首页 > 最新文献

Journal of Web Engineering最新文献

英文 中文
A Metadata-Driven Architecture for Federated Data Asset Management and Visualization in Energy Monitoring Networks 能源监测网络中联邦数据资产管理与可视化的元数据驱动体系结构
IF 1 4区 计算机科学 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2026-03-06 DOI: 10.13052/jwe1540-9589.2522
Qing Rao;Jianxia Wu;Shihong Chen;Zhongkai Pan;Qing Lei;Yinfeng Liu;Yangjinglan Feng;Xianping Jia
Distributed energy systems increasingly consist of heterogeneous assets and organizations that must exchange operational data while preserving inter-operability, security, and regulatory compliance. Existing integration solutions often rely on syntactic adapters or centralized data hubs, which scale poorly and offer limited transparency or governance. This paper presents a metadata-driven federated monitoring architecture that integrates ontology-based metadata federation, event-driven microservices, and governance-aware provenance tracking to enable secure, scalable, and auditable data sharing across distributed energy infrastructures. The proposed system models all assets and data streams through a unified semantic graph, aligning heterogeneous schemas via automated ontology matching and combined lexical-structural similarity scoring. A microservices pipeline ingests multi-protocol data (OPC-UA, MQTT, REST), applies stream analytics for anomaly detection, and enforces access and compliance policies at the metadata layer. A Web-based interface allows operators to issue GraphQL queries, visualize distributed assets, and monitor real-time alerts linked to provenance records. A prototype implementation demonstrates operational-scale efficiency, achieving low-latency response ($leq 540$ ms for hybrid metadata-telemetry queries over 10,000 assets), near-linear scalability (~4.5% CPU growth per added node), and high governance accuracy (precision 0.90, recall 0.95, median detection 1.6 s) while maintaining minimal overhead (<8% added latency). These results highlight that the proposed metadata-driven federation delivers both technical performance and governance reliability unmatched by existing Web-based integration frameworks. These results show that metadata federation can be deployed at operational scale while providing explainable compliance and trustworthy data sharing across organizational boundaries. This research advances the state of the art in Web-based system engineering by combining semantic modeling, distributed processing, and security governance into a single deployable framework. Beyond energy systems, the approach offers a foundation for interoperable and auditable monitoring in other critical cyber-physical domains such as industrial IoT, urban infrastructure, and healthcare telemetry.
分布式能源系统越来越多地由异构资产和组织组成,这些资产和组织必须交换操作数据,同时保持互操作性、安全性和法规遵从性。现有的集成解决方案通常依赖于语法适配器或集中式数据中心,它们的可伸缩性很差,并且提供的透明度或治理有限。本文提出了一种元数据驱动的联合监控架构,该架构集成了基于本体的元数据联合、事件驱动的微服务和治理感知的来源跟踪,以实现跨分布式能源基础设施的安全、可扩展和可审计的数据共享。该系统通过统一的语义图对所有资产和数据流建模,通过自动本体匹配和组合词汇结构相似度评分来对齐异构模式。微服务管道摄取多协议数据(OPC-UA、MQTT、REST),应用流分析进行异常检测,并在元数据层执行访问和遵从策略。基于web的界面允许操作人员发出GraphQL查询,可视化分布式资产,并监控与来源记录相关的实时警报。原型实现演示了操作规模的效率,实现了低延迟响应($leq 540$毫秒,用于超过10,000个资产的混合元数据遥测查询),近线性可扩展性(4.5% CPU growth per added node), and high governance accuracy (precision 0.90, recall 0.95, median detection 1.6 s) while maintaining minimal overhead (<8% added latency). These results highlight that the proposed metadata-driven federation delivers both technical performance and governance reliability unmatched by existing Web-based integration frameworks. These results show that metadata federation can be deployed at operational scale while providing explainable compliance and trustworthy data sharing across organizational boundaries. This research advances the state of the art in Web-based system engineering by combining semantic modeling, distributed processing, and security governance into a single deployable framework. Beyond energy systems, the approach offers a foundation for interoperable and auditable monitoring in other critical cyber-physical domains such as industrial IoT, urban infrastructure, and healthcare telemetry.
