首页 > 最新文献

International Journal of Web Services Research最新文献

英文 中文
International Journal of Web Services Research (IJWSR): Selecting Mobile Services in Cloud and Edge Environment by Moth-Flame Optimization Algorithm 国际Web服务研究杂志(IJWSR):基于蛾焰优化算法的云和边缘环境下移动服务选择
IF 1.1 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-01-01 DOI: 10.4018/ijwsr.302888
Ming Zhu, Xiukun Yan, Jing Li, Cong Liu, Yawen Cao
Mobile edge computing is playing an increasingly important role in the rise of mobile Internet technology. Services deployed on edge servers nearby mobile users would provide computing capabilities with low latency and high scalability. Usually, a single service is challenging to meet a complex user request, which asks for composing services. With the increasing number of services in the cloud and edge computing environment and the user mobility, selecting appropriate services to meet the complex mobile user’s requests becomes a crucial problem. This paper proposes a modified moth-flame optimization algorithm using overall QoS for service selection. Specifically, the overall QoS of services is calculated by combining the subjective and objective QoS with the ordinal relationship and coefficient of variation, and the moth-flame optimization algorithm is improved by adding the differential evolution algorithm. The experimental results show that the proposed approach outperforms some other services selection approaches.
移动边缘计算在移动互联网技术的兴起中发挥着越来越重要的作用。部署在移动用户附近的边缘服务器上的服务将提供低延迟和高可扩展性的计算能力。通常,单个服务很难满足要求组合服务的复杂用户请求。随着云计算和边缘计算环境中业务数量的增加以及用户移动性的提高,选择合适的业务来满足复杂的移动用户需求成为一个关键问题。提出了一种基于整体QoS的蛾焰优化算法。具体而言,通过将主客观QoS与序数关系和变异系数相结合来计算服务的整体QoS,并通过加入差分进化算法对蛾焰优化算法进行改进。实验结果表明,该方法优于其他服务选择方法。
{"title":"International Journal of Web Services Research (IJWSR): Selecting Mobile Services in Cloud and Edge Environment by Moth-Flame Optimization Algorithm","authors":"Ming Zhu, Xiukun Yan, Jing Li, Cong Liu, Yawen Cao","doi":"10.4018/ijwsr.302888","DOIUrl":"https://doi.org/10.4018/ijwsr.302888","url":null,"abstract":"Mobile edge computing is playing an increasingly important role in the rise of mobile Internet technology. Services deployed on edge servers nearby mobile users would provide computing capabilities with low latency and high scalability. Usually, a single service is challenging to meet a complex user request, which asks for composing services. With the increasing number of services in the cloud and edge computing environment and the user mobility, selecting appropriate services to meet the complex mobile user’s requests becomes a crucial problem. This paper proposes a modified moth-flame optimization algorithm using overall QoS for service selection. Specifically, the overall QoS of services is calculated by combining the subjective and objective QoS with the ordinal relationship and coefficient of variation, and the moth-flame optimization algorithm is improved by adding the differential evolution algorithm. The experimental results show that the proposed approach outperforms some other services selection approaches.","PeriodicalId":54936,"journal":{"name":"International Journal of Web Services Research","volume":"1 1","pages":"1-23"},"PeriodicalIF":1.1,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89408374","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Multi-Dimensional Context-Aware Healthcare Service Recommendation Method 多维上下文感知医疗保健服务推荐方法
IF 1.1 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-01-01 DOI: 10.4018/ijwsr.302658
Jingbai Tian, Jianghao Yin, Ziqian Mo, Zhong Luo
Due to the outbreak of the COVID-19, online diagnosis and treatment services have developed rapidly, but it is not easy for patients to choose the appropriate healthcare service in the face of massive amounts of information. This article proposes a multi-dimensional context-aware healthcare service recommendation method, which consists of a healthcare service matching model and a healthcare service ranking model. The former first collects objective knowledge related to doctors and diseases to build a knowledge graph, then matches a group of healthcare services for patients according to the patient’s input; The latter selects 5 indicators from the doctor’s academic level, geographical location, public influence, reputation, etc. to build a TOPSIS model based on the entropy weight method to recommend the most appropriate healthcare services for patients. Finally, taking the patient in Shiyan as an example, the whole process of the method is demonstrated, and the feasibility of the method is verified.
