Mobile Novelty Mining

Author(s):  
Agus T. Kwee ◽  
Flora S. Tsai

Service-oriented Web applications allow users to exploit applications over networks and access them from a remote system at the client side, including mobile phones. Individual services are built separately with comprehensive functionalities. In this article, the authors transform a standalone offline novelty mining application into a service-oriented application and allow users to access it over the Internet. A novelty mining application mines the novel, yet relevant, information on a topic specified by users. In this article, the authors propose a design for a service-oriented novelty mining application. After deploying their service-oriented novelty mining system on a server, use case scenarios are provided to demonstrate the system. The authors’ service-oriented novelty mining system increases the efficiency of gathering novel information from incoming streams of texts on their mobile devices for users.

Author(s):  
Agus T. Kwee ◽  
Flora S. Tsai

Service-oriented Web applications allow users to exploit applications over networks and access them from a remote system at the client side, including mobile phones. Individual services are built separately with comprehensive functionalities. In this article, the authors transform a standalone offline novelty mining application into a service-oriented application and allow users to access it over the Internet. A novelty mining application mines the novel, yet relevant, information on a topic specified by users. In this article, the authors propose a design for a service-oriented novelty mining application. After deploying their service-oriented novelty mining system on a server, use case scenarios are provided to demonstrate the system. The authors’ service-oriented novelty mining system increases the efficiency of gathering novel information from incoming streams of texts on their mobile devices for users.


2014 ◽  
Vol 29 (2) ◽  
pp. 234-247
Author(s):  
Flora S. Tsai ◽  
Agus T. Kwee

AbstractInformation services facilitate users to exploit applications over the network and access them from the remote system at the client side. In this paper, we describe the design and development of information services for novelty mining, which allows users to access the novel yet relevant information of a given topic. Several methodologies regarding novelty mining such as novelty scoring, novelty threshold, novelty feedback, and document-to-sentence technique are described. In addition to Web services, mobile information services are also described. Modelling and implementing information services for novelty mining are especially useful for users to reduce their information overload. We describe the challenging issue of decomposing the complex novelty mining application into several smaller and simpler modules, which are later implemented as services on the Web as well as mobile devices. After deploying our information services for novelty mining, test cases are provided to demonstrate the system. Our information services for novelty mining are confirmed to be helpful in increasing the efficiency of enterprise users in gathering novel information from incoming text. By studying the design and development of information services for novelty mining, we can benefit other developers in investigating effective techniques for developing enterprise services for other real-world applications.


2011 ◽  
pp. 830-847
Author(s):  
Maozhen Li ◽  
Bin Yu ◽  
Vijay Sahota ◽  
Man Qi

Web services are emerging as a major technology for building service-oriented distributed systems. Potentially, various resources on the Internet can be virtualized as Web services for a wider use by their communities. Service discovery becomes an issue of vital importance for Web services applications. This article presents ROSSE, a Rough Sets based Search Engine for Web service discovery. One salient feature of ROSSE lies in its capability to deal with uncertainty of service properties when matching services. A use case is presented to demonstrate the use of ROSSE for discovery of car services. ROSSE is evaluated in terms of its accuracy and efficiency in service discovery.


2021 ◽  
Vol 9 (12) ◽  
pp. 38-44
Author(s):  
Viola Kirui ◽  
◽  
Agnes Nkurumwa ◽  
Justus Ombati ◽  
◽  
...  

