首页 > 最新文献

2019 5th International Conference on Web Research (ICWR)最新文献

英文 中文
An Efficient Algorithm for Influence Blocking Maximization based on Community Detection 一种基于社区检测的影响块最大化有效算法
Pub Date : 2019-04-24 DOI: 10.1109/ICWR.2019.8765277
Niloofar Arazkhani, M. Meybodi, Alireza Rezvanian
Popularity of online social network services makes it a suitable platform for rapid information diffusion ranging from positive to negatives information. Although the positive diffused information may welcomed by people, the negative information such as rumor, hate and misinformation content should be blocked. However, blocking inappropriate, unwanted and contamination diffusion are not trivial. In particular, in this paper, we study the notion of competing negative and positive campaigns in a social network by addressing the influence blocking maximization (IBM) problem to minimize the bad effect of misinformation. IBM problem can be defined as finding a subset of nodes to promote the positive influence under Multi-campaign Independent Cascade Model as diffusion model to minimize the number of nodes that adopt the negative influence at the end of both propagation processes. In this regard, we proposed a community based algorithm called FC_IBM algorithm using fuzzy clustering and centrality measures for finding a good candidate subset of nodes for diffusion of positive information in order to minimizing the IBM problem. The experimental results on well-known network datasets showed that the proposed algorithm not only outperforms the baseline algorithms with respect to efficiency but also with respect to the final number of positive nodes.
在线社交网络服务的普及使其成为快速传播信息的合适平台,从正面信息到负面信息。虽然积极的传播信息可能会受到人们的欢迎,但负面的信息,如谣言、仇恨和错误的信息内容应该被封锁。然而,阻止不适当的、不需要的和污染的扩散不是微不足道的。特别是,在本文中,我们通过解决影响阻塞最大化(IBM)问题来研究社交网络中竞争消极和积极活动的概念,以最大限度地减少错误信息的不良影响。IBM问题可以定义为在多活动独立级联模型作为扩散模型下,寻找一个节点子集来促进积极影响,以最小化在两个传播过程结束时采用消极影响的节点数量。在这方面,我们提出了一种基于社区的算法FC_IBM算法,该算法使用模糊聚类和中心性度量来寻找良好的候选节点子集来传播正信息,以最小化IBM问题。在已知网络数据集上的实验结果表明,该算法不仅在效率方面优于基准算法,而且在最终正节点数方面也优于基准算法。
{"title":"An Efficient Algorithm for Influence Blocking Maximization based on Community Detection","authors":"Niloofar Arazkhani, M. Meybodi, Alireza Rezvanian","doi":"10.1109/ICWR.2019.8765277","DOIUrl":"https://doi.org/10.1109/ICWR.2019.8765277","url":null,"abstract":"Popularity of online social network services makes it a suitable platform for rapid information diffusion ranging from positive to negatives information. Although the positive diffused information may welcomed by people, the negative information such as rumor, hate and misinformation content should be blocked. However, blocking inappropriate, unwanted and contamination diffusion are not trivial. In particular, in this paper, we study the notion of competing negative and positive campaigns in a social network by addressing the influence blocking maximization (IBM) problem to minimize the bad effect of misinformation. IBM problem can be defined as finding a subset of nodes to promote the positive influence under Multi-campaign Independent Cascade Model as diffusion model to minimize the number of nodes that adopt the negative influence at the end of both propagation processes. In this regard, we proposed a community based algorithm called FC_IBM algorithm using fuzzy clustering and centrality measures for finding a good candidate subset of nodes for diffusion of positive information in order to minimizing the IBM problem. The experimental results on well-known network datasets showed that the proposed algorithm not only outperforms the baseline algorithms with respect to efficiency but also with respect to the final number of positive nodes.","PeriodicalId":6680,"journal":{"name":"2019 5th International Conference on Web Research (ICWR)","volume":"18 1","pages":"258-263"},"PeriodicalIF":0.0,"publicationDate":"2019-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88988821","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Fault Tolerance in Automatic Semantic Web Service Composition based on QoS-awareness Using BTSC-DFS Algorithm 基于qos感知的BTSC-DFS算法自动语义Web服务组合容错
Pub Date : 2019-04-24 DOI: 10.1109/ICWR.2019.8765284
Azam Kargar, S. Emadi