{"title":"A Metadata-Driven Architecture for Federated Data Asset Management and Visualization in Energy Monitoring Networks","authors":"Qing Rao;Jianxia Wu;Shihong Chen;Zhongkai Pan;Qing Lei;Yinfeng Liu;Yangjinglan Feng;Xianping Jia","doi":"10.13052/jwe1540-9589.2522","DOIUrl":"https://doi.org/10.13052/jwe1540-9589.2522","url":null,"abstract":"Distributed energy systems increasingly consist of heterogeneous assets and organizations that must exchange operational data while preserving inter-operability, security, and regulatory compliance. Existing integration solutions often rely on syntactic adapters or centralized data hubs, which scale poorly and offer limited transparency or governance. This paper presents a metadata-driven federated monitoring architecture that integrates ontology-based metadata federation, event-driven microservices, and governance-aware provenance tracking to enable secure, scalable, and auditable data sharing across distributed energy infrastructures. The proposed system models all assets and data streams through a unified semantic graph, aligning heterogeneous schemas via automated ontology matching and combined lexical-structural similarity scoring. A microservices pipeline ingests multi-protocol data (OPC-UA, MQTT, REST), applies stream analytics for anomaly detection, and enforces access and compliance policies at the metadata layer. A Web-based interface allows operators to issue GraphQL queries, visualize distributed assets, and monitor real-time alerts linked to provenance records. A prototype implementation demonstrates operational-scale efficiency, achieving low-latency response (<tex>$leq 540$</tex> ms for hybrid metadata-telemetry queries over 10,000 assets), near-linear scalability (~4.5% CPU growth per added node), and high governance accuracy (precision 0.90, recall 0.95, median detection 1.6 s) while maintaining minimal overhead (<8% added latency). These results highlight that the proposed metadata-driven federation delivers both technical performance and governance reliability unmatched by existing Web-based integration frameworks. These results show that metadata federation can be deployed at operational scale while providing explainable compliance and trustworthy data sharing across organizational boundaries. This research advances the state of the art in Web-based system engineering by combining semantic modeling, distributed processing, and security governance into a single deployable framework. Beyond energy systems, the approach offers a foundation for interoperable and auditable monitoring in other critical cyber-physical domains such as industrial IoT, urban infrastructure, and healthcare telemetry.","PeriodicalId":49952,"journal":{"name":"Journal of Web Engineering","volume":"25 2","pages":"153-186"},"PeriodicalIF":1.0,"publicationDate":"2026-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11424362","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147362412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Service-Oriented Web Framework for Real-time Data Flow Tracing and Threat Propagation Analysis in Distributed Energy Systems 分布式能源系统实时数据流跟踪与威胁传播分析的面向服务Web框架
IF 1 4区 计算机科学 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2026-03-06 DOI: 10.13052/jwe1540-9589.2525
Qing Rao;Yunhao Yu;Yizhou Fu;Boda Zhang;Shihong Chen;Jianxia Wu;Zhongkai Pan;Qing Lei
Ensuring data-flow integrity and rapid threat containment in renewable-integrated, distributed energy systems requires monitoring solutions that are technically rigorous yet lightweight in operation. This paper presents a service-oriented web framework for real-time data-flow tracing and threat propagation analysis in heterogeneous industrial control and energy networks. The framework integrates lightweight provenance tokens embedded in event streams, an incrementally maintained lineage graph with probability-weighted edges, and propagation-aware risk indicators that drive adaptive response orchestration through open web APIs. A progressive web dashboard provides sub-second visualization of dynamic topologies, risk heat maps, and operator controls. Implemented on a Kafka/Flink streaming backbone with a graph database and deployed in an eight-node Kubernetes testbed emulating substations, gateways, and adversarial nodes using OPC UA, MQTT, and REST, the system achieved tracing coverage of $0.96pm 0.02$ and fidelity of $0.92 pm 0.03$, with forward propagation prediction reaching precision 0.91 and recall 0.88, outperforming static-topology baselines. Adaptive containment reduced the flow reproduction factor from 1.42 to 0.64, achieved a median containment efficacy of 0.71, and stabilized risk trajectories within two minutes, while operational cost remained low with payload expansion under 12%, CPU overhead below 4%, and service availability above 0.99 for critical assets. User studies showed 38% faster incident response and higher comprehension and confidence compared with static log viewers. These results demonstrate that modern web-engineering practices such as microservices, event-driven streaming, and progressive web interfaces can enable practical, real-time cyber defense for distributed energy infrastructures by bridging static security guidelines with deployable, adaptive situational awareness and containment.
在可再生能源集成、分布式能源系统中,确保数据流完整性和快速遏制威胁需要技术严格、操作轻便的监控解决方案。本文提出了面向服务的web框架,用于异构工业控制和能源网络的实时数据流跟踪和威胁传播分析。该框架集成了嵌入在事件流中的轻量级来源令牌,带有概率加权边的增量维护谱系图,以及通过开放web api驱动自适应响应编排的传播感知风险指标。渐进式web仪表板提供亚秒级的动态拓扑可视化、风险热图和操作控制。该系统在Kafka/Flink流主干上实现,使用图形数据库,部署在8节点Kubernetes测试平台上,使用OPC UA, MQTT和REST模拟变电站,网关和对抗节点,系统实现了跟踪覆盖率为0.96pm 0.02美元,保真度为0.92 pm 0.03美元,前向传播预测达到精度0.91,召回率0.88,优于静态拓扑基线。自适应封堵将流量再现系数从1.42降至0.64,封堵效能中位数为0.71,并在2分钟内稳定了风险轨迹,同时运营成本保持较低,有效载荷扩展低于12%,CPU开销低于4%,关键资产的服务可用性高于0.99。用户研究表明,与静态日志查看器相比,事件响应速度快38%,理解能力和信心也更高。这些结果表明,现代网络工程实践,如微服务、事件驱动流和渐进式网络接口,可以通过将静态安全指南与可部署的、自适应的态势感知和遏制联系起来,为分布式能源基础设施实现实用的、实时的网络防御。
