Published: Jun 22, 2022
Converted to Gold OA:
DOI: 10.4018/IJSWIS.295550
Volume 18
Akilandeswari J., Jothi G., Dhanasekaran K., Kousalya K., Sathiyamoorthi V.
Social media especially Twitter has become ubiquitous among people where they express their opinions on various domains. This paper presents a Hybrid Firefly – Ontology-based Clustering (FF-OC)...
Show More
Social media especially Twitter has become ubiquitous among people where they express their opinions on various domains. This paper presents a Hybrid Firefly – Ontology-based Clustering (FF-OC) algorithm which attempts to extract factors impacting a major public issue that is trending. In this research work, the issue of food price rise and disease which was trending during the time of the investigation is considered. The novelty of the algorithm lies in the fact that it clusters the association rules without any prior knowledge. The findings from the experimentation suggest different factors impacting the rise of price in food items and diseases such as diabetes, flu, zika virus. The empirical results show the significant improvement when compared with Artificial Bees Colony, Cuckoo Search Algorithm, Particle Swarm Optimization, and Ant Colony Optimization based clustering algorithms. The proposed method gives an improvement of 81% in terms of DB index, 79% in terms of silhouette index, 85% in terms of C index when compared to other algorithms.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Akilandeswari J., et al. "Hybrid Firefly-Ontology-Based Clustering Algorithm for Analyzing Tweets to Extract Causal Factors." IJSWIS vol.18, no.1 2022: pp.1-27. http://doi.org/10.4018/IJSWIS.295550
APA
Akilandeswari J., Jothi G., Dhanasekaran K., Kousalya K., & Sathiyamoorthi V. (2022). Hybrid Firefly-Ontology-Based Clustering Algorithm for Analyzing Tweets to Extract Causal Factors. International Journal on Semantic Web and Information Systems (IJSWIS), 18(1), 1-27. http://doi.org/10.4018/IJSWIS.295550
Chicago
Akilandeswari J., et al. "Hybrid Firefly-Ontology-Based Clustering Algorithm for Analyzing Tweets to Extract Causal Factors," International Journal on Semantic Web and Information Systems (IJSWIS) 18, no.1: 1-27. http://doi.org/10.4018/IJSWIS.295550
Export Reference
Published: Aug 9, 2022
Converted to Gold OA:
DOI: 10.4018/IJSWIS.295946
Volume 18
Xiaofang Zhong, Yi Wang, Xiao Wen, Jianwei Liao
This paper presents an ontology-based approach to benefit automatic fertilization management for citrus orchards located in mountainous region. The core of the fertilization approach is the citrus...
Show More
This paper presents an ontology-based approach to benefit automatic fertilization management for citrus orchards located in mountainous region. The core of the fertilization approach is the citrus fertilization ontology, which covers knowledge about citrus fertilizers and fertilization application. Specially, our approach can provide not only the yearly fertilization quantities of required pure nitrogen, phosphorus, and potassium according to their disease symptoms, but also the suitable fertilizing recommendations for the citrus orchards with different soil properties. The current version of the ontology (ver. 2.9.10) contains 103 classes, 34 properties, 800 instances, which are defined by 3056 RDF triples and is evaluated by using 90 competency questions. Furthermore, we run experiments with our proposal targeting at four citrus orchards in Chongqing, and compare its outputs with the reference values advised by the agri-professionals of citrus planting.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Zhong, Xiaofang, et al. "An Ontology-Based Automation System: A Case Study of Citrus Fertilization." IJSWIS vol.18, no.1 2022: pp.1-22. http://doi.org/10.4018/IJSWIS.295946
APA
Zhong, X., Wang, Y., Wen, X., & Liao, J. (2022). An Ontology-Based Automation System: A Case Study of Citrus Fertilization. International Journal on Semantic Web and Information Systems (IJSWIS), 18(1), 1-22. http://doi.org/10.4018/IJSWIS.295946
Chicago
Zhong, Xiaofang, et al. "An Ontology-Based Automation System: A Case Study of Citrus Fertilization," International Journal on Semantic Web and Information Systems (IJSWIS) 18, no.1: 1-22. http://doi.org/10.4018/IJSWIS.295946
Export Reference
Published: Aug 26, 2022
Converted to Gold OA:
DOI: 10.4018/IJSWIS.297033
Volume 18
Jinghui Chu, Xiaoqian Zhao, Dan Song, Wenhui Li, Shenyuan Zhang, Xuanya Li, An-An Liu
Under the heavy management on the increasing 3D models, the topic of image-based 3D model retrieval which organizes unlabeled 3D models based on abundant knowledge learned from labeled 2D images has...
Show More
Under the heavy management on the increasing 3D models, the topic of image-based 3D model retrieval which organizes unlabeled 3D models based on abundant knowledge learned from labeled 2D images has drawn attention. However, prior methods are limited in aligning semantically at corresponding categories of two domains due to the lack of label information in the 3D domain. To this end, this paper proposes an improved semantic representation learning by multiple clustering approach, which improves the reliability of pseudo labels for 3D models, so as to achieve class-level semantic alignment. Specifically, this paper first extracts features for 2D images and 3D models. Then it clusters combining the 3D features with the semantic information from multiple clustering on 3D model features to obtain more reliable target pseudo labels. Extensive experiments have shown that the proposed method has achieved the gain of 3.0%-205.0% averagely for popular retrieval metrics on the benchmark of monocular image-based 3D object retrieval (MI3DOR), and 1.3%-69.7% on another advanced benchmark, MI3DOR-2.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Chu, Jinghui, et al. "Improved Semantic Representation Learning by Multiple Clustering for Image-Based 3D Model Retrieval." IJSWIS vol.18, no.1 2022: pp.1-20. http://doi.org/10.4018/IJSWIS.297033
APA
Chu, J., Zhao, X., Song, D., Li, W., Zhang, S., Li, X., & Liu, A. (2022). Improved Semantic Representation Learning by Multiple Clustering for Image-Based 3D Model Retrieval. International Journal on Semantic Web and Information Systems (IJSWIS), 18(1), 1-20. http://doi.org/10.4018/IJSWIS.297033
Chicago
Chu, Jinghui, et al. "Improved Semantic Representation Learning by Multiple Clustering for Image-Based 3D Model Retrieval," International Journal on Semantic Web and Information Systems (IJSWIS) 18, no.1: 1-20. http://doi.org/10.4018/IJSWIS.297033
Export Reference
Published: Jul 8, 2022
Converted to Gold OA:
DOI: 10.4018/IJSWIS.297034
Volume 18
Satish Chander, P. Vijaya, Praveen Dhyani
This work introduces a parallel clustering algorithm by modifying the existing Fractional Lion Algorithm (FLA). The proposed work replaces the conventional Euclidean distance measure with the...
Show More
This work introduces a parallel clustering algorithm by modifying the existing Fractional Lion Algorithm (FLA). The proposed work replaces the conventional Euclidean distance measure with the Bhattacharya distance measure to newly propose the improved FLA (IMR-FLA). The proposed IMR-FLA is implemented in both the mapper and the reducer in the MapReduce framework to achieve the parallel clustering. The experimentation of the proposed IMR-FLA is done by using six standard databases, namely Pima Indian diabetes dataset, Heart disease dataset, Hepatitis dataset, localization dataset, breast cancer dataset, and skin segmentation dataset, from the UCI repository. The proposed IMR-FLA has the overall improved Jaccard coefficient value of 0.9357, 0.6572, 0.7462, 0.5944, 0.9418, and 0.8680, for each dataset. Similarly, the proposed IMR-FLA algorithm has outclassed other classifiers' performance with the clustering accuracy value of 0.9674, 0.9471, 0.9677, 0.777, 0.9023, and 0.9585, respectively, for the experimental databases.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Chander, Satish, et al. "A Parallel Fractional Lion Algorithm for Data Clustering Based on MapReduce Cluster Framework." IJSWIS vol.18, no.1 2022: pp.1-25. http://doi.org/10.4018/IJSWIS.297034
APA
Chander, S., Vijaya, P., & Dhyani, P. (2022). A Parallel Fractional Lion Algorithm for Data Clustering Based on MapReduce Cluster Framework. International Journal on Semantic Web and Information Systems (IJSWIS), 18(1), 1-25. http://doi.org/10.4018/IJSWIS.297034
Chicago
Chander, Satish, P. Vijaya, and Praveen Dhyani. "A Parallel Fractional Lion Algorithm for Data Clustering Based on MapReduce Cluster Framework," International Journal on Semantic Web and Information Systems (IJSWIS) 18, no.1: 1-25. http://doi.org/10.4018/IJSWIS.297034
Export Reference
Published: Jul 21, 2022
Converted to Gold OA:
DOI: 10.4018/IJSWIS.297040
Volume 18
Diksha Malhotra, Poonam Saini, Awadhesh Kumar Singh
The current XAI techniques present explanations mainly as visuals and structured data. However, these explanations are difficult to interpret for a non-expert user. Here, the use of natural language...
Show More
The current XAI techniques present explanations mainly as visuals and structured data. However, these explanations are difficult to interpret for a non-expert user. Here, the use of natural language generation (NLG)-based techniques can help to represent explanations in a human-understandable format. The paper addresses the issue of automatic generation of narratives using a modified transformer approach. Further, due to the unavailability of a relevant annotated dataset for development and testing, the authors also propose a verbalization template approach to generate the same. The input of the transformer is linearized to convert the data-to-text task into text-to-text task. The proposed work is evaluated on a verbalized explained PIMA Indians diabetes dataset and exhibits significant improvement as compared to existing baselines for both manual and automatic evaluation. Also, the narratives provide better comprehensibility to be trusted by human evaluators than the non-NLG counterparts. Lastly, an ablation study is performed in order to understand the contribution of each component.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Malhotra, Diksha, et al. "Modified Transformer Architecture to Explain Black Box Models in Narrative Form." IJSWIS vol.18, no.1 2022: pp.1-19. http://doi.org/10.4018/IJSWIS.297040
APA
Malhotra, D., Saini, P., & Singh, A. K. (2022). Modified Transformer Architecture to Explain Black Box Models in Narrative Form. International Journal on Semantic Web and Information Systems (IJSWIS), 18(1), 1-19. http://doi.org/10.4018/IJSWIS.297040
Chicago
Malhotra, Diksha, Poonam Saini, and Awadhesh Kumar Singh. "Modified Transformer Architecture to Explain Black Box Models in Narrative Form," International Journal on Semantic Web and Information Systems (IJSWIS) 18, no.1: 1-19. http://doi.org/10.4018/IJSWIS.297040
Export Reference
Published: Aug 9, 2022
Converted to Gold OA:
DOI: 10.4018/IJSWIS.297041
Volume 18
Hind Alsharif, Wadee Alhalabi, Abdulhameed Fouad Alkhateeb, Salah Shihata, Khalid Bajunaid, Salwa Abdullah AlMansouri, Mirza Pasovic, Richard Satava, Abdulrahman J. Sabbagh
This paper aims to assess the needs of neurosurgical training in order to strategize the future plans for simulation and rehearsal. The main objective is to investigate the ability of virtual...
Show More
This paper aims to assess the needs of neurosurgical training in order to strategize the future plans for simulation and rehearsal. The main objective is to investigate the ability of virtual reality to enhance the training. An online questionnaire has been conducted among surgeons practicing in different countries across the globe. The study shows significant differences in rehearsal methods and surgical teaching methods practiced by the respondents. Among respondents, 90% did believe that virtual reality technology can serve surgical training, and almost all respondents agreed that there is a gap in the existing neurosurgical training in terms of operating room ergonomics. Adequate education on surgical ergonomics might lead to an improvement in the outcomes for both surgeon and patient. The contribution of the paper is twofold. One side investigates the new requirements for the enhancement of neurosurgeon training and adoption on a virtual reality simulator. The other side contributes to the body of knowledge related to the required ergonomics skills.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Alsharif, Hind, et al. "Virtual Reality Simulator Enhances Ergonomics Skills for Neurosurgeons." IJSWIS vol.18, no.1 2022: pp.1-20. http://doi.org/10.4018/IJSWIS.297041
APA
Alsharif, H., Alhalabi, W., Alkhateeb, A. F., Shihata, S., Bajunaid, K., AlMansouri, S. A., Pasovic, M., Satava, R., & Sabbagh, A. J. (2022). Virtual Reality Simulator Enhances Ergonomics Skills for Neurosurgeons. International Journal on Semantic Web and Information Systems (IJSWIS), 18(1), 1-20. http://doi.org/10.4018/IJSWIS.297041
Chicago
Alsharif, Hind, et al. "Virtual Reality Simulator Enhances Ergonomics Skills for Neurosurgeons," International Journal on Semantic Web and Information Systems (IJSWIS) 18, no.1: 1-20. http://doi.org/10.4018/IJSWIS.297041
Export Reference
Published: Jun 15, 2022
Converted to Gold OA:
DOI: 10.4018/IJSWIS.297142
Volume 18
Ashok Kumar C., Sivakumar P.
This paper introduces an approach for the VM migration based on optimization algorithm, named CS in cloud. The provider to be selected is carried out with the usage of multiple constraints, like...
