Jitendra V. Tembhurne, Md. Moin Almin, Tausif Diwan
With the advancement of technology, social media has become a major source of digital news due to its global exposure. This has led to an increase in spreading fake news and misinformation online. Humans cannot differentiate fake news from real news because they can be easily influenced. A lot of research work has been conducted for detecting fake news using Artificial Intelligence and Machine Learning. A large number of deep learning models and their architectural variants have been investigated and many websites are utilizing these models directly or indirectly to detect fake news. However, state-of-the-arts demonstrate the limited accuracy in distinguishing fake news from the original news. We propose a multi-channel deep learning model namely Mc-DNN, leveraging and processing the news headlines and news articles along different channels for differentiating fake or real news. We achieve the highest accuracy of 99.23% on ISOT Fake News Dataset and 94.68% on Fake News Data for Mc-DNN. Thus, we highly recommend the use of Mc-DNN for fake news detection.
{"title":"Mc-DNN: Fake News Detection Using Multi-Channel Deep Neural Networks","authors":"Jitendra V. Tembhurne, Md. Moin Almin, Tausif Diwan","doi":"10.4018/ijswis.295553","DOIUrl":"https://doi.org/10.4018/ijswis.295553","url":null,"abstract":"With the advancement of technology, social media has become a major source of digital news due to its global exposure. This has led to an increase in spreading fake news and misinformation online. Humans cannot differentiate fake news from real news because they can be easily influenced. A lot of research work has been conducted for detecting fake news using Artificial Intelligence and Machine Learning. A large number of deep learning models and their architectural variants have been investigated and many websites are utilizing these models directly or indirectly to detect fake news. However, state-of-the-arts demonstrate the limited accuracy in distinguishing fake news from the original news. We propose a multi-channel deep learning model namely Mc-DNN, leveraging and processing the news headlines and news articles along different channels for differentiating fake or real news. We achieve the highest accuracy of 99.23% on ISOT Fake News Dataset and 94.68% on Fake News Data for Mc-DNN. Thus, we highly recommend the use of Mc-DNN for fake news detection.","PeriodicalId":54934,"journal":{"name":"International Journal on Semantic Web and Information Systems","volume":"48 1","pages":"1-20"},"PeriodicalIF":3.2,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91271192","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Shudong Li, Danyi Qin, Xiaobo Wu, Juan Li, Baohui Li, Weihong Han
Among the large number of network attack alerts generated every day, actual security incidents are usually overwhelmed by a large number of redundant alerts. Therefore, how to remove these redundant alerts in real time and improve the quality of alerts is an urgent problem to be solved in large-scale network security protection. This paper uses the method of combining machine learning and deep learning to improve the effect of false alarm detection and then more accurately identify real alarms, that is, in the process of training the model, the features of a hidden layer output of the DNN model are used as input to train the machine learning model. In order to verify the proposed method, we use the marked alert data to do classification experiments, and finally use the accuracy recall rate, precision, and F1 value to evaluate the model. Good results have been obtained.
{"title":"False Alert Detection Based on Deep Learning and Machine Learning","authors":"Shudong Li, Danyi Qin, Xiaobo Wu, Juan Li, Baohui Li, Weihong Han","doi":"10.4018/ijswis.297035","DOIUrl":"https://doi.org/10.4018/ijswis.297035","url":null,"abstract":"Among the large number of network attack alerts generated every day, actual security incidents are usually overwhelmed by a large number of redundant alerts. Therefore, how to remove these redundant alerts in real time and improve the quality of alerts is an urgent problem to be solved in large-scale network security protection. This paper uses the method of combining machine learning and deep learning to improve the effect of false alarm detection and then more accurately identify real alarms, that is, in the process of training the model, the features of a hidden layer output of the DNN model are used as input to train the machine learning model. In order to verify the proposed method, we use the marked alert data to do classification experiments, and finally use the accuracy recall rate, precision, and F1 value to evaluate the model. Good results have been obtained.","PeriodicalId":54934,"journal":{"name":"International Journal on Semantic Web and Information Systems","volume":"23 1","pages":"1-21"},"PeriodicalIF":3.2,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89234086","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
For Chinese NER tasks, there is very little annotation data available. To increase the dataset, improve the accuracy of Chinese NER task, and improve the model's stability, the authors propose a method to add local adversarial training to the transfer learning model and integrate the attention mechanism. The model uses ALBERT for migration pre-training and adds perturbation factors to the output matrix of the embedding layer to constitute local adversarial training. BILSTM is used to encode the shared and private features of the task, and the attention mechanism is introduced to capture the characters that focus more on the entities. Finally, the best entity annotation is obtained by CRF. Experiments are conducted on People's Daily 2004 and Tsinghua University open-source text classification datasets. The experimental results show that compared with the SOTA model, the F1 values of the proposed method in this paper are improved by 7.32 and 7.98 in the two different datasets, respectively, proving that the accuracy of the method in this paper is improved in the Chinese domain.
