Published: Jan 20, 2023
Converted to Gold OA:
DOI: 10.4018/IJSWIS.316535
Volume 19
Taehan Kim, Wonzoo Chung
In this study, a novel top-K ranking recommendation method called collaborative social metric learning (CSML) is proposed, which implements a trust network that provides both user-item and user-user...
Show More
In this study, a novel top-K ranking recommendation method called collaborative social metric learning (CSML) is proposed, which implements a trust network that provides both user-item and user-user interactions in simple structure. Most existing recommender systems adopting trust networks focus on item ratings, but this does not always guarantee optimal top-K ranking prediction. Conventional direct ranking systems in trust networks are based on sub-optimal correlation approaches that do not consider item-item relations. The proposed CSML algorithm utilizes the metric learning method to directly predict the top-K items in a trust network. A new triplet loss is further proposed, called socio-centric loss, which represents user-user interactions to fully exploit the information contained in a trust network, as an addition to the two commonly used triplet losses in metric learning for recommender systems, which consider user-item and item-item relations. Experimental results demonstrate that the proposed CSML outperformed existing recommender systems for real-world trust network data.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Kim, Taehan, and Wonzoo Chung. "Collaborative Social Metric Learning in Trust Network for Recommender Systems." IJSWIS vol.19, no.1 2023: pp.1-15. http://doi.org/10.4018/IJSWIS.316535
APA
Kim, T. & Chung, W. (2023). Collaborative Social Metric Learning in Trust Network for Recommender Systems. International Journal on Semantic Web and Information Systems (IJSWIS), 19(1), 1-15. http://doi.org/10.4018/IJSWIS.316535
Chicago
Kim, Taehan, and Wonzoo Chung. "Collaborative Social Metric Learning in Trust Network for Recommender Systems," International Journal on Semantic Web and Information Systems (IJSWIS) 19, no.1: 1-15. http://doi.org/10.4018/IJSWIS.316535
Export Reference
Published: Feb 10, 2023
Converted to Gold OA:
DOI: 10.4018/IJSWIS.317928
Volume 19
Jian Li, Xiaobo Zhang, Bin Ma, Meihong Yang, Chunpeng Wang, Yang Liu, Xinan Cui, Xiaotong Yang
The photo response non-uniformity (PRNU) is used to connect an image to its source sensor. In this paper, researchers propose a PRNU anonymity method based on image segmentation to cut the...
Show More
The photo response non-uniformity (PRNU) is used to connect an image to its source sensor. In this paper, researchers propose a PRNU anonymity method based on image segmentation to cut the relationship between the image and its source camera. According to the distribution rule of PRNU in the high and low frequency band of the image, the high and low frequency information of the part is also processed differently, which ensures the quality of the output image to a large extent. Experiments on the datasets show that the proposed method can preserve the biometric characteristics of the device while maintaining the anonymity of the device. Comparing with prior art, peak signal to noise ratio (PSNR) and cosine similarity are improved by 1.9 dB and 0.02 points, respectively.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Li, Jian, et al. "PRNU Anonymous Algorithm Used for Privacy Protection in Biometric Authentication Systems." IJSWIS vol.19, no.1 2023: pp.1-19. http://doi.org/10.4018/IJSWIS.317928
APA
Li, J., Zhang, X., Ma, B., Yang, M., Wang, C., Liu, Y., Cui, X., & Yang, X. (2023). PRNU Anonymous Algorithm Used for Privacy Protection in Biometric Authentication Systems. International Journal on Semantic Web and Information Systems (IJSWIS), 19(1), 1-19. http://doi.org/10.4018/IJSWIS.317928
Chicago
Li, Jian, et al. "PRNU Anonymous Algorithm Used for Privacy Protection in Biometric Authentication Systems," International Journal on Semantic Web and Information Systems (IJSWIS) 19, no.1: 1-19. http://doi.org/10.4018/IJSWIS.317928
Export Reference
Published: Feb 16, 2023
Converted to Gold OA:
DOI: 10.4018/IJSWIS.318339
Volume 19
Jie Zhou, Weixin Zeng, Hao Xu, Xiang Zhao
Entity alignment aims to identify equivalent entity pairs from different knowledge graphs (KGs). Recently, aligning temporal knowledge graphs (TKGs) that contain time information has aroused...
Show More
Entity alignment aims to identify equivalent entity pairs from different knowledge graphs (KGs). Recently, aligning temporal knowledge graphs (TKGs) that contain time information has aroused increasingly more interest, as the time dimension is widely used in real-life applications. The matching between TKGs requires seed entity pairs, which are lacking in practice. Hence, it is of great significance to study TKG alignment under scarce supervision. In this work, the authors formally formulate the problem of TKG alignment with limited labeled data and propose to solve it under the active learning framework. As the core of active learning is to devise query strategies to select the most informative instances to label, the authors propose to make full use of time information and put forward novel time-aware strategies to meet the requirement of weakly supervised temporal entity alignment. Extensive experimental results on multiple real-world datasets show that it is important to study TKG alignment with scarce supervision, and the proposed time-aware strategy is effective.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Zhou, Jie, et al. "Active Temporal Knowledge Graph Alignment." IJSWIS vol.19, no.1 2023: pp.1-17. http://doi.org/10.4018/IJSWIS.318339
APA
Zhou, J., Zeng, W., Xu, H., & Zhao, X. (2023). Active Temporal Knowledge Graph Alignment. International Journal on Semantic Web and Information Systems (IJSWIS), 19(1), 1-17. http://doi.org/10.4018/IJSWIS.318339
Chicago
Zhou, Jie, et al. "Active Temporal Knowledge Graph Alignment," International Journal on Semantic Web and Information Systems (IJSWIS) 19, no.1: 1-17. http://doi.org/10.4018/IJSWIS.318339
Export Reference
Published: Feb 16, 2023
Converted to Gold OA:
DOI: 10.4018/IJSWIS.318448
Volume 19
Cristina Blanco-González-Tejero, Belén Ribeiro-Navarrete, Enrique Cano-Marin, William C. McDowell
New models of entrepreneurship are emerging because of increasing digitalization and the development of artificial intelligence (AI). There is a lack of existing research on the intersection between...
