首页 > 最新文献

4th International Conference on New Trends in Information Science and Service Science最新文献

英文 中文
A two-layered P2P model for semantic service discovery 用于语义服务发现的两层P2P模型
Zhi-zhong Liu, Yulan Liu, Yihui He
Semantic-enabled service discovery aggravating the load of service register and decrease the performance of service matching while increasing the recall and precision of service discovery. To decrease the load of register and the performance of service discovery, a two layered P2P model, is introduced in this article. Based on the model, a service discovery algorithm composed of two stages and three steps is proposed. The model is suitable for open environment with multiple coexistent ontologies. And experimental results show that given appropriate setting, the model makes a tradeoff between recall and responding time during service discovery. In addition, the model decreases the mean load of registers efficiently while holding Recall.
支持语义的服务发现在提高服务发现的召回率和精度的同时,加重了服务注册器的负载,降低了服务匹配的性能。为了降低注册器的负载和服务发现的性能,本文提出了一种双层P2P模型。在此基础上,提出了一种两阶段三步骤的服务发现算法。该模型适用于多个本体共存的开放环境。实验结果表明,在适当的设置下,该模型在服务发现的召回和响应时间之间进行了权衡。此外,该模型在保持召回率的同时有效地降低了寄存器的平均负载。
{"title":"A two-layered P2P model for semantic service discovery","authors":"Zhi-zhong Liu, Yulan Liu, Yihui He","doi":"10.1360/JOS181922","DOIUrl":"https://doi.org/10.1360/JOS181922","url":null,"abstract":"Semantic-enabled service discovery aggravating the load of service register and decrease the performance of service matching while increasing the recall and precision of service discovery. To decrease the load of register and the performance of service discovery, a two layered P2P model, is introduced in this article. Based on the model, a service discovery algorithm composed of two stages and three steps is proposed. The model is suitable for open environment with multiple coexistent ontologies. And experimental results show that given appropriate setting, the model makes a tradeoff between recall and responding time during service discovery. In addition, the model decreases the mean load of registers efficiently while holding Recall.","PeriodicalId":250833,"journal":{"name":"4th International Conference on New Trends in Information Science and Service Science","volume":"2 s1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130661778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Trustable web services with dynamic confidence time interval 具有动态信任时间间隔的可信任web服务
Nalinrat Srirajun, Pattarasinee Bhatarakosol, P. Tantasanawong, Sunyoung Han
One part of trustfulness on web services application over the network is confidence of services that providers can guarantee to their customers. Therefore, after the development process, web services developers must be sure that the delivered services are qualified for availability and reliability during their execution. However, there is a critical problem when errors occur during the execution time of the service agent, such as the infinite loop problem in the service process. This unexpected problem of the web services software can cause critical damages in various aspects, especially lives and dead of people. Although there are various methods have been proposed to protect the unexpected errors, most of them are procedures in the verification and validation during the development processes. Nevertheless, these methods cannot completely solve the inifnite loop problem since this problem is usually occurred by an unexpected values obtained from the execution of request and response processes . Therefore, this paper proposed a system architecture includes with a protection mechanism that completely detect and protect the unbound loop problem of web services when request services of each requester are under the dynamic situation. This proposed solution can guarantee that users will definitly be protected from a critical lost occurred from the unexpected infinite loop of the web services system. Consequently, all service agents with dynamic loop control condition can be trustable.