由于新冠肺炎疫情的爆发,在线诊疗服务发展迅速,但面对海量的信息,患者选择合适的医疗服务并不容易。本文提出了一种多维上下文感知的医疗保健服务推荐方法,该方法由医疗保健服务匹配模型和医疗保健服务排名模型组成。前者首先收集与医生和疾病相关的客观知识,构建知识图谱,然后根据患者的输入为患者匹配一组医疗保健服务;后者从医生的学术水平、地理位置、公众影响力、声誉等5个指标中选取医生,构建基于熵权法的TOPSIS模型,为患者推荐最合适的医疗服务。最后以十堰市患者为例,对该方法的全过程进行了论证,验证了该方法的可行性。
{"title":"A Multi-Dimensional Context-Aware Healthcare Service Recommendation Method","authors":"Jingbai Tian, Jianghao Yin, Ziqian Mo, Zhong Luo","doi":"10.4018/ijwsr.302658","DOIUrl":"https://doi.org/10.4018/ijwsr.302658","url":null,"abstract":"Due to the outbreak of the COVID-19, online diagnosis and treatment services have developed rapidly, but it is not easy for patients to choose the appropriate healthcare service in the face of massive amounts of information. This article proposes a multi-dimensional context-aware healthcare service recommendation method, which consists of a healthcare service matching model and a healthcare service ranking model. The former first collects objective knowledge related to doctors and diseases to build a knowledge graph, then matches a group of healthcare services for patients according to the patient’s input; The latter selects 5 indicators from the doctor’s academic level, geographical location, public influence, reputation, etc. to build a TOPSIS model based on the entropy weight method to recommend the most appropriate healthcare services for patients. Finally, taking the patient in Shiyan as an example, the whole process of the method is demonstrated, and the feasibility of the method is verified.","PeriodicalId":54936,"journal":{"name":"International Journal of Web Services Research","volume":"26 1","pages":"1-15"},"PeriodicalIF":1.1,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81861681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Financial Deep Learning Framework: Predicting the Values of Financial Time Series With ARIMA and LSTM 金融深度学习框架:利用ARIMA和LSTM预测金融时间序列的价值
IF 1.1 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-01-01 DOI: 10.4018/ijwsr.302640
Zhenjun Li, Yinping Liao, Bo Hu, Liangyu Ni, Yunting Lu
Prediction of stock price movement is regarded as a challenging task of financial time series prediction. Due to the complexity and massive financial market data, the research of deep learning approaches for predicting the future price is very difficult. This study attempted to develop a novel framework, named 13f-LSTM, where the AutoRegressive Integrated Moving Average (ARIMA), for the first time, as one of the technical features, Fourier transforms for trend analysis and Long-Short Term Memory (LSTM), including its variants, to forecast the future’s closing prices. Thirteen historical and technical features of stock were selected as inputs of the proposed 13f-LSTM model. Three typical stock market indices in the real world and their corresponding closing prices in 30 trading days are chosen to examine the performance and predictive accuracy of it. The experimental results show that the 13f-LSTM model outperforms other proposed models in both profitability performance and predictive accuracy.
股票价格走势预测一直是金融时间序列预测中的一项具有挑战性的任务。由于金融市场数据的复杂性和海量性,研究预测未来价格的深度学习方法是非常困难的。本研究试图开发一个名为13f-LSTM的新框架,其中自回归综合移动平均线(ARIMA)首次作为技术特征之一,用于趋势分析和长短期记忆(LSTM)的傅里叶变换,包括其变体,来预测未来的收盘价。选取13个股票的历史和技术特征作为13f-LSTM模型的输入。选择现实世界中三个典型的股票市场指数及其对应的30个交易日的收盘价来检验其表现和预测准确性。实验结果表明,13f-LSTM模型在盈利性能和预测精度方面都优于其他模型。
{"title":"A Financial Deep Learning Framework: Predicting the Values of Financial Time Series With ARIMA and LSTM","authors":"Zhenjun Li, Yinping Liao, Bo Hu, Liangyu Ni, Yunting Lu","doi":"10.4018/ijwsr.302640","DOIUrl":"https://doi.org/10.4018/ijwsr.302640","url":null,"abstract":"Prediction of stock price movement is regarded as a challenging task of financial time series prediction. Due to the complexity and massive financial market data, the research of deep learning approaches for predicting the future price is very difficult. This study attempted to develop a novel framework, named 13f-LSTM, where the AutoRegressive Integrated Moving Average (ARIMA), for the first time, as one of the technical features, Fourier transforms for trend analysis and Long-Short Term Memory (LSTM), including its variants, to forecast the future’s closing prices. Thirteen historical and technical features of stock were selected as inputs of the proposed 13f-LSTM model. Three typical stock market indices in the real world and their corresponding closing prices in 30 trading days are chosen to examine the performance and predictive accuracy of it. The experimental results show that the 13f-LSTM model outperforms other proposed models in both profitability performance and predictive accuracy.","PeriodicalId":54936,"journal":{"name":"International Journal of Web Services Research","volume":"152 1","pages":"1-15"},"PeriodicalIF":1.1,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75999692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Strong Robustness Watermarking Algorithm Based on Lifting Wavelet Transform and Hessenberg Decomposition 基于提升小波变换和Hessenberg分解的强鲁棒性水印算法