Show More
New models of entrepreneurship are emerging because of increasing digitalization and the development of artificial intelligence (AI). There is a lack of existing research on the intersection between digitalization and entrepreneurship. Therefore, this systematic literature analysis aims to expand knowledge in this area and provide a semantic analysis of existing contributions. Following the SPAR-4-SLR protocol, it analyzes 520 scientific articles from the Dimensions.ai database up to July 2022. The methodology uses natural language processing (NLP) and tools such as bibliometrix and VosViewer, which reveal the main characteristics of the titles and texts of the abstracts and their links with the numbers of citations and with scientific impact. This study provides guidelines and clear recommendations for scientists to focus their scientific research on AI and entrepreneurship and entrepreneurs by including the link between AI and entrepreneurship in their strategies. As future lines of research, the authors highlight the potential of using NLP in bibliometric analysis.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Blanco-González-Tejero, Cristina, et al. "A Systematic Literature Review on the Role of Artificial Intelligence in Entrepreneurial Activity." IJSWIS vol.19, no.1 2023: pp.1-16. http://doi.org/10.4018/IJSWIS.318448
APA
Blanco-González-Tejero, C., Ribeiro-Navarrete, B., Cano-Marin, E., & McDowell, W. C. (2023). A Systematic Literature Review on the Role of Artificial Intelligence in Entrepreneurial Activity. International Journal on Semantic Web and Information Systems (IJSWIS), 19(1), 1-16. http://doi.org/10.4018/IJSWIS.318448
Chicago
Blanco-González-Tejero, Cristina, et al. "A Systematic Literature Review on the Role of Artificial Intelligence in Entrepreneurial Activity," International Journal on Semantic Web and Information Systems (IJSWIS) 19, no.1: 1-16. http://doi.org/10.4018/IJSWIS.318448
Export Reference
Published: Apr 20, 2023
Converted to Gold OA:
DOI: 10.4018/IJSWIS.321751
Volume 19
Xinkun Tang, Ying Xu, Feng Ouyang, Ligu Zhu, Bo Peng
Cloud gaming (CG) has gradually gained popularity. By leveling shared computing resources on the cloud, CG technology allows those without expensive hardware to enjoy AAA games using a low-end...
Show More
Cloud gaming (CG) has gradually gained popularity. By leveling shared computing resources on the cloud, CG technology allows those without expensive hardware to enjoy AAA games using a low-end device. However, the bandwidth requirement for streaming game video is high, which can cause backbone network congestion for large-scale deployment and expensive bandwidth bills. To address this challenge, the authors proposed an innovative edge-assisted computing architecture that collaboratively uses AI-powered foveated rendering (FR) and super-resolution (SR). Using FR, the cloud server can stream gaming video in lower resolution, significantly reducing the transmitted data volume. The edge server will then upscale the video using a game-specific SR model, recovering the quality of the video, especially for the areas players pay the most attention. The authors built a prototype system called FRSR and did thorough, objective comparative experiments to demonstrate that this architecture can reduce bandwidth usage by 39.47% compared with classic CG implementation for similar perceived quality.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Tang, Xinkun, et al. "A Cloud-Edge Collaborative Gaming Framework Using AI-Powered Foveated Rendering and Super Resolution." IJSWIS vol.19, no.1 2023: pp.1-19. http://doi.org/10.4018/IJSWIS.321751
APA
Tang, X., Xu, Y., Ouyang, F., Zhu, L., & Peng, B. (2023). A Cloud-Edge Collaborative Gaming Framework Using AI-Powered Foveated Rendering and Super Resolution. International Journal on Semantic Web and Information Systems (IJSWIS), 19(1), 1-19. http://doi.org/10.4018/IJSWIS.321751
Chicago
Tang, Xinkun, et al. "A Cloud-Edge Collaborative Gaming Framework Using AI-Powered Foveated Rendering and Super Resolution," International Journal on Semantic Web and Information Systems (IJSWIS) 19, no.1: 1-19. http://doi.org/10.4018/IJSWIS.321751
Export Reference
Published: Apr 26, 2023
Converted to Gold OA:
DOI: 10.4018/IJSWIS.322392
Volume 19
Bing Xia, Wenbo Liu, Qudong He, Fudong Liu, Jianmin Pang, RuiNan Yang, JiaBin Yin, YunXiang Ge
Many existing works compute the binary vulnerability similarity based on binary procedure, which has coarse detection granularity and cannot locate the vulnerability trigger position accurately, and...
