JWE Abstracts 

Vol.14 No.3&4 July 1, 2015

Review Article:

Organizing Information in Medical Blogs Using a Hybrid Taxonomy-Folksonomy Approach (pp181-195)
Yamen Batch and Maryati Mohd. Yusof

The retrieval of health-related information from medical blogs is challenging, primarily because these blogs lack a systematic method to organize their posts. This paper investigated the application of a hybrid taxonomy-folksonomy approach in medical blogs by reviewing the existing approaches that apply the hybrid taxonomy-folksonomy structure in web-based systems. The review showed that the hybrid structure was promising for enhanced classification of resources in web-based systems; particularly in a specific type of medical blog known as a physician-written blog. However, further research is needed to truly identify the long-term impact of the hybrid structure and its benefit in achieving a better organization of other categories of medical blogs.

Research Articles:

Machine Learning in Efficient and Effective Web Service Discovery (pp196-214)
Kailash Chander Bhardwaj and R.K. Sharma
The web service discovery mechanism has continuously evolved during the last years. There is plethora of information available about various techniques and methods used for meeting the challenge of improving web service discovery. A tremendous effort has been reported in literature and researchers are still contributing to make the web service discovery more effective and efficient. This paper discusses various eminent researchers’ work in this direction using machine learning based techniques. Machine learning is a promising area for researchers to produce accurate estimates consistently. Machine learning system effectively "learns" how to estimate from training set of completed projects. We hope that this paper would benefit researchers to carry further work discussed in this paper and provide an outlook for the future research trends.

An Online System for Notification of Changes to Blogging Space to Achieve Information Domination (pp215-233)
Mehdi Naghavi and Mohsen Sharifi
Exponential growth of information in the Cyberspace alongside rapid advancements in its related technologies has created a new mode of competition between societies to gain information domination in this critical and invaluable space. It has thus become quite critical to all stakeholders to play a leading and dominant role in the generation of information and monitoring of voluminous information uploaded to this space. Dominance in monitoring of large amount of information in cyberspace requires real-time monitoring using new techniques and approaches instead of traditional techniques. Concerned with the latter case, we limit our focus in this paper on Blogs as an important part of the Cyberspace and propose a novel notification system for quick reporting of changes made to Blogs. This is achieved by restricting the search for changes to high volumes of Blogs only to changes to the abstracts of Blogs derived from Blogs. We show that this system works favourably compared to systems that require cooperation and synchronization between information providers.

A Novel Twig-Join Swift Using SST-Based Representation for Efficient Retrieval of Internet XML (pp234-250)
Yi-Wei Kung, Hsu-Kuang Chang, and Chung-Nan Lee
Compiling documents in extensible markup language (XML) plays an important role in accessing data services when both rapid response and the precise use of search engines are required. The main operation in XML query processing is to find nodes that match the given query tree pattern (QTP) in the document. An efficient query service should be based on a skillful representation that can support low complexity and high precision search capabilities. However, accessing too many useless nodes in order to match a query pattern is very time-consuming. This paper proposes a structural summary tree (SST) algorithm that is not only able to satisfy a query, but also has better time-saving efficiency compared with the existing twig-join algorithms such as the TJFast algorithm. A novel twig-join Swift (TJSwift) associated with adjacent linked (AL) lists for the provision of efficient XML query services is also proposed, in which queries can be versatile in terms of predicates. TJSwift can completely preserve hierarchical information, and the new index generated from SST is used to save semantic information. The TJSwift approach can provide template-based indexing for fast data searches. An experiment is also conducted for the evaluation of the TJSwift approach.

Assisting developers to build high-quality code-first Web Service APIs (pp251-285)
Juan Manuel Rodriguez, Cristian Mateos, and Alejandro Zunino 
Searching and understanding Web Services is challenging mainly because service developers tend to disregard the importance of the exposed service APIs. In many situations these APIs are defined using WSDL documents, which are written in an XML dialect. Service developers can opt between manually writing these documents or inferring them from service implementations. This work is focused on the later methodology and provides techniques and tools for generating WSDL documents avoiding well-known bad practices (e.g., lack of textual comments or representative names) that compromise Web Service API quality. Our experiments show that by using our approach the obtained WSDL documents are more likely to be free from these undesirable practices so they better describe service functionality. In addition, these experiments show that the WSDL documents generated using our approach also have other important quality-related features, such as less redundant data-type definitions and better defined data-types. Experiments have been performed by comparing our proposal against WSDL generation tools/\-approaches from both the industry and the academy.

Comparison of Hybrid Approaches with Traditional Algorithms for Improving Scaleability (pp286-300)
Suriya Sundaramoorthy, S.P. Shantharajah, and Suresh Kannan Sundaramoorthy
Frequent pattern mining always occupies its space in research activities in spite of various emerging research ideas. This paper focuses on performance of four competitive algorithms namely hybrid k-Direct Count and Intersect algorithm with apriori algorithm, hybrid k-Direct Count and Intersect algorithm with transaction mapping algorithm, Modified Ant Colony algorithm and improved Ant Colony algorithm over frequent pattern mining against traditional algorithms. We focus on a set of well defined parameters such as database layout, scanning of input databases, memory requirement, input / output cost, input / output overhead, computational cost, execution speed, scalability, support for parallelization, complexity of the algorithm to do this comparison. Experimental results support for this effective comparison with help of visualization through graphs. We used ASP.net as front end tool and SQL server 2005 as back end tool for implementing our proposed approaches. As a result of this study, there is good improvement in effectiveness of pattern mining in all aspects while using the improved Ant Colony algorithm against other hybrid approaches and traditional algorithms.

A Novel Ontology Evolution Methodology (pp301-324)
Ali Rahnama and Ahmad Abdollazadeh Barforoush

In recent years, ontology engineering has received a great amount of attention and has advanced greatly. Today, ontologies are finding their role in knowledge and information systems. To keep up with the dynamic aspect of knowledge, the need for ontology evolution systems has emerged. Such systems help facilitate the management of changes on the ontology in a systematic way. To define a systematic way of facilitating management of changes, a process model is needed. Therefore in this paper, we present our novel ontology evolution process model which uses ontology change rules to achieve this goal. These change rules are defined via the SWRL rule representation language. This new approach to ontology evolution helps the ontology evolution process by preserving the consistency of the ontology throughout the ontology evolution process. To classify ontology changes, we will also present