首页 > 最新文献

International Journal of Web Information Systems最新文献

英文 中文
Semantic web and machine learning techniques addressing semantic interoperability in Industry 4.0 解决工业4.0中语义互操作性的语义网和机器学习技术
IF 1.6 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-08-23 DOI: 10.1108/ijwis-03-2023-0046
Mohamed Hafidi, M. Djezzar, M. Hemam, Fatima Zahra Amara, M. Maimour
PurposeThis paper aims to offer a comprehensive examination of the various solutions currently accessible for addressing the challenge of semantic interoperability in cyber physical systems (CPS). CPS is a new generation of systems composed of physical assets with computation capabilities, connected with software systems in a network, exchanging data collected from the physical asset, models (physics-based, data-driven, . . .) and services (reconfiguration, monitoring, . . .). The physical asset and its software system are connected, and they exchange data to be interpreted in a certain context. The heterogeneous nature of the collected data together with different types of models rise interoperability problems. Modeling the digital space of the CPS and integrating information models that support cyber physical interoperability together are required.Design/methodology/approachThis paper aims to identify the most relevant points in the development of semantic models and machine learning solutions to the interoperability problem, and how these solutions are implemented in CPS. The research analyzes recent papers related to the topic of semantic interoperability in Industry 4.0 (I4.0) systems.FindingsSemantic models are key enabler technologies that provide a common understanding of data, and they can be used to solve interoperability problems in Industry by using a common vocabulary when defining these models.Originality/valueThis paper provides an overview of the different available solutions to the semantic interoperability problem in CPS.
目的本文旨在全面考察目前可用于应对网络物理系统(CPS)中语义互操作性挑战的各种解决方案。CPS是由具有计算能力的物理资产组成的新一代系统,与网络中的软件系统相连,交换从物理资产、模型(基于物理、数据驱动…)和服务(重新配置、监控…)中收集的数据,并且它们交换要在特定上下文中解释的数据。所收集数据的异构性以及不同类型的模型导致了互操作性问题。需要对CPS的数字空间进行建模,并将支持网络物理互操作性的信息模型集成在一起。设计/方法论/方法本文旨在确定互操作性问题的语义模型和机器学习解决方案开发中最相关的点,以及这些解决方案如何在CPS中实现。该研究分析了最近与工业4.0(I4.0)系统中的语义互操作性主题相关的论文。FindingsSemantic模型是提供对数据的通用理解的关键使能技术,在定义这些模型时,可以使用通用词汇表来解决行业中的互操作性问题。原创性/价值本文概述了CPS中语义互操作性问题的不同可用解决方案。
{"title":"Semantic web and machine learning techniques addressing semantic interoperability in Industry 4.0","authors":"Mohamed Hafidi, M. Djezzar, M. Hemam, Fatima Zahra Amara, M. Maimour","doi":"10.1108/ijwis-03-2023-0046","DOIUrl":"https://doi.org/10.1108/ijwis-03-2023-0046","url":null,"abstract":"\u0000Purpose\u0000This paper aims to offer a comprehensive examination of the various solutions currently accessible for addressing the challenge of semantic interoperability in cyber physical systems (CPS). CPS is a new generation of systems composed of physical assets with computation capabilities, connected with software systems in a network, exchanging data collected from the physical asset, models (physics-based, data-driven, . . .) and services (reconfiguration, monitoring, . . .). The physical asset and its software system are connected, and they exchange data to be interpreted in a certain context. The heterogeneous nature of the collected data together with different types of models rise interoperability problems. Modeling the digital space of the CPS and integrating information models that support cyber physical interoperability together are required.\u0000\u0000\u0000Design/methodology/approach\u0000This paper aims to identify the most relevant points in the development of semantic models and machine learning solutions to the interoperability problem, and how these solutions are implemented in CPS. The research analyzes recent papers related to the topic of semantic interoperability in Industry 4.0 (I4.0) systems.\u0000\u0000\u0000Findings\u0000Semantic models are key enabler technologies that provide a common understanding of data, and they can be used to solve interoperability problems in Industry by using a common vocabulary when defining these models.\u0000\u0000\u0000Originality/value\u0000This paper provides an overview of the different available solutions to the semantic interoperability problem in CPS.\u0000","PeriodicalId":44153,"journal":{"name":"International Journal of Web Information Systems","volume":" ","pages":""},"PeriodicalIF":1.6,"publicationDate":"2023-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42798563","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Infer the missing facts of D3FEND using knowledge graph representation learning 利用知识图表示学习来推断d3挡位的缺失事实
IF 1.6 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-08-16 DOI: 10.1108/ijwis-03-2023-0042
A. Khobragade, S. Ghumbre, V. Pachghare
PurposeMITRE and the National Security Agency cooperatively developed and maintained a D3FEND knowledge graph (KG). It provides concepts as an entity from the cybersecurity countermeasure domain, such as dynamic, emulated and file analysis. Those entities are linked by applying relationships such as analyze, may_contains and encrypt. A fundamental challenge for collaborative designers is to encode knowledge and efficiently interrelate the cyber-domain facts generated daily. However, the designers manually update the graph contents with new or missing facts to enrich the knowledge. This paper aims to propose an automated approach to predict the missing facts using the link prediction task, leveraging embedding as representation learning.Design/methodology/approachD3FEND is available in the resource description framework (RDF) format. In the preprocessing step, the facts in RDF format converted to subject–predicate–object triplet format contain 5,967 entities and 98 relationship types. Progressive distance-based, bilinear and convolutional embedding models are applied to learn the