{"title":"Service-Oriented Web Framework for Real-time Data Flow Tracing and Threat Propagation Analysis in Distributed Energy Systems","authors":"Qing Rao;Yunhao Yu;Yizhou Fu;Boda Zhang;Shihong Chen;Jianxia Wu;Zhongkai Pan;Qing Lei","doi":"10.13052/jwe1540-9589.2525","DOIUrl":"https://doi.org/10.13052/jwe1540-9589.2525","url":null,"abstract":"Ensuring data-flow integrity and rapid threat containment in renewable-integrated, distributed energy systems requires monitoring solutions that are technically rigorous yet lightweight in operation. This paper presents a service-oriented web framework for real-time data-flow tracing and threat propagation analysis in heterogeneous industrial control and energy networks. The framework integrates lightweight provenance tokens embedded in event streams, an incrementally maintained lineage graph with probability-weighted edges, and propagation-aware risk indicators that drive adaptive response orchestration through open web APIs. A progressive web dashboard provides sub-second visualization of dynamic topologies, risk heat maps, and operator controls. Implemented on a Kafka/Flink streaming backbone with a graph database and deployed in an eight-node Kubernetes testbed emulating substations, gateways, and adversarial nodes using OPC UA, MQTT, and REST, the system achieved tracing coverage of <tex>$0.96pm 0.02$</tex> and fidelity of <tex>$0.92 pm 0.03$</tex>, with forward propagation prediction reaching precision 0.91 and recall 0.88, outperforming static-topology baselines. Adaptive containment reduced the flow reproduction factor from 1.42 to 0.64, achieved a median containment efficacy of 0.71, and stabilized risk trajectories within two minutes, while operational cost remained low with payload expansion under 12%, CPU overhead below 4%, and service availability above 0.99 for critical assets. User studies showed 38% faster incident response and higher comprehension and confidence compared with static log viewers. These results demonstrate that modern web-engineering practices such as microservices, event-driven streaming, and progressive web interfaces can enable practical, real-time cyber defense for distributed energy infrastructures by bridging static security guidelines with deployable, adaptive situational awareness and containment.","PeriodicalId":49952,"journal":{"name":"Journal of Web Engineering","volume":"25 2","pages":"249-282"},"PeriodicalIF":1.0,"publicationDate":"2026-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11424361","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147362472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Quantum Software Engineering: Something Old, Something New; Something Borrowed, Something Blue 量子软件工程:有旧有新借来的东西,蓝色的东西
IF 1 4区 计算机科学 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2026-03-06 DOI: 10.13052/jwe1540-9589.2526
Jose Garcia-Alonso;Majid Haghparast;Tommi Mikkonen;Juan Manuel Murillo Rodríguez;Vlad Stirbu
Quantum software engineering has gained a lot of attention recently. Multiple traditional software engineering events have introduced a quantum software track, or a co-located quantum related workshop or other side event, indicating that quantum software is becoming a popular research topic, with more and more software engineering researchers contributing to its evolution. In this paper, we address software engineering research that aims at solving problems that emerge when quantum programs are used on industry domains. The paper is based on the keynote at the IEEE Symposium on Quantum Software: Quantum Software Engineering 2025, which took place in Helsinki, Finland, Summer of 2025. In particular, we address the state of research in quantum software engineering, its novel aspects as well as its connections to other branches of software engineering. Furthermore, in the light of this research, we also assess the maturity of quantum software engineering in the light of industry expectations.
量子软件工程最近获得了很多关注。许多传统的软件工程活动都引入了量子软件专题,或者同地举办了与量子相关的研讨会或其他边会,这表明量子软件正在成为一个热门的研究课题,越来越多的软件工程研究人员为其发展做出了贡献。在本文中,我们讨论了旨在解决量子程序在工业领域使用时出现的问题的软件工程研究。这篇论文是基于2025年夏天在芬兰赫尔辛基举行的IEEE量子软件研讨会:量子软件工程2025的主题。特别地,我们讨论了量子软件工程的研究现状,它的新颖方面以及它与软件工程其他分支的联系。此外,根据本研究,我们还根据行业预期评估了量子软件工程的成熟度。
{"title":"Quantum Software Engineering: Something Old, Something New; Something Borrowed, Something Blue","authors":"Jose Garcia-Alonso;Majid Haghparast;Tommi Mikkonen;Juan Manuel Murillo Rodríguez;Vlad Stirbu","doi":"10.13052/jwe1540-9589.2526","DOIUrl":"https://doi.org/10.13052/jwe1540-9589.2526","url":null,"abstract":"Quantum software engineering has gained a lot of attention recently. Multiple traditional software engineering events have introduced a quantum software track, or a co-located quantum related workshop or other side event, indicating that quantum software is becoming a popular research topic, with more and more software engineering researchers contributing to its evolution. In this paper, we address software engineering research that aims at solving problems that emerge when quantum programs are used on industry domains. The paper is based on the keynote at the IEEE Symposium on Quantum Software: Quantum Software Engineering 2025, which took place in Helsinki, Finland, Summer of 2025. In particular, we address the state of research in quantum software engineering, its novel aspects as well as its connections to other branches of software engineering. Furthermore, in the light of this research, we also assess the maturity of quantum software engineering in the light of industry expectations.","PeriodicalId":49952,"journal":{"name":"Journal of Web Engineering","volume":"25 2","pages":"283-298"},"PeriodicalIF":1.0,"publicationDate":"2026-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11424365","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147362398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Causal Cross-Embedded Spatio-Temporal LSTM for Web Traffic Prediction 基于因果交叉嵌入时空LSTM的网络流量预测
IF 1 4区 计算机科学 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2026-03-06 DOI: 10.13052/jwe1540-9589.2524
Zhao Na;Mao Yanying
Web service traffic forecasting is vital for dynamic resource scaling, load balancing, and anomaly detection, but remains challenging due to frequent large-scale fluctuations caused by heterogeneous user behaviors. Traditional time-series models and recent deep neural networks have made progress by capturing temporal patterns, yet they largely overlook latent causal relationships between services that can significantly influence traffic dynamics. In this paper, we propose a novel causal cross-embedded spatio-temporal LSTM (CEST-LSTM) architecture that integrates spatio-temporal modelling with a causal inference mechanism to improve web traffic prediction. The model consists of a spatio-temporal LSTM branch for capturing temporal dependencies across services and a causal branch that leverages convergent cross mapping-based cross-embedding to uncover and incorporate latent inter-service causal influences. A cross-embedding fusion mechanism seamlessly combines these causal features with spatio-temporal representations. On real-world datasets (e.g., Microsoft Azure and Alibaba Cloud), CEST-LSTM achieves a variance-explained prediction accuracy of approximately 93%, surpassing state-of-the-art baselines such as temporal graph convolutional networks (T-GCN) and spatio-temporal attention GCNs (STA-GCN). Comparative experiments and ablation studies confirm that the causal branch consistently improves forecasting accuracy - for example, removing the causal module reduces accuracy by several percentage points. These results demonstrate that integrating latent causal relationship modelling into spatio-temporal neural networks yields substantial improvements in web traffic prediction, offering a promising direction for robust and interpretable forecasting in complex web systems.
