This book offers a unique blend of reports on both theoretical models and their applications in the area of Intelligent Information and Database Systems. The reports cover a broad range of research topics, including advanced learning techniques, knowledge engineering, Natural Language Processing (NL
Modern Approaches for Intelligent Information and Database Systems (Studies in Computational Intelligence, 769)
✍ Scribed by Andrzej Sieminski; Adrianna Kozierkiewicz; Manuel Núñez; Quang Thuy Ha
- Tongue
- English
- Leaves
- 521
- Category
- Library
No coin nor oath required. For personal study only.
✦ Table of Contents
Preface
Contents
Part I Knowledge Engineering and Semantic Web
1 A Three-Stage Consensus-Based Method for Collective Knowledge Determination
Abstract
1 Introduction
2 Related Work
3 Basic Notions
3.1 Collective of Knowledge States
3.2 Collective Knowledge Determination
3.3 Quality of Collective Knowledge
4 Proposed Method
5 Experiments and Evaluation
5.1 Settings
5.2 Experimental Results and Their Evaluation
6 Conclusions and Future Works
Acknowledgements
References
2 Fuzzy Ontology Modeling by Utilizing Fuzzy Set and Fuzzy Description Logic
Abstract
1 Introduction
2 Fuzzy Ontology Definition
3 A Fuzzy Ontology Modeling Method Using OWL2
3.1 Annotation
3.2 Fuzzy Modifiers
3.3 Fuzzy Datatype
3.4 Fuzzy Concept C
3.5 The Fuzzy Role R
3.6 Fuzzy Axiom Z
4 Fuzzy Ontology Construction with Protégé
4.1 Fuzzy Weather Ontology Construction
4.2 Create Description Logic for Fuzzy Weather Ontology
5 Conclusion
An Approach for Recommending Group Experts on Question and Answering Sites
1 Introduction
2 Related Works
3 Group Experts Recommendation Method
3.1 Problem Formulation
3.2 Expert Detection
3.3 Question Topic Modeling
3.4 Group Experts Recommendation
4 Experiments
4.1 Dataset
4.2 Evaluations and Results
5 Conclusion and Future Work
References
4 A Method for Uncertainty Elicitation of Experts Using Belief Function
Abstract
1 Introduction
2 Materials and Methods
2.1 Theory of Belief Functions
2.2 Expert Elicitation Using the Theory of Belief Functions
3 Results
4 Discussion
5 Conclusions
Funding
References
Storing Hypergraph-Based Data Models in Non-hypergraph Data Storage
1 Introduction
2 Literature Review
3 Mathematical Background
4 Solution and Implementation
4.1 Storing Hypergraph Model in Common Graph-Database
5 Conclusion and Future Work
References
Part II Natural Language Processing and Text Mining
6 A Fuzzy Logic Approach to Predict the Popularity of a Presidential Candidate
Abstract
1 Introduction
2 Related Works
3 Data Set Descriptions
4 Methodology
5 Results and Analysis of Results
6 Conclusions and Future Works
References
7 DNA Sequences Representation Derived from Discrete Wavelet Transformation for Text Similarity Recognition
Abstract
1 Introduction
2 Fundamental of Haar DWT and Proposed Algorithm for Generating DNA Sequences
3 Text Similarity Recognition: Proposed System Setup
3.1 Preprocessing
3.2 Generating Source DNAs
3.3 Text Similarity Recognition
4 Experimental Results
4.1 Datasets Acquisition
4.2 Evaluation Method and Experimental Results
5 Conclusion
Acknowledgements
References
Tweet Integration by Finding the Shortest Paths on a Word Graph
1 Introduction
2 Related Works
3 Tweet Integration Method
3.1 Tweet Preprocessing
3.2 Topic Modeling
3.3 Sentiment Analysis of Tweets
3.4 Word Graph Construction
3.5 Find-Shortest-Paths Method on a Word Graph
4 Experiment
4.1 Dataset
4.2 Performance Evaluation
4.3 Results and Discussion
5 Conclusion and Future Work
References
9 Event Detection in Twitter: Methodological Evaluation and Structural Analysis of the Bibliometric Data
Abstract
1 Introduction
2 Problem Definition
3 Related Work
3.1 Comparing Event Detection Technique
3.2 Bibliometric Analysis
4 Research Methods
4.1 Bibliometric Analysis
4.2 Comparing the Methods
5 Open Issues
6 Conclusions
Acknowledgements
References
