Sentiment analysis of czech texts: An algorithmic survey

E Çano, O Bojar - arXiv preprint arXiv:1901.02780, 2019 - arxiv.org
In the area of online communication, commerce and transactions, analyzing sentiment polarity
of texts written in various natural languages has become crucial. While there have been a …

[PDF][PDF] SENTIMENT ANALYSIS ON SOCIAL NETWORKS IN CZECH AND SLOVAK (SYSTEMIC REVIEW)

J Syrovátková - IDIMT-2022, 2022 - epub.jku.at
… We are inspired by systemic review of Bhimani (2019). … amount of articles with the word
Czech/Slovak, but it could be Czech/Slovak author or Czech/Slovak conference and then the …

An opcode sequences analysis method for unknown malware detection

Z Sun, Z Rao, J Chen, R Xu, D He, H Yang… - Proceedings of the 2019 …, 2019 - dl.acm.org
One of the main challenges in security today is defending against unknown malware attacks
which have the potential to harm a computer or network. Hence, detecting malware has …

Software for automation of user requirements prioritization

A Sapunkov, T Afanasieva - Proceedings of the 2019 2nd international …, 2019 - dl.acm.org
This paper describes the system for automating the user requirements prioritization URPCalc.
A key feature is the presentation of user requirements as an estimation of priorities based …

Design patterns for personalization of healthcare process

A Vatian, S Dudorov, A Ivchenko, K Smirnov… - … of the 2019 2nd …, 2019 - dl.acm.org
Healthcare processes are nowadays one of the most important areas of information systems
development. Such systems should allow to personalize the treatment, ie take into account …

A memorization approach for test case generation in concurrent UML activity diagram

S Kamonsantiroj, L Pipanmaekaporn… - … of the 2019 2nd …, 2019 - dl.acm.org
Test case generation is the most important part of software testing. Currently, researchers
have used the UML activity diagram for test case generation. Testing concurrent system is …

A general framework of smart Open Linked Government Data: Application in E-health

L Sinif, B Bounabat - Proceedings of the 2019 2nd International …, 2019 - dl.acm.org
The exploitation of information is deeply rooted in major Government functions such as
service provisioning, inspection, and policy development. Open Government Data (OGD) …

Log analysis of 360-degree video users via MQTT

A Luoto - Proceedings of the 2019 2nd International Conference …, 2019 - dl.acm.org
Analyzing 360-degree video users is beneficial for 360-degree video application development.
The analysis can be done with logged user data. In this paper, we argue that MQTT is a …

Geospatial customer, competitor and supplier analysis for site selection of supermarkets

S Baumbach, C Rubel, S Ahmed… - Proceedings of the 2019 …, 2019 - dl.acm.org
Currently, there are rapid changes in the supermarket sector, as more and more companies
provide home delivery services of most of their products. Recently, perishable groceries are …

An ontological approach to specify conflicts among non-functional requirements

U Shah, S Patel, D Jinwala - Proceedings of the 2019 2nd International …, 2019 - dl.acm.org
It is a usual practice for a user to narrate the Non-Functional Requirements (NFRs) in natural
language and the requirements engineers manually try to express the same, using semi-…