网络上的web服务应用程序的可信性的一部分是提供商可以向其客户保证的服务的信心。因此,在开发过程之后,web服务开发人员必须确保交付的服务在执行过程中具有可用性和可靠性。但是,当服务代理在执行过程中出现错误时,会出现一个严重的问题,例如服务过程中的无限循环问题。这种意想不到的问题会给web服务软件的各个方面造成严重的损失,尤其是生命和死亡。尽管已经提出了各种方法来保护意外错误,但大多数方法都是开发过程中的验证和确认过程。然而,这些方法不能完全解决无限循环问题,因为这个问题通常是由执行请求和响应过程获得的意外值引起的。因此,本文提出了一种包含保护机制的系统架构,该机制可以在每个请求者的请求服务处于动态状态时完全检测和保护web服务的未绑定循环问题。提出的解决方案可以保证用户绝对不会因web服务系统的意外无限循环而发生重大丢失。因此,所有具有动态回路控制条件的服务代理都是可信的。
{"title":"Trustable web services with dynamic confidence time interval","authors":"Nalinrat Srirajun, Pattarasinee Bhatarakosol, P. Tantasanawong, Sunyoung Han","doi":"10.4156/AISS.VOL3.ISSUE4.7","DOIUrl":"https://doi.org/10.4156/AISS.VOL3.ISSUE4.7","url":null,"abstract":"One part of trustfulness on web services application over the network is confidence of services that providers can guarantee to their customers. Therefore, after the development process, web services developers must be sure that the delivered services are qualified for availability and reliability during their execution. However, there is a critical problem when errors occur during the execution time of the service agent, such as the infinite loop problem in the service process. This unexpected problem of the web services software can cause critical damages in various aspects, especially lives and dead of people. Although there are various methods have been proposed to protect the unexpected errors, most of them are procedures in the verification and validation during the development processes. Nevertheless, these methods cannot completely solve the inifnite loop problem since this problem is usually occurred by an unexpected values obtained from the execution of request and response processes . Therefore, this paper proposed a system architecture includes with a protection mechanism that completely detect and protect the unbound loop problem of web services when request services of each requester are under the dynamic situation. This proposed solution can guarantee that users will definitly be protected from a critical lost occurred from the unexpected infinite loop of the web services system. Consequently, all service agents with dynamic loop control condition can be trustable.","PeriodicalId":250833,"journal":{"name":"4th International Conference on New Trends in Information Science and Service Science","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124809163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Modeling social ties with an object oriented approach 用面向对象的方法建模社会关系
Pub Date : 2010-05-11 DOI: 10.4156/IJACT.VOL3.ISSUE11.33
Bo Zhou, Chao Wu
With the widely usage of online social networks, people come to realize the necessity of making the social network more semantic. However, the lack of definition of connections hinders the fully applications of online social networks and transform them towards more semantic way. So in this paper, we try to overcome this problem by modeling the social tie connection in online social networks with an object-oriented approach based on extended RDF vocabulary. In our method, the connections are modeled as object entity, with attributes describing their content, and operations defining the legal manipulation upon them. The connections have inheritance relationships between them and thus form an inheritance tree. We presented our consideration in designing the object-oriented model of connection; and developed a prototype to show its advantages over the traditional approach.
随着在线社交网络的广泛使用,人们逐渐意识到使社交网络更具语义化的必要性。然而,连接定义的缺失阻碍了在线社交网络的充分应用,使其向更语义化的方向转变。因此,在本文中,我们试图通过使用基于扩展RDF词汇表的面向对象方法对在线社交网络中的社会联系进行建模来克服这个问题。在我们的方法中,连接被建模为对象实体,具有描述其内容的属性和定义对其进行合法操作的操作。连接之间具有继承关系,从而形成继承树。提出了在设计面向对象的连接模型时的考虑;并开发了一个原型来展示它比传统方法的优势。
{"title":"Modeling social ties with an object oriented approach","authors":"Bo Zhou, Chao Wu","doi":"10.4156/IJACT.VOL3.ISSUE11.33","DOIUrl":"https://doi.org/10.4156/IJACT.VOL3.ISSUE11.33","url":null,"abstract":"With the widely usage of online social networks, people come to realize the necessity of making the social network more semantic. However, the lack of definition of connections hinders the fully applications of online social networks and transform them towards more semantic way. So in this paper, we try to overcome this problem by modeling the social tie connection in online social networks with an object-oriented approach based on extended RDF vocabulary. In our method, the connections are modeled as object entity, with attributes describing their content, and operations defining the legal manipulation upon them. The connections have inheritance relationships between them and thus form an inheritance tree. We presented our consideration in designing the object-oriented model of connection; and developed a prototype to show its advantages over the traditional approach.","PeriodicalId":250833,"journal":{"name":"4th International Conference on New Trends in Information Science and Service Science","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126671086","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Sequential mining equips e-Health with knowledge for managing diabetes 顺序挖掘设备e-Health与管理糖尿病的知识
Pub Date : 2010-05-11 DOI: 10.4156/IJIPM.VOL2.ISSUE3.9
Sophia Banu Rahaman, M. Shashi
Internet mediated health education and support offers several advantages. The convenience and ease of access to information is mesmerizing the healthcare sector setting the trend for e-Health. This was in an attempt to convey the promises, principles, excitement around e-commerce to the health arena, and give an account of the new possibilities the Internet is opening up to the area of health care virtually collaborating everything related to computers and medicine. The healthcare environment is generally ‘information rich’ but ‘knowledge poor’. There is a wealth of data available within the healthcare systems but they lack effective analysis tools to discover hidden relationships and trends in data. Valuable knowledge can be discovered with the application of sequential mining technique to equip patients with knowledge for managing health for disease specific better care and understanding through e-Health.