Show More
This paper introduces an approach for the VM migration based on optimization algorithm, named CS in cloud. The provider to be selected is carried out with the usage of multiple constraints, like delay, bandwidth, cost, and load. Subsequently, the effective searching criteria are computed for finding the optimal service on the basis of fitness constraints. The searching criteria are formulated as optimization problems, which are tackled using CS. The proposed CS is designed by integrating CSO with the SSA such that the fitness function is evaluated for the optimal VM migration by considering several parameters, such as delay, cost, bandwidth, and load. Thus, the cloud manager will perform the migration of VM in cloud based on proposed CS-based VM migration approach. The performance of the CS-based VM migration is evaluated in terms of delay, cost, and load. The proposed CS-based VM migration method achieves the minimal delay of 0.146, minimal cost of 0.052, and the minimal load of 0.182.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
C., Ashok Kumar, and Sivakumar P. "Cat-Squirrel Optimization Algorithm for VM Migration in a Cloud Computing Platform." IJSWIS vol.18, no.1 2022: pp.1-23. http://doi.org/10.4018/IJSWIS.297142
APA
C., A. K. & P., S. (2022). Cat-Squirrel Optimization Algorithm for VM Migration in a Cloud Computing Platform. International Journal on Semantic Web and Information Systems (IJSWIS), 18(1), 1-23. http://doi.org/10.4018/IJSWIS.297142
Chicago
C., Ashok Kumar, and Sivakumar P. "Cat-Squirrel Optimization Algorithm for VM Migration in a Cloud Computing Platform," International Journal on Semantic Web and Information Systems (IJSWIS) 18, no.1: 1-23. http://doi.org/10.4018/IJSWIS.297142
Export Reference
Published: Jul 15, 2022
Converted to Gold OA:
DOI: 10.4018/IJSWIS.299858
Volume 18
Zahoor Ahmed, Muhammad Ayaz, Mohammed A. Hijji, Muhammad Zahid Abbas, Aneel Rahim
The research on underwater wireless sensor networks (UWSNs) has grown considerably in recent years where the main focus remains to develop a reliable communication protocol to overcome its...
Show More
The research on underwater wireless sensor networks (UWSNs) has grown considerably in recent years where the main focus remains to develop a reliable communication protocol to overcome its challenges between various underwater sensing devices. The main purpose of UWSNs is to provide a low cost and an unmanned data collection system for a range of applications such as offshore exploration, pollution monitoring, oil and gas pipeline monitoring, surveillance, etc. One of the common types of UWSNs is linear sensor network (LSN), which speciall targets monitoring the underwater oil and gas pipelines. Under this application, in most of the previously proposed works, networks are deployed without considering the heterogeneity and capacity of the various sensor nodes. This negligence leads to the problem of inefficient data delivery from the sensor nodes deployed on the pipeline to the surface sinks. In addition, the existing path planning algorithms do not consider the network coverage of heterogeneous sensor nodes.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Ahmed, Zahoor, et al. "AUV-Based Efficient Data Collection Scheme for Underwater Linear Sensor Networks." IJSWIS vol.18, no.1 2022: pp.1-19. http://doi.org/10.4018/IJSWIS.299858
APA
Ahmed, Z., Ayaz, M., Hijji, M. A., Abbas, M. Z., & Rahim, A. (2022). AUV-Based Efficient Data Collection Scheme for Underwater Linear Sensor Networks. International Journal on Semantic Web and Information Systems (IJSWIS), 18(1), 1-19. http://doi.org/10.4018/IJSWIS.299858
Chicago
Ahmed, Zahoor, et al. "AUV-Based Efficient Data Collection Scheme for Underwater Linear Sensor Networks," International Journal on Semantic Web and Information Systems (IJSWIS) 18, no.1: 1-19. http://doi.org/10.4018/IJSWIS.299858
Export Reference
Published: Jun 10, 2022
Converted to Gold OA:
DOI: 10.4018/IJSWIS.300819
Volume 18
Mona Alduailij, Wadee Alhalabi, Mai Alduaili, Amal Al-Rashee, Eatedal Alabdulkareem, Seham Saad Alharb
Obesity is one of the most pressing issues in society today. Virtual reality has been used in the design of tools that promotes obesity control. However, the design of current VR tools lacks the...
Show More
Obesity is one of the most pressing issues in society today. Virtual reality has been used in the design of tools that promotes obesity control. However, the design of current VR tools lacks the involvement of prospective users and health practitioners. Such engagement is crucial in gathering semantic information that identifies stakeholders’ needs and ensures that all aspects of health are considered. Therefore, this paper aims to study the sociodemographic factors and individual-level characteristics and preferences that make the design of any obesity-control VR tool effective and satisfactory for a wide range of users. The paper also aims to solicit opinions of health practitioners to identify best health aspects that should be available in the design of any VR tool for obesity control. Organizations, businesses, and people will be able to readily augment such VR technologies on the semantic web, as well as on personal and mobile devices.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Alduailij, Mona, et al. "Analyzing the Sociodemographic Factors Impacting the Use of Virtual Reality for Controlling Obesity." IJSWIS vol.18, no.1 2022: pp.1-38. http://doi.org/10.4018/IJSWIS.300819
APA
Alduailij, M., Alhalabi, W., Alduaili, M., Al-Rashee, A., Alabdulkareem, E., & Alharb, S. S. (2022). Analyzing the Sociodemographic Factors Impacting the Use of Virtual Reality for Controlling Obesity. International Journal on Semantic Web and Information Systems (IJSWIS), 18(1), 1-38. http://doi.org/10.4018/IJSWIS.300819
Chicago
Alduailij, Mona, et al. "Analyzing the Sociodemographic Factors Impacting the Use of Virtual Reality for Controlling Obesity," International Journal on Semantic Web and Information Systems (IJSWIS) 18, no.1: 1-38. http://doi.org/10.4018/IJSWIS.300819
Export Reference
Published: Jun 3, 2022
Converted to Gold OA:
DOI: 10.4018/IJSWIS.300820
Volume 18
Sven Carsten Rasmusen, Manuel Penz, Stephanie Widauer, Petraq Nako, Anelia Kurteva, Antonio Roa-Valverde, Anna Fensel
Consent is one of GDPR’s lawful bases for data processing and specific requirements for it apply. Consent should be specific, unambiguous and most of all informed. However, an informed consent...
Show More
Consent is one of GDPR’s lawful bases for data processing and specific requirements for it apply. Consent should be specific, unambiguous and most of all informed. However, an informed consent request does not guarantee having individuals who are aware of what it means to consent and the implications that follow. Consent is often given blindly now, in particular because of information overload from long privacy policies written in legal language and complex interface designs that cause consent fatigue on the users' side. This paper presents a knowledge graph-based user interface for consent solicitation, which uses gamification to raise the legal awareness and ease individual’s comprehension of consent. The knowledge graph models informed consent in a machine-readable format and provides a unified consent model to all entities involved in the data sharing process. The evaluation shows that with the help of gamification, the interface can raise individuals' average legal awareness to 92.86%.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Rasmusen, Sven Carsten, et al. "Raising Consent Awareness With Gamification and Knowledge Graphs: An Automotive Use Case." IJSWIS vol.18, no.1 2022: pp.1-21. http://doi.org/10.4018/IJSWIS.300820
APA
Rasmusen, S. C., Penz, M., Widauer, S., Nako, P., Kurteva, A., Roa-Valverde, A., & Fensel, A. (2022). Raising Consent Awareness With Gamification and Knowledge Graphs: An Automotive Use Case. International Journal on Semantic Web and Information Systems (IJSWIS), 18(1), 1-21. http://doi.org/10.4018/IJSWIS.300820
Chicago
Rasmusen, Sven Carsten, et al. "Raising Consent Awareness With Gamification and Knowledge Graphs: An Automotive Use Case," International Journal on Semantic Web and Information Systems (IJSWIS) 18, no.1: 1-21. http://doi.org/10.4018/IJSWIS.300820
Export Reference
Published: Sep 2, 2022
Converted to Gold OA:
DOI: 10.4018/IJSWIS.300824
Volume 18
Meghana Gopal Raj, Santosh Kumar Pani
This paper solves the internet of things (IoT) security issues by introducing a chaotic whale crow (CWC) optimization, which is the integration of chaotic whale optimization algorithm (CWOA) in crow...
Show More
This paper solves the internet of things (IoT) security issues by introducing a chaotic whale crow (CWC) optimization, which is the integration of chaotic whale optimization algorithm (CWOA) in crow search algorithm (CSA). The framework operates on two crucial aspects: one is to select the secure nodes, and the other is to implement secure routing using the selected trusted nodes. First, the selection of trusted nodes is performed based on trust factors like direct, indirect, forwarding rate, integrity, and availability factors. Then, the selected trusted nodes are adapted for trust-based secure routing, which is optimally performed using the proposed CWC, based on the fitness parameters trust and energy. Finally, the proposed CWC is evaluated, which revealed high performance with a minimal delay of 191.46ms, which shows 14.87%, 7.35%, 6.82%, 4.19%, and 5.74% improved performance compared to existing LaSeR, PM Ipv6, secTrust-RPL RISA, and LSDAR techniques. Similarly, the proposed method obtained the maximal energy of 71.25J and maximal throughput of 129.77kbps.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Raj, Meghana Gopal, and Santosh Kumar Pani. "Chaotic Whale Crow Optimization Algorithm for Secure Routing in the IoT Environment." IJSWIS vol.18, no.1 2022: pp.1-25. http://doi.org/10.4018/IJSWIS.300824
APA
Raj, M. G. & Pani, S. K. (2022). Chaotic Whale Crow Optimization Algorithm for Secure Routing in the IoT Environment. International Journal on Semantic Web and Information Systems (IJSWIS), 18(1), 1-25. http://doi.org/10.4018/IJSWIS.300824
Chicago
Raj, Meghana Gopal, and Santosh Kumar Pani. "Chaotic Whale Crow Optimization Algorithm for Secure Routing in the IoT Environment," International Journal on Semantic Web and Information Systems (IJSWIS) 18, no.1: 1-25. http://doi.org/10.4018/IJSWIS.300824
Export Reference
Published: Aug 26, 2022
Converted to Gold OA:
DOI: 10.4018/IJSWIS.300825
Volume 18
Sengodan Mani, Samukutty Annadurai
An increasing number of ontologies demand the interoperability between them in order to gain accurate information. The ontology heterogeneity also makes the interoperability process even more...
Show More
An increasing number of ontologies demand the interoperability between them in order to gain accurate information. The ontology heterogeneity also makes the interoperability process even more difficult. The existing ontology matching systems are mainly focusing on subject derivatives of the concern domain. Since ontologies are represented as data models in a structured format, in this paper, a new modified model of similarity spreading for ontology mapping is proposed. In this approach, the mapping mainly involves with node clustering based on edge affinity, and then the graph matching is achieved by applying coefficient similarity propagation. This process is carried out by iterative manner, and at the end, the similarity score is calculated for iteration. This model is evaluated in terms of precision, recall, and f-measure parameters, and it is found that it outperforms similar systems.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Mani, Sengodan, and Samukutty Annadurai. "An Improved Structural-Based Ontology Matching Approach Using Similarity Spreading." IJSWIS vol.18, no.1 2022: pp.1-17. http://doi.org/10.4018/IJSWIS.300825
APA
Mani, S. & Annadurai, S. (2022). An Improved Structural-Based Ontology Matching Approach Using Similarity Spreading. International Journal on Semantic Web and Information Systems (IJSWIS), 18(1), 1-17. http://doi.org/10.4018/IJSWIS.300825
Chicago
Mani, Sengodan, and Samukutty Annadurai. "An Improved Structural-Based Ontology Matching Approach Using Similarity Spreading," International Journal on Semantic Web and Information Systems (IJSWIS) 18, no.1: 1-17. http://doi.org/10.4018/IJSWIS.300825
Export Reference
Published: Sep 2, 2022
Converted to Gold OA:
DOI: 10.4018/IJSWIS.300826
Volume 18
Daoqu Geng, Haiyang Li, Chang Liu
The application of semantic web technologies such as semantic inference to the field of the internet of things (IoT) can realize data semantic information enhancement and semantic knowledge...
Show More
The application of semantic web technologies such as semantic inference to the field of the internet of things (IoT) can realize data semantic information enhancement and semantic knowledge discovery, which plays a key role in enhancing data value and application intelligence. However, mainstream semantic inference engines cannot be applied to IoT computing devices with limited storage resources and weak computing power and cannot reason about uncertain knowledge. To solve this problem, the authors propose a lightweight semantic inference engine, Tiny-UKSIE, based on the RETE algorithm. The genetic algorithm (GA) is adopted to optimize the Alpha network sequence, and the inference time can be reduced by 8.73% before and after optimization. Moreover, a four-tuple knowledge representation method with probability factors is proposed, and probabilistic inference rules are constructed to enable the inference engine to infer uncertain knowledge. Compared with mainstream inference engines, storage resource usage is reduced by up to 97.37%, and inference time is reduced by up to 24.55%.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Geng, Daoqu, et al. "Tiny-UKSIE: An Optimized Lightweight Semantic Inference Engine for Reasoning Uncertain Knowledge." IJSWIS vol.18, no.1 2022: pp.1-23. http://doi.org/10.4018/IJSWIS.300826
APA
Geng, D., Li, H., & Liu, C. (2022). Tiny-UKSIE: An Optimized Lightweight Semantic Inference Engine for Reasoning Uncertain Knowledge. International Journal on Semantic Web and Information Systems (IJSWIS), 18(1), 1-23. http://doi.org/10.4018/IJSWIS.300826
Chicago
Geng, Daoqu, Haiyang Li, and Chang Liu. "Tiny-UKSIE: An Optimized Lightweight Semantic Inference Engine for Reasoning Uncertain Knowledge," International Journal on Semantic Web and Information Systems (IJSWIS) 18, no.1: 1-23. http://doi.org/10.4018/IJSWIS.300826
Export Reference
Published: Sep 2, 2022
Converted to Gold OA:
DOI: 10.4018/IJSWIS.300827
Volume 18
Nitesh Narayan, Rishi Kumar Jha, Anshuman Singh
These days the online social network has become a huge source of data. People are actively sharing information on these platforms. The data on online social networks can be misinformation...
