首页 > 最新文献

The Fifth International Conference on the Applications of Digital Information and Web Technologies (ICADIWT 2014)最新文献

英文 中文
Personalized authentication procedure for restricted web service access in mobile phones 在移动电话中限制web服务访问的个性化认证程序
T. Ramya, S. Malathi, G. R. Pratheeksha, Visvam Devadoss Ambeth Kumar
Security as a condition is the degree of resistance to, or protection from harm. Securing gadgets in a way that is simple for the user to deploy yet, stringent enough to deny any malware intrusions onto the protected circle is investigated to find a balance between the extremes. Basically, the dominant approach on current control access is via password or PIN, but its flaw is being clearly documented. An application (to be incorporated in a mobile phone) that allows the user's gadget to be used as a Biometric Capture device in addition to serve as a Biometric Signature acquisition device for processing a multi-level authentication procedure to allow access to any specific Web Service of exclusive confidentiality is proposed. To evaluate the lucidness of the proposed procedure, a specific set of domain specifications to work on are chosen and the accuracy of the Biometric face Recognition carried out is evaluated along with the compatibility of the Application developed with different sample inputs. The results obtained are exemplary compared to the existing other devices to suit a larger section of the society through the Internet for improving the security.
安全作为一种条件是抵抗或保护免受伤害的程度。以一种对用户来说很容易部署的方式保护小工具,严格到足以拒绝任何恶意软件入侵到受保护的圈子,以调查在极端之间找到平衡。基本上,当前控制访问的主要方法是通过密码或PIN,但其缺陷是明确记录的。提出了一种应用程序(将合并到移动电话中),该应用程序允许用户的小工具用作生物特征捕获设备,此外还可以用作生物特征签名获取设备,用于处理多级身份验证过程,以允许访问任何具有独家机密性的特定Web服务。为了评估所提议程序的清晰度,选择了一组特定的领域规范,并评估了生物识别人脸识别的准确性,以及与不同样本输入开发的应用程序的兼容性。与现有的其他设备相比,所获得的结果具有示范性,适合于通过互联网提高社会更大范围的安全性。
{"title":"Personalized authentication procedure for restricted web service access in mobile phones","authors":"T. Ramya, S. Malathi, G. R. Pratheeksha, Visvam Devadoss Ambeth Kumar","doi":"10.1109/ICADIWT.2014.6814702","DOIUrl":"https://doi.org/10.1109/ICADIWT.2014.6814702","url":null,"abstract":"Security as a condition is the degree of resistance to, or protection from harm. Securing gadgets in a way that is simple for the user to deploy yet, stringent enough to deny any malware intrusions onto the protected circle is investigated to find a balance between the extremes. Basically, the dominant approach on current control access is via password or PIN, but its flaw is being clearly documented. An application (to be incorporated in a mobile phone) that allows the user's gadget to be used as a Biometric Capture device in addition to serve as a Biometric Signature acquisition device for processing a multi-level authentication procedure to allow access to any specific Web Service of exclusive confidentiality is proposed. To evaluate the lucidness of the proposed procedure, a specific set of domain specifications to work on are chosen and the accuracy of the Biometric face Recognition carried out is evaluated along with the compatibility of the Application developed with different sample inputs. The results obtained are exemplary compared to the existing other devices to suit a larger section of the society through the Internet for improving the security.","PeriodicalId":339627,"journal":{"name":"The Fifth International Conference on the Applications of Digital Information and Web Technologies (ICADIWT 2014)","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124543801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A high performance hybrid algorithm for text classification 一种高性能的文本分类混合算法
Prema Nedungadi, Haripriya Harikumar, M. Ramesh
The high computational complexity of text classification is a significant problem with the growing surge in text data. An effective but computationally expensive classification is the k-nearest-neighbor (kNN) algorithm. Principal Component Analysis (PCA) has commonly been used as a preprocessing phase to reduce the dimensionality followed by kNN. However, though the dimensionality is reduced, the algorithm requires all the vectors in the projected space to perform the kNN. We propose a new hybrid algorithm that uses PCA & kNN but performs kNN with a small set of neighbors instead of the complete data vectors in the projected space, thus reducing the computational complexity. An added advantage in our method is that we are able to get effective classification using a relatively smaller number of principal components. New text for classification is projected into the lower dimensional space and kNN is performed only with the neighbors in each axis based on the principal that vectors that are closer in the original space are closer in the projected space and also along the projected components. Our findings with the standard benchmark dataset Reuters show that the proposed model significantly outperforms kNN and the standard PCA-kNN hybrid algorithms while maintaining similar classification accuracy.
