{"title":"Information Retrieval from database queries","authors":"Vladimir Soares Catão, M. Sampaio, U. Schiel","doi":"10.1109/AICCSA.2014.7073241","DOIUrl":"https://doi.org/10.1109/AICCSA.2014.7073241","url":null,"abstract":"Databases and documents are usually confined into separated environments inside organizations, controlled by Database Management Systems (DBMS) and Information Retrieval Systems (IRS), respectively. However, both DBMS and IRS frequently store data about the same entities, in this way presenting opportunities for integration. We propose a framework for DBMS-IRS integration that uses top ranked terms from a database query result as keywords for an IRS search, thus retrieving documents strongly related to the query. Indeed, the framework uses the ranked terms to “expand” an initial keyword search provided by the user. Moreover, our term ranking method measures the utility of a term through its dispersion along a query result, exploiting the fact that the query provides exact answers to the information need. Our experiments have confirmed the superiority of the approach to DBMS-IRS integration, as well as the effectiveness of our term ranking method.","PeriodicalId":412749,"journal":{"name":"2014 IEEE/ACS 11th International Conference on Computer Systems and Applications (AICCSA)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130265943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Chunking Arabic texts using Conditional Random Fields","authors":"Nabil Khoufi, Chafik Aloulou, Lamia Hadrich Belguith","doi":"10.1109/AICCSA.2014.7073230","DOIUrl":"https://doi.org/10.1109/AICCSA.2014.7073230","url":null,"abstract":"Chunking or shallow syntactic parsing is proving to be a task of interest to many natural language processing applications. The problem gets worse for the Arabic language because of its specific features that make it quite different and even more ambiguous than other natural languages when processed. In this paper, we present a method for chunking Arabic texts based on supervised learning. We use the Conditional Random Fields algorithm and the Penn Arabic Treebank to train the model. For the experimentation, we use over than 10,100 sentences as training data and 2,524 sentences for the test. The evaluation of the method consists of the calculation of the generated model accuracy and the results are very encouraging.","PeriodicalId":412749,"journal":{"name":"2014 IEEE/ACS 11th International Conference on Computer Systems and Applications (AICCSA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128868422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"DAGGER: Distributed architecture for granular mitigation of mobile based attacks","authors":"Khaled Bakhit, I. Elhajj, A. Chehab, A. Kayssi","doi":"10.1109/AICCSA.2014.7073207","DOIUrl":"https://doi.org/10.1109/AICCSA.2014.7073207","url":null,"abstract":"In this paper, we present DAGGER, a distributed architecture for collaborating mobile hosts and telecom operators for the granular mitigation of mobile-based attacks. Due to the growing usage of network resources by mobile handsets and the increasing spread of malicious applications among those handsets, it has become vital for mobile operators to join the fight against mobile-based attacks in order to protect their resources and infrastructure. Several security solutions are available in the market for telecom operators to detect anomalies. DAGGER extends those solutions and enables the operators to not only detect the subscriber(s) that generated anomalies, but also to granularly identify the malicious applications behind those abnormalities, allowing the operators to terminate the malwares themselves rather than shutdown the network connection for the mobile subscriber(s). We present an Android host-based component and define the distributed host-network communication procedure in order to identify malicious applications causing network anomalies and thus to terminate such applications.","PeriodicalId":412749,"journal":{"name":"2014 IEEE/ACS 11th International Conference on Computer Systems and Applications (AICCSA)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126280338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jörg Daubert, Leon Bock, Panayotis Kikiras, M. Mühlhäuser, Mathias Fischer
