Pub Date : 2024-06-13DOI: 10.1007/s10115-024-02160-0
Jiajun Tong, Zhixi Wang, Xiaobin Rui
{"title":"Incorporating topic and property for knowledge base synchronization","authors":"Jiajun Tong, Zhixi Wang, Xiaobin Rui","doi":"10.1007/s10115-024-02160-0","DOIUrl":"https://doi.org/10.1007/s10115-024-02160-0","url":null,"abstract":"","PeriodicalId":54749,"journal":{"name":"Knowledge and Information Systems","volume":null,"pages":null},"PeriodicalIF":2.7,"publicationDate":"2024-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141346633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-06-11DOI: 10.1007/s10115-024-02148-w
Hai Duong, Anh Tran
{"title":"MFS-SubSC: an efficient algorithm for mining frequent sequences with sub-sequence constraint","authors":"Hai Duong, Anh Tran","doi":"10.1007/s10115-024-02148-w","DOIUrl":"https://doi.org/10.1007/s10115-024-02148-w","url":null,"abstract":"","PeriodicalId":54749,"journal":{"name":"Knowledge and Information Systems","volume":null,"pages":null},"PeriodicalIF":2.7,"publicationDate":"2024-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141360382","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-06-10DOI: 10.1007/s10115-024-02134-2
Luiz Gustavo Dias, Bruno Lopes, Daniel de Oliveira
{"title":"MAESTRO: a lightweight ontology-based framework for composing and analyzing script-based scientific experiments","authors":"Luiz Gustavo Dias, Bruno Lopes, Daniel de Oliveira","doi":"10.1007/s10115-024-02134-2","DOIUrl":"https://doi.org/10.1007/s10115-024-02134-2","url":null,"abstract":"","PeriodicalId":54749,"journal":{"name":"Knowledge and Information Systems","volume":null,"pages":null},"PeriodicalIF":2.7,"publicationDate":"2024-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141363159","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-06-10DOI: 10.1007/s10115-024-02149-9
P. G. Shambharkar, Nikhil Sharma
{"title":"Deep learning-empowered intrusion detection framework for the Internet of Medical Things environment","authors":"P. G. Shambharkar, Nikhil Sharma","doi":"10.1007/s10115-024-02149-9","DOIUrl":"https://doi.org/10.1007/s10115-024-02149-9","url":null,"abstract":"","PeriodicalId":54749,"journal":{"name":"Knowledge and Information Systems","volume":null,"pages":null},"PeriodicalIF":2.7,"publicationDate":"2024-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141361792","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-06-10DOI: 10.1007/s10115-024-02151-1
Ariel Afonso, Paulo Martins, Altigran da Silva
{"title":"SEREIA: document store exploration through keywords","authors":"Ariel Afonso, Paulo Martins, Altigran da Silva","doi":"10.1007/s10115-024-02151-1","DOIUrl":"https://doi.org/10.1007/s10115-024-02151-1","url":null,"abstract":"","PeriodicalId":54749,"journal":{"name":"Knowledge and Information Systems","volume":null,"pages":null},"PeriodicalIF":2.7,"publicationDate":"2024-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141366299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-06-10DOI: 10.1007/s10115-024-02156-w
Nursultan Askarbekuly, Nenad Aničić
{"title":"LLM examiner: automating assessment in informal self-directed e-learning using ChatGPT","authors":"Nursultan Askarbekuly, Nenad Aničić","doi":"10.1007/s10115-024-02156-w","DOIUrl":"https://doi.org/10.1007/s10115-024-02156-w","url":null,"abstract":"","PeriodicalId":54749,"journal":{"name":"Knowledge and Information Systems","volume":null,"pages":null},"PeriodicalIF":2.7,"publicationDate":"2024-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141364675","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-06-07DOI: 10.1007/s10115-024-02146-y
B. Prasath, M. Akila