随着文本数据的激增,文本分类的高计算复杂度成为一个重要问题。一种有效但计算代价昂贵的分类方法是k-最近邻(kNN)算法。主成分分析(PCA)通常被用作预处理阶段,以降低kNN之后的维数。然而,虽然降低了维数,但该算法要求投影空间中的所有向量执行kNN。我们提出了一种新的混合算法,该算法使用PCA和kNN,但使用一小组邻居而不是投影空间中的完整数据向量来执行kNN,从而降低了计算复杂度。我们的方法的另一个优点是我们能够使用相对较少数量的主成分进行有效的分类。用于分类的新文本被投影到较低维空间中,并且基于在原始空间中更接近的向量在投影空间中更接近的原则,仅对每个轴上的邻居执行kNN,并且沿着投影分量也更接近。我们对标准基准数据集路透社的研究结果表明,所提出的模型在保持相似分类精度的同时,显著优于kNN和标准PCA-kNN混合算法。
{"title":"A high performance hybrid algorithm for text classification","authors":"Prema Nedungadi, Haripriya Harikumar, M. Ramesh","doi":"10.1109/ICADIWT.2014.6814691","DOIUrl":"https://doi.org/10.1109/ICADIWT.2014.6814691","url":null,"abstract":"The high computational complexity of text classification is a significant problem with the growing surge in text data. An effective but computationally expensive classification is the k-nearest-neighbor (kNN) algorithm. Principal Component Analysis (PCA) has commonly been used as a preprocessing phase to reduce the dimensionality followed by kNN. However, though the dimensionality is reduced, the algorithm requires all the vectors in the projected space to perform the kNN. We propose a new hybrid algorithm that uses PCA & kNN but performs kNN with a small set of neighbors instead of the complete data vectors in the projected space, thus reducing the computational complexity. An added advantage in our method is that we are able to get effective classification using a relatively smaller number of principal components. New text for classification is projected into the lower dimensional space and kNN is performed only with the neighbors in each axis based on the principal that vectors that are closer in the original space are closer in the projected space and also along the projected components. Our findings with the standard benchmark dataset Reuters show that the proposed model significantly outperforms kNN and the standard PCA-kNN hybrid algorithms while maintaining similar classification accuracy.","PeriodicalId":339627,"journal":{"name":"The Fifth International Conference on the Applications of Digital Information and Web Technologies (ICADIWT 2014)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133027699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Reduction of semantic gap using relevance feedback technique in image retrieval system 基于关联反馈技术的图像检索系统语义缺口缩小
A. Saju, I. Mary, A. Vasuki, P. S. Lakshmi
This paper proposes a novel content based image retrieval system incorporating the relevance feedback technique. In order to improve the retrieval accuracy of content based image retrieval systems, research focus has been shifted in reducing the semantic gap between visual features and the human semantics. The five major techniques available to narrow down the semantic gap are: (a) Object ontology (b) machine learning (c) relevance feedback (d) semantic template (e) web image retrieval. This paper focuses on the relevance feedback technique by which semantic gap can be reduced in order to improve the retrieval efficiency of the system. The major challenges facing the existing relevance feedback technique is the number of iterations and the execution time. The proposed algorithm provides a better solution to overcome both these challenges. The efficiency of the system can be calculated based on precision and recall.