互联网媒介的健康教育和支持提供了几个优势。获取信息的方便性和便利性吸引了医疗保健部门,为电子医疗设定了趋势。这是为了将电子商务的承诺、原则和兴奋传达给医疗领域,并说明互联网为医疗保健领域开辟的新的可能性,实际上是将与计算机和医学有关的一切都结合起来。医疗保健环境通常是“信息丰富”,但“知识贫乏”。医疗保健系统中有大量可用的数据,但它们缺乏有效的分析工具来发现数据中隐藏的关系和趋势。通过应用顺序挖掘技术,可以发现有价值的知识,使患者掌握通过电子保健管理特定疾病的健康的知识,从而获得更好的护理和理解。
{"title":"Sequential mining equips e-Health with knowledge for managing diabetes","authors":"Sophia Banu Rahaman, M. Shashi","doi":"10.4156/IJIPM.VOL2.ISSUE3.9","DOIUrl":"https://doi.org/10.4156/IJIPM.VOL2.ISSUE3.9","url":null,"abstract":"Internet mediated health education and support offers several advantages. The convenience and ease of access to information is mesmerizing the healthcare sector setting the trend for e-Health. This was in an attempt to convey the promises, principles, excitement around e-commerce to the health arena, and give an account of the new possibilities the Internet is opening up to the area of health care virtually collaborating everything related to computers and medicine. The healthcare environment is generally ‘information rich’ but ‘knowledge poor’. There is a wealth of data available within the healthcare systems but they lack effective analysis tools to discover hidden relationships and trends in data. Valuable knowledge can be discovered with the application of sequential mining technique to equip patients with knowledge for managing health for disease specific better care and understanding through e-Health.","PeriodicalId":250833,"journal":{"name":"4th International Conference on New Trends in Information Science and Service Science","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133379690","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Obscene image detection algorithm using high-and low-quality images 淫秽图像检测算法利用高、低质量图像
Myoungbeom Chung, Il-Ju Ko, Daesik Jang
Obscene image detection refers to the process of identifying obscene and pornographic portions in images previously extracted from a given video file; a process that constitutes the core of the broader obscene-video filtering system. Existing obscene-image detection methods rely on information about image texture such as RGB proportions, color-distribution histograms, and YIG to track the skin-color and edge information of the image concerned. Existing methods, however, are not very accurate when it comes to determining the obscenity level in low-quality UCC videos. This paper proposes an improved method that first utilizes Canny Edge to analyze the fine grains of the image to determine whether the image is of high or low quality, and then employs to determine whether the image passes the final obscenity test. In order to check for the efficacy of this method, an arbitrarily selected batch of images was first put through the Canny Edge test to separate the batch into two groups based on the image-quality level. The images were then tested for their obscenity levels twice, first with an existing method and then with the method proposed in this paper. Results were then analyzed, which showed that the new method yielded results that were about 10% more accurate.