{"title":"Chinese Named Entity Recognition Method Combining ALBERT and a Local Adversarial Training and Adding Attention Mechanism","authors":"Runmei Zhang, Li Lulu, Yin Lei, Jingjing Liu, Xu Weiyi, Weiwei Cao, Chen Zhong","doi":"10.4018/ijswis.313946","DOIUrl":"https://doi.org/10.4018/ijswis.313946","url":null,"abstract":"For Chinese NER tasks, there is very little annotation data available. To increase the dataset, improve the accuracy of Chinese NER task, and improve the model's stability, the authors propose a method to add local adversarial training to the transfer learning model and integrate the attention mechanism. The model uses ALBERT for migration pre-training and adds perturbation factors to the output matrix of the embedding layer to constitute local adversarial training. BILSTM is used to encode the shared and private features of the task, and the attention mechanism is introduced to capture the characters that focus more on the entities. Finally, the best entity annotation is obtained by CRF. Experiments are conducted on People's Daily 2004 and Tsinghua University open-source text classification datasets. The experimental results show that compared with the SOTA model, the F1 values of the proposed method in this paper are improved by 7.32 and 7.98 in the two different datasets, respectively, proving that the accuracy of the method in this paper is improved in the Chinese domain.","PeriodicalId":54934,"journal":{"name":"International Journal on Semantic Web and Information Systems","volume":"12 1","pages":""},"PeriodicalIF":3.2,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88396628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Educators have been calling for reform for a decade. Recent technical breakthroughs have led to various improvements in the semantic web-based education system. After last year's COVID-19 outbreak, development quickened. Many countries and educational systems now concentrate on providing students with online education, which differs greatly from traditional classroom education. Online education allows students to learn at their own pace and the system. As a consequence, we may say that education has become more dynamic. In the educational system, this changing nature makes user demands difficult to identify. Many instructors suggest using machine learning, artificial intelligence, or ontology to improve traditional teaching methods. Due to the lack of survey studies examining and comparing all of the researcher's semantic web-based teaching methodologies, we decided to conduct this survey. This paper's goal is to analyse all available possibilities for semantic web-based education systems that enable new researchers to develop their knowledge.
{"title":"Evaluation and Comparative Analysis of Semantic Web-Based Strategies for Enhancing Educational System Development","authors":"B. Hu, A. Gaurav, C. Choi, A. Almomani","doi":"10.4018/ijswis.302895","DOIUrl":"https://doi.org/10.4018/ijswis.302895","url":null,"abstract":"Educators have been calling for reform for a decade. Recent technical breakthroughs have led to various improvements in the semantic web-based education system. After last year's COVID-19 outbreak, development quickened. Many countries and educational systems now concentrate on providing students with online education, which differs greatly from traditional classroom education. Online education allows students to learn at their own pace and the system. As a consequence, we may say that education has become more dynamic. In the educational system, this changing nature makes user demands difficult to identify. Many instructors suggest using machine learning, artificial intelligence, or ontology to improve traditional teaching methods. Due to the lack of survey studies examining and comparing all of the researcher's semantic web-based teaching methodologies, we decided to conduct this survey. This paper's goal is to analyse all available possibilities for semantic web-based education systems that enable new researchers to develop their knowledge.","PeriodicalId":54934,"journal":{"name":"International Journal on Semantic Web and Information Systems","volume":"33 1","pages":"1-14"},"PeriodicalIF":3.2,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78747486","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In recent years, as the demand for senior care services has further increased, it has become more difficult to obtain matching services from the vast amount of data. Therefore, this paper proposes a service recommendation framework PCE-CF based on an embedded user portrait model. The framework accurately describes the elderly users through four dimensions—population, society, consumption, and health—and constructs the user portrait model by embedding tags. The embedded vector of each older man is learned through the deep learning model, and different feature groups are meaningfully expressed in the transformation space. In addition, location context and dynamic interest model are introduced to process embedded vectors, and users' service preferences are predicted according to their dynamic behaviors. The experiment results show that the PCE-CF framework proposed in this paper can improve the recommendation algorithm's efficiency and have higher feasibility in personalized service recommendations.