Show More
Many existing works compute the binary vulnerability similarity based on binary procedure, which has coarse detection granularity and cannot locate the vulnerability trigger position accurately, and have a higher false positive rate, so a new binary vulnerability similarity detection method based on function parameter dependency in hazard API is proposed. First, convert the instructions of different architectures into an intermediate language, and use the compiler with a back-end optimizer to optimize and normalize the binary procedure. Then, locate the hazard API that appears in the binary procedure, and perform the function parameters dependency analysis to generate a set of parameter slices on the hazard API. Experiments show that the method has a higher recall rate (up to 14.3% better than the baseline model) in real-world scenarios, and not only locates the triggering position of the vulnerability but also identifies the fixed vulnerability.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Xia, Bing, et al. "Binary Vulnerability Similarity Detection Based on Function Parameter Dependency." IJSWIS vol.19, no.1 2023: pp.1-16. http://doi.org/10.4018/IJSWIS.322392
APA
Xia, B., Liu, W., He, Q., Liu, F., Pang, J., Yang, R., Yin, J., & Ge, Y. (2023). Binary Vulnerability Similarity Detection Based on Function Parameter Dependency. International Journal on Semantic Web and Information Systems (IJSWIS), 19(1), 1-16. http://doi.org/10.4018/IJSWIS.322392
Chicago
Xia, Bing, et al. "Binary Vulnerability Similarity Detection Based on Function Parameter Dependency," International Journal on Semantic Web and Information Systems (IJSWIS) 19, no.1: 1-16. http://doi.org/10.4018/IJSWIS.322392
Export Reference
Published: Apr 26, 2023
Converted to Gold OA:
DOI: 10.4018/IJSWIS.322403
Volume 19
Jinhua Fu, Wenhui Zhou, Suzhi Zhang
As one of the most widely used federated chains, hyperledger fabric uses many cryptographic algorithms to ensure the security of information on the chain, but the ECDSA cryptographic algorithm used...
Show More
As one of the most widely used federated chains, hyperledger fabric uses many cryptographic algorithms to ensure the security of information on the chain, but the ECDSA cryptographic algorithm used in the fabric system has backdoor security risks. In this paper, the authors adopt SM2 algorithm to replace the corresponding ECDSA algorithm for blockchain design based on fabric platform. Firstly, they optimize the part of SM2 signature algorithm process with inverse operation and effectively reduce the time complexity by reducing the inverse operation in the whole process, and the experimental results show that the improved SM2 algorithm improves the signature and verification efficiency by about 5.7%. Secondly, by adding SM2 algorithm template and interface to the BCCSP module of fabric platform to realize the shift value of SM2 algorithm and compare the performance with the native fabric system, the network startup time is reduced by about 29%. The experimental results show the effectiveness of the improved SM2 algorithm, and also the performance of the optimized fabric system is improved.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Fu, Jinhua, et al. "Fabric Blockchain Design Based on Improved SM2 Algorithm." IJSWIS vol.19, no.1 2023: pp.1-13. http://doi.org/10.4018/IJSWIS.322403
APA
Fu, J., Zhou, W., & Zhang, S. (2023). Fabric Blockchain Design Based on Improved SM2 Algorithm. International Journal on Semantic Web and Information Systems (IJSWIS), 19(1), 1-13. http://doi.org/10.4018/IJSWIS.322403
Chicago
Fu, Jinhua, Wenhui Zhou, and Suzhi Zhang. "Fabric Blockchain Design Based on Improved SM2 Algorithm," International Journal on Semantic Web and Information Systems (IJSWIS) 19, no.1: 1-13. http://doi.org/10.4018/IJSWIS.322403
Export Reference
Published: May 5, 2023
Converted to Gold OA:
DOI: 10.4018/IJSWIS.322769
Volume 19
Xueqiang Lv, Zhaonan Liu, Ying Zhao, Ge Xu, Xindong You
With the emergence of a large-scale pre-training model based on the transformer model, the effect of all-natural language processing tasks has been pushed to a new level. However, due to the high...
Show More
With the emergence of a large-scale pre-training model based on the transformer model, the effect of all-natural language processing tasks has been pushed to a new level. However, due to the high complexity of the transformer's self-attention mechanism, these models have poor processing ability for long text. Aiming at solving this problem, a long text processing method named HBert based on Bert and hierarchical attention neural network is proposed. Firstly, the long text is divided into multiple sentences whose vectors are obtained through the word encoder composed of Bert and the word attention layer. And the article vector is obtained through the sentence encoder that is composed of transformer and sentence attention. Then the article vector is used to complete the subsequent tasks. The experimental results show that the proposed HBert method achieves good results in text classification and QA tasks. The F1 value is 95.7% in longer text classification tasks and 75.2% in QA tasks, which are better than the state-of-the-art model longformer.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Lv, Xueqiang, et al. "HBert: A Long Text Processing Method Based on BERT and Hierarchical Attention Mechanisms." IJSWIS vol.19, no.1 2023: pp.1-14. http://doi.org/10.4018/IJSWIS.322769
APA
Lv, X., Liu, Z., Zhao, Y., Xu, G., & You, X. (2023). HBert: A Long Text Processing Method Based on BERT and Hierarchical Attention Mechanisms. International Journal on Semantic Web and Information Systems (IJSWIS), 19(1), 1-14. http://doi.org/10.4018/IJSWIS.322769
Chicago
Lv, Xueqiang, et al. "HBert: A Long Text Processing Method Based on BERT and Hierarchical Attention Mechanisms," International Journal on Semantic Web and Information Systems (IJSWIS) 19, no.1: 1-14. http://doi.org/10.4018/IJSWIS.322769
Export Reference
Published: Jun 1, 2023
Converted to Gold OA:
DOI: 10.4018/IJSWIS.323921
Volume 19
Pu Li, Guohao Zhou, Zhilei Yin, Rui Chen, Suzhi Zhang
Discover the deep semantics from the massively structured data in knowledge graph and provide reasonable explanations are a series of important foundational research issues of artificial...
