- Advanced Computational Techniques and Applications
- Service-Oriented Architecture and Web Services
- Data Management and Algorithms
- Natural Language Processing Techniques
- Semantic Web and Ontologies
- Web Data Mining and Analysis
- Advanced Text Analysis Techniques
- Topic Modeling
- Distributed and Parallel Computing Systems
- Context-Aware Activity Recognition Systems
- Mobile Agent-Based Network Management
- Recommender Systems and Techniques
- Peer-to-Peer Network Technologies
- Multimedia Communication and Technology
- Advanced Database Systems and Queries
- Digital Rights Management and Security
- Human Mobility and Location-Based Analysis
- Privacy-Preserving Technologies in Data
- Business Process Modeling and Analysis
- Biomedical Text Mining and Ontologies
- Access Control and Trust
- Energy Load and Power Forecasting
- Energy Efficient Wireless Sensor Networks
- Multi-Agent Systems and Negotiation
- Simulation and Modeling Applications
East China Normal University
2009-2020
East China Jiaotong University
2008-2011
Qufu Normal University
2008
Shanghai University of Engineering Science
2008
Shanghai Jiao Tong University
2005-2007
University of the East
2007
University of Science and Technology of China
2007
East China University of Science and Technology
2007
Xinjiang Normal University
2006
Schiffbau-Versuchsanstalt Potsdam (Germany)
2005
Information Content (IC) is an important dimension of assessing the semantic similarity between two terms or word senses in knowledge. The conventional method obtaining IC to combine knowledge their hierarchical structure from ontology like WordNet with actual usage text as derived a large corpus. In this paper, new model presented, which relies on alone. considers not only hyponyms each sense but also its depth structure. value easier calculate based our model, and when used basis approach...
This paper presents a new model of measuring semantic similarity in the taxonomy WordNet. The takes path length between two concepts and IC value each concept as its metric, furthermore, weight metrics can be adapted artificially. In order to evaluate our model, traditional widely used datasets are used. Firstly, coefficients correlation human ratings six computational models calculated, result shows outperforms their homologues. Then, distribution graphs 65 word pairs discussed having no...
With the development of mobile technology, Internet and GIS, LBS plays an important role in various applications. As basis LBS, research on acquisition, processing, storage, query object trajectories has been quite mature, but analysis application movement patterns contained is relatively lagging behind. The calculation trajectory similarity key area for data mining, algorithm based Hausdorff distance one major algorithms. In this paper, we presents a modified (MHD) 2-dimensional matching...
Measuring semantic similarity of word pairs is a popular topic for many years.It crucial in applications, such as information extraction, annotation, question answering system and so on.It mandatory to design accurate metric improving the performance bulk applications relying on it.The paper presents new measuring sense using path content.Different from previous works, not only reflects density information, but also information.It evaluated dataset provided by Rubenstein...
Semantically-based watermarking scheme embeds the information by transforming semantic structure of sentence. In this paper we propose an optimized algorithm which introduces TMR string reranking mechanism before watermark embedding. The has feature resisting sentence reordering attack to a certain extent. To evaluate effectiveness our algorithm, conduct few experiments with different conditions and make comparison among results. show that is effective better robustness.
For security and share of Internet IP addresses, NAT (network address translation) firewalls are widely used to isolate the private networks from in some enterprises/organizations. Unfortunately, NATs block data transmitted directly between two clients under different many P2P (peer peer) applications. A protocol, STUN, has been proposed by IETF solve problem. But if is symmetric NAT, STUN can't tackle it effectively. Another protocol TURN complement limitation however, brings additional...
Recommender system emerges as a technology addressing "information overload" problem. Collaborative Filtering (CF) is successful and widely used in many personalized recommender applications, such digital library, e-commerce, news sites, so on. However, most collaborative filtering algorithms suffer from data sparsity problem which leads to inaccuracy of recommendation. This paper with an eye missing imputation strategies nearest-neighbor CF. We propose two novel effective CF approaches...
Entity recognition and relation extraction have become an important part of knowledge acquisition, which been widely applied in various fields, such as Bioinformatics. However, prior state-of-the-art models heavily rely on the external features obtained from hand-craft or natural language processing (NLP) tools. As a result, performance depends directly accuracy features. Moreover, current joint approaches cannot effectively tackle multi-head problem (i.e. entity is related to multiple...
Infectious diarrhea is an important public health problem around the world. Meteorological factors have been strongly linked to incidence of infectious diarrhea. Therefore, accurately forecast under effect meteorological critical control efforts. In this paper, abilities three different artificial neural network (ANN) models, including feed forward back-propagation (FFBPNN), radial basis function (RBFNN) and generalized regression (GRNN), predict daily number belonging city Shanghai in China...
Role-based access control has established itself as a generalized approach for handling in collaboration systems. In location-aware mobile environment, users can be restricted to assign roles only when (s)he satisfy some predefined identity and spatio-temporal constraint. To cope with these requirements, we extend the existing RBAC model propose an extended role-based (Ex- RBAC) capable of expressing spatio- temporal constraints.
Recommender is a personalized service in the adaptive information system, and it can provide according to individual needs. As one of known technology field recommender systems, collaborative filtering has been widely used E-Commerce for its advantages. But rating prediction mechanism pure merely based on ratings visited items, this limits precision improvement. In paper, we propose refined hybrid approach Widrow-Hoff learning algorithm. The proposed employs algorithm learn each user¿s...
Mobile devices are in a widespread use today. Restricted by the features of mobile devices, such as mobility, low communication bandwidth, small capacity memory, limited power and inconvenient interaction, services required to recommend items adapting user need location. Much existing research on recommendations ignores semantic information dynamic historical preferences which is vital quality recommendation. In this paper, an ontology-based approach for personalized recommendation proposed....
In recent years, the travel time predictions have become a popular research topic. this paper, we present new algorithm of based on idea using shared traveler's positions to collect traffic conditions. Several experiments show that our has broader applied area than existing algorithms and can provide real-time accurate for travelers. And when there are more travelers among them, will be.
This paper investigates the link prediction problem in location-based social networking services (LBSNS) with protected location history. While former approaches mainly utilize accurate locations, relevant data we analyzed are modeled by a privacy protection model called k-anonymous spatial-temporal cloaking (KSTCM) which perturbs location-related records on both temporal and spatial dimensions. We also propose KSTCM-based co-located relationship based various contextual features extracted...
Skyline query is widely used in many applications, such as multi-criteria decision making, data mining and visualization, well Location-Based Services (LBS). The previous works about skyline mainly focuses on static attributes, Branch Bound Probabilistic Skyline. However, due to the requirements privacy-protection protecting individual position information LBS, a cloaking region of user instead his exact should be cared. To protect privacy users' location, dynamic attribute uncertain...
Accurate and reliable forecasts of diarrhoeal outpatient visits are necessary for the health authorities to ensure appropriate action control outbreak. In this study, a novel forecasting model based on hybridization Firefly Algorithm (FA) Support Vector Regression (SVR) has been proposed forecast in Shanghai. The performance SVR models depends upon choice parameters. FA employed determining rainfall, temperature, relative humidity have considered as input variables. Time series children...