本文提出了一种结合相关反馈技术的基于内容的图像检索系统。为了提高基于内容的图像检索系统的检索精度,减少视觉特征与人类语义之间的语义差距已经成为研究的重点。可用于缩小语义差距的五种主要技术是:(a)对象本体(b)机器学习(c)相关反馈(d)语义模板(e) web图像检索。本文重点研究了相关反馈技术,该技术可以减小语义间隙,从而提高系统的检索效率。现有相关反馈技术面临的主要挑战是迭代次数和执行时间。该算法为克服这两个挑战提供了更好的解决方案。系统的效率可以根据查准率和查全率来计算。
{"title":"Reduction of semantic gap using relevance feedback technique in image retrieval system","authors":"A. Saju, I. Mary, A. Vasuki, P. S. Lakshmi","doi":"10.1109/ICADIWT.2014.6814677","DOIUrl":"https://doi.org/10.1109/ICADIWT.2014.6814677","url":null,"abstract":"This paper proposes a novel content based image retrieval system incorporating the relevance feedback technique. In order to improve the retrieval accuracy of content based image retrieval systems, research focus has been shifted in reducing the semantic gap between visual features and the human semantics. The five major techniques available to narrow down the semantic gap are: (a) Object ontology (b) machine learning (c) relevance feedback (d) semantic template (e) web image retrieval. This paper focuses on the relevance feedback technique by which semantic gap can be reduced in order to improve the retrieval efficiency of the system. The major challenges facing the existing relevance feedback technique is the number of iterations and the execution time. The proposed algorithm provides a better solution to overcome both these challenges. The efficiency of the system can be calculated based on precision and recall.","PeriodicalId":339627,"journal":{"name":"The Fifth International Conference on the Applications of Digital Information and Web Technologies (ICADIWT 2014)","volume":"55 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116385013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
SentenceRank — A graph based approach to summarize text SentenceRank——基于图形的文本总结方法
A. Ramesh, K. Srinivasa, N. Pramod
We introduce a graph and an intersection based technique which uses statistical and semantic analysis for computing relative importance of textual units in large data sets in order to summarize text. Current implementations consider only the mathematical/statistical approach to summarize text. (like frequency, TFIDF, etc.) But there are many cases where two completely different textual units might be semantically related. We hope to overcome this problem by exploiting the resources of WordNet and by the use of semantic graphs which represents the semantic dissimilarity between any pair of sentences. Ranking is usually performed on statistical information. The algorithm constructs semantic graphs using implicit links which are based on the semantic relatedness between text nodes and consequently ranks nodes using a ranking algorithm.
