The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The revolutionary developments in the digital technologies have indicated a requirement for technology, that systematizes the huge images dataset for easy search and retrieval. This yields an essential demand for developing highly effective retrieval systems. Recently, wide-ranging research efforts have been made in the field of annotated images. However, image Annotation can tag by one term, which...
Plagiarism is becoming a serious problem for intellectual community. The detection of plagiarism at various levels is a major issue. The complexity of the problem increases when we are finding the plagiarism in the source codes that may be in the same language or they have been transformed into other languages. This type of plagiarism is found not only in the academic works but also in the industries...
This paper describes an early step in approaching implicit meaning computationally. It outlines various types of implicit meanings and then presents a method of finding the so called defaults - omissions that are universally reconstructable and, of course, interpretible without much additional reasoning. The defaults are analyzed on the example of the 1000 instances of TerminateLife events, and a...
The evolution of the Internet and the number of users require the establishment of more sophisticated and efficient systems that must keep track of the entourage. This development requires the establishment of fast and sharp and specialized IRS, to answer a very specific need. In response, these systems carry out several steps, including the enrichment or reformulation of queries. The enrichment of...
The goals of the modern Computer-assisted Instruction systems are ultimately achievable only through the application of artificial intelligence techniques to the implementation of teaching strategies. The author of the traditional Computer-assisted Instruction course must explicitly predict and program all possible paths through the lessons, including backward branches for review or remediation. The...
Proxy re-encryption (PRE) enables a semi-trustedproxy to transfer Alice's secrets into Bob's secrets but withoutseeing the secrets. This functionality is very interesting formaking balance between the information confidentiality and themutual accessibility in various scenarios such as public cloudstorage systems. During the past decades, many smart PREschemes were built based on intractability assumptions...
The emergence of social media platforms has provided voluminous amounts of opinionated data. As businesses look to understand and exploit these variegated means of online expression, it has become necessary to automate the process of detecting the panorama of underlying themes. A challenging task is to detect the gradual transitions of context that occur within a text. In this work, we introduce an...
Community question answering (CQA) is a popular online service for people to ask and answer questions. But along with the increasing of user generating contents, the quality of answers provided by different users varies widely. So the quality of the answer caused wide attention. In this paper, we propose an answer quality prediction model to evaluate the answer quality considering both aspects of...
Twitter is a source of sharing and communicate recent information, ensuing into huge size of records produces every day. Even though, a various applications of Natural Language Processing and Information Retrieval go through rigorously from an erroneous and tiny nature of tweets. We thought to implement a framework in support of segmentation of tweet by collection form, called as HybridSeg. During...
In this work, we propose to use the SSN ontology to manage the sensor information in an intelligent transportation architecture. The system performs the automatic traffic light settings allowing to predict and avoid traffic accidents and the routing optimization.
As a contribution to the specification and verification of critical software systems, this article presents a formal proposal for compositional verification, which uses model checking technique and integrates a modelling infrastructure that propitiates the target system decomposition into separate components aimed at being individually specified and verified. Our goal with this proposal is to provide...
Persons are often asked to provide information about themselves. These data are very heterogeneous and result in as many “profiles” as contexts. Sorting a large amount of profiles from different contexts and assigning them back to a specific individual is quite a difficult problem. Semantic processing and machine learning are key tools to achieve this goal. This paper describes a framework to address...
The day mankind met with smartphones, a new era started. Since then, daily mobile internet usage rates are increasing everyday and people have developed new habits like frequently sharing information (photo, video, location, etc.) on online social networks. Location Based Social Networks (LBSNs) are the platforms that empowers users to share place/location information with friends. As all other social...
There are three main classes of modifiers that can affect the polarity of the sentiments described in natural language texts: negations, intensifiers and diminishers. In this paper, we concentrate on the study of these particular words which have a very important semantic role in any natural language description. Our study is applied on a real data set extracted from the popular Romanian Web site...
The meat of the paper is a small innovation in Ontological Semantic Technology describing how to calculate weights in text meaning representations. It is reset here as a component of a complex and apparently unprecedented global logic of natural language, a topic that was abortively entertained in the 1960–70s and since then mostly abandoned.
Due to huge amount of information which is generated on online social networks every day, how to organize their personal social networks to cope with the overwhelming information effectively has become a difficult problem. In this paper, a new modified method based on Clique Percolation Method (CPM) algorithm is proposed to be used to discover users' social circles automatically, in which, there are...
Nowadays, the data centric system has been playing an increasingly important role in blogs sharing, content delivery and news broadcasting, file-synchronization, and so on. Due to generated amount of data within the system, data backup and archiving has become a main challenging task. A main methods to solve the problem is Chunking based deduplication by eliminating redundant data and reducing the...
An algorithm for a n-link manipulator movement amidst arbitrary unknown static obstacles is presented. Given a theorem stating that if the manipulator moves according to the algorithm it will discover in a finite number of steps whether a given target configuration is reachable or not. The number, shapes and dispositions of obstacles may be arbitrary.
In this paper we address the topic of generating automatically accurate, meaning preserving and syntactically correct paraphrases of natural language sentences. The design of methods and tools for paraphrasing natural language text is a core task of natural language processing and is quite useful in many applications and procedures. We present a methodology and a tool developed that performs deep...
By analyzing the binary executable files comparing technique, this paper presents a method to detect vulnerabilities in Windows system based on security patch comparison. The technology is mostly used for detecting vulnerabilities which are patched by Microsoft but there is no clear location and detailed information of the vulnerabilities. Finally, the result of detecting MS15-034 vulnerability experiment...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.