Quality-of-Service (QoS)-aware web service composition is very important in integrating individual services with respect to the functional and nonfunctional requirements. Despite the large number of candidate services, automation of the combination is essential in order to provide a good combination of service. Although many of the existing methods offer a solution that is optimal, most of them have little flexibility. In some cases, the compound service components fail, so the combination algorithm has to run again to find another optimal solution. Also in many situations, users prefer to have several alternative solutions. Therefore, providing a top-k service composition according to their QoS is more desirable. Because web services are unreliable, also since providing the transactional support in execution of a service composition is an important design requirement; so in this research, a fault management procedure is implemented to ensure the transaction execution of the service combinations. This procedure in the event of service failure undo the impact of this service by calling the equivalent service.The proposed method encounters these three issues: 1) the semantic selection of services; 2) QoS-aware web service composition with the top-k solution; and 3) fault-handling/recovery procedure. In the proposed method, ontology concept ranking algorithm is used in service selection, and top-k method is employed to solve service combination. Error handling procedure will then be reviewed and designed to ensure the transactional execution of the service composition. The evaluation results show that the proposed method not only finds optimal solutions but also can provide alternative solutions with optimal QoS.
支持服务质量(QoS)的web服务组合对于根据功能和非功能需求集成单个服务非常重要。尽管有大量的候选服务,但是为了提供良好的服务组合,组合的自动化是必不可少的。尽管许多现有的方法都提供了最优的解决方案,但大多数方法都缺乏灵活性。在某些情况下,复合服务组件失败,因此组合算法必须再次运行以找到另一个最优解决方案。此外,在许多情况下,用户希望有几个可选的解决方案。因此,根据它们的QoS提供top-k服务组合是更可取的。因为web服务是不可靠的,也因为在服务组合的执行中提供事务支持是一个重要的设计需求;因此,本研究采用故障管理流程来保证服务组合的事务执行。在服务失败的情况下,此过程通过调用等效服务来撤消此服务的影响。该方法面临三个问题:1)服务的语义选择;2)基于top-k解决方案的qos感知web服务组合;3)故障处理/恢复程序。该方法采用本体概念排序算法进行服务选择,采用top-k方法解决服务组合问题。然后将审查和设计错误处理过程,以确保服务组合的事务性执行。评价结果表明,该方法不仅能找到最优解,而且能提供具有最优QoS的备选解。
{"title":"Fault Tolerance in Automatic Semantic Web Service Composition based on QoS-awareness Using BTSC-DFS Algorithm","authors":"Azam Kargar, S. Emadi","doi":"10.1109/ICWR.2019.8765284","DOIUrl":"https://doi.org/10.1109/ICWR.2019.8765284","url":null,"abstract":"Quality-of-Service (QoS)-aware web service composition is very important in integrating individual services with respect to the functional and nonfunctional requirements. Despite the large number of candidate services, automation of the combination is essential in order to provide a good combination of service. Although many of the existing methods offer a solution that is optimal, most of them have little flexibility. In some cases, the compound service components fail, so the combination algorithm has to run again to find another optimal solution. Also in many situations, users prefer to have several alternative solutions. Therefore, providing a top-k service composition according to their QoS is more desirable. Because web services are unreliable, also since providing the transactional support in execution of a service composition is an important design requirement; so in this research, a fault management procedure is implemented to ensure the transaction execution of the service combinations. This procedure in the event of service failure undo the impact of this service by calling the equivalent service.The proposed method encounters these three issues: 1) the semantic selection of services; 2) QoS-aware web service composition with the top-k solution; and 3) fault-handling/recovery procedure. In the proposed method, ontology concept ranking algorithm is used in service selection, and top-k method is employed to solve service combination. Error handling procedure will then be reviewed and designed to ensure the transactional execution of the service composition. The evaluation results show that the proposed method not only finds optimal solutions but also can provide alternative solutions with optimal QoS.","PeriodicalId":6680,"journal":{"name":"2019 5th International Conference on Web Research (ICWR)","volume":"87 1","pages":"50-54"},"PeriodicalIF":0.0,"publicationDate":"2019-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79026113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Adaptive Random Walk Algorithm for Selecting Tips in the Tangle 一种自适应随机游走算法在缠结中选择提示
Pub Date : 2019-04-24 DOI: 10.1109/ICWR.2019.8765264
Fatemeh Sedighipour Chafjiri, Mohamad Mehdi Esnaashari Esfahani