embeddings of entities and relations. This study presents a link prediction task to infer missing facts using learned embeddings.FindingsExperimental results show that the translational model performs well on high-rank results, whereas the bilinear model is superior in capturing the latent semantics of complex relationship types. However, the convolutional model outperforms 44% of the true facts and achieves a 3% improvement in results compared to other models.Research limitations/implicationsDespite the success of embedding models to enrich D3FEND using link prediction under the supervised learning setup, it has some limitations, such as not capturing diversity and hierarchies of relations. The average node degree of D3FEND KG is 16.85, with 12% of entities having a node degree less than 2, especially there are many entities or relations with few or no observed links. This results in sparsity and data imbalance, which affect the model performance even after increasing the embedding vector size. Moreover, KG embedding models consider existing entities and relations and may not incorporate external or contextual information such as textual descriptions, temporal dynamics or domain knowledge, which can enhance the link prediction performance.Practical implicationsLink prediction in the D3FEND KG can benefit cybersecurity countermeasure strategies in several ways, such as it can help to identify gaps or weaknesses in the existing defensive methods and suggest possible ways to improve or augment them; it can help to compare and contrast different defensive methods and understand their trade-offs and synergies; it can help to discover novel or emerging defensive methods by inferring new relations from existing data or external sources; and it can help to generate recommendations or guidance for selecting or deploying appropriate defensive methods based on the
目的MITRE和国家安全局合作开发并维护了D3FEND知识图谱(KG)。它提供了网络安全对策领域的实体概念,如动态、模拟和文件分析。这些实体通过应用诸如analyze、may_contains和encrypt之类的关系进行链接。协作设计师面临的一个根本挑战是对知识进行编码,并有效地将每天生成的网络领域事实相互关联。然而,设计者用新的或缺失的事实手动更新图形内容,以丰富知识。本文旨在提出一种使用链接预测任务来预测缺失事实的自动化方法,利用嵌入作为表示学习。设计/方法论/方法D3FEND以资源描述框架(RDF)格式提供。在预处理步骤中,RDF格式转换为主语-谓语-宾语三元组格式的事实包含5967个实体和98个关系类型。应用基于渐进距离的双线性和卷积嵌入模型来学习实体和关系的嵌入。本研究提出了一个链接预测任务,使用学习嵌入来推断遗漏的事实。实验结果表明,平移模型在高阶结果上表现良好,而双线性模型在捕捉复杂关系类型的潜在语义方面表现优异。然而,与其他模型相比,卷积模型的性能优于44%的真实事实,并在结果上提高了3%。研究局限性/含义尽管在监督学习设置下使用链接预测嵌入模型来丰富D3FEND是成功的,但它也有一些局限性,例如没有捕捉到关系的多样性和层次性。D3FEND KG的平均节点度为16.85,12%的实体的节点度小于2,尤其是存在许多实体或关系,很少或没有观测到链路。这导致稀疏性和数据不平衡,即使在增加嵌入向量大小后,也会影响模型性能。此外,KG嵌入模型考虑了现有的实体和关系,可能不包含外部或上下文信息,如文本描述、时间动态或领域知识,这可以提高链接预测性能。实际含义D3FEND KG中的链路预测可以在几个方面有利于网络安全对策策略,例如它可以帮助识别现有防御方法中的差距或弱点,并提出改进或增强这些方法的可能方法;它可以帮助比较和对比不同的防御方法,并了解它们的权衡和协同作用;它可以通过从现有数据或外部来源推断新的关系来帮助发现新的或新兴的防御方法;并且它可以帮助生成用于基于系统或网络的特征和目标来选择或部署适当的防御方法的建议或指导。独创性/价值表示学习方法使用链接预测来减少不完整性,该链接预测通过使用D3FEND的现有实体和关系来推断可能缺失的事实。
{"title":"Infer the missing facts of D3FEND using knowledge graph representation learning","authors":"A. Khobragade, S. Ghumbre, V. Pachghare","doi":"10.1108/ijwis-03-2023-0042","DOIUrl":"https://doi.org/10.1108/ijwis-03-2023-0042","url":null,"abstract":"\u0000Purpose\u0000MITRE and the National Security Agency cooperatively developed and maintained a D3FEND knowledge graph (KG). It provides concepts as an entity from the cybersecurity countermeasure domain, such as dynamic, emulated and file analysis. Those entities are linked by applying relationships such as analyze, may_contains and encrypt. A fundamental challenge for collaborative designers is to encode knowledge and efficiently interrelate the cyber-domain facts generated daily. However, the designers manually update the graph contents with new or missing facts to enrich the knowledge. This paper aims to propose an automated approach to predict the missing facts using the link prediction task, leveraging embedding as representation learning.\u0000\u0000\u0000Design/methodology/approach\u0000D3FEND is available in the resource description framework (RDF) format. In the preprocessing step, the facts in RDF format converted to subject–predicate–object triplet format contain 5,967 entities and 98 relationship types. Progressive distance-based, bilinear and convolutional embedding models are applied to learn the embeddings of entities and relations. This study presents a link prediction task to infer missing facts using learned embeddings.\u0000\u0000\u0000Findings\u0000Experimental results show that the translational model performs well on high-rank results, whereas the bilinear model is superior in capturing the latent semantics of complex relationship types. However, the convolutional model outperforms 44% of the true facts and achieves a 3% improvement in results compared to other models.\u0000\u0000\u0000Research limitations/implications\u0000Despite the success of embedding models to enrich D3FEND using link prediction under the supervised learning setup, it has some limitations, such as not capturing diversity and hierarchies of relations. The average node degree of D3FEND KG is 16.85, with 12% of entities having a node degree less than 2, especially there are many entities or relations with few or no observed links. This results in sparsity and data imbalance, which affect the model performance even after increasing the embedding vector size. Moreover, KG embedding models consider existing entities and relations and may not incorporate external or contextual information such as textual descriptions, temporal dynamics or domain knowledge, which can enhance the link prediction performance.\u0000\u0000\u0000Practical implications\u0000Link prediction in the D3FEND KG can benefit cybersecurity countermeasure strategies in several ways, such as it can help to identify gaps or weaknesses in the existing defensive methods and suggest possible ways to improve or augment them; it can help to compare and contrast different defensive methods and understand their trade-offs and synergies; it can help to discover novel or emerging defensive methods by inferring new relations from existing data or external sources; and it can help to generate recommendations or guidance for selecting or deploying appropriate defensive methods based on the","PeriodicalId":44153,"journal":{"name":"International Journal of Web Information Systems","volume":" ","pages":""},"PeriodicalIF":1.6,"publicationDate":"2023-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46125880","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Intrinsic feature extraction for unsupervised domain adaptation 无监督域自适应的固有特征提取