Show More
These days the online social network has become a huge source of data. People are actively sharing information on these platforms. The data on online social networks can be misinformation, information, and disinformation. Because online social networks have become an important part of our lives, the information on online social networks makes a great impact on us. Here a differential epidemic model for information, misinformation, and disinformation on online social networks is proposed. The expression for basic reproduction number has been developed. Again, the stability condition for the system at both infection-free and endemic equilibriums points has been discussed. The numerical simulation has been performed to validate the theoretical results. Data available on Twitter related to COVID-19 vaccination is used to perform the experiment. Finally, the authors discuss the control strategy to minimize the misinformation and disinformation related to vaccination.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Narayan, Nitesh, et al. "A Differential Epidemic Model for Information, Misinformation, and Disinformation in Online Social Networks: COVID-19 Vaccination." IJSWIS vol.18, no.1 2022: pp.1-20. http://doi.org/10.4018/IJSWIS.300827
APA
Narayan, N., Jha, R. K., & Singh, A. (2022). A Differential Epidemic Model for Information, Misinformation, and Disinformation in Online Social Networks: COVID-19 Vaccination. International Journal on Semantic Web and Information Systems (IJSWIS), 18(1), 1-20. http://doi.org/10.4018/IJSWIS.300827
Chicago
Narayan, Nitesh, Rishi Kumar Jha, and Anshuman Singh. "A Differential Epidemic Model for Information, Misinformation, and Disinformation in Online Social Networks: COVID-19 Vaccination," International Journal on Semantic Web and Information Systems (IJSWIS) 18, no.1: 1-20. http://doi.org/10.4018/IJSWIS.300827
Export Reference
Published: May 6, 2022
Converted to Gold OA:
DOI: 10.4018/IJSWIS.302895
Volume 18
Bin Hu, Akshat Gaurav, Chang Choi, Ammar Almomani
Educators have been calling for reform for a decade. Recent technical breakthroughs have led to various improvements in the semantic web-based education system. After last year's COVID-19 outbreak...
Show More
Educators have been calling for reform for a decade. Recent technical breakthroughs have led to various improvements in the semantic web-based education system. After last year's COVID-19 outbreak, development quickened. Many countries and educational systems now concentrate on providing students with online education, which differs greatly from traditional classroom education. Online education allows students to learn at their own pace and the system. As a consequence, we may say that education has become more dynamic. In the educational system, this changing nature makes user demands difficult to identify. Many instructors suggest using machine learning, artificial intelligence, or ontology to improve traditional teaching methods. Due to the lack of survey studies examining and comparing all of the researcher's semantic web-based teaching methodologies, we decided to conduct this survey. This paper's goal is to analyse all available possibilities for semantic web-based education systems that enable new researchers to develop their knowledge.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Hu, Bin, et al. "Evaluation and Comparative Analysis of Semantic Web-Based Strategies for Enhancing Educational System Development." IJSWIS vol.18, no.1 2022: pp.1-14. http://doi.org/10.4018/IJSWIS.302895
APA
Hu, B., Gaurav, A., Choi, C., & Almomani, A. (2022). Evaluation and Comparative Analysis of Semantic Web-Based Strategies for Enhancing Educational System Development. International Journal on Semantic Web and Information Systems (IJSWIS), 18(1), 1-14. http://doi.org/10.4018/IJSWIS.302895
Chicago
Hu, Bin, et al. "Evaluation and Comparative Analysis of Semantic Web-Based Strategies for Enhancing Educational System Development," International Journal on Semantic Web and Information Systems (IJSWIS) 18, no.1: 1-14. http://doi.org/10.4018/IJSWIS.302895
Export Reference
Published: Jun 24, 2022
Converted to Gold OA:
DOI: 10.4018/IJSWIS.305802
Volume 18
Justin Piper, James A. Rodger
We employ the concept of word sense disambiguation to determine the inherent meaning of voter intentions regarding possible political candidates from the 2016 Presidential election. We present our...
Show More
We employ the concept of word sense disambiguation to determine the inherent meaning of voter intentions regarding possible political candidates from the 2016 Presidential election. We present our findings based on a website (www.presidentselect.com) that we developed, where candidates can be examined and their true assets and competencies in three major areas of eligibility, education, and experience inputs can be deciphered. Data envelope analysis is used to determine underlying word instances for elected and successful outputs. We also utilize our web site results to longitudinally extend these findings for decision making of potential election fraud detection in the 2020 Presidential election, utilizing Benford’s Law. Our results shed light on these phenomenon and provide new insights into the word sense disambiguation literature.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Piper, Justin, and James A. Rodger. "Longitudinal Study of a Website for Assessing American Presidential Candidates and Decision Making of Potential Election Irregularities Detection." IJSWIS vol.18, no.1 2022: pp.1-20. http://doi.org/10.4018/IJSWIS.305802
APA
Piper, J. & Rodger, J. A. (2022). Longitudinal Study of a Website for Assessing American Presidential Candidates and Decision Making of Potential Election Irregularities Detection. International Journal on Semantic Web and Information Systems (IJSWIS), 18(1), 1-20. http://doi.org/10.4018/IJSWIS.305802
Chicago
Piper, Justin, and James A. Rodger. "Longitudinal Study of a Website for Assessing American Presidential Candidates and Decision Making of Potential Election Irregularities Detection," International Journal on Semantic Web and Information Systems (IJSWIS) 18, no.1: 1-20. http://doi.org/10.4018/IJSWIS.305802
Export Reference
Published: Sep 9, 2022
Converted to Gold OA:
DOI: 10.4018/IJSWIS.306260
Volume 18
Ashish Tiwari, Ritu Garg
The eagle expresses of cloud computing plays a pivotal role in the development of technology. The aim is to solve in such a way that it will provide an optimized solution. The key role of allocating...
Show More
The eagle expresses of cloud computing plays a pivotal role in the development of technology. The aim is to solve in such a way that it will provide an optimized solution. The key role of allocating these efficient resources and making the algorithms for its time and cost optimization. The approach of the research is based on the rough set theory RST. RST is a great method for making a large difference in qualitative analysis situations. It's a technique to find knowledge discovery and handle the problems such as inductive reasoning, automatic classification, pattern recognition, learning algorithms, and data reduction. The rough set theory is the new method in cloud service selection so that the best services provide for cloud users and efficient service improvement for cloud providers. The simulation of the work is finished at intervals with the merchandise utilized for the formation of the philosophy framework. The simulation shows the IoT services provided by the IoT service supplier to the user are the best utilization with the parameters and ontology technique.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Tiwari, Ashish, and Ritu Garg. "Adaptive Ontology-Based IoT Resource Provisioning in Computing Systems." IJSWIS vol.18, no.1 2022: pp.1-18. http://doi.org/10.4018/IJSWIS.306260
APA
Tiwari, A. & Garg, R. (2022). Adaptive Ontology-Based IoT Resource Provisioning in Computing Systems. International Journal on Semantic Web and Information Systems (IJSWIS), 18(1), 1-18. http://doi.org/10.4018/IJSWIS.306260
Chicago
Tiwari, Ashish, and Ritu Garg. "Adaptive Ontology-Based IoT Resource Provisioning in Computing Systems," International Journal on Semantic Web and Information Systems (IJSWIS) 18, no.1: 1-18. http://doi.org/10.4018/IJSWIS.306260
Export Reference
Published: Jul 8, 2022
Converted to Gold OA:
DOI: 10.4018/IJSWIS.306748
Volume 18
Tzu-An Chiang, Z. H. Che, Yi-Ling Huang, Chang-You Tsai
Companies can gain critical real-time insights into customer requirements and service evaluation by mining social media. To acquire the service performance and improve the service deficiencies for...
Show More
Companies can gain critical real-time insights into customer requirements and service evaluation by mining social media. To acquire the service performance and improve the service deficiencies for hotels, this research proposes a benchmark-based performance evaluation model for hotel service to enable hotel managers to assess the service performance. In the case of non-benchmark service hotels, the identification and improvement model for non-benchmark criteria can recognize and analyze the required quantities of performance improvements for non-benchmark criteria. For understanding the causes of service deficiencies, this research mines the online posts and creates a hierarchical ontology of service deficiencies for hotels. A hierarchical ontology-based neural network is proposed to automatically identify the causes of service deficiencies. This study employs an online forum as a case to achieve the identification accuracy of causes of service deficiencies of 92.68%. The analytical result can demonstrate the significant effectiveness and practical value of the proposed methodology.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Chiang, Tzu-An, et al. "Using an Ontology-Based Neural Network and DEA to Discover Deficiencies of Hotel Services." IJSWIS vol.18, no.1 2022: pp.1-19. http://doi.org/10.4018/IJSWIS.306748
APA
Chiang, T., Che, Z. H., Huang, Y., & Tsai, C. (2022). Using an Ontology-Based Neural Network and DEA to Discover Deficiencies of Hotel Services. International Journal on Semantic Web and Information Systems (IJSWIS), 18(1), 1-19. http://doi.org/10.4018/IJSWIS.306748
Chicago
Chiang, Tzu-An, et al. "Using an Ontology-Based Neural Network and DEA to Discover Deficiencies of Hotel Services," International Journal on Semantic Web and Information Systems (IJSWIS) 18, no.1: 1-19. http://doi.org/10.4018/IJSWIS.306748
Export Reference
Published: Sep 9, 2022
Converted to Gold OA:
DOI: 10.4018/IJSWIS.306749
Volume 18
Cecilia Avila-Garzon, Manuel Balaguera, Valentina Tabares-Morales
The development of citizenship competences plays an important role in a complex system like society. Thus, to analyze how such competences impact other contexts is a great challenge because this...
Show More
The development of citizenship competences plays an important role in a complex system like society. Thus, to analyze how such competences impact other contexts is a great challenge because this kind of study involves the work with people and the use of variables that depend on human behaviors. In this sense, many studies have highlighted the advantage of using simulation systems and tools. In particular, the agent-based social simulation field relies upon the Semantic Web to manage knowledge representation in social scenarios. This study focuses on how citizenship competences impact conflict resolution. Moreover, a simulation model in which citizens interact to resolve conflicts by considering citizenship competences and conflict resolution styles is also introduced. It was developed in NetLogo together with an extension that connects it with the ontology of competences. Results show that the higher interactions of citizens-conflicts, the higher level of citizenship competences, and the number of conflicts solved is higher when using citizenship competences.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Avila-Garzon, Cecilia, et al. "An Agent-Based Social Simulation for Citizenship Competences and Conflict Resolution Styles." IJSWIS vol.18, no.1 2022: pp.1-23. http://doi.org/10.4018/IJSWIS.306749
APA
Avila-Garzon, C., Balaguera, M., & Tabares-Morales, V. (2022). An Agent-Based Social Simulation for Citizenship Competences and Conflict Resolution Styles. International Journal on Semantic Web and Information Systems (IJSWIS), 18(1), 1-23. http://doi.org/10.4018/IJSWIS.306749
Chicago
Avila-Garzon, Cecilia, Manuel Balaguera, and Valentina Tabares-Morales. "An Agent-Based Social Simulation for Citizenship Competences and Conflict Resolution Styles," International Journal on Semantic Web and Information Systems (IJSWIS) 18, no.1: 1-23. http://doi.org/10.4018/IJSWIS.306749
Export Reference
Published: Sep 9, 2022
Converted to Gold OA:
DOI: 10.4018/IJSWIS.306750
Volume 18
Can Yang
The refueling trajectory of self-driving tourists is sparse, and it is difficult to restore the real travel route. A sparse trajectory clustering algorithm is proposed based on semantic...
Show More
The refueling trajectory of self-driving tourists is sparse, and it is difficult to restore the real travel route. A sparse trajectory clustering algorithm is proposed based on semantic representation to mine popular self-driving travel routes. Different from the traditional trajectory clustering algorithm based on trajectory point matching, the semantic relationship between different trajectory points is researched in this algorithm, and the low-dimensional vector representation of the trajectory is learned. First, the neural network language model is used to learn the distributed vector representation of the fueling station; then, the average of all the station vectors in each trajectory is taken as the vector representation of the trajectory. Finally, the classic k-means algorithm is used to cluster the trajectory vectors. The final visualization results show that the proposed algorithm effectively mines two popular self-driving travel routes.