Smallholder farmers in Kenya are faced with low agricultural productivity which has been attributed toa number of factors among them being lack of access to agricultural information. This has been further exacerbated by shrinking number of public extension staff and underfunding of the extension system in the country. ICTs can play a crucial role in bridging this gap. This study determined ICTs accessed, and the extent of use of the ICTs to access e-Extension services among smallholder farmers in Nakuru county, Kenya. Data was collected from randomly selected sample of 130 smallholder farmers in a descriptive survey, using structured questionnaires and focus group discussions. Over 70 percent of the respondents had access to mobile phones, radio and TV while only 27.7 percent had access to the internet. The respondents that had access to YouTube, twitter and computers however, were less than 20 percent. The findings of the study revealed that mobile phones, radio and TV were the most accessed and utilized ICT tools in accessing e-Extension services among smallholder farmers.Social media platforms such as WhatsApp and Facebook were on average used by the farmers to access e-Extension services while computers and twitter were the least used.The findings further revealed that e-Extension services that were most sought for by the farmers included production, market, pest and disease information.The major constraints in the use of ICTs tools in accessing e-Extension services were reported to include lack of ICTs such as computers and the internet, lack of awareness of availability of e-Extension services, lack of relevant information and lack of infrastructure such as electricity. The study concludes that accessible ICTs could be used to supplement other extension methods. There is need for improving access to ICTs particularly the internet and computers and creating awareness on use of platforms such as YouTube, Twitter and Farmer Call Centres in accessing agricultultural information among farmers.


Author(s):  
Maozhen Li ◽  
Bin Yu ◽  
Vijay Sahota ◽  
Man Qi

Web services are emerging as a major technology for building service-oriented distributed systems. Potentially, various resources on the Internet can be virtualized as Web services for a wider use by their communities. Service discovery becomes an issue of vital importance for Web services applications. This paper presents ROSSE, a Rough Sets based Search Engine for Web service discovery. One salient feature of ROSSE lies in its capability to deal with uncertainty of service properties when matching services. A use case is presented to demonstrate the use of ROSSE for discovery of car services. ROSSE is evaluated in terms of its accuracy and efficiency in service discovery.


Metahumaniora ◽  
2018 ◽  
Vol 8 (3) ◽  
pp. 300
Author(s):  
Tania Intan ◽  
Trisna Gumilar

AbstrakPenelitian ini bertujuan untuk (1) mendekripsikan tanggapan pembaca terhadap novel Le Petit Prince (2) mendeskripsikan horizon harapan pembaca terhadap novel Le Petit Prince, dan (3) mendeskripsikan faktor-faktor penyebab perbedaan tanggapan dan horizon harapan pembaca. Penelitian ini termasuk jenis penelitian deskriptif kualitatif. Data penelitian berupa teks yang memuat tanggapan pembaca novel Le Petit Princeyang terdiri dari 20 orang, sedangkan sumber datanya berupa artikel dan makalah yang dimuat di media massa cetak dan elektronik termasuk internet. Instrumen penelitian berupa seperangkat konsep tentang pembaca, tanggapan pembaca, dan horizon harapan. Teknik pengumpulan data dengan cara observasi dan data dianalisis dengan menggunakan teknik deskriptif kualitatif. Hasil penelitian yang didapat sebagai berikut. (1) Seluruh pembaca menanggapi atau menilai positif unsur tema, alur, tokoh, latar, sudut pandang, gaya bahasa, teknik penceritaan, bahasa, dan isi novel Le Petit Prince. (2) Harapan sebagian besar pembaca sebelum membaca novel Le Petit Prince sesuai dengan kenyataan ke sembilan unsur di dalam novel Le Petit Prince, sehingga pembaca dapat dengan mudah menerima dan memberikan pujian pada novel Le Petit Prince. (3) Faktor penyebab perbedaan tanggapan dan horizon harapan pembaca selain perbedaan stressing unsur yang ditanggapi juga karena perbedaan pengetahuan tentang sastra, pengetahuan tentang kehidupan, dan pengalaman membaca karya sastra.Kata kunci: tanggapan pembaca, horizon harapan, Le Petit PrinceAbstractThis study aims to (1) describe reader’s responses to the novel Le Petit Prince (2) to describe the reader's expectations horizon of Le Petit Prince's novel, and (3) to describe the factors causing differences in responses and the horizon of readers' expectations. This research is a descriptive qualitative research type. The research data consist of a set of paragraphs that contains readers' responses to Le Petit Prince's novel, while the data sources are articles and papers published in print and electronic mass media including the internet. The research instruments are a set of reader concepts, reader responses, and expectations horizon. The technique of collecting data is observation and data are analyzed by using qualitative descriptive technique. The results obtained are as follow: (1) All readers respond and valuethe theme elements,plots, characters, background, point of view, language, titles, storytelling techniques, language, and extrinsic novel Le Petit Prince positively. (2) The expectations of most readers before reading Le Petit Prince's novels are in accordance with the nine facts in Le Petit Prince's novel, so readers can easily accept and give prise to Le Petit Prince's novel. (3) Factors causing differences in responses and horizon of readers' expectations other than the stressing differences of the elements being addressed also due to the differences in knowledge of literature, knowledge of life and literary reading experience. Keywords: readers responses, expectations horizon, Le Petit Prince