{"title":"Twitterize: Anonymous Micro-blogging","authors":"Jörg Daubert, Leon Bock, Panayotis Kikiras, M. Mühlhäuser, Mathias Fischer","doi":"10.1109/AICCSA.2014.7073285","DOIUrl":"https://doi.org/10.1109/AICCSA.2014.7073285","url":null,"abstract":"Privacy, in particular anonymity, is required to increase the acceptance of users for the Internet of Things (IoT). The IoT is built upon sensors that encompass us in each step we take. Hence, they can collect sensitive, privacy-invading data that can be used to establish complete user profiles. For this reason, sensing in the IoT needs to provide means of privacy-protection. In this paper, we discuss an approach for sharing smartphone sensor data and user-generated content in a privacy-protecting manner via the Micro-blogging platform (MbP) Twitter. For that, we discuss privacy needs of users in Micro-blogging platforms (MbPs) and that privacy should not only ensure confidentiality but also anonymity. We discuss related work and systems along these requirements and conclude that anonymity is hardly considered. We introduce our construction Twitterize that integrates well with the MbP Twitter and allows users and sensors to share information normally as well as privacy-preserving with a single application. Twitterize establishes overlay networks for hashtags over Twitters' social network and neither depends on additional infrastructure nor peer-to-peer communication.","PeriodicalId":412749,"journal":{"name":"2014 IEEE/ACS 11th International Conference on Computer Systems and Applications (AICCSA)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121052083","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hyper rectangular trend analysis application to Islamic rulings (fatwas)","authors":"A. Hassaïne, S. Elloumi, Fethi Ferjani, A. Jaoua","doi":"10.1109/AICCSA.2014.7073215","DOIUrl":"https://doi.org/10.1109/AICCSA.2014.7073215","url":null,"abstract":"Trend analysis is a research field with a large number of applications ranging from monitoring potential rivals to analyzing interests of a certain category of people. Applying trend analysis to the Islamic domain makes it possible to have a general idea about topics discussed by Muslims all over the world. It helps both scholars and social science researchers understanding the needs and the interest domains of each Muslim society. In this paper, we present a trend analysis method based on hyper-concepts. Hyper-concepts make it possible to decompose any corpus into non-overlapping rectangular relations and to highlight the most representative attributes or keywords. We illustrate the effectiveness of our method in identifying relevant keywords related to the Islamic context and we show how to use our method for identifying trending topics with respect to time.","PeriodicalId":412749,"journal":{"name":"2014 IEEE/ACS 11th International Conference on Computer Systems and Applications (AICCSA)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115957427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Smartphone sensors as random bit generators","authors":"Joseph Loutfi, A. Chehab, I. Elhajj, A. Kayssi","doi":"10.1109/AICCSA.2014.7073279","DOIUrl":"https://doi.org/10.1109/AICCSA.2014.7073279","url":null,"abstract":"Finding good entropy sources, designing deterministic (pseudo) random number generators, or simply finding suitable non-deterministic random number generators are major challenges. The goal of this paper is to evaluate the use of three motion sensors present in smartphones as potential nondeterministic, true random bit generators (TRNG). This paper focuses in particular on sensors present in Samsung Galaxy S3 and S4 devices. Data from the sensors was collected and submitted to the NIST STS v-2.1.1 test suite and the resulting bits were found fit enough to be used as the output of a TRNG. In addition, 4 SHA versions were used to whiten the data (as per NIST recommendation). Their conditioning performance was compared to each other, and found to be very close.","PeriodicalId":412749,"journal":{"name":"2014 IEEE/ACS 11th International Conference on Computer Systems and Applications (AICCSA)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121193893","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Fadoua Ouamani, H. Bani, H. Ghézala, Narjès Bellamine Ben Saoud
{"title":"Operationalization of an ontology based sociocultural adaptation approach and its application to CSCL","authors":"Fadoua Ouamani, H. Bani, H. Ghézala, Narjès Bellamine Ben Saoud","doi":"10.1109/AICCSA.2014.7073234","DOIUrl":"https://doi.org/10.1109/AICCSA.2014.7073234","url":null,"abstract":"Collaborative learning environments bring together learners from different cultures and social contexts, around a common task. These learners interact both with each other and with computers. Hence, a dual problem arises: how to model and integrate socio-cultural factors that characterize these learners? How to design and develop culture-aware collaborative learning environments? This paper addresses both issues by describing an ontology based socio-cultural adaptation approach and its operationalization leading to the implementation of a culture-aware-web-based collaborative system. The adaptation of the collaborative learning environment is performed according to the socio-cultural profile of each learner.","PeriodicalId":412749,"journal":{"name":"2014 IEEE/ACS 11th International Conference on Computer Systems and Applications (AICCSA)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132762097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Khayyam Hashmi, Erfan Najmi, Nariman Ammar, Zaki Malik, B. Medjahed
