The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
To cope with the increasing amount of cyber threats, cyber security information must be shared beyond organization borders. Assorted organizations have already started to provide publicly-available repositories that store XML-based cyber security information on the Internet, but users are unaware of all of them. Cyber security information must be identified and located across such repositories by...
Multimedia documents like PowerPoint presentations or Flash documents are widely adopted in the Internet and exist in context of lots of different topics. However, so far there is no user friendly way to explore and search for this content. The aim of this work is to address this issue by developing a new, easy-to-use user interface approach and prototype search engine. Our system is called fulgeo...
In many Semantic Web applications, having RDF predicates sorted by significance is of primarily importance to improve usability and performance. In this paper we focus on predicates available on DBpedia, the most important Semantic Web source of data counting 470 million english triples. Although there is plenty of work in literature dealing with ranking entities or RDF query results, none of them...
Technologies based on the internet are improving continuously and so are the harmful websites such as pornography or illegal gambling websites. In addition, it is the characteristics of websites that the changes made to the web address or its contents take effect almost instantaneously. Therefore, it is not easy to identify harmful websites from those that are not. There are two ways to make such...
Presents the introductory welcome message from the conference proceedings. May include the conference officers' congratulations to all involved with the conference event and publication of the proceedings record.
Spatial SQL (structured query language) is a powerful tool for systematically solving geographic problems, however, it has not been widely applied to the problem of geographic question answering. This paper introduces a parameterized approach to translate natural language geographic questions into spatial SQLs. In particular, three types of complexity are introduced and initial solutions are proposed...
Big data analytics is the process of examining large amounts of data of a variety of types (big data) to uncover hidden patterns, unknown correlations and other useful information. Its revolutionary potential is now universally recognized. Data complexity, heterogeneity, scale, and timeliness make data analysis a clear bottleneck in many biomedical applications, due to the complexity of the patterns...
Presents the introductory welcome message from the conference proceedings. May include the conference officers' congratulations to all involved with the conference event and publication of the proceedings record.
The work presented here resulted in a valuable innovative technology tool for automatic detection of catastrophic errors in cancer radiotherapy, adding an important safeguard for patient safety. We designed a tool for Dynamic Modeling and Prediction of Radiotherapy Treatment Deviations from Intended Plans (Smart Tool) to automatically detect and highlight potential errors in a radiotherapy treatment...
Detection of cyber-attacks is a major responsibility for network managers and security specialists. Most existing Network Intrusion Detection systems rely on inspecting individual packets, an increasingly resource consuming task in today's high speed networks due to the overhead associated with accessing packet content. An alternative approach is to detect attack patterns by investigating IP flows...
In recent years, developing needed software applications via the technique Web Service Composition (WSC) has been more and more popular. Moreover, benefit from the Semantic Web Services (SWSs) technology, it is possible to even automatically conduct WSC, i.e. the Automated Web Service composition (AWSC). Currently the AWSC is a well-studied research subject and which means the existence of a large...
The business world has become more dynamic than ever before. Global competition and today's rapid pace of development in many fields has led to shorter time-to-market intervals, as well as more complex products and services. These developments do often imply impromptu changes to existing business processes. These dynamics are aggravated when unforeseen paths have to be taken like it is often the case...
Vector Symbolic Architectures (VSA) are methods designed to enable distributed representation and manipulation of semantically-structured information, such as natural languages. Recently, a new VSA based on multiplication of distributed vectors by random matrices was proposed, this is known as Matrix-Binding-of-Additive-Terms (MBAT). We propose an enhancement that introduces an important additional...
The MapReduce paradigm has become ubiquitous within Big Data Analytics. Within this field, Social Networks exist as an important area of applications as it relies on the large scale analysis of graphs. To enable the scalability of Social Networks, we consider the application of MapReduce design patterns for the determination of graph-based metrics. Specifically, we detail the application of a MapReduce-based...
Twitter-based messages have presented challenges in the identification of features as applied to classification. This paper explores filtering techniques for improved trend detection and information extraction. Starting with a pre-filtered source (Twitter), we will examine the application of both information theory and Natural Language Processing (NLP) based techniques as a means of preprocessing...
The paper proposes a system architecture for artificial creativity that enables a robot to perform portraits. The proposed cognitive architecture is inspired by the PSI model, and it requires that the motivation of the robot in the execution of its tasks is influenced by urges. Such parameters depend on both internal and external evaluation mechanisms. The system is a premise for the development of...
Semantic web works on producing machine readable data. So semantic web aims to overcome the amount of data that is consisted. The most important tool to access the data which exist in web is the search engine. Traditional search engines are insufficient in the face of the amount of data that is consisted as a result of the existing pages on the web. Semantic search engines are extensions to traditional...
We present a method for the automatic classification of text documents into a dynamically defined set of topics of interest. The proposed approach requires only a domain ontology and a set of user-defined classification topics, specified as contexts in the ontology. Our method is based on measuring the semantic similarity of the thematic graph created from a text document and the ontology sub-graphs...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.