Published: Dec 7, 2023
Converted to Gold OA:
DOI: 10.4018/IJSWIS.334556
Volume 20
Zhou Li, Gengming Xie, Varsha Arya, Kwok Tai Chui
The implementation of industrial robots across various sectors has ushered in unparalleled advancements in efficiency, productivity, and safety. This paper explores the domain of semantic trajectory...
Show More
The implementation of industrial robots across various sectors has ushered in unparalleled advancements in efficiency, productivity, and safety. This paper explores the domain of semantic trajectory planning in the area of industrial robotics. By adeptly merging physical constraints and semantic knowledge of environments, the proposed methodology enables robots to navigate complex surroundings with utmost precision and efficiency. In a landscape marked by dynamic challenges, the research positions semantic trajectory planning as a linchpin in fostering adaptability. It ensures robots interact safely with their surroundings, providing vital object detection and recognition capabilities. The proposed ResNet model exhibits remarkable classification performance, bolstering overall productivity. The study underscores the significance of this approach in addressing real-world industrial applications while emphasizing accuracy, precision, and enhanced productivity.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Li, Zhou, et al. "Semantic Trajectory Planning for Industrial Robotics." IJSWIS vol.20, no.1 2024: pp.1-10. http://doi.org/10.4018/IJSWIS.334556
APA
Li, Z., Xie, G., Arya, V., & Chui, K. T. (2024). Semantic Trajectory Planning for Industrial Robotics. International Journal on Semantic Web and Information Systems (IJSWIS), 20(1), 1-10. http://doi.org/10.4018/IJSWIS.334556
Chicago
Li, Zhou, et al. "Semantic Trajectory Planning for Industrial Robotics," International Journal on Semantic Web and Information Systems (IJSWIS) 20, no.1: 1-10. http://doi.org/10.4018/IJSWIS.334556
Export Reference
Published: Dec 4, 2023
Converted to Gold OA:
DOI: 10.4018/IJSWIS.334591
Volume 20
Ming-Te Chen, Yi Yang Chang, Ta Jen Wu
In recent years, the internet and smart devices have developed rapidly. Many people no longer rely on newspapers, magazines, or television to receive news. They can see the latest news using...
Show More
In recent years, the internet and smart devices have developed rapidly. Many people no longer rely on newspapers, magazines, or television to receive news. They can see the latest news using computers or mobile phones. According to a study by the Taiwan Internet Information Center, nearly 90% of Taiwanese people have used the internet. Many online streaming services have emerged, and people can easily watch movies and TV programs through computers or mobile phones. Hence, some websites use digital copyright management mechanisms to protect videos from being directly downloaded. However, 30% of websites use AES-128 encryption to protect their content. If the key access mechanism is not well protected, the encryption methodology may be useless. Therefore, this paper proposes a cross-platform digital copyright management mechanism for adaptive streaming. With this mechanism, users do not need to download additional applications, as the mechanism implements Web-Assembly language through the browser.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Chen, Ming-Te, et al. "Digital Copyright Management Mechanism Based on Dynamic Encryption for Multiplatform Browsers." IJSWIS vol.20, no.1 2024: pp.1-22. http://doi.org/10.4018/IJSWIS.334591
APA
Chen, M., Chang, Y. Y., & Wu, T. J. (2024). Digital Copyright Management Mechanism Based on Dynamic Encryption for Multiplatform Browsers. International Journal on Semantic Web and Information Systems (IJSWIS), 20(1), 1-22. http://doi.org/10.4018/IJSWIS.334591
Chicago
Chen, Ming-Te, Yi Yang Chang, and Ta Jen Wu. "Digital Copyright Management Mechanism Based on Dynamic Encryption for Multiplatform Browsers," International Journal on Semantic Web and Information Systems (IJSWIS) 20, no.1: 1-22. http://doi.org/10.4018/IJSWIS.334591
Export Reference
Published: Dec 15, 2023
Converted to Gold OA:
DOI: 10.4018/IJSWIS.334704
Volume 20
Mingrui Zhao, Chunjing Shi, Yixiao Yuan
The industrial internet of things (IIoT) necessitates robust cross-domain authentication to secure sensitive on-site equipment data. This paper presents a refined reputation-based lightweight...
Show More
The industrial internet of things (IIoT) necessitates robust cross-domain authentication to secure sensitive on-site equipment data. This paper presents a refined reputation-based lightweight consensus mechanism (LRBCM) tailored for IIoT's distributed network structures. Leveraging node reputation values, LRBCM streamlines ledger consensus, minimizing communication overhead and complexity. Comparative experiments show LRBCM outperforms competing mechanisms. It maintains higher throughput as the number of participating nodes increases and achieves a throughput approximately 10.78% higher than ReCon. Moreover, runtime analysis demonstrates LRBCM's scalability, surpassing ReCon by approximately 12.79% with equivalent nodes and transactions. In addition, as a combination of LRBCM, the proposed distributed lightweight authentication mechanism (ELAM) is rigorously evaluated against the security of various attacks, and its resilience is confirmed. Experiments show that ELAM has good efficiency while maintaining high security.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Zhao, Mingrui, et al. "Blockchain-Based Lightweight Authentication Mechanisms for Industrial Internet of Things and Information Systems." IJSWIS vol.20, no.1 2024: pp.1-30. http://doi.org/10.4018/IJSWIS.334704
APA
Zhao, M., Shi, C., & Yuan, Y. (2024). Blockchain-Based Lightweight Authentication Mechanisms for Industrial Internet of Things and Information Systems. International Journal on Semantic Web and Information Systems (IJSWIS), 20(1), 1-30. http://doi.org/10.4018/IJSWIS.334704
Chicago
Zhao, Mingrui, Chunjing Shi, and Yixiao Yuan. "Blockchain-Based Lightweight Authentication Mechanisms for Industrial Internet of Things and Information Systems," International Journal on Semantic Web and Information Systems (IJSWIS) 20, no.1: 1-30. http://doi.org/10.4018/IJSWIS.334704
Export Reference
Published: Dec 15, 2023
Converted to Gold OA:
DOI: 10.4018/IJSWIS.334845
Volume 20
Qi Zhou, Zhoupu Wang
A network intrusion detection method for information systems using federated learning and improved transformer is proposed to address the problems of long detection time and low security and...
Show More
A network intrusion detection method for information systems using federated learning and improved transformer is proposed to address the problems of long detection time and low security and accuracy when analyzing massive data in most existing intrusion detection methods. Firstly, a network intrusion detection system is constructed based on a federated learning framework, and the transformer model is used as its universal detection model. Then, the dataset is divided and an improved generative adversarial network is used for data augmentation to generate a new sample set to overcome the influence of minority class samples. At the same time, the new samples are input into the transformer local model for network attack type detection and analysis. Finally, the authors aggregate the detection results of each local model and input them into the Softmax classifier to obtain the final classification prediction results.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Zhou, Qi, and Zhoupu Wang. "A Network Intrusion Detection Method for Information Systems Using Federated Learning and Improved Transformer." IJSWIS vol.20, no.1 2024: pp.1-20. http://doi.org/10.4018/IJSWIS.334845
APA
Zhou, Q. & Wang, Z. (2024). A Network Intrusion Detection Method for Information Systems Using Federated Learning and Improved Transformer. International Journal on Semantic Web and Information Systems (IJSWIS), 20(1), 1-20. http://doi.org/10.4018/IJSWIS.334845
Chicago
Zhou, Qi, and Zhoupu Wang. "A Network Intrusion Detection Method for Information Systems Using Federated Learning and Improved Transformer," International Journal on Semantic Web and Information Systems (IJSWIS) 20, no.1: 1-20. http://doi.org/10.4018/IJSWIS.334845
Export Reference
Published: Dec 29, 2023
Converted to Gold OA:
DOI: 10.4018/IJSWIS.335113
Volume 20
Shunqin Zhang, Sanguo Zhang, Wenduo He, Xuan Zhang
The NER task is largely developed based on well-annotated data. However, in many scenarios, the entities may not be fully annotated, leading to serious performance degradation. To address this...
