The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper proposes an approach to estimating fungibility between skills given multiple information sources of those skills. An estimate of skill adjacency or fungibility or substitutability is critical for effective capacity planning, analytics and optimization in the face of changing skill requirements of an organization. The proposed approach is based on computing a similarity measure between skills,...
Existing Web API search engines allow for only category-based browsing and keyword or tag-based searches for RESTful services without offering the capability of discovering and composing real-world RESTful services from the viewpoint of application developers. Therefore, we propose a novel approach, referred to as TAD (Transformation-Annotation-Discovery), to address the above issue. TAD firstly transforms...
The present work proposes an unsupervised approach for recognising relations between named entities from a large corpora based on crime in Indian states and union territories. Initially, named entities have been identified from the extracted crime corpus and certain pair of entities have been chosen that facilitates the crime analysis. Then the entity pairs with their intermediate context words have...
Discovering similar diseases is very helpful for revealing the pathogenesis of diseases and making direction in drug use. And related diseases are often triggered by disease-related genes. Therefore, function interaction networks structured by disease-related genes are suitable for measurement of disease similarity, and some methods have utilized the advantage of function interaction of disease-related...
We propose a novel, semantic-reasoning-based approach to look for potentially adverse drug-drug interactions (DDIs) by using a knowledge-base of biomedical public ontologies and datasets in a semantic graph representation. This approach makes it possible to find previously unknown relations between different biological entities like drugs, proteins and biological processes, and perform inferences...
Provenance is the ”chronology of the ownership, custody or location of a historical object”. This term was initially relevant in the works of art and archeology but now finds use in other fields of science and information technology. Provenance is valuable in authenticating the value of an object. In the context of Information Technology, data provenance holds the history of the data item of how it...
Recent studies show that drug-disease associations provide important information for drug discovery and drug repositioning. Wet experimental identification of drug-disease associations is time-consuming and labor-intensive. Therefore, the development of computational methods that predict drug-disease associations is an urgent task. In this paper, we propose a novel computational method named NTSIM,...
Barter system is an alternative commerce approach where customers meet at a marketplace in order to exchange their goods or services without currency. E-barter systems, also gain attention with the rise of e-commerce. Barterers search databases for goods and services they need. In this paper, the integration of ontology and agent systems is proposed as a solution for searching in diverse barter databases...
Aphasia is an acquired language disorder resulting from damage to language related networks of the brain, most often as a result of ischemic stroke or traumatic brain injury. Within the European Union, over 580000 people are affected each year. Both assessment and treatment of aphasia require the analysis of language, in particular of spontaneous speech. Factoring in therapy and diagnosis sessions,...
Program analysis is the process of gathering deeper insights about a source code and analysing them to resolve software problems of arbitrary complexity. The key challenge in program analysis is to keep it fast, precise and straightforward. This research focuses on three key objectives to achieve an efficient program analysis: (i) expressive data representation, (ii) optimised data structure and (iii)...
Data interoperability is a prerequisite to achieve cross-community and cross-application sharing of information and knowledge. Heterogeneous data from multiple sources including semantic and non-semantic data sources (e.g. SNS data, web data, relational data, RDF, XML, CSV, etc.) have an important effect for IoT service provisioning. The data are not in a same type or format always that requires to...
Many approaches are characteristic of name opinion is based only on the review of the single-shaft, ignoring non-trivial disparities in the distribution of the word of those around Corpus different. In Proposed work a new technique introduced to determine the characteristics of the idea of the magazine online by using the difference in those statistics through two and more than two different entities,...
Building the right team is vital for the success of any project in an organisation but many organisations today are faced with the problem of selecting the right mix of individuals to form a team. This process is often performed manually based on personal sentiments, while some automated approaches use normal database queries to assign individuals to tasks based on limited knowledge dimensions such...
We present our automated program repair technique ssFix which leverages existing code (from a code database) that is syntax-related to the context of a bug to produce patches for its repair. Given a faulty program and a fault-exposing test suite, ssFix does fault localization to identify suspicious statements that are likely to be faulty. For each such statement, ssFix identifies a code chunk (or...
This paper discusses the semantic network approach to identify affects in natural language input and focusses on representing spatio-temporal affect information. It has been observed that this approach performs better in analysis of affect information that can be effectively utilized for the prognosis of human cognitive behavior. The research work in this paper describes a new approach towards simple...
Online discussions about software applications generate a large amount of requirements-related information. This information can potentially be usefully applied in requirements engineering; however currently, there are few systematic approaches for extracting such information. To address this gap, we propose Canary, an approach for extracting and querying requirements-related information in online...
In this paper, we describe an approach for data integration that takes into account access control policies. In a data integration system, a mediator is defined as unique entry point providing transparent access to distributed, autonomous and heterogeneous data sources. In such an architecture, security issue and access control in particular is considered as challenging tasks. Indeed, every source,...
Some areas in computer science are characterized by a shared base structure for data artifacts (e.g., list, table, tree, graph, model), and dedicated languages for transforming this structure. We observe that in several of these languages it is possible to identify a clear correspondence between some elements in the transformation code and the output they generate. Conversely given an element in an...
Programmers always fix bugs when maintaining software. Previous studies showed that developers apply repeated bug fixes—similar or identical code changes—to multiple locations. Based on the observation, researchers built tools to identify code locations in need of similar changes, or to suggest similar bug fixes to multiple code fragments. However, some fundamental research questions, such as what...
Semantic similarity and relatedness are applied more and more extensively in many fields, such as in Artificial Intelligence, Semantic Web and Knowledge Management. In this paper, we propose a comprehensive metric of similarity, a method of relatedness measure and a comprehensive degree measure that combines semantic similarity and relatedness between two concepts. Then we compare the proposed metrics...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.