我们引入了一种基于图和交集的技术,该技术使用统计和语义分析来计算大型数据集中文本单元的相对重要性,以便总结文本。目前的实现只考虑数学/统计方法来总结文本。(如频率、TFIDF等)但是在很多情况下,两个完全不同的文本单位可能在语义上相关。我们希望通过利用WordNet的资源和使用语义图来表示任何一对句子之间的语义不相似性来克服这个问题。排名通常是根据统计信息进行的。该算法基于文本节点之间的语义相关性,使用隐式链接构建语义图,并使用排序算法对节点进行排序。
{"title":"SentenceRank — A graph based approach to summarize text","authors":"A. Ramesh, K. Srinivasa, N. Pramod","doi":"10.1109/ICADIWT.2014.6814680","DOIUrl":"https://doi.org/10.1109/ICADIWT.2014.6814680","url":null,"abstract":"We introduce a graph and an intersection based technique which uses statistical and semantic analysis for computing relative importance of textual units in large data sets in order to summarize text. Current implementations consider only the mathematical/statistical approach to summarize text. (like frequency, TFIDF, etc.) But there are many cases where two completely different textual units might be semantically related. We hope to overcome this problem by exploiting the resources of WordNet and by the use of semantic graphs which represents the semantic dissimilarity between any pair of sentences. Ranking is usually performed on statistical information. The algorithm constructs semantic graphs using implicit links which are based on the semantic relatedness between text nodes and consequently ranks nodes using a ranking algorithm.","PeriodicalId":339627,"journal":{"name":"The Fifth International Conference on the Applications of Digital Information and Web Technologies (ICADIWT 2014)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116429858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
A novel approach for predicting the length of hospital stay with DBSCAN and supervised classification algorithms 用DBSCAN和监督分类算法预测住院时间的新方法
V. U. Panchami, N. Radhika
Patient length of stay is the most commonly employed outcome measure for hospital resource consumption and to monitor the performance of the hospital. Predicting the patient's length of stay in a hospital is an important aspect for effective planning at various levels. It helps in efficient utilization of resources and facilities. So, there exist a strong demand to make accurate and robust models to predict length of stay. This paper analyzes various methods for length of stay prediction, its advantages and disadvantages and proposes a novel approach for predicting whether the length of stay of the patient is greater than one week. The approach uses DBSCAN clustering to create the training set for classification. The prediction models are compared using accuracy, precision and recall and found that using DBSCAN as a precursor to classification gives better results.
患者住院时间是衡量医院资源消耗和监测医院绩效最常用的结果指标。预测病人在医院的住院时间是各级有效规划的一个重要方面。它有助于有效地利用资源和设施。因此,迫切需要建立准确可靠的模型来预测住院时间。本文分析了各种预测住院时间的方法及其优缺点,提出了一种预测患者住院时间是否大于一周的新方法。该方法使用DBSCAN聚类来创建用于分类的训练集。用准确度、精密度和召回率对预测模型进行了比较,发现使用DBSCAN作为分类的前兆可以获得更好的结果。
{"title":"A novel approach for predicting the length of hospital stay with DBSCAN and supervised classification algorithms","authors":"V. U. Panchami, N. Radhika","doi":"10.1109/ICADIWT.2014.6814663","DOIUrl":"https://doi.org/10.1109/ICADIWT.2014.6814663","url":null,"abstract":"Patient length of stay is the most commonly employed outcome measure for hospital resource consumption and to monitor the performance of the hospital. Predicting the patient's length of stay in a hospital is an important aspect for effective planning at various levels. It helps in efficient utilization of resources and facilities. So, there exist a strong demand to make accurate and robust models to predict length of stay. This paper analyzes various methods for length of stay prediction, its advantages and disadvantages and proposes a novel approach for predicting whether the length of stay of the patient is greater than one week. The approach uses DBSCAN clustering to create the training set for classification. The prediction models are compared using accuracy, precision and recall and found that using DBSCAN as a precursor to classification gives better results.","PeriodicalId":339627,"journal":{"name":"The Fifth International Conference on the Applications of Digital Information and Web Technologies (ICADIWT 2014)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115668965","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Novel mutual authentication protocol for cloud computing using secret sharing and steganography 基于秘密共享和隐写的云计算互鉴协议
K. Nimmy, M. Sethumadhavan
Proper authentication is an essential technology for cloud-computing environments in which connections to external environments are common and risks are high. Here, a new scheme is proposed for mutual authentication where the user and cloud server can authenticate one another. The protocol is designed in such a way that it uses steganography as an additional encryption scheme. The scheme achieves authentication using secret sharing. Secret sharing allows a part of the secret to be kept in both sides which when combined becomes the complete secret. The secret contains information about both parties involved. Further, out of band authentication has been used which provides additional security. The proposed protocol provides mutual authentication and session key establishment between the users and the cloud server. Also, the users have been given the flexibility to change the password. Furthermore, strong security features makes the protocol well suited for the cloud environment.
