International Journal of Information Technology and Web Engineering
Latest Publications


TOTAL DOCUMENTS

299
(FIVE YEARS 61)

H-INDEX

11
(FIVE YEARS 3)

Published By Igi Global

1554-1053, 1554-1045

Author(s):  
Nan Yan ◽  
Subin Huang ◽  
Chao Kong

Discovering entity synonymous relations is an important work for many entity-based applications. Existing entity synonymous relation extraction approaches are mainly based on lexical patterns or distributional corpus-level statistics, ignoring the context semantics between entities. For example, the contexts around ''apple'' determine whether ''apple'' is a kind of fruit or Apple Inc. In this paper, an entity synonymous relation extraction approach is proposed using context-aware permutation invariance. Specifically, a triplet network is used to obtain the permutation invariance between the entities to learn whether two given entities possess synonymous relation. To track more synonymous features, the relational context semantics and entity representations are integrated into the triplet network, which can improve the performance of extracting entity synonymous relations. The proposed approach is implemented on three real-world datasets. Experimental results demonstrate that the approach performs better than the other compared approaches on entity synonymous relation extraction task.


Author(s):  
Yaojie Wang ◽  
Xiaolong Cui ◽  
Peiyong He

From the perspective of counter-terrorism strategies, terrorist risk assessment has become an important approach for counter-terrorism early warning research. Combining with the characteristics of known terrorists, a quantitative analysis method of active risk assessment method with terrorists as the research object is proposed. This assessment method introduces deep learning algorithms into social computing problems on the basis of information coding technology. We design a special "Top-k" algorithm to screen the terrorism related features, and optimize the evaluation model through convolution neural network, so as to determine the risk level of terrorist suspects. This study provides important research ideas for counter-terrorism assessment, and verifies the feasibility and accuracy of the proposed scheme through a number of experiments, which greatly improves the efficiency of counter-terrorism early warning.


Author(s):  
Bingchun Liu ◽  
Xiaogang Yu ◽  
Qingshan Wang ◽  
Shijie Zhao ◽  
Lei Zhang

NO2 pollution has caused serious impact on people's production and life, and the management task is very difficult. Accurate prediction of NO2 concentration is of great significance for air pollution management. In this paper, a NO2 concentration prediction model based on long short-term memory neural network (LSTM) is constructed with daily NO2 concentration in Beijing as the prediction target and atmospheric pollutants and meteorological factors as the input indicators. Firstly, the parameters and architecture of the model are adjusted to obtain the optimal prediction model. Secondly, three different sets of input indicators are built on the basis of the optimal prediction model to enter the model learning. Finally, the impact of different input indicators on the accuracy of the model is judged. The results show that the LSTM model has high application value in NO2 concentration prediction. The maximum temperature and O3 among the three input indicators improve the prediction accuracy while the NO2 historical low-frequency data reduce the prediction accuracy.


Author(s):  
Abha Kumari ◽  
C. B. Vishwakarma

Order reduction of the large-scale linear dynamic systems (LSLDSs) using stability equation technique mixed with the conventional and evolutionary techniques is presented in the paper. The reduced system (RS) is obtained by mixing the advantages of the two methods. For the conventional technique, the numerator of the RS is achieved by using the Pade approximations and improved Pade approximations, whereas the denominator is obtained by the stability equation technique (SET). For the evolutionary technique, numerator of the RS is obtained by minimizing the integral square error (ISE) between transient responses of the original and the RS using the genetic algorithm (GA), and the denominator is obtained by the stability equation method. The proposed RS retains almost all the essential properties of the original system (OS). The viability of the proposed technique is proved by comparing its time, frequency responses, time domain specifications, and ISE with the new and popular methods available in the literature.


Author(s):  
kamel Ahsene Djaballah ◽  
Kamel Boukhalfa ◽  
Omar Boussaid ◽  
Yassine Ramdane

Social networks are used by terrorist groups and people who support them to propagate their ideas, ideologies, or doctrines and share their views on terrorism. To analyze tweets related to terrorism, several studies have been proposed in the literature. Some works rely on data mining algorithms; others use lexicon-based or machine learning sentiment analysis. Some recent works adopt other methods that combine multi-techniques. This paper proposes an improved approach for sentiment analysis of radical content related to terrorist activity on Twitter. Unlike other solutions, the proposed approach focuses on using a dictionary of weighted terms, the Word2vec method, and trigrams, with a classification based on fuzzy logic. The authors have conducted experiments with 600 manually annotated tweets and 200,000 automatically collected tweets in English and Arabic to evaluate this approach. The experimental results revealed that the new technique provides between 75% to 78% of precision for radicality detection and 61% to 64% to detect radicality degrees.


