The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
As a model for knowledge description and formalization, ontologies are widely used to represent user profiles in personalized web information gathering. However, when representing user profiles, many models have utilized only knowledge from either a global knowledge base or a user local information. In this paper, a personalized ontology model is proposed for knowledge representation and reasoning...
The following topics are dealt with: cyber-enabled distributed computing; knowledge discovery; distributed control; data mining; wireless communication; mobile communication; agent; middleware; mobile system; Internet protocol; quality of service; parallel computing; authentication; privacy; system management; neural network; reasoning; and cloud computing.
Many real-world Web mining tasks need to discover topics interactively, which means the users are likely to interfere the topic discovery and selection processes by expressing their preferences. In this paper, a new algorithm based on Latent Dirichlet Allocation (LDA) is proposed for interactive topic evolution pattern detection. To eliminate those topics not interested, it allows the users to add...
User-generated content is quickly becoming the greatest source of information on the World Wide Web. Shared content items are initially considered unconfirmed in the sense that their credibility has not yet been established. Conventional, centralized confirmation of credibility is infeasible at the Internet scale and so making use of the annotators themselves to evaluate each item is essential. However,...
Due to the uncertainty of the business environment and critical competition, financial statement fraud (FSF) risk is higher than in past decades. Most FSF is caused by top managers who have the authority to override the internal controls and deploy de facto power against audit committees. An auditor is the last line of defense to detect FSF. Unfortunately, many auditors lack the expertise and experience...
A solution to evaluate network workload by data fusion is put forward, which can be for surveillance the traffic of interconnected communications network in order to keep the network working well by identifying potentially serious problems in the early stages and evaluating network performance. Through fusing the historic network traffic data and network online traffic data, which is based on least...
Event relationship extraction is a new research domain which has attracted more and more attentions. It is because that the relationships among different events can provide a lot of important information on special fields such as national defense, crime-solving or anti-terrorism. But there are innumerous event description Web pages on the Internet and the relationship among them is perplexing, so...
With the advancement of internet technology, data on internet have become increasingly huge. Therefore, how to find out the valuable pages from a magnitude of information has been an urgent problem, which should be followed upright. Tradition search engines, based on the query of keywords, have no ability of understanding user demand well. To make up with its deficiency, the concept in which it is...
Mastering knowledge of user profile is one of the technical cornerstones for service providers who handle a large amount of service consumption data and are well positioned to dynamically infer user interests. This paper presents a technology allowing to gather usage data from different multimedia services, create and track users profiles in real-time and monetize them by targeting content or other...
This article contents a brief description of an e-learning material, a set of interactive online exercises developed for the education of fuzzy systems with the aim to get a supplement to theoretical lessons. Students can do experiments by changing the input parameters, and after submitting the inputs, they get the results immediately via the Internet in form of a Web document containing variables...
According to the current application and maintenance situation of numerical control equipment (NCE), a novel remote fault diagnosis expert system is designed to prevent fault occurrence and quicken the recovering process by online real-time monitoring the working state of NCEs. The article addresses the overall framework and relevant application technology of fault diagnosis system (FDS) and emphasizes...
Many social networking platforms have emerged on the Web, such as MySpace and Facebook. In those networks, most participants are usually physically unknown in real life and have no prior direct interactions with each other. Hence, it is necessary to form complex trust-oriented social networks with more trust related information and infer trust values between participants. The inferred trust results...
The field of e-government still lacks a coherent identity at present. In this paper, we seek answers to this question by relying on a large-scale survey of e-government field articles. A consensual conception of the field held by its members is derived. Then, it is discussed that the definition and its six sub-elements. Findings suggest that e-governmentpsilas success as a field emerges from a widely...
The social network analysis (SNA) attempts to find explicit similarities between actors in the network. Traditional clustering methods are based on the attributes between actors in the network that lacks for logic foundation. In this paper we apply rough set theory to SNA. Objects are partitioned into equivalence classes interpreting the hidden community. This paper proposes a framework to find the...
E-supply network coordination (e-SNC) is a new structure obtained by information technology, automation of different echelons' behavior, and the market globalization. The information flow and cooperation among echelons are two key drivers in SN. Here, supply network is considered as a collection of agent-mediated decision and coordination mechanisms in a Web-based environment. The proposed coordination...
The Web pages of today strive to think out of the box by creating different look-and-feel for each particular user. Most of them still are a pure cast of HTML tags, however some Web applications tend to organize their structure and content based on user access patterns. These systems are known as adaptive Web based systems. In this paper we present a complete ontology (concept domain) for adaptive...
In this talk, we will describe studying on granular reasoning of human and Web in a unified way from the viewpoint of brain informatics. We consider Web granular reasoning as an application of human-inspired granular reasoning. As for human granular reasoning, based on the previous studies about basic-level advantage and its reversal effect, we use fMRI/ERP to investigate how the neural system cooperates...
Resource Space Model (RSM) is a semantic data model for specifying, storing, managing and locating Web resources by appropriately classifying the contents of resources. Semantic Link Network (SLN) was designed to establish semantic relationships among various resources aiming at extending the hyperlink network World Wide Web to a semantic-rich network. For locating and analyzing the relationships...
This paper proposes a symbol feature-based hidden Markov model (HMM). Each state in the model is expressed by some symbol features, and is described by feature lists that draw from regular expressions and text inference; based on which, we use Viterbi Algorithm to extract the information from scientific researcherspsila homepages. It works well although there is great information redundancy.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.