Number of devices using Internet is increasing every day and this fact makes the need to improve the Internet of things protocol more than ever. Data protection and privacy is one of the key challenges in the Internet of Things technology. Dangers involved in the centralized technology of Blockchain system have led to the idea of using Tangle, which is a decentralized system. The main purpose of this new technology is to improve the problems and limitations of Blockchain such as high cost and time to confirm a transaction. In this new architecture, every node is involved in maintaining network security. This way, if a transaction is created, then it should select and confirm two unconfirmed transactions issued before. A walking algorithm is needed for this selection. Walking algorithms presented in literature thus far are either weighted or unweighted. An unweighted random walk algorithm can approve transactions nearly proportional to the time of their arrivals while a weighted algorithm can better defend against lazy and malicious transactions. In this paper, a new random walk algorithm is presented that has the benefits of both algorithms at the same time. The idea is to adapt the weight value to the current situation of transactions. Numerical results have shown the superiority of the proposed algorithm in comparison to the existing algorithms in providing a balance between timeliness of approving transactions and protecting against malicious activities.
使用互联网的设备数量每天都在增加,这一事实使得比以往任何时候都更需要改进物联网协议。数据保护和隐私是物联网技术的关键挑战之一。区块链系统的中心化技术所涉及的危险导致了使用Tangle的想法,这是一个去中心化的系统。这项新技术的主要目的是改善区块链的问题和局限性,例如确认交易的高成本和时间。在这种新的体系结构中,每个节点都参与维护网络安全。这样,如果创建了一个事务,那么它应该选择并确认之前发布的两个未确认的事务。这种选择需要一种行走算法。迄今为止,文献中提出的行走算法要么是加权的,要么是未加权的。非加权随机漫步算法可以批准与到达时间成正比的交易,而加权算法可以更好地防御懒惰和恶意交易。本文提出了一种同时具有两种算法优点的随机漫步算法。其思想是使权重值适应当前的交易情况。数值结果表明,与现有算法相比,该算法在审批交易的时效性和防止恶意活动之间提供了平衡。
{"title":"An Adaptive Random Walk Algorithm for Selecting Tips in the Tangle","authors":"Fatemeh Sedighipour Chafjiri, Mohamad Mehdi Esnaashari Esfahani","doi":"10.1109/ICWR.2019.8765264","DOIUrl":"https://doi.org/10.1109/ICWR.2019.8765264","url":null,"abstract":"Number of devices using Internet is increasing every day and this fact makes the need to improve the Internet of things protocol more than ever. Data protection and privacy is one of the key challenges in the Internet of Things technology. Dangers involved in the centralized technology of Blockchain system have led to the idea of using Tangle, which is a decentralized system. The main purpose of this new technology is to improve the problems and limitations of Blockchain such as high cost and time to confirm a transaction. In this new architecture, every node is involved in maintaining network security. This way, if a transaction is created, then it should select and confirm two unconfirmed transactions issued before. A walking algorithm is needed for this selection. Walking algorithms presented in literature thus far are either weighted or unweighted. An unweighted random walk algorithm can approve transactions nearly proportional to the time of their arrivals while a weighted algorithm can better defend against lazy and malicious transactions. In this paper, a new random walk algorithm is presented that has the benefits of both algorithms at the same time. The idea is to adapt the weight value to the current situation of transactions. Numerical results have shown the superiority of the proposed algorithm in comparison to the existing algorithms in providing a balance between timeliness of approving transactions and protecting against malicious activities.","PeriodicalId":6680,"journal":{"name":"2019 5th International Conference on Web Research (ICWR)","volume":"12 1","pages":"161-166"},"PeriodicalIF":0.0,"publicationDate":"2019-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86000468","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Health Internet of Things: Strengths, Weakness, Opportunity, and Threats 医疗物联网:优势、劣势、机遇和威胁
Pub Date : 2019-04-24 DOI: 10.1109/ICWR.2019.8765286
L. Gholamhosseini, F sadoughi, Hossein Ahmadi, A. Safaei
These days, based on the recent development in IoT technologies, a large number of innovative healthcare applications should be created. Health Internet of Things (HIoT) is a novel technology that used to connect many diver’s medical sensors to IoT devices. The HIoT facilitates remote data collection and monitoring in healthcare fields. This paper is a review study that addresses the impact of HIoT on healthcare applications. In this regards, we investigated the most important technologies used in HIoT and describe the main strengths, weaknesses, opportunities, and threats of HIoT-based applications. Based on the results, the potential strengths and opportunities of the HIoT technology is very different and widespread; however, it has some significant weaknesses and threats including complexity of handling a huge number of heterogeneous objects, achieving scalability, reliability, efficiency, availability, security, and interoperability with IoT systems across healthcare applications.