Web服务流量预测对于动态资源扩展、负载平衡和异常检测至关重要,但由于异构用户行为引起的频繁大规模波动,仍然具有挑战性。传统的时间序列模型和最近的深度神经网络在捕获时间模式方面取得了进展,但它们在很大程度上忽略了服务之间潜在的因果关系,而这些因果关系可能会显著影响交通动态。在本文中,我们提出了一种新的因果交叉嵌入时空LSTM (CEST-LSTM)架构,该架构将时空建模与因果推理机制相结合,以改进网络流量预测。该模型包括一个时空LSTM分支,用于捕获跨服务的时间依赖性,以及一个因果分支,该分支利用基于交叉映射的交叉嵌入来发现和合并潜在的服务间因果影响。交叉嵌入融合机制将这些因果特征与时空表征无缝地结合在一起。在真实世界的数据集(例如,微软Azure和阿里云)上,CEST-LSTM实现了方差解释的预测精度约为93%,超过了最先进的基线,如时间图卷积网络(T-GCN)和时空注意力gcn (STA-GCN)。对比实验和消融研究证实,因果分支持续提高预测的准确性——例如,删除因果模块会使准确性降低几个百分点。这些结果表明,将潜在因果关系建模集成到时空神经网络中可以显著改善网络流量预测,为复杂网络系统的鲁棒性和可解释性预测提供了一个有希望的方向。
{"title":"Causal Cross-Embedded Spatio-Temporal LSTM for Web Traffic Prediction","authors":"Zhao Na;Mao Yanying","doi":"10.13052/jwe1540-9589.2524","DOIUrl":"https://doi.org/10.13052/jwe1540-9589.2524","url":null,"abstract":"Web service traffic forecasting is vital for dynamic resource scaling, load balancing, and anomaly detection, but remains challenging due to frequent large-scale fluctuations caused by heterogeneous user behaviors. Traditional time-series models and recent deep neural networks have made progress by capturing temporal patterns, yet they largely overlook latent causal relationships between services that can significantly influence traffic dynamics. In this paper, we propose a novel causal cross-embedded spatio-temporal LSTM (CEST-LSTM) architecture that integrates spatio-temporal modelling with a causal inference mechanism to improve web traffic prediction. The model consists of a spatio-temporal LSTM branch for capturing temporal dependencies across services and a causal branch that leverages convergent cross mapping-based cross-embedding to uncover and incorporate latent inter-service causal influences. A cross-embedding fusion mechanism seamlessly combines these causal features with spatio-temporal representations. On real-world datasets (e.g., Microsoft Azure and Alibaba Cloud), CEST-LSTM achieves a variance-explained prediction accuracy of approximately 93%, surpassing state-of-the-art baselines such as temporal graph convolutional networks (T-GCN) and spatio-temporal attention GCNs (STA-GCN). Comparative experiments and ablation studies confirm that the causal branch consistently improves forecasting accuracy - for example, removing the causal module reduces accuracy by several percentage points. These results demonstrate that integrating latent causal relationship modelling into spatio-temporal neural networks yields substantial improvements in web traffic prediction, offering a promising direction for robust and interpretable forecasting in complex web systems.","PeriodicalId":49952,"journal":{"name":"Journal of Web Engineering","volume":"25 2","pages":"215-248"},"PeriodicalIF":1.0,"publicationDate":"2026-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11424363","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147362574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adaptive Sampling for Real-Time Neural View Synthesis on the Web with Reinforcement Learning 基于强化学习的网络实时神经视图合成的自适应采样
IF 1 4区 计算机科学 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2026-03-06 DOI: 10.13052/jwe1540-9589.2521
OkHwan Bae;Chung-Pyo Hong
The proliferation of immersive 3D web applications, from e-commerce product viewers to virtual real estate tours, has created a critical need for high-quality, real-time rendering directly within the browser. Neural radiance fields (NeRF) offer unprecedented photorealism but are hamstrung by immense computational demands, making their deployment on resource-constrained web platforms a significant web engineering challenge. The core bottleneck is NeRF's reliance on dense point sampling for volume rendering. This paper introduces a novel framework that directly tackles this challenge through a pioneering adaptive sampling technique powered by reinforcement learning. We name this framework PPO-NeRF. It integrates the rapid training capabilities of Instant-NGP's hash encoding with an agent trained via proximal policy optimization (PPO). This agent learns to adaptively predict the minimal set of crucial sample points along each camera ray, dynamically pruning computationally redundant samples to optimize rendering specifically for web-based, real-time scenarios. Experimental results demonstrate that PPO-NeRF significantly lowers the barrier to web deployment. Compared to the original NeRF, it reduces training time by approximately 73.63%, enabling faster content iteration for web developers. More critically, our adaptive sampling slashes rendering time by approximately 44.7% and VRAM usage by approximately 29.9%, while maintaining comparable visual fidelity. These gains directly translate to faster load times, smoother user interaction, and broader device compatibility. In conclusion, PPO-NeRF provides a practical solution to NeRF's long-standing performance bottlenecks, establishing a viable pathway for deploying high-fidelity, interactive 3D experiences at scale across the modern web.