Content Forthcoming
Add to Your Personal Library: Article Published: Jul 15, 2022
Converted to Gold OA:
DOI: 10.4018/IJSWIS.307324
Volume 18
Zhang Ling, Zhang Jia Hao
This paper presents a detection algorithm using normalized mutual information feature selection and cooperative evolution of multiple operators based on adaptive parallel quantum genetic algorithm...
Show More
This paper presents a detection algorithm using normalized mutual information feature selection and cooperative evolution of multiple operators based on adaptive parallel quantum genetic algorithm (NMIFS MOP- AQGA). The proposed algorithm is to address the problems that the intrusion detection system (IDS) has lower the detection speed, less adaptability and lower detection accuracy. In order to achieve an effective reduction for high-dimensional feature data, the NMIFS method is used to select the best feature combination. The best features are sent to the MOP- AQGA classifier for learning and training, and the intrusion detectors are obtained. The data are fed into the detection algorithm to ultimately generate accurate detection results. The experimental results on real abnormal data demonstrate that the NMIFS MOP- AQGA method has higher detection accuracy, lower false negative rate and higher adaptive performance than the existing detection methods, especially for small samples sets.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Ling, Zhang, and Zhang Jia Hao. "Intrusion Detection Using Normalized Mutual Information Feature Selection and Parallel Quantum Genetic Algorithm." IJSWIS vol.18, no.1 2022: pp.1-24. http://doi.org/10.4018/IJSWIS.307324
APA
Ling, Z. & Hao, Z. J. (2022). Intrusion Detection Using Normalized Mutual Information Feature Selection and Parallel Quantum Genetic Algorithm. International Journal on Semantic Web and Information Systems (IJSWIS), 18(1), 1-24. http://doi.org/10.4018/IJSWIS.307324
Chicago
Ling, Zhang, and Zhang Jia Hao. "Intrusion Detection Using Normalized Mutual Information Feature Selection and Parallel Quantum Genetic Algorithm," International Journal on Semantic Web and Information Systems (IJSWIS) 18, no.1: 1-24. http://doi.org/10.4018/IJSWIS.307324
Export Reference
Published: Aug 12, 2022
Converted to Gold OA:
DOI: 10.4018/IJSWIS.307908
Volume 18
Xiaoliang Zhang, Feng Gao, Lunsheng Zhou, Shenqi Jing, Zhongmin Wang, Yongqing Wang, Shumei Miao, Xin Zhang, Jianjun Guo, Tao Shan, Yun Liu
Existing pharmaceutical information extraction research often focus on standalone entity or relationship identification tasks over drug instructions. There is a lack of a holistic solution for drug...
Show More
Existing pharmaceutical information extraction research often focus on standalone entity or relationship identification tasks over drug instructions. There is a lack of a holistic solution for drug knowledge extraction. Moreover, current methods perform poorly in extracting fine-grained interaction relations from drug instructions. To solve these problems, this paper proposes an information extraction framework for drug instructions. The framework proposes deep learning models with fine-tuned pre-training models for entity recognition and relation extraction. In addition, it incorporates an novel entity pair calibration process to promote the performance for fine-grained relation extraction. The framework experiments on more than 60k Chinese drug description sentences from 4000 drug instructions. Empirical results show that the framework can successfully identify drug related entities (F1 3 0.95) and their relations (F1 3 0.83) from the realistic dataset, and the entity pair calibration plays an important role (~5% F1 score improvement) in extracting fine-grained relations.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Zhang, Xiaoliang, et al. "Fine-Grained Drug Interaction Extraction Based on Entity Pair Calibration and Pre-Training Model for Chinese Drug Instructions." IJSWIS vol.18, no.1 2022: pp.1-23. http://doi.org/10.4018/IJSWIS.307908
APA
Zhang, X., Gao, F., Zhou, L., Jing, S., Wang, Z., Wang, Y., Miao, S., Zhang, X., Guo, J., Shan, T., & Liu, Y. (2022). Fine-Grained Drug Interaction Extraction Based on Entity Pair Calibration and Pre-Training Model for Chinese Drug Instructions. International Journal on Semantic Web and Information Systems (IJSWIS), 18(1), 1-23. http://doi.org/10.4018/IJSWIS.307908
Chicago
Zhang, Xiaoliang, et al. "Fine-Grained Drug Interaction Extraction Based on Entity Pair Calibration and Pre-Training Model for Chinese Drug Instructions," International Journal on Semantic Web and Information Systems (IJSWIS) 18, no.1: 1-23. http://doi.org/10.4018/IJSWIS.307908
Export Reference
Published: Jul 29, 2022
Converted to Gold OA:
DOI: 10.4018/IJSWIS.308469
Volume 18
Zhang Ling, Zhang Jia Hao
The intrusion detection system (IDS) has lower speed, less adaptability and lower detection accuracy especially for small samples sets. This paper presents a detection model based on normalized...
Show More
The intrusion detection system (IDS) has lower speed, less adaptability and lower detection accuracy especially for small samples sets. This paper presents a detection model based on normalized mutual antibodies information feature selection and adaptive quantum artificial immune with cooperative evolution of multiple operators (NMAIFS MOP-AQAI). First, for a high intrusion speed, the NMAIFS is used to achieve an effective reduction for high-dimensional features. Then, the best feature vectors are sent to the MOP-AQAI classifier, in which, vaccination strategy, the quantum computing, and cooperative evolution of multiple operators are adopted to generate excellent detectors. Lastly, the data is fed into NMAIFS MOP-AQAI and ultimately generates accurate detection results. The experimental results on real abnormal data demonstrate that the NMAIFS MOP-AQAI has higher detection accuracy, lower false negative rate and a higher adaptive performance than the existing anomaly detection methods, especially for small samples sets.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Ling, Zhang, and Zhang Jia Hao. "An Intrusion Detection System Based on Normalized Mutual Information Antibodies Feature Selection and Adaptive Quantum Artificial Immune System." IJSWIS vol.18, no.1 2022: pp.1-25. http://doi.org/10.4018/IJSWIS.308469
APA
Ling, Z. & Hao, Z. J. (2022). An Intrusion Detection System Based on Normalized Mutual Information Antibodies Feature Selection and Adaptive Quantum Artificial Immune System. International Journal on Semantic Web and Information Systems (IJSWIS), 18(1), 1-25. http://doi.org/10.4018/IJSWIS.308469
Chicago
Ling, Zhang, and Zhang Jia Hao. "An Intrusion Detection System Based on Normalized Mutual Information Antibodies Feature Selection and Adaptive Quantum Artificial Immune System," International Journal on Semantic Web and Information Systems (IJSWIS) 18, no.1: 1-25. http://doi.org/10.4018/IJSWIS.308469
Export Reference
Published: Aug 17, 2022
Converted to Gold OA:
DOI: 10.4018/IJSWIS.308812
Volume 18
Tianfeng Wang, Zhisong Pan, Guyu Hu, Yexin Duan, Yu Pan
Compared with traditional machine learning model, graph neural networks (GNNs) have distinct advantages in processing unstructured data. However, the vulnerability of GNNs cannot be ignored. Graph...
Show More
Compared with traditional machine learning model, graph neural networks (GNNs) have distinct advantages in processing unstructured data. However, the vulnerability of GNNs cannot be ignored. Graph universal adversarial attack is a special type of attack on graph which can attack any targeted victim by flipping edges connected to anchor nodes. In this paper, we propose the forward-derivative-based graph universal adversarial attack (FDGUA). Firstly, we point out that one node as training data is sufficient to generate an effective continuous attack vector. Then we discretize the continuous attack vector based on forward derivative. FDGUA can achieve impressive attack performance that three anchor nodes can result in attack success rate higher than 80% for the dataset Cora. Moreover, we propose the first graph universal adversarial training (GUAT) to defend against universal adversarial attack. Experiments show that GUAT can effectively improve the robustness of the GNNs without degrading the accuracy of the model.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Wang, Tianfeng, et al. "Understanding Universal Adversarial Attack and Defense on Graph." IJSWIS vol.18, no.1 2022: pp.1-21. http://doi.org/10.4018/IJSWIS.308812
APA
Wang, T., Pan, Z., Hu, G., Duan, Y., & Pan, Y. (2022). Understanding Universal Adversarial Attack and Defense on Graph. International Journal on Semantic Web and Information Systems (IJSWIS), 18(1), 1-21. http://doi.org/10.4018/IJSWIS.308812
Chicago
Wang, Tianfeng, et al. "Understanding Universal Adversarial Attack and Defense on Graph," International Journal on Semantic Web and Information Systems (IJSWIS) 18, no.1: 1-21. http://doi.org/10.4018/IJSWIS.308812
Export Reference
Published: Aug 26, 2022
Converted to Gold OA:
DOI: 10.4018/IJSWIS.309421
Volume 18
Alexandros Vassiliades, Nick Bassiliades, Theodore Patkos, Dimitris Vrakas
The authors present a knowledge retrieval framework for the household domain enhanced with external knowledge sources that can argue over the information that it returns and learn new knowledge...
Show More
The authors present a knowledge retrieval framework for the household domain enhanced with external knowledge sources that can argue over the information that it returns and learn new knowledge through an argumentation dialogue. The framework provides access to commonsense knowledge about household environments and performs semantic matching between entities from the web knowledge graph ConceptNet, using semantic knowledge from DBpedia and WordNet, with the ones existing in the knowledge graph. They offer a set of predefined SPARQL templates that directly address the ontology on which their knowledge retrieval framework is built and querying through SPARQL. The framework also features an argumentation component, where the user can argue against the answers of the knowledge retrieval component of the framework under two different scenarios: the missing knowledge scenario, where an entity should be in the answers, and the wrong knowledge scenario, where an entity should not be in the answers. This argumentation dialogue can end up in learning a new piece of knowledge when the user wins the dialogue.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Vassiliades, Alexandros, et al. "An Open-Ended Web Knowledge Retrieval Framework for the Household Domain With Explanation and Learning Through Argumentation." IJSWIS vol.18, no.1 2022: pp.1-34. http://doi.org/10.4018/IJSWIS.309421
APA
Vassiliades, A., Bassiliades, N., Patkos, T., & Vrakas, D. (2022). An Open-Ended Web Knowledge Retrieval Framework for the Household Domain With Explanation and Learning Through Argumentation. International Journal on Semantic Web and Information Systems (IJSWIS), 18(1), 1-34. http://doi.org/10.4018/IJSWIS.309421
Chicago
Vassiliades, Alexandros, et al. "An Open-Ended Web Knowledge Retrieval Framework for the Household Domain With Explanation and Learning Through Argumentation," International Journal on Semantic Web and Information Systems (IJSWIS) 18, no.1: 1-34. http://doi.org/10.4018/IJSWIS.309421
Export Reference
Published: Sep 29, 2022
Converted to Gold OA:
DOI: 10.4018/IJSWIS.309422
Volume 18
Ana María Fermoso García, Maria Isabel Manzano García, Roberto Berjón Gallinas, Montserrat Mateos Sánchez, María Encarnación Beato Gutiérrez
The aim of this work is the development of an information system that, by integrating data from different sources and applying semantic technologies, makes it possible to publish and share with...
Show More
The aim of this work is the development of an information system that, by integrating data from different sources and applying semantic technologies, makes it possible to publish and share with society the scientific production generated in the university environment, promoting its dissemination and thus contributing to the knowledge society, among others. In practice, this is the implementation of a CRIS (current research information system). This CRIS presents advanced features. On one hand it applies semantic technologies, providing a query service through a SPARQL Point, besides the reuse of shared data by exporting them in different formats. In this sense, it is also based on a European ontology or semantic standard such as CERIF, which facilitates its portability. On the other hand, CRIS also presents an alternative to the lack of a single data system by allowing data from different sources to be integrated and managed.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
García, Ana María Fermoso, et al. "Integration and Open Access System Based on Semantic Technologies: A Use Case Applied to University Research Facet." IJSWIS vol.18, no.1 2022: pp.1-19. http://doi.org/10.4018/IJSWIS.309422
APA
García, A. M., García, M. I., Gallinas, R. B., Sánchez, M. M., & Gutiérrez, M. E. (2022). Integration and Open Access System Based on Semantic Technologies: A Use Case Applied to University Research Facet. International Journal on Semantic Web and Information Systems (IJSWIS), 18(1), 1-19. http://doi.org/10.4018/IJSWIS.309422
Chicago
García, Ana María Fermoso, et al. "Integration and Open Access System Based on Semantic Technologies: A Use Case Applied to University Research Facet," International Journal on Semantic Web and Information Systems (IJSWIS) 18, no.1: 1-19. http://doi.org/10.4018/IJSWIS.309422
Export Reference
Published: Aug 26, 2022
Converted to Gold OA:
DOI: 10.4018/IJSWIS.309428
Volume 18
JiaKai Gu, Li, Nam D. Vo, Jason J. Jung
In this chapter, the authors propose to use contextual Word2Vec model for understanding OOV (out of vocabulary). The OOV is extracted by using left-right entropy and point information entropy. They...