如今,基于物联网技术的最新发展,应该创建大量创新的医疗保健应用。健康物联网(HIoT)是一项将许多潜水员的医疗传感器连接到物联网设备的新技术。HIoT促进了医疗保健领域的远程数据收集和监控。本文是一项综述研究,解决了HIoT对医疗保健应用的影响。在这方面,我们调查了HIoT中使用的最重要的技术,并描述了基于HIoT的应用的主要优势、劣势、机会和威胁。基于结果,HIoT技术的潜在优势和机会是非常不同和广泛的;然而,它有一些明显的弱点和威胁,包括处理大量异构对象的复杂性,实现可扩展性、可靠性、效率、可用性、安全性以及跨医疗保健应用程序与物联网系统的互操作性。
{"title":"Health Internet of Things: Strengths, Weakness, Opportunity, and Threats","authors":"L. Gholamhosseini, F sadoughi, Hossein Ahmadi, A. Safaei","doi":"10.1109/ICWR.2019.8765286","DOIUrl":"https://doi.org/10.1109/ICWR.2019.8765286","url":null,"abstract":"These days, based on the recent development in IoT technologies, a large number of innovative healthcare applications should be created. Health Internet of Things (HIoT) is a novel technology that used to connect many diver’s medical sensors to IoT devices. The HIoT facilitates remote data collection and monitoring in healthcare fields. This paper is a review study that addresses the impact of HIoT on healthcare applications. In this regards, we investigated the most important technologies used in HIoT and describe the main strengths, weaknesses, opportunities, and threats of HIoT-based applications. Based on the results, the potential strengths and opportunities of the HIoT technology is very different and widespread; however, it has some significant weaknesses and threats including complexity of handling a huge number of heterogeneous objects, achieving scalability, reliability, efficiency, availability, security, and interoperability with IoT systems across healthcare applications.","PeriodicalId":6680,"journal":{"name":"2019 5th International Conference on Web Research (ICWR)","volume":"1 1","pages":"287-296"},"PeriodicalIF":0.0,"publicationDate":"2019-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90753608","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Improving Opinion Formation Models on Social Media Through Emotions 基于情感的社交媒体意见形成模型改进
Pub Date : 2019-04-24 DOI: 10.1109/ICWR.2019.8765288
A. Mansouri, F. Taghiyareh, J. Hatami
Opinion formation models describe the opinion dynamics of interacting people. Social media are drastically increasing and have become one of the most critical media for people interactions. According to psychological researches, one’s emotion diffuses across interacting people. Furthermore, emotion affects people’s opinion. The emotion contagion also happens through social media via the users’ posts and affects the readers. Therefore, emotion is an essential element in opinion formation models in a social network which has attracted little attention. In this paper, we show how considering emotion in opinion formation model for online social networks improves the model. We have used a dataset containing some debates from the CreateDebate.com website. Two classifiers, with and without considering emotions, have been implemented based on the social impact model of opinion formation to predict the stances of the users’ next post in the dataset and the results have been compared with the dataset. The experiment results lead us to conclude that considering emotions improves the accuracy and precision of the social impact model of opinion formation in social media.
