Loading...
Search for: information-retrieval
0.01 seconds

    Using social annotations for search results clustering

    , Article 13th International Computer Society of Iran Computer Conference on Advances in Computer Science and Engineering, CSICC 2008, Kish Island, 9 March 2008 through 11 March 2008 ; Volume 6 CCIS , 2008 , Pages 976-980 ; 18650929 (ISSN); 3540899847 (ISBN); 9783540899846 (ISBN) Aliakbary, S ; Khayyamian, M ; Abolhassani, H ; Sharif University of Technology
    2008
    Abstract
    Clustering search results helps the user to overview returned results and to focus on the desired clusters. Most of search result clustering methods use title, URL and snippets returned by a search engine as the source of information for creating the clusters. In this paper we propose a new method for search results clustering (SRC) which uses social annotations as the main source of information about web pages. Social annotations are high-level descriptions for web pages and as the experiments show, clustering based on social annotations yields good clusters with informative labels. © 2008 Springer-Verlag  

    Event detection from news articles

    , Article 13th International Computer Society of Iran Computer Conference on Advances in Computer Science and Engineering, CSICC 2008, Kish Island, 9 March 2008 through 11 March 2008 ; Volume 6 CCIS , 2008 , Pages 981-984 ; 18650929 (ISSN); 3540899847 (ISBN); 9783540899846 (ISBN) Sayyadi, H ; Sahraei, A ; Abolhassani, H ; Sharif University of Technology
    2008
    Abstract
    In this paper, we propose a new method for automatic news event detection. An event is a specific happening in a particular time and place. We propose a new model in this paper to detect news events using a label based clustering approach. The model takes advantage of the fact that news events are news clusters with high internal similarity whose articles are about an event in a specific time and place. Since news articles about a particular event may appear in several consecutive days, we developed this model to be able to distinguish such events and merge the corresponding news articles. Although event detection is propounded as a stand alone news mining task, it has also applications in... 

    Evaluation of test collection construction methods: A case study

    , Article 2008 International Conference on Information and Knowledge Engineering, IKE 2008, Las Vegas, NV, 14 July 2008 through 17 July 2008 ; January , 2008 , Pages 16-22 ; 1601320752 (ISBN); 9781601320759 (ISBN) Sheykh Esmaili, K ; Hosseini, M ; Rostami, A ; Abolhassani, H ; Sharif University of Technology
    2008
    Abstract
    Currently there is no standard test collection for evaluation of Farsi information retrieval systems. In this paper we introduce Mahak, the first complete test collection generally available for evaluating Farsi information retrieval systems. In addition, we have used different methods for constructing Mahak qrels and we have compared performance of these methods  

    Semantic web services for handling data heterogeneity in an e-business framework

    , Article 13th International Computer Society of Iran Computer Conference on Advances in Computer Science and Engineering, CSICC 2008, Kish Island, 9 March 2008 through 11 March 2008 ; Volume 6 CCIS , 2008 , Pages 453-460 ; 18650929 (ISSN); 3540899847 (ISBN); 9783540899846 (ISBN) Rokni Dezfouli, A ; Habibi, J ; Hassas Yeganeh, S ; Sharif University of Technology
    2008
    Abstract
    E-business requires interoperability of information systems and, therefore, standardization of information sharing. Several XML-based e-business frameworks are developed to define standards for information sharing within and between companies. These frameworks only standardize structure of messages and aren't able to define semantics. The use of Semantic Web Service (SWS) technologies has been suggested to enable more dynamic B2B integration of heterogeneous systems and partners. We present a semantic B2B mediator based on the WSMX -a SWS execution environment, to tackle heterogeneities in RosettaNet messages. We develop a rich RosettaNet ontology and use the axiomatized knowledge and rules... 

    Challenges in using peer-to-peer structures in order to design a large-scale web search engine

    , Article 13th International Computer Society of Iran Computer Conference on Advances in Computer Science and Engineering, CSICC 2008, Kish Island, 9 March 2008 through 11 March 2008 ; Volume 6 CCIS , 2008 , Pages 461-468 ; 18650929 (ISSN); 3540899847 (ISBN); 9783540899846 (ISBN) Mousavi, H ; Movaghar, A ; Sharif University of Technology
    2008
    Abstract
    One of the distributed solutions for scaling Web Search Engines (WSEs) may be peer-to-peer (P2P) structures. P2P structures are successfully being used in many systems with lower cost than ordinary distributed solutions. However, the fact that they can also be beneficial for large-scale WSEs is still a controversial subject. In this paper, we introduce challenges in using P2P structures to design a large-scale WSE. Considering different types of P2P systems, we introduce possible P2P models for this purpose. Using some quantitative evaluation, we compare these models from different aspects to find out which one is the best in order to construct a large-scale WSE. Our studies indicate that... 

