36 research outputs found
Logico-linguistic semantic representation of documents
The knowledge behind the gigantic pool of data remains largely unextracted. Techniques such as ontology design, RDF representations, hpernym extraction, etc. have been used to represent the knowledge. However, the area of logic (FOPL) and linguistics (Semantics) has not been explored in depth for this purpose. Search engines suffer in extraction of specific answers to queries because of the absence of structured domain knowledge. The current paper deals with the design of formalism to extract and represent knowledge from the data in a consistent format. The application of logic and linguistics combined greatly eases and increases the precision of knowledge translation from natural language. The results clearly indicate the effectiveness of the knowledge extraction and representation methodology developed providing intelligence to machines for efficient analysis of data. The methodology helps machines to precise results in an efficient manner
Consensus by High Gegree of DeGroot model for multi-agent systems
Nonlinear distributions by the high degree of DeGroot model has been studied in this for consensus
problem of multi-agent systems (MAS). The idea behind the convergence of nonlinear distribution is that when
the degree of nonlinear distribution is increasing the number of iterations is in turn decreasing. From these
viewpoints, the efficient aspects of the proposed nonlinearity model by high degree are that the resulting process
is of fast convergence and the consensus could not depend on the kind of transition matri
Rule based modeling of knowledge bases: rule based construction of knowledge base models for automation/expert systems
It is critical to have a knowledge base model for efficient storage of extracted knowledge. This ensures that the knowledge is stored in a meaningful way to be used for different applications. The efficiency of the knowledge base model depends largely on the rules of construction. Knowledge represented using logico-linguistic techniques and semantic networks lack a consistent rule based knowledge model. The current paper deals with the analysis of text from the knowledge extraction, representation and semantic network phase to formulate rules which would lay foundations of a knowledge model. The developed rules seem to be promising providing a comprehensive coverage of different scenarios. The extensive coverage is an indication that the knowledge model will cater to the entire domain knowledge, thereby laying the foundations of automatic construction of efficient knowledge bases. ยฉ 2017 IEEE
Context aware knowledge bases for efficient contextual retrieval: design and methodologies
Contextual retrieval is a critical component for efficient usage of knowledge hidden behind the data. It is also among the most important factors for user satisfaction. It essentially comprise of two equally important parts โ the retrieval mechanism and the knowledge base from which the information is retrieved. Despite the importance, context aware knowledge bases have not received much attention and thereby, limiting the efficiency of precise context aware retrieval. Such knowledge bases would not only contain information that has been efficiently stored but the knowledge contained would be context based. In other words, machines would understand the knowledge and its context rather than just storing data. This would help in efficient and context aware retrieval. The current paper proposes rules and methodologies for construction of such context aware knowledge bases. A case study to demonstrate the application of the methodology and test the efficiency of the proposed methodology has also been presented. The results indicate that knowledge bases built on these principles tend to generate more efficient and better context aware retrieval results
Risk Management in Parallel Projects: Analysis & Best Practices and Implications to Generic DBrain (gDBrain) Research Project
The increased stiffness in competition has dramatically increased the risk occurrence in project delivery. As the number of projects grows, enterprises or project managers have to eventually run simultaneous projects. Risk management in such cases becomes extremely necessary as failure of one project may lead to the near failure of all the parallel projects running under the same supervision. Therefore, it becomes necessary to understand the best practices for risk management in a parallel project operation environment.
Though the issue is of high importance, yet not much has been discussed. This study was carried out in an enterprise environment whereby professionals of this field with high experience were interviewed and requested to share their experiences.