意见形成模型描述了相互作用的人的意见动态。社交媒体正在急剧增长,并已成为人们互动最重要的媒体之一。根据心理学研究,一个人的情绪会在人际交往中扩散。此外,情绪影响人们的意见。情感传染也通过社交媒体通过用户的帖子发生,影响读者。因此,情感是社会网络中意见形成模型的重要组成部分,而这一理论很少受到关注。在本文中,我们展示了在在线社交网络的意见形成模型中考虑情感是如何改进模型的。我们使用了一个数据集,其中包含了来自CreateDebate.com网站的一些辩论。基于意见形成的社会影响模型,实现了考虑和不考虑情绪的两种分类器来预测用户在数据集中的下一篇文章的立场,并将结果与数据集进行了比较。实验结果使我们得出结论,考虑情绪提高了社交媒体意见形成的社会影响模型的准确性和精度。
{"title":"Improving Opinion Formation Models on Social Media Through Emotions","authors":"A. Mansouri, F. Taghiyareh, J. Hatami","doi":"10.1109/ICWR.2019.8765288","DOIUrl":"https://doi.org/10.1109/ICWR.2019.8765288","url":null,"abstract":"Opinion formation models describe the opinion dynamics of interacting people. Social media are drastically increasing and have become one of the most critical media for people interactions. According to psychological researches, one’s emotion diffuses across interacting people. Furthermore, emotion affects people’s opinion. The emotion contagion also happens through social media via the users’ posts and affects the readers. Therefore, emotion is an essential element in opinion formation models in a social network which has attracted little attention. In this paper, we show how considering emotion in opinion formation model for online social networks improves the model. We have used a dataset containing some debates from the CreateDebate.com website. Two classifiers, with and without considering emotions, have been implemented based on the social impact model of opinion formation to predict the stances of the users’ next post in the dataset and the results have been compared with the dataset. The experiment results lead us to conclude that considering emotions improves the accuracy and precision of the social impact model of opinion formation in social media.","PeriodicalId":6680,"journal":{"name":"2019 5th International Conference on Web Research (ICWR)","volume":"104 1","pages":"6-11"},"PeriodicalIF":0.0,"publicationDate":"2019-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80535078","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Fragile Watermarking for Image Authentication Using QR factorization and Fourier Transform 基于QR分解和傅里叶变换的图像认证脆弱水印
Pub Date : 2019-04-01 DOI: 10.1109/ICWR.2019.8765292
F. Nejati, H. Sajedi, M. Mohammadi
Image authentication technique is one of the important methods for a large number of multimedia applications. When a digital image is passed over non-secure channels such as the Internet, it may be changed and manipulated. For some important images such as military and medical images, these manipulations are very harmful and such images should be protected against them. There are several ways such as fragile and semi-fragile watermarking to authenticate images from malicious attacks. This paper presents a fragile watermarking algorithm for image authentication by using QR factorization and Fourier Transform (FT). By applying Fourier transform to host image, frequency domain which causes visual quality in watermarking is achieved. After applying FT, it is factorized by QR decomposition. QR factorization is also applied to watermark image. After factorizing both images, a coefficient of the upper triangular matrix R from watermark image is embedded to the upper triangular matrix R from host image. So a sign of the watermark image is hidden in the host image. This method is a fragile watermarking and it is sensitive to a little attack. So if an image is attacked over the Internet, the watermark image can not be extracted and it means that it has been attacked and it helps us to recognize if an image is changed after being transmitted over the Internet. The experimental results show that this method is sensitive to every weak attack and extraction part can not extract watermark image if it has been attacked.