Show More
The NER task is largely developed based on well-annotated data. However, in many scenarios, the entities may not be fully annotated, leading to serious performance degradation. To address this issue, the authors propose a robust NER approach that combines a novel PU-learning algorithm and negative sampling. Unlike many existing studies, the proposed method adopts a two-step procedure for handling unlabeled entities, thereby enhancing its capability to mitigate the impact of such entities. Moreover, this algorithm demonstrates high versatility and can be integrated into any token-level NER model with ease. The effectiveness of the proposed method is verified on several classic NER models and datasets, demonstrating its strong ability to handle unlabeled entities. Finally, the authors achieve competitive performances on synthetic and real-world datasets.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Zhang, Shunqin, et al. "A Web Semantic-Based Text Analysis Approach for Enhancing Named Entity Recognition Using PU-Learning and Negative Sampling." IJSWIS vol.20, no.1 2024: pp.1-23. http://doi.org/10.4018/IJSWIS.335113
APA
Zhang, S., Zhang, S., He, W., & Zhang, X. (2024). A Web Semantic-Based Text Analysis Approach for Enhancing Named Entity Recognition Using PU-Learning and Negative Sampling. International Journal on Semantic Web and Information Systems (IJSWIS), 20(1), 1-23. http://doi.org/10.4018/IJSWIS.335113
Chicago
Zhang, Shunqin, et al. "A Web Semantic-Based Text Analysis Approach for Enhancing Named Entity Recognition Using PU-Learning and Negative Sampling," International Journal on Semantic Web and Information Systems (IJSWIS) 20, no.1: 1-23. http://doi.org/10.4018/IJSWIS.335113
Export Reference
Published: Jan 7, 2024
Converted to Gold OA:
DOI: 10.4018/IJSWIS.335495
Volume 20
Qi Zhou, Chun Shi
Under the premise of ensuring data privacy, traditional network intrusion detection (NID) methods cannot achieve high accuracy for different types of intrusions. A NID method combining transformer...
Show More
Under the premise of ensuring data privacy, traditional network intrusion detection (NID) methods cannot achieve high accuracy for different types of intrusions. A NID method combining transformer and federated learning (FedL) is proposed for this purpose. First, a multi-party collaborative learning framework was built based on FedL, which achieved data exchange and sharing. Then, by introducing the self-attention mechanism (AttM) to improve the traditional transformer, it could quickly converge. Finally, an NID model integrating transformer and FedL was constructed by combining DNN, GRU, and an encoder module composed of improved transformer, achieving accurate detection of network intrusion. The proposed NID method was compared with the other three methods. The results show that the proposed method has the highest NID accuracy and F1 score on the NSL-KDD and UNSW-NB15 dataset, with the highest accuracy reaching 99.65% and 89.25%, while the F1 score has the highest accuracy, reaching 99.45% and 88.13%, outperforming the other three comparative algorithms in terms of performance.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Zhou, Qi, and Chun Shi. "A Network Intrusion Detection Method for Various Information Systems Based on Federated and Deep Learning." IJSWIS vol.20, no.1 2024: pp.1-28. http://doi.org/10.4018/IJSWIS.335495
APA
Zhou, Q. & Shi, C. (2024). A Network Intrusion Detection Method for Various Information Systems Based on Federated and Deep Learning. International Journal on Semantic Web and Information Systems (IJSWIS), 20(1), 1-28. http://doi.org/10.4018/IJSWIS.335495
Chicago
Zhou, Qi, and Chun Shi. "A Network Intrusion Detection Method for Various Information Systems Based on Federated and Deep Learning," International Journal on Semantic Web and Information Systems (IJSWIS) 20, no.1: 1-28. http://doi.org/10.4018/IJSWIS.335495
Export Reference
Published: Jan 7, 2024
Converted to Gold OA:
DOI: 10.4018/IJSWIS.335641
Volume 20
Hao Ma, Zhiyi Gai
Land desertification is the key contradiction restricting the sustainable development of Chinese society. Farmers and herders' behavior in desert management is particularly important for the smooth...
Show More
Land desertification is the key contradiction restricting the sustainable development of Chinese society. Farmers and herders' behavior in desert management is particularly important for the smooth development of the desertification control project. Although farmers and herders express willingness, they do not engage in desert management behavior. The research through random sampling survey analyzes survey data from 572 farmers and herders in the Kubuqi Desert region of Inner Mongolia using structural equation modeling and mediation analysis, based on the TPB. The aim is to understand the paradoxical willingness and behavior of farmers and herders to participate in desert management. The study found that farmers and herders' willingness to participate is a crucial factor that influences their behavior. The authors suggest cultivating a sense of ecological responsibility and strengthening ecological education to guide the behavior of farmers and herders towards more sustainable practices.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Ma, Hao, and Zhiyi Gai. "Semantic Web-Based Structural Equation Modeling and Mediating Effects Are Used to Investigate Key Factors." IJSWIS vol.20, no.1 2024: pp.1-27. http://doi.org/10.4018/IJSWIS.335641
APA
Ma, H. & Gai, Z. (2024). Semantic Web-Based Structural Equation Modeling and Mediating Effects Are Used to Investigate Key Factors. International Journal on Semantic Web and Information Systems (IJSWIS), 20(1), 1-27. http://doi.org/10.4018/IJSWIS.335641
Chicago
Ma, Hao, and Zhiyi Gai. "Semantic Web-Based Structural Equation Modeling and Mediating Effects Are Used to Investigate Key Factors," International Journal on Semantic Web and Information Systems (IJSWIS) 20, no.1: 1-27. http://doi.org/10.4018/IJSWIS.335641
Export Reference
Published: Jan 12, 2024
Converted to Gold OA:
DOI: 10.4018/IJSWIS.335918
Volume 20
Huchao Zhang
The traditional multi-modal sentiment analysis (MSA) method usually considers the multi-modal characteristics to be equally important and ignores the contribution of different modes to the final MSA...
Show More
The traditional multi-modal sentiment analysis (MSA) method usually considers the multi-modal characteristics to be equally important and ignores the contribution of different modes to the final MSA result. Therefore, an MSA method based on hierarchical adaptive feature fusion network is proposed. Firstly, RoBERTa, ResViT, and LibROSA are used to extract different modal features and construct a layered adaptive multi-modal fusion network. Then, the multi-modal feature extraction module and cross-modal feature interaction module are combined to realize the interactive fusion of information between modes. Finally, an adaptive gating mechanism is introduced to design a global multi-modal feature interaction module to learn the unique features of different modes. The experimental results on three public data sets show that the proposed method can make full use of multi-modal information, outperform other advanced comparison methods, improve the accuracy and robustness of sentiment analysis, and is expected to achieve better results in the field of sentiment analysis.
Content Forthcoming
Add to Your Personal Library: Article Published: Jan 12, 2024
Converted to Gold OA:
DOI: 10.4018/IJSWIS.335947
Volume 20
David Juárez-Varón, René Ernesto Esquivel Gaón, Ana Mengual-Recuerda, Camilo Vera-Sepúlveda
This study aims to quantify the perception of value and acceptance by citizens of the use of cyber-physical systems (CPS) in transportation systems and smart cities using neurotechnologies. The work...