从电子商务产品查看器到虚拟房地产游览,沉浸式3D web应用程序的激增,产生了对直接在浏览器中进行高质量实时渲染的迫切需求。神经辐射场(NeRF)提供了前所未有的真实感,但受到巨大计算需求的限制,使得它们在资源有限的网络平台上的部署成为一个重大的网络工程挑战。核心瓶颈是NeRF依赖于密集点采样来进行体绘制。本文介绍了一个新的框架,通过一种由强化学习驱动的开创性自适应采样技术直接解决了这一挑战。我们将此框架命名为PPO-NeRF。它将Instant-NGP哈希编码的快速训练能力与通过近端策略优化(PPO)训练的代理集成在一起。该代理学习自适应地预测沿每个相机光线的关键样本点的最小集合,动态修剪计算冗余的样本,以优化基于web的实时场景的渲染。实验结果表明,PPO-NeRF显著降低了web部署的障碍。与最初的NeRF相比,它减少了大约73.63%的训练时间,为web开发人员提供了更快的内容迭代。更重要的是,我们的自适应采样减少了大约44.7%的渲染时间,减少了大约29.9%的VRAM使用,同时保持了相当的视觉保真度。这些增益直接转化为更快的加载时间、更流畅的用户交互和更广泛的设备兼容性。总之,PPO-NeRF为NeRF长期存在的性能瓶颈提供了一个实用的解决方案,为在现代网络上大规模部署高保真交互式3D体验建立了一条可行的途径。
{"title":"Adaptive Sampling for Real-Time Neural View Synthesis on the Web with Reinforcement Learning","authors":"OkHwan Bae;Chung-Pyo Hong","doi":"10.13052/jwe1540-9589.2521","DOIUrl":"https://doi.org/10.13052/jwe1540-9589.2521","url":null,"abstract":"The proliferation of immersive 3D web applications, from e-commerce product viewers to virtual real estate tours, has created a critical need for high-quality, real-time rendering directly within the browser. Neural radiance fields (NeRF) offer unprecedented photorealism but are hamstrung by immense computational demands, making their deployment on resource-constrained web platforms a significant web engineering challenge. The core bottleneck is NeRF's reliance on dense point sampling for volume rendering. This paper introduces a novel framework that directly tackles this challenge through a pioneering adaptive sampling technique powered by reinforcement learning. We name this framework PPO-NeRF. It integrates the rapid training capabilities of Instant-NGP's hash encoding with an agent trained via proximal policy optimization (PPO). This agent learns to adaptively predict the minimal set of crucial sample points along each camera ray, dynamically pruning computationally redundant samples to optimize rendering specifically for web-based, real-time scenarios. Experimental results demonstrate that PPO-NeRF significantly lowers the barrier to web deployment. Compared to the original NeRF, it reduces training time by approximately 73.63%, enabling faster content iteration for web developers. More critically, our adaptive sampling slashes rendering time by approximately 44.7% and VRAM usage by approximately 29.9%, while maintaining comparable visual fidelity. These gains directly translate to faster load times, smoother user interaction, and broader device compatibility. In conclusion, PPO-NeRF provides a practical solution to NeRF's long-standing performance bottlenecks, establishing a viable pathway for deploying high-fidelity, interactive 3D experiences at scale across the modern web.","PeriodicalId":49952,"journal":{"name":"Journal of Web Engineering","volume":"25 2","pages":"135-152"},"PeriodicalIF":1.0,"publicationDate":"2026-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11424339","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147362588","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PK-PoMLO: Public Key Proof of ML Ownership System PK-PoMLO: ML所有权的公钥证明系统
IF 1 4区 计算机科学 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2026-01-01 DOI: 10.13052/jwe1540-9589.2514
Joyeon Park;Jinah Seo;Do. KyoungHwa;Soo Yong Park
In this study, we propose an on-chain-based ML ownership proof system (PK-PoMLO), which combines a digital signature and a blockchain timestamp value to generate a certificate of ownership that is publicly disclosed on-chain, enabling strong claim of ML ownership. First, the owner creates a certificate signed with their private key using the hash value of the ML model and a structured message, and includes a timestamp. This is then used to generate an ML ownership certificate and registered on-chain. At this time, the owner uses their private key to create a standard signature value as a 128-bit mark and embeds it in the ML model. Anyone wishing to verify ML ownership then uses the owner's public key to compare the hash value of the on-chain ML ownership certificate with the timestamp value to verify ML ownership. In other words, we can verify the authenticity of the owner by testing whether the bit error rate (BER) between the mark extracted from the ML ownership certificate and the internally stored mark string satisfies BER $leqtau$, and verifying it with the signature value of the ML ownership certificate. To verify the results of this study, we implement and evaluate a prototype on the MNIST MLP and the Ethereum Sepolia test network.