Show More
Discover the deep semantics from the massively structured data in knowledge graph and provide reasonable explanations are a series of important foundational research issues of artificial intelligence. However, the deep semantics hidden between entities in knowledge graph cannot be well expressed. Moreover, considering many predicates express fuzzy relationships, the existing reasoning methods cannot effectively deal with these fuzzy semantics and interpret the corresponding reasoning process. To counter the above problems, in this article, a new interpretable reasoning schema is proposed by introducing fuzzy theory. The presented method focuses on analyzing the fuzzy semantic between related entities in a knowledge graph. By annotating the fuzzy semantic features of adjacency predicates, a novel semantic reasoning model is designed to realize the fuzzy semantic extension over knowledge graph. The evaluation, based on both visualization and query experiments, shows that this proposal has advantages over the initial knowledge graph and can discover more valid semantic information.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Li, Pu, et al. "A Semantically Enhanced Knowledge Discovery Method for Knowledge Graph Based on Adjacency Fuzzy Predicates Reasoning." IJSWIS vol.19, no.1 2023: pp.1-24. http://doi.org/10.4018/IJSWIS.323921
APA
Li, P., Zhou, G., Yin, Z., Chen, R., & Zhang, S. (2023). A Semantically Enhanced Knowledge Discovery Method for Knowledge Graph Based on Adjacency Fuzzy Predicates Reasoning. International Journal on Semantic Web and Information Systems (IJSWIS), 19(1), 1-24. http://doi.org/10.4018/IJSWIS.323921
Chicago
Li, Pu, et al. "A Semantically Enhanced Knowledge Discovery Method for Knowledge Graph Based on Adjacency Fuzzy Predicates Reasoning," International Journal on Semantic Web and Information Systems (IJSWIS) 19, no.1: 1-24. http://doi.org/10.4018/IJSWIS.323921
Export Reference
Published: Jun 1, 2023
Converted to Gold OA:
DOI: 10.4018/IJSWIS.324071
Volume 19
Yicong Liang, Lap-Kei Lee
A citation is a reference to the source of information used in an article. Citations are very useful for students and researchers to locate relevant information on a topic. Proper citation is also...
Show More
A citation is a reference to the source of information used in an article. Citations are very useful for students and researchers to locate relevant information on a topic. Proper citation is also important in the academic ethics of article writing. Due to the rapid growth of scientific works published each year, how to automatically recommend citations to students and researchers has become an interesting but challenging research problem. In particular, a citation recommendation system can assist students to identify relevant papers and literature for academic writing. Citation recommendation can be classified into local and global citation recommendation depending on whether a specific local citation context is given; e.g., the text surrounding a citation placeholder. This article provides a systematic review on global citation recommendation models and compares the reviewed methods from the traditional topic- based models to the recent models embedded with deep neural networks, aiming to summarize this field to facilitate researchers working on citation recommendation.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Liang, Yicong, and Lap-Kei Lee. "A Systematic Review of Citation Recommendation Over the Past Two Decades." IJSWIS vol.19, no.1 2023: pp.1-22. http://doi.org/10.4018/IJSWIS.324071
APA
Liang, Y. & Lee, L. (2023). A Systematic Review of Citation Recommendation Over the Past Two Decades. International Journal on Semantic Web and Information Systems (IJSWIS), 19(1), 1-22. http://doi.org/10.4018/IJSWIS.324071
Chicago
Liang, Yicong, and Lap-Kei Lee. "A Systematic Review of Citation Recommendation Over the Past Two Decades," International Journal on Semantic Web and Information Systems (IJSWIS) 19, no.1: 1-22. http://doi.org/10.4018/IJSWIS.324071
Export Reference
Published: Jun 9, 2023
Converted to Gold OA:
DOI: 10.4018/IJSWIS.324105
Volume 19
Meena Malik, Chander Prabha, Punit Soni, Varsha Arya, Wadee Alhalabi Alhalabi, Brij B. Gupta, Aiiad A. Albeshri, Ammar Almomani
Machine learning and deep learning are one of the most sought-after areas in computer science which are finding tremendous applications ranging from elementary education to genetic and space...
