The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Finding similar police 110 incidents from the incident dataset plays an important role in recognising related cases from which the investigators could find more clues and make a better decision on police deployment. We aim at finding 110 incidents with similar case features and semantic compared against a given incident. A short text similarity algorithm is presented. Our algorithm is developed from...
Today, E-Commerce has become the largest revenue generation industry, letting seller sell everything from a pen to plane to the customers across the globe. Over an E-commerce platform where user and vendor merely interact with each other, the trust is undeniably the most important factor for users to perform transactions online. But at the same time it can't be assessed directly using some pre-defined...
We present a novel approach for recommending documents to users by analyzing user browsing behavior, and demonstrate the effectiveness of our methods using an original data set.
The SICH Project specific objective is to develop new strategic tools and assessment techniques, based on semantic analysis on texts, to support the dynamic mapping and the automatic identification of illegal content over the Net. Xenophobia/Racism, illegal online Gambling and Novel Psychoactive Substances (NPS) are the main areas of reference. In this paper the authors present a systems based on...
A prerequisite to implementing virtualization-aware security solutions is to solve the "semantic gap" problem. Current approaches require a deep knowledge of the kernel data to manually solve the semantic gap. However, kernel data is very complex; an Operating System (OS) kernel contains thousands of data structures that have direct and indirect (pointer) relations between each other with...
Advances in communication technologies have made it easier to distribute and communicate information effectively. The world has become a global village with the advent of the Internet. Besides getting the benefits of information technology, the world faces threats of violations of copyright, digital counterfeiting, privacy and plagiarism. These issues have been addressed for image, audio and video...
Web service composition is an important technology in domain of Web service. It provides an effective solution to complex Web application. In this paper, a new composition algorithm of semantic Web service based on QoS is proposed, which is concerned with the effect of some non-functional factors of service composite quality and the satisfaction with service composition. Experiments are carried out...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.