IF 1.6 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-07-31 DOI: 10.1108/ijwis-04-2023-0062
Xinzhi Cao, Yinsai Guo, Wenbin Yang, Xiangfeng Luo, Shaorong Xie
PurposeUnsupervised domain adaptation object detection not only mitigates model terrible performance resulting from domain gap, but also has the ability to apply knowledge trained on a definite domain to a distinct domain. However, aligning the whole feature may confuse the object and background information, making it challenging to extract discriminative features. This paper aims to propose an improved approach which is called intrinsic feature extraction domain adaptation (IFEDA) to extract discriminative features effectively.Design/methodology/approachIFEDA consists of the intrinsic feature extraction (IFE) module and object consistency constraint (OCC). The IFE module, designed on the instance level, mainly solves the issue of the difficult extraction of discriminative object features. Specifically, the discriminative region of the objects can be paid more attention to. Meanwhile, the OCC is deployed to determine whether category prediction in the target domain brings into correspondence with it in the source domain.FindingsExperimental results demonstrate the validity of our approach and achieve good outcomes on challenging data sets.Research limitations/implicationsLimitations to this research are that only one target domain is applied, and it may change the ability of model generalization when the problem of insufficient data sets or unseen domain appeared.Originality/valueThis paper solves the issue of critical information defects by tackling the difficulty of extracting discriminative features. And the categories in both domains are compelled to be consistent for better object detection.
目的无监督的领域自适应对象检测不仅可以减轻由于领域差距而导致的模型糟糕的性能,而且能够将在特定领域训练的知识应用到不同的领域。然而,对齐整个特征可能会混淆对象和背景信息,从而使提取判别特征变得具有挑战性。本文旨在提出一种改进的方法,称为内禀特征提取域自适应(IFEDA),以有效地提取判别特征。设计/方法论/方法IFEDA由内部特征提取(IFE)模块和对象一致性约束(OCC)组成。IFE模块是在实例层面设计的,主要解决了判别对象特征提取困难的问题。具体来说,可以更加关注对象的判别区域。同时,部署OCC来确定目标域中的类别预测是否与源域中的分类预测一致。实验结果证明了我们方法的有效性,并在具有挑战性的数据集上取得了良好的结果。研究局限性/含义本研究的局限性在于只应用了一个目标领域,当出现数据集不足或领域不可见的问题时,可能会改变模型的泛化能力。独创性/价值本文通过解决判别特征提取的困难,解决了关键信息缺陷的问题。为了更好地检测物体,两个领域中的类别必须一致。
{"title":"Intrinsic feature extraction for unsupervised domain adaptation","authors":"Xinzhi Cao, Yinsai Guo, Wenbin Yang, Xiangfeng Luo, Shaorong Xie","doi":"10.1108/ijwis-04-2023-0062","DOIUrl":"https://doi.org/10.1108/ijwis-04-2023-0062","url":null,"abstract":"\u0000Purpose\u0000Unsupervised domain adaptation object detection not only mitigates model terrible performance resulting from domain gap, but also has the ability to apply knowledge trained on a definite domain to a distinct domain. However, aligning the whole feature may confuse the object and background information, making it challenging to extract discriminative features. This paper aims to propose an improved approach which is called intrinsic feature extraction domain adaptation (IFEDA) to extract discriminative features effectively.\u0000\u0000\u0000Design/methodology/approach\u0000IFEDA consists of the intrinsic feature extraction (IFE) module and object consistency constraint (OCC). The IFE module, designed on the instance level, mainly solves the issue of the difficult extraction of discriminative object features. Specifically, the discriminative region of the objects can be paid more attention to. Meanwhile, the OCC is deployed to determine whether category prediction in the target domain brings into correspondence with it in the source domain.\u0000\u0000\u0000Findings\u0000Experimental results demonstrate the validity of our approach and achieve good outcomes on challenging data sets.\u0000\u0000\u0000Research limitations/implications\u0000Limitations to this research are that only one target domain is applied, and it may change the ability of model generalization when the problem of insufficient data sets or unseen domain appeared.\u0000\u0000\u0000Originality/value\u0000This paper solves the issue of critical information defects by tackling the difficulty of extracting discriminative features. And the categories in both domains are compelled to be consistent for better object detection.\u0000","PeriodicalId":44153,"journal":{"name":"International Journal of Web Information Systems","volume":"1 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2023-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41913805","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Object detection and activity recognition in video surveillance using neural networks 基于神经网络的视频监控目标检测与活动识别
IF 1.6 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-04-20 DOI: 10.1108/ijwis-01-2023-0006
Vishva Payghode, Ayush Goyal, Anupama Bhan, S. Iyer, Ashwani Kumar Dubey