IF 1.1 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-01-01 DOI: 10.4018/ijwsr.314948
Fan Li, Lin Gao, Junfeng Wang, Ruixia Yan
Watermark imperceptibility and robustness in the present watermarking algorithm based on discrete wavelet transform (DWT) could be weakened due to data truncation. To solve this problem, a strong robustness watermarking algorithm based on the lifting wavelet transform is proposed. First, the color channels of the original image are separated, and the selected channels are processed through lifting wavelet transform to obtain low-frequency information. The information is then split into blocks, with Hesseneberg decomposition performed on each block. Arnold algorithm is used to scramble the watermark image, and the scrambled watermark is transformed into a binary sequence that is then embedded into the maximum element of Hessenberg decomposed matrix by quantization modulation. The experimental results exhibit a good robustness of this new algorithm in defending against a wide variety of conventional attacks.
基于离散小波变换(DWT)的水印算法中,由于数据的截断,会削弱水印的不可见性和鲁棒性。针对这一问题,提出了一种基于提升小波变换的强鲁棒性水印算法。首先,对原始图像的颜色通道进行分离,并通过提升小波变换对所选通道进行处理,获得低频信息。然后将信息拆分为多个块,并对每个块执行Hessenberg分解。使用Arnold算法对水印图像进行加扰,并将加扰后的水印转换为二进制序列,然后通过量化调制将其嵌入到Hessenberg分解矩阵的最大元素中。实验结果表明,该新算法在抵御各种常规攻击方面具有良好的鲁棒性。
{"title":"Strong Robustness Watermarking Algorithm Based on Lifting Wavelet Transform and Hessenberg Decomposition","authors":"Fan Li, Lin Gao, Junfeng Wang, Ruixia Yan","doi":"10.4018/ijwsr.314948","DOIUrl":"https://doi.org/10.4018/ijwsr.314948","url":null,"abstract":"Watermark imperceptibility and robustness in the present watermarking algorithm based on discrete wavelet transform (DWT) could be weakened due to data truncation. To solve this problem, a strong robustness watermarking algorithm based on the lifting wavelet transform is proposed. First, the color channels of the original image are separated, and the selected channels are processed through lifting wavelet transform to obtain low-frequency information. The information is then split into blocks, with Hesseneberg decomposition performed on each block. Arnold algorithm is used to scramble the watermark image, and the scrambled watermark is transformed into a binary sequence that is then embedded into the maximum element of Hessenberg decomposed matrix by quantization modulation. The experimental results exhibit a good robustness of this new algorithm in defending against a wide variety of conventional attacks.","PeriodicalId":54936,"journal":{"name":"International Journal of Web Services Research","volume":" ","pages":""},"PeriodicalIF":1.1,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44521161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Recommendations for Crowdsourcing Services Based on Mobile Scenarios and User Trajectory Awareness 基于移动场景和用户轨迹感知的众包服务建议
IF 1.1 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-01-01 DOI: 10.4018/ijwsr.299020
Jie Su, Jun Li
With the rapid development of the mobile internet and the rapid popularization of smart terminal devices, types and content of services are changing with each passing day, these bring serious mobile information overload problems for mobile users. How to provide better service recommendations for users is an urgent problem to be solved. A crowdsourcing service recommendation strategy for mobile scenarios and user trajectory awareness is proposed. First, the location coordinates in the historical log are clustered into regions by clustering algorithms, and then the user's trajectory patterns are mined in different mobile scenarios to extract mobile rules. Furthermore, the mobile rules are extracted and the scenario to which each rule belongs is judged. When performing crowdsourcing service recommendation, the location trajectory and mobile scenario information are perceived in real time, they are used to predict the location area where the user will soon arrive, thereby the crowdsourcing service in the area is pushed to the user.
