Building an Active Content Warehouse

Author(s):  
Serge Abiteboul ◽  
Benjamin Nguyen ◽  
Gabriela Ruberg

Non-quantitative content represents a large part of the information available nowadays, such as Web pages, e-mails, metadata about photos, etc. In order to manage this new type of information, we introduce the concept of content warehousing, the management of loosely structured data. The construction and maintenance of a content warehouse is an intricate task, involving many aspects such as feeding, cleaning and enriching semi-structured data. In this chapter, we introduce the Acware (for active content warehouse) specification language, whose goal is to help all sorts of users to organize content in a simple manner. The problem we are faced with is the following: The data are semi-structured, and the operations to be executed on this data may be of any sort. Therefore, we base our approach on XML to represent the data, and Web Services, as genericcomponents that can be tailored to specific applicative needs. In particular, we discuss the specification of mappings between the warehouse data and the parameters/results of services that are used to acquire and enrich the content. From the implementation point of view, an Acware specification of a content warehouse is compiled into a set of Active XML documents, i.e., XML documents with embedded Web service calls. These Active XML documents are then used to build and maintain the warehouse using the Active XML runtime environment. We illustrate the approach with a particular application drawn from microbiology and developed in the context of the French RNTL e.dot project.

Author(s):  
Ang Jin Sheng Et.al

XML has numerous uses in a wide variety of web pages and applications. Some common uses of XML include tasks for web publishing, web searching and automation, and general application such as for utilize, store, transfer and display business process log data. The amount of information expressed in XML has gone up rapidly. Many works have been done on sensible approaches to address issues related to the handling and review of XML documents. Mining XML documents offera way to understand both the structure and the content of XML documents. A common approach capable of analysing XML documents is frequent subtree mining.Frequent subtree mining is one of the data mining techniques that finds the relationship between transactions in a tree structured database. Due to the structure and the content of XML format, traditional data mining and statistical analysis hardly applied to get accurate result. This paper proposes a framework that can flatten a tree structured data into a flat and structured data, while preserving their structure and content.Enabling these XML documents into relational structured data allows a range of data mining techniques and statistical test can be applied and conducted to extract more information from the business process log.


Author(s):  
Debmalya Biswas ◽  
Il-Gon Kim

Active XML (AXML) provides an elegant platform to integrate the power of XML, Web services and Peer to Peer (P2P) paradigms by allowing (active) Web service calls to be embedded within XML documents. In this chapter, the authors present some interesting aspects encountered while investigating a transactional framework for AXML systems. They present an integrated locking protocol for the scenario where the structure of both data and transactions are nested. They show how to construct the undo operations dynamically, and outline an algorithm to compute a correct optimum undo order in the presence of nesting and parallelism. Finally, to overcome the inherent problem of peer disconnection, the authors propose an innovative solution based on ”chaining” the active peers for early detection and recovery from peer disconnection.


Information ◽  
2020 ◽  
Vol 12 (1) ◽  
pp. 13
Author(s):  
Thierry Bellet ◽  
Aurélie Banet ◽  
Marie Petiot ◽  
Bertrand Richard ◽  
Joshua Quick

This article is about the Human-Centered Design (HCD), development and evaluation of an Artificial Intelligence (AI) algorithm aiming to support an adaptive management of Human-Machine Transition (HMT) between car drivers and vehicle automation. The general principle of this algorithm is to monitor (1) the drivers’ behaviors and (2) the situational criticality to manage in real time the Human-Machine Interactions (HMI). This Human-Centered AI (HCAI) approach was designed from real drivers’ needs, difficulties and errors observed at the wheel of an instrumented car. Then, the HCAI algorithm was integrated into demonstrators of Advanced Driving Aid Systems (ADAS) implemented on a driving simulator (dedicated to highway driving or to urban intersection crossing). Finally, user tests were carried out to support their evaluation from the end-users point of view. Thirty participants were invited to practically experience these ADAS supported by the HCAI algorithm. To increase the scope of this evaluation, driving simulator experiments were implemented among three groups of 10 participants, corresponding to three highly contrasted profiles of end-users, having respectively a positive, neutral or reluctant attitude towards vehicle automation. After having introduced the research context and presented the HCAI algorithm designed to contextually manage HMT with vehicle automation, the main results collected among these three profiles of future potential end users are presented. In brief, main findings confirm the efficiency and the effectiveness of the HCAI algorithm, its benefits regarding drivers’ satisfaction, and the high levels of acceptance, perceived utility, usability and attractiveness of this new type of “adaptive vehicle automation”.


2021 ◽  
Vol 13 (2) ◽  
pp. 208-222
Author(s):  
Nadezhda O. Bleich ◽  

The article is devoted to the consideration of the worldview positions of famous educators of the past century regarding the state of school education among Muslims of the North Caucasus region. It is proved that the enlighteners advocated the creation of a new type of national non-class school and the construction of the didactic foundations of the educational process in it. The novelty of the work is that, based on the analysis of the views of the advanced intelligentsia of the region, aimed at understanding the current socio-cultural situation, an attempt was made to scientifically understand the problems and prospects for the development of the Muslim educational system of the past from the point of view of the modern scientific paradigm. The practical significance of the publication lies in expanding the understanding of the system of Mohammedan education in the context of its historical heritage, which will help to comprehend modern problems associated with the reform of general and vocational education in the national Muslim republics.