淫秽图像检测,是指从给定的视频文件中预先提取的图像中识别淫秽和色情部分的过程;这个过程构成了更广泛的淫秽视频过滤系统的核心。现有的淫秽图像检测方法依赖于RGB比例、颜色分布直方图、YIG等图像纹理信息来跟踪相关图像的肤色和边缘信息。然而,现有的方法在确定低质量UCC视频的淫秽程度时并不十分准确。本文提出了一种改进的方法,首先利用Canny Edge对图像的细颗粒进行分析,确定图像的质量是高还是低,然后利用Canny Edge来确定图像是否通过最终的淫秽性测试。为了检验该方法的有效性,首先对任意选择的一批图像进行Canny Edge测试,根据图像质量水平将这批图像分成两组。然后对图像进行两次淫秽水平测试,首先使用现有方法,然后使用本文提出的方法。然后对结果进行分析,结果表明,新方法产生的结果准确度提高了10%左右。
{"title":"Obscene image detection algorithm using high-and low-quality images","authors":"Myoungbeom Chung, Il-Ju Ko, Daesik Jang","doi":"10.4156/IJEI.VOL2.ISSUE1.2","DOIUrl":"https://doi.org/10.4156/IJEI.VOL2.ISSUE1.2","url":null,"abstract":"Obscene image detection refers to the process of identifying obscene and pornographic portions in images previously extracted from a given video file; a process that constitutes the core of the broader obscene-video filtering system. Existing obscene-image detection methods rely on information about image texture such as RGB proportions, color-distribution histograms, and YIG to track the skin-color and edge information of the image concerned. Existing methods, however, are not very accurate when it comes to determining the obscenity level in low-quality UCC videos. This paper proposes an improved method that first utilizes Canny Edge to analyze the fine grains of the image to determine whether the image is of high or low quality, and then employs to determine whether the image passes the final obscenity test. In order to check for the efficacy of this method, an arbitrarily selected batch of images was first put through the Canny Edge test to separate the batch into two groups based on the image-quality level. The images were then tested for their obscenity levels twice, first with an existing method and then with the method proposed in this paper. Results were then analyzed, which showed that the new method yielded results that were about 10% more accurate.","PeriodicalId":250833,"journal":{"name":"4th International Conference on New Trends in Information Science and Service Science","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125433607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
An empirical investigation of research productivity on Text Mining — in bibliometrics view 文献计量学视角下文本挖掘研究效率的实证研究
O. Hou, Heigen Hsu, Jiann-Min Yang
As the improvement of computing power, texting mining becomes more focused than before. In order to realize the literature productivity of such territory, we analyze the literatures on SSCI database with subjects as “Text Mining”. Applied the methodology of bibliometrics, we found several outcomes in this research. First, the distribution of frequency indexes of author's productivity fulfills Lotka's Law. Second, we also apply Price's Square Root Law & Pareto Principle to check the result and found that are not compliance with both of these. Third, from the distribution of the number of paper published each year we conclude the topic of “Text Mining” is still in peak period but may achieve mature stage in the near future. Finally, 56.25% of authors only contribute 1 paper and 82.74% authors' outcomes are less or equal 3. Contrarily, there are 6 authors with over 10 published papers and the most productive one even owns 37 papers on SSCI database.
随着计算能力的提高,文本挖掘变得比以前更加集中。为了实现这一领域的文献生产力,我们对SSCI数据库中主题为“文本挖掘”的文献进行了分析。运用文献计量学的方法,我们发现了本研究的几个结果。第一,作者生产力频次指标的分布符合洛特卡定律。其次,我们还运用Price's平方根定律和Pareto原理对结果进行了检验,发现两者都不符合。第三,从每年发表的论文数量分布来看,“文本挖掘”的主题仍处于高峰期,但在不久的将来可能会达到成熟阶段。最后,56.25%的作者只发表了1篇论文,82.74%的作者的结果小于或等于3。相反,发表论文数在10篇以上的作者有6位,最高的一位在SSCI数据库发表了37篇论文。
{"title":"An empirical investigation of research productivity on Text Mining — in bibliometrics view","authors":"O. Hou, Heigen Hsu, Jiann-Min Yang","doi":"10.4156/JNIT.VOL1.ISSUE3.4","DOIUrl":"https://doi.org/10.4156/JNIT.VOL1.ISSUE3.4","url":null,"abstract":"As the improvement of computing power, texting mining becomes more focused than before. In order to realize the literature productivity of such territory, we analyze the literatures on SSCI database with subjects as “Text Mining”. Applied the methodology of bibliometrics, we found several outcomes in this research. First, the distribution of frequency indexes of author's productivity fulfills Lotka's Law. Second, we also apply Price's Square Root Law & Pareto Principle to check the result and found that are not compliance with both of these. Third, from the distribution of the number of paper published each year we conclude the topic of “Text Mining” is still in peak period but may achieve mature stage in the near future. Finally, 56.25% of authors only contribute 1 paper and 82.74% authors' outcomes are less or equal 3. Contrarily, there are 6 authors with over 10 published papers and the most productive one even owns 37 papers on SSCI database.","PeriodicalId":250833,"journal":{"name":"4th International Conference on New Trends in Information Science and Service Science","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115180204","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
4th International Conference on New Trends in Information Science and Service Science
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1