随着移动互联网的快速发展和智能终端设备的快速普及,服务类型和内容日新月异,给移动用户带来了严重的移动信息过载问题。如何为用户提供更好的服务建议是一个亟待解决的问题。提出了一种面向移动场景和用户轨迹感知的众包服务推荐策略。首先,通过聚类算法将历史日志中的位置坐标聚类成区域,然后挖掘用户在不同移动场景下的轨迹模式,提取移动规则;进一步,提取移动规则,判断每条规则所属的场景。在进行众包服务推荐时,实时感知位置轨迹和移动场景信息,用于预测用户即将到达的位置区域,从而将该区域的众包服务推送给用户。
{"title":"Recommendations for Crowdsourcing Services Based on Mobile Scenarios and User Trajectory Awareness","authors":"Jie Su, Jun Li","doi":"10.4018/ijwsr.299020","DOIUrl":"https://doi.org/10.4018/ijwsr.299020","url":null,"abstract":"With the rapid development of the mobile internet and the rapid popularization of smart terminal devices, types and content of services are changing with each passing day, these bring serious mobile information overload problems for mobile users. How to provide better service recommendations for users is an urgent problem to be solved. A crowdsourcing service recommendation strategy for mobile scenarios and user trajectory awareness is proposed. First, the location coordinates in the historical log are clustered into regions by clustering algorithms, and then the user's trajectory patterns are mined in different mobile scenarios to extract mobile rules. Furthermore, the mobile rules are extracted and the scenario to which each rule belongs is judged. When performing crowdsourcing service recommendation, the location trajectory and mobile scenario information are perceived in real time, they are used to predict the location area where the user will soon arrive, thereby the crowdsourcing service in the area is pushed to the user.","PeriodicalId":54936,"journal":{"name":"International Journal of Web Services Research","volume":"34 1","pages":"1-18"},"PeriodicalIF":1.1,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85178031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Blockchain-Based Approach for Secure Data Migration From the Cloud to the Decentralized Storage Systems 基于区块链的安全数据从云迁移到分散存储系统的方法
IF 1.1 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-01-01 DOI: 10.4018/ijwsr.296688
Hooria Khan, Ehtesham Zahoor, Sabina Akhtar, O. Perrin
The use of the Cloud computing has been constantly on the rise. However, there are many challenges associated with the Cloud, such as high bandwidth requirements, data security, vendor lock-in and others. The recent rise of decentralized file systems (DFSs) can help mitigate some of these challenges. However, they have some limitations of their own and the current solutions do not provide any mechanism for implementing access control policies. This becomes a hurdle for migrating sensitive data from the Cloud as the associated authorization policies cannot be migrated to the DFSs. In this paper, the authors address the problem of migrating data, and associated authorization policies, from the Cloud to the DFS. They have applied the approach on the content and policies from an actual Cloud provider and it migrates data from AWS S3 to the IPFS and the resource-based authorization policies specified at AWS are added to a custom blockchain solution. The authors have provided implementation details to justify the practicality of the approach.