适当的身份验证是云计算环境的一项基本技术,在这种环境中,与外部环境的连接很常见,风险很高。在此基础上,提出了一种用户与云服务器相互认证的方案。该协议的设计方式是使用隐写术作为附加的加密方案。该方案通过秘密共享实现认证。秘密共享允许双方保留一部分秘密,当它们结合在一起时就成为完整的秘密。这个秘密包含了有关双方的信息。此外,还使用了带外身份验证,提供了额外的安全性。该协议提供了用户与云服务器之间的相互认证和会话密钥建立。此外,用户还可以灵活地更改密码。此外,强大的安全特性使该协议非常适合云环境。
{"title":"Novel mutual authentication protocol for cloud computing using secret sharing and steganography","authors":"K. Nimmy, M. Sethumadhavan","doi":"10.1109/ICADIWT.2014.6814685","DOIUrl":"https://doi.org/10.1109/ICADIWT.2014.6814685","url":null,"abstract":"Proper authentication is an essential technology for cloud-computing environments in which connections to external environments are common and risks are high. Here, a new scheme is proposed for mutual authentication where the user and cloud server can authenticate one another. The protocol is designed in such a way that it uses steganography as an additional encryption scheme. The scheme achieves authentication using secret sharing. Secret sharing allows a part of the secret to be kept in both sides which when combined becomes the complete secret. The secret contains information about both parties involved. Further, out of band authentication has been used which provides additional security. The proposed protocol provides mutual authentication and session key establishment between the users and the cloud server. Also, the users have been given the flexibility to change the password. Furthermore, strong security features makes the protocol well suited for the cloud environment.","PeriodicalId":339627,"journal":{"name":"The Fifth International Conference on the Applications of Digital Information and Web Technologies (ICADIWT 2014)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126775904","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
A distributed system design for next generation storage and remote replication 面向下一代存储和远程复制的分布式系统设计
Dhanaraj Maruthachalam, Taranisen Mohanta, Amulya Ratna Swain, Hemendra Kumar Sethi
The business continuity is essential for any enterprise application where remote replication enables customers to store the data on a Logical Disk (LDisk) at the local site and replicate the same at remote locations. In case of a disaster at local site, the replicated LDisk (remote copy) at remote site is marked as primary copy and the remote copy is made available without any downtime. The replication to destination is configured either in sync-mode or async-mode. In case of async-mode, the host IOs are first processed by the source array at the local site. A snapshot of the LDisk is triggered periodically and the new snapshot is replicated to the destination array at remote site. In this configuration, one particular node of source array becomes loaded with ongoing host IOs, snapshot, and replication activities. In the scale-out model, a storage array consists of multiple nodes and hence, the replication tasks and responsibilities can be distributed to a different node. We propose a cloning mechanism called DeltaClone, which replicates the incremental changes of LDisk across nodes. The ownership of a LDisk and its DeltaClone are assigned to two different nodes which are called as master node and slave node respectively. When the periodic request is triggered to synchronize the LDisk data with its remote copy, the current DeltaClone is frozen and it is then merged with remote copy. Hence, the replication tasks are carried out at slave node without affecting the performance of the master node and the ongoing host IOs. The slave node is re-elected periodically to ensure the dynamic load-balancing across the nodes. Our distributed design improves the overall storage performance and the simulation results showed that the proposed method outperforms the traditional methods.
