Sven Mielke, Martin Pelke, Sebastian Pospiech, R. Mertens
{"title":"Flexible semantic query expansion for process exploration","authors":"Sven Mielke, Martin Pelke, Sebastian Pospiech, R. Mertens","doi":"10.1109/ICOSC.2015.7050847","DOIUrl":"https://doi.org/10.1109/ICOSC.2015.7050847","url":null,"abstract":"Process exploration tools help to identify business processes that are not executed according to their documentation or lack such documentation at all. These process steps are executed by human beings, therefore process traces can often be found in unstructured documents. In order to reconstruct a process execution, these documents have to be retrieved. Natural language properties such as hyponyms, hypernyms, homonyms and synonyms make searching for a specific element a hard task. Integrating word relations in the search index is the standard solution for tackling this problem. In our process exploration scenario, however, this approach comes to its limits as ontologies defining word relations may vary from process step to process step. The problem is that the approach is rather inflexible. In order to change the relation of the words, the index needs to be rebuilt. This in turn would require running an analysis of the whole document base. Query Expansion, on the other hand, works by adding related words to a query, making it very flexible. In a classic search scenario, it still comes with a number of disadvantages such as retrieving unrelated documents. In our scenario, these disadvantages do not apply, since information from previous steps in the explored process can be used to constrain the result set.","PeriodicalId":126701,"journal":{"name":"Proceedings of the 2015 IEEE 9th International Conference on Semantic Computing (IEEE ICSC 2015)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129664706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Audio-based event detection in office live environments using optimized MFCC-SVM approach","authors":"Selver Ezgi Küçükbay, M. Sert","doi":"10.1109/ICOSC.2015.7050855","DOIUrl":"https://doi.org/10.1109/ICOSC.2015.7050855","url":null,"abstract":"Audio data contains several sounds and is an important source for multimedia applications. One of them is unstructured Environmental Sounds (also referred to as audio events) that have noise-like characteristics with flat spectrums. Therefore, in general, recognition methods applied for music and speech data are not appropriate for the Environmental Sounds. In this paper, we propose an MFCC-SVM based approach that exploits the effect of feature representation and learner optimization tasks for efficient recognition of audio events from audio signals. The proposed approach considers efficient representation of MFCC features using different window and hop sizes by changing the number of Mel coefficients in the analyses as well as optimizing the SVM parameters. Moreover, 16 different audio events from the IEEE Audio and Acoustic Signal Processing (AASP) Challenge Dataset, namely alert, clear throat, cough, door slam, drawer, keyboard, keys, knock, laughter, mouse, page turn, pen drop, phone, printer, speech, and switch that are collected from office live environments are utilized in the evaluations. Our empirical evaluations show that, when the results of the proposed methods are chosen for MFFC feature and SVM classifier, the tests conducted through using 5-fold cross validation gives the results of 62%, 58% and 55% for Precision, Recall and F-measure scores, respectively. Extensive experiments on audio-based event detection using the IEEE AASP Challenge dataset show the effectiveness of the proposed approach.","PeriodicalId":126701,"journal":{"name":"Proceedings of the 2015 IEEE 9th International Conference on Semantic Computing (IEEE ICSC 2015)","volume":"134 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123383672","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Lingwei Chen, Tao Li, Melih Abdulhayoglu, Yanfang Ye
{"title":"Intelligent malware detection based on file relation graphs","authors":"Lingwei Chen, Tao Li, Melih Abdulhayoglu, Yanfang Ye","doi":"10.1109/ICOSC.2015.7050784","DOIUrl":"https://doi.org/10.1109/ICOSC.2015.7050784","url":null,"abstract":"Due to its damage to Internet security, malware and its detection has caught the attention of both anti-malware industry and researchers for decades. Many research efforts have been conducted on developing intelligent malware detection systems. In these systems, resting on the analysis of file contents extracted from the file samples, like Application Programming Interface (API) calls, instruction sequences, and binary strings, data mining methods such as Naive Bayes and Support Vector Machines have been used for malware detection. However, driven by the economic benefits, both diversity and sophistication of malware have significantly increased in recent years. Therefore, anti-malware industry calls for much more novel methods which are capable to protect the users against new threats, and more difficult to evade. In this paper, other than based on file contents extracted from the file samples, we study how file relation graphs can be used for malware detection and propose a novel Belief Propagation algorithm based on the constructed graphs to detect newly