Show More
Machine learning and deep learning are one of the most sought-after areas in computer science which are finding tremendous applications ranging from elementary education to genetic and space engineering. The applications of machine learning techniques for the development of smart cities have already been started; however, still in their infancy stage. A major challenge for Smart City developments is effective waste management by following proper planning and implementation for linking different regions such as residential buildings, hotels, industrial and commercial establishments, the transport sector, healthcare institutes, tourism spots, public places, and several others. Smart City experts perform an important role for evaluation and formulation of an efficient waste management scheme which can be easily integrated with the overall development plan for the complete city. In this work, we have offered an automated classification model for urban waste into multiple categories using Convolutional Neural Networks. We have represented the model which is being implemented using Fine Tuning of Pretrained Neural Network Model with new datasets for litter classification. With the help of this model, software, and hardware both can be developed using low-cost resources and can be deployed at a large scale as it is the issue associated with healthy living provisions across cities. The main significant aspects for the development of such models are to use pre-trained models and to utilize transfer learning for fine-tuning a pre-trained model for a specific task.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Malik, Meena, et al. "Machine Learning-Based Automatic Litter Detection and Classification Using Neural Networks in Smart Cities." IJSWIS vol.19, no.1 2023: pp.1-20. http://doi.org/10.4018/IJSWIS.324105
APA
Malik, M., Prabha, C., Soni, P., Arya, V., Alhalabi, W. A., Gupta, B. B., Albeshri, A. A., & Almomani, A. (2023). Machine Learning-Based Automatic Litter Detection and Classification Using Neural Networks in Smart Cities. International Journal on Semantic Web and Information Systems (IJSWIS), 19(1), 1-20. http://doi.org/10.4018/IJSWIS.324105
Chicago
Malik, Meena, et al. "Machine Learning-Based Automatic Litter Detection and Classification Using Neural Networks in Smart Cities," International Journal on Semantic Web and Information Systems (IJSWIS) 19, no.1: 1-20. http://doi.org/10.4018/IJSWIS.324105
Export Reference
Published: Jun 21, 2023
Converted to Gold OA:
DOI: 10.4018/IJSWIS.325002
Volume 19
Xihui Tang
Traditional landscape design methods rely entirely on the experience of designers and are difficult to adapt to the needs of modern society. This article proposes a landscape design method based on...
Show More
Traditional landscape design methods rely entirely on the experience of designers and are difficult to adapt to the needs of modern society. This article proposes a landscape design method based on a distributed integrated model. Based on landscape design scheme data, the intelligent landscape design function is achieved by constructing a distributed geographic model, extracting features through data analysis and key point analysis, and using virtual environments in computer-aided design to display and restore the actual effects of landscape design. The results indicate that the landscape design method based on distributed integration mode is more in line with the needs of modern society and has significant advantages over traditional landscape design in terms of public interest and evaluation coefficient. The intelligent landscape design method based on distributed integrated models has important significance in modern urbanization construction, which can effectively improve the accuracy and speed of landscape design and create better living spaces for people.
Content Forthcoming
Add to Your Personal Library: Article Published: Jun 21, 2023
Converted to Gold OA:
DOI: 10.4018/IJSWIS.325063
Volume 19
Dianyuan Zhang, Zhenfang Zhu, Jiangtao Qi, Guangyuan Zhang, Linghui Zhong
Emotion-cause pair extraction is an emergent natural language processing task; the target is to extract all pairs of emotion clauses and corresponding cause clauses from unannotated emotion text....
Show More
Emotion-cause pair extraction is an emergent natural language processing task; the target is to extract all pairs of emotion clauses and corresponding cause clauses from unannotated emotion text. Previous studies have employed two-step approaches. However, this research may lead to error propagation across stages. In addition, previous studies did not correctly handle the situation where emotion clauses and cause clauses are the same clauses. To overcome these issues, the authors first use a multitask learning model that is based on graph from the perspective of sorting, which can simultaneously extract emotion clauses, cause clauses and emotion-cause pairs via an end-to-end strategy. Then the authors propose to convert text into graph structured data, and process this scenario through a unique graph convolutional neural network. Finally, the authors design a semantic decision mechanism to address the scenario in which there are multiple emotion-cause pairs in a text.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Zhang, Dianyuan, et al. "Semantic Decision Internal-Attention Graph Convolutional Network for End-to-End Emotion-Cause Pair Extraction." IJSWIS vol.19, no.1 2023: pp.1-21. http://doi.org/10.4018/IJSWIS.325063
APA
Zhang, D., Zhu, Z., Qi, J., Zhang, G., & Zhong, L. (2023). Semantic Decision Internal-Attention Graph Convolutional Network for End-to-End Emotion-Cause Pair Extraction. International Journal on Semantic Web and Information Systems (IJSWIS), 19(1), 1-21. http://doi.org/10.4018/IJSWIS.325063
Chicago
Zhang, Dianyuan, et al. "Semantic Decision Internal-Attention Graph Convolutional Network for End-to-End Emotion-Cause Pair Extraction," International Journal on Semantic Web and Information Systems (IJSWIS) 19, no.1: 1-21. http://doi.org/10.4018/IJSWIS.325063
Export Reference
Published: Jun 27, 2023
Converted to Gold OA:
DOI: 10.4018/IJSWIS.325216
Volume 19
Yongquan Chen, Ying Jiang, Haiyi Liu
With the rapid development and popularization of intelligent terminals, app software has also developed rapidly. The research and practical value of mining user experience (UX) of app software form...