在任何企业应用程序中,远程复制使客户能够将数据存储在本地站点的逻辑磁盘(LDisk)上,并在远程位置复制相同的数据,因此业务连续性是必不可少的。在本地站点发生灾难的情况下,远程站点上复制的LDisk(远程副本)被标记为主副本,并且远程副本在没有任何停机时间的情况下可用。以同步模式或异步模式配置到目标的复制。在异步模式下,主机io首先由本端站点的源阵列处理。定时触发LDisk快照,并将新快照复制到远端站点的目标阵列。在这种配置中,源阵列的一个特定节点加载了正在进行的主机IOs、快照和复制活动。在横向扩展模型中,存储阵列由多个节点组成,因此复制任务和职责可以分布到不同的节点上。我们提出了一种名为DeltaClone的克隆机制,它可以跨节点复制LDisk的增量变化。LDisk及其DeltaClone的所有权分配给两个不同的节点,分别称为主节点和从节点。当触发定时请求将LDisk数据与远程副本同步时,将冻结当前DeltaClone,然后将其与远程副本合并。因此,复制任务在从节点上执行,不会影响主节点和正在运行的主机IOs的性能。从节点定期重新选举,以确保节点间的动态负载均衡。我们的分布式设计提高了整体存储性能,仿真结果表明该方法优于传统方法。
{"title":"A distributed system design for next generation storage and remote replication","authors":"Dhanaraj Maruthachalam, Taranisen Mohanta, Amulya Ratna Swain, Hemendra Kumar Sethi","doi":"10.1109/ICADIWT.2014.6814686","DOIUrl":"https://doi.org/10.1109/ICADIWT.2014.6814686","url":null,"abstract":"The business continuity is essential for any enterprise application where remote replication enables customers to store the data on a Logical Disk (LDisk) at the local site and replicate the same at remote locations. In case of a disaster at local site, the replicated LDisk (remote copy) at remote site is marked as primary copy and the remote copy is made available without any downtime. The replication to destination is configured either in sync-mode or async-mode. In case of async-mode, the host IOs are first processed by the source array at the local site. A snapshot of the LDisk is triggered periodically and the new snapshot is replicated to the destination array at remote site. In this configuration, one particular node of source array becomes loaded with ongoing host IOs, snapshot, and replication activities. In the scale-out model, a storage array consists of multiple nodes and hence, the replication tasks and responsibilities can be distributed to a different node. We propose a cloning mechanism called DeltaClone, which replicates the incremental changes of LDisk across nodes. The ownership of a LDisk and its DeltaClone are assigned to two different nodes which are called as master node and slave node respectively. When the periodic request is triggered to synchronize the LDisk data with its remote copy, the current DeltaClone is frozen and it is then merged with remote copy. Hence, the replication tasks are carried out at slave node without affecting the performance of the master node and the ongoing host IOs. The slave node is re-elected periodically to ensure the dynamic load-balancing across the nodes. Our distributed design improves the overall storage performance and the simulation results showed that the proposed method outperforms the traditional methods.","PeriodicalId":339627,"journal":{"name":"The Fifth International Conference on the Applications of Digital Information and Web Technologies (ICADIWT 2014)","volume":"438 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132863237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Post-search query modeling in federated web scenario 联邦web场景中的搜索后查询建模
Jolanta Mizera-Pietraszko
As opposed to query reformulation oriented towards changes made by a user to specify the information need more precisely, a post-search query modeling is a technique of exploiting syntax variation of gradually extended query which depending on some other factors like e.g. the resource, database or the key word alignment, facilitates the searching process. The study into modeling query submitted to some search engines that utilize different translation semantic paradigms is motivated by a real-world's challenges to retrieve heterogeneous textual documents from the web. For a couple of language pairs, we develop a user-centered framework for imposing the Hidden Web traffic optimization. In literature Hidden Web is the World Wide Web facet usually missed by standard information systems. Our data set contains variety of query types submitted to translingual systems that perform a number of syntax-driven indexing being evaluated by constructing a precision trend function, the one that intensifies the relevance set of the system responses from a perspective of dramatic reduction of those outside the user's interest.
