The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The integration of the classical Web (of documents) with the emerging Web of Data is a challenging vision. In this paper we focus on an integration approach during searching which aims at enriching the responses of non-semantic search systems (e.g. professional search systems, web search engines) with semantic information, i.e. Linked Open Data (LOD), and exploiting the outcome for providing an overview...
The need for parallel task execution has been steadily growing in recent years since manufacturers mainly improve processor performance by scaling the number of installed cores instead of the frequency of processors. To make use of this potential, an essential technique to increase the parallelism of a program is to parallelize loops. However, a main restriction of available tools for automatic loop...
Online searching of books have gained astounding popularity worldwide. It has also attracted variety of researchers globally. Searching of books (e.g. Amazon.com, aNobii, LibraryThing etc) with the help of Social metadata(e.g. tags, reviews) and professional metadata (e.g. ISBN Number, Title, Publisher) is gradually becoming a sizzling hot topic under the aegis of Information Retrieval. In this paper,...
IT industry is booming. So, the requirement for resources is also on the increase. Industry requires more processing power and storage capability to meet their goal. Here, Cloud Computing comes in the picture, it provides IT industry the much-needed resources on a large scale at low cost and makes their task easy. Organizations can easily outsource their huge amount of data to cloud storage. However,...
This work adopts the paradigm of cloud computing over the framework of Device-to-Device (D2D) communications in LTE-Advanced to enable mobile devices to offer network services to nearby devices, thus acting as mobile cloudlets, and to offload cellular traffic from the core network. Hence, any mobile device seeking a new service can search and discover for nearby services with the help of the LTE-A...
Historical records of daily activities provide an intriguing look into the historic life. These documents have interesting information, useful for demography studies and genealogical research. However, automatic processing of historical documents, has mostly been focused on single works of literature and less on daily records, which tend to have a distinct layout, structure, and vocabulary. This paper...
True Muslims around the world believe in Al Quran and Hadith. Al Quran is the principal religious text of Islam, a revelation from Allah. Hadith is also one of the fundamental sources of Islamic references and guidance for the Muslims after the Holy Book, Al-Quran. Hadith is referred to a report, statement, act, story, narration or discourse. Hadith, originally in Arabic, covers a wide range of issues...
Cloud computing enables the data stored on the cloud to be accessed anytime and anywhere. The data stored online must be encrypted using either symmetric key encryption or public key encryption to prevent it from unauthorized access. The end user may desire to perform dynamic updates i.e. insertion, deletion and modification of data along with the search operation on the encrypted cloud data to improve...
Visual Object and Place Recognition are very important issues in computer vision and mobile robotics. In the literature, many approaches have been introduced to solve these problems. Still, one of the most widely used approaches in computer vision refers to as combining the machine learning algorithms to learn objects for optimal recognition and also its image descriptors to describe the image content...
Finding occurrences of utterances whether are single words or phrases in streams of audio is very useful for fast retrieval of audio files as in querying by content in big collection of audio files. I is also useful for monitoring audio signals for security reasons for example searching for alert signals in the fight against terrorism. To achieve such goals we need to use Feature extraction techniques...
Cloud computing provides dynamically scalable resources provisioned as a service over networks. But untrustworthy Cloud Service Provider(CSP) offers a big obstacle for the adoption of the cloud service since CSP can access data in Cloud without data owner's permission. Hierarchical Inner Product Encryption (HIPE) covers all applications of anonymous encryption, fully private communication and search...
Information retrieval from Islamic scriptures has greatly increased in recent years. With the fast moving life of today, there is too much to read and very little time to prepare, therefore a system is required that complies all related information from authentic electronic source files and organizes it into a standard format that could be quickly printed and taken along to be referred to during any...
In the software industry, generally software manufacturers develop the component and use it only once. As a result of which there is lot of wastage in effort, cost as well as time in developing software's. The solution to the above is to reuse the software components further in the development of other similar kind of products or the products having same functionality. So, a successful component storage...
This research is situated in a project aimed at the development of a vocal user interface (VUI) that learns to understand its users specifically persons with a speech impairment. The vocal interface adapts to the speech of the user by learning the vocabulary from interaction examples. Word learning is implemented through weakly supervised non-negative matrix factorization (NMF). The goal of this study...
Effective search in structured information based on textual user input is of high importance in thousands of applications. Query expansion methods augment the original query of a user with alternative query elements with similar meaning to increase the chance of retrieving appropriate resources. In this work, we introduce a number of new query expansion features based on semantic and linguistic inferencing...
We developed an information community system by applying a user model-based application for supporting daily life. Our information community system is designed to provide appropriate services to users depending on their needs, thus, we applied a user model-based application, which can help select and filter user information, to our system for providing appropriate services to users. For achieving...
The authors investigated censorship practices and the use of microblogs—or weibos, in Chinese—using 111 million microblogs collected between 1 January and 30 June 2012. To better control for alternative explanations for censorship decisions attributable to an individual's characteristics and choices, they used a matched case-control study design to determine a list of Chinese...
Dynamic Time Warping (DTW), is a simple but efficient technique for matching sequences with rigid deformation. Therefore, it is frequently used for matching shapes in general, and shapes of handwritten words in Document Image Analysis tasks. As DTW is computationally expensive, efficient algorithms for fast computation are crucial. Retrieving images from large scale datasets using DTW, suffers from...
The Web 2.0 era is characterized by the emergence of a very large amount of live content. A real time and fine grained content filtering approach can precisely keep users up-to-date the information that they are interested. The key of the approach is to offer a scalable match algorithm. One might treat the content match as a special kind of content search, and resort to the classic algorithm [5]....
Supervised learning is a popular approach to text classification among the research community as well as within software development industry. It enables intelligent systems to solve various text analysis problems such as document organization, spam detection and report scoring. However, the extremely difficult and time intensive process of creating a training corpus makes it inapplicable to many...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.