云计算的使用一直在不断增加。然而,与云相关的挑战有很多,比如高带宽需求、数据安全、供应商锁定等等。最近兴起的去中心化文件系统(dfs)可以帮助缓解其中的一些挑战。但是,它们有自己的一些局限性,并且当前的解决方案不提供任何实现访问控制策略的机制。这成为从云中迁移敏感数据的一个障碍,因为相关的授权策略无法迁移到dfs。在本文中,作者解决了将数据和相关授权策略从云迁移到DFS的问题。他们已经将该方法应用于来自实际云提供商的内容和策略,它将数据从AWS S3迁移到IPFS,并将AWS指定的基于资源的授权策略添加到自定义区块链解决方案中。作者提供了实现细节来证明该方法的实用性。
{"title":"A Blockchain-Based Approach for Secure Data Migration From the Cloud to the Decentralized Storage Systems","authors":"Hooria Khan, Ehtesham Zahoor, Sabina Akhtar, O. Perrin","doi":"10.4018/ijwsr.296688","DOIUrl":"https://doi.org/10.4018/ijwsr.296688","url":null,"abstract":"The use of the Cloud computing has been constantly on the rise. However, there are many challenges associated with the Cloud, such as high bandwidth requirements, data security, vendor lock-in and others. The recent rise of decentralized file systems (DFSs) can help mitigate some of these challenges. However, they have some limitations of their own and the current solutions do not provide any mechanism for implementing access control policies. This becomes a hurdle for migrating sensitive data from the Cloud as the associated authorization policies cannot be migrated to the DFSs. In this paper, the authors address the problem of migrating data, and associated authorization policies, from the Cloud to the DFS. They have applied the approach on the content and policies from an actual Cloud provider and it migrates data from AWS S3 to the IPFS and the resource-based authorization policies specified at AWS are added to a custom blockchain solution. The authors have provided implementation details to justify the practicality of the approach.","PeriodicalId":54936,"journal":{"name":"International Journal of Web Services Research","volume":"380 1","pages":"1-20"},"PeriodicalIF":1.1,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76760082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Threat-Path Estimate-Based Watchword-Chunk Algorithm for Advanced Persistent Threat in the Cloud 基于威胁路径估计的云中高级持续威胁的口令块算法
IF 1.1 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-01-01 DOI: 10.4018/ijwsr.299021
Babu Pandipati, R. P. Sam
In cloud computing, an advanced persistent threat (APT) is a cyber-attack that gains access to a network and remains undetected for some time. As well APTs have proven difficult to detect and protect, in the existing system they fail to analyze the path of an outbreak when the monitor and assign a weight to the nodes. If a path for an outbreak is detected the VM is migrated to hosts that do not account for the overloaded problem and underutilized hosts. In addition to the size of resources occupied by the VM thus here the traffic was increased. This paper proposes the Threat-Path Reckon technique that detects the multiple paths through re-identification and the addition of automatic weight for its neighbor nodes. Based on that weighted paths, the Secured Object Emigration technique invokes a mapping function to migrate the VMs. Finally, the data in the VM are stored in a best-fit distribution, thus it provides security but achieves the search overheads.
在云计算中,高级持续威胁(APT)是一种网络攻击,它可以访问网络并在一段时间内不被发现。此外,apt已被证明难以检测和保护,在现有系统中,当监控并为节点分配权重时,它们无法分析爆发的路径。如果检测到爆发的路径,则将VM迁移到不考虑过载问题和未充分利用主机的主机上。除了VM占用的资源大小之外,这里的流量也增加了。本文提出了一种威胁路径估计技术,该技术通过重新识别和对其相邻节点增加自动权值来检测多个路径。基于这些加权路径,安全对象迁移技术调用映射功能来迁移虚拟机。最后,VM中的数据存储在最佳拟合分布中,因此它提供了安全性,但实现了搜索开销。
{"title":"Threat-Path Estimate-Based Watchword-Chunk Algorithm for Advanced Persistent Threat in the Cloud","authors":"Babu Pandipati, R. P. Sam","doi":"10.4018/ijwsr.299021","DOIUrl":"https://doi.org/10.4018/ijwsr.299021","url":null,"abstract":"In cloud computing, an advanced persistent threat (APT) is a cyber-attack that gains access to a network and remains undetected for some time. As well APTs have proven difficult to detect and protect, in the existing system they fail to analyze the path of an outbreak when the monitor and assign a weight to the nodes. If a path for an outbreak is detected the VM is migrated to hosts that do not account for the overloaded problem and underutilized hosts. In addition to the size of resources occupied by the VM thus here the traffic was increased. This paper proposes the Threat-Path Reckon technique that detects the multiple paths through re-identification and the addition of automatic weight for its neighbor nodes. Based on that weighted paths, the Secured Object Emigration technique invokes a mapping function to migrate the VMs. Finally, the data in the VM are stored in a best-fit distribution, thus it provides security but achieves the search overheads.","PeriodicalId":54936,"journal":{"name":"International Journal of Web Services Research","volume":"17 1","pages":"1-32"},"PeriodicalIF":1.1,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83587459","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Graph Neural Network-Based Algorithm for Point-of-Interest Recommendation Using Social Relation and Time Series 基于社会关系和时间序列的兴趣点推荐算法
IF 1.1 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2021-10-01 DOI: 10.4018/ijwsr.2021100103
Mingjun Xin, Shicheng Chen, Chunjuan Zang
POI recommendation has gradually become an important topic in the field of service recommendation, which is always achieved by mining user behavior patterns. However, the context information of the collaborative signal is not encoded in the embedding process of traditional POI recommendation methods, which is not enough to capture the collaborative signal among different users. Therefore, a POI recommendation algorithm is presented by using social-time context graph neural network model (GNN) in Location-based social networks. First, it finds similarities between different social relationships based on the users' social and temporal behavior. Then, the similarity among different users is calculated by an improved Euclidean distance. Finally, it integrates the graph neural network, the interaction bipartite graph of users and social-time information into the algorithm to generate the final recommendation list in this paper. Experiments on real datasets show that the proposed method is superior to the state-of-the-art POI recommendation methods.