Show More
This study aims to quantify the perception of value and acceptance by citizens of the use of cyber-physical systems (CPS) in transportation systems and smart cities using neurotechnologies. The work has been developed in the main cities of the following Latin American countries: Spain, Ecuador, Colombia, and Argentina. Targeting urban, public transport-using graduates, it assesses CPS in smart cities and user experiences. Triangulating qualitative research and neurotechnology, the study extends the taxonomy of emotional domains. The results indicate that users do not always assign equivalent importance to what they truly feel, and it is noteworthy that the most important factor, both quantitatively and emotionally, is the application of CPS to improve efficiency in public transportation. The implications of these analyses are discussed in the final part of the article with the aim of providing recommendations to policymakers on the key aspects to be considered in the design and development of CPS for use in smart cities.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Juárez-Varón, David, et al. "Neurotechnologies Applied to Society's Perception of Cyber-Physical Systems (CPS) in Smart Cities." IJSWIS vol.20, no.1 2024: pp.1-32. http://doi.org/10.4018/IJSWIS.335947
APA
Juárez-Varón, D., Gaón, R. E., Mengual-Recuerda, A., & Vera-Sepúlveda, C. (2024). Neurotechnologies Applied to Society's Perception of Cyber-Physical Systems (CPS) in Smart Cities. International Journal on Semantic Web and Information Systems (IJSWIS), 20(1), 1-32. http://doi.org/10.4018/IJSWIS.335947
Chicago
Juárez-Varón, David, et al. "Neurotechnologies Applied to Society's Perception of Cyber-Physical Systems (CPS) in Smart Cities," International Journal on Semantic Web and Information Systems (IJSWIS) 20, no.1: 1-32. http://doi.org/10.4018/IJSWIS.335947
Export Reference
Published: Jan 17, 2024
Converted to Gold OA:
DOI: 10.4018/IJSWIS.336480
Volume 20
Yan Li
Traditional deep learning models for text sentiment analysis fail to fully harness the contextual semantic information of aspect nodes or use prior sentiment resources. This paper proposes a dual...
Show More
Traditional deep learning models for text sentiment analysis fail to fully harness the contextual semantic information of aspect nodes or use prior sentiment resources. This paper proposes a dual channel sentiment analysis model named M2BERT-BLSTM AA that is based on an enhanced Bidirectional Encoder Representations from Transformers(BERT)and Bidirectional Long short-term memory(BLSTM) model and incorporates a Dual Attention Mechanism. Firstly, an emotional resource database is constructed using existing emotional resources. Secondly, vectors are concatenated following mean and max pooling along the dimension of sentence length. These semantic features mitigate evaluation imbalance.Then the text and sentiment information are encoded separately, using distinct Attention Mechanism(Att-M) to extract contextual relationships and emotional features. The model's Aspect-Based multi-class sentiment prediction accuracies on the three Chinese datasets of Meituan ordering, restaurants, and laptops are 75.2%, 87.5%, and 75%, respectively, showing improved performance on sentiment classification.
Content Forthcoming
Add to Your Personal Library: Article Published: Jan 23, 2024
Converted to Gold OA:
DOI: 10.4018/IJSWIS.336550
Volume 20
Shouwei Gao, Yi Cheng, Shujun Mao, Xiangyu Fan, Xingyang Deng
Selective attention, essential in discerning visual stimuli, enables the identification of threats such as snakes—a prime evolutionary influence on the human visual system. This phenomenon is...
Show More
Selective attention, essential in discerning visual stimuli, enables the identification of threats such as snakes—a prime evolutionary influence on the human visual system. This phenomenon is encapsulated in snake detection theory (SDT), which posits that our ancestors' need to recognize these predators led to specialized perceptual abilities. This investigation utilizes steady-state visual evoked potentials (SSVEP) alongside the random image structure evolution technique, which systematically increases visual clarity through the interpolation of random noise, to probe the neural mechanisms underpinning selective attention, with a focus on serpentine forms. These findings underscore snakes' unique perceptual impact due to their curved forms and scaled textures, crucial for quick recognition—advancing image semantic segmentation and recognition tech.. This is particularly relevant for security and wildlife management, showcasing the evolutionary progression and cognitive prowess of the human visual apparatus.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Gao, Shouwei, et al. "SSVEP-Enhanced Threat Detection and Its Impact on Image Segmentation." IJSWIS vol.20, no.1 2024: pp.1-20. http://doi.org/10.4018/IJSWIS.336550
APA
Gao, S., Cheng, Y., Mao, S., Fan, X., & Deng, X. (2024). SSVEP-Enhanced Threat Detection and Its Impact on Image Segmentation. International Journal on Semantic Web and Information Systems (IJSWIS), 20(1), 1-20. http://doi.org/10.4018/IJSWIS.336550
Chicago
Gao, Shouwei, et al. "SSVEP-Enhanced Threat Detection and Its Impact on Image Segmentation," International Journal on Semantic Web and Information Systems (IJSWIS) 20, no.1: 1-20. http://doi.org/10.4018/IJSWIS.336550
Export Reference
Published: Jan 31, 2024
Converted to Gold OA:
DOI: 10.4018/IJSWIS.336919
Volume 20
Xiai Yan, Yao Yi, Weiqi Shi, Hua Tian, Xin Su
In recent years, knowledge graph completion (KGC) has garnered significant attention. However, noise in the graph poses numerous challenges to the completion of tasks, including error propagation...
Show More
In recent years, knowledge graph completion (KGC) has garnered significant attention. However, noise in the graph poses numerous challenges to the completion of tasks, including error propagation, missing information, and misleading relations. Many existing KGC methods utilize the multi-head self-attention mechanism (MHA) in transformers, which yields favorable results in low-dimensional space. Nevertheless, employing MHA introduces the risk of overfitting due to a large number of additional parameters, and the choice of model loss function is not comprehensive enough to capture the semantic discriminatory nature between entities and relationships and the treatment of RDF indicates that the dataset contains only positive (training) examples, and the error facts are not encoded, which tends to cause overgeneralization.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Yan, Xiai, et al. "Improvement of Web Semantic and Transformer-Based Knowledge Graph Completion in Low-Dimensional Spaces." IJSWIS vol.20, no.1 2024: pp.1-18. http://doi.org/10.4018/IJSWIS.336919
APA
Yan, X., Yi, Y., Shi, W., Tian, H., & Su, X. (2024). Improvement of Web Semantic and Transformer-Based Knowledge Graph Completion in Low-Dimensional Spaces. International Journal on Semantic Web and Information Systems (IJSWIS), 20(1), 1-18. http://doi.org/10.4018/IJSWIS.336919
Chicago
Yan, Xiai, et al. "Improvement of Web Semantic and Transformer-Based Knowledge Graph Completion in Low-Dimensional Spaces," International Journal on Semantic Web and Information Systems (IJSWIS) 20, no.1: 1-18. http://doi.org/10.4018/IJSWIS.336919
Export Reference
Published: Jan 31, 2024
Converted to Gold OA:
DOI: 10.4018/IJSWIS.336921
Volume 20
Haiqin Ye, Ying Chen
With the intention of addressing the concern that existing point of interest recommendation methods fail to fully utilize the auxiliary information of the point of interest, from which it is...