{"title":"Recommendation of Healthcare Services Based on an Embedded User Profile Model","authors":"Jianmao Xiao, Xinyi Liu, Jia Zeng, Yuanlong Cao, Zhiyong Feng","doi":"10.4018/ijswis.313198","DOIUrl":"https://doi.org/10.4018/ijswis.313198","url":null,"abstract":"In recent years, as the demand for senior care services has further increased, it has become more difficult to obtain matching services from the vast amount of data. Therefore, this paper proposes a service recommendation framework PCE-CF based on an embedded user portrait model. The framework accurately describes the elderly users through four dimensions—population, society, consumption, and health—and constructs the user portrait model by embedding tags. The embedded vector of each older man is learned through the deep learning model, and different feature groups are meaningfully expressed in the transformation space. In addition, location context and dynamic interest model are introduced to process embedded vectors, and users' service preferences are predicted according to their dynamic behaviors. The experiment results show that the PCE-CF framework proposed in this paper can improve the recommendation algorithm's efficiency and have higher feasibility in personalized service recommendations.","PeriodicalId":54934,"journal":{"name":"International Journal on Semantic Web and Information Systems","volume":"231 1","pages":""},"PeriodicalIF":3.2,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75569720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper introduces an approach for the VM migration based on optimization algorithm, named CS in cloud. The provider to be selected is carried out with the usage of multiple constraints, like delay, bandwidth, cost, and load. Subsequently, the effective searching criteria are computed for finding the optimal service on the basis of fitness constraints. The searching criteria are formulated as optimization problems, which are tackled using CS. The proposed CS is designed by integrating CSO with the SSA such that the fitness function is evaluated for the optimal VM migration by considering several parameters, such as delay, cost, bandwidth, and load. Thus, the cloud manager will perform the migration of VM in cloud based on proposed CS-based VM migration approach. The performance of the CS-based VM migration is evaluated in terms of delay, cost, and load. The proposed CS-based VM migration method achieves the minimal delay of 0.146, minimal cost of 0.052, and the minimal load of 0.182.
{"title":"Cat-Squirrel Optimization Algorithm for VM Migration in a Cloud Computing Platform","authors":"C. A. Kumar, P. Sivakumar","doi":"10.4018/ijswis.297142","DOIUrl":"https://doi.org/10.4018/ijswis.297142","url":null,"abstract":"This paper introduces an approach for the VM migration based on optimization algorithm, named CS in cloud. The provider to be selected is carried out with the usage of multiple constraints, like delay, bandwidth, cost, and load. Subsequently, the effective searching criteria are computed for finding the optimal service on the basis of fitness constraints. The searching criteria are formulated as optimization problems, which are tackled using CS. The proposed CS is designed by integrating CSO with the SSA such that the fitness function is evaluated for the optimal VM migration by considering several parameters, such as delay, cost, bandwidth, and load. Thus, the cloud manager will perform the migration of VM in cloud based on proposed CS-based VM migration approach. The performance of the CS-based VM migration is evaluated in terms of delay, cost, and load. The proposed CS-based VM migration method achieves the minimal delay of 0.146, minimal cost of 0.052, and the minimal load of 0.182.","PeriodicalId":54934,"journal":{"name":"International Journal on Semantic Web and Information Systems","volume":"9 1","pages":"1-23"},"PeriodicalIF":3.2,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75253469","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Companies can gain critical real-time insights into customer requirements and service evaluation by mining social media. To acquire the service performance and improve the service deficiencies for hotels, this research proposes a benchmark-based performance evaluation model for hotel service to enable hotel managers to assess the service performance. In the case of non-benchmark service hotels, the identification and improvement model for non-benchmark criteria can recognize and analyze the required quantities of performance improvements for non-benchmark criteria. For understanding the causes of service deficiencies, this research mines the online posts and creates a hierarchical ontology of service deficiencies for hotels. A hierarchical ontology-based neural network is proposed to automatically identify the causes of service deficiencies. This study employs an online forum as a case to achieve the identification accuracy of causes of service deficiencies of 92.68%. The analytical result can demonstrate the significant effectiveness and practical value of the proposed methodology.
