The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Obtaining extractive summaries by using functions induced from a training set continue to be a great challenge in the domain of the automatic text summary. This paper presents the VENCE method based on this approach and improves the quality of the abduced functions, using semantic relations of the words (attributes) of the training set that are fetched from a ontology to be inserted in this set. The...
Writing a user story is essential to communicate with end users and developers. It is popular practices found in most agile methodologies. Therefore, to reuse the user stories from the previous successful projects becomes necessary. In this paper, we propose the business process ontology for defining user story. The ontology is a knowledge base designed to collect the user stories in term of N-triple...
The requirements for most software systems — the intended states-of-affairs these systems are supposed to bring about — concern their operational environment, often a socio-physical world. But software systems usually don't have any direct means to change that environment in order to bring about the intended states-of-affairs. In what sense then can we say that such systems fulfill their requirements?...
This paper describes a new heuristic approach letting an agent in a multi-agent system make a decision for selecting tasks to undertake. The proposed approach consists in giving the agent a profile including preferences and physical parameters, and a description of its beliefs about the environment. The decision engine allowing the agent to do a specific task is local to the agent and takes into account...
Computer network is a dynamic entity whose state changes with the introduction of new services, installation of new network operating system, and addition of new hardware component!!. creation of new user roles and by attacks from various actors instigated by aggressors. Unauthorized intrusion into a computer system or network is one of the most serious threats to computer security. Intrusion detection...
Large-scale multi-agent systems (LSMAS) development methods are becoming a necessity in a world of ever growing numbers of computer agents incorporated in various devices and services used by people in all areas of life. Organization in such large-scale systems, becomes therefore a very relevant concept in research on LSMAS, as the mentioned agents are expected to cooperate, compete, and share information,...
Students at the Tshwane University of Technology (TUT) may be potential victims of cyber-crime. Students need to know how to avoid being victims of cybercrime and may not know how to gain the knowledge. Electronic Safety (e-Safety) education and awareness can be accomplished through game based media such as educational video games. However, these games mostly focus on narrow aspects, such as anti-phishing,...
In recent days, web searching and security of the archives plays most incredible progress. The enduring research prototypes many web search show the result by searching the relevant data alone. Due to the mere relevancy search, the users may loss some useful data which are not included in the search result. Moreover, it also may consume more time by searching the data sequentially. To overcome these...
Text Summarization is the task of extracting salient information from the original text document. In this process, the extracted information is generated as a condensed report and presented as a concise summary to the user. It is very difficult for humans to understand and interpret the content of the text. In this paper, an exhaustive survey on abstractive text summarization methods has been presented...
Although the growing interest in the development of Computer Supported Collaborative Learning (CSCL) environments, major existing systems ignore the variety of learners and their socio-cultural differences, especially in the case of distant learning. Usually, only one and common system is provided to all users whatever their cultural backgrounds are. More than ever, it becomes challenging issue to...
The paper proposes a new scheme named as WPP (Web Page Personalization) for effective web page recommendations. WPP consist of page hit count, total time spent in every link, number of downloads and link separation. Based on these parameters the personalization has been proposed. The system proposes a new implicit user feedback and event link access schemes for effective web page customization along...
This paper presents the creation and implementation process of a series of smart quizzes (SQ) that is constructed especially for undergraduate students. In this paper the SQ consist of exercises concerning solids mechanics, which is an essential subject for engineering students. The construction of the SQ follows a conceptual map proposed by a specialist. The SQ are suggested to the students on topics...
Social media has been a new platform for emotion expression of individuals or groups in recent years. Millions of textual messages are constantly being generated. People with different emotion perceptions have different reactions to the same emotional event occurring in real life. However, it is hard to measure individual's emotion perception ability in both real world and social networks. This paper...
Text Generation is a challenging task in Natural Language Processing (NLP). Its purpose is to generate grammatically correct text from machine representation source such as a knowledge base. One of the most recent semantic representation is Rich Semantic Graph (RSG). It exploits not only the semantic representation techniques but also the Language structure and writing styles. Our work is a part of...
With the development of the information society and computer science, voice information service is extensively used, which needs the support of speech synthesis system. Multilingual speech synthesis system has become a hot research topic. The development state and the future prospect for computer speech synthesis system are introduced and discussed. Application samples of speech synthesis are enumerated...
Context: obtaining accurate information about the problem domain for which the software is being developed is one of most important and difficult activity of the Requirements Engineering (RE). One of the strategies to deal with problem domain concepts and their relationships is the usage of domain ontologies. However, there are not studies in the literature that describe which ontology-based approaches...
WordNet is the semantic word net, and played an important role in the field of natural language processing and information retrieval. It has also provided the basis for the building of national language word net in nations. Nowadays, most of the word net is using the same architecture as WordNet. The building of multilingual semantic net also reference to WordNet, or compatible with the WordNet. Therefore,...
The paper discusses the possibility of generation of a set of reusable educational components by means of paradigms of knowledge representation and management, based on contemporary concepts and tools in educational and informational technologies. Definitions of knowledge models such as ontology and characteristics of conception; model of knowledge specification and knowledge expressions by means...
As a kind of critical system, safety-critical system is always used for the key areas such as aerospace, national defense, transportation, nuclear energy, health and so on, which require the high security. Due to the inherent defects which caused by the complexity of the organizational structure, and the external threats which caused by the open and dynamic environment, some unexpected results will...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.