The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Present IoT services have been suggested as a specific thing-oriented service and they do not provide suitable IoT services on the space that ordinary users are living. Therefore, this paper proposes the user-centric thing environment service platform architecture that can provide the best appropriate services in the space which the user locates such as house, car and office. The user-centric thing...
Many web resources require an accurate representation of family relationships. However, available ontologies describing this kind of relationships provide only simple and rudimentary representations. In addition, the transition from one culture/language to another cannot be solved with simple translation solutions, specifically when concepts do not intersect in different cultures. In this paper, we...
We present an approach to create an Internet slang annotated dictionary to help identifying the level of specific attitudes and moods (specifically aggressiveness, distress, hatefulness and offensiveness) in social networks and social media posts. The annotation refers to the attitudes, with the actual meaning having a low importance. The annotated dictionary is intended for automatic use in the detection...
Contexts like Defense and Aerospace are steadily focused on high assurance solutions designed to protect their data. One of the most relevant and unresolved issue is the Multilevel Security problem. Information and Communications Technology systems have to exchange data, to be regularly patched and updated hence, they require a link to the Internet. Through this connection and through a compromised...
In view of word sense disambiguation shortcomings of the previous methods, they generally do not consider on word distance for computing semantic correlation of the influence of context, as well as the context is limited for ambiguous word sense disambiguation, and the use of part ambiguous context words make word senses more ambiguous. Therefore, this paper proposes the use of dependency parse tree...
Entity Linking (EL) search and labeling are important research topics with various web applications. The challenge is to find and link the important concepts from web text to online encyclopedia databases instead of simple personal and place names. This paper presents a new approach to link concrete concepts from English texts with Wiki entities. Using part-of-speech tagging to detect concrete concepts,...
Traditional Relation Extraction (RE) trains individual extractors for pre-defined relations. Open Relation Extraction (ORE) can eschew domain-specific training data, tackle an unbounded number of relations, and scale up to massive and heterogeneous corpus such as the web. However, It is difficult to process micro log texts: the genre is noisy, utterances are very short, and texts have little context...
Countries around the world have established different practices when designing, implementing and maintaining their identification systems to keep a registry of all their population. On analyzing the features of many of these systems, one can clearly recognize the unique personal identifier particularities in each setup. In this paper, we intend to reason about the design decisions related to the personal...
A central notion behind the field of cognitive infocommunications is that entangled sets of human and ICT capabilities, created through the co-evolution of humans together with ICT, can be conceptually represented and analyzed as new ‘cognitive entities’. This term, along with the concept of generation CE (in analogy with the generations X, Y and Z), has been recently introduced to characterize such...
Rapid technological development has affected teaching and teachers' work environment in higher education in many ways. Technology allows us to learn anytime, anywhere we want, but are the educators ready and what kind of skills they need to match the changing world. This paper aims to propose points to consider while planning support programs, internal training for higher education teachers in order...
The availability data sources is increasing thanks to the rise of interconnected devices with sensory capabilities. Their use, has also become predominant in tasks that are not directly related with the devices' primary function or for which they may not even be designed for. Taking in consideration the act of driving, this research shows how through a composition of theories and services with these...
In our previous work, our grouping mechanism based on edX online forum, which aims to help teachers form learning groups in SPOC context. We proposed the interaction as the main criterion and heterogeneous academic results as the supportive to do grouping. In the past experiment, we compared our method to student grouping by themselves, our method is better in learning performance but satisfactions...
Speech are widely used to express one's emotion, intention, desire, etc. in social network communication, deriving abundant of internet speech data with different speaking styles. Such data provides a good resource for social multimedia research. However, regarding different styles are mixed together in the internet speech data, how to classify such data remains a challenging problem. In previous...
Facets provide an efficient way to analyze and navigate the search result space. However, we believe facet selection has been guided by suboptimal facet and facet term properties. In this paper, we present features that rank facets based on their utility to partition the search result documents. Moreover, we propose a computationally inexpensive facet generation algorithm, provide a novel approach...
Video traffic, which represents an increasing fraction of the Internet traffic, requires end-to-end quality of service (QoS) guarantees for inter-domain routing. However, providing such guarantees remains a challenge essentially because it requires a strong and fair cooperation among the different network operators or Autonomous Systems (ASes), crossed by the traffic. Having a single AS on the path...
To evaluate how much a pair of entities or documents are similar is a common problem for current applications. Most approaches for this problem are based on the co-occurrence. However, different terms or words may represent the same entity or similar semantic in the real world since a concept often has more than one way of expression. Existing works always focus on computing semantic relatedness of...
Collaborative Learning (CL) along with the changing of the teaching environment, the way how students interact has also changed. The rise of Massive Open Online Courses (MOOCs) lets the teaching environment turn into online teaching. Deriving from MOOCs, Small Private Online Course (SPOC) incorporates the concept of Blended Learning (BL), which combines the advantage of MOOCs and face-to-face teaching...
Users' acceptance of a new information technology (IT) is a determining factor of its market success. A solid understanding of the users' adoption process and use behavior enables a more robust definition of user requirements and better market alignment. This is especially important in markets characterized by rapid technological change such as smartphones. The Technology Acceptance Model (TAM) is...
This paper is related to event-driven embedded systems whose function can be divided into the real-time (RT) and non-RT parts. Such a system must be designed so that all predetermined timing constraints are met at runtime, even in adverse conditions such as an excessive rate of events caused by interrupts. In other words, the RT part is expected not to fail because of its criticality. In the paper,...
Online social networks have long been studied by researchers to unearth the common patters of socializing among human beings. Recently, there is considerable interest in Internet-of-Things which is an interaction of smart physical objects augmented with sensing devices. However, there is hardly any research on intra-smart object interactions and interactions among smart physical objects and humans...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.