The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The advent of Unstructured Peer-to-Peer (P2P) networks enables large amounts of content to be distributed over Internet. However, billions of dollars are lost every year as a consequence of illegal file sharing or piracy. The main focus towards detecting this has been in educating the public about legal file sharing alternatives instead of developing systems and architectures that define protocols,...
Most of the research works in Information Extraction focus only on written language processing, in which a few are devoted to the study of Spoken Language Information Extraction. This paper discusses a novel technique for recognition of the isolated question words from Malayalam (one of the south Indian languages) speech query. We have created and analyzed a database consisting of 250 isolated question...
The paper shows how three different types of hierarchical queries involving qualitative preference and leading to totally ordered results, which have been recently considered in the setting of division operation, can be conveniently encoded in possibilistic logic. This enables such a handling of preference queries to be interfaced with a recently proposed approach for dealing with pieces of data associated...
SQL injection attacks occur due to vulnerabilities in the design of queries where a malicious user can take advantage of input opportunities to insert code in the queries that modify the query-conditions resulting in unauthorized database access. We provide a novel technique to identify the possibilities of such attacks. The central theme of our technique is based on automatically developing a model...
The need for interoperation and data exchange through the Internet has made Extensible Markup Language (XML) a dominant standard for data representation, while relational databases are widely used in enterprises to support critical business operations. XML querying language (XUpdate) is used to modify XML documents where as structured query language (SQL) for retrieving and manipulating data in relational...
The purpose for integration system is to provide a unified, global view to the user over various heterogeneous sources. To answer user queries, a data integration system employs a set of semantic mapping between and mediated schema(global schema) and schemas of data sources (local schema). Such data integration raises main challenging issue: (1) Scheme creations and (2) Schema mappings. In order to...
This paper proposes a NLIDBs system model and design framework based on Ontology. It uses WordNet as basic lexicon, and defines domain lexicon beyond that. This paper also defines relational database E-R model and domain business module by using OWL Ontology, which increases the accuracy of query sentences. Meanwhile, it's a highly reliable and portable approach to creating a WordNet-based natural...
Evaluating a boolean conjunctive query q over a guarded first-order theory T is equivalent to checking whether (T & not q) is unsatisfiable. This problem is relevant to the areas of database theory and description logic. Since q may not be guarded, well known results about the decidability, complexity, and finite-model property of the guarded fragment do not obviously carry over to conjunctive...
With the development of network technology, computer network is characterized as an uncontrollable, variable and unpredictable infrastructure, this brings great difficulty of verify, defining, debugging and comparing the new schemes. Network simulation technology is proposed to test, appraise, and verify means available. This paper designs and implements an intelligent analyzing tool for NS2 traces,...
In recent years, the free online encyclopaedia Wikipedia has become a standard resource to exploit to build knowledge base for various Natural Language Processing applications. In this paper, we exploit that resource to design a new query classification system. We explain and justify the steps we take to extract information from Wikipedia into a structured database, in order to demonstrate the validity...
A Public data platform uses the experience of enterprise information integration for reference. It can provide data integration interfaces for existing business information systems. The interfaces are used for data conversion. Beijing University of Civil Engineering and Architecture has developed more than a dozen information systems for all teachers and students. Through research of requirement analysis,...
Internet Automatic Sales System is be used to assist people in net business. Since part of the talking continent in purchasing is always asked frequently, so the statistic method like TFIDF is applied to deal this issue. Based on the experiment situation, baseline system based on TFIDF achieved very good effect. But the classic algorithm is not enough to reach real application requirement, the Dice...
Information Retrieval deals with the easy access to the information based on the user's request, which will be presented in the form of a query. A dialog system that understands spoken natural language queries asks for further information if necessary and produces an answer to the speaker's query. Most of the research works in Information Extraction focus only on written language processing, in which...
In this paper, we consider the situation where a fuzzy query is submitted to distributed data sources. In order to save bandwith and processing cost, we propose a technique whose aim is to forward the query to the most relevant sources only. It is assumed that a fuzzy summary of every data source is available, and the approach we propose consists in estimating the relevance of a source wrt to a user...
Advances in wireless communication and powerful computing technologies will eventually lead to a digital environment in which computing functionality will be embedded in all kinds of objects, which are capable of recognizing and responding to individual needs in a seamless, unobtrusive, and often invisible way. Such a vision was coined Ambient Intelligence (AmI), whose aim is to bring information...
Semantic web technology enables machine to read and process web pages without human intervene. However, today most of the contents in the web are stored in databases. In order to make full use of those data, many research efforts have been carried out on transformation of relational schema to semantic web, most of which disregard some constraints. This paper presents a set of mappings that transform...
The development of Internet calls urgently for the ability to deal with massive textually represented geographical knowledge. Digital Gazetteer Service (DGS) plays a foundational role in this process. To help users to check and confirm the proper places quickly and efficiently, one of the key points of DGS is to rank place names according to their satisfaction with query conditions set by users. Match...
In recent years, Caching technique (pull-based) in Mobile Ad hoc networks (MANETs) has become a promising technique in solving or mitigating the problems of performance, availability, scalability and resource paucity. MANETs consists of mobile nodes which communicate with each other through wireless medium without any fixed infrastructure. Mobile nodes may change rapidly and unpredictably over time...
Middleware for wireless sensor and actor network is hard to design because the leverage between the hardware limitation and system complexity. Complex event processing middleware for wireless sensor network is proposed to solve this dilemma. The system utilized the computing power of the network nodes to reduce the network communication data, so that it can save the nodes' energy. The events processing...
There are some strategies regarding SS7 network configuration for the users identification, for example using the local database or the zonal database infrastructure. This paper investigates the both assumptions and concludes that the initial condition can determine the final configuration as mixing solution for the global infrastructure. The four simulation scenarios were generated for a better understanding...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.