{"title":"Using an Ontology-Based Neural Network and DEA to Discover Deficiencies of Hotel Services","authors":"T. Chiang, Z. Che, Yi-Ling Huang, Chang-You Tsai","doi":"10.4018/ijswis.306748","DOIUrl":"https://doi.org/10.4018/ijswis.306748","url":null,"abstract":"Companies can gain critical real-time insights into customer requirements and service evaluation by mining social media. To acquire the service performance and improve the service deficiencies for hotels, this research proposes a benchmark-based performance evaluation model for hotel service to enable hotel managers to assess the service performance. In the case of non-benchmark service hotels, the identification and improvement model for non-benchmark criteria can recognize and analyze the required quantities of performance improvements for non-benchmark criteria. For understanding the causes of service deficiencies, this research mines the online posts and creates a hierarchical ontology of service deficiencies for hotels. A hierarchical ontology-based neural network is proposed to automatically identify the causes of service deficiencies. This study employs an online forum as a case to achieve the identification accuracy of causes of service deficiencies of 92.68%. The analytical result can demonstrate the significant effectiveness and practical value of the proposed methodology.","PeriodicalId":54934,"journal":{"name":"International Journal on Semantic Web and Information Systems","volume":"31 1","pages":"1-19"},"PeriodicalIF":3.2,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80699597","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
We employ the concept of word sense disambiguation to determine the inherent meaning of voter intentions regarding possible political candidates from the 2016 Presidential election. We present our findings based on a website (www.presidentselect.com) that we developed, where candidates can be examined and their true assets and competencies in three major areas of eligibility, education, and experience inputs can be deciphered. Data envelope analysis is used to determine underlying word instances for elected and successful outputs. We also utilize our web site results to longitudinally extend these findings for decision making of potential election fraud detection in the 2020 Presidential election, utilizing Benford’s Law. Our results shed light on these phenomenon and provide new insights into the word sense disambiguation literature.
{"title":"Longitudinal Study of a Website for Assessing American Presidential Candidates and Decision Making of Potential Election Irregularities Detection","authors":"J. Piper, J. Rodger","doi":"10.4018/ijswis.305802","DOIUrl":"https://doi.org/10.4018/ijswis.305802","url":null,"abstract":"We employ the concept of word sense disambiguation to determine the inherent meaning of voter intentions regarding possible political candidates from the 2016 Presidential election. We present our findings based on a website (www.presidentselect.com) that we developed, where candidates can be examined and their true assets and competencies in three major areas of eligibility, education, and experience inputs can be deciphered. Data envelope analysis is used to determine underlying word instances for elected and successful outputs. We also utilize our web site results to longitudinally extend these findings for decision making of potential election fraud detection in the 2020 Presidential election, utilizing Benford’s Law. Our results shed light on these phenomenon and provide new insights into the word sense disambiguation literature.","PeriodicalId":54934,"journal":{"name":"International Journal on Semantic Web and Information Systems","volume":"58 1","pages":"1-20"},"PeriodicalIF":3.2,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80235089","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Boan Ji, Huabin Wang, Mengxin Zhang, Borun Mao, Xuejun Li
Brain magnetic resonance images (MRI) are widely used for the classification of Alzheimer's disease (AD). The size of 3D images is, however, too large. Some of the sliced image features are lost, which results in conflicting network size and classification performance. This article uses key components in the transformer model to propose a new lightweight method, ensuring the lightness of the network and achieving highly accurate classification. First, the transformer model is imitated by using image patch input to enhance feature perception. Second, the Gaussian error linear unit (GELU), commonly used in transformer models, is used to enhance the generalization ability of the network. Finally, the network uses MRI slices as learning data. The depthwise separable convolution makes the network more lightweight. Experiments are carried out on the ADNI public database. The accuracy rate of AD vs. normal control (NC) experiments reaches 98.54%. The amount of network parameters is 1.3% of existing similar networks.