Show More
In this chapter, the authors propose to use contextual Word2Vec model for understanding OOV (out of vocabulary). The OOV is extracted by using left-right entropy and point information entropy. They choose to use Word2Vec to construct the word vector space and CBOW (continuous bag of words) to obtain the contextual information of the words. If there is a word that has similar contextual information to the OOV, the word can be used to understand the OOV. They chose the Weibo corpus as the dataset for the experiments. The results show that the proposed model achieves 97.10% accuracy, which is better than Skip-Gram by 8.53%.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Gu, JiaKai, et al. "Contextual Word2Vec Model for Understanding Chinese Out of Vocabularies on Online Social Media." IJSWIS vol.18, no.1 2022: pp.1-14. http://doi.org/10.4018/IJSWIS.309428
APA
Gu, J., Li, Vo, N. D., & Jung, J. J. (2022). Contextual Word2Vec Model for Understanding Chinese Out of Vocabularies on Online Social Media. International Journal on Semantic Web and Information Systems (IJSWIS), 18(1), 1-14. http://doi.org/10.4018/IJSWIS.309428
Chicago
Gu, JiaKai, et al. "Contextual Word2Vec Model for Understanding Chinese Out of Vocabularies on Online Social Media," International Journal on Semantic Web and Information Systems (IJSWIS) 18, no.1: 1-14. http://doi.org/10.4018/IJSWIS.309428
Export Reference
Published: Oct 21, 2022
Converted to Gold OA:
DOI: 10.4018/IJSWIS.310055
Volume 18
Qiang Zhou
In the progress of globalization, the transnational human traffic is spreading globally. It damages national economy and social order as well as infringes on the basic human rights of the victims...
Show More
In the progress of globalization, the transnational human traffic is spreading globally. It damages national economy and social order as well as infringes on the basic human rights of the victims, which has aroused general concern all over the world, becoming global issues. One of the important features in human being traffic is the factor of globalization. A destination-source model works as a deterrent which is applied in the identification of smuggling and trafficking of illegal immigrants. The related results show that the employer penalty and market wage will influence the amount of smuggling and trafficking immigrants. Tax offered by legal unskilled workers at destination countries provides financial support for the inland monitoring of illegal immigrants. The improved SVM (supported vector machine) is proposed to study online textual data used for advertisement classification, with the purpose of discerning underlying human trafficking patterns on the network and recognizing suspicious advertisements, a concern of law-enforcement agencies.
Content Forthcoming
Add to Your Personal Library: Article Published: Sep 23, 2022
Converted to Gold OA:
DOI: 10.4018/IJSWIS.310056
Volume 18
Parul Sharma, Balwinder Raj, Sandeep Singh Gill
In this paper the spintronic-based memory MRAM is presented that showed how it can replace both SRAM and DRAM and provide the high speed with great chip size. Moreover, MRAM is the nonvolatile...
Show More
In this paper the spintronic-based memory MRAM is presented that showed how it can replace both SRAM and DRAM and provide the high speed with great chip size. Moreover, MRAM is the nonvolatile memory that provides great advancement in the storage process. The different types of MRAM are mentioned with the techniques used for writing purpose and also mention which one is more used and why. The basic working principle and the function performed by the MRAM are discussed. Artificial intelligence (AI) is mentioned with its pros and cons for intelligent systems. Neuromorphic computing is also explained along with its important role in intelligent systems. Some reasons are also discussed as to why neuromorphic computing is so important. This paper also presents how spintronic-based devices especially memory can be used in intelligent systems and neuromorphic computing. Nanoscale spintronic-based MRAM plays a key role in intelligent systems and neuromorphic computing applications.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Sharma, Parul, et al. "Spintronics Based Non-Volatile MRAM for Intelligent Systems: Memory for Intelligent Systems Design." IJSWIS vol.18, no.1 2022: pp.1-16. http://doi.org/10.4018/IJSWIS.310056
APA
Sharma, P., Raj, B., & Gill, S. S. (2022). Spintronics Based Non-Volatile MRAM for Intelligent Systems: Memory for Intelligent Systems Design. International Journal on Semantic Web and Information Systems (IJSWIS), 18(1), 1-16. http://doi.org/10.4018/IJSWIS.310056
Chicago
Sharma, Parul, Balwinder Raj, and Sandeep Singh Gill. "Spintronics Based Non-Volatile MRAM for Intelligent Systems: Memory for Intelligent Systems Design," International Journal on Semantic Web and Information Systems (IJSWIS) 18, no.1: 1-16. http://doi.org/10.4018/IJSWIS.310056
Export Reference
Published: Oct 20, 2022
Converted to Gold OA:
DOI: 10.4018/IJSWIS.312183
Volume 18
Xi Chen, Jiangmei Li, Yun Fei Zhang
Recently, local gradient microstructure of image textures has become an important field of texture classification, but it is generally to investigate the multiscale local microstructures of image...
Show More
Recently, local gradient microstructure of image textures has become an important field of texture classification, but it is generally to investigate the multiscale local microstructures of image gradient, and rarely consider the multidirectional and multiscale local microstructure of image gradient. The proposed algorithm first extracts the two-order gradient feature of the image from different orthogonal directions and further constructs the multiple shape index of the image, and then calculates the histogram feature vectors of the shape index on different orthogonal directions and scales, and finally connects all histogram feature vectors on different orthogonal directions and scales to obtain the final matching feature vector of the image. To further enhance the discriminant ability of feature vector generated by multidirectional shape index schemes, the weight of each block of images is also considered. Experiments on two texture databases and one palmprint database have fully confirmed the effective of proposed algorithm.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Chen, Xi, et al. "Multidirectional Gradient Feature With Shape Index for Effective Texture Classification." IJSWIS vol.18, no.1 2022: pp.1-19. http://doi.org/10.4018/IJSWIS.312183
APA
Chen, X., Li, J., & Zhang, Y. F. (2022). Multidirectional Gradient Feature With Shape Index for Effective Texture Classification. International Journal on Semantic Web and Information Systems (IJSWIS), 18(1), 1-19. http://doi.org/10.4018/IJSWIS.312183
Chicago
Chen, Xi, Jiangmei Li, and Yun Fei Zhang. "Multidirectional Gradient Feature With Shape Index for Effective Texture Classification," International Journal on Semantic Web and Information Systems (IJSWIS) 18, no.1: 1-19. http://doi.org/10.4018/IJSWIS.312183
Export Reference
Published: Oct 27, 2022
Converted to Gold OA:
DOI: 10.4018/IJSWIS.313190
Volume 18
Ping Li, Haidong Zhong, Justin Zuopeng Zhang
Using four types of publicly available datasets and ArcGIS software, the authors identify the spatial characteristics of postgraduate education in China at three scales: comprehensive economic zone...
Show More
Using four types of publicly available datasets and ArcGIS software, the authors identify the spatial characteristics of postgraduate education in China at three scales: comprehensive economic zone, provincial, and city. They also employ geographically weighted regression and ordinary least squares to study the factors influencing the spatial pattern of postgraduate education in Gin at the city scale. The findings show that the number of postgraduate education institutions increases as the longitude of a city increases, but the number decreases from coast to inland. Second, postgraduate education institutions tend to group together in provincial capitals and megacities. Finally, GDP, per capita GDP, population size, local income, and total retail sales of consumer goods significantly impact postgraduate education development. The study contributes to the literature and provides insights for practitioners in promoting urban planning and infrastructure development.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Li, Ping, et al. "Spatial Patterns and Development Characteristics of China's Postgraduate Education: A Geographic Information System Approach." IJSWIS vol.18, no.1 2022: pp.1-21. http://doi.org/10.4018/IJSWIS.313190
APA
Li, P., Zhong, H., & Zhang, J. Z. (2022). Spatial Patterns and Development Characteristics of China's Postgraduate Education: A Geographic Information System Approach. International Journal on Semantic Web and Information Systems (IJSWIS), 18(1), 1-21. http://doi.org/10.4018/IJSWIS.313190
Chicago
Li, Ping, Haidong Zhong, and Justin Zuopeng Zhang. "Spatial Patterns and Development Characteristics of China's Postgraduate Education: A Geographic Information System Approach," International Journal on Semantic Web and Information Systems (IJSWIS) 18, no.1: 1-21. http://doi.org/10.4018/IJSWIS.313190
Export Reference
Published: Oct 27, 2022
Converted to Gold OA:
DOI: 10.4018/IJSWIS.313198
Volume 18
Jianmao Xiao, Xinyi Liu, Jia Zeng, Yuanlong Cao, Zhiyong Feng
In recent years, as the demand for senior care services has further increased, it has become more difficult to obtain matching services from the vast amount of data. Therefore, this paper proposes a...
Show More
In recent years, as the demand for senior care services has further increased, it has become more difficult to obtain matching services from the vast amount of data. Therefore, this paper proposes a service recommendation framework PCE-CF based on an embedded user portrait model. The framework accurately describes the elderly users through four dimensions—population, society, consumption, and health—and constructs the user portrait model by embedding tags. The embedded vector of each older man is learned through the deep learning model, and different feature groups are meaningfully expressed in the transformation space. In addition, location context and dynamic interest model are introduced to process embedded vectors, and users' service preferences are predicted according to their dynamic behaviors. The experiment results show that the PCE-CF framework proposed in this paper can improve the recommendation algorithm's efficiency and have higher feasibility in personalized service recommendations.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Xiao, Jianmao, et al. "Recommendation of Healthcare Services Based on an Embedded User Profile Model." IJSWIS vol.18, no.1 2022: pp.1-21. http://doi.org/10.4018/IJSWIS.313198
APA
Xiao, J., Liu, X., Zeng, J., Cao, Y., & Feng, Z. (2022). Recommendation of Healthcare Services Based on an Embedded User Profile Model. International Journal on Semantic Web and Information Systems (IJSWIS), 18(1), 1-21. http://doi.org/10.4018/IJSWIS.313198
Chicago
Xiao, Jianmao, et al. "Recommendation of Healthcare Services Based on an Embedded User Profile Model," International Journal on Semantic Web and Information Systems (IJSWIS) 18, no.1: 1-21. http://doi.org/10.4018/IJSWIS.313198
Export Reference
Published: Nov 10, 2022
Converted to Gold OA:
DOI: 10.4018/IJSWIS.313715
Volume 18
Boan Ji, Huabin Wang, Mengxin Zhang, Borun Mao, Xuejun Li
Brain magnetic resonance images (MRI) are widely used for the classification of Alzheimer's disease (AD). The size of 3D images is, however, too large. Some of the sliced image features are lost...
Show More
Brain magnetic resonance images (MRI) are widely used for the classification of Alzheimer's disease (AD). The size of 3D images is, however, too large. Some of the sliced image features are lost, which results in conflicting network size and classification performance. This article uses key components in the transformer model to propose a new lightweight method, ensuring the lightness of the network and achieving highly accurate classification. First, the transformer model is imitated by using image patch input to enhance feature perception. Second, the Gaussian error linear unit (GELU), commonly used in transformer models, is used to enhance the generalization ability of the network. Finally, the network uses MRI slices as learning data. The depthwise separable convolution makes the network more lightweight. Experiments are carried out on the ADNI public database. The accuracy rate of AD vs. normal control (NC) experiments reaches 98.54%. The amount of network parameters is 1.3% of existing similar networks.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Ji, Boan, et al. "An Efficient Lightweight Network Based on Magnetic Resonance Images for Predicting Alzheimer's Disease." IJSWIS vol.18, no.1 2022: pp.1-18. http://doi.org/10.4018/IJSWIS.313715
APA
Ji, B., Wang, H., Zhang, M., Mao, B., & Li, X. (2022). An Efficient Lightweight Network Based on Magnetic Resonance Images for Predicting Alzheimer's Disease. International Journal on Semantic Web and Information Systems (IJSWIS), 18(1), 1-18. http://doi.org/10.4018/IJSWIS.313715
Chicago
Ji, Boan, et al. "An Efficient Lightweight Network Based on Magnetic Resonance Images for Predicting Alzheimer's Disease," International Journal on Semantic Web and Information Systems (IJSWIS) 18, no.1: 1-18. http://doi.org/10.4018/IJSWIS.313715
Export Reference
Published: Dec 15, 2022
Converted to Gold OA:
DOI: 10.4018/IJSWIS.313946
Volume 18
Zhang Runmei, Li Lulu, Yin Lei, Liu Jingjing, Xu Weiyi, Cao Weiwei, Chen Zhong
For Chinese NER tasks, there is very little annotation data available. To increase the dataset, improve the accuracy of Chinese NER task, and improve the model's stability, the authors propose a...