图像认证技术是大量多媒体应用的重要方法之一。当数字图像通过诸如因特网等不安全的渠道传递时,它可能会被改变和操纵。对于一些重要的图像,如军事和医学图像,这些操作是非常有害的,这些图像应该受到保护。有几种方法,如脆弱和半脆弱的水印来验证图像免受恶意攻击。提出了一种基于QR分解和傅里叶变换的图像认证脆弱水印算法。通过对主图像进行傅里叶变换,实现了水印中引起视觉质量的频域。应用傅里叶变换后,进行QR分解分解。对水印图像也进行了QR分解。对两幅图像进行因式分解后,将水印图像上三角矩阵R的一个系数嵌入到主图像上三角矩阵R中。这样水印图像的符号就隐藏在主图像中。该方法是一种脆弱的水印方法,对少量攻击很敏感。因此,如果一幅图像在网络上受到攻击,水印图像无法被提取出来,这就意味着该图像受到了攻击,这有助于我们识别图像在网络上传输后是否发生了变化。实验结果表明,该方法对各种弱攻击都很敏感,提取部分受到攻击后不能提取水印图像。
{"title":"Fragile Watermarking for Image Authentication Using QR factorization and Fourier Transform","authors":"F. Nejati, H. Sajedi, M. Mohammadi","doi":"10.1109/ICWR.2019.8765292","DOIUrl":"https://doi.org/10.1109/ICWR.2019.8765292","url":null,"abstract":"Image authentication technique is one of the important methods for a large number of multimedia applications. When a digital image is passed over non-secure channels such as the Internet, it may be changed and manipulated. For some important images such as military and medical images, these manipulations are very harmful and such images should be protected against them. There are several ways such as fragile and semi-fragile watermarking to authenticate images from malicious attacks. This paper presents a fragile watermarking algorithm for image authentication by using QR factorization and Fourier Transform (FT). By applying Fourier transform to host image, frequency domain which causes visual quality in watermarking is achieved. After applying FT, it is factorized by QR decomposition. QR factorization is also applied to watermark image. After factorizing both images, a coefficient of the upper triangular matrix R from watermark image is embedded to the upper triangular matrix R from host image. So a sign of the watermark image is hidden in the host image. This method is a fragile watermarking and it is sensitive to a little attack. So if an image is attacked over the Internet, the watermark image can not be extracted and it means that it has been attacked and it helps us to recognize if an image is changed after being transmitted over the Internet. The experimental results show that this method is sensitive to every weak attack and extraction part can not extract watermark image if it has been attacked.","PeriodicalId":6680,"journal":{"name":"2019 5th International Conference on Web Research (ICWR)","volume":"28 4 1","pages":"45-49"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77117099","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Spatiotemporal Semantic Search Engine For Cultural Events 文化事件的时空语义搜索引擎
Pub Date : 2019-04-01 DOI: 10.1109/ICWR.2019.8765287
Y. Norouzi, F. Hakimpour
In the field of geographic information science spatiotemporal information extraction from Web pages, especially unstructured documents, is one of the growing areas of the research. Abundant news is publishing every hour on the Web, which contains valuable spatiotemporal information for its users. It is cumbersome and time-consuming to search among unstructured texts and find events of interest. In this work, we will show you how to extract spatiotemporal and semantic entities and relationships representing in cultural event news reports and search within the information. Natural Language Processing (NLP) and automatic ontology population are tightly coupled, and together they make it possible to have Web documents semantically so that not only can machines comprehend the Web documents, but also as a result, users are able to find the ideal information with ease. A spatiotemporal semantic search engine enables us to answer, where and when an event will take place.
在地理信息科学领域,从网页尤其是非结构化文档中提取时空信息是一个新兴的研究领域。网络上每小时都有大量的新闻发布,这些新闻为用户提供了宝贵的时空信息。在非结构化文本中搜索和查找感兴趣的事件既麻烦又耗时。在这项工作中,我们将向您展示如何提取文化事件新闻报道中所代表的时空和语义实体和关系,并在信息中进行搜索。自然语言处理(Natural Language Processing, NLP)和自动本体填充(automatic ontology population)紧密耦合在一起,使语义化Web文档成为可能,不仅机器能够理解Web文档,而且用户能够轻松地找到理想的信息。一个时空语义搜索引擎使我们能够回答,一个事件将在何时何地发生。
{"title":"A Spatiotemporal Semantic Search Engine For Cultural Events","authors":"Y. Norouzi, F. Hakimpour","doi":"10.1109/ICWR.2019.8765287","DOIUrl":"https://doi.org/10.1109/ICWR.2019.8765287","url":null,"abstract":"In the field of geographic information science spatiotemporal information extraction from Web pages, especially unstructured documents, is one of the growing areas of the research. Abundant news is publishing every hour on the Web, which contains valuable spatiotemporal information for its users. It is cumbersome and time-consuming to search among unstructured texts and find events of interest. In this work, we will show you how to extract spatiotemporal and semantic entities and relationships representing in cultural event news reports and search within the information. Natural Language Processing (NLP) and automatic ontology population are tightly coupled, and together they make it possible to have Web documents semantically so that not only can machines comprehend the Web documents, but also as a result, users are able to find the ideal information with ease. A spatiotemporal semantic search engine enables us to answer, where and when an event will take place.","PeriodicalId":6680,"journal":{"name":"2019 5th International Conference on Web Research (ICWR)","volume":"52 1","pages":"117-122"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88718823","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Optimal Service Composition Algorithm in Multi-Cloud Environment 多云环境下的最优服务组合算法