Show More
With the intention of addressing the concern that existing point of interest recommendation methods fail to fully utilize the auxiliary information of the point of interest, from which it is challenging to extricate a substantial quantity of deeper feature information, a personalized point of interest (POI) recommendation model using Context-Aware Gated Recurrent Unit (CAGRU) and implicit semantic feature extraction was proposed. First, the check-in data is divided into five tags, and the continuous geographical location check-in data and time data are discretized. Then, the CAGRU was used to obtain the POI check-in features. Finally, the time sequence location information, user information and target location information are transformed through the nonlinear activation function to obtain the score of each location in the data set as the next POI location, and the Top-N recommendation is generated through the score. Experiments indicated that the results of the suggested method were better than the comparative methods.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Ye, Haiqin, and Ying Chen. "Personalized POI Recommendation Using CAGRU and Implicit Semantic Feature Extraction in LBSN." IJSWIS vol.20, no.1 2024: pp.1-20. http://doi.org/10.4018/IJSWIS.336921
APA
Ye, H. & Chen, Y. (2024). Personalized POI Recommendation Using CAGRU and Implicit Semantic Feature Extraction in LBSN. International Journal on Semantic Web and Information Systems (IJSWIS), 20(1), 1-20. http://doi.org/10.4018/IJSWIS.336921
Chicago
Ye, Haiqin, and Ying Chen. "Personalized POI Recommendation Using CAGRU and Implicit Semantic Feature Extraction in LBSN," International Journal on Semantic Web and Information Systems (IJSWIS) 20, no.1: 1-20. http://doi.org/10.4018/IJSWIS.336921
Export Reference
Published: Feb 1, 2024
Converted to Gold OA:
DOI: 10.4018/IJSWIS.337286
Volume 20
Dan Fu, Weisi Yang, Li Pan
The existing EEG emotion classification methods have some problems, such as insufficient emotion representation and lack of targeted channel enhancement module due to feature redundancy. To this...
Show More
The existing EEG emotion classification methods have some problems, such as insufficient emotion representation and lack of targeted channel enhancement module due to feature redundancy. To this end, a novel EEG emotion recognition method (SCLE-2D-CNN) combining scaled convolutional layer (SCLs), enhanced channel module and two-dimensional convolutional neural network (2D-CNN) is proposed. Firstly, the time-frequency features of multi-channel EEG emotional signals were extracted by stacking scl layer by layer. Secondly, channel enhancement module is used to reassign different importance to all EEG physical channels. Finally, 2D-CNN was used to obtain deep local spatiotemporal features and complete emotion classification. The experimental results show that the accuracy of SEED data set and F1 are 98.09% and 97.00%, respectively, and the binary classification accuracy of DEAP data set is 98.06% and 96.83%, respectively, which are superior to other comparison methods. The proposed method has a certain application prospect in the recognition of human mental state.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Fu, Dan, et al. "Channel Semantic Enhancement-Based Emotional Recognition Method Using SCLE-2D-CNN." IJSWIS vol.20, no.1 2024: pp.1-22. http://doi.org/10.4018/IJSWIS.337286
APA
Fu, D., Yang, W., & Pan, L. (2024). Channel Semantic Enhancement-Based Emotional Recognition Method Using SCLE-2D-CNN. International Journal on Semantic Web and Information Systems (IJSWIS), 20(1), 1-22. http://doi.org/10.4018/IJSWIS.337286
Chicago
Fu, Dan, Weisi Yang, and Li Pan. "Channel Semantic Enhancement-Based Emotional Recognition Method Using SCLE-2D-CNN," International Journal on Semantic Web and Information Systems (IJSWIS) 20, no.1: 1-22. http://doi.org/10.4018/IJSWIS.337286
Export Reference
Published: Feb 1, 2024
Converted to Gold OA:
DOI: 10.4018/IJSWIS.337320
Volume 20
Zechen Jin, Tianjian Zou, Dazhuang Sun, Yu Yang, Jun Liu
Table tennis is a popular sport around the world. A key technology in table tennis education and analysis system is reconstructing the trajectory of the fast-moving ball from videos. Typically the...
Show More
Table tennis is a popular sport around the world. A key technology in table tennis education and analysis system is reconstructing the trajectory of the fast-moving ball from videos. Typically the table tennis ball is too small and barely visible in the video, making it difficult to be recognized directly by detection models like YOLO. However, table tennis balls usually has obvious motion features, which are usually not found in similar false targets. It inspired the authors to first find all candidate targets and then use the motion features of table tennis ball to select them out. In this article, the authors propose a tree-based algorithm named T-FORT to track the ball and reconstruct its trajectory. Specifically, they consider all the possible objects in a tree-framework, and identify the real target by integrating visual features and moving patterns. The authors conduct a set of experiments on three datasets to evaluate the effectiveness and performance of the proposed algorithm. The experimental results show that the proposed method is more precise than existing algorithms, and is robust in various scenarios.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Jin, Zechen, et al. "A Semantic Tree-Based Fast-Moving Object Trajectory Tracking Algorithm for Table Tennis." IJSWIS vol.20, no.1 2024: pp.1-17. http://doi.org/10.4018/IJSWIS.337320
APA
Jin, Z., Zou, T., Sun, D., Yang, Y., & Liu, J. (2024). A Semantic Tree-Based Fast-Moving Object Trajectory Tracking Algorithm for Table Tennis. International Journal on Semantic Web and Information Systems (IJSWIS), 20(1), 1-17. http://doi.org/10.4018/IJSWIS.337320
Chicago
Jin, Zechen, et al. "A Semantic Tree-Based Fast-Moving Object Trajectory Tracking Algorithm for Table Tennis," International Journal on Semantic Web and Information Systems (IJSWIS) 20, no.1: 1-17. http://doi.org/10.4018/IJSWIS.337320
Export Reference
Published: Feb 13, 2024
Converted to Gold OA:
DOI: 10.4018/IJSWIS.337598
Volume 20
Jing Yang, Yujie Xiong
Aspect-based sentiment analysis is the key to natural language processing, and it focuses on the polarity of emotions associated with specific text aspects. Traditional models that combine text and...
Show More
Aspect-based sentiment analysis is the key to natural language processing, and it focuses on the polarity of emotions associated with specific text aspects. Traditional models that combine text and visual data tend to ignore the deeper interconnections between patterns. To solve this problem, the authors propose a multimodal sentiment-oriented analysis (BiCCM-ABSA) model based on bidirectional complementary correlation. The model utilizes text-image synergy through a novel cross-modal attention mechanism to align text with image features. With the transformer architecture, it is not only a simple fusion, but also ensures the complex alignment of multi-modal features and gating mechanisms. Experiments were conducted on the Twitter-15 and Twitter-17 datasets, achieving 69.28 accuracy and 67.54% F1 score, respectively. The experimental results demonstrate the advantages of BiCCM-ABSA, the bidirectional approach of the model and the effective cross-modal correlation set a new benchmark in the field of multimodal emotion recognition, providing insights beyond traditional single-modal analysis.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Yang, Jing, and Yujie Xiong. "Bidirectional Complementary Correlation-Based Multimodal Aspect-Level Sentiment Analysis." IJSWIS vol.20, no.1 2024: pp.1-16. http://doi.org/10.4018/IJSWIS.337598
APA
Yang, J. & Xiong, Y. (2024). Bidirectional Complementary Correlation-Based Multimodal Aspect-Level Sentiment Analysis. International Journal on Semantic Web and Information Systems (IJSWIS), 20(1), 1-16. http://doi.org/10.4018/IJSWIS.337598
Chicago
Yang, Jing, and Yujie Xiong. "Bidirectional Complementary Correlation-Based Multimodal Aspect-Level Sentiment Analysis," International Journal on Semantic Web and Information Systems (IJSWIS) 20, no.1: 1-16. http://doi.org/10.4018/IJSWIS.337598
Export Reference
Published: Feb 7, 2024
Converted to Gold OA:
DOI: 10.4018/IJSWIS.337599
Volume 20
Olfa Bouzaabia, Mohamed Ben Arbia, David Juarez Juárez Varón, Kwok Tai Chui
Gamification in mobile apps has a research gap, given the potential for gamification to enhance user repurchase intention in a mobile commerce context. This research investigates the concept of...