Show More
For Chinese NER tasks, there is very little annotation data available. To increase the dataset, improve the accuracy of Chinese NER task, and improve the model's stability, the authors propose a method to add local adversarial training to the transfer learning model and integrate the attention mechanism. The model uses ALBERT for migration pre-training and adds perturbation factors to the output matrix of the embedding layer to constitute local adversarial training. BILSTM is used to encode the shared and private features of the task, and the attention mechanism is introduced to capture the characters that focus more on the entities. Finally, the best entity annotation is obtained by CRF. Experiments are conducted on People's Daily 2004 and Tsinghua University open-source text classification datasets. The experimental results show that compared with the SOTA model, the F1 values of the proposed method in this paper are improved by 7.32 and 7.98 in the two different datasets, respectively, proving that the accuracy of the method in this paper is improved in the Chinese domain.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Runmei, Zhang, et al. "Chinese Named Entity Recognition Method Combining ALBERT and a Local Adversarial Training and Adding Attention Mechanism." IJSWIS vol.18, no.1 2022: pp.1-20. http://doi.org/10.4018/IJSWIS.313946
APA
Runmei, Z., Lulu, L., Lei, Y., Jingjing, L., Weiyi, X., Weiwei, C., & Zhong, C. (2022). Chinese Named Entity Recognition Method Combining ALBERT and a Local Adversarial Training and Adding Attention Mechanism. International Journal on Semantic Web and Information Systems (IJSWIS), 18(1), 1-20. http://doi.org/10.4018/IJSWIS.313946
Chicago
Runmei, Zhang, et al. "Chinese Named Entity Recognition Method Combining ALBERT and a Local Adversarial Training and Adding Attention Mechanism," International Journal on Semantic Web and Information Systems (IJSWIS) 18, no.1: 1-20. http://doi.org/10.4018/IJSWIS.313946
Export Reference
Published: Dec 23, 2022
Converted to Gold OA:
DOI: 10.4018/IJSWIS.315747
Volume 18
Zhiwen Zheng, Juxiang Zhou, Jianhou Gan, Sen Luo, Wei Gao
Due to the high similarity of fine-grained image subclasses, small inter-class changes and large intra-class changes are caused, which leads to the difficulty of fine-grained image classification...
Show More
Due to the high similarity of fine-grained image subclasses, small inter-class changes and large intra-class changes are caused, which leads to the difficulty of fine-grained image classification task. However, existing convolutional neural networks have been unable to effectively solve this problem. Aiming at the above-mentioned fine-grained image classification problem, this paper proposes a multi-scale and multi-level ViT model. First, through data augmentation techniques, the accuracy of fine-grained image classification can be effectively improved. Secondly, the small-scale input and large-scale input of the model make the input image have more feature ex-pressions. The subsequent multi-layeredness effectively utilizes the results of the previous layer of ViT, so that the data of the previous layer can be more effectively used in the next layer of ViT. Finally, cross-attention allows the results of two scale inputs to be fused in a reasonable way. The proposed model is competitive with current mainstream state-of-the-art methods on multiple datasets.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Zheng, Zhiwen, et al. "Fine-Grained Image Classification Based on Cross-Attention Network." IJSWIS vol.18, no.1 2022: pp.1-12. http://doi.org/10.4018/IJSWIS.315747
APA
Zheng, Z., Zhou, J., Gan, J., Luo, S., & Gao, W. (2022). Fine-Grained Image Classification Based on Cross-Attention Network. International Journal on Semantic Web and Information Systems (IJSWIS), 18(1), 1-12. http://doi.org/10.4018/IJSWIS.315747
Chicago
Zheng, Zhiwen, et al. "Fine-Grained Image Classification Based on Cross-Attention Network," International Journal on Semantic Web and Information Systems (IJSWIS) 18, no.1: 1-12. http://doi.org/10.4018/IJSWIS.315747
Export Reference
Published: Feb 23, 2022
Converted to Gold OA:
DOI: 10.4018/IJSWIS.297031
Volume 18
Jun Li, Jie Su
A method for mining frequent patterns of individual user trajectories is proposed based on location semantics. The semantic trajectory is obtained by inverse geocoding and preprocessed to obtain the...
Show More
A method for mining frequent patterns of individual user trajectories is proposed based on location semantics. The semantic trajectory is obtained by inverse geocoding and preprocessed to obtain the Top-k candidate frequent location item sets, and then the spatio-temporal sequence intersection and the divide and conquer merge methods are used to convert the frequent iterative calculation of long itemsets into hierarchical sets' regular operations, the superset and subset of frequent sequences are found. This kind of semantic trajectory frequent pattern mining can actively identify and discover potential carpooling needs, and provide higher accuracy for location-based intelligent recommendations such as carpooling and HOV lane travel (High-Occupancy Vehicle Lane). Carpool matching and recommendation based on semantic trajectory in this paper is suitable for single carpooling and relay-ride carpooling. the results of simulation carpooling experiments prove the applicability and efficiency of the method.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Li, Jun, and Jie Su. "Semantic Trajectory Frequent Pattern Mining Model: The Definitions and Theorems." IJSWIS vol.18, no.1 2022: pp.1-20. http://doi.org/10.4018/IJSWIS.297031
APA
Li, J. & Su, J. (2022). Semantic Trajectory Frequent Pattern Mining Model: The Definitions and Theorems. International Journal on Semantic Web and Information Systems (IJSWIS), 18(1), 1-20. http://doi.org/10.4018/IJSWIS.297031
Chicago
Li, Jun, and Jie Su. "Semantic Trajectory Frequent Pattern Mining Model: The Definitions and Theorems," International Journal on Semantic Web and Information Systems (IJSWIS) 18, no.1: 1-20. http://doi.org/10.4018/IJSWIS.297031
Export Reference
Published: Feb 23, 2022
Converted to Gold OA:
DOI: 10.4018/IJSWIS.297032
Volume 18
Ammar Almomani, Mohammad Alauthman, Mohd Taib Shatnawi, Mohammed Alweshah, Ayat Alrosan, Waleed Alomoush, Brij B. Gupta, Brij B. Gupta, Brij B. Gupta
The phishing attack is one of the main cybersecurity threats in web phishing and spear phishing. Phishing websites continue to be a problem. One of the main contributions to our study was working...
Show More
The phishing attack is one of the main cybersecurity threats in web phishing and spear phishing. Phishing websites continue to be a problem. One of the main contributions to our study was working and extracting the URL & Domain Identity feature, Abnormal Features, HTML and JavaScript Features, and Domain Features as semantic features to detect phishing websites, which makes the process of classification using those semantic features, more controllable and more effective. The current study used machine learning model algorithms to detect phishing websites, and comparisons were made. We have used 16 machine learning models adopted with 10 semantic features that represent the most effective features for the detection of phishing webpages extracted from two datasets. The GradientBoostingClassifier and RandomForestClassifier had the best accuracy based on the comparison results (i.e., about 97%). In contrast, GaussianNB and the stochastic gradient descent (SGD) classifier represent the lowest accuracy results; 84% and 81% respectively, in comparison with other classifiers.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Almomani, Ammar, et al. "Phishing Website Detection With Semantic Features Based on Machine Learning Classifiers: A Comparative Study." IJSWIS vol.18, no.1 2022: pp.1-24. http://doi.org/10.4018/IJSWIS.297032
APA
Almomani, A., Alauthman, M., Shatnawi, M. T., Alweshah, M., Alrosan, A., Alomoush, W., Gupta, B. B., Gupta, B. B., & Gupta, B. B. (2022). Phishing Website Detection With Semantic Features Based on Machine Learning Classifiers: A Comparative Study. International Journal on Semantic Web and Information Systems (IJSWIS), 18(1), 1-24. http://doi.org/10.4018/IJSWIS.297032
Chicago
Almomani, Ammar, et al. "Phishing Website Detection With Semantic Features Based on Machine Learning Classifiers: A Comparative Study," International Journal on Semantic Web and Information Systems (IJSWIS) 18, no.1: 1-24. http://doi.org/10.4018/IJSWIS.297032
Export Reference
Published: Apr 15, 2022
Converted to Gold OA:
DOI: 10.4018/IJSWIS.297035
Volume 18
Shudong Li, Danyi Qin, Xiaobo Wu, Juan Li, Baohui Li, Weihong Han
Among the large number of network attack alerts generated every day, actual security incidents are usually overwhelmed by a large number of redundant alerts. Therefore, how to remove these redundant...
Show More
Among the large number of network attack alerts generated every day, actual security incidents are usually overwhelmed by a large number of redundant alerts. Therefore, how to remove these redundant alerts in real time and improve the quality of alerts is an urgent problem to be solved in large-scale network security protection. This paper uses the method of combining machine learning and deep learning to improve the effect of false alarm detection and then more accurately identify real alarms, that is, in the process of training the model, the features of a hidden layer output of the DNN model are used as input to train the machine learning model. In order to verify the proposed method, we use the marked alert data to do classification experiments, and finally use the accuracy recall rate, precision, and F1 value to evaluate the model. Good results have been obtained.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Li, Shudong, et al. "False Alert Detection Based on Deep Learning and Machine Learning." IJSWIS vol.18, no.1 2022: pp.1-21. http://doi.org/10.4018/IJSWIS.297035
APA
Li, S., Qin, D., Wu, X., Li, J., Li, B., & Han, W. (2022). False Alert Detection Based on Deep Learning and Machine Learning. International Journal on Semantic Web and Information Systems (IJSWIS), 18(1), 1-21. http://doi.org/10.4018/IJSWIS.297035
Chicago
Li, Shudong, et al. "False Alert Detection Based on Deep Learning and Machine Learning," International Journal on Semantic Web and Information Systems (IJSWIS) 18, no.1: 1-21. http://doi.org/10.4018/IJSWIS.297035
Export Reference
Published: Mar 24, 2022
Converted to Gold OA:
DOI: 10.4018/IJSWIS.297036
Volume 18
Shimaa Ismail, Tarek EL Shishtawy, Abdelwahab Kamel Alsammak
This work presents a new alignment word-space approach for measuring the similarity between two snipped texts. The approach combines two similarity measurement methods: alignment-based and vector...
Show More
This work presents a new alignment word-space approach for measuring the similarity between two snipped texts. The approach combines two similarity measurement methods: alignment-based and vector space-based. The vector space-based method depends on a semantic net that represents the meaning of words as vectors. These vectors are lemmatized to enrich the search space. The alignment-based method generates an alignment word space matrix (AWSM) for the snipped texts according to the generated semantic word spaces. Finally, the degree of sentence semantic similarity is measured using some proposed alignment rules. Four experiments were carried out to evaluate the performance of the proposed approach, using two different datasets. The experimental results proved that applying the lemmatization process for the input text and the vector model has a better effect. The degree of correctness of the results reaches 0.7212 which is considered one of the best two results of the published Arabic semantic similarities.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Ismail, Shimaa, et al. "A New Alignment Word-Space Approach for Measuring Semantic Similarity for Arabic Text." IJSWIS vol.18, no.1 2022: pp.1-18. http://doi.org/10.4018/IJSWIS.297036
APA
Ismail, S., Shishtawy, T. E., & Alsammak, A. K. (2022). A New Alignment Word-Space Approach for Measuring Semantic Similarity for Arabic Text. International Journal on Semantic Web and Information Systems (IJSWIS), 18(1), 1-18. http://doi.org/10.4018/IJSWIS.297036
Chicago
Ismail, Shimaa, Tarek EL Shishtawy, and Abdelwahab Kamel Alsammak. "A New Alignment Word-Space Approach for Measuring Semantic Similarity for Arabic Text," International Journal on Semantic Web and Information Systems (IJSWIS) 18, no.1: 1-18. http://doi.org/10.4018/IJSWIS.297036
Export Reference
Published: Apr 4, 2022
Converted to Gold OA:
DOI: 10.4018/IJSWIS.297037
Volume 18
Samara Ahmed, Adil Rajput, Akila Sarirete, Tauseef J. Chowdhry
Social media gives researchers an invaluable opportunity to gain insight into different facets of human life. Researchers put a great emphasis on categorizing the socioeconomic status (SES) of...
Show More
Social media gives researchers an invaluable opportunity to gain insight into different facets of human life. Researchers put a great emphasis on categorizing the socioeconomic status (SES) of individuals to help predict various findings of interest. Forum uses, hashtags and chatrooms are common tools of conversations grouping. Crowdsourcing involves gathering intelligence to group online user community based on common interest. This paper provides a mechanism to look at writings on social media and group them based on their academic background. We analyzed online forum posts from various geographical regions in the US and characterized the readability scores of users. Specifically, we collected 10,000 tweets from the members of US Senate and computed the Flesch-Kincaid readability score. Comparing the Senators’ tweets to the ones from average internet users, we note 1) US Senators’ readability based on their tweets rate is much higher, and 2) immense difference among average citizen’s score compared to those of US Senators is attributed to the wide spectrum of academic attainment.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Ahmed, Samara, et al. "Flesch-Kincaid Measure as Proxy of Socio-Economic Status on Twitter: Comparing US Senator Writing to Internet Users." IJSWIS vol.18, no.1 2022: pp.1-19. http://doi.org/10.4018/IJSWIS.297037
APA
Ahmed, S., Rajput, A., Sarirete, A., & Chowdhry, T. J. (2022). Flesch-Kincaid Measure as Proxy of Socio-Economic Status on Twitter: Comparing US Senator Writing to Internet Users. International Journal on Semantic Web and Information Systems (IJSWIS), 18(1), 1-19. http://doi.org/10.4018/IJSWIS.297037
Chicago
Ahmed, Samara, et al. "Flesch-Kincaid Measure as Proxy of Socio-Economic Status on Twitter: Comparing US Senator Writing to Internet Users," International Journal on Semantic Web and Information Systems (IJSWIS) 18, no.1: 1-19. http://doi.org/10.4018/IJSWIS.297037
Export Reference
Published: Apr 15, 2022
Converted to Gold OA:
DOI: 10.4018/IJSWIS.297038
Volume 18
Akhilesh Mohan Srivastava, Priyanka Ajay Rotte, Arushi Jain, Surya Prakash
Due to the availability of cheap 3D sensors such as Kinect and LiDAR, the use of 3D data in various domains such as manufacturing, healthcare, and retail to achieve operational safety, improved...