Combination of Inner Approach and Context-Based Approach for Extracting Feature of Medical Record Data
1 Introduction
1.1 Context of Problem
1.2 Problem of Migration in Electronic Health Records
1.3 Problem to Solve
2 Related Work
3 Proposition
3.1 Naive
3.2 Re-using Word2vec
3.3 Character2vec
3.4 Combination of Inner Approach and Context-Based Approach
4 Experiments
4.1 Datasets
4.2 Implementation Details
5 Evaluation
5.1 Compare Naive with Character2vec
5.2 Compare Word2vec with Word2vec Combines Character2vec
6 Conclusion
References
A Novel Method to Predict Type for DBpedia Entity
1 Introduction
2 Related Work
3 The Consistency of Type
3.1 The Statements of Mappings in DBpedia
3.2 The Analysis of Type Consistency
4 Type Prediction
5 Results and Evaluation
6 Conclusion and Future Work
References
12 Context-Based Personalized Predictors of the Length of Written Responses to Open-Ended Questions of Elementary School Students
Abstract
1 Introduction
2 Methods
3 Results
4 Conclusions
Acknowledgements
References
Part III Machine Learning and Data Mining
13 Robust Scale-Invariant Normalization and Similarity Measurement for Time Series Data
Abstract
1 Introduction
2 Background and Related Works
2.1 Longest Common Subsequence Similarity (LCSS)
3 Our Proposed Algorithm
3.1 Local Scaling Feature (LSF) and Local Feature Normalization (LFN)
3.2 Longest Common Local Scaling Feature (LCSF)
4 Experiments and Results
4.1 Local Features Normalization (LFN)
4.2 Longest Common Local Scaling Feature (LCSF) on Synthetic Data
4.3 LCSF on Real World Data and Applications
5 Conclusion and Future Works
References
14 Perceiving Attributes of Game AI Using Fuzzy Logic
Abstract
1 Introduction
2 Background
3 Methodology
3.1 Reasoning—Summary
3.2 Inputs—Explanation
3.3 Reasoning—Explanation
4 Findings
5 Conclusion and Future Work
References
Approaches to Building a Detection Model for Water Quality: A Case Study
1 Introduction
2 Related Work
3 Dataset
4 Preprocessing
5 Features Selection
6 Modeling Tools
7 Evaluation of Models
7.1 Problems with Accuracy
7.2 Precision, Recall and F1
8 Experimental Results
9 Conclusion and Future Work
References
16 A Deep Learning Approach to Case Based Reasoning to the Evaluation and Diagnosis of Cervical Carcinoma
Abstract
1 Introduction
2 Background
2.1 Cervical Squamous Cell Carcinoma
2.2 Deep Learning Versus Knowledge Representation and Reasoning
2.3 Case Based Reasoning
2.4 Pre-processing and Segmentation
2.5 Feature Extraction
3 Case Study
4 Conclusions
Acknowledgements
References
17 A Fuzzy Approach for the Diagnosis of Depression
Abstract
1 Introduction
2 Literature Review
3 Methodology
3.1 Dataset
3.2 Designing Fuzzy Inference System (1st Phase)
3.3 Designing Fuzzy Inference System (2nd Phase)
4 Results and Analysis of Results
5 Conclusion and Future Work
Acknowledgements
References
18 A Weighted Approach for Class Association Rules
Abstract
1 Introduction
2 Preliminary Concepts
3 Related Work
4 Mining Class Association Rules with Weighted
5 Experimental Results
6 Conclusion and Future Works
Acknowledgements
References
Fast and Memory Efficient Mining of Periodic Frequent Patterns
1 Introduction
2 Related Work
3 Proposed Periodicity Evaluation Measures
4 Experimental Results
4.1 Execution Time Comparison
4.2 Memory Usage Comparison
5 Conclusion
References
A Coupling Support Vector Machines with the Feature Learning of Deep Convolutional Neural Networks for Classifying Microarray Gene Expression Data
1 Introduction
2 Methods
2.1 Deep Convolutional Neural Networks
2.2 Support Vector Machines
2.3 Support Vector Machines Using the Feature Extraction from Deep Convolutional Neural Networks
3 Evaluation
3.1 Experiments Setup
3.2 Experiments Results
4 Conclusion and Future Works
References
Development of Seawater Temperature Announcement System for Quick and Accurate Red Tide Estimation
1 Introduction
2 Seawater Temperature Announcement System