{"title":"AETC: an automated pest detection and classification model using optimal integration of Yolo + SSD and adaptive ensemble transfer CNN with IoT-assisted pest images","authors":"B. Prasath, M. Akila","doi":"10.1007/s10115-024-02146-y","DOIUrl":"https://doi.org/10.1007/s10115-024-02146-y","url":null,"abstract":"","PeriodicalId":54749,"journal":{"name":"Knowledge and Information Systems","volume":null,"pages":null},"PeriodicalIF":2.7,"publicationDate":"2024-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141375173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Probabilistic graph model and neural network perspective of click models for web search","authors":"Jianping Liu, Yingfei Wang, Jian Wang, Meng Wang, Xintao Chu","doi":"10.1007/s10115-024-02145-z","DOIUrl":"https://doi.org/10.1007/s10115-024-02145-z","url":null,"abstract":"","PeriodicalId":54749,"journal":{"name":"Knowledge and Information Systems","volume":null,"pages":null},"PeriodicalIF":2.7,"publicationDate":"2024-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141381420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-06-04DOI: 10.1007/s10115-024-02122-6
Sheetal Waghchaware, Radhika Joshi
Human activity recognition (HAR) has received the significant attention in the field of security and surveillance due to its high potential for real-time monitoring, identifying the abnormal activities and situational awareness. HAR is able to identify the abnormal activity or behaviour patterns, which may indicate potential security risks. HAR system attempts to automatically provide the information and classification regarding activities performed in the environment by learning the data captured through sensor or video stream. The overview of existing research work in the security and surveillance area, which includes traditional, machine learning (ML) and deep learning (DL) algorithms applicable to field, is presented. The comparative analysis of different HAR techniques based on features, input source, public data sets is presented for quick understanding, and it focuses on the recent trends in HAR field. This review paper provides guidelines for the selection of appropriate algorithm, data set, performance metrics when evaluating HAR systems in the context of security and surveillance. Overall, this review aims to provide a comprehensive understanding of HAR in the field of security and surveillance and to serve as a basis for further research and development.
人类活动识别(HAR)因其在实时监控、识别异常活动和态势感知方面的巨大潜力,在安全和监控领域备受关注。HAR 能够识别异常活动或行为模式,这可能预示着潜在的安全风险。HAR 系统试图通过学习传感器或视频流捕获的数据,自动提供有关环境中活动的信息和分类。本文概述了安防和监控领域的现有研究工作,包括适用于该领域的传统算法、机器学习(ML)算法和深度学习(DL)算法。为了便于快速理解,本文对基于特征、输入源和公共数据集的不同 HAR 技术进行了比较分析,并重点介绍了 HAR 领域的最新趋势。本综述论文为在安防和监控背景下评估 HAR 系统时选择合适的算法、数据集和性能指标提供了指导。总之,本综述旨在提供对安防和监控领域 HAR 的全面了解,并为进一步研究和开发奠定基础。
{"title":"Machine learning and deep learning models for human activity recognition in security and surveillance: a review","authors":"Sheetal Waghchaware, Radhika Joshi","doi":"10.1007/s10115-024-02122-6","DOIUrl":"https://doi.org/10.1007/s10115-024-02122-6","url":null,"abstract":"<p>Human activity recognition (HAR) has received the significant attention in the field of security and surveillance due to its high potential for real-time monitoring, identifying the abnormal activities and situational awareness. HAR is able to identify the abnormal activity or behaviour patterns, which may indicate potential security risks. HAR system attempts to automatically provide the information and classification regarding activities performed in the environment by learning the data captured through sensor or video stream. The overview of existing research work in the security and surveillance area, which includes traditional, machine learning (ML) and deep learning (DL) algorithms applicable to field, is presented. The comparative analysis of different HAR techniques based on features, input source, public data sets is presented for quick understanding, and it focuses on the recent trends in HAR field. This review paper provides guidelines for the selection of appropriate algorithm, data set, performance metrics when evaluating HAR systems in the context of security and surveillance. Overall, this review aims to provide a comprehensive understanding of HAR in the field of security and surveillance and to serve as a basis for further research and development.</p>","PeriodicalId":54749,"journal":{"name":"Knowledge and Information Systems","volume":null,"pages":null},"PeriodicalIF":2.7,"publicationDate":"2024-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141254266","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}