Show More
Due to the availability of cheap 3D sensors such as Kinect and LiDAR, the use of 3D data in various domains such as manufacturing, healthcare, and retail to achieve operational safety, improved outcomes, and enhanced customer experience has gained momentum in recent years. In many of these domains, object recognition is being performed using 3D data against the difficulties posed by illumination, pose variation, scaling, etc present in 2D data. In this work, we propose three data augmentation techniques for 3D data in point cloud representation that use sub-sampling. We then verify that the 3D samples created through data augmentation carry the same information by comparing the Iterative Closest Point Registration Error within the sub-samples, between the sub-samples and their parent sample, between the sub-samples with different parents and the same subject, and finally, between the sub-samples of different subjects. We also verify that the augmented sub-samples have the same characteristics and features as those of the original 3D point cloud by applying the Central Limit Theorem.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Srivastava, Akhilesh Mohan, et al. "Handling Data Scarcity Through Data Augmentation in Training of Deep Neural Networks for 3D Data Processing." IJSWIS vol.18, no.1 2022: pp.1-16. http://doi.org/10.4018/IJSWIS.297038
APA
Srivastava, A. M., Rotte, P. A., Jain, A., & Prakash, S. (2022). Handling Data Scarcity Through Data Augmentation in Training of Deep Neural Networks for 3D Data Processing. International Journal on Semantic Web and Information Systems (IJSWIS), 18(1), 1-16. http://doi.org/10.4018/IJSWIS.297038
Chicago
Srivastava, Akhilesh Mohan, et al. "Handling Data Scarcity Through Data Augmentation in Training of Deep Neural Networks for 3D Data Processing," International Journal on Semantic Web and Information Systems (IJSWIS) 18, no.1: 1-16. http://doi.org/10.4018/IJSWIS.297038
Export Reference
Published: Apr 15, 2022
Converted to Gold OA:
DOI: 10.4018/IJSWIS.297039
Volume 18
Songjian Dan
Research on the identification model of orange origin based on machine learning in Near infrared (NIR) spectroscopy. According to the characteristics of NIR spectral data, a complete general...
Show More
Research on the identification model of orange origin based on machine learning in Near infrared (NIR) spectroscopy. According to the characteristics of NIR spectral data, a complete general framework for origin identification is proposed. It includes steps such as data preprocessing, feature selection, model building and cross validation. Compare multiple preprocessing algorithms and multiple machine learning algorithms under the framework. Based on NIR spectroscopy to identify the origin of orange, a good identification result was obtained. Improve the accuracy of orange origin identification and obtained the best origin identification accuracy of 92.8%.
Content Forthcoming
Add to Your Personal Library: Article Published: Apr 15, 2022
Converted to Gold OA:
DOI: 10.4018/IJSWIS.297141
Volume 18
Nicola Capuano, Pasquale Foggia, Luca Greco, Pierluigi Ritrovato
Understanding the role played by genetic variations in diseases, exploring genomic variants and discovering disease-associated loci are among the most pressing challenges of genomic medicine. A huge...
Show More
Understanding the role played by genetic variations in diseases, exploring genomic variants and discovering disease-associated loci are among the most pressing challenges of genomic medicine. A huge and ever-increasing amount of information is available to researchers to address these challenges. Unfortunately, it is stored in fragmented ontologies and databases, which use heterogeneous formats and poorly integrated schemas. To overcome these limitations, we propose a linked data approach, based on the formalism of multilayer networks, able to integrate and harmonize biomedical information from multiple sources into a single dense network covering different aspects on Neuroendocrine Neoplasms (NENs). The proposed integration schema consists of three interconnected layers representing, respectively, information on the disease, on the affected genes, on the related biological processes and molecular functions. An easy-to-use client-server application was also developed to browse and search for information on the model supporting multilayer network analysis.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Capuano, Nicola, et al. "A Semantic Framework Supporting Multilayer Networks Analysis for Rare Diseases." IJSWIS vol.18, no.1 2022: pp.1-22. http://doi.org/10.4018/IJSWIS.297141
APA
Capuano, N., Foggia, P., Greco, L., & Ritrovato, P. (2022). A Semantic Framework Supporting Multilayer Networks Analysis for Rare Diseases. International Journal on Semantic Web and Information Systems (IJSWIS), 18(1), 1-22. http://doi.org/10.4018/IJSWIS.297141
Chicago
Capuano, Nicola, et al. "A Semantic Framework Supporting Multilayer Networks Analysis for Rare Diseases," International Journal on Semantic Web and Information Systems (IJSWIS) 18, no.1: 1-22. http://doi.org/10.4018/IJSWIS.297141
Export Reference
Published: Apr 15, 2022
Converted to Gold OA:
DOI: 10.4018/IJSWIS.297042
Volume 18
Meriem Ali Khoudja, Messaouda Fareh, Hafida Bouarfa
Ontology matching is an efficient method to establish interoperability among heterogeneous ontologies. Large-scale ontology matching still remains a big challenge for its long time and large memory...
Show More
Ontology matching is an efficient method to establish interoperability among heterogeneous ontologies. Large-scale ontology matching still remains a big challenge for its long time and large memory space consumption. The actual solution to this problem is ontology partitioning which is also challenging. This paper presents DeepOM, an ontology matching system to deal with this large-scale heterogeneity problem without partitioning using deep learning techniques. It consists on creating semantic embeddings for concepts of input ontologies using a reference ontology, and use them to train an auto-encoder in order to learn more accurate and less dimensional representations for concepts. The experimental results of its evaluation on large ontologies, and its comparison with different ontology matching systems which have participated to the same test challenge, are very encouraging with a precision score of 0.99. They demonstrate the higher efficiency of the proposed system to increase the performance of the large-scale ontology matching task.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Khoudja, Meriem Ali, et al. "Deep Embedding Learning With Auto-Encoder for Large-Scale Ontology Matching." IJSWIS vol.18, no.1 2022: pp.1-18. http://doi.org/10.4018/IJSWIS.297042
APA
Khoudja, M. A., Fareh, M., & Bouarfa, H. (2022). Deep Embedding Learning With Auto-Encoder for Large-Scale Ontology Matching. International Journal on Semantic Web and Information Systems (IJSWIS), 18(1), 1-18. http://doi.org/10.4018/IJSWIS.297042
Chicago
Khoudja, Meriem Ali, Messaouda Fareh, and Hafida Bouarfa. "Deep Embedding Learning With Auto-Encoder for Large-Scale Ontology Matching," International Journal on Semantic Web and Information Systems (IJSWIS) 18, no.1: 1-18. http://doi.org/10.4018/IJSWIS.297042
Export Reference
Published: Apr 15, 2022
Converted to Gold OA:
DOI: 10.4018/IJSWIS.297143
Volume 18
Anshuman Singh, Brij B. Gupta
The demand for Internet security has escalated in the last two decades because the rapid proliferation in the number of Internet users has presented attackers with new detrimental opportunities. One...
Show More
The demand for Internet security has escalated in the last two decades because the rapid proliferation in the number of Internet users has presented attackers with new detrimental opportunities. One of the simple yet powerful attack, lurking around the Internet today, is the Distributed Denial-of-Service (DDoS) attack. The expeditious surge in the collaborative environments, like IoT, cloud computing and SDN, have provided attackers with countless new avenues to benefit from the distributed nature of DDoS attacks. The attackers protect their anonymity by infecting distributed devices and utilizing them to create a bot army to constitute a large-scale attack. Thus, the development of an effective as well as efficient DDoS defense mechanism becomes an immediate goal. In this exposition, we present a DDoS threat analysis along with a few novel ground-breaking defense mechanisms proposed by various researchers for numerous domains. Further, we talk about popular performance metrics that evaluate the defense schemes. In the end, we list prevalent DDoS attack tools and open challenges.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Singh, Anshuman, and Brij B. Gupta. "Distributed Denial-of-Service (DDoS) Attacks and Defense Mechanisms in Various Web-Enabled Computing Platforms: Issues, Challenges, and Future Research Directions." IJSWIS vol.18, no.1 2022: pp.1-43. http://doi.org/10.4018/IJSWIS.297143
APA
Singh, A. & Gupta, B. B. (2022). Distributed Denial-of-Service (DDoS) Attacks and Defense Mechanisms in Various Web-Enabled Computing Platforms: Issues, Challenges, and Future Research Directions. International Journal on Semantic Web and Information Systems (IJSWIS), 18(1), 1-43. http://doi.org/10.4018/IJSWIS.297143
Chicago
Singh, Anshuman, and Brij B. Gupta. "Distributed Denial-of-Service (DDoS) Attacks and Defense Mechanisms in Various Web-Enabled Computing Platforms: Issues, Challenges, and Future Research Directions," International Journal on Semantic Web and Information Systems (IJSWIS) 18, no.1: 1-43. http://doi.org/10.4018/IJSWIS.297143
Export Reference
Published: Apr 22, 2022
Converted to Gold OA:
DOI: 10.4018/IJSWIS.297144
Volume 18
Yu Hao, Lingzhe Wang, Ying Liu, Jiulun Fan
The research proposes an innovated structure of the density map-based crowd counting network augmented by information entropy. The network comprises of a front-end network to extract features and a...
Show More
The research proposes an innovated structure of the density map-based crowd counting network augmented by information entropy. The network comprises of a front-end network to extract features and a back-end network to generate density maps. In order to validate the assumption that the entropy can boost the accuracy of density map generation, a multi-scale entropy map extraction process is imported into the front-end network along with a fine-tuned convolutional feature extraction process, In the back-end network, extracted features are decoded into the density map with a multi-column dilated convolution network. Finally, the decoded density map can be mapped as the estimated counting number. Experimental results indicate that the devised network is capable of accurately estimating the count in extremely high crowd density. Compared to similar structured networks which don’t adapt entropy feature, the proposed network exhibits higher performance. This result proves the feature of information entropy is capable of enhancing the efficiency of density map-based crowd counting approaches.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Hao, Yu, et al. "Information Entropy Augmented High Density Crowd Counting Network." IJSWIS vol.18, no.1 2022: pp.1-15. http://doi.org/10.4018/IJSWIS.297144
APA
Hao, Y., Wang, L., Liu, Y., & Fan, J. (2022). Information Entropy Augmented High Density Crowd Counting Network. International Journal on Semantic Web and Information Systems (IJSWIS), 18(1), 1-15. http://doi.org/10.4018/IJSWIS.297144
Chicago
Hao, Yu, et al. "Information Entropy Augmented High Density Crowd Counting Network," International Journal on Semantic Web and Information Systems (IJSWIS) 18, no.1: 1-15. http://doi.org/10.4018/IJSWIS.297144
Export Reference
Published: Apr 15, 2022
Converted to Gold OA:
DOI: 10.4018/IJSWIS.297145
Volume 18
Hong Qing Yu, Stephan Reiff-Marganiec
Health information becomes importantly valuable for protecting public health in the current coronavirus situation. Knowledge-based information systems can play a crucial role in helping individuals...
Show More
Health information becomes importantly valuable for protecting public health in the current coronavirus situation. Knowledge-based information systems can play a crucial role in helping individuals to practice risk assessment and remote diagnosis. We introduce a novel approach that will develop causality-focused knowledge learning in a robust and transparent manner. Then, the machine gains the causality and probability knowledge for inference (thinking) and accurate prediction later. Besides, the hidden knowledge can be discovered beyond the existing understanding of the diseases. The whole approach is built on a Causal Probability Description Logic Framework that combines Natural Language Processing (NLP), Causality Analysis and extended Knowledge Graph (KG) technologies together. The experimental work has processed 801 diseases in total (from the UK NHS website linking with DBpedia datasets). As a result, the machine learnt comprehensive health causal knowledge and relations among the diseases, symptoms, and other facts efficiently.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Yu, Hong Qing, and Stephan Reiff-Marganiec. "Learning Disease Causality Knowledge From the Web of Health Data." IJSWIS vol.18, no.1 2022: pp.1-19. http://doi.org/10.4018/IJSWIS.297145
APA
Yu, H. Q. & Reiff-Marganiec, S. (2022). Learning Disease Causality Knowledge From the Web of Health Data. International Journal on Semantic Web and Information Systems (IJSWIS), 18(1), 1-19. http://doi.org/10.4018/IJSWIS.297145
Chicago
Yu, Hong Qing, and Stephan Reiff-Marganiec. "Learning Disease Causality Knowledge From the Web of Health Data," International Journal on Semantic Web and Information Systems (IJSWIS) 18, no.1: 1-19. http://doi.org/10.4018/IJSWIS.297145
Export Reference
Published: Apr 15, 2022
Converted to Gold OA:
DOI: 10.4018/IJSWIS.297146
Volume 18
Pu Li, Tianci Li, Xin Wang, Suzhi Zhang, Yuncheng Jiang, Yong Tang
In a big data environment, traditional recommendation methods have limitations such as data sparseness and cold start, etc. In view of the rich semantics, excellent quality, and good structure of...
Show More
In a big data environment, traditional recommendation methods have limitations such as data sparseness and cold start, etc. In view of the rich semantics, excellent quality, and good structure of knowledge graphs, many researchers have introduced knowledge graphs into the research about recommendation systems, and studied interpretable recommendations based on knowledge graphs. Along this line, this paper proposes a scholar recommendation method based on the high-order propagation of knowledge graph (HoPKG), which analyzes the high-order semantic information in the knowledge graph, and generates richer entity representations to obtain users’ potential interest by distinguishing the importance of different entities. On this basis, a dual aggregation method of high-order propagation is proposed to enable entity information to be propagated more effectively. Through experimental analysis, compared with some baselines, such as Ripplenet, RKGE and CKE, our method has certain advantages in the evaluation indicators AUC and F1.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Li, Pu, et al. "Scholar Recommendation Based on High-Order Propagation of Knowledge Graphs." IJSWIS vol.18, no.1 2022: pp.1-19. http://doi.org/10.4018/IJSWIS.297146
APA
Li, P., Li, T., Wang, X., Zhang, S., Jiang, Y., & Tang, Y. (2022). Scholar Recommendation Based on High-Order Propagation of Knowledge Graphs. International Journal on Semantic Web and Information Systems (IJSWIS), 18(1), 1-19. http://doi.org/10.4018/IJSWIS.297146
Chicago
Li, Pu, et al. "Scholar Recommendation Based on High-Order Propagation of Knowledge Graphs," International Journal on Semantic Web and Information Systems (IJSWIS) 18, no.1: 1-19. http://doi.org/10.4018/IJSWIS.297146
Export Reference
Published: Feb 16, 2022
Converted to Gold OA:
DOI: 10.4018/IJSWIS.295551
Volume 18
Nguyen Thi Uyen Nhi, Thanh Manh Le, Thanh The Van
The problems of image mining and semantic image retrieval play an important role in many areas of life. In this paper, a semantic-based image retrieval system is proposed that relies on the...
Show More
The problems of image mining and semantic image retrieval play an important role in many areas of life. In this paper, a semantic-based image retrieval system is proposed that relies on the combination of C-Tree, which was built in our previous work, and a neighbor graph (called Graph-CTree) to improve accuracy. The k-Nearest Neighbor (k-NN) algorithm is used to classify a set of similar images that are retrieved on Graph-CTree to create a set of visual words. An ontology framework for images is created semi-automatically. SPARQL query is automatically generated from visual words and retrieve on ontology for semantics image. The experiment was performed on image datasets, such as COREL, WANG, ImageCLEF, and Stanford Dogs, with precision values of 0.888473, 0.766473, 0.839814, and 0.826416, respectively. These results are compared with related works on the same image dataset, showing the effectiveness of the methods proposed here.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Nhi, Nguyen Thi Uyen, et al. "A Model of Semantic-Based Image Retrieval Using C-Tree and Neighbor Graph." IJSWIS vol.18, no.1 2022: pp.1-23. http://doi.org/10.4018/IJSWIS.295551
APA
Nhi, N. T., Le, T. M., & Thanh The Van. (2022). A Model of Semantic-Based Image Retrieval Using C-Tree and Neighbor Graph. International Journal on Semantic Web and Information Systems (IJSWIS), 18(1), 1-23. http://doi.org/10.4018/IJSWIS.295551
Chicago
Nhi, Nguyen Thi Uyen, Thanh Manh Le, and Thanh The Van. "A Model of Semantic-Based Image Retrieval Using C-Tree and Neighbor Graph," International Journal on Semantic Web and Information Systems (IJSWIS) 18, no.1: 1-23. http://doi.org/10.4018/IJSWIS.295551
Export Reference
Published: Feb 17, 2022
Converted to Gold OA:
DOI: 10.4018/IJSWIS.295552
Volume 18
Nikolaos Stylianou, Danai Vlachava, Ioannis Konstantinidis, Nick Bassiliades, Vassilios Peristeras
Document Management Systems (DMS) are used for decades to store large amounts of information in textual form. Their technology paradigm is based on storing vast quantities of textual information...
Show More
Document Management Systems (DMS) are used for decades to store large amounts of information in textual form. Their technology paradigm is based on storing vast quantities of textual information enriched with metadata to support searchability. However, this exhibits limitations as it treats textual information as black box and is based exclusively on user-created metadata, a process that suffers from quality and completeness shortcomings. The use of knowledge graphs in DMS can substantially improve searchability, providing the ability to link data and enabling semantic searching. Recent approaches focus on either creating knowledge graphs from document collections or updating existing ones. In this paper, we introduce Doc2KG (Document-to-Knowledge-Graph), an intelligent framework that handles both creation and real-time updating of a knowledge graph, while also exploiting domain-specific ontology standards. We use DIAVGEIA (clarity), an award winning Greek open government portal, as our case-study and discuss new capabilities for the portal by implementing Doc2KG.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Stylianou, Nikolaos, et al. "Doc2KG: Transforming Document Repositories to Knowledge Graphs." IJSWIS vol.18, no.1 2022: pp.1-20. http://doi.org/10.4018/IJSWIS.295552
APA
Stylianou, N., Vlachava, D., Konstantinidis, I., Bassiliades, N., & Peristeras, V. (2022). Doc2KG: Transforming Document Repositories to Knowledge Graphs. International Journal on Semantic Web and Information Systems (IJSWIS), 18(1), 1-20. http://doi.org/10.4018/IJSWIS.295552
Chicago
Stylianou, Nikolaos, et al. "Doc2KG: Transforming Document Repositories to Knowledge Graphs," International Journal on Semantic Web and Information Systems (IJSWIS) 18, no.1: 1-20. http://doi.org/10.4018/IJSWIS.295552
Export Reference
Published: Feb 17, 2022
Converted to Gold OA:
DOI: 10.4018/IJSWIS.295553
Volume 18
Jitendra Vikram Tembhurne, Md. Moin Almin, Tausif Diwan
With the advancement of technology, social media has become a major source of digital news due to its global exposure. This has led to an increase in spreading fake news and misinformation online....
Show More
With the advancement of technology, social media has become a major source of digital news due to its global exposure. This has led to an increase in spreading fake news and misinformation online. Humans cannot differentiate fake news from real news because they can be easily influenced. A lot of research work has been conducted for detecting fake news using Artificial Intelligence and Machine Learning. A large number of deep learning models and their architectural variants have been investigated and many websites are utilizing these models directly or indirectly to detect fake news. However, state-of-the-arts demonstrate the limited accuracy in distinguishing fake news from the original news. We propose a multi-channel deep learning model namely Mc-DNN, leveraging and processing the news headlines and news articles along different channels for differentiating fake or real news. We achieve the highest accuracy of 99.23% on ISOT Fake News Dataset and 94.68% on Fake News Data for Mc-DNN. Thus, we highly recommend the use of Mc-DNN for fake news detection.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Tembhurne, Jitendra Vikram, et al. "Mc-DNN: Fake News Detection Using Multi-Channel Deep Neural Networks." IJSWIS vol.18, no.1 2022: pp.1-20. http://doi.org/10.4018/IJSWIS.295553
APA
Tembhurne, J. V., Almin, M. M., & Diwan, T. (2022). Mc-DNN: Fake News Detection Using Multi-Channel Deep Neural Networks. International Journal on Semantic Web and Information Systems (IJSWIS), 18(1), 1-20. http://doi.org/10.4018/IJSWIS.295553
Chicago
Tembhurne, Jitendra Vikram, Md. Moin Almin, and Tausif Diwan. "Mc-DNN: Fake News Detection Using Multi-Channel Deep Neural Networks," International Journal on Semantic Web and Information Systems (IJSWIS) 18, no.1: 1-20. http://doi.org/10.4018/IJSWIS.295553
Export Reference
Published: Mar 22, 2022
Converted to Gold OA:
DOI: 10.4018/IJSWIS.299859
Volume 18
Hani Sami Brdesee, Wafaa Alsaggaf, Naif Aljohani, Saeed-Ul Hassan
Student retention is a widely recognized challenge in the educational community to assist the institutes in the formation of appropriate and effective pedagogical interventions. This study intends...
Show More
Student retention is a widely recognized challenge in the educational community to assist the institutes in the formation of appropriate and effective pedagogical interventions. This study intends to predict the students at-risk of low performances during an on-going course, those at-risk of graduating late than the tentative timeline and predicting the capacity of students in a campus. The data constitutes of demographics, learning, academic and educational related attributes which are suitable to deploy various machine learning algorithms for the prediction of at-risk students. For class balancing, Synthetic Minority Over Sampling Technique, is also applied to eliminate the imbalance in the academic award-gap performances and late/timely graduates. Results reveal the effectiveness of the deployed techniques with Long short-term Memory (LSTM) outperforming other models for early prediction of at-risk students. The main contribution of this work is a machine learning approach capable of enhancing the academic decision making related to student performance.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Brdesee, Hani Sami, et al. "Predictive Model Using a Machine Learning Approach for Enhancing the Retention Rate of Students At-Risk." IJSWIS vol.18, no.1 2022: pp.1-21. http://doi.org/10.4018/IJSWIS.299859
APA
Brdesee, H. S., Alsaggaf, W., Aljohani, N., & Hassan, S. (2022). Predictive Model Using a Machine Learning Approach for Enhancing the Retention Rate of Students At-Risk. International Journal on Semantic Web and Information Systems (IJSWIS), 18(1), 1-21. http://doi.org/10.4018/IJSWIS.299859
Chicago
Brdesee, Hani Sami, et al. "Predictive Model Using a Machine Learning Approach for Enhancing the Retention Rate of Students At-Risk," International Journal on Semantic Web and Information Systems (IJSWIS) 18, no.1: 1-21. http://doi.org/10.4018/IJSWIS.299859
Export Reference
Published: Feb 22, 2022
Converted to Gold OA:
DOI: 10.4018/IJSWIS.295977
Volume 18
Armando Barbosa, Ig I. Bittencourt, Sean W. Siqueira, Diego Dermeval, Nicholas J. T. Cruz
Linking data by finding matching instances in different datasets requires considering many characteristics, such as structural heterogeneity, implicit knowledge, and URI (Uniform Resource...
Show More
Linking data by finding matching instances in different datasets requires considering many characteristics, such as structural heterogeneity, implicit knowledge, and URI (Uniform Resource Identifier)-oriented identification. The authors propose a context-independent approach to align Linked data through an alignment process based on the ontological model’s components and considering data’s multidimensionality. The researchers experimented with the proposed approach against two methods for aligning linked data in two datasets and evaluated precision, recall, and f-measure metrics. The authors also conducted a case study in a real scenario considering a Brazilian publication dataset on computers and education. This study’s results indicate that the proposed approach overcomes the other methods (regarding the precision, recall, and f-measure metrics), requiring less work when changing the dataset domain. This work’s main contributions include enabling real datasets to be semi-automatically linked, presenting an approach capable of calculating resource similarity.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Barbosa, Armando, et al. "A Context-Independent Ontological Linked Data Alignment Approach to Instance Matching." IJSWIS vol.18, no.1 2022: pp.1-29. http://doi.org/10.4018/IJSWIS.295977
APA
Barbosa, A., Bittencourt, I. I., Siqueira, S. W., Dermeval, D., & Cruz, N. J. (2022). A Context-Independent Ontological Linked Data Alignment Approach to Instance Matching. International Journal on Semantic Web and Information Systems (IJSWIS), 18(1), 1-29. http://doi.org/10.4018/IJSWIS.295977
Chicago
Barbosa, Armando, et al. "A Context-Independent Ontological Linked Data Alignment Approach to Instance Matching," International Journal on Semantic Web and Information Systems (IJSWIS) 18, no.1: 1-29. http://doi.org/10.4018/IJSWIS.295977
Export Reference
IGI Global Open Access Collection provides all of IGI Global’s open access content in one convenient location and user-friendly interface
that can easily searched or integrated into library discovery systems.
Browse IGI Global Open
Access Collection
All inquiries regarding IJSWIS should be directed to the attention of:
Submission-Related InquiriesAll inquiries regarding IJSWIS should be directed to the attention of:
Brij Gupta
Editor-in-Chief
International Journal on Semantic Web and Information Systems (IJSWIS)
Email:
gupta.brij@gmail.comAuthor Services Inquiries
For inquiries involving pre-submission concerns, please contact the Journal Development Division:
journaleditor@igi-global.comOpen Access Inquiries
For inquiries involving publishing costs, APCs, etc., please contact the Open Access Division:
openaccessadmin@igi-global.comProduction-Related Inquiries
For inquiries involving accepted manuscripts currently in production or post-production, please contact the Journal Production Division:
journalproofing@igi-global.comRights and Permissions Inquiries
For inquiries involving permissions, rights, and reuse, please contact the Intellectual Property & Contracts Division:
contracts@igi-global.comPublication-Related Inquiries
For inquiries involving journal publishing, please contact the Acquisitions Division:
acquisition@igi-global.comDiscoverability Inquiries
For inquiries involving sharing, promoting, and indexing of manuscripts, please contact the Citation Metrics & Indexing Division:
indexing@igi-global.com Editorial Office
701 E. Chocolate Ave.
Hershey, PA 17033, USA
717-533-8845 x100