuzzy full-text type-ahead search

Guoliang Li, Shengyue Ji, Chen Li, Jianhua Feng
2011 The VLDB journal  
One of them has been deployed to support type-ahead search on the UC Irvine people directory, which has been used regularly and well received by users due to its friendly interface and high efficiency.  ...  We develop novel techniques to support fuzzy search by allowing mismatches between query keywords and answers. We have deployed several real prototypes using these techniques.  ...  Fuzzy type-ahead search: Different from exact type-ahead search, the query answer of fuzzy type-ahead search is a set of records r in R such that for each query keyword p i , record r contains a word with  ... 
doi:10.1007/s00778-011-0218-x fatcat:vcwaagfb7baedkcoc35t4ccy44

Detecting malicious URLs using binary classification through adaboost algorithm

Firoz Khan, Jinesh Ahamed, Seifedine Kadry, Lakshmana Kumar Ramasamy
2020 International Journal of Electrical and Computer Engineering (IJECE)  
It is crucial to identify and appropriately respond to such URLs. Usually, this discovery is made by the practice and use of blacklists in the cyber world.  ...  Malicious URLs are used to extract unsolicited information and trick inexperienced end users as a sufferer of scams and create losses of billions of money each year.  ...  In this study, we have developed a complete prototype on Malicious URL Detection using machine learning methods.  ... 
doi:10.11591/ijece.v10i1.pp997-1005 fatcat:mi7d4llgg5d6joxbbpnymbalje

A Novel Universal Solar Energy Predictor [article]

Nirupam Bidikar, Kotoju Rajitha, P. Usha Supriya
2019 arXiv   pre-print
For this use, this paper predicts the daily total energy generation of an installed solar program using the Naive Bayes classifier.  ...  Thus, the solar energy prediction is an inevitable necessity to optimize solar energy and also to improve the efficiency of solar energy systems.  ...  [10] proposed the adaptive neuro-fuzzy inference method for solar power prediction using relative humidity, mean sea level, dry-bulb fever and wet-bulb temperature parameters.  ... 
arXiv:1902.06660v2 fatcat:ihabx3l3qrcgnp5ybbcwvufldy

Programming support and adaptive checkpointing for high-throughput data services with log-based recovery

Jingyu Zhou, Caijie Zhang, Hong Tang, Jiesheng Wu, Tao Yang
2010 2010 IEEE/IFIP International Conference on Dependable Systems & Networks (DSN)  
This paper describes the design and API of SLACH, adaptive checkpoint control, and our experiences and experiments in using SLACH at  ...  SLACH adaptively adjusts checkpointing frequency based on log growth and throughput demand to balance between runtime overhead and recovery speed.  ...  Meta data of different URLs is highly independent and these URLs are partitioned among machines.  ... 
doi:10.1109/dsn.2010.5545015 dblp:conf/dsn/ZhouZTWY10 fatcat:od5k55rewvd43bclunlqr2c3ie
« Previous Showing results 1 — 15 out of 672 results