PurposeThis paper aims to implement and extend the You Only Live Once (YOLO) algorithm for detection of objects and activities. The advantage of YOLO is that it only runs a neural network once to detect the objects in an image, which is why it is powerful and fast. Cameras are found at many different crossroads and locations, but video processing of the feed through an object detection algorithm allows determining and tracking what is captured. Video Surveillance has many applications such as Car Tracking and tracking of people related to crime prevention. This paper provides exhaustive comparison between the existing methods and proposed method. Proposed method is found to have highest object detection accuracy.Design/methodology/approachThe goal of this research is to develop a deep learning framework to automate the task of analyzing video footage through object detection in images. This framework processes video feed or image frames from CCTV, webcam or a DroidCam, which allows the camera in a mobile phone to be used as a webcam for a laptop. The object detection algorithm, with its model trained on a large data set of images, is able to load in each image given as an input, process the image and determine the categories of the matching objects that it finds. As a proof of concept, this research demonstrates the algorithm on images of several different objects. This research implements and extends the YOLO algorithm for detection of objects and activities. The advantage of YOLO is that it only runs a neural network once to detect the objects in an image, which is why it is powerful and fast. Cameras are found at many different crossroads and locations, but video processing of the feed through an object detection algorithm allows determining and tracking what is captured. For video surveillance of traffic cameras, this has many applications, such as car tracking and person tracking for crime prevention. In this research, the implemented algorithm with the proposed methodology is compared against several different prior existing methods in literature. The proposed method was found to have the highest object detection accuracy for object detection and activity recognition, better than other existing methods.FindingsThe results indicate that the proposed deep learning–based model can be implemented in real-time for object detection and activity recognition. The added features of car crash detection, fall detection and social distancing detection can be used to implement a real-time video surveillance system that can help save lives and protect people. Such a real-time video surveillance system could be installed at street and traffic cameras and in CCTV systems. When this system would detect a car crash or a fatal human or pedestrian fall with injury, it can be programmed to send automatic messages to the nearest local police, emergency and fire stations. When this system would detect a social distancing violation, it can be programmed
本文旨在实现和扩展“你只活一次”(You Only Live Once, YOLO)算法,用于检测物体和活动。YOLO的优点是它只运行一次神经网络来检测图像中的物体,这就是为什么它强大而快速的原因。在许多不同的十字路口和地点都可以找到摄像头,但通过物体检测算法对馈送的视频进行处理,可以确定和跟踪捕获的内容。视频监控有许多应用,如汽车跟踪和与预防犯罪有关的人员跟踪。本文对现有方法和提出的方法进行了详尽的比较。结果表明,该方法具有较高的目标检测精度。设计/方法/方法本研究的目标是开发一个深度学习框架,通过图像中的目标检测来自动分析视频片段。这个框架处理来自闭路电视、网络摄像头或DroidCam的视频或图像帧,这使得手机中的摄像头可以用作笔记本电脑的网络摄像头。物体检测算法的模型是在一个大的图像数据集上训练的,它能够加载作为输入的每个图像,处理图像并确定它找到的匹配物体的类别。作为概念验证,本研究在多个不同物体的图像上演示了该算法。本研究实现并扩展了用于目标和活动检测的YOLO算法。YOLO的优点是它只运行一次神经网络来检测图像中的物体,这就是为什么它强大而快速的原因。在许多不同的十字路口和地点都可以找到摄像头,但通过物体检测算法对馈送的视频进行处理,可以确定和跟踪捕获的内容。对于交通摄像机的视频监控,这有许多应用,如车辆跟踪和预防犯罪的人员跟踪。在本研究中,采用所提出的方法实现的算法与文献中几种不同的现有方法进行了比较。结果表明,该方法在目标检测和活动识别方面具有最高的目标检测精度,优于现有方法。结果表明,所提出的基于深度学习的模型可以实时实现目标检测和活动识别。增加的碰撞检测、坠落检测和社交距离检测功能可用于实现实时视频监控系统,有助于挽救生命和保护人民。这种实时录像监视系统可以安装在街道和交通摄影机以及闭路电视系统中。当这个系统检测到车祸或致命的人或行人摔倒受伤时,它可以被编程为向最近的当地警察局、急救站和消防站发送自动信息。当该系统发现违反社交距离的行为时,可以通过编程通知地方当局或发出警报,提醒公众保持距离,避免传播可能导致新冠病毒等病毒传播的气溶胶颗粒。原创性/价值本文提出了YOLOv3模型的改进和增强版本,该模型已扩展到进行活动识别,例如汽车碰撞检测,人体跌倒检测和社交距离检测。该模型基于深度学习卷积神经网络模型,用于检测图像中的物体。该模型使用广泛使用和公开可用的上下文公共对象数据集进行训练。该模型是YOLO的扩展,可以实现实时目标和活动识别。该模型在大尺度和全尺度目标检测中均具有较高的精度。该模型在将目标检测扩展和增强到活动识别方面也超越了以往所有比较的方法。该模型在汽车碰撞检测、跌倒检测和社交距离检测中具有最高的准确率。
{"title":"Object detection and activity recognition in video surveillance using neural networks","authors":"Vishva Payghode, Ayush Goyal, Anupama Bhan, S. Iyer, Ashwani Kumar Dubey","doi":"10.1108/ijwis-01-2023-0006","DOIUrl":"https://doi.org/10.1108/ijwis-01-2023-0006","url":null,"abstract":"\u0000Purpose\u0000This paper aims to implement and extend the You Only Live Once (YOLO) algorithm for detection of objects and activities. The advantage of YOLO is that it only runs a neural network once to detect the objects in an image, which is why it is powerful and fast. Cameras are found at many different crossroads and locations, but video processing of the feed through an object detection algorithm allows determining and tracking what is captured. Video Surveillance has many applications such as Car Tracking and tracking of people related to crime prevention. This paper provides exhaustive comparison between the existing methods and proposed method. Proposed method is found to have highest object detection accuracy.\u0000\u0000\u0000Design/methodology/approach\u0000The goal of this research is to develop a deep learning framework to automate the task of analyzing video footage through object detection in images. This framework processes video feed or image frames from CCTV, webcam or a DroidCam, which allows the camera in a mobile phone to be used as a webcam for a laptop. The object detection algorithm, with its model trained on a large data set of images, is able to load in each image given as an input, process the image and determine the categories of the matching objects that it finds. As a proof of concept, this research demonstrates the algorithm on images of several different objects. This research implements and extends the YOLO algorithm for detection of objects and activities. The advantage of YOLO is that it only runs a neural network once to detect the objects in an image, which is why it is powerful and fast. Cameras are found at many different crossroads and locations, but video processing of the feed through an object detection algorithm allows determining and tracking what is captured. For video surveillance of traffic cameras, this has many applications, such as car tracking and person tracking for crime prevention. In this research, the implemented algorithm with the proposed methodology is compared against several different prior existing methods in literature. The proposed method was found to have the highest object detection accuracy for object detection and activity recognition, better than other existing methods.