    Clustering search engine log for query recommendation

    , Article 13th International Computer Society of Iran Computer Conference on Advances in Computer Science and Engineering, CSICC 2008, Kish Island, 9 March 2008 through 11 March 2008 ; Volume 6 CCIS , 2008 , Pages 380-387 ; 18650929 (ISSN); 3540899847 (ISBN); 9783540899846 (ISBN) Hosseini, M ; Abolhassani, H ; Sharif University of Technology
    2008
    Abstract
    As web contents grow, the importance of search engines became more critical and at the same time user satisfaction decreased. Query recommendation is a new approach to improve search results in web. In this paper we represent a method to help search engine users in attaining required information. Such facility could be provided by offering some queries associated with queries submitted by users in order to direct them toward their target. At first, all previous query contained in a query log should be clustered, therefore, all queries that are semantically similar will be detected. Then all queries that are similar to user's queries are ranked according to a relevance criterion. The method... 

    Exact evaluation of a two sourcing supply chain with order splitting and information sharing

    , Article 2008 IEEE International Conference on Industrial Engineering and Engineering Management, IEEM 2008, Singapore, 8 December 2008 through 11 December 2008 ; 2008 , Pages 1835-1839 ; 9781424426300 (ISBN) Sajadifar, M ; Hendi, A. M ; Haji, R ; Sharif University of Technology
    2008
    Abstract
    We consider a single item, two-level inventory system which consisting of two suppliers and one retailer. Transportation times are constant. The retailer faces Poisson demands and applies continuous (R,Q) policy. Each supplier starts with m initial batches of size Q/2 and places an order in a batch of size Q/2 to an outside source immediately after the retailer's inventory position reaches R+s. In this paper using the idea of the one-for-one ordering policy, we derive the exact value of the expected total cost in the convergent coordinated supply chain. © 2008 IEEE  

    Sensitivity analysis of the OWA operator

    , Article IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics ; Volume 38, Issue 2 , 2008 , Pages 547-552 ; 10834419 (ISSN) Zarghami, M ; Szidarovszky, F ; Ardakanian, R ; Sharif University of Technology
    2008
    Abstract
    The successful design and application of the ordered weighted averaging (OWA) method as a decision-making tool depend on the efficient computation of its order weights. The most popular methods for determining the order weights are the fuzzy linguistic quantifiers approach and the minimal variability method, which give different behavior patterns for the OWA. These two methods will be first analyzed in detail by using sensitivity analysis on the outputs of the OWA with respect to the optimism degree of the decision maker, and then the two methods will be compared. The fuzzy linguistic quantifiers approach gives more information about the behavior of the OWA outputs in comparison to the... 

    A context-aware mandatory access control model for multilevel security environments

    , Article 27th International Conference on Computer Safety, Reliability, and Security, SAFECOMP 2008, Newcastle upon Tyne, 22 September 2008 through 25 September 2008 ; Volume 5219 LNCS , 2008 , Pages 401-414 ; 03029743 (ISSN); 3540876979 (ISBN); 9783540876977 (ISBN) Jafarian, J. H ; Amini, M ; Jalili, R ; Sharif University of Technology
    2008
    Abstract
    Mandatory access control models have traditionally been employed as a robust security mechanism in multilevel security environments like military domains. In traditional mandatory models, the security classes associated with entities are context-insensitive. However, context-sensitivity of security classes may be required in some environments. Moreover, as computing technology becomes more pervasive, flexible access control mechanisms are needed. Unlike traditional approaches for access control, such access decisions depend on the combination of the required credentials of users and the context of the system. Incorporating context-awareness into mandatory access control models results in a... 

    Removing noises similar to dots from persian scanned documents

    , Article ISECS International Colloquium on Computing, Communication, Control, and Management, CCCM 2008, Guangzhou, 3 August 2008 through 4 August 2008 ; Volume 2 , 2008 , Pages 313-317 ; 9780769532905 (ISBN) Shirali Shahreza, M. H ; Shiral Shahreza, S ; Sharif University of Technology
    2008
    Abstract
    Nowadays, computer is being used in many aspects of human life. A consequence of computer is electronic documents. Computers cannot understand written documents. So, we need to convert written documents to electronic documents in order to be able to process them with computers. One of the common methods for converting written texts to electronic text is Optical Character Recognition (OCR). A lot of work has been done on English OCR, but Persian/Arabic OCR is still under development. One of the major problems in Persian/Arabic OCR is noise removal. Because dots are very important in Persian and Arabic languages and they are very similar to noises, so noise removal from Persian/Arabic... 