在本研究中,我们提出了一个基于链上的机器所有权证明系统(PK-PoMLO),它结合了数字签名和区块链时间戳值来生成一个在链上公开披露的所有权证书,从而实现了机器所有权的强有力声明。首先,所有者使用ML模型的哈希值和结构化消息创建一个用其私钥签名的证书,并包含一个时间戳。然后用于生成ML所有权证书并在链上注册。此时,所有者使用他们的私钥创建一个标准签名值作为128位标记,并将其嵌入ML模型中。任何希望验证ML所有权的人都可以使用所有者的公钥将链上ML所有权证书的哈希值与时间戳值进行比较,以验证ML所有权。换句话说,我们可以通过测试从ML所有权证书中提取的标记与内部存储的标记字符串之间的误码率(BER)是否满足BER $leqtau$,并与ML所有权证书的签名值进行验证,来验证所有者的真实性。为了验证这项研究的结果,我们在MNIST MLP和以太坊Sepolia测试网络上实现和评估了一个原型。
{"title":"PK-PoMLO: Public Key Proof of ML Ownership System","authors":"Joyeon Park;Jinah Seo;Do. KyoungHwa;Soo Yong Park","doi":"10.13052/jwe1540-9589.2514","DOIUrl":"https://doi.org/10.13052/jwe1540-9589.2514","url":null,"abstract":"In this study, we propose an on-chain-based ML ownership proof system (PK-PoMLO), which combines a digital signature and a blockchain timestamp value to generate a certificate of ownership that is publicly disclosed on-chain, enabling strong claim of ML ownership. First, the owner creates a certificate signed with their private key using the hash value of the ML model and a structured message, and includes a timestamp. This is then used to generate an ML ownership certificate and registered on-chain. At this time, the owner uses their private key to create a standard signature value as a 128-bit mark and embeds it in the ML model. Anyone wishing to verify ML ownership then uses the owner's public key to compare the hash value of the on-chain ML ownership certificate with the timestamp value to verify ML ownership. In other words, we can verify the authenticity of the owner by testing whether the bit error rate (BER) between the mark extracted from the ML ownership certificate and the internally stored mark string satisfies BER <tex>$leqtau$</tex>, and verifying it with the signature value of the ML ownership certificate. To verify the results of this study, we implement and evaluate a prototype on the MNIST MLP and the Ethereum Sepolia test network.","PeriodicalId":49952,"journal":{"name":"Journal of Web Engineering","volume":"25 1","pages":"51-66"},"PeriodicalIF":1.0,"publicationDate":"2026-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11370661","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146098432","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Agentic AI Service Architecture Based on SOA 基于SOA的代理AI服务体系结构
IF 1 4区 计算机科学 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2026-01-01 DOI: 10.13052/jwe1540-9589.2511
Dong Bin Choi;Yunhee Kang;Young B. Park
Service-Oriented Architecture (SOA) structures applications into collections of modular, independent, and reusable services. We propose an SOA-based intelligent service agent framework for building AI applications that decomposes complex tasks into independent functional units. In the framework, the agent operates as an intelligent executor that dynamically orchestrates and invokes diverse services and tools to achieve its goals. The agent is exposed as a self-contained service with a well-defined API, allowing external applications to invoke it directly. By instrumenting requests and responses at both the service and agent layers, the framework enables tracing of the agent's capabilities, performance, and decision-making. We present the design of an operational scheme for the agent with DID handling, verifiable credentials (VC), and verifiable presentations (VP). Each of the agents collaborates on a shared workspace based on blackboard to handle tasks to reach a goal. Finally, we demonstrate its feasibility through a proof-of-concept (PoC) for Agentic AI service architecture. This proof-of-concept, structured across Phase 1 (discovery, verification, and scoped authorization) and Phase 2 (problem posting and blackboard-mediated collaboration), demonstrates that DID-backed credentialing can securely support multi-agent execution under a least-privilege operational model.
面向服务的体系结构(SOA)将应用程序结构为模块化的、独立的和可重用的服务集合。我们提出了一个基于soa的智能服务代理框架,用于构建将复杂任务分解为独立功能单元的人工智能应用程序。在框架中,代理作为智能执行者进行操作,动态地协调和调用各种服务和工具来实现其目标。代理公开为具有良好定义的API的自包含服务,允许外部应用程序直接调用它。通过在服务层和代理层检测请求和响应,框架支持跟踪代理的功能、性能和决策。我们提出了一个具有DID处理、可验证凭据(VC)和可验证表示(VP)的代理的操作方案设计。每个代理在基于黑板的共享工作空间上协作,处理任务以达到目标。最后,我们通过代理AI服务架构的概念验证(PoC)来证明其可行性。这个概念验证横跨阶段1(发现、验证和限定范围的授权)和阶段2(问题发布和黑板协调的协作),证明了基于did的认证可以在最少特权操作模型下安全地支持多代理执行。
{"title":"Agentic AI Service Architecture Based on SOA","authors":"Dong Bin Choi;Yunhee Kang;Young B. Park","doi":"10.13052/jwe1540-9589.2511","DOIUrl":"https://doi.org/10.13052/jwe1540-9589.2511","url":null,"abstract":"Service-Oriented Architecture (SOA) structures applications into collections of modular, independent, and reusable services. We propose an SOA-based intelligent service agent framework for building AI applications that decomposes complex tasks into independent functional units. In the framework, the agent operates as an intelligent executor that dynamically orchestrates and invokes diverse services and tools to achieve its goals. The agent is exposed as a self-contained service with a well-defined API, allowing external applications to invoke it directly. By instrumenting requests and responses at both the service and agent layers, the framework enables tracing of the agent's capabilities, performance, and decision-making. We present the design of an operational scheme for the agent with DID handling, verifiable credentials (VC), and verifiable presentations (VP). Each of the agents collaborates on a shared workspace based on blackboard to handle tasks to reach a goal. Finally, we demonstrate its feasibility through a proof-of-concept (PoC) for Agentic AI service architecture. This proof-of-concept, structured across Phase 1 (discovery, verification, and scoped authorization) and Phase 2 (problem posting and blackboard-mediated collaboration), demonstrates that DID-backed credentialing can securely support multi-agent execution under a least-privilege operational model.","PeriodicalId":49952,"journal":{"name":"Journal of Web Engineering","volume":"25 1","pages":"1-18"},"PeriodicalIF":1.0,"publicationDate":"2026-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11370646","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146098435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
KeyShield: Leakage-and-Loss-Resilient Private Key Protection for Web3 KeyShield:针对Web3的防泄漏和防丢失私钥保护
IF 1 4区 计算机科学 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2026-01-01 DOI: 10.13052/jwe1540-9589.2515
Ziyang Ji;Jie Zhang;Yuji Dong;Ka Lok Man;Steven Guan;Mucheol Kim
Effective management of private keys is crucial to ensure the security and ownership of users' data and digital assets in the Web3 environment. However, existing solutions often fail to adequately address private key management from the user's perspective. Private key leakage and loss incidents occur frequently, resulting in significant losses of digital assets. Moreover, the conventional approach of revoking both the private and public keys after a leakage or loss accident is inconvenient in Web3, where the public key serves as the user's wallet address or digital identity. To tackle the issue of user-side private key management in Web3, this paper presents KeyShield which is a leakage-and-loss-resilient private key protection scheme. KeyShield divides the user's private key into three shares, securely stored across a primary device and a secondary device owned by the user, and a third storage module owned by the user or a semi-trusted service provider. For daily use of the private key, the user only needs to connect the primary and secondary devices. In the event of a leakage or loss, such as device theft or attack, an update process will be triggered to update the three shares, immediately invalidating the leaked or lost share while causing no changes to the public key. As a demonstration of KeyShield, we developed KeyShieldECC accessible on both Android and iOS platforms for managing Elliptic Curve Cryptography (ECC) private keys. The testing results show that for a 256-bit ECC private key, the daily use only needs 0.05 seconds and update needs 0.25 to 0.3 seconds on an ordinary smart phone.