Show More
Gamification in mobile apps has a research gap, given the potential for gamification to enhance user repurchase intention in a mobile commerce context. This research investigates the concept of gamified m-commerce platform application through the lenses of customer experience and repurchase intention. The study proposes an empirical model to examine the relationship between hedonic value, utilitarian value, customer experience, and repurchase intention in the context of mobile commerce platform application. It is underscoring the importance of exploring the application of gamified m-commerce platforms and their impact on customer experience and repurchase intention. The findings contribute to the existing body of literature on online retail by offering new insights into the implications of gamified m-commerce platform applications. A quantitative research approach was employed, and an online questionnaire was used to gather data. The collected data from a sample of 270 mobile commerce shoppers was analyzed. The results supported all direct hypothesized associations among variables.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Bouzaabia, Olfa, et al. "The Consequences of Gamification in Mobile Commerce Platform Applications." IJSWIS vol.20, no.1 2024: pp.1-20. http://doi.org/10.4018/IJSWIS.337599
APA
Bouzaabia, O., Ben Arbia, M., Juárez Varón, D. J., & Chui, K. T. (2024). The Consequences of Gamification in Mobile Commerce Platform Applications. International Journal on Semantic Web and Information Systems (IJSWIS), 20(1), 1-20. http://doi.org/10.4018/IJSWIS.337599
Chicago
Bouzaabia, Olfa, et al. "The Consequences of Gamification in Mobile Commerce Platform Applications," International Journal on Semantic Web and Information Systems (IJSWIS) 20, no.1: 1-20. http://doi.org/10.4018/IJSWIS.337599
Export Reference
Published: Feb 14, 2024
Converted to Gold OA:
DOI: 10.4018/IJSWIS.337961
Volume 20
Wang Jun, Muhammad Shahid Iqbal, Rashid Abbasi, Marwan Omar, Chu Huiqin
Machine learning is playing an increasingly important role in education. This article examines its potential to bring about transformative change in this field. By using machine learning algorithms...
Show More
Machine learning is playing an increasingly important role in education. This article examines its potential to bring about transformative change in this field. By using machine learning algorithms, physical education teachers can gather and analyze data on student performance and behavior. This enables them to create personalized learning experiences that cater to the unique needs of each student. Machine learning can also track and assess student progress, providing educators with valuable insights into the effectiveness of their teaching strategies. Furthermore, it can optimize the design of physical education curricula and assessments, making them more efficient and effective. Additionally, machine learning offers a more objective and accurate approach to evaluating and grading students. This paper discusses the challenges and opportunities associated with integrating machine learning into physical education, including ethical considerations and potential limitations.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Jun, Wang, et al. "Web-Semantic-Driven Machine Learning and Blockchain for Transformative Change in the Future of Physical Education." IJSWIS vol.20, no.1 2024: pp.1-16. http://doi.org/10.4018/IJSWIS.337961
APA
Jun, W., Iqbal, M. S., Abbasi, R., Omar, M., & Huiqin, C. (2024). Web-Semantic-Driven Machine Learning and Blockchain for Transformative Change in the Future of Physical Education. International Journal on Semantic Web and Information Systems (IJSWIS), 20(1), 1-16. http://doi.org/10.4018/IJSWIS.337961
Chicago
Jun, Wang, et al. "Web-Semantic-Driven Machine Learning and Blockchain for Transformative Change in the Future of Physical Education," International Journal on Semantic Web and Information Systems (IJSWIS) 20, no.1: 1-16. http://doi.org/10.4018/IJSWIS.337961
Export Reference
Published: Feb 14, 2024
Converted to Gold OA:
DOI: 10.4018/IJSWIS.337962
Volume 20
Wengui Dai, Yujun Wang
The use of contrastive learning (CL) in recommendation has advanced significantly. Recently, some works use perturbations in the embedding space to obtain enhanced views of nodes. This makes the...
Show More
The use of contrastive learning (CL) in recommendation has advanced significantly. Recently, some works use perturbations in the embedding space to obtain enhanced views of nodes. This makes the representation distribution of nodes more even and then improve recommendation effectiveness. In this article, the authors provide an explanation on the role of added noises in the embedding space from the perspective of invariant learning and feature selection. Guided by this thinking, the authors devise a more reasonable method for generating random noises and put forward web semantic based robust graph contrastive learning for recommendation via invariant learning, a novel graph CL-based recommendation model, named RobustGCL. RobustGCL, randomly zeros the values of certain dimensions in the noise vectors at a fixed ratio. In this way, RobustGCL can identify invariant and variant features and then learn invariant and variant representations. Tests on publicly available datasets show that our proposed approach can learn invariant representations and achieve better performance.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Dai, Wengui, and Yujun Wang. "Web Semantic-Based Robust Graph Contrastive Learning for Recommendation via Invariant Learning." IJSWIS vol.20, no.1 2024: pp.1-15. http://doi.org/10.4018/IJSWIS.337962
APA
Dai, W. & Wang, Y. (2024). Web Semantic-Based Robust Graph Contrastive Learning for Recommendation via Invariant Learning. International Journal on Semantic Web and Information Systems (IJSWIS), 20(1), 1-15. http://doi.org/10.4018/IJSWIS.337962
Chicago
Dai, Wengui, and Yujun Wang. "Web Semantic-Based Robust Graph Contrastive Learning for Recommendation via Invariant Learning," International Journal on Semantic Web and Information Systems (IJSWIS) 20, no.1: 1-15. http://doi.org/10.4018/IJSWIS.337962
Export Reference
Published: Mar 6, 2024
Converted to Gold OA:
DOI: 10.4018/IJSWIS.338999
Volume 20
Zechen Jin, Yida Zheng, Jun Liu, Yang Yu
Restoring the trajectory of a bat from a table tennis match video is critical in analyzing a table tennis technique and conducting statistical analysis. However, directly bat location detection in...
Show More
Restoring the trajectory of a bat from a table tennis match video is critical in analyzing a table tennis technique and conducting statistical analysis. However, directly bat location detection in each frame is challenging due to changing shapes caused by varying movement directions and speeds, leading to ambiguity. This paper develops a novel two-stage method. The first stage utilizes YOLO for bat detection in each frame, followed by filtering out erroneous candidate boxes. In the second stage, the authors use a temporal prediction model that integrating human keypoint information and interpolation to reconstruct a complete bat trajectory with minimal errors. The method's effectiveness and performance are evaluated on our video datasets. The evaluation results demonstrate that the proposed method outperforms traditional methods on precision performance metrics. The error screening algorithm improves precision score to nearly 1. In addition, the method has the recall score 22.3% higher than YOLO 's and also 1.4% higher than that of YOLO with cubic spline interpolation.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Jin, Zechen, et al. "A Semantic Web-Based Approach for Bat Trajectory Reconstruction With Human Keypoint Information." IJSWIS vol.20, no.1 2024: pp.1-22. http://doi.org/10.4018/IJSWIS.338999
APA
Jin, Z., Zheng, Y., Liu, J., & Yu, Y. (2024). A Semantic Web-Based Approach for Bat Trajectory Reconstruction With Human Keypoint Information. International Journal on Semantic Web and Information Systems (IJSWIS), 20(1), 1-22. http://doi.org/10.4018/IJSWIS.338999
Chicago
Jin, Zechen, et al. "A Semantic Web-Based Approach for Bat Trajectory Reconstruction With Human Keypoint Information," International Journal on Semantic Web and Information Systems (IJSWIS) 20, no.1: 1-22. http://doi.org/10.4018/IJSWIS.338999
Export Reference
Published: Feb 21, 2024
Converted to Gold OA:
DOI: 10.4018/IJSWIS.339000
Volume 20
YiHeng Wu, Jiaqiang Dong, JianXin Chen
Enhanced processors empower edge devices like smartphones for human detection, yet their application is constrained by algorithmic efficiency and precision. This paper introduces YOLO-DCNet, a...