2.1 Required Items
2.2 Implemented Functions and Web Page Structure
2.3 Function Details
3 Conclusion
Reference
Part IV Decision Support Systems
22 Support Product Development Framework by Means of Set of Experience Knowledge Structure (SOEKS) and Decisional DNA
Abstract
1 Introduction
2 Background
2.1 Product Development
2.2 Set of Experience Knowledge Structure and Decisional DNA
2.3 Virtual Engineering Objects, Virtual Engineering Processes and Virtual Engineering Factory
3 Product Development by Using SOEKS and Decisional DNA
3.1 Smart Products in Industry 4.0
3.2 Framework for Product Development Process
3.3 Process Flow Chart of Framework to Support Product Development by Using Decisional DNA
4 Conclusion and Future Work
References
23 Actual Situation and Development in Online Shopping in the Czech Republic, Visegrad Group and EU-28
Abstract
1 Introduction
2 Literature Review
3 Methodology and Goal
4 Results
4.1 Selected Activities Carried Out by Individuals on the Internet
4.2 Individuals Making Purchases on the Internet
4.3 Individuals Who Ordered Goods or Services Over the Internet for Private Use in Visegrad Group and EU-28
5 Discussion and Conclusion
Acknowledgements
References
24 How Product Brand Effects Consumer Decision
Abstract
1 Introduction
1.1 Czech Republic
1.2 Taiwan
2 Methodology
3 Results
3.1 Evaluation of the Research Questions
4 Discussion
5 Conclusion
Acknowledgements
References
25 Investments Decision Making on the Basis of System Dynamics
Abstract
1 Introduction
2 Prehistory and Related Work
2.1 Modeling in the Oil Industry
2.2 Tools for Modelling and Simulation
3 System Dynamics Model of Oil Company
3.1 Model Development Methodology
3.2 Description of Oil Company and Its Structural Model
3.3 Development of Causal Loop Sub-models
4 The Problem of Data Extraction in Intellectual Information Systems
5 Conclusions and Future Work
References
26 Dynamic Configuration of Same-Day Delivery in E-commerce
Abstract
1 Introduction
2 Logistic Source of Value in E-commerce
3 Models of Same-Day Delivery
4 Assumptions of the Same-Day Delivery Platform
5 Exemplification of the Model
6 Conclusions
Acknowledgements
References
27 Lean and Agile Supply Chains of E-commerce in Terms of Customer Value Creation
Abstract
1 Introduction
2 Lean and Supply Chain
3 Research Methodology
4 Nature of Supply Chains—Research Results
5 Smart E-commerce Solutions in Lean and Agile Supply Chains
5.1 Product in E-commerce
5.2 Logistics in E-commerce
5.3 Supply Chain Management in E-commerce
6 Conclusion
Acknowledgements
References
Improvement of Community Bus Operation Management System
1 Introduction
1.1 Community Bus
1.2 About PBL
2 B-Map System
2.1 Stakeholders
2.2 Overview of B-Map System
3 Outline of Renovation
3.1 Renovation Concerning B-Map Application
3.2 Renovation Concerning B-Map Administrator System
3.3 Renovation Concerning to B-Map Web Service
4 Evaluation
4.1 Evaluation for B-Map Application
4.2 Evaluation on Repair of B-Map Administrator System
4.3 Evaluation for B-Map Web Service
5 Discussion
6 Conclusion
Reference
Part V Computer Vision Techniques and Applications
29 Novel Human Action Recognition in RGB-D Videos Based on Powerful View Invariant Features Technique
Abstract
1 Introduction
2 Problem Definition of Our Research
3 Related Work
4 Design of Proposed Solution—Deep Architecture
4.1 Flow Chart of Our Project
4.2 Novel View Invariant Features Algorithm
5 Experiment
5.1 Use of IXMAS Dataset
6 Conclusions
Acknowledgements
References
Study of CNN Based Classification for Small Specific Datasets
1 Introduction
2 Proposed Framework
2.1 Data Augmentation
2.2 Training a CNN
2.3 Multiscale and Region-Based Image Classification
2.4 Classification Weighting
3 Experiments and Discussions
3.1 Setup and First Results
3.2 Fine Tuning an Existing CNN Using Our Specific Dataset
4 Conclusion
References
How to Choose Deep Face Models for Surveillance System?