    Kavosh: An intelligent neuro-fuzzy search engine

    , Article 7th International Conference on Intelligent Systems Design and Applications, ISDA'07, Rio de Janeiro, 22 October 2007 through 24 October 2007 ; November , 2007 , Pages 597-602 ; 0769529763 (ISBN); 9780769529769 (ISBN) Milani Fard, A ; Ghaemi, R ; Akbarzadeh-T., M. R ; Akbari, H ; Sharif University of Technology
    2007
    Abstract
    In this paper we propose a neuro-fuzzy architecture for Web content taxonomy using hybrid of Adaptive Resonance Theory (ART) neural networks and fuzzy logic concept. The search engine called Kavosh1 is equipped with unsupervised neural networks for dynamic data clustering. This model was designed for retrieving images without metadata and in estimating resemblance of multimedia documents; however, in this work only text mining method is implemented. Results show noticeable average precision and recall over search results. © 2007 IEEE  

    Mining search engine query log for evaluating content and structure of a web site

    , Article IEEE/WIC/ACM International Conference on Web Intelligence, WI 2007, Silicon Valley, CA, 2 November 2007 through 5 November 2007 ; January , 2007 , Pages 235-241 ; 0769530265 (ISBN); 9780769530260 (ISBN) Hosseini, M ; Abolhassani, H ; Sharif University of Technology
    2007
    Abstract
    Mining search engine query log is a new method for evaluating web site link structure and information architecture. In this paper we propose a new query-URL co-clustering for a web site useful to evaluate information architecture and link structure. Firstly, all queries and clicked URLs corresponding to particular web site are collected from a query log as bipartite graph, one side for queries and the other side for URLs. Then a new content free clustering is applied to cluster queries and URLs concurrently. Afterwards, based on information entropy, clusters of URLs and queries will be used for evaluating link structure and information architecture respectively. Data sets of different web... 

    Cost differential for deciding about installing information sharing technology in a two-echelon inventory system

    , Article IIE Annual Conference and Expo 2007 - Industrial Engineering's Critical Role in a Flat World, Nashville, TN, 19 May 2007 through 23 May 2007 ; 2007 , Pages 1139-1144 Haji, R ; Sajadifar, M ; Sharif University of Technology
    2007
    Abstract
    We consider a dyadic supply chain. Retailer applies (R,Q)-policy. Supplier starts with m initial batches of size Q and places an order of the same size to an outside source. The supplier can select one of the two following cases. Case 1, whenever the retailer places an order, the supplier will also place an order. Case 2, whenever the retailer's inventory position reaches R+s, the supplier will place an order. This paper derives the cost differential between these cases for any value of s, which enables the supply chain managers to decide whether to install an information sharing technology  

    Mahak: A test collection for evaluation of farsi information retrieval systems

    , Article 2007 IEEE/ACS International Conference on Computer Systems and Applications, AICCSA 2007, Amman, 13 May 2007 through 16 May 2007 ; 2007 , Pages 639-644 ; 1424410312 (ISBN); 9781424410316 (ISBN) Sheykh Esmaili, K ; Abolhassani, H ; Neshati, M ; Behrangi, E ; Rostami, A ; Mohammadi Nasiri, M ; Sharif University of Technology
    2007
    Abstract
    Currently there is no standard test collection for evaluation of Farsi information retrieval systems. In this paper we introduce Mahak, the first complete test collection generally available for evaluating Farsi information retrieval systems. We also discuss our construction process in detail. As a goal, we hope that Mahak will foster the development of Farsi information retrieval systems. © 2007 IEEE  

    New method for risk management in CRM security management

    , Article Third International Conference on Information Technology: New Generations, ITNG 2006, Las Vegas, NV, 10 April 2006 through 12 April 2006 ; Volume 2006 , 2006 , Pages 440-445 ; 0769524974 (ISBN); 9780769524979 (ISBN) Seify, M ; Sharif University of Technology
    2006
    Abstract
    In an increasing competitive world, marketing survival can be depended simply on timely new information on customers and market trend. One of the most important strategies in CRM (Customer Relationship Management) is to capture enough information from customers and using this information carefully [17, 19]. Of course security of this information is very important in CRM data management [2]. Data management is a method for scheduling and controlling data saving, recovering and processing. This activity has been done continually or periodically [2]. Security level of this information depends on the security policy of the organization. CRM security policy is the directives and practices for... 

