2024-03-29T06:26:23+04:30
http://ijict.itrc.ac.ir/browse.php?mag_id=33&slc_lang=en&sid=1
33-252
2024-03-29
10.1002
International Journal of Information and Communication Technology Research
2251-6107
2783-4425
doi
2010
2
3
Fuzzy Clustering for Semantic Web Services Discovery based on Ontology
Nayereh
Gholamzadeh
Fattaneh
Taghiyareh
Azadeh
Shakery
Web services as the most important event in distributed computing, have achieved great popularity among software developers today. A critical step in the process of developing service-oriented applications is web service discovery, i.e., the identification of existing relevant web services that can potentially be used in the context of a new web application.
In this paper, we have proposed a novel method based on data mining techniques to assist and improve the web service discovery process as well as the development of service-oriented applications. Our assistant discovery approach is based on automatic finding of semantic similarity between web services through the application of clustering methods. We have introduced a new fuzzy semantic clustering algorithm which assists web service consumers in discovering a group of similar web services through an individual query. This objective is attained by way of a search space reduction mechanism which adds to the efficiency of the approach. Our proposed approach provides dynamic and flexible clusters which can be changed at discovery process.
We have conducted an experimental study on a data set of tagged web services with ontology. The ontology supports the semantic analysis. Preliminary results from clustering indicate the possibility of retrieving web services at the discovery process with reasonable precision by applying the proposed similarity model. From these promising results, we conclude that web service discovery process could be performing in a reasonable time because of reduced search space.
Fuzzy Clustering
Ontology
Data Mining
Semantic
Web Service Discovery
2010
9
01
1
8
http://ijict.itrc.ac.ir/article-1-252-en.pdf
33-253
2024-03-29
10.1002
International Journal of Information and Communication Technology Research
2251-6107
2783-4425
doi
2010
2
3
Publishing Persian Linked Data; Challenges and Lessons Learned
Samad
Paydar
Mohsen
Kahani
Behshid
Behkamal
Mahboobeh
Dadkhah
Linked Data as an important and novel subject has attracted great attention in the realm of the Semantic Web. Many works deal with publishing existing datasets as Linked Data. This paper discusses the challenges of publishing Persian linked data, and their potential solutions, based on the experiences and lessons learned from a project focused on publishing some academic data of the Ferdowsi University of Mashhad as Linked Data.
Linked Data
Persian Dataset
LOD cloud
RDF
challenges and Solutions
2010
9
01
9
19
http://ijict.itrc.ac.ir/article-1-253-en.pdf
33-254
2024-03-29
10.1002
International Journal of Information and Communication Technology Research
2251-6107
2783-4425
doi
2010
2
3
A Timelier Credit Card Fraud Detection by Mining Transaction Time Series
Leila
Seyedhossein
Mahmoud Reza
Hashemi
As e-commerce sales continue to grow, the associated online fraud remains an attractive source of revenue for fraudsters. These fraudulent activities impose a considerable financial loss to merchants, making online fraud detection a necessity. The problem of fraud detection is concerned with not only capturing the fraudulent activities, but also capturing them as quickly as possible. This timeliness is crucial to decrease financial losses. In this research, a profiling method has been proposed for credit card fraud detection. The focus is on fraud cases which cannot be detected at the transaction level. Based on the fact that there are strong periodic patterns in cardholders' behavior, the time series of aggregated daily amounts spent on an individual credit card has been considered in the proposed method. In this method, the inherent periodic and seasonal patterns are extracted from the time series to construct a cardholder's profile. These patterns have been used to shorten the time between when a fraud occurs and when it is finally detected. Simulation results indicate that the new approach has resulted in a timelier fraud detection, improved detection rate and consequently less financial loss in the cases where a cardholder follows a regular or semi regular periodic behavior. The proposed method is equally applicable to other e-payment methods with minor application-specific modifications.