1 Introduction
2 Related Works
3 Experimental Settings
3.1 Deep Models
3.2 Benchmark Protocols
4 Evaluation Results and Analyses
4.1 Number of Parameters and Feature Extraction Time
4.2 The Employment of Face Registration
5 Conclusion and Future Work
References
32 GPU Video Stream Magnification as a Tool for Touchless Object Vibration Measurement
Abstract
1 Introduction
2 GPU-Based Video Motion Magnification Algorithm
2.1 Implementation
3 Tests
3.1 Experiment 1
3.2 Results of the Experiment 1
3.3 Experiment 2
3.4 Results of the Experiment 2
3.5 Comparison
4 Conclusions
Acknowledgements
References
33 Viewpoint Invariant Person Re-identification with Pose and Weighted Local Features
Abstract
1 Introduction
2 System Overview
2.1 Training Process
2.2 Test Process
3 Viewpoint Invariant Person Re-identification
3.1 Feature Weighted Graph
3.2 Histogram of Oriented Gradients
3.3 Pose Angle Classification
3.4 Feature Extraction: Salient Color Names
3.5 Feature Extraction: Local Binary Pattern
3.6 Cross-View Quadratic Discriminant Analysis (XQDA)
4 Experimental Results
5 Conclusion
References
34 Breast Cancer Detection Using Modern Visual IT Techniques
Abstract
1 Introduction
2 Previous Techniques and Comments
2.1 Related Works
2.1.1 A Doubt for Infrared Base Techniques
2.1.2 Infrared Thermal Imaging
2.1.3 Near-Infrared Fluorescent (NIRF) and Agent
2.1.4 The Diameter and Depth of the Tumor
2.2 Economical Aspects of Breast Cancer
3 Discussion of Findings
3.1 Differences Between no Touch BreastScan and Sentinel BreastScan Techniques
3.2 Proposed Model
4 Conclusion
Acknowledgements
References
35 Contactless Identification System Based on Visual Analysis of Examined Element
Abstract
1 Introduction
2 Goals
3 System Description
3.1 Appraisal by the Rate of Correspondence
3.2 Image Scanning
4 Testing of Developed Application
4.1 Methodology of Testing
4.2 Tests of Experimental System’s Speed
4.3 Tests of Reliability of Experimental System
4.4 Discussion of Results
5 Conclusions
Acknowledgements
References
Part VI Sensor Networks and Internet of Things
Integrated Data Access to Heterogeneous Data Stores for IoT Cloud
1 Introduction
2 IoT Cloud
2.1 Overall Architecture
2.2 Query Processing
3 Proposed Hybrid Data Store Access Scheme
3.1 Specific Data Access Component
3.2 Common Data Access Component
3.3 Hybrid Data Access Component
4 Performance Evaluation
4.1 Configuration of Performance Evaluation
4.2 Query Complexity Versus Response Time
4.3 Data Set Size Versus Response Time
5 Concluding Remarks
References
37 Path Estimation from Smartphone Sensors
Abstract
1 Introduction
2 Theoretical Backround
2.1 Pedestrian Dead Reckoning
2.2 Particle Filter
3 Experimental Setup
4 Results
5 Conclusion
Acknowledgements
References
38 A Multi-metric Routing Protocol to Improve the Achievable Performance of Mobile Ad Hoc Networks
Abstract
1 Introduction
2 Related Work
3 Proposed Routing Protocol
3.1 System Model
3.2 Routing Metrics
4 Performance Evaluation
4.1 The Metrics Used for Performance Evaluation
4.2 Simulation Parameter
5 Conclusions
Acknowledgements
References
Novel Aproach for Localization of Patients in Urgent Admission Department
1 Introduction
2 Overview of Location Systems
2.1 Overview of Location Systems in Healthcare Environment
3 Procedures at Urgent Admission
3.1 Issue Definition
3.2 General Process Description on Urgent Admission
4 Development of RTLS for Urgent Admission
5 Discussion and Conclusion
References
Design of Universal Hardware Node Board for Smart-Home Automation and the IoT
1 Introduction