私钥的有效管理对于确保Web3环境中用户数据和数字资产的安全性和所有权至关重要。然而,现有的解决方案往往不能从用户的角度充分解决私钥管理问题。私钥泄露和丢失事件频发,造成数字资产的重大损失。此外,在Web3中,在发生泄漏或丢失事故后同时撤销私钥和公钥的传统方法是不方便的,因为在Web3中,公钥作为用户的钱包地址或数字身份。为了解决Web3中用户侧私钥管理的问题,本文提出了一种防泄漏和防丢失的私钥保护方案KeyShield。KeyShield将用户的私钥分成三个共享,安全地存储在用户拥有的主设备和辅助设备上,以及用户或半信任的服务提供商拥有的第三个存储模块上。对于私钥的日常使用,用户只需要连接主设备和从设备即可。如果发生泄漏或丢失,例如设备被盗或攻击,将触发更新过程来更新三个共享,立即使泄漏或丢失的共享无效,同时不会对公钥进行更改。作为KeyShield的演示,我们开发了可以在Android和iOS平台上访问的KeyShieldECC,用于管理椭圆曲线加密(ECC)私钥。测试结果表明,对于256位的ECC私钥,普通智能手机的日常使用仅需0.05秒,更新则需要0.25 ~ 0.3秒。
{"title":"KeyShield: Leakage-and-Loss-Resilient Private Key Protection for Web3","authors":"Ziyang Ji;Jie Zhang;Yuji Dong;Ka Lok Man;Steven Guan;Mucheol Kim","doi":"10.13052/jwe1540-9589.2515","DOIUrl":"https://doi.org/10.13052/jwe1540-9589.2515","url":null,"abstract":"Effective management of private keys is crucial to ensure the security and ownership of users' data and digital assets in the Web3 environment. However, existing solutions often fail to adequately address private key management from the user's perspective. Private key leakage and loss incidents occur frequently, resulting in significant losses of digital assets. Moreover, the conventional approach of revoking both the private and public keys after a leakage or loss accident is inconvenient in Web3, where the public key serves as the user's wallet address or digital identity. To tackle the issue of user-side private key management in Web3, this paper presents KeyShield which is a leakage-and-loss-resilient private key protection scheme. KeyShield divides the user's private key into three shares, securely stored across a primary device and a secondary device owned by the user, and a third storage module owned by the user or a semi-trusted service provider. For daily use of the private key, the user only needs to connect the primary and secondary devices. In the event of a leakage or loss, such as device theft or attack, an update process will be triggered to update the three shares, immediately invalidating the leaked or lost share while causing no changes to the public key. As a demonstration of KeyShield, we developed KeyShieldECC accessible on both Android and iOS platforms for managing Elliptic Curve Cryptography (ECC) private keys. The testing results show that for a 256-bit ECC private key, the daily use only needs 0.05 seconds and update needs 0.25 to 0.3 seconds on an ordinary smart phone.","PeriodicalId":49952,"journal":{"name":"Journal of Web Engineering","volume":"25 1","pages":"67-102"},"PeriodicalIF":1.0,"publicationDate":"2026-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11370645","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146098437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
VisionGuard: Cost-Sensitive AI Attestation with Quorum-Verified Blockchain Enforcement VisionGuard:成本敏感的人工智能认证与群体验证bb0执行
IF 1 4区 计算机科学 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2026-01-01 DOI: 10.13052/jwe1540-9589.2516
Sundara Srivathsan M.;Lighittha P. R.;Prithivraj S.;Suganya Ramamoorthy;Vijayan Sugumaran
Web3 platforms face a critical challenge: once unsafe content is minted on-chain, it becomes immutable and irrevocable. Traditional NSFW classifiers operate off-chain without cryptographic guarantees, leaving blockchain ecosystems vulnerable to harmful content. We present VisionGuard, a unified moderation framework that integrates cost-sensitive AI decision-making with blockchain-based enforcement. Our system combines calibrated NSFW classification, abstention-based triage for uncertain cases, perceptual hashing for near-duplicate detection, and on-chain k-of-n quorum attestation using EIP-712 signatures. We establish formal guarantees for: (i) Bayes-optimal cost-sensitive thresholds minimizing asymmetric error costs, (ii) optimal abstention intervals for human review, (iii) monotone false-negative reduction under classifier-pHash fusion, (iv) quorum compromise bounds, and (v) end-to-end unsafe-mint probability. Empirical validation on a zero-shot NSFW task demonstrates 82% accuracy (AUC = 0.88), with the Bayes-optimal threshold $(tau^{*}=0.1)$ reducing expected cost to 27,520 versus 54,942 at the F1-optimal threshold-a 50% improvement. Calibrated abstention further lowers harm (cost= 10,649.5), while a 3-of-5 quorum with oracle compromise $p=0.1$ yields break probability $P_{text{break}} < 1%$. Together, Vision Guard bridges decision theory, adversarial robustness, and cryptographic enforcement, providing the first provably safe AI moderation pathway for blockchain content.
