The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Due to the rapid advancement of the internet technology, there is proliferation of textual data, as a result of which automatic summarization has become one of the useful means of coping with the problem of information overload. These textual data are not just in English; thus researchers started focusing on multilingual summarization platforms, so that single framework can be used to cope with different...
Most Arabic systems developed for newspaper information extraction relate to events that occurred in the past. This paper presents a proposal for developing a web-based system that will be able to regularly collect news reports from Arabic newspaper websites, and then be able to extract information relating to future events, e.g. event type, date and location. Also, the system will be able to deposit...
Today the Web represents a rich source of labour market data for both public and private operators, as a growing number of job offers are advertised through Web portals and services. In this paper we apply and compare several techniques, namely explicit-rules, machine learning, and LDA-based algorithms to classify a real dataset of Web job offers collected from 12 heterogeneous sources against a standard...
Semantic metadata has many uses in online virtual environments, but the technology for acquiring and managing metadata is not yet fully developed. This paper presents a partial solution that combines and extends traditional top-down and bottom-up approaches to semantic annotation. The paper proposes a metadata architecture composed of three layers, each of which has a metadata store and an interface...
With the increasing number of mobile devices, there have been many researches on searching and managing a large volume of mobile data. Most of the mobile platforms today provide users with keyword-based full text search (FTS) in order to search for mobile data. Recently, voice search interfaces have been deployed. These search methods, however, query only the keywords given as an input to local databases...
Recent years, social network has attracted many attentions from research communities in data mining, social science and mobile etc, since users can create different types of information due to different actions and the information gives us the opportunities to better understand the insights of people's social lives. Co-clustering is an important technique to detect patterns and phenomena of two types...
Today's industry emphasize greatly on data-driven and data engineering technologies, triggering a tremendous amount of structured and unstructured data across different domains. As a result of which, semantic information is implicitly available in the knowledge base, mainly in the form of data descriptions, and needs to be extracted automatically to better serve the users' need. But how to deliver...
Many real world RDF collections are large compared with other real world data structures. Such large RDF collections evolve in a distributed environment. Therefore, these changes between RDF versions need to be detected and computed in order to synchronize these changes to the other users. To cope with the evolving nature of the semantic web, it is important to understand the costs and benefits of...
A service mashup goes through several processes, which it takes much time and efforts for developers to mashup of many heterogeneous web services. To mitigate the complexity of a service mashup and automate the mashup process, the present paper proposes semantic service discovery and matching technologies. The semantic service discovery technology is capable of finding out more appropriate and ranked...
Successfully modeling state and analytics-based semantic relationships of documents enhances thoroughness of representation, contextualization of importance and relevancy, posterity of provenance, and a delineation of priority for a document. These attributes are the core elements that form the machine-based knowledge representation for documents. However, modeling document relationships that can...
Cyberattackers often attack the weakest point of system, which is increasingly the people who use and interact with a computer-based system. A great deal of research has been dedicated to protection of computer-based assets, but by exploiting human vulnerabilities, an attacker can circumvent many computer-based defenses. Phishing emails are a common form of social engineering attack, but the most...
In spite of the long tradition of Rhetorical Structure Theory (RST) in computational linguistics, there is no robust method capable of detecting rhetorical relations in the text of discourse. To pave the way for development of such techniques, we carried out experiments aimed at understanding the effectiveness of using corpus-based lexical cues in the identification of RST relations for three different...
Process exploration tools help to identify business processes that are not executed according to their documentation or lack such documentation at all. These process steps are executed by human beings, therefore process traces can often be found in unstructured documents. In order to reconstruct a process execution, these documents have to be retrieved. Natural language properties such as hyponyms,...
Fashion is a key defining factor of popular culture, and it changes over time. Each season tons of new products emerge to the market. People who follow fashion wish to discover new and trendy products and quickly catch the most fashionable styles. Traditionally, product trends can be found in fashion magazines and product catalogs, but now the proliferation of the Internet and social networks may...
A hierarchical learning algorithm is developed for supporting large-scale plant species identification. A visual tree is first constructed for organizing large numbers of plant species hierarchically in a coarse-to-fine fashion. For the fine-grained plant species at the sibling leaf nodes under the same parent node, they share significant common visual properties but still contain subtle visual differences,...
This paper presents an efficient image authentication system. The authentication signature is extracted from WFA encoding of the image. For noises that are more textural rather than color-based, we transform the image using a Local-Binary-Pattern filter, which is then converted to automata. We present a technique that incorporates the weights of the WFA, unlike previous works.
This paper describes a method to replace commonly used scales with personalized scales. We explain a notion of personalized scales and describe our replacement system, the MyScale interface. Two prototypes of MyScale are shown. MyScale: heights, distances, weights and areas replaces numeric expressions of common scales with personalized scales in order to assist a user's intuitive understanding. MyScale:...
Phishing attacks are a form of social engineering technique used for stealing private information from users through emails. A general approach for phishing susceptibility analysis is to profile the user's personality using personality models such as the Five Factor Model (FFM) and find out the susceptibility for a set of phishing attempts. The FFM is a personality profiling system that scores participants...
Semantic Data Mining refers to the data mining tasks that systematically incorporate domain knowledge, especially formal semantics, into the process. In the past, many research efforts have attested the benefits of incorporating domain knowledge in data mining. At the same time, the proliferation of knowledge engineering has enriched the family of domain knowledge, especially formal semantics and...
Welcome to the Proceedings of the Ninth IEEE International Conference on Semantic Computing (ICSC 2015) in Anaheim, California, USA. ICSC 2015 continues to foster the growth of a new research community. This edition of the conference builds upon the tradition and success of the past ICSC series as an international forum for researchers as well as practitioners in academia and industry to present research...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.