POI推荐逐渐成为服务推荐领域的一个重要课题,而POI推荐一直是通过挖掘用户行为模式来实现的。然而,传统的POI推荐方法在嵌入过程中没有对协同信号的上下文信息进行编码,不足以捕获不同用户之间的协同信号。为此,提出了一种基于地理位置的社交网络中的社交时间上下文图神经网络模型(GNN)的POI推荐算法。首先,它根据用户的社会行为和时间行为发现不同社会关系之间的相似性。然后,通过改进的欧几里得距离计算不同用户之间的相似度。最后,将图神经网络、用户交互二部图和社交时间信息集成到算法中,生成本文的最终推荐列表。在实际数据集上的实验表明,该方法优于目前最先进的POI推荐方法。
{"title":"A Graph Neural Network-Based Algorithm for Point-of-Interest Recommendation Using Social Relation and Time Series","authors":"Mingjun Xin, Shicheng Chen, Chunjuan Zang","doi":"10.4018/ijwsr.2021100103","DOIUrl":"https://doi.org/10.4018/ijwsr.2021100103","url":null,"abstract":"POI recommendation has gradually become an important topic in the field of service recommendation, which is always achieved by mining user behavior patterns. However, the context information of the collaborative signal is not encoded in the embedding process of traditional POI recommendation methods, which is not enough to capture the collaborative signal among different users. Therefore, a POI recommendation algorithm is presented by using social-time context graph neural network model (GNN) in Location-based social networks. First, it finds similarities between different social relationships based on the users' social and temporal behavior. Then, the similarity among different users is calculated by an improved Euclidean distance. Finally, it integrates the graph neural network, the interaction bipartite graph of users and social-time information into the algorithm to generate the final recommendation list in this paper. Experiments on real datasets show that the proposed method is superior to the state-of-the-art POI recommendation methods.","PeriodicalId":54936,"journal":{"name":"International Journal of Web Services Research","volume":"1 1","pages":"51-74"},"PeriodicalIF":1.1,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89830352","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Intelligent and Adaptive Web Page Recommender System 智能自适应网页推荐系统
IF 1.1 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2021-10-01 DOI: 10.4018/ijwsr.2021100102
Geeta Rani, V. Dhaka, Sonam, U. Pandey, P. Tiwari
In this manuscript, an Intelligent and Adaptive Web Page Recommender System is proposed that provides personalized, global and group mode of recommendations. The authors enhance the utility of a trie node for storing relevant web access statistics. The trie node enables dynamic clustering of users based on their evolving browsing patterns and allows a user to belong to multiple groups at each navigation step. The system takes cues from the field of crowd psychology to augment two parameters for modeling group behavior: Uniformity and Recommendation strength. The system continuously tracks the user’s responses in order to adaptively switch between different recommendation-criteria in the group and personalized modes. The experimental results illustrate that the system achieved the maximum F1 measure of 83.28% on CTI dataset which is a significant improvement over the 70% F1 measure reported by Automatic Clustering-based Genetic Algorithm, the prior web recommender system.