The research results bear witness to the fact that risk is inevitable and leaves a strong negative impact on all the projects operating in parallel. As such there is a high need to understand the strategies and best practices that are being applied in this field to avoid heavy losses. We seek to apply lessons learned to managing the DBrain research project which has multiple collaborators working in parallel
A real time deep learning based driver monitoring system
Road traffic accidents almost kill 1.35 million people around the world. Most of these accidents take place in low- and middle-income countries and costs them around 3% of their gross domestic product. Around 20% of the traffic accidents are attributed to distracted drowsy drivers. Many detection systems have been designed to alert the drivers to reduce the huge number of accidents. However, most of them are based on specialized hardware integrated with the vehicle. As such the installation becomes expensive and unaffordable especially in the low- and middle-income sector. In the last decade, smartphones have become essential and affordable. Some researchers have focused on developing mobile engines based on machine learning algorithms for detecting driver drowsiness. However, most of them either suffer from platform dependence or intermittent detection issues. This research aims at developing a real time distracted driver monitoring engine while being operating system agnostic using deep learning. It employs machine learning for detection, feature extraction, image classification and alert generation. The system training will use both openly available and privately gathered data
IDSA: an efficient algorithm for skyline queries computation on dynamic and incomplete data with changing states
Skyline queries have been widely used as an effective query tool in many contemporary database applications. The main concept of skyline queries relies on retrieving the non-dominated tuples in the database which are known skylines. In most database applications, the contents of the databases are dynamic due to the continuous changes made towards the database. Typically, the changes in the contents of the database occur through data manipulation operations (INSERT and/or UPDATE). Performing these operations on the database results in invalidating the most recent skylines before changes are made on the database. Furthermore, the presence of incomplete data in databases becomes frequent phenomena in recent database applications. Data incompleteness causes several challenges on skyline queries such as losing the transitivity property of the skyline technique and the test dominance process between tuples being cyclic. Reapplying skyline technique on the entire updated incomplete database to determine the new skylines is unwise due to the exhaustive pairwise comparisons. Thus, this paper proposes an approach, named Incomplete Dynamic Skyline Algorithm (IDSA) which attempts to determine the skylines on dynamic and incomplete databases. Two optimization techniques have been incorporated in IDSA, namely: pruning and selecting superior local skylines. The pruning process attempts to exploit the derived skylines before the INSERT/UPDATE operation made on the database to identify the new skylines. Moreover, selecting superior local skylines process assists in further eliminating the remaining non-skylines from further processing. These two optimization techniques lead to a large reduction in the number of domination tests due to avoiding re-computing of skylines over the entire updated database to derive the new skylines. Extensive experiments have been accomplished on both real and synthetic datasets, and the results demonstrate that IDSA outperforms the existing solutions in terms of the number of domination tests and the processing time of the skyline operation
Semantic graph knowledge representation for Al-Quran verses based on word dependencies
Semantic approaches present an efficient, detailed and easily understandable representation of knowledge from documents. Al-Quran contains a vast amount of knowledge that needs appropriate knowledge extraction. A semantic based approach can help in designing an efficient and explainable knowledge representation model for Al-Quran. This research aims to propose a semantic-graph knowledge representation model for verses of Al-Quran based on word dependencies. These features are used in the proposed knowledge representation model allowing the semantic graph matching to improve Al-Quran search applications' accuracy. The proposed knowledge representation model is essentially a formalism for generating a semantic graph representation of Quranic verses, which can be applied
for knowledge base construction for other applications such as information retrieval system. A set of rules called Semantic Dependency Triple Rules are defined to be mapped into the semantic graph representing the verse's logic. The rules translate word dependencies and other NLP metadata into a triple form that holds logical information. The proposed model has been tested with English translation of Al-Quran on a document retrieval prototype The basic system has been enhanced with anaphoric pronouns correction, which has shown improvement in retrieval performance. The results have been compared with a closely related system and evaluated on the accuracy of the
document retrieval in Precision, Recall and F-score measurements. The proposed model has achieved 65%, 60% and
62.4% for the measurements, respectively. It has also improved the overall accuracy of previous system by 43.8%
Distributed Denial of Service (DDoS) Mitigation Using BlockchainโA Comprehensive Insight
Distributed Denial of Service (DDoS) attack is a major threat impeding service to legitimate requests on any network. Although the first DDoS attack was reported in 1996, the complexity and sophistication of these attacks has been ever increasing. A 2 TBps attack was reported in mid-August 2020 directed towards critical infrastructure, such as finance, amidst the COVID-19 pandemic. It is estimated that these attacks will double, reaching over 15 million, in the next 2 years. A number of mitigation schemes have been designed and developed since its inception but the increasing complexity demands advanced solutions based on emerging technologies. Blockchain has emerged as a promising and viable technology for DDoS mitigation. The inherent and fundamental characteristics of blockchain such as decentralization, internal and external trustless attitude, immutability, integrity, anonymity and verifiability have proven to be strong candidates, in tackling this deadly cyber threat. This survey discusses different approaches for DDoS mitigation using blockchain in varied domains to date. The paper aims at providing a comprehensive review, highlighting all necessary details, strengths, challenges and limitations of different approaches. It is intended to serve as a single platform to understand the mechanics of current approaches to enhance research and development in the DDoS mitigation domain