Show More
Enhanced processors empower edge devices like smartphones for human detection, yet their application is constrained by algorithmic efficiency and precision. This paper introduces YOLO-DCNet, a lightweight neural network detector built upon YOLOv7-tiny. Incorporating a dynamic multi-head structural re-parameterization (DMSR) module within its backbone network enables effective processing of the features utilized in the model. To improve multi-scale feature aggregation, the model integrates a channel information compression and linear mapping (CLM) module into its feature pyramid architecture. Moreover, the optimization of training and inference performance is achieved by employing RepVGG blocks between the main computational modules of the model. Experimental data reveal that the enhanced YOLOv7-tiny model achieves a 31.7% faster inference speed and marginal gains of 0.7% in mAP@0.5 and 0.5% in mAP@0.5:0.95 over the original. This underscores the model's improved performance and applicability for real-time human detection on edge devices across diverse applications.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Wu, YiHeng, et al. "YOLO-DCNet: A Semantic-Based Novel Flexible Lightweight Human Detection Algorithm." IJSWIS vol.20, no.1 2024: pp.1-23. http://doi.org/10.4018/IJSWIS.339000
APA
Wu, Y., Dong, J., & Chen, J. (2024). YOLO-DCNet: A Semantic-Based Novel Flexible Lightweight Human Detection Algorithm. International Journal on Semantic Web and Information Systems (IJSWIS), 20(1), 1-23. http://doi.org/10.4018/IJSWIS.339000
Chicago
Wu, YiHeng, Jiaqiang Dong, and JianXin Chen. "YOLO-DCNet: A Semantic-Based Novel Flexible Lightweight Human Detection Algorithm," International Journal on Semantic Web and Information Systems (IJSWIS) 20, no.1: 1-23. http://doi.org/10.4018/IJSWIS.339000
Export Reference
Published: Mar 7, 2024
Converted to Gold OA:
DOI: 10.4018/IJSWIS.339001
Volume 20
Judan Hu, Yu Yao, Yuyang Gao
Consortium contracting is a contracting model that China encourages and advocates. Due to the interest drive, members within the consortium are very prone to negative cooperation and midway...
Show More
Consortium contracting is a contracting model that China encourages and advocates. Due to the interest drive, members within the consortium are very prone to negative cooperation and midway withdrawal, which hinders the healthy development of the consortium. Therefore, this paper constructs a game model of EPC consortium cooperation evolution, analyzes the influence of different reward and punishment mechanisms on the cooperation of consortium members, and applies system dynamics to simulation. The results show that under the static reward and punishment and dynamic reward mechanism, the consortium cooperation is not stable; while under the dynamic punishment mechanism and the dynamic reward and punishment mechanism in which the maximum punishment is greater than the maximum reward, the evolution of consortium cooperation is gradually stable and the behavioral strategies are gradually unified. It also puts forward suggestions for measures conducive to stabilizing cooperation, which provide certain reference value for the internal management of consortium members' cooperation.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Hu, Judan, et al. "Stability Analysis of EPC Consortium Cooperation Based on Evolutionary Game." IJSWIS vol.20, no.1 2024: pp.1-24. http://doi.org/10.4018/IJSWIS.339001
APA
Hu, J., Yao, Y., & Gao, Y. (2024). Stability Analysis of EPC Consortium Cooperation Based on Evolutionary Game. International Journal on Semantic Web and Information Systems (IJSWIS), 20(1), 1-24. http://doi.org/10.4018/IJSWIS.339001
Chicago
Hu, Judan, Yu Yao, and Yuyang Gao. "Stability Analysis of EPC Consortium Cooperation Based on Evolutionary Game," International Journal on Semantic Web and Information Systems (IJSWIS) 20, no.1: 1-24. http://doi.org/10.4018/IJSWIS.339001
Export Reference
Published: Mar 7, 2024
Converted to Gold OA:
DOI: 10.4018/IJSWIS.339187
Volume 20
Zhaodong Gu, Kejing He
The large language models based on transformers have shown strong text generation ability. However, due to the need for significant computing resources, little work has been done to generate...
Show More
The large language models based on transformers have shown strong text generation ability. However, due to the need for significant computing resources, little work has been done to generate emotional text using language models such as GPT-2. To address this issue, the authors proposed an affective prompt-tuning-based language model (APT-LM) equipped with an affective decoding (AD) method, aiming to enhance emotional text generation with limited computing resources. In detail, the proposed model incorporates the emotional attributes into the soft prompt by using the NRC emotion intensity lexicon and updates the additional parameters while freezing the language model. Then, it steers the generation toward a given emotion by calculating the cosine distance between the affective soft prompt and the candidate tokens generated by the language model. Experimental results show that the proposed APT-LM model significantly improves emotional text generation and achieves competitive performance on sentence fluency compared to baseline models across automatic evaluation and human evaluation.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Gu, Zhaodong, and Kejing He. "Affective Prompt-Tuning-Based Language Model for Semantic-Based Emotional Text Generation." IJSWIS vol.20, no.1 2024: pp.1-19. http://doi.org/10.4018/IJSWIS.339187
APA
Gu, Z. & He, K. (2024). Affective Prompt-Tuning-Based Language Model for Semantic-Based Emotional Text Generation. International Journal on Semantic Web and Information Systems (IJSWIS), 20(1), 1-19. http://doi.org/10.4018/IJSWIS.339187
Chicago
Gu, Zhaodong, and Kejing He. "Affective Prompt-Tuning-Based Language Model for Semantic-Based Emotional Text Generation," International Journal on Semantic Web and Information Systems (IJSWIS) 20, no.1: 1-19. http://doi.org/10.4018/IJSWIS.339187
Export Reference
Published: Mar 12, 2024
Converted to Gold OA:
DOI: 10.4018/IJSWIS.340379
Volume 20
Yu Wang, Zhiyi Zhang, Peng Tang, Shiyao Bian
A model for predicting physical health of college students based on semantic web and deep learning under cloud edge collaborative architecture is proposed to address the issue of most physical...