脑磁共振成像(MRI)被广泛用于阿尔茨海默病(AD)的分类。然而,3D图像的尺寸太大了。切片后的图像会丢失一些特征,从而导致网络大小和分类性能的冲突。本文利用变压器模型中的关键部件,提出了一种新的轻量化方法,保证了网络的轻量化,实现了高度精确的分类。首先,利用图像贴片输入来模拟变压器模型,增强特征感知;其次,利用变压器模型中常用的高斯误差线性单元(Gaussian error linear unit, GELU)来增强网络的泛化能力。最后,网络使用MRI切片作为学习数据。深度可分离卷积使网络更轻量化。在ADNI公共数据库上进行了实验。与正常对照(NC)相比,AD实验的准确率达到98.54%。网络参数数量为现有同类网络的1.3%。
{"title":"An Efficient Lightweight Network Based on Magnetic Resonance Images for Predicting Alzheimer's Disease","authors":"Boan Ji, Huabin Wang, Mengxin Zhang, Borun Mao, Xuejun Li","doi":"10.4018/ijswis.313715","DOIUrl":"https://doi.org/10.4018/ijswis.313715","url":null,"abstract":"Brain magnetic resonance images (MRI) are widely used for the classification of Alzheimer's disease (AD). The size of 3D images is, however, too large. Some of the sliced image features are lost, which results in conflicting network size and classification performance. This article uses key components in the transformer model to propose a new lightweight method, ensuring the lightness of the network and achieving highly accurate classification. First, the transformer model is imitated by using image patch input to enhance feature perception. Second, the Gaussian error linear unit (GELU), commonly used in transformer models, is used to enhance the generalization ability of the network. Finally, the network uses MRI slices as learning data. The depthwise separable convolution makes the network more lightweight. Experiments are carried out on the ADNI public database. The accuracy rate of AD vs. normal control (NC) experiments reaches 98.54%. The amount of network parameters is 1.3% of existing similar networks.","PeriodicalId":54934,"journal":{"name":"International Journal on Semantic Web and Information Systems","volume":"14 1","pages":""},"PeriodicalIF":3.2,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79068884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Z. Ahmed, M. Ayaz, Mohammad Hijji, Muhammad Zahid Abbas, Aneel Rahim
The research on Underwater Wireless Sensor Networks (UWSNs) has grown considerably in recent years where the main focus remains to develop a reliable communication protocol to overcome its challenges between various underwater sensing devices. The main purpose of UWSNs is to provide a low cost and an unmanned data collection system for a range of applications such as offshore exploration, pollution monitoring, oil and gas pipeline monitoring, surveillance, etc. One of the common types of UWSN is Linear Sensor Network (LSN) which specially targets to monitor the underwater oil and gas pipelines. Under this application, in most of the previously proposed works, networks are deployed without considering the heterogeneity and capacity of the various sensor nodes. This negligence leads to the problem of inefficient data delivery from the sensor nodes deployed on the pipeline to the surface sinks. In addition, the existing path planning algorithms do not consider the network coverage of heterogeneous sensor nodes.
{"title":"AUV-Based Efficient Data Collection Scheme for Underwater Linear Sensor Networks","authors":"Z. Ahmed, M. Ayaz, Mohammad Hijji, Muhammad Zahid Abbas, Aneel Rahim","doi":"10.4018/ijswis.299858","DOIUrl":"https://doi.org/10.4018/ijswis.299858","url":null,"abstract":"The research on Underwater Wireless Sensor Networks (UWSNs) has grown considerably in recent years where the main focus remains to develop a reliable communication protocol to overcome its challenges between various underwater sensing devices. The main purpose of UWSNs is to provide a low cost and an unmanned data collection system for a range of applications such as offshore exploration, pollution monitoring, oil and gas pipeline monitoring, surveillance, etc. One of the common types of UWSN is Linear Sensor Network (LSN) which specially targets to monitor the underwater oil and gas pipelines. Under this application, in most of the previously proposed works, networks are deployed without considering the heterogeneity and capacity of the various sensor nodes. This negligence leads to the problem of inefficient data delivery from the sensor nodes deployed on the pipeline to the surface sinks. In addition, the existing path planning algorithms do not consider the network coverage of heterogeneous sensor nodes.","PeriodicalId":54934,"journal":{"name":"International Journal on Semantic Web and Information Systems","volume":"7 1","pages":"1-19"},"PeriodicalIF":3.2,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85538522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}