Pub Date : 2019-04-01 DOI: 10.1109/ICWR.2019.8765266
Zahra Nazari, A. Kamandi, M. Shabankhah
Major part of internet users are devices which are connected to each other on the internet and are exchanging data with internet brokers to receive requested services. Managing and accounting well to IoT requests needs maximum processing power, speed in data transfer and proper combining services in minimum time. This many devices in IoT, made solving problems in this area to use abilities and facilities of cloud environment. Hence combining services in cloud environment is paid attention recently. In this research we want to give an algorithm with approach of improving factors propounded in the problem combining service composition problem like number of clouds involved in giving services, number of services studied before fulfilling users requests and load balance between clouds. In this paper we use the factor, similarity measure, to find the most suitable cloud and composition plan in each phase which in addition to improving QoS metrics propounded in previous papers, it caused improving QoS metric of load balancing between clouds, prevention of formation of bottleneck in clouds entrance, decreasing the probability of temporarily failing of any of clouds and consequently increasing the users’ satisfaction.
互联网用户的主要部分是在互联网上相互连接的设备,并与互联网代理交换数据以接收请求的服务。管理和核算好物联网请求需要最大的处理能力,数据传输速度和在最短的时间内正确组合服务。物联网中这么多的设备,使得解决这方面的问题要用到云环境的能力和设施。因此,云环境下的服务组合成为人们关注的焦点。在本研究中,我们希望给出一种算法,该算法结合服务组合问题中提出的因素,如提供服务所涉及的云数量,在满足用户请求之前研究的服务数量以及云之间的负载平衡。在本文中,我们使用相似度度量因子,在每个阶段找到最合适的云和组合方案,除了提高了之前论文提出的QoS指标外,还提高了云间负载均衡的QoS指标,防止了云入口瓶颈的形成,降低了任何云暂时失效的概率,从而提高了用户的满意度。
{"title":"An Optimal Service Composition Algorithm in Multi-Cloud Environment","authors":"Zahra Nazari, A. Kamandi, M. Shabankhah","doi":"10.1109/ICWR.2019.8765266","DOIUrl":"https://doi.org/10.1109/ICWR.2019.8765266","url":null,"abstract":"Major part of internet users are devices which are connected to each other on the internet and are exchanging data with internet brokers to receive requested services. Managing and accounting well to IoT requests needs maximum processing power, speed in data transfer and proper combining services in minimum time. This many devices in IoT, made solving problems in this area to use abilities and facilities of cloud environment. Hence combining services in cloud environment is paid attention recently. In this research we want to give an algorithm with approach of improving factors propounded in the problem combining service composition problem like number of clouds involved in giving services, number of services studied before fulfilling users requests and load balance between clouds. In this paper we use the factor, similarity measure, to find the most suitable cloud and composition plan in each phase which in addition to improving QoS metrics propounded in previous papers, it caused improving QoS metric of load balancing between clouds, prevention of formation of bottleneck in clouds entrance, decreasing the probability of temporarily failing of any of clouds and consequently increasing the users’ satisfaction.","PeriodicalId":6680,"journal":{"name":"2019 5th International Conference on Web Research (ICWR)","volume":"2 1","pages":"141-151"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90304279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
DeepBlock: A Novel Blocking Approach for Entity Resolution using Deep Learning DeepBlock:一种基于深度学习的实体解析新方法
Pub Date : 2019-04-01 DOI: 10.1109/ICWR.2019.8765267
Delaram Javdani, H. Rahmani, Milad Allahgholi, Fatemeh Karimkhani
Entity resolution refers to the process of identifying and integrating records belonging to unique entities. The standard methods are using a rule-based or machine learning models to compare and assign a point, to indicate the status of matching or non-matching the pair of records. However, a comprehensive comparison across all the records pairs leads to a second-order matching complexity. Therefore blocking methods are using before the matching, to group the same entities into small blocks. Then the matching operation is done comprehensively. Several blocking methods provided to efficiently block the input data into manageable groups, including the token blocking, that holds records with a similar token in the same block. Most of the previous methods did not take any semantic criteria into account. In this paper, we propose a new method, called DeepBlock that uses deep learning for the task of blocking in entity resolution. DeepBlock combines syntactic and semantic similarities to calculate the similarity between records. We have evaluated the DeepBlock over the real-world dataset and compared it with the existing blocking technique (token blocking). Our experimental result shows that the combination of semantic and syntactic similarity can considerably improve the quality of blocking. The results show that DeepBlock outperforms the token blocking method significantly with respect to pair quality (PQ) measure.