Web3平台面临着一个关键的挑战:一旦不安全的内容在链上被制造出来,它就会变得不可改变和不可撤销。传统的NSFW分类器在没有加密保证的情况下运行,使区块链生态系统容易受到有害内容的影响。我们提出了VisionGuard,这是一个统一的审核框架,将成本敏感的人工智能决策与基于区块链的执行相结合。我们的系统结合了校准的NSFW分类、基于弃权的不确定病例分类、用于近重复检测的感知哈希,以及使用EIP-712签名的链上k-of-n仲裁认证。我们建立了正式保证:(i)贝叶斯最优成本敏感阈值,最大限度地减少不对称错误成本,(ii)人工审查的最优弃权间隔,(iii)分类器- phash融合下的单一假阴性减少,(iv)仲裁妥协界限,以及(v)端到端不安全的mint概率。在零射击NSFW任务上的经验验证表明准确率为82% (AUC = 0.88),贝叶斯最优阈值$(tau^{*}=0.1)$将预期成本降低到27,520,而f1最优阈值为54,942,提高了50%。校准的弃权进一步降低了伤害(成本= 10,649.5),而3-of-5仲裁与oracle妥协$p=0.1$产生中断概率$P_{text{break}} < 1%$。Vision Guard将决策理论、对抗鲁棒性和加密强制连接在一起,为区块链内容提供了第一个可证明安全的人工智能审核途径。
{"title":"VisionGuard: Cost-Sensitive AI Attestation with Quorum-Verified Blockchain Enforcement","authors":"Sundara Srivathsan M.;Lighittha P. R.;Prithivraj S.;Suganya Ramamoorthy;Vijayan Sugumaran","doi":"10.13052/jwe1540-9589.2516","DOIUrl":"https://doi.org/10.13052/jwe1540-9589.2516","url":null,"abstract":"Web3 platforms face a critical challenge: once unsafe content is minted on-chain, it becomes immutable and irrevocable. Traditional NSFW classifiers operate off-chain without cryptographic guarantees, leaving blockchain ecosystems vulnerable to harmful content. We present VisionGuard, a unified moderation framework that integrates cost-sensitive AI decision-making with blockchain-based enforcement. Our system combines calibrated NSFW classification, abstention-based triage for uncertain cases, perceptual hashing for near-duplicate detection, and on-chain k-of-n quorum attestation using EIP-712 signatures. We establish formal guarantees for: (i) Bayes-optimal cost-sensitive thresholds minimizing asymmetric error costs, (ii) optimal abstention intervals for human review, (iii) monotone false-negative reduction under classifier-pHash fusion, (iv) quorum compromise bounds, and (v) end-to-end unsafe-mint probability. Empirical validation on a zero-shot NSFW task demonstrates 82% accuracy (AUC = 0.88), with the Bayes-optimal threshold <tex>$(tau^{*}=0.1)$</tex> reducing expected cost to 27,520 versus 54,942 at the F1-optimal threshold-a 50% improvement. Calibrated abstention further lowers harm (cost= 10,649.5), while a 3-of-5 quorum with oracle compromise <tex>$p=0.1$</tex> yields break probability <tex>$P_{text{break}} &lt; 1%$</tex>. Together, Vision Guard bridges decision theory, adversarial robustness, and cryptographic enforcement, providing the first provably safe AI moderation pathway for blockchain content.","PeriodicalId":49952,"journal":{"name":"Journal of Web Engineering","volume":"25 1","pages":"103-134"},"PeriodicalIF":1.0,"publicationDate":"2026-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11370663","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146098433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Joint Models for Sentence Segmentation and Named Entity Recognition in Literary Sinitic Text 中文文学文本分句与命名实体识别联合模型
IF 1 4区 计算机科学 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2026-01-01 DOI: 10.13052/jwe1540-9589.2512
DongNyeong Heo;Yunhee Kang;Chul Heo;Heeyoul Choi;Kyounghun Jung
It is challenging to understand Literary Sinitic text from the Joseon dynasty, since there is a lack of explicit word separators, which creates significant semantic ambiguity. To address this, both sentence segmentation and named entity recognition (NER) are essential. We propose a Transformer-based analyzer that performs these two tasks simultaneously. Trained on a labeled corpus from the Seungjeongwon Ilgi, our model effectively segments sentences and identifies named entities, thereby significantly improving the understanding of sentence structure and overall context.
朝鲜时代的汉文文本缺乏明确的分隔词,这造成了严重的语义歧义,因此很难理解。为了解决这个问题,句子分割和命名实体识别(NER)是必不可少的。我们提出了一个基于transformer的分析器,它可以同时执行这两个任务。在Seungjeongwon Ilgi的标记语料库上训练,我们的模型有效地分割句子并识别命名实体,从而显着提高了对句子结构和整体上下文的理解。
{"title":"Joint Models for Sentence Segmentation and Named Entity Recognition in Literary Sinitic Text","authors":"DongNyeong Heo;Yunhee Kang;Chul Heo;Heeyoul Choi;Kyounghun Jung","doi":"10.13052/jwe1540-9589.2512","DOIUrl":"https://doi.org/10.13052/jwe1540-9589.2512","url":null,"abstract":"It is challenging to understand Literary Sinitic text from the Joseon dynasty, since there is a lack of explicit word separators, which creates significant semantic ambiguity. To address this, both sentence segmentation and named entity recognition (NER) are essential. We propose a Transformer-based analyzer that performs these two tasks simultaneously. Trained on a labeled corpus from the Seungjeongwon Ilgi, our model effectively segments sentences and identifies named entities, thereby significantly improving the understanding of sentence structure and overall context.","PeriodicalId":49952,"journal":{"name":"Journal of Web Engineering","volume":"25 1","pages":"19-32"},"PeriodicalIF":1.0,"publicationDate":"2026-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11370662","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146098434","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Web Engineering
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1