Show More
With the rapid development and popularization of intelligent terminals, app software has also developed rapidly. The research and practical value of mining user experience (UX) of app software form interaction information are becoming increasingly prominent. The interactive information of app software is multisource homogeneous and heterogeneous. In order to obtain more accurate and more comprehensive app software UX results, the fused multisource information should be analyzed. In this paper, the app software UX analysis method based on multisource information fusion is proposed. First, feature engineering is carried out to extract the features. Then, the feature combination tree is constructed after feature correlation mining. Finally, the multisource app software interactive data are fused, and the result is further analyzed to obtain the information of app software UX. The experiments clearly show that the method can effectively fuse multisource app software interaction data and help to comprehensively mine the app software UX embodied in the data.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Chen, Yongquan, et al. "Analysis Method of App Software User Experience Based on Multisource Information Fusion." IJSWIS vol.19, no.1 2023: pp.1-22. http://doi.org/10.4018/IJSWIS.325216
APA
Chen, Y., Jiang, Y., & Liu, H. (2023). Analysis Method of App Software User Experience Based on Multisource Information Fusion. International Journal on Semantic Web and Information Systems (IJSWIS), 19(1), 1-22. http://doi.org/10.4018/IJSWIS.325216
Chicago
Chen, Yongquan, Ying Jiang, and Haiyi Liu. "Analysis Method of App Software User Experience Based on Multisource Information Fusion," International Journal on Semantic Web and Information Systems (IJSWIS) 19, no.1: 1-22. http://doi.org/10.4018/IJSWIS.325216
Export Reference
Published: Jul 11, 2023
Converted to Gold OA:
DOI: 10.4018/IJSWIS.325788
Volume 19
Yu Zhang
After years of development, Hainan Province has established a significant sports tourism industry. This paper explores how digitalization is driving the transformation of traditional sports tourism...
Show More
After years of development, Hainan Province has established a significant sports tourism industry. This paper explores how digitalization is driving the transformation of traditional sports tourism through the utilization of the DRAT model to reconstruct the value of both consumers and businesses. The analysis shows that the digitalization of sports tourism has deconstructed the traditional industry using innovative technologies such as technological virtualization and data platform construction. The effective development and utilization of highly developed information technology in modern society are essential for ensuring the smooth and healthy growth of the sports tourism industry. The traditional sports tourism industry has been digitally deconstructed, leading to the formation of new production, management, and business models. The status of consumers continues to improve during this process, and companies are seeking to collaborate with consumers to create new value positioning.
Content Forthcoming
Add to Your Personal Library: Article Published: Jul 20, 2023
Converted to Gold OA:
DOI: 10.4018/IJSWIS.326120
Volume 19
Micheal Olaolu Arowolo, Sanjay Misra, Roseline Oluwaseun Ogundokun
The emergence of the Internet and the growing development of online platforms (like Facebook and Instagram) opened the way for disseminating information that hasn't been experienced in the history...
Show More
The emergence of the Internet and the growing development of online platforms (like Facebook and Instagram) opened the way for disseminating information that hasn't been experienced in the history of mankind earlier. Consumers generate and share more information and a massive amount of data than ever with the growing utilization of social media sites, many of which are deceptive with little relevance to reality. A daunting task is the automated classification of a text article as misleading or misinformation. To see the latest news alerts, individuals often utilize e-newspapers, Twitter, Instagram, Youtube, and many more. Fake news created on social media can lead to uncertainty amongst individuals and psychiatric illness. We may detect that news obtained based on machine learning techniques is either true or false. This study proposes a machine learning technique to detect fake news by carrying out filtration on social media data, classifying the preprocessed data using a machine learning algorithm, evaluating the developed system, and evaluating the results.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Arowolo, Micheal Olaolu, et al. "A Machine Learning Technique for Detection of Social Media Fake News." IJSWIS vol.19, no.1 2023: pp.1-25. http://doi.org/10.4018/IJSWIS.326120
APA
Arowolo, M. O., Misra, S., & Ogundokun, R. O. (2023). A Machine Learning Technique for Detection of Social Media Fake News. International Journal on Semantic Web and Information Systems (IJSWIS), 19(1), 1-25. http://doi.org/10.4018/IJSWIS.326120
Chicago
Arowolo, Micheal Olaolu, Sanjay Misra, and Roseline Oluwaseun Ogundokun. "A Machine Learning Technique for Detection of Social Media Fake News," International Journal on Semantic Web and Information Systems (IJSWIS) 19, no.1: 1-25. http://doi.org/10.4018/IJSWIS.326120
Export Reference
Published: Aug 4, 2023
Converted to Gold OA:
DOI: 10.4018/IJSWIS.327280
Volume 19
Wadee Alhalabi, Akshat Gaurav, Varsha Arya, Ikhlas Fuad Zamzami, Rania Anwar Aboalela
The danger of distributed denial of service (DDoS) attacks has grown in tandem with the proliferation of intelligent information systems. Because of the sheer volume of connected devices, constantly...