与用户为更精确地指定信息需求而进行的查询重构不同,搜索后查询建模是一种利用逐渐扩展的查询的语法变化的技术,这种变化取决于资源、数据库或关键字对齐等其他因素,从而促进搜索过程。对一些使用不同翻译语义范式的搜索引擎的查询建模的研究是由现实世界中从网络中检索异构文本文档的挑战所激发的。对于一些语言对,我们开发了一个以用户为中心的框架来实施隐藏的Web流量优化。在文献中,隐网是标准信息系统通常忽略的万维网方面。我们的数据集包含提交给翻译系统的各种查询类型,这些查询类型执行许多语法驱动的索引,通过构建精度趋势函数进行评估,该函数从大幅减少用户兴趣之外的角度加强了系统响应的相关性集。
{"title":"Post-search query modeling in federated web scenario","authors":"Jolanta Mizera-Pietraszko","doi":"10.1109/ICADIWT.2014.6814683","DOIUrl":"https://doi.org/10.1109/ICADIWT.2014.6814683","url":null,"abstract":"As opposed to query reformulation oriented towards changes made by a user to specify the information need more precisely, a post-search query modeling is a technique of exploiting syntax variation of gradually extended query which depending on some other factors like e.g. the resource, database or the key word alignment, facilitates the searching process. The study into modeling query submitted to some search engines that utilize different translation semantic paradigms is motivated by a real-world's challenges to retrieve heterogeneous textual documents from the web. For a couple of language pairs, we develop a user-centered framework for imposing the Hidden Web traffic optimization. In literature Hidden Web is the World Wide Web facet usually missed by standard information systems. Our data set contains variety of query types submitted to translingual systems that perform a number of syntax-driven indexing being evaluated by constructing a precision trend function, the one that intensifies the relevance set of the system responses from a perspective of dramatic reduction of those outside the user's interest.","PeriodicalId":339627,"journal":{"name":"The Fifth International Conference on the Applications of Digital Information and Web Technologies (ICADIWT 2014)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126512606","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Formal representation of service interactions for SaaS based applications 基于SaaS的应用程序的服务交互的形式化表示
A. K. Mandal, A. Sarkar
Conceptualization of different aspects of cloud applications and formal representations of interactions among the different components of SaaS are most crucial issues towards the design of an effective cloud architectural framework. In this paper a graph-based specification called Cloud Service Architecture Graph (CSAG) has been proposed to model such interactions among various components of Software as a Service (SaaS). CSAG is capable of addressing several important aspects like extendibility, composability, analyzability etc. for SaaS based applications over cloud environment. Moreover, several properties of CSAG shows that the proposed approach is effective towards the design of a SaaS based applications. The proposed CSAG has been illustrated using the case study of Electronic Health Record (EHR) system over cloud environment.
云应用程序不同方面的概念化和SaaS不同组件之间交互的形式化表示是设计有效的云架构框架的最关键问题。本文提出了一种基于图的规范,称为云服务架构图(CSAG),用于为软件即服务(SaaS)的各种组件之间的交互建模。CSAG能够解决云环境下基于SaaS的应用程序的几个重要方面,如可扩展性、可组合性、可分析性等。此外,CSAG的一些特性表明,该方法对于基于SaaS的应用程序设计是有效的。以云环境下的电子健康记录(EHR)系统为例,对所提出的CSAG进行了说明。
{"title":"Formal representation of service interactions for SaaS based applications","authors":"A. K. Mandal, A. Sarkar","doi":"10.1109/ICADIWT.2014.6814700","DOIUrl":"https://doi.org/10.1109/ICADIWT.2014.6814700","url":null,"abstract":"Conceptualization of different aspects of cloud applications and formal representations of interactions among the different components of SaaS are most crucial issues towards the design of an effective cloud architectural framework. In this paper a graph-based specification called Cloud Service Architecture Graph (CSAG) has been proposed to model such interactions among various components of Software as a Service (SaaS). CSAG is capable of addressing several important aspects like extendibility, composability, analyzability etc. for SaaS based applications over cloud environment. Moreover, several properties of CSAG shows that the proposed approach is effective towards the design of a SaaS based applications. The proposed CSAG has been illustrated using the case study of Electronic Health Record (EHR) system over cloud environment.","PeriodicalId":339627,"journal":{"name":"The Fifth International Conference on the Applications of Digital Information and Web Technologies (ICADIWT 2014)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115564410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An event driven neural network system for evaluating public moods from online users' comments 一个事件驱动的神经网络系统,用于从在线用户评论中评估公众情绪
