Filters








88,729 Hits in 4.4 sec

How to Utilize Big Data for Business Intelligence in the Stock Market

Walaa Bajunaid, Maram Meccawy
2017 International Journal of Computer Applications  
This paper discusses the possible uses of big data for business intelligence by investors in the stock market. General Terms Your Big Data, Business Intelligence.  ...  Due to the bulk and nature of such data, several data mining technologies have been developed and employed in their collection, classification, storage and analysis, putting them in a form that is useful  ...  The data from the social media has great influence nowadays and may assist in predicting the stock market trends.  ... 
doi:10.5120/ijca2017914112 fatcat:zseeye7nobdd3nkkp4igxjb33i

Loneliness Kills: Can Autonomous Systems and Robotics Assist in Providing Solutions?

Tauseef Gulrez, Samia Neftimeziani
2015 International Journal of Swarm Intelligence and Evolutionary Computation  
In this editorial, we introduce the concept of an autonomous assistive system (AAS), which aims to develop an unprecedented socially intelligent system, thereby helping to pave the way for the deployment  ...  This system utilizes the classification models by using acoustic features. We trained the models using different speech corpus.  ...  In this editorial, we introduce the concept of an autonomous assistive system (AAS), which aims to develop an unprecedented socially intelligent system, thereby helping to pave the way for the deployment  ... 
doi:10.4172/2090-4908.1000e113 fatcat:xu2xq53cdreyvhg2kukqp5pcri

Content is Dead ... Long Live Content: The New Age of Multimedia-Hard Problems

Lexing Xie, David A. Shamma, Cees Snoek
2014 IEEE Multimedia  
Second, an MM-hard approach lets us transfer and extend known solutions.  ...  This problem classification terminology found its way into artificial intelligence in the early 1990s. The terms AIhard or AI-complete 2 are used to describe the difficult problems in AI.  ... 
doi:10.1109/mmul.2014.5 fatcat:dgtomvfc7bgtjjfx3z6eggrztq

Integrating machine learning and open data into social Chatbot for filtering information rumor

I-Ching Hsu, Chun-Cheng Chang
2020 Journal of Ambient Intelligence and Humanized Computing  
The binary classification accuracy was 0.769, which indicates that the proposed approach accurately classifies using the developed FSIP.  ...  We propose a general architecture that integrates machine learning and open data with a Chatbot and is based cloud computing (MLODCCC), which can assist users in evaluating information authenticity on  ...  In contrast, deep learning approach (Bhuvaneswari and In this study, we integrated machine learning approach and open data with social chatbot to assist users evaluating the information authenticity  ... 
doi:10.1007/s12652-020-02119-3 pmid:32837593 pmcid:PMC7239608 fatcat:xmjxohe7ujhwdgzlqzig3sjhxy

Living assistance systems

Jürgen Nehmer, Martin Becker, Arthur Karshmer, Rosemarie Lamm
2006 Proceeding of the 28th international conference on Software engineering - ICSE '06  
In this paper, we present an integrated system concept for the living assistance domain based on ambient intelligence technology and discuss the resulting challenges for the software engineering discipline  ...  Automated living assistance systems represent a promising approach for the prolongation of an independent and self-conducted life of handicapped and elderly people thereby, enhancing their quality of life  ...  ACKNOWLEDGEMENTS The work presented in this paper was (partially) carried out in the BelAmI (Bilateral German-Hungarian Research Collaboration on Ambient Intelligence Systems) project, funded by the German  ... 
doi:10.1145/1134285.1134293 dblp:conf/icse/NehmerBKL06 fatcat:smtdd2wuqjgm3dgimese4cwjhe

AI assisted Malware Analysis: A Course for Next Generation Cybersecurity Workforce [article]

Maanak Gupta, Sudip Mittal, Mahmoud Abdelsalam
2020 arXiv   pre-print
datasets to learn about Cyber Threat Intelligence (CTI), malware analysis, and classification, among other important topics in cybersecurity.  ...  The use of Artificial Intelligence (AI) and Machine Learning (ML) to solve cybersecurity problems has been gaining traction within industry and academia, in part as a response to widespread malware attacks  ...  Adversarial training is an approach where a model is retrained using adversarial examples so that the model will not be fooled by such examples.  ... 
arXiv:2009.11101v1 fatcat:jdqtzpffdbbtxfmqpg5o654uma

CHARET: Character-centered Approach to Emotion Tracking in Stories [article]

Diogo S. Carvalho, Joana Campos, Manuel Guimarães, Ana Antunes, João Dias, Pedro A. Santos
2021 arXiv   pre-print
Autonomous agents that can engage in social interactions witha human is the ultimate goal of a myriad of applications.  ...  We show that by identifyingactors and objects of events and considering the emotional stateof the characters, we can achieve better performance in this task,when compared to end-to-end approaches.  ...  CONCLUSION Advances in NLP have propelled the use of Intelligent Virtual Agents in a myriad of contexts, in particular in the role of automated assistants.  ... 
arXiv:2102.07537v2 fatcat:kitdlzl7onfslatrvi4vfircjy

User Perception on Mixed Attribute of Intelligent Product According to Product Usage Context