    Estimation error minimization in sensor networks with mobile agents

    , Article 2006 3rd IEEE Consumer Communications and Networking Conference, CCNC 2006, Las Vegas, NV, 8 January 2006 through 10 January 2006 ; Volume 2 , 2006 , Pages 964-968 ; 1424400856 (ISBN); 9781424400850 (ISBN) Ghiassi Farrokhfal, Y ; Arbab, V. R ; Pakravan, M. R ; Sharif University of Technology
    2006
    Abstract
    In a SEnsor Network with Mobile Agents (SENMA) is an architecture proposed for large scale sensor networks. In sensor networks, a fraction of the packets generated by only part of the sensors is sufficient to provide a good estimation of all network information. SENMA uses this inherent redundancy. However, the performance of such system is limited by estimation errors and packet errors due to collision. Estimation error is a major problem in applications such as habitat monitoring in which information is a function of node position. In this paper, we first derive the equations of distortion in a general scenario and use this model to compare the estimation error for regular networks. Then... 

    Fuzzy Adaptive Resonance Theory for content-based data retrieval

    , Article 2006 Innovations in Information Technology, IIT, Dubai, 19 November 2006 through 21 November 2006 ; 2006 ; 1424406749 (ISBN); 9781424406746 (ISBN) Milani Fard, A ; Akbari, H ; Akbarzadeh-T., M. R ; Sharif University of Technology
    2006
    Abstract
    In this paper we propose a content-based text and image retrieval architecture using Fuzzy Adaptive Resonance Theory neural network. This method is equipped with an unsupervised mechanism for dynamic data clustering to deal with incremental information without metadata such as in web environment. Results show noticeable average precision and recall over search results. © 2006 IEEE  

    Delay-aware scheduling in heterogeneous multiuser systems

    , Article 2006 IEEE 7th Workshop on Signal Processing Advances in Wireless Communications, SPAWC, Cannes, 2 July 2006 through 5 July 2006 ; 2006 ; 078039710X (ISBN); 9780780397101 (ISBN) Shariatpanahi, P ; Hossein Khalaj, B ; Sharif University of Technology
    2006
    Abstract
    Adaptive scheduling schemes which consider channel conditions are examples of cross-layer design in wireless networks. Research work which has been done on optimizing the performance of scheduling systems have shown that in each time slot it is better to transmit to the users with the best channel condition. In order to realize such schemes, most of earlier works have considered perfect feedback channels to send Channel State Information (CSI) to the scheduler. However, in practical systems there are some sources of imperfectness in feedback channels such as delay and quantization error. In this paper, we consider the effect of CSI delay on the performance of such systems. A new delay-aware... 

    A novel algorithm for using GA in concept weighting for text mining

    , Article WSEAS Transactions on Computers ; Volume 5, Issue 12 , 2006 , Pages 2992-2999 ; 11092750 (ISSN) Zaefarian, R ; Akhgar, B ; Siddiqi, J. I ; Zaefarian, G ; Gruzdz, A ; Ihnatowicz, A ; Sharif University of Technology
    2006
    Abstract
    The importance of good weighting methodology in information retrieval methods - the method that affects the most useful features of a document or query representative - is examined.. Weighting features is the thing that many information retrieval systems are regarding as being of minor importance as compared to find the feature and the experiments are confirming this. There are different methods for the term weighting such as TF*IDF and Information Gain Ratio which have been used in information retrieval systems, the paper provides a brief review of the related literature. This paper explores using GA for concept weighting which is a novel application to the field of text mining It proposes... 

    Combined time and information redundancy for SEU-tolerance in energy-efficient real-time systems

    , Article IEEE Transactions on Very Large Scale Integration (VLSI) Systems ; Volume 14, Issue 4 , 2006 , Pages 323-335 ; 10638210 (ISSN) Ejlali, A ; Al-Hashimi, B. M ; Schmitz, M. T ; Rosinger, P ; Miremadi, S. G ; Sharif University of Technology
    2006
    Abstract
    Recently, the tradeoff between energy consumption and fault-tolerance in real-time systems has been highlighted. These works have focused on dynamic voltage scaling (DVS) to reduce dynamic energy dissipation and on-time redundancy to achieve transient-fault tolerance. While the time redundancy technique exploits the available slack-time to increase the fault-tolerance by performing recovery executions, DVS exploits slack-time to save energy. Therefore, we believe there is a resource conflict between the time-redundancy technique and DVS. The first aim of this paper is to propose the use of information redundancy to solve this problem. We demonstrate through analytical and experimental...