Show More
The danger of distributed denial of service (DDoS) attacks has grown in tandem with the proliferation of intelligent information systems. Because of the sheer volume of connected devices, constantly shifting network circumstances, and the need for instantaneous reaction, conventional DDoS detection methods are inadequate for the IoT. In this context, this study aims to survey the current state of the art in the topic by reading relevant articles found in the Scopus database, with a brief overview of the IoT and DDoS as this study examines neural networks and their applicability to DDoS detection. Finally, a decision tree-based model is developed for the detection of DDoS attacks. The analysis sheds light on the present trends and issues in this field and suggests avenues for further study.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Alhalabi, Wadee, et al. "Machine Learning-Based Distributed Denial of Services (DDoS) Attack Detection in Intelligent Information Systems." IJSWIS vol.19, no.1 2023: pp.1-17. http://doi.org/10.4018/IJSWIS.327280
APA
Alhalabi, W., Gaurav, A., Arya, V., Zamzami, I. F., & Aboalela, R. A. (2023). Machine Learning-Based Distributed Denial of Services (DDoS) Attack Detection in Intelligent Information Systems. International Journal on Semantic Web and Information Systems (IJSWIS), 19(1), 1-17. http://doi.org/10.4018/IJSWIS.327280
Chicago
Alhalabi, Wadee, et al. "Machine Learning-Based Distributed Denial of Services (DDoS) Attack Detection in Intelligent Information Systems," International Journal on Semantic Web and Information Systems (IJSWIS) 19, no.1: 1-17. http://doi.org/10.4018/IJSWIS.327280
Export Reference
Published: Aug 1, 2023
Converted to Gold OA:
DOI: 10.4018/IJSWIS.327352
Volume 19
Yu Nie, Na Huang, Junjie Peng, Guanghua Song, Yilai Zhang, Yongkang Peng, Chenglin Ni
There are problems of knowledge deficiency and effective unified expression of knowledge in the process of relevant knowledge data acquired by workers in the ceramic domain. In this study, the...
Show More
There are problems of knowledge deficiency and effective unified expression of knowledge in the process of relevant knowledge data acquired by workers in the ceramic domain. In this study, the authors designed relevant experiments to construct ceramic field knowledge graphs to solve these problems. In the experiments of named entity recognition and relationship recognition, the authors compared the performance of several models in OwnThink and ceramics field datasets. The experimental results showed that the BiLSTM-CRF model is the best for named entity recognition and the TextCNN model is the best for relationship recognition in ceramics field datasets. Therefore, the first used the BiLSTM-CRF model to complete the naming entity recognition and then combined with the TextCNN model to complete the relationship recognition to construct the ceramic field knowledge graph. Then, they applied the constructed graph to the ceramic knowledge Q&A service to provide accurate data retrieval service for ceramic domain workers.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Nie, Yu, et al. "Research on the Construction and Application of Knowledge Graph in the Ceramic Field Based on Natural Language Processing." IJSWIS vol.19, no.1 2023: pp.1-20. http://doi.org/10.4018/IJSWIS.327352
APA
Nie, Y., Huang, N., Peng, J., Song, G., Zhang, Y., Peng, Y., & Ni, C. (2023). Research on the Construction and Application of Knowledge Graph in the Ceramic Field Based on Natural Language Processing. International Journal on Semantic Web and Information Systems (IJSWIS), 19(1), 1-20. http://doi.org/10.4018/IJSWIS.327352
Chicago
Nie, Yu, et al. "Research on the Construction and Application of Knowledge Graph in the Ceramic Field Based on Natural Language Processing," International Journal on Semantic Web and Information Systems (IJSWIS) 19, no.1: 1-20. http://doi.org/10.4018/IJSWIS.327352
Export Reference
Published: Aug 1, 2023
Converted to Gold OA:
DOI: 10.4018/IJSWIS.327353
Volume 19
Xin Zhang, Shaohua Kuang
In recent years, knowledge-aware recommendation systems have gained popularity as a solution to address the challenges of data sparsity and cold start in collaborative filtering. However...
Show More
In recent years, knowledge-aware recommendation systems have gained popularity as a solution to address the challenges of data sparsity and cold start in collaborative filtering. However, traditional knowledge graph convolutional networks impose significant computational burdens during training, demanding substantial resources and increasing the cost of recommendations. To address this issue, this article proposes a lightweight knowledge graph convolutional network for collaborative filtering (LKGCF). LKGCF eliminates the feature transformation and nonlinear activation components, by focusing on essential elements such as neighborhood aggregation and layer combination. LKGCF captures the user's long-distance personalized interests on the knowledge graph by sampling from neighborhood information and constructing a weighted sum of item embeddings. Experimental results demonstrate that the proposed model is easy to train and implement due to its coherence and simplicity. Furthermore, notable improvements in recommendation performance are observed compared to strong baselines.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Zhang, Xin, and Shaohua Kuang. "A Lightweight Method of Knowledge Graph Convolution Network for Collaborative Filtering." IJSWIS vol.19, no.1 2023: pp.1-21. http://doi.org/10.4018/IJSWIS.327353
APA
Zhang, X. & Kuang, S. (2023). A Lightweight Method of Knowledge Graph Convolution Network for Collaborative Filtering. International Journal on Semantic Web and Information Systems (IJSWIS), 19(1), 1-21. http://doi.org/10.4018/IJSWIS.327353
Chicago
Zhang, Xin, and Shaohua Kuang. "A Lightweight Method of Knowledge Graph Convolution Network for Collaborative Filtering," International Journal on Semantic Web and Information Systems (IJSWIS) 19, no.1: 1-21. http://doi.org/10.4018/IJSWIS.327353
Export Reference
Published: Jul 31, 2023
Converted to Gold OA:
DOI: 10.4018/IJSWIS.327354
Volume 19
Haixiang Yang, Xindong You, Xueqiang Lv, Ge Xu
Effective extraction of patent technology points in new energy fields is profitable, which motivates technological innovation and facilitates patent transformation and application. However, since...