Author(s):  
Sandeep Kumar Bothra ◽  
Sunita Singhal ◽  
Hemlata Goyal

Resource scheduling in a cloud computing environment is noteworthy for scientific workflow execution under a cost-effective deadline constraint. Although various researchers have proposed to resolve this critical issue by applying various meta-heuristic and heuristic approaches, no one is able to meet the strict deadline conditions with load-balanced among machines. This article has proposed an improved genetic algorithm that initializes the population with a greedy strategy. Greedy strategy assigns the task to a virtual machine that is under loaded instead of assigning the tasks randomly to a machine. In general workflow scheduling, task dependency is tested after each crossover and mutation operators of genetic algorithm, but here the authors perform after the mutation operation only which yield better results. The proposed model also considered booting time and performance variation of virtual machines. The authors compared the algorithm with previously developed heuristics and metaheuristics both and found it increases hit rate and load balance. It also reduces execution time and cost.


Author(s):  
Srilakshmi R. ◽  
Jaya Bhaskar M.

Mobile ad-hoc network (MANET) is a trending field in the smart digital world; it is effectively utilized for communication sharing purposes. Besides this communication, it has numerous advances like a personal computer. However, the packet drop and low throughput ratio became serious issues. Several algorithms are implemented to increase the throughput ratio by developing multipath routing. But in some cases, the multipath routing ends in routing overhead and takes more time to transfer the data because of data load in the same path. To end this problem, this research aimed to develop a novel temporary ordered route energy migration (TOREM). Here, the migration approach balanced the data load equally and enhanced the communication channel; also, the reference node creation strategy reduced the routing overhead and packet drop ratio. Finally, the outcome of the proposed model is validated with recent existing works and earned better results by minimizing packet drop and maximizing throughput ratio.


Author(s):  
Pajany M. ◽  
Zayaraz G.

In this paper, an efficient lightweight cloud-based data security model (LCDS) is proposed for building a secured cloud database with the assistance of intelligent rules, data storage, information collection, and security techniques. The major intention of this study is to introduce a new encryption algorithm to secure intellectual data, proposing a new data aggregation algorithm for effective data storage and improved security, developing an intelligent data merging algorithm for accessing encrypted and original datasets. The major benefit of the proposed model is that it is fast in the encryption process at the time of data storage and reduced decryption time during data retrieval. In this work, the authors proposed an enhanced version of the hybrid crypto algorithm (HCA) for cloud data access and storage. The proposed system provides secured storage for storing data within the cloud.


Author(s):  
Manvi Breja ◽  
Sanjay Kumar Jain

Why-type non-factoid questions are complex and difficult to answer compared to factoid questions. A challenge in finding an accurate answer to a non-factoid question is to understand the intent of user as it differs with their knowledge and also the context of the question in which it is being asked. Predicting correct type of a question and its answer by a classification model is an important issue as it affects the subsequent processing of its answer. In this paper, a classification model is proposed which is trained by a combination of lexical, syntactic, and semantic features to classify open-domain why-type questions. Various supervised classifiers are trained on a featured dataset out of which support vector machine achieves the highest accuracy of 81% in determining question type and 76.8% in determining answer type which shows 14.6% improvement in predicting an answer type over a baseline why-type classifier with 62.2% accuracy.


Author(s):  
Kartik Goel ◽  
Charu Gupta ◽  
Ria Rawal ◽  
Prateek Agrawal ◽  
Vishu Madaan

COVID-19 has affected people in nearly 180 countries worldwide. This paper presents a novel and improved Semantic Web-based approach for implementing the disease pattern of COVID-19. Semantics gives meaning to words and defines the purpose of words in a sentence. Previous ontology approaches revolved around syntactic methods. In this paper, semantics gives due priority to understand the nature and meaning of the underlying text. The proposed approach, FaD-CODS, focuses on a specific application of fake news detection. The formal definition is given by depiction of knowledge patterns using semantic reasoning. The proposed approach based on fake news detection uses description logic for semantic reasoning. FaD-CODS will affect decision making in medicine and healthcare. Further, the state-of-the-art method performs best for semantic text incorporated in the model. FaD-CODS used a reasoning tool, RACER, to check the consistency of the collected study. Further, the reasoning tool performance is critically analyzed to determine the conflicts between a myth and fact.


Sign in / Sign up

Export Citation Format

Share Document