Show More
A model for predicting physical health of college students based on semantic web and deep learning under cloud edge collaborative architecture is proposed to address the issue of most physical health prediction models being unable to fully describe the characteristics of sports performance changes and having large prediction errors. Firstly, the authors design a measurement data analysis system based on cloud edge collaboration architecture to improve data analysis efficiency. Then, they preprocess the data on the edge side, such as missing samples, and extract data features using an equal dimensional dynamic GOM model. Finally, they deploy the RBFNN-SSA model in the cloud center, input the characteristics of each indicator into the model for predictive analysis, and obtain the physical health status of college students. Based on the physical health test data of Hohai University from 2018 to 2021, an experimental analysis was conducted. The results showed that all three intervention measures had significant effects on maintaining and improving the physical health level of college students.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Wang, Yu, et al. "A Model for Predicting Physical Health of College Students Based on Semantic Web and Deep Learning Under Cloud Edge Collaborative Architecture." IJSWIS vol.20, no.1 2024: pp.1-19. http://doi.org/10.4018/IJSWIS.340379
APA
Wang, Y., Zhang, Z., Tang, P., & Bian, S. (2024). A Model for Predicting Physical Health of College Students Based on Semantic Web and Deep Learning Under Cloud Edge Collaborative Architecture. International Journal on Semantic Web and Information Systems (IJSWIS), 20(1), 1-19. http://doi.org/10.4018/IJSWIS.340379
Chicago
Wang, Yu, et al. "A Model for Predicting Physical Health of College Students Based on Semantic Web and Deep Learning Under Cloud Edge Collaborative Architecture," International Journal on Semantic Web and Information Systems (IJSWIS) 20, no.1: 1-19. http://doi.org/10.4018/IJSWIS.340379
Export Reference
Published: Mar 19, 2024
Converted to Gold OA:
DOI: 10.4018/IJSWIS.340727
Volume 20
Pablo Antúnez-Muiños, Pablo Pérez-Sánchez, Andrea Vázquez-Ingelmo, Francisco José García-Peñalvo, Antonio Sánchez-Puente, Víctor Vicente-Palacios, Alicia García-Holgado, P. Ignacio Dorado-Díaz, Jesús Sampedro-Gómez, Ignacio Cruz-González, Pedro L. Sánchez
Artificial intelligence (AI) integration, notably in healthcare, has been significant, yet effective implementation in critical areas requires expertise. KoopaML, a previously developed visual...
Show More
Artificial intelligence (AI) integration, notably in healthcare, has been significant, yet effective implementation in critical areas requires expertise. KoopaML, a previously developed visual platform, aims at bridging this gap, enabling users with limited AI knowledge to build ML pipelines. Its core is a heuristic-based ML task recommender, offering guidance and contextual explanations. The authors compared the use of KoopaML with two non-expert groups: one with the recommender system enabled and the other without. Results showed KoopaML's intuitiveness benefits all but emphasized that textual guidance doesn't substitute for fundamental ML understanding. This underscores the need for educational components in such tools, especially in critical fields like healthcare. The paper suggests future KoopaML enhancements include educational modules, making ML accessible, and ensuring users develop a solid AI foundation. This is crucial for quality outcomes in sectors like healthcare, leveraging AI's potential through enhanced non-expert user capability.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Antúnez-Muiños, Pablo, et al. "Assessing the Effectiveness of Textual Recommendations in KoopaML: A Comparative Study on Non-Expert Users' ML Pipeline Development." IJSWIS vol.20, no.1 2024: pp.1-21. http://doi.org/10.4018/IJSWIS.340727
APA
Antúnez-Muiños, P., Pérez-Sánchez, P., Vázquez-Ingelmo, A., García-Peñalvo, F. J., Sánchez-Puente, A., Vicente-Palacios, V., García-Holgado, A., Dorado-Díaz, P. I., Sampedro-Gómez, J., Cruz-González, I., & Sánchez, P. L. (2024). Assessing the Effectiveness of Textual Recommendations in KoopaML: A Comparative Study on Non-Expert Users' ML Pipeline Development. International Journal on Semantic Web and Information Systems (IJSWIS), 20(1), 1-21. http://doi.org/10.4018/IJSWIS.340727
Chicago
Antúnez-Muiños, Pablo, et al. "Assessing the Effectiveness of Textual Recommendations in KoopaML: A Comparative Study on Non-Expert Users' ML Pipeline Development," International Journal on Semantic Web and Information Systems (IJSWIS) 20, no.1: 1-21. http://doi.org/10.4018/IJSWIS.340727
Export Reference
Published: Mar 20, 2024
Converted to Gold OA:
DOI: 10.4018/IJSWIS.340938
Volume 20
Zhenkun Wei, Jia Liu, Yu Yao
In response to the critical need for advanced solutions in medical imaging segmentation, particularly for real-time applications in diagnostics and treatment planning, this study introduces SM-UNet....
Show More
In response to the critical need for advanced solutions in medical imaging segmentation, particularly for real-time applications in diagnostics and treatment planning, this study introduces SM-UNet. This novel deep learning architecture efficiently addresses the challenge of real-time, accurate medical image segmentation by integrating convolutional neural network (CNN) with multilayer perceptron (MLP). The architecture uniquely combines an initial convolutional encoder for detailed feature extraction, MLP module for capturing long-range dependencies, and a decoder that merges global features with high-resolution CNN map. Further optimization is achieved through a tokenization approach, significantly reducing computational demands. Its superior performance is confirmed by evaluations on standard datasets, showing interaction times drastically lower than comparable networks—between 1/6 to 1/10, and 1/25 compared to SOTA models. These advancements underscore SM-UNet's potential as a groundbreaking tool for facilitating real-time, precise medical diagnostics and treatment strategies.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Wei, Zhenkun, et al. "Semantic-Based Optimization of Deep Learning for Efficient Real-Time Medical Image Segmentation." IJSWIS vol.20, no.1 2024: pp.1-16. http://doi.org/10.4018/IJSWIS.340938
APA
Wei, Z., Liu, J., & Yao, Y. (2024). Semantic-Based Optimization of Deep Learning for Efficient Real-Time Medical Image Segmentation. International Journal on Semantic Web and Information Systems (IJSWIS), 20(1), 1-16. http://doi.org/10.4018/IJSWIS.340938
Chicago
Wei, Zhenkun, Jia Liu, and Yu Yao. "Semantic-Based Optimization of Deep Learning for Efficient Real-Time Medical Image Segmentation," International Journal on Semantic Web and Information Systems (IJSWIS) 20, no.1: 1-16. http://doi.org/10.4018/IJSWIS.340938
Export Reference
Published: Mar 26, 2024
Converted to Gold OA:
DOI: 10.4018/IJSWIS.341231
Volume 20
R. Karthika, L. Jegatha Deborah, Wenying Zheng, Fayez Alqahtani, Amr Tolba, B. Gokula Krishnan, Ritika Bansal
The emergency response process consists of methodical and coordinated series of actions and protocols executed by individuals and organizations to proficiently address crises. When planning for...
Show More
The emergency response process consists of methodical and coordinated series of actions and protocols executed by individuals and organizations to proficiently address crises. When planning for medical emergencies, it is vital to work with responsive medical organizations to ensure good communication and coordination. Unlike e-government processes, emergency response processes are focused on knowledge and may frequently change as the emergency situation develops. It is important to change the emergency response plan for dynamic situations and the proposed method helps to create a flexible plan for emergency responses. The proposed approach uses a system for organizing knowledge to figure out the needs and the resources essential for an emergency. It helps to identify the organizations to be involved based on their rules for mutual aid and jurisdiction. Experimental analysis shows that the proposed method outperforms Smart-c and DCERP in suggesting a greater number of hospitals during medical emergency and achieves 0.8, 0.9 and 0.9 precision, recall, and f-measure approximately.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Karthika, R., et al. "Semantic-Rich Recommendation System for Medical Emergency Response System." IJSWIS vol.20, no.1 2024: pp.1-18. http://doi.org/10.4018/IJSWIS.341231
APA
Karthika, R., Deborah, L. J., Zheng, W., Alqahtani, F., Tolba, A., Krishnan, B. G., & Bansal, R. (2024). Semantic-Rich Recommendation System for Medical Emergency Response System. International Journal on Semantic Web and Information Systems (IJSWIS), 20(1), 1-18. http://doi.org/10.4018/IJSWIS.341231
Chicago
Karthika, R., et al. "Semantic-Rich Recommendation System for Medical Emergency Response System," International Journal on Semantic Web and Information Systems (IJSWIS) 20, no.1: 1-18. http://doi.org/10.4018/IJSWIS.341231
Export Reference
Published: Mar 27, 2024
Converted to Gold OA:
DOI: 10.4018/IJSWIS.341232
Volume 20
Bingdao Feng, Fangyu Cheng, Yanfei Liu, Xinglong Chang, Xiaobao Wang, Di Jin
Many studies on community detection are mainly based on the similarity in friendship between users. Recent studies have started to explore node contents to identify semantically meaningful...