2 Available Solutions
3 Prototype Requirements
4 Node Implementation
4.1 Microcontroller
4.2 Communication
4.3 Schematics
4.4 PCB
5 Testing
6 Future Improvements
7 Conclusion
References
Part VII Tools and Techniques for Intelligent Information Systems
OpenWebCrypt—Securing Our Data in Public Cloud
1 Introduction
2 Related Work
3 Background
3.1 Client Side
3.2 Transport Layer
3.3 Server Side
3.4 Encryption
4 Possible Solutions
4.1 Encryption Proxy Server
4.2 Browser Extension
5 Prototype
5.1 Measurements
6 Conclusion
7 Future Work
References
42 A Novel Load Forecasting System Leveraging Database Technology
Abstract
1 Introduction
2 Technology Consideration
3 The Proposed Load Forecasting Solution
3.1 Proposed System Architecture and Implementation
4 Forecasting Models: Testing and Results
4.1 ARIMA Model Forecasting
4.2 Forecasting with the Holt-Winters’ ETS Models
4.3 Forecasting with Neural Network Auto-Regression
4.4 Effect of Parallelism (i.e. Multi-core Capability) in Forecasting
5 Test Result of DBFS Technology
5.1 Switchover Test
6 Discussion and Conclusion
References
43 A Novel Database Exploitation Detection and Privilege Control System Using Data Mining
Abstract
1 Introduction
2 Proposed DB Exploitation Detection and Privilege Control System: Overview
3 Database Exploitation Detection Module
3.1 Association Rules for DED
4 Proposed Privilege Control System
4.1 PCS Architecture
4.2 User’s Privilege Representation
5 Experiments and Results
6 Conclusion
References
Agent Programming Languages and Logics in Agent-Based Simulation
1 Introduction
2 AOP, Logic and Agent-Based Simulation
3 From AOP to MAOP
4 Case Study: Emergency Care Units
5 Discussion
6 Conclusion and Future Work
References
A Tool to Compute the Leakage of Multi-threaded Programs
1 Introduction
2 Background of Quantitative Information Flow
2.1 Measure of Uncertainty
2.2 Leakage of a Multi-threaded Program
3 The Structure of the Tool
4 Result
5 Conclusions
References
46 Erratum to: Fuzzy Ontology Modeling by Utilizing Fuzzy Set and Fuzzy Description Logic
Erratum to:Chapter “Fuzzy Ontology Modeling by Utilizing Fuzzy Set and Fuzzy Description Logic” in: A. Sieminski et al. (eds.), Modern Approaches for Intelligent Information and Database Systems, Studies in Computational Intelligence 769, https://doi.org/10.1007/978-3-319-76081-0_2
Author Index
📜 SIMILAR VOLUMES
<p><p>This book consists of 35 chapters presenting different theoretical and practical aspects of Intelligent Information and Database Systems. Nowadays both Intelligent and Database Systems are applied in most of the areas of human activities which necessitates further research in these areas. In t
<p>The book consists of 32 extended chapters which have been based on selected submissions to the poster session organized during the 2nd Asian Conference on Intelligent Information and Database Systems (24-26 March 2010 in Hue, Vietnam). The book is organized into four parts devoted to information
<p>The book consists of 32 extended chapters which have been based on selected submissions to the poster session organized during the 2nd Asian Conference on Intelligent Information and Database Systems (24-26 March 2010 in Hue, Vietnam). The book is organized into four parts devoted to information
<p>The book consists of 32 extended chapters which have been based on selected submissions to the poster session organized during the 2nd Asian Conference on Intelligent Information and Database Systems (24-26 March 2010 in Hue, Vietnam). The book is organized into four parts devoted to information