\u0000\u0000\u0000Findings\u0000The results indicate that the proposed deep learning–based model can be implemented in real-time for object detection and activity recognition. The added features of car crash detection, fall detection and social distancing detection can be used to implement a real-time video surveillance system that can help save lives and protect people. Such a real-time video surveillance system could be installed at street and traffic cameras and in CCTV systems. When this system would detect a car crash or a fatal human or pedestrian fall with injury, it can be programmed to send automatic messages to the nearest local police, emergency and fire stations. When this system would detect a social distancing violation, it can be programmed ","PeriodicalId":44153,"journal":{"name":"International Journal of Web Information Systems","volume":" ","pages":""},"PeriodicalIF":1.6,"publicationDate":"2023-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41971395","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A set of parameters for automatically annotating a Sentiment Arabic Corpus 用于自动标注情感阿拉伯语料库的一组参数
IF 1.6 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2019-12-02 DOI: 10.1108/IJWIS-03-2019-0008
Guellil Imane, Darwish Kareem, Azouaou Faical
This paper aims to propose an approach to automatically annotate a large corpus in Arabic dialect. This corpus is used in order to analyse sentiments of Arabic users on social medias. It focuses on the Algerian dialect, which is a sub-dialect of Maghrebi Arabic. Although Algerian is spoken by roughly 40 million speakers, few studies address the automated processing in general and the sentiment analysis in specific for Algerian.,The approach is based on the construction and use of a sentiment lexicon to automatically annotate a large corpus of Algerian text that is extracted from Facebook. Using this approach allow to significantly increase the size of the training corpus without calling the manual annotation. The annotated corpus is then vectorized using document embedding (doc2vec), which is an extension of word embeddings (word2vec). For sentiments classification, the authors used different classifiers such as support vector machines (SVM), Naive Bayes (NB) and logistic regression (LR).,The results suggest that NB and SVM classifiers generally led to the best results and MLP generally had the worst results. Further, the threshold that the authors use in selecting messages for the training set had a noticeable impact on recall and precision, with a threshold of 0.6 producing the best results. Using PV-DBOW led to slightly higher results than using PV-DM. Combining PV-DBOW and PV-DM representations led to slightly lower results than using PV-DBOW alone. The best results were obtained by the NB classifier with F1 up to 86.9 per cent.,The principal originality of this paper is to determine the right parameters for automatically annotating an Algerian dialect corpus. This annotation is based on a sentiment lexicon that was also constructed automatically.
本文旨在提出一种自动标注大型阿拉伯语方言语料库的方法。这个语料库用于分析阿拉伯语用户在社交媒体上的情绪。它侧重于阿尔及利亚方言,这是马格里布阿拉伯语的一种次方言。尽管大约有4000万人说阿尔及利亚语,但很少有研究针对阿尔及利亚语的一般自动化处理和情感分析。该方法基于情感词典的构建和使用,自动注释从Facebook提取的大量阿尔及利亚文本语料库。使用这种方法可以在不调用手动注释的情况下显著增加训练语料库的大小。然后使用文档嵌入(doc2vec)对标注的语料库进行矢量化,文档嵌入是词嵌入(word2vec)的扩展。对于情感分类,作者使用了不同的分类器,如支持向量机(SVM)、朴素贝叶斯(NB)和逻辑回归(LR)。结果表明,NB和SVM分类器的分类效果一般最好,MLP分类器的分类效果一般最差。此外,作者在为训练集选择消息时使用的阈值对召回率和准确率有显著影响,阈值为0.6产生最佳结果。使用PV-DBOW的结果略高于使用PV-DM。结合PV-DBOW和PV-DM表示的结果略低于单独使用PV-DBOW。最好的结果是由F1高达86.9%的NB分类器获得的。本文的主要独创性是确定自动注释阿尔及利亚方言语料库的正确参数。该注释基于也是自动构建的情感词典。
{"title":"A set of parameters for automatically annotating a Sentiment Arabic Corpus","authors":"Guellil Imane, Darwish Kareem, Azouaou Faical","doi":"10.1108/IJWIS-03-2019-0008","DOIUrl":"https://doi.org/10.1108/IJWIS-03-2019-0008","url":null,"abstract":"This paper aims to propose an approach to automatically annotate a large corpus in Arabic dialect. This corpus is used in order to analyse sentiments of Arabic users on social medias. It focuses on the Algerian dialect, which is a sub-dialect of Maghrebi Arabic. Although Algerian is spoken by roughly 40 million speakers, few studies address the automated processing in general and the sentiment analysis in specific for Algerian.,The approach is based on the construction and use of a sentiment lexicon to automatically annotate a large corpus of Algerian text that is extracted from Facebook. Using this approach allow to significantly increase the size of the training corpus without calling the manual annotation. The annotated corpus is then vectorized using document embedding (doc2vec), which is an extension of word embeddings (word2vec). For sentiments classification, the authors used different classifiers such as support vector machines (SVM), Naive Bayes (NB) and logistic regression (LR).,The results suggest that NB and SVM classifiers generally led to the best results and MLP generally had the worst results. Further, the threshold that the authors use in selecting messages for the training set had a noticeable impact on recall and precision, with a threshold of 0.6 producing the best results. Using PV-DBOW led to slightly higher results than using PV-DM. Combining PV-DBOW and PV-DM representations led to slightly lower results than using PV-DBOW alone. The best results were obtained by the NB classifier with F1 up to 86.9 per cent.,The principal originality of this paper is to determine the right parameters for automatically annotating an Algerian dialect corpus. This annotation is based on a sentiment lexicon that was also constructed automatically.","PeriodicalId":44153,"journal":{"name":"International Journal of Web Information Systems","volume":"15 1","pages":"594-615"},"PeriodicalIF":1.6,"publicationDate":"2019-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86674990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