Show More
Effective extraction of patent technology points in new energy fields is profitable, which motivates technological innovation and facilitates patent transformation and application. However, since patent data exists the ununiform distribution of technology points information, long length of term, and long sentences, technology point extraction faces the dilemmas of poor readability and logic confusion. To mitigate these problems, the article proposes a method to generate patent technology points called IGPTP—a two-stage strategy, which fuses the advantage of extractive and generative ways. IGPTP utilizes the RoBERTa+CNN model to obtain the key sentences of text and takes the output as input of UNILM (unified pre-trained language model). Simultaneously, it takes a multi-strategies integration technique to enhance the quality of patent technology points by combining the copy mechanism and external knowledge guidance model. Substantial experimental results manifest that IGPTP outperforms the current mainstream models, which can generate more coherent and richer text.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Yang, Haixiang, et al. "Research on the Generation of Patented Technology Points in New Energy Based on Deep Learning." IJSWIS vol.19, no.1 2023: pp.1-20. http://doi.org/10.4018/IJSWIS.327354
APA
Yang, H., You, X., Lv, X., & Xu, G. (2023). Research on the Generation of Patented Technology Points in New Energy Based on Deep Learning. International Journal on Semantic Web and Information Systems (IJSWIS), 19(1), 1-20. http://doi.org/10.4018/IJSWIS.327354
Chicago
Yang, Haixiang, et al. "Research on the Generation of Patented Technology Points in New Energy Based on Deep Learning," International Journal on Semantic Web and Information Systems (IJSWIS) 19, no.1: 1-20. http://doi.org/10.4018/IJSWIS.327354
Export Reference
Published: Jul 31, 2023
Converted to Gold OA:
DOI: 10.4018/IJSWIS.327355
Volume 19
Guozhu Ding, Peiying Yi, Xinru Feng
Knowledge graphs are a valuable tool for intelligent tutoring systems and are typically constructed with a focus on objectivity and accuracy. However, they may not effectively capture the...
Show More
Knowledge graphs are a valuable tool for intelligent tutoring systems and are typically constructed with a focus on objectivity and accuracy. However, they may not effectively capture the subjectivity and complex relationships often present in the humanities. To address this issue, a dynamic visualization of subject matter knowledge graph was developed using a collective intelligence approach that integrates the individual intelligence of learners and considers cognitive diversity to construct and evolve the knowledge graph. The approach resulted in the construction of 722 knowledge associations and the evolution of 584 triples. A survey assessed the effectiveness and user-friendliness, revealing that this approach is effective, easy to use, and can improve subject matter knowledge ontology. In conclusion, combining individual and collective intelligence is a promising approach for building effective knowledge graphs in subject areas with subjectivity and complexity.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Ding, Guozhu, et al. "Constructing a Knowledge Graph for the Chinese Subject Based on Collective Intelligence." IJSWIS vol.19, no.1 2023: pp.1-19. http://doi.org/10.4018/IJSWIS.327355
APA
Ding, G., Yi, P., & Feng, X. (2023). Constructing a Knowledge Graph for the Chinese Subject Based on Collective Intelligence. International Journal on Semantic Web and Information Systems (IJSWIS), 19(1), 1-19. http://doi.org/10.4018/IJSWIS.327355
Chicago
Ding, Guozhu, Peiying Yi, and Xinru Feng. "Constructing a Knowledge Graph for the Chinese Subject Based on Collective Intelligence," International Journal on Semantic Web and Information Systems (IJSWIS) 19, no.1: 1-19. http://doi.org/10.4018/IJSWIS.327355
Export Reference
IGI Global Open Access Collection provides all of IGI Global’s open access content in one convenient location and user-friendly interface
that can easily searched or integrated into library discovery systems.
Browse IGI Global Open
Access Collection
All inquiries regarding IJSWIS should be directed to the attention of:
Submission-Related InquiriesAll inquiries regarding IJSWIS should be directed to the attention of:
Brij Gupta
Editor-in-Chief
International Journal on Semantic Web and Information Systems (IJSWIS)
Email:
gupta.brij@gmail.comAuthor Services Inquiries
For inquiries involving pre-submission concerns, please contact the Journal Development Division:
journaleditor@igi-global.comOpen Access Inquiries
For inquiries involving publishing costs, APCs, etc., please contact the Open Access Division:
openaccessadmin@igi-global.comProduction-Related Inquiries
For inquiries involving accepted manuscripts currently in production or post-production, please contact the Journal Production Division:
journalproofing@igi-global.comRights and Permissions Inquiries
For inquiries involving permissions, rights, and reuse, please contact the Intellectual Property & Contracts Division:
contracts@igi-global.comPublication-Related Inquiries
For inquiries involving journal publishing, please contact the Acquisitions Division:
acquisition@igi-global.comDiscoverability Inquiries
For inquiries involving sharing, promoting, and indexing of manuscripts, please contact the Citation Metrics & Indexing Division:
indexing@igi-global.com Editorial Office
701 E. Chocolate Ave.
Hershey, PA 17033, USA
717-533-8845 x100