{"title":"Sentiment Analysis for intelligent ratings management","authors":"Khayyam Hashmi, Erfan Najmi, Nariman Ammar, Zaki Malik, B. Medjahed","doi":"10.1109/AICCSA.2014.7073225","DOIUrl":"https://doi.org/10.1109/AICCSA.2014.7073225","url":null,"abstract":"This paper investigates the problem of rating propagation in composite systems. We propose a method for reputation distribution among component services in Web service composition environments. The main idea lies in providing component services with the appropriate amount of share received for the overall rating. The amount should be proportional to the contribution and performance of the component service. The method ensures that any component service is neither over rated at the expense of a higher performing component nor penalized due to a low performing component. We make use of the textual information present in the service reviews to extract different aspects and their individual sentiments to provide a better rating distribution mechanism. The proposed method attempts to accurately distribute the rating so that it closely reflects the performance of each component in the system. The experimental results show the applicability of our approach and the improved ranking distribution.","PeriodicalId":412749,"journal":{"name":"2014 IEEE/ACS 11th International Conference on Computer Systems and Applications (AICCSA)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133192647","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Subsequence kernels-based Arabic text classification","authors":"A. Nehar, A. Benmessaoud, H. Cherroun, D. Ziadi","doi":"10.1109/AICCSA.2014.7073200","DOIUrl":"https://doi.org/10.1109/AICCSA.2014.7073200","url":null,"abstract":"Kernel methods have known huge success in machine learning. This success is mainly due to their flexibility to deal with high dimensionality of the feature space of complex data such as graphs, trees or textual data. In the field of text classification (TC) their performances have supplanted traditional algorithms. For textual data, different kernels were introduced (P-spectrum, All-Sub-sequences, Gap-Weighted Subsequences kernel, ...) to improve the performance of TC systems. In this paper, we carried out a system for Arabic TC which supports aspects of order and co-occurrence of words within a text. Transducers, specific automata, are used to represent documents. Such representation allows an efficient implementation of subsequence kernel. An empirical study is conducted to evaluate the ATC system on the large SPA corpus. Results show an improvement of the classification in terms of precision.","PeriodicalId":412749,"journal":{"name":"2014 IEEE/ACS 11th International Conference on Computer Systems and Applications (AICCSA)","volume":"452 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113998109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Graph based tweet entity linking using DBpedia","authors":"Fahd Kalloubi, E. Nfaoui, O. Beqqali","doi":"10.1109/AICCSA.2014.7073240","DOIUrl":"https://doi.org/10.1109/AICCSA.2014.7073240","url":null,"abstract":"Twitter has became an invaluable source of information, due to his dynamic nature with more than 400 million tweets posted per day. Determining what an individual post is about can be a non trivial task because his high contextualization and his informal nature. Named Entity Linking (NEL) is a subtask of information extraction that aims to ground entity mentions to their corresponding node in a Knowledge Base (KB), which requires a disambiguation step, because many resources can be matched to the same entity that lead to synonymy and polysemy problems. To overcome these problems, especially in the context of short text, we present a novel system for tweet entity linking based on graph centrality and DBpedia as knowledge base. Our approach relies on the assumption that related entities tend to appear in the same tweet as tweets are topic specific. Also, we address the problem of irregular name mentions. Finally, to show the effectiveness of our system we evaluate it using a real twitter dataset and compare it to a well known state-of-the-art named entity linking system for short text.","PeriodicalId":412749,"journal":{"name":"2014 IEEE/ACS 11th International Conference on Computer Systems and Applications (AICCSA)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114394586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}