Abstract: Measuring semantic similarity between texts is calculating semantic relatedness between texts using various techniques. Our web application (Measuring Relatedness of Concepts-MRC) allows user to input two text corpuses and get semantic similarity percentage between both using WordNet. Our application goes through five stages for the computation of semantic relatedness. Those stages are: Preprocessing (extracts keywords from content), Feature Extraction (classification of words into Parts-of-Speech), Synonyms Extraction (retrieves synonyms against each keyword), Measuring Similarity (using keywords and synonyms, similarity is measured) and Visualization (graphical representation of similarity measure). Hence the user can measure similarity on basis of features as well. The end result is a percentage score and the word(s) which form the basis of similarity between both texts with use of different tools on same platform. In future work we look forward for a Web as a live corpus application that provides a simpler and user friendly tool to compare documents and extract useful information.
Abstract: Measuring semantic similarity between texts is calculating semantic relatedness between texts using various techniques. Our web application (Measuring Relatedness of Concepts-MRC) allows user to input two text corpuses and get semantic similarity percentage between both using WordNet. Our application goes through five stages for the computation of semantic relatedness. Those stages are: Preprocessing (extracts keywords from content), Feature Extraction (classification of words into Parts-of-Speech), Synonyms Extraction (retrieves synonyms against each keyword), Measuring Similarity (using keywords and synonyms, similarity is measured) and Visualization (graphical representation of similarity measure). Hence the user can measure similarity on basis of features as well. The end result is a percentage score and the word(s) which form the basis of similarity between both texts with use of different tools on same platform. In future work we look forward for a Web as a live corpus application that provides a simpler and user friendly tool to compare documents and extract useful information.
Abstract: In order to reduce the number of deaths due to heart
problems, we propose the use of Hierarchical Temporal Memory
Algorithm (HTM) which is a real time anomaly detection algorithm.
HTM is a cortical learning algorithm based on neocortex used for
anomaly detection. In other words, it is based on a conceptual theory
of how the human brain can work. It is powerful in predicting unusual
patterns, anomaly detection and classification. In this paper, HTM
have been implemented and tested on ECG datasets in order to detect
cardiac anomalies. Experiments showed good performance in terms
of specificity, sensitivity and execution time.
Abstract: Assessing several individuals intensively over time
yields intensive longitudinal data (ILD). Even though ILD provide
rich information, they also bring other data analytic challenges. One
of these is the increased occurrence of missingness with increased
study length, possibly under non-ignorable missingness scenarios.
Multiple imputation (MI) handles missing data by creating several
imputed data sets, and pooling the estimation results across imputed
data sets to yield final estimates for inferential purposes. In this
article, we introduce dynr.mi(), a function in the R package,
Dynamic Modeling in R (dynr). The package dynr provides a suite
of fast and accessible functions for estimating and visualizing the
results from fitting linear and nonlinear dynamic systems models in
discrete as well as continuous time. By integrating the estimation
functions in dynr and the MI procedures available from the R
package, Multivariate Imputation by Chained Equations (MICE), the
dynr.mi() routine is designed to handle possibly non-ignorable
missingness in the dependent variables and/or covariates in a
user-specified dynamic systems model via MI, with convergence
diagnostic check. We utilized dynr.mi() to examine, in the context
of a vector autoregressive model, the relationships among individuals’
ambulatory physiological measures, and self-report affect valence
and arousal. The results from MI were compared to those from
listwise deletion of entries with missingness in the covariates.
When we determined the number of iterations based on the
convergence diagnostics available from dynr.mi(), differences in
the statistical significance of the covariate parameters were observed
between the listwise deletion and MI approaches. These results
underscore the importance of considering diagnostic information in
the implementation of MI procedures.
Abstract: With the rapid development of modern communication,
diagnosing the fiber-optic quality and faults in real-time is widely
focused. In this paper, a Labview-based system is proposed for
fiber-optic faults detection. The wavelet threshold denoising method
combined with Empirical Mode Decomposition (EMD) is applied to
denoise the optical time domain reflectometer (OTDR) signal. Then
the method based on Gabor representation is used to detect events.
Experimental measurements show that signal to noise ratio (SNR)
of the OTDR signal is improved by 1.34dB on average, compared
with using the wavelet threshold denosing method. The proposed
system has a high score in event detection capability and accuracy.
The maximum detectable fiber length of the proposed Labview-based
system can be 65km.
Abstract: Ontologies and various semantic repositories became a convenient approach for implementing model-driven architectures of distributed systems on the Web. SPARQL is the standard query language for querying such. However, although SPARQL is well-established standard for querying semantic repositories in RDF and OWL format and there are commonly used APIs which supports it, like Jena for Java, its parallel option is not incorporated in them. This article presents a complete framework consisting of an object algebra for parallel RDF and an index-based implementation of the parallel query engine capable of dealing with the distributed RDF ontologies which share common vocabulary. It has been implemented in Java, and for validation of the algorithms has been applied to the problem of organizing virtual exhibitions on the Web.
Abstract: The wireless communication network is developing
rapidly, thus the wireless security becomes more and more important.