Fraud detection
aggregatioal profile
time series
2010
9
01
21
28
http://ijict.itrc.ac.ir/article-1-254-en.pdf
33-255
2024-03-29
10.1002
International Journal of Information and Communication Technology Research
2251-6107
2783-4425
doi
2010
2
3
A Multi-Aspect Architecture with Co-alignment between Layers for Intra-Organizational Knowledge Networking Purposes
Maryam
S. Mirian
Leila
Beig
Mahmood
Kharrat
In this paper, architecture is proposed for the new emerging concept of knowledge networks. This architecture is based on a multi-aspect view to the problem of starting such a network in an organization. By integrating infrastructure, knowledge and business layers mounted on two aspects of human-based and organizational supportive conditions in a layered architecture, we proposed a novel architecture that contains intra-layer built-in assessment mechanisms as well. These assessment mechanisms ensure the gradual refinement of the network as the structure of each layer becomes fixed. In this paper, it has been discussed that how a multi-layer architecture with minimum amount of dependency among layers (that has the ability of interaction in business and knowledge layers) may facilitate knowledge management processes. The architecture can also give some guidelines on how to start such networks in inter-organizational level .One of the main applications of this architecture is to propose appropriate guidelines for the development of required sub-systems of intraorganizational knowledge networks. Therefore, at the end of this paper, the method of extracting these guidelines on the establishment of one of the key sub-systems for managing explicit organizational knowledge (e.g. Document Management system) is explained in details. These recommendations are based on a well-known standard of this domain. As the proposed extraction method is originated from the layers independency and self-assessment mechanism between layers, it can purposefully be re-used for collaboration/experience/process management systems as well.
Architecture
Knowledge Network
Knowledge Management
Business Strategies
2010
9
01
29
37
http://ijict.itrc.ac.ir/article-1-255-en.pdf
33-256
2024-03-29
10.1002
International Journal of Information and Communication Technology Research
2251-6107
2783-4425
doi
2010
2
3
A New Mathematical Method to Estimate Resources for E-commerce Application
Leili
Pourjavaheri
Abbas
Asoshesh
Considering convergence of vast and different technologies in new generation networ . the required quality of service is the key success factor. The site implementation according to special benchmarkinJ(TPC-W), to achieve the acceptable service performance may be offered in a cost effective manner, is very complicated. In this paper a mathematical method will be introduced to help providers to make informed eel ions with respect of right level of resources (number and server capacity, number and power of CPUs, and amo nl of permanent and temporary memory). The numerical results show that the new formulation confirms the re uJt e-commerce site emulation in an acceptable level.
e-commerce
QoS
resource
TPC-W
emulation
mathematical method
2010
9
01
39
47
http://ijict.itrc.ac.ir/article-1-256-en.pdf
33-257
2024-03-29
10.1002
International Journal of Information and Communication Technology Research
2251-6107
2783-4425
doi
2010
2
3
Adaptive Autonomy Expert System in Smart Grid based on Deterministic Timed Petri Nets
Mohammad Ali
Zamani
Mohammad Amin
Sharifi Kolarijani
Alireza
Fereidunian
Hamid
Lesani
Caro
Lucas
Interaction of humans and computer agents should be harmonized by adapting the utomation level of IT systems, to maintain a high performance for the system, in the changing environmental condition . This research presents an expert system for realization of adaptive autonomy (AA), using deterministic time Petri nets (DTPNs), referred to as AAPNES. The design is based on the practical list of environmental conditions nd superior expert`s judgments. As revealed by the results, the presented AAPNES can effectively determine the proper level of automation for the changing performance shaping factors of human-automation interaction systems in the smart grid.
adaptive autonomy
expert system
human-computer interaction (HCI)
human-automation interaction (HAI)
level of automation (LOA)
smart grid
power distribution automation
2010
9
01
49
57
http://ijict.itrc.ac.ir/article-1-257-en.pdf
33-258
2024-03-29
10.1002
International Journal of Information and Communication Technology Research
2251-6107
2783-4425
doi
2010
2
3
Content-Based Approach for Trfcking Concept Drift in Email Spam Filtering
Morteza
Zi Hayat
Javad
Basiri
Leila
Seyedhossein
Azadeh
Shakery
The continued growth of Email usage, which is naturally followed by an increase i unsolicited emails so called spams, motivates research in spam filtering area. In the context of spam filtering systems, addressing th evolving nature of spams, which leads to obsolete the related models, has been always a challenge. In this paper an adaptive spam filtering system based on language model is proposed which can detect concept drift based on computing the deviation in email contents distribution. The proposed method can be used a ong with any existing classifier; particularly in this paper we use Naive Bayes method as classifier. The proposed method has been evaluated with Enron data set. The results indicate the efficiency of the method in detectin concept drift and its superiority over Naive Bayes classifier in terms of accuracy.
component
spam.filtering
concept drift
KL divergence
language model
2010
9
01
59
65
http://ijict.itrc.ac.ir/article-1-258-en.pdf