Author(s):  
Aleksey V. Kutuzov

The article substantiates the need to use Internet monitoring as a priority source of information in countering extremism. Various approaches to understanding the defi nition of the category of «operational search», «law enforcement» monitoring of the Internet are analysed, the theoretical development of the implementation of this category in the science of operational search is investigated. The goals and subjects of law enforcement monitoring are identifi ed. The main attention is paid to the legal basis for the use of Internet monitoring in the detection and investigation of extremist crimes. In the course of the study hermeneutic, formal-logical, logical-legal and comparative-legal methods were employed, which were used both individually and collectively in the analysis of legal norms, achievements of science and practice, and development of proposals to refi ne the conduct of operational-search measures on the Internet when solving extremist crimes. The author’s defi nition of «operational-search monitoring» of the Internet is provided. Proposals have been made to improve the activities of police units when conducting monitoring of the Internet in the context of the search for relevant information to the disclosure and investigation of crimes of that category.


Author(s):  
Kostyantyn Kharchenko

The approach to organizing the automated calculations’ execution process using the web services (in particular, REST-services) is reviewed. The given solution will simplify the procedure of introduction of the new functionality in applied systems built according to the service-oriented architecture and microservice architecture principles. The main idea of the proposed solution is in maximum division of the server-side logic development and the client-side logic, when clients are used to set the abstract computation goals without any dependencies to existing applied services. It is proposed to rely on the centralized scheme to organize the computations (named as orchestration) and to put to the knowledge base the set of rules used to build (in multiple steps) the concrete computational scenario from the abstract goal. It is proposed to include the computing task’s execution subsystem to the software architecture of the applied system. This subsystem is composed of the service which is processing the incoming requests for execution, the service registry and the orchestration service. The clients send requests to the execution subsystem without any references to the real-world services to be called. The service registry searches the knowledge base for the corresponding input request template, then the abstract operation description search for the request template is performed. Each abstract operation may already have its implementation in the form of workflow composed of invocations of the real applied services’ operations. In case of absence of the corresponding workflow in the database, this workflow implementation could be synthesized dynamically according to the input and output data and the functionality description of the abstract operation and registered applied services. The workflows are executed by the orchestrator service. Thus, adding some new functions to the client side can be possible without any changes at the server side. And vice versa, adding new services can impact the execution of the calculations without updating the clients.


Author(s):  
M. Athar Naeem ◽  
Usman Waheed ◽  
Syed Furqan Ali Raza

<h1><span>Correctness means that application planned tasks as defined by its specification. This<br /><span>research paper conversing that if poor requirements are not executed in the application<br /><span>there is some difficult existing in the application. Some other resembling problems like<br /><span>ambiguous requirements and inappropriate constraints also exist in the application. For<br /><span>these problems some solution techniques provided like documentation, verifying<br /><span>techniques of requirements, and use case of completeness validation.</span></span></span></span></span><br /><br class="Apple-interchange-newline" /></span></h1>


Sign in / Sign up

Export Citation Format

Share Document