RunayaySoft RunayaySoft
IF 1.6 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2019-01-01 DOI: 10.1108/IJWIS-04-2018-0021
Juan Camilo González-Vargas, Angela Carrillo Ramos, R. Fabregat, Lizzeth Camargo, Maria Caridad García Cepero, Jaime A. Pavlich-Mariscal
Purpose The purpose of this paper is to describe a support system to the selection of enrichment activities in educational environment called RunayaySoft, where Runayay comes from the word Quechua that means develop and Soft as it is an informatics tool that supports the educational institutions and their students, in the selection of activities that allow foster some of their skills based on their interests, learning styles, aptitudes, multiple intelligences, preferences and so on. Moreover, it suggests institutions about the activities that they should make in their building considering student´s characteristics and the agreements that they have. Design/methodology/approach It does a diagnostic for identifying which characteristics are going to be considered to students and institutions. Then, it generates adaptive profiles with the aim of generating suggestions of enrichment activities that allow to boost some of their skills. For the students were considered their preferences, learning style, aptitude, multiple intelligences and interests. In the case of institutions were the agreements, resources and activities that they develop. Based on this information, it defines the relations for the generation of suggestions of activities toward students, where it does the prioritization of which activities should be considered. Findings For validating the system, it was done as a functional prototype that generates suggestions to students, as well as educative institutions, through a satisfaction test student assess if they agree or disagree with the suggestions given. With that assessment, it is validated the relationship between student’s characteristics, activity and institution are related for generating activities suggestions. Research limitations/implications RunayaySoft generates adaptive profiles for the students, activity and institution. Each profile has information that allows adapt an advice toward students and institutions. Social implications RunayaySoft considers student’s characteristics, activities and educational institutions for generating suggestions for enrichment activities that allow to boost some of their skills. Many times, when activities are generated in educative institutions, they are not considered a learner’s needs and characteristics. For that reason, the system helps institutions to identify activities that should be done in their facilities or with those institutions which they have agreements when the institutions that students come from do not have the required resources. Originality/value RunayaySoft suggests enrichment activities to students as well as educative institutions. For students, it suggests disciplinary areas where they can boost their skills; for each disciplinary area are recommended activities based on their preferences. Once students select the disciplinary area and activities, the system suggests educative institutions activities that they can do. If the institutions do not have the neces
本文的目的是描述一个在教育环境中选择丰富活动的支持系统,称为RunayaySoft,其中Runayay来自单词Quechua,意思是开发和Soft,因为它是一个信息学工具,支持教育机构和学生选择活动,根据他们的兴趣,学习风格,能力,多元智能,偏好等培养他们的一些技能。此外,它还建议机构考虑到学生的特点和他们的协议,他们应该在他们的大楼里进行的活动。设计/方法/方法它是一种诊断,用于确定学生和机构将考虑哪些特征。然后,它生成自适应的概况,目的是生成丰富活动的建议,从而提高他们的一些技能。学生的喜好、学习风格、能力倾向、多元智能和兴趣都被考虑在内。就机构而言,是它们制定的协定、资源和活动。基于这些信息,它定义了针对学生的活动建议生成的关系,在这里它确定了应该考虑哪些活动的优先级。为了验证这个系统,它是作为一个功能原型来完成的,通过满意度测试,学生评估他们是否同意或不同意给出的建议,从而向学生和教育机构提出建议。通过该评估,验证了学生特征、活动和机构之间的关系,从而产生活动建议。研究局限/启示runayaysoft为学生、活动和机构生成自适应的配置文件。每个档案都有信息,可以为学生和机构提供建议。社会意义runayaysoft考虑学生的特点、活动和教育机构,为丰富活动提供建议,从而提高他们的一些技能。很多时候,当活动在教育机构中产生时,它们并不被认为是学习者的需求和特征。因此,当学生来自的院校没有必要的资源时,该系统可以帮助院校确定哪些活动应该在它们的设施内进行,或者与它们有协议的院校进行。创意/价值:unayaysoft向学生和教育机构建议丰富活动。对学生来说,它建议他们可以提高技能的学科领域;对于每个学科领域,根据他们的喜好推荐活动。一旦学生选择了学科领域和活动,该系统就会向教育机构推荐他们可以参加的活动。如果这些机构没有必要的设施,该系统会显示它们可以与哪些其他机构签订协议。此外,它支持教育机构确定富集集群,它将基于相似兴趣的学生聚集在一起,允许机构确定他们应该关注的活动。
{"title":"RunayaySoft","authors":"Juan Camilo González-Vargas, Angela Carrillo Ramos, R. Fabregat, Lizzeth Camargo, Maria Caridad García Cepero, Jaime A. Pavlich-Mariscal","doi":"10.1108/IJWIS-04-2018-0021","DOIUrl":"https://doi.org/10.1108/IJWIS-04-2018-0021","url":null,"abstract":"Purpose The purpose of this paper is to describe a support system to the selection of enrichment activities in educational environment called RunayaySoft, where Runayay comes from the word Quechua that means develop and Soft as it is an informatics tool that supports the educational institutions and their students, in the selection of activities that allow foster some of their skills based on their interests, learning styles, aptitudes, multiple intelligences, preferences and so on. Moreover, it suggests institutions about the activities that they should make in their building considering student´s characteristics and the agreements that they have. Design/methodology/approach It does a diagnostic for identifying which characteristics are going to be considered to students and institutions. Then, it generates adaptive profiles with the aim of generating suggestions of enrichment activities that allow to boost some of their skills. For the students were considered their preferences, learning style, aptitude, multiple intelligences and interests. In the case of institutions were the agreements, resources and activities that they develop. Based on this information, it defines the relations for the generation of suggestions of activities toward