Dahyun Kang, Min-Gyu Kim, Sonya S. Kwak
2017 International Journal of Human and Smart Device Interaction  
In this study, we examined user perception on intelligent products according to product usage context by using examples of intelligent products with mixed attributes of behavior inducement and behavior  ...  was more useful than the behavior assistance toothbrush.  ...  Since this is an intelligent footstool that automatically approaches to user, it is unnecessary for users to make an effort to move it [10] .  ... 
doi:10.21742/ijhsdi.2017.4.1.03 fatcat:hqmt324q55g6bnylvihln2hz4m

Intelligent Estimation of Social Media Sentimental Features using Deep Learning with Natural Language Processing Strategies

Sarojini Yarramsetti, Anvar Shathik J, Renisha. P.S.
2021 VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE  
So, that this approach of IDLVEP identifies the harmful contents from the user tweets and remove that in an intelligent manner by using the proposed approach classification strategies.  ...  The association of such Deep Learning and Natural Language Processing provides an efficient approach to build the powerful data processing model to identify the sentimental features from the social networking  ...  issues in an intelligent manner.  ... 
doi:10.35940/ijitee.f8825.0410621 fatcat:42n2sgzx4rhy7jnuwo4m2xgu5u

Anwendung der Konzeptanalyse und ontologische Modellierung in der Wirtschaftsinformatik: Vorwort [chapter]

Heinz Dreher, Torsten Reiners, Stefan Voß, Robert Williams
2010 Multikonferenz Wirtschaftsinformatik 2010  
One popular approach for progressing issues relating to concept 'understanding' being used in recent times is ontology based.  ...  Ontologies are an explicit, formal specification of common conceptual classification schemes and generally describe a hierarchy of concepts using a subsumption relation.  ...  Assisting the Discovery and Reuse of Document-based Knowledge using Semantic Metadata by Hinnerk Brügmann illustrates the basis for an approach to assist in the enterprise wide lifecycle management of  ... 
doi:10.17875/gup2010-1365 fatcat:oawhx26j75hyljti7vih6oumc4

Intelligent environments for all: a path towards technology-enhanced human well-being

Laura Burzagli, Pier Luigi Emiliani, Margherita Antona, Constantine Stephanidis
2021 Universal Access in the Information Society  
of design approaches targeted to assist people in their everyday life mainly (but not exclusively) in the home environment.  ...  AbstractEmerging intelligent environments are considered to offer significant opportunities to positively impact human life, both at an individual and at a societal level, and in particular to provide  ...  social approach.  ... 
doi:10.1007/s10209-021-00797-0 pmid:33746688 pmcid:PMC7956403 fatcat:iyw27cxtw5bd7poyahxraclxei

Ubiquitous computing for health applications

Oresti Banos, Ramón Hervás
2018 Journal of Ambient Intelligence and Humanized Computing  
In "Methodology for improving classification accuracy using ontologies: application in the recognition of activities of daily living" (Salguero et al. 2018 ) the authors present a semantics-based approach  ...  For example, the choice of features has a high impact on the performance of the classification model.  ... 
doi:10.1007/s12652-018-0875-3 fatcat:la4sfyvilvhgjfri5grgejbggy

Towards an Ontology of Cognitive Assistants

Torsten Maier, Jessica Menold, Christopher McComb
2019 Proceedings of the International Conference on Engineering Design  
Specifically, the four suggested classes include: learning, intelligence, autonomy, and communication. Various assistants are described and categorized using the proposed system.  ...  However, the lack of standardization and classification within the field impedes critical analysis of existing cognitive assistants and may further inhibit their growth into more useful applications.  ...  For example, natural interaction, collaborating, communicative ability, and sociality are all synonymous.  ... 
doi:10.1017/dsi.2019.270 fatcat:q6ihg7hxmzazdixtjmipktx6se

Autonomous Systems and Artificial Intelligence – Hype or Prerequisite for P5 Medicine? [chapter]

Bernd Blobel, Pekka Ruotsalainen, Mathias Brochhausen
2021 Studies in Health Technology and Informatics  
of intelligent and autonomous systems.  ...  care systems around the globe undergo an organizational, methodological and technological transformation towards personalized, preventive, predictive, participative precision medicine (P5 medicine).  ...  Most of current AI applications follow the weak AI (narrow AI) approach, usually just replicating human intelligence in the specific context such as simple classification, pattern recognition and assistive  ... 
doi:10.3233/shti210567 pmid:34734847 fatcat:5buoj34g2nfejekink3tc4rsba

Detecting Illicit Drugs on Social Media Using Automated Social Media Intelligence Analysis (ASMIA) [chapter]

Paul A. Watters, Nigel Phair
2012 Lecture Notes in Computer Science  
While social media is a new and exciting technology, it has the potential to be misused by organized crime groups and individuals involved in the illicit drugs trade.  ...  This paper presents a new methodology for automating social media data, and presents two pilot studies into its use for detecting marketing and distribution of illicit drugs targeted at Australians.  ...  In this paper, we consider how social media technologies could be used to enhance criminal activity, and develop a generic approach to implement an intelligence based approach to understand the extent  ... 
doi:10.1007/978-3-642-35362-8_7 fatcat:cmcu5hous5eejdp2uk2xxbwhtu
« Previous Showing results 1 — 15 out of 88,729 results