S. Fong, S. Deb, Io-Weng Chan, P. Vijayakumar
It has become a prevalent lifestyle nowadays that netizens voice their opinions on social networks (Web 2.0), for matters of all sizes, and on a regular basis. The opinions which initially should be intended for their groups of friends propagate to all public users. This pond of opinions in the forms of forum posts, messages written on micro-blogs, Twitter and Facebook, are largely contributed by communities of online users (or sometimes bloggers). The messages though might seem to be trivial when each of them is viewed singularly, the converged sum of them serves as a potentially useful source of information to be analysed. A government of a city, for instance, may be interested to know the response of the citizens after a new policy is announced, from their voices collected from the Internet. However, such online messages are unstructured in nature, their contexts vary greatly, and that poses a tremendous difficulty in correctly interpreting them. In this paper we propose an innovative analytical model that evaluates such messages by representing them in different moods. The model comprises of several data analytics such as cultural moods analyzer implemented by neural networks, text mining and hierarchical visualization that reflects public moods over a large population of Internet comments.
网民们在社交网络(web2.0)上定期发表各种规模的意见已成为一种流行的生活方式。最初应该针对他们的朋友群体的意见传播到所有公众用户。论坛帖子、微博、Twitter和Facebook上的信息等形式的意见池,主要是由在线用户社区(有时是博主)贡献的。虽然这些信息在单独观察时可能显得微不足道,但它们的聚合和可以作为分析的潜在有用信息源。例如,一个城市的政府可能有兴趣知道在一项新政策宣布后,市民的反应,从他们从互联网上收集的声音。然而,这些在线信息本质上是非结构化的,它们的上下文变化很大,这给正确解释它们带来了巨大的困难。在本文中,我们提出了一个创新的分析模型,通过在不同的情绪中表示这些信息来评估这些信息。该模型包括多种数据分析,如通过神经网络实现的文化情绪分析器、文本挖掘和分层可视化,以反映大量互联网评论中的公众情绪。
{"title":"An event driven neural network system for evaluating public moods from online users' comments","authors":"S. Fong, S. Deb, Io-Weng Chan, P. Vijayakumar","doi":"10.1109/ICADIWT.2014.6814688","DOIUrl":"https://doi.org/10.1109/ICADIWT.2014.6814688","url":null,"abstract":"It has become a prevalent lifestyle nowadays that netizens voice their opinions on social networks (Web 2.0), for matters of all sizes, and on a regular basis. The opinions which initially should be intended for their groups of friends propagate to all public users. This pond of opinions in the forms of forum posts, messages written on micro-blogs, Twitter and Facebook, are largely contributed by communities of online users (or sometimes bloggers). The messages though might seem to be trivial when each of them is viewed singularly, the converged sum of them serves as a potentially useful source of information to be analysed. A government of a city, for instance, may be interested to know the response of the citizens after a new policy is announced, from their voices collected from the Internet. However, such online messages are unstructured in nature, their contexts vary greatly, and that poses a tremendous difficulty in correctly interpreting them. In this paper we propose an innovative analytical model that evaluates such messages by representing them in different moods. The model comprises of several data analytics such as cultural moods analyzer implemented by neural networks, text mining and hierarchical visualization that reflects public moods over a large population of Internet comments.","PeriodicalId":339627,"journal":{"name":"The Fifth International Conference on the Applications of Digital Information and Web Technologies (ICADIWT 2014)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123973446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
The Fifth International Conference on the Applications of Digital Information and Web Technologies (ICADIWT 2014)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1