Show More
Many studies on community detection are mainly based on the similarity in friendship between users. Recent studies have started to explore node contents to identify semantically meaningful communities. However, the sentimental interaction information which plays an important role in community detection is often ignored. By analyzing and utilizing the abundant sentimental interaction information, one can not only more precisely identify the communities, but also discover the interesting interactions and conflicts between these communities. Based on this concept, the authors propose a new Community Sentiment Diffusion Detection Model (CSDD), which utilizes sentimental information embedded in forward posts. Furthermore, the authors present an efficient variational algorithm for model inference. The community detection results have been verified on two large Twitter datasets. It is experimentally demonstrated that we can provide a fine-grained view of sentimental interaction between communities and discover the mechanism of sentiment diffusion between communities.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Feng, Bingdao, et al. "Community Detection on Social Networks With Sentimental Interaction." IJSWIS vol.20, no.1 2024: pp.1-23. http://doi.org/10.4018/IJSWIS.341232
APA
Feng, B., Cheng, F., Liu, Y., Chang, X., Wang, X., & Jin, D. (2024). Community Detection on Social Networks With Sentimental Interaction. International Journal on Semantic Web and Information Systems (IJSWIS), 20(1), 1-23. http://doi.org/10.4018/IJSWIS.341232
Chicago
Feng, Bingdao, et al. "Community Detection on Social Networks With Sentimental Interaction," International Journal on Semantic Web and Information Systems (IJSWIS) 20, no.1: 1-23. http://doi.org/10.4018/IJSWIS.341232
Export Reference
Published: Mar 26, 2024
Converted to Gold OA:
DOI: 10.4018/IJSWIS.341233
Volume 20
Ge Zhao, Xiangrong Li, Hao Li
In edge computing scenarios, due to the wide distribution of devices, complex application environments, and limited computing and storage capabilities, their authentication and access control...
Show More
In edge computing scenarios, due to the wide distribution of devices, complex application environments, and limited computing and storage capabilities, their authentication and access control efficiency is low. To address the above issues, a secure trusted authentication scheme based on semantic Long Short-Term Memory (LSTM) and blockchain is proposed for IoT applications. The attribute-based access control model is optimized, combining blockchain technology with access control models, effectively improving the robustness and credibility of access control systems. Semantic LSTM is used to predict environmental attributes that can further restrict user access and dynamically meet the minimum permission granting requirements. Experiments show that when the number of certificates is 60, the computational overhead of the proposed method is only 203s, which is lower than other state-of-the-art methods. Therefore, the performance of the proposed schema in information security protection in IoT environments shows promise as a scalable authentication solution for IoT applications.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Zhao, Ge, et al. "A Trusted Authentication Scheme Using Semantic LSTM and Blockchain in IoT Access Control System." IJSWIS vol.20, no.1 2024: pp.1-27. http://doi.org/10.4018/IJSWIS.341233
APA
Zhao, G., Li, X., & Li, H. (2024). A Trusted Authentication Scheme Using Semantic LSTM and Blockchain in IoT Access Control System. International Journal on Semantic Web and Information Systems (IJSWIS), 20(1), 1-27. http://doi.org/10.4018/IJSWIS.341233
Chicago
Zhao, Ge, Xiangrong Li, and Hao Li. "A Trusted Authentication Scheme Using Semantic LSTM and Blockchain in IoT Access Control System," International Journal on Semantic Web and Information Systems (IJSWIS) 20, no.1: 1-27. http://doi.org/10.4018/IJSWIS.341233
Export Reference
Published: Apr 2, 2024
Converted to Gold OA:
DOI: 10.4018/IJSWIS.342087
Volume 20
Zechun Cao, German Zavala Villafuerte, Joseph Almaznaai
Fast and accurate segmentation is important for robot judgement, e.g. robot detection, segmentation, and control. Most researchers have focused on deploying lightweight semantic segmentation models...
Show More
Fast and accurate segmentation is important for robot judgement, e.g. robot detection, segmentation, and control. Most researchers have focused on deploying lightweight semantic segmentation models into robot services. The problem is that the critical interaction between semantic segmentation and boundaries is ignored. In this chapter, the authors propose a lightweight parallel execution model (EPSSNet) based on semantic flow branch (SFB), edge flow branch (EFB) and self-adapting weighting fusion (SAWF) for mobile robot service projects. The semantic flow branching module is used to obtain accurate object shape features. The boundary constraint module uses multiple convolution and upsampling to distinguish boundary features from semantic features. In order to adaptively fuse boundary features with semantic segmentation features, the SAWF is proposed. It adaptively fuses semantic and boundary features by learning boundary and semantic feature fusion weights. Detailed experimental results on Cityscapes, Pascal VOC 2012 and ADE20k datasets demonstrate the superior performance of our approach.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Cao, Zechun, et al. "EPSSNet: A Lightweight Network With Edge Processing and Semantic Segmentation for Mobile Robotics." IJSWIS vol.20, no.1 2024: pp.1-22. http://doi.org/10.4018/IJSWIS.342087
APA
Cao, Z., Villafuerte, G. Z., & Almaznaai, J. (2024). EPSSNet: A Lightweight Network With Edge Processing and Semantic Segmentation for Mobile Robotics. International Journal on Semantic Web and Information Systems (IJSWIS), 20(1), 1-22. http://doi.org/10.4018/IJSWIS.342087
Chicago
Cao, Zechun, German Zavala Villafuerte, and Joseph Almaznaai. "EPSSNet: A Lightweight Network With Edge Processing and Semantic Segmentation for Mobile Robotics," International Journal on Semantic Web and Information Systems (IJSWIS) 20, no.1: 1-22. http://doi.org/10.4018/IJSWIS.342087
Export Reference
IGI Global Open Access Collection provides all of IGI Global’s open access content in one convenient location and user-friendly interface
that can easily searched or integrated into library discovery systems.
Browse IGI Global Open
Access Collection
All inquiries regarding IJSWIS should be directed to the attention of:
Submission-Related InquiriesAll inquiries regarding IJSWIS should be directed to the attention of:
Brij Gupta
Editor-in-Chief
International Journal on Semantic Web and Information Systems (IJSWIS)
Email:
gupta.brij@gmail.comAuthor Services Inquiries
For inquiries involving pre-submission concerns, please contact the Journal Development Division:
journaleditor@igi-global.comOpen Access Inquiries
For inquiries involving publishing costs, APCs, etc., please contact the Open Access Division:
openaccessadmin@igi-global.comProduction-Related Inquiries
For inquiries involving accepted manuscripts currently in production or post-production, please contact the Journal Production Division:
journalproofing@igi-global.comRights and Permissions Inquiries
For inquiries involving permissions, rights, and reuse, please contact the Intellectual Property & Contracts Division:
contracts@igi-global.comPublication-Related Inquiries
For inquiries involving journal publishing, please contact the Acquisitions Division:
acquisition@igi-global.comDiscoverability Inquiries
For inquiries involving sharing, promoting, and indexing of manuscripts, please contact the Citation Metrics & Indexing Division:
indexing@igi-global.com Editorial Office
701 E. Chocolate Ave.
Hershey, PA 17033, USA
717-533-8845 x100