The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Following the trend of big data, the business value of data is becoming a hot research field in recent years. The novel concept of Data Jacket introduced by Ohsawa et al. solved the difficult problem of data transactions due to the particular characteristic of data, i.e. the safeguarding privacy. In order to make sure the mechanism of the market of data, there are some researchers proposed a gamified...
Recently, heterogeneous information network(HIN) analysis has attracted a lot of attentions. One of the HIN application is recommendation. Due to HIN containing multiple different objects and links and rich semantic meanings, it is promising to generate better recommendation. Previous studies on movie recommendation have combined the single implicit feedback information with heterogeneous information...
Spatiotemporal event sequences (STESs) are the ordered series of event types whose evolving region-based instances frequently follow each other in time and are located closeby. Previous studies on STES mining require significance and prevalence thresholds for the discovery, which is usually unknown to domain experts. As the quality of the discovered STESs is of great importance to the domain experts...
It is very crucial for news aggregator websites which are recent in the market to actively engage its existing users. A recommendation system would help to tackle such a problem. However, due to the lack of sufficient amount of data, most of the state-of-the-art methods perform poorly in terms of recommending relevant news items to the users. In this paper, we propose a novel approach for Item-based...
We present the use of a new IDE plugin for introducing students to the analysis of software design. Without a concrete method to evaluate their ideas, designing for modifiability was a challenging topic for our students. Prior work showed that students can quickly learn about dependency graphs and use them to make design decisions. However, students frequently made mistakes creating the graphs and...
A novel method to construct a network based on heterogeneous features obtained from music videos and social metadata for music video recommendation is presented in this paper. The proposed method enables construction of the network that can accurately associate users with music videos corresponding to their preference by the collaborative use of audio and textual features obtained from music videos...
Ontologies play a key role in semanticinteroperability projects, capturing the conceptualizationunderlying the various systems to be integrated. In the case oflarge information systems landscapes, a single monolithicontology often becomes hard to design and maintain. In thissetting, it is common to divide the ontological model inconsistently interlinked modular ontologies, forming anontology network...
This paper gives a brief overview of the International Workshop on Vocabularies, Ontologies and Rules for the Enterprise (VORTE) held at EDOC 2017. The paper introduces the workshop series' research topics and presents this year's program
In this paper, we propose a public-address system for broadcasting speech that are easy to understand. The system converts a broadcast speech into text using speech recognizer, and it converts the text into simple text using semantic parser. Then, having obtained text with a simple meaning, the system broadcasts it using speech synthesizer. Proposed semantic parser can use dependency analysis to appropriately...
Natural language processing methods are widely used to study the relationship between traditional Chinese medicine (TCM) prescriptions and diseases in textual data, and the results can discover the essence of TCM literature. In this paper, we get TCM treatment information from the abstract text at first by using the web crawlers. Second, the eigenvectors will be selected from the cleaned abstract...
This research proposed a TCM FS Ontology using FS-associated information retrieved from ancient Chinese medical texts. To standardize the process, we rigorously followed the 7-steps-approach proposed by Standard University. Besides, the establishing of axioms constraining the relationships between concepts may provide reference for the construction of knowledge base in future studies.
According to the concept system of acupuncture and moxibustion subject, the semantic types of acupoint and acupuncture method are supplemented and adjusted, and their semantic relationships are discussed about and studied, so as to realize the networking of related concepts and terminologies of acupoint and acupuncture methods. We design the classification framework, and construct acupuncture terminology...
Web service is a popular solution to integrate components when building a software system, or to allow communication between a system and third-party users, providing a flexible and reusable mechanism to access its functionalities. Various web service based systems are prevailing in health service provision. We propose a framework of construction, searching and protection of typed health resources...
In recent years, people pay more and more attention to the knowledge of health care and longevity. As an important branch of the Traditional Chinese Medicine (TCM), health preservation is a subject for studying the theories and methods to prevent diseases and to maintain personal health. We aim to provide the general public as well as the TCM practitioners and students with a convenient way to access...
Growing complexity in modern software is making signature-based intrusion detection an increasing challenge. Many recent intrusion detection systems rely on accurate recovery of application semantics from memory. In this paper, we approach the problem from a different angle. We observe that the user applications in corporate network often run in identical system environments due to standardized IT...
Semantic techniques can be utilized for understanding the meaning of sentences in a text. We can refer the abstract of some document in order to understand its contents very quickly. But the case of video data is different. We cannot review the whole video file in a short time period just like the text document case. This paper proposes the design of video abstract extraction. In order to generate...
The ongoing trend towards distributed development activities causes a growing need for specification activities and techniques. Each component leads to a large number of specification documents being exchanged, change managed and committed. The quality of the specifications influences the timing, costs and success of the development task. However, the quality of such specifications is often far from...
[Context:] The quality of requirements engineering artifacts, e.g. requirements specifications, is acknowledged to be an important success factor for projects. Therefore, many companies spend significant amounts of money to control the quality of their RE artifacts. To reduce spending and improve the RE artifact quality, methods were proposed that combine manual quality control, i.e. reviews, with...
The proliferation of Internet of Things (IoT) devices and associated data streams, are en-abling a new class of dynamic data driven applications. However, processing this data in an robust, effective and timely manner can be nontrivial and presents a new set of challenges. This paper introduces Pulsar, a data-driven framework that leverages edge resources to support location and content aware processing...
Federation is generally used to denote collaboration between IT systems in different administrative domains to achieve common goals. Different administrative domains are typically distinct and loosely coupled by definition. While domains may have some degree of self-awareness, their awareness of other domains may be weak or non-existent. Hence, there is a fundamental challenge concerning how to build...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.