Specific emitter identification (SEI) is an vital part of wireless
communication security as a technique to identify the unique
transmitters. In this paper, a SEI method based on multiscale
dispersion entropy (MDE) and refined composite multiscale dispersion
entropy (RCMDE) is proposed. The algorithms of MDE and RCMDE
are used to extract features for identification of five wireless
devices and cross-validation support vector machine (CV-SVM)
is used as the classifier. The experimental results show that the
total identification accuracy is 99.3%, even at low signal-to-noise
ratio(SNR) of 5dB, which proves that MDE and RCMDE can
describe the communication signal series well. In addition, compared
with other methods, the proposed method is effective and provides
better accuracy and stability for SEI.
Abstract: In response to the dearth of information about emoji use for different purposes in different settings, this paper investigates the paralinguistic function of emojis within Twitter communication in the United States. To conduct this investigation, the Twitter feeds from 16 population centers spread throughout the United States were collected from the Twitter public API. One hundred tweets were collected from each population center, totaling to 1,600 tweets. Tweets containing emojis were next extracted using the “emot” Python package; these were then analyzed via the IBM Watson API Natural Language Understanding module to identify the topics discussed. A manual content analysis was then conducted to ascertain the paralinguistic and emotional features of the emojis used in these tweets. We present our characterization of emoji usage in Twitter and discuss implications for the design of Twitter and other text-based communication tools.
Abstract: The Internet of Things (IoT) will lead to the development of advanced Smart Home services that are pervasive, cost-effective, and can be accessed by home occupants from anywhere and at any time. However, advanced smart home applications will introduce grand security challenges due to the increase in the attack surface. Current approaches do not handle cybersecurity from a holistic point of view; hence, a systematic cybersecurity mechanism needs to be adopted when designing smart home applications. In this paper, we present a generic intrusion detection methodology to detect and mitigate the anomaly behaviors happened in Smart Home Systems (SHS). By utilizing our Smart Home Context Data Structure, the heterogeneous information and services acquired from SHS are mapped in context attributes which can describe the context of smart home operation precisely and accurately. Runtime models for describing usage patterns of home assets are developed based on characterization functions. A threat-aware action management methodology, used to efficiently mitigate anomaly behaviors, is proposed at the end. Our preliminary experimental results show that our methodology can be used to detect and mitigate known and unknown threats, as well as to protect SHS premises and services.
Abstract: Falls are one of the major causes of injury and death
among elderly people aged 65 and above. A support system to
identify such kind of abnormal activities have become extremely
important with the increase in ageing population. Pose estimation
is a challenging task and to add more to this, it is even more
challenging when pose estimations are performed on challenging
poses that may occur during fall. Location of the body provides a
clue where the person is at the time of fall. This paper presents
a vision-based tracking strategy where available joints are grouped
into three different feature points depending upon the section they are
located in the body. The three feature points derived from different
joints combinations represents the upper region or head region,
mid-region or torso and lower region or leg region. Tracking is always
challenging when a motion is involved. Hence the idea is to locate
the regions in the body in every frame and consider it as the tracking
strategy. Grouping these joints can be beneficial to achieve a stable
region for tracking. The location of the body parts provides a crucial
information to distinguish normal activities from falls.
Abstract: Programming is one of the challenging subjects in the field of computing. In the higher education sphere, some programming novices’ performance, retention rate, and success rate are not improving. Most of the time, the problem is caused by the slow pace of learning, difficulty in grasping the syntax of the programming language and poor logical skills. More importantly, programming forms part of major subjects within the field of computing. As a result, specialized pedagogical methods and innovation are highly recommended. Little research has been done on the potential productivity of the WhatsApp platform as part of a blended learning model. In this article, the authors discuss the WhatsApp group as a part of blended learning model incorporated for a group of programming novices. We discuss possible administrative activities for productive utilisation of the WhatsApp group on the blended learning overview. The aim is to take advantage of the popularity of WhatsApp and the time students spend on it for their educational purpose. We believe that blended learning featuring a WhatsApp group may ease novices’ cognitive load and strengthen their foundational programming knowledge and skills. This is a work in progress as the proposed blended learning model with WhatsApp incorporated is yet to be implemented.
Abstract: e-Government mobile applications provide an extension for effective e-government services in today’s omniconnected world. They constitute part of m-government platforms. This study explores the usefulness, availability, discoverability and maturity of such applications. While this study impacts theory by addressing a relatively lacking area, it impacts practice more. The outcomes of this study suggest valuable recommendations for practitioners-developers of e-government applications. The methodology followed is to examine a large number of e-government smartphone applications. The focus is on applications available at the Google Play Store. Moreover, the study investigates applications published on government portals of a number of countries. A sample of 15 countries is researched. The results show a diversity in the level of discoverability, development, maturity, and usage of smartphone apps dedicated for use of e-government services. It was found that there are major issues in discovering e-government applications on both the Google Play Store and as-well-as on local government portals. The study found that only a fraction of mobile government applications was published on the Play Store. Only 19% of apps were multilingual, and 43% were developed by third parties including private individuals. Further analysis was made, and important recommendations are suggested in this paper for a better utilization of e-government smartphone applications. These recommendations will result in better discoverability, maturity, and usefulness of e-government applications.