students, where it does the prioritization of which activities should be considered. Findings For validating the system, it was done as a functional prototype that generates suggestions to students, as well as educative institutions, through a satisfaction test student assess if they agree or disagree with the suggestions given. With that assessment, it is validated the relationship between student’s characteristics, activity and institution are related for generating activities suggestions. Research limitations/implications RunayaySoft generates adaptive profiles for the students, activity and institution. Each profile has information that allows adapt an advice toward students and institutions. Social implications RunayaySoft considers student’s characteristics, activities and educational institutions for generating suggestions for enrichment activities that allow to boost some of their skills. Many times, when activities are generated in educative institutions, they are not considered a learner’s needs and characteristics. For that reason, the system helps institutions to identify activities that should be done in their facilities or with those institutions which they have agreements when the institutions that students come from do not have the required resources. Originality/value RunayaySoft suggests enrichment activities to students as well as educative institutions. For students, it suggests disciplinary areas where they can boost their skills; for each disciplinary area are recommended activities based on their preferences. Once students select the disciplinary area and activities, the system suggests educative institutions activities that they can do. If the institutions do not have the neces","PeriodicalId":44153,"journal":{"name":"International Journal of Web Information Systems","volume":"15 1","pages":"103-131"},"PeriodicalIF":1.6,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1108/IJWIS-04-2018-0021","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"62040530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards a flexible framework to support a generalized extension of XACML for spatio-temporal RBAC model with reasoning ability 向着支持XACML的广义扩展的具有推理能力的时空RBAC模型的灵活框架迈进
IF 1.6 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2013-06-24 DOI: 10.1108/IJWIS-12-2013-0037
T. K. Dang, K. T. L. Thi, Anh Tuan Dang, H. Van
XACML is an international standard used for access control in distributed systems. However, XACML and its existing extensions are not sufficient to fulfil sophisticated security requirements (e.g. access control based on user’s roles, context-aware authorizations, and the ability of reasoning). Remarkably, X-STROWL, a generalized extension of XACML, is a comprehensive model that overcomes these shortcomings. Among a large amount of open sources implementing XACML, HERAS-AF is chosen as the most suitable framework to be extended to implement X-STROWL model. This paper mainly focuses on the architecture design of proposed framework and the comparison with other frameworks. In addition, a case study will be presented to clarify the work-flow of this framework. This is the crucial contribution of our research to provide a holistic, extensible and intelligent authorization decision engine.
XACML是用于分布式系统访问控制的国际标准。然而,XACML及其现有扩展不足以满足复杂的安全需求(例如,基于用户角色的访问控制、上下文感知授权和推理能力)。值得注意的是,XACML的广义扩展X-STROWL是一个全面的模型,它克服了这些缺点。在大量实现XACML的开源框架中,选择HERAS-AF作为最适合扩展实现X-STROWL模型的框架。本文主要对所提出的框架进行了体系结构设计,并与其他框架进行了比较。此外,还将介绍一个案例研究,以阐明该框架的工作流程。这是我们的研究对提供一个整体的、可扩展的和智能的授权决策引擎的重要贡献。
{"title":"Towards a flexible framework to support a generalized extension of XACML for spatio-temporal RBAC model with reasoning ability","authors":"T. K. Dang, K. T. L. Thi, Anh Tuan Dang, H. Van","doi":"10.1108/IJWIS-12-2013-0037","DOIUrl":"https://doi.org/10.1108/IJWIS-12-2013-0037","url":null,"abstract":"XACML is an international standard used for access control in distributed systems. However, XACML and its existing extensions are not sufficient to fulfil sophisticated security requirements (e.g. access control based on user’s roles, context-aware authorizations, and the ability of reasoning). Remarkably, X-STROWL, a generalized extension of XACML, is a comprehensive model that overcomes these shortcomings. Among a large amount of open sources implementing XACML, HERAS-AF is chosen as the most suitable framework to be extended to implement X-STROWL model. This paper mainly focuses on the architecture design of proposed framework and the comparison with other frameworks. In addition, a case study will be presented to clarify the work-flow of this framework. This is the crucial contribution of our research to provide a holistic, extensible and intelligent authorization decision engine.","PeriodicalId":44153,"journal":{"name":"International Journal of Web Information Systems","volume":"19 1","pages":"437-451"},"PeriodicalIF":1.6,"publicationDate":"2013-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85719790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Load distribution by using web workers for a real-time web application 通过使用web worker对实时web应用程序进行负载分配
IF 1.6 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2010-11-08 DOI: 10.1145/1967486.1967577
S. Okamoto, Masaki Kohana
In this paper, we describe a load distribution technique that employs web workers. We have been implementing a web-based MORPG as an interactive, real-time web application; previously, the web server alone was responsible for manipulating the behavior of all the game characters. As more users logged in, the workload on the server was increased. Hence, we have implemented a technique whereby the CPU load of the server is distributed among the clients; a performance evaluation reveals that our technique plays a role in decreasing the CGI latency of low-end servers and can decrease the CPU load of high-end servers when many users are logged in.