本文提出了一种智能自适应网页推荐系统,提供个性化、全局和群组模式的推荐。作者增强了trie节点存储相关web访问统计数据的效用。trie节点允许根据用户不断变化的浏览模式对用户进行动态聚类,并允许用户在每个导航步骤中属于多个组。该系统从群体心理学领域获取线索,增加两个参数来建模群体行为:均匀性和推荐强度。该系统持续跟踪用户的反应,以便自适应地在群组和个性化模式下的不同推荐标准之间切换。实验结果表明,该系统在CTI数据集上获得了83.28%的最大F1度量,比之前基于自动聚类的遗传算法报道的70%的F1度量有了显著提高。
{"title":"Intelligent and Adaptive Web Page Recommender System","authors":"Geeta Rani, V. Dhaka, Sonam, U. Pandey, P. Tiwari","doi":"10.4018/ijwsr.2021100102","DOIUrl":"https://doi.org/10.4018/ijwsr.2021100102","url":null,"abstract":"In this manuscript, an Intelligent and Adaptive Web Page Recommender System is proposed that provides personalized, global and group mode of recommendations. The authors enhance the utility of a trie node for storing relevant web access statistics. The trie node enables dynamic clustering of users based on their evolving browsing patterns and allows a user to belong to multiple groups at each navigation step. The system takes cues from the field of crowd psychology to augment two parameters for modeling group behavior: Uniformity and Recommendation strength. The system continuously tracks the user’s responses in order to adaptively switch between different recommendation-criteria in the group and personalized modes. The experimental results illustrate that the system achieved the maximum F1 measure of 83.28% on CTI dataset which is a significant improvement over the 70% F1 measure reported by Automatic Clustering-based Genetic Algorithm, the prior web recommender system.","PeriodicalId":54936,"journal":{"name":"International Journal of Web Services Research","volume":"13 1","pages":"27-50"},"PeriodicalIF":1.1,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75818949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Verification of Composed Web Service Using Synthesized Nondeterministic Turing Model (SNTMM) With Multiple Tapes and Stacks 基于多磁带和栈的综合不确定性图灵模型(SNTMM)的组合Web服务验证
IF 1.1 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2021-10-01 DOI: 10.4018/ijwsr.2021100104
N. Thilagavathi, K. Lakshmi
To verify the composed Web services, a general view of what traits of a service need to be identified is still lacking. The existing verification model did not address any mechanism for getting alternative services if we failed to reach the desired service and partially concentrated on the reachability problem for a deterministic and non-deterministic system in sequential. This paper proposes a Synthesised Non-deterministic Turing Machine Model (SNTMM) by combining the Multistacked Non-deterministic Turing Machine (MSNTM) model and Multitaped Non-deterministic Turing Machine (MTNTM) model to verify the composed Web services for both deterministic and non-deterministic systems in parallel. The deceased transition and departed service marking algorithm have been proposed to address each participated service’s reachability in composing service for all possible input in parallel. This article shows an example to demonstrate the meticulousness of the model. The experimental results show that the performance of the proposed model is measured efficiently
为了验证组合的Web服务,仍然缺乏关于需要标识服务的哪些特征的一般视图。现有的验证模型没有解决任何机制,如果我们未能达到期望的服务,就可以获得替代服务,并且部分地集中在顺序确定和非确定系统的可达性问题上。本文将Multistacked Non-deterministic Turing Machine (MSNTM)模型和multitape Non-deterministic Turing Machine (MTNTM)模型相结合,提出了一种综合的Non-deterministic Turing Machine模型(SNTMM),用于同时验证确定性和非确定性系统的组合Web服务。为了解决所有可能的输入并行组合服务时每个参与的服务的可达性问题,提出了已故转换和离开服务标记算法。本文通过一个示例来演示该模型的细致性。实验结果表明,该模型的性能得到了有效的测量
{"title":"Verification of Composed Web Service Using Synthesized Nondeterministic Turing Model (SNTMM) With Multiple Tapes and Stacks","authors":"N. Thilagavathi, K. Lakshmi","doi":"10.4018/ijwsr.2021100104","DOIUrl":"https://doi.org/10.4018/ijwsr.2021100104","url":null,"abstract":"To verify the composed Web services, a general view of what traits of a service need to be identified is still lacking. The existing verification model did not address any mechanism for getting alternative services if we failed to reach the desired service and partially concentrated on the reachability problem for a deterministic and non-deterministic system in sequential. This paper proposes a Synthesised Non-deterministic Turing Machine Model (SNTMM) by combining the Multistacked Non-deterministic Turing Machine (MSNTM) model and Multitaped Non-deterministic Turing Machine (MTNTM) model to verify the composed Web services for both deterministic and non-deterministic systems in parallel. The deceased transition and departed service marking algorithm have been proposed to address each participated service’s reachability in composing service for all possible input in parallel. This article shows an example to demonstrate the meticulousness of the model. The experimental results show that the performance of the proposed model is measured efficiently","PeriodicalId":54936,"journal":{"name":"International Journal of Web Services Research","volume":"25 1","pages":"75-102"},"PeriodicalIF":1.1,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87324897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Web Services Research
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1