Feasibility of automated detection of HONcode conformity for health-related websites
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2014, Vol 5, Issue 3
Abstract
In this paper, authors evaluate machine learning algorithms to detect the trustworthiness of a website according to HONcode criteria of conduct (detailed in paper). To derive a baseline, we evaluated a Naive Bayes algorithm, using single words as features. We compared the baseline algorithm’s performance to that of the same algorithm employing different feature types, and to the SVM algorithm. The results demonstrate that the most basic configuration (Naive Bayes, single word) could produce a 0.94 precision for “easy” HON criteria such as “Date”. Conversely, for more difficult HON criteria “Justifiability”, we obtained precision of 0.68 by adjusting the system parameters such as algorithm (SVM) and feature types (W2).[sub][/sub]
Authors and Affiliations
Célia Boyer, Ljiljana Dolamic
Hashtag the Tweets: Experimental Evaluation of Semantic Relatedness Measures
On Twitter, hashtags are used to summarize topics of the tweet content and to help search tweets. However, hashtags are created in a free style and thus heterogeneous, increasing difficulty of their usage. Therefore, it...
Performance Analysis & Comparison of Optimal Economic Load Dispatch using Soft Computing Techniques
Power plants not situated at similar space from center of loads and their fuel prices are dissimilar. In this paper, ELD of actual power generation measured.ELD is preparation of generators to reduce total functioning pr...
Hierarchical Cellular Structures in High-Capacity Cellular Communication Systems
In the prevailing cellular environment, it is important to provide the resources for the fluctuating traffic demand exactly in the place and at the time where and when they are needed. In this paper, we explored the abil...
An Immunity-based Error Containment Algorithm for Database Intrusion Response Systems
The immune system has received a special attention as a potential source of inspiration for innovative approaches to solve database security issues and build artificial immune systems. Database security issues need to be...
An Approach to Keep Credentials Secured in Grid Computing Environment for the Safety of Vital Computing Resources
Presently security attacks have aimed to vulnerabilities in repetitive-use authentication secrets like static passwords. The passwords are used by user in clients side are vulnerable, as the attackers can gain access to...