在本文中,我们描述了一种使用网络工作者的负载分配技术。我们一直在将基于web的MORPG作为一款交互式、实时的web应用;在此之前,web服务器独自负责操纵所有游戏角色的行为。随着越来越多的用户登录,服务器上的工作负载也在增加。因此,我们实现了一种技术,即服务器的CPU负载在客户端之间分配;性能评估表明,我们的技术可以降低低端服务器的CGI延迟,并且可以在多用户登录时降低高端服务器的CPU负载。
{"title":"Load distribution by using web workers for a real-time web application","authors":"S. Okamoto, Masaki Kohana","doi":"10.1145/1967486.1967577","DOIUrl":"https://doi.org/10.1145/1967486.1967577","url":null,"abstract":"In this paper, we describe a load distribution technique that employs web workers. We have been implementing a web-based MORPG as an interactive, real-time web application; previously, the web server alone was responsible for manipulating the behavior of all the game characters. As more users logged in, the workload on the server was increased. Hence, we have implemented a technique whereby the CPU load of the server is distributed among the clients; a performance evaluation reveals that our technique plays a role in decreasing the CGI latency of low-end servers and can decrease the CPU load of high-end servers when many users are logged in.","PeriodicalId":44153,"journal":{"name":"International Journal of Web Information Systems","volume":"7 1","pages":"592-597"},"PeriodicalIF":1.6,"publicationDate":"2010-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89102018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Updating multidimensional XML documents 更新多维XML文档
IF 1.6 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2008-06-20 DOI: 10.1108/17440080810882342
Nikolaos Fousteris, M. Gergatsoulis, Y. Stavrakas
Purpose – In a wide spectrum of applications, it is desirable to manipulate semistructured information that may present variations according to different circumstances. Multidimensional XML (MXML) is an extension of XML suitable for representing data that assume different facets, having different value and/or structure under different contexts. The purpose of this paper is to develop techniques for updating MXML documents.Design/methodology/approach – Updating XML has been studied in the past, however, updating MXML must take into account the additional features, which stem from incorporating context into MXML. This paper investigates the problem of updating MXML in two levels: at the graph level, i.e. in an implementation independent way; and at the relational storage level.Findings – The paper introduces six basic update operations, which are capable of any possible change. Those operations are specified in an implementation independent way, and their effect explained through examples. Algorithms are gi...
用途-在广泛的应用中,需要根据不同的情况处理可能呈现变化的半结构化信息。多维XML (MXML)是XML的一种扩展,适合表示在不同上下文中具有不同值和/或结构的不同方面的数据。本文的目的是开发更新MXML文档的技术。设计/方法论/方法——过去已经研究过更新XML,但是,更新MXML必须考虑到附加的特性,这些特性源于将上下文合并到MXML中。本文从两个层面研究了MXML的更新问题:在图层,即以独立于实现的方式;在关系存储级别。发现-本文介绍了六种基本的更新操作,这些操作能够进行任何可能的更改。这些操作以独立于实现的方式指定,并通过示例解释其效果。算法是gi…
{"title":"Updating multidimensional XML documents","authors":"Nikolaos Fousteris, M. Gergatsoulis, Y. Stavrakas","doi":"10.1108/17440080810882342","DOIUrl":"https://doi.org/10.1108/17440080810882342","url":null,"abstract":"Purpose – In a wide spectrum of applications, it is desirable to manipulate semistructured information that may present variations according to different circumstances. Multidimensional XML (MXML) is an extension of XML suitable for representing data that assume different facets, having different value and/or structure under different contexts. The purpose of this paper is to develop techniques for updating MXML documents.Design/methodology/approach – Updating XML has been studied in the past, however, updating MXML must take into account the additional features, which stem from incorporating context into MXML. This paper investigates the problem of updating MXML in two levels: at the graph level, i.e. in an implementation independent way; and at the relational storage level.Findings – The paper introduces six basic update operations, which are capable of any possible change. Those operations are specified in an implementation independent way, and their effect explained through examples. Algorithms are gi...","PeriodicalId":44153,"journal":{"name":"International Journal of Web Information Systems","volume":"19 1","pages":"257-266"},"PeriodicalIF":1.6,"publicationDate":"2008-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85626656","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Advances in agent and non-agent software engineering methodologies on the web and software systems 网络和软件系统中代理和非代理软件工程方法的进展
IF 1.6 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2007-12-20 DOI: 10.1108/IJWIS.2007.36203DAA.001
E. Shakshuki
{"title":"Advances in agent and non-agent software engineering methodologies on the web and software systems","authors":"E. Shakshuki","doi":"10.1108/IJWIS.2007.36203DAA.001","DOIUrl":"https://doi.org/10.1108/IJWIS.2007.36203DAA.001","url":null,"abstract":"","PeriodicalId":44153,"journal":{"name":"International Journal of Web Information Systems","volume":"3 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2007-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"62040480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Web Information Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1