unknown malware. A comprehensive experimental study on a real and large data collection from Comodo Cloud Security Center is performed to compare various malware detection approaches. Promising experimental results demonstrate that the accuracy and efficiency of our proposed method outperform other alternate data mining based detection techniques.","PeriodicalId":126701,"journal":{"name":"Proceedings of the 2015 IEEE 9th International Conference on Semantic Computing (IEEE ICSC 2015)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125711818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Urban network parcellation using graph theoretic approach","authors":"Goni Dubnov, S. Dubnov, Y. Kiyoki","doi":"10.1109/ICOSC.2015.7050841","DOIUrl":"https://doi.org/10.1109/ICOSC.2015.7050841","url":null,"abstract":"This paper investigates the street-based network topology of urban spaces as represented in Geographic Information Systems (GIS) databases. We apply graph theoretical spectral methods to analysis of ways in maps. Our findings show that such methods can find natural parcellations of spaces, thus capturing the significance and semantics of a location from analysis of topological structure of the underlying map connectivity structure. Such analysis might be important for semantic search in the “5D World Map” project.","PeriodicalId":126701,"journal":{"name":"Proceedings of the 2015 IEEE 9th International Conference on Semantic Computing (IEEE ICSC 2015)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128811308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Norman Ahmed, Jason Bryant, G. Hasseler, M. Paulini
{"title":"Semantic modeling of analytic-based relationships with Direct Qualification","authors":"Norman Ahmed, Jason Bryant, G. Hasseler, M. Paulini","doi":"10.1109/ICOSC.2015.7050845","DOIUrl":"https://doi.org/10.1109/ICOSC.2015.7050845","url":null,"abstract":"Successfully modeling state and analytics-based semantic relationships of documents enhances thoroughness of representation, contextualization of importance and relevancy, posterity of provenance, and a delineation of priority for a document. These attributes are the core elements that form the machine-based knowledge representation for documents. However, modeling document relationships that can change over time can be inelegant, limited, complex or overly burdensome for semantic technologies. In this paper, we present Direct Qualification (DQ), an approach for modeling any semantically referenced document, concept, or named graph with results from associated applied analytics. The proposed approach supplements the traditional subject-object relationships by providing a third leg to the relationship; the qualification of how and why the relationship exists. To illustrate, we show a prototype of an event-based system with a realistic use case for applying DQ to relevancy analytics of PageRank and Hyperlink-Induced Topic Search (HITS).","PeriodicalId":126701,"journal":{"name":"Proceedings of the 2015 IEEE 9th International Conference on Semantic Computing (IEEE ICSC 2015)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121395337","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The cost of reasoning with RDF updates","authors":"Sana Al Azwari, John N. Wilson","doi":"10.1109/ICOSC.2015.7050829","DOIUrl":"https://doi.org/10.1109/ICOSC.2015.7050829","url":null,"abstract":"Many real world RDF collections are large compared with other real world data structures. Such large RDF collections evolve in a distributed environment. Therefore, these changes between RDF versions need to be detected and computed in order to synchronize these changes to the other users. To cope with the evolving nature of the semantic web, it is important to understand the costs and benefits of the different change detection techniques. In this paper, we experimentally provide a detailed analysis of the overall process of RDF change detection techniques namely: explicit change detection, forward-inference change detection, backward-inference change detection and backward-inference and pruning change detection. The results show that pruning is relatively expensive by comparison with inferencing.","PeriodicalId":126701,"journal":{"name":"Proceedings of the 2015 IEEE 9th International Conference on Semantic Computing (IEEE ICSC 2015)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114530682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Semantic search using a similarity graph","authors":"L. Stanchev","doi":"10.1109/ICOSC.2015.7050785","DOIUrl":"https://doi.org/10.1109/ICOSC.2015.7050785","url":null,"abstract":"Given a set of documents and an input query that is expressed in a natural language, the problem of document search is retrieving the most relevant documents. Unlike most existing systems that perform document search based on keywords matching, we propose a search method that considers the meaning of the words in the query and the document. As a result, our algorithm can return documents that have no words in common with the input query as long as the documents are relevant. For example, a document that contains the words “Ford”, “Chrysler” and “General Motors” multiple times is surely relevant for the query “car” even if the word “car” does not appear in the