实体解析是指对属于唯一实体的记录进行识别和集成的过程。标准方法是使用基于规则或机器学习的模型来比较和分配一个点,以指示匹配或不匹配对记录的状态。但是,在所有记录对之间进行全面比较会导致二级匹配复杂性。因此,在匹配之前使用块方法,将相同的实体分组成小块。然后进行全面的匹配操作。提供了几种阻塞方法来有效地将输入数据阻塞到可管理的组中,包括令牌阻塞,它在同一块中保存具有类似令牌的记录。以前的方法大多不考虑语义标准。在本文中,我们提出了一种名为DeepBlock的新方法,该方法使用深度学习来完成实体解析中的阻塞任务。DeepBlock结合句法和语义相似性来计算记录之间的相似性。我们在真实世界的数据集上评估了DeepBlock,并将其与现有的阻塞技术(令牌阻塞)进行了比较。实验结果表明,语义相似度和句法相似度的结合可以显著提高分组的质量。结果表明,DeepBlock在对质量(PQ)度量方面明显优于令牌阻塞方法。
{"title":"DeepBlock: A Novel Blocking Approach for Entity Resolution using Deep Learning","authors":"Delaram Javdani, H. Rahmani, Milad Allahgholi, Fatemeh Karimkhani","doi":"10.1109/ICWR.2019.8765267","DOIUrl":"https://doi.org/10.1109/ICWR.2019.8765267","url":null,"abstract":"Entity resolution refers to the process of identifying and integrating records belonging to unique entities. The standard methods are using a rule-based or machine learning models to compare and assign a point, to indicate the status of matching or non-matching the pair of records. However, a comprehensive comparison across all the records pairs leads to a second-order matching complexity. Therefore blocking methods are using before the matching, to group the same entities into small blocks. Then the matching operation is done comprehensively. Several blocking methods provided to efficiently block the input data into manageable groups, including the token blocking, that holds records with a similar token in the same block. Most of the previous methods did not take any semantic criteria into account. In this paper, we propose a new method, called DeepBlock that uses deep learning for the task of blocking in entity resolution. DeepBlock combines syntactic and semantic similarities to calculate the similarity between records. We have evaluated the DeepBlock over the real-world dataset and compared it with the existing blocking technique (token blocking). Our experimental result shows that the combination of semantic and syntactic similarity can considerably improve the quality of blocking. The results show that DeepBlock outperforms the token blocking method significantly with respect to pair quality (PQ) measure.","PeriodicalId":6680,"journal":{"name":"2019 5th International Conference on Web Research (ICWR)","volume":"54 1","pages":"41-44"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82311893","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
ICWR 2019 Subject Index ICWR 2019主题索引
Pub Date : 2019-04-01 DOI: 10.1109/icwr.2019.8765256
{"title":"ICWR 2019 Subject Index","authors":"","doi":"10.1109/icwr.2019.8765256","DOIUrl":"https://doi.org/10.1109/icwr.2019.8765256","url":null,"abstract":"","PeriodicalId":6680,"journal":{"name":"2019 5th International Conference on Web Research (ICWR)","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78858929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2019 5th International Conference on Web Research (ICWR)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1