2016 ◽  
Vol 44 ◽  
pp. 01067
Author(s):  
Wen Qi Huang ◽  
Hua Jun Chen ◽  
Xiao Bin Guo ◽  
Li Peng
Keyword(s):  

Matatu ◽  
2017 ◽  
Vol 49 (2) ◽  
pp. 400-415
Author(s):  
Maurice Taonezvi Vambe

Abstract Recent surges and advances in the popular use of electronic technology such as Internet, email, iPad, iPhone, and touch-screens in Africa have opened up great communicative possibilities among ordinary people whose voices were previously marginalized in traditional elitist media. People far apart geographically and living in different times can communicate rapidly and with great ease. This technological revolution has challenged and broken down boundaries of dependence on television, newspapers, and novels, the traditional forms of communication. It is now possible to upload a novel onto an iPad and read it as one moves from place to place. The burden of carrying hard copies is relieved but not eradicated; in most African countries, including Zimbabwe (the centre of focus in the present article), the creative work of art or hard copy of a novel is still relied upon as source of information. There are creative, experimental innovations in the novel form in Zimbabwe which to some extent can justify one’s speaking of a hypertextual novel. This new type of novel incorporates multiple narratives, and sometimes deliberately uses genres such as the email form as a constitutive narrative style that confirms as well as destabilizes previous assumptions of single coherent stories told from one point of view. Using the concepts of hypertextuality, intertextuality, and Bakhtin’s notions of carnivalesque and heteroglossia in speech and written utterances, this article reconsiders the implications of the presence of ideologies of hypertextuality in one novel from Zimbabwe, Nyaradzo Mtizira’s The Chimurenga Protocol (2008). The article argues that the multiplicity of narratives constitutes the hypertextual dimension of the novelistic form.


2002 ◽  
Vol 16 (20n22) ◽  
pp. 3258-3264 ◽  
Author(s):  
S. A. GRIGERA ◽  
A. P. MACKENZIE ◽  
A. J. SCHOFIELD ◽  
S. R. JULIAN ◽  
G. G. LONZARICH

In this paper, we discuss the concept of a metamagnetic quantum critical end-point, consequence of the depression to zero temperature of a critical end-point terminating a line of first order first transitions. This new type of quantum critical point (QCP) is interesting both from a fundamental point of view: a study of a symmetry conserving QCP, and because it opens the possibility of the use of symmetry breaking tuning parameters, notably the magnetic field. In addition, we discuss the experimental evidence for the existence of such a QCP in the bilayer ruthenate Sr3Ru2O7.


2021 ◽  
Vol 9 (SPE2) ◽  
Author(s):  
Svetlana Strokina ◽  
Lenie Taymazova ◽  
Elvina Useinova ◽  
Ruslan Adonin

1922-1924 was a fruitful period of Maxim Gorky's literature work. It is related to searching a new art form. The cycle “Stories of 1922-1924” is an expressive example of “new prose”. For the first time, the hermit character appeared in the cycle “Stories of 1922-1924”. From the point of view of generally recognized morality and the Church, the new type of character is ambiguous. It is characterized by both sinfulness and holiness.


Author(s):  
Anton Michlmayr ◽  
Florian Rosenberg ◽  
Philipp Leitner ◽  
Schahram Dustdar

In general, provenance describes the origin and well-documented history of a given object. This notion has been applied in information systems, mainly to provide data provenance of scientific workflows. Similar to this, provenance in Service-oriented Computing has also focused on data provenance. However, the authors argue that in service-centric systems the origin and history of services is equally important. This paper presents an approach that addresses service provenance. The authors show how service provenance information can be collected and retrieved, and how security mechanisms guarantee integrity and access to this information, while also providing user-specific views on provenance. Finally, the paper gives a performance evaluation of the authors’ approach, which has been integrated into the VRESCo Web service runtime environment.


2022 ◽  
Vol 12 (1) ◽  
pp. 1-18
Author(s):  
Umamageswari Kumaresan ◽  
Kalpana Ramanujam

The intent of this research is to come up with an automated web scraping system which is capable of extracting structured data records embedded in semi-structured web pages. Most of the automated extraction techniques in the literature captures repeated pattern among a set of similarly structured web pages, thereby deducing the template used for the generation of those web pages and then data records extraction is done. All of these techniques exploit computationally intensive operations such as string pattern matching or DOM tree matching and then perform manual labeling of extracted data records. The technique discussed in this paper departs from the state-of-the-art approaches by determining informative sections in the web page through repetition of informative content rather than syntactic structure. From the experiments, it is clear that the system has identified data rich region with 100% precision for web sites belonging to different domains. The experiments conducted on the real world web sites prove the effectiveness and versatility of the proposed approach.


Sign in / Sign up

Export Citation Format

Share Document