document. Our semantic search algorithm is based on a similarity graph that contains the degree of semantic similarity between terms, where a term can be a word or a phrase. We experimentally validate our algorithm on the Cranfield benchmark that contains 1400 documents and 225 natural language queries. The benchmark also contains the relevant documents for every query as determined by human judgment. We show that our semantic search algorithm produces a higher value for the mean average precision (MAP) score than a keywords matching algorithm. This shows that our approach can improve the quality of the result because the meaning of the words and phrases in the documents and the queries is taken into account.","PeriodicalId":126701,"journal":{"name":"Proceedings of the 2015 IEEE 9th International Conference on Semantic Computing (IEEE ICSC 2015)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129060251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Finding trendy products from pins","authors":"Dingding Wang, M. Ogihara","doi":"10.1109/ICOSC.2015.7050844","DOIUrl":"https://doi.org/10.1109/ICOSC.2015.7050844","url":null,"abstract":"Fashion is a key defining factor of popular culture, and it changes over time. Each season tons of new products emerge to the market. People who follow fashion wish to discover new and trendy products and quickly catch the most fashionable styles. Traditionally, product trends can be found in fashion magazines and product catalogs, but now the proliferation of the Internet and social networks may have made trend e-discovery possible. This paper explores a novel problem of finding product trends through the posts on Pinterest, a rising social media for sharing interests using uploaded photographs and text comments. A weighted feature subset selection (WFSS) framework is applied to simultaneously group popular products into different types and select the most representative and discriminative terms to describe each product type. We compare WFSS with co-clustering algorithms, non-negative matrix factorization, and unsupervised feature selection methods. Experimental results on a data set collected from Pinterest show the effectiveness of WFSS in both product clustering and keyword selection.","PeriodicalId":126701,"journal":{"name":"Proceedings of the 2015 IEEE 9th International Conference on Semantic Computing (IEEE ICSC 2015)","volume":"742 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131954513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Sathish, A. Patankar, N. Neema, Swetha Jagadeesha, Nimesh Priyodit
{"title":"Evolving the User Graph: From unsupervised topic models to knowledge assisted networks","authors":"S. Sathish, A. Patankar, N. Neema, Swetha Jagadeesha, Nimesh Priyodit","doi":"10.1109/ICOSC.2015.7050792","DOIUrl":"https://doi.org/10.1109/ICOSC.2015.7050792","url":null,"abstract":"The next generation intelligent devices need to understand and evolve with the user. Towards this goal, we present a User Graph generation framework that models user's level of interest and knowledge across a set of categories. The user graph is built through an unsupervised and semi-supervised topic modeling process, using latent semantic analysis technology. The self-evolving framework utilizes in-device user data, is built and managed within a local mobile device, thereby ensuring user privacy without the need for additional network based infrastructure. We present and analyze our trial results, aimed at optimizing model accuracy and execution efficiency. In addition to native application adaptation use cases, we also present three new services: Graph Clusters, Graph Shares and Graph Nets that utilize the framework.","PeriodicalId":126701,"journal":{"name":"Proceedings of the 2015 IEEE 9th International Conference on Semantic Computing (IEEE ICSC 2015)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134370076","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Al-Yahya, Mona Al-Shaman, Nehal Al-Otaiby, Wafa Al-Sultan, A. Al-Zahrani, Mesheal Al-Dalbahie
{"title":"SemTree ontology for enriching Arabic text with lexical semantic annotations","authors":"M. Al-Yahya, Mona Al-Shaman, Nehal Al-Otaiby, Wafa Al-Sultan, A. Al-Zahrani, Mesheal Al-Dalbahie","doi":"10.1109/ICOSC.2015.7050800","DOIUrl":"https://doi.org/10.1109/ICOSC.2015.7050800","url":null,"abstract":"Although the process of semantic annotation of Arabic Web content is essential for the realization of the Semantic Web, the process of semantic annotation cannot be performed without an ontology suitable for the task. In this paper, we describe the design, implementation and evaluation of the SemTree ontology for lexical semantic relations. The ontology was evaluated for usefulness using a prototype system for lexical semantic annotation of Arabic text. Results of the evaluation indicate that the ontology was fit for the purpose of semantic annotations with lexical relations. The evaluation also reveled important recommendations for designing Arabic semantic annotation tools.","PeriodicalId":126701,"journal":{"name":"Proceedings of the 2015 IEEE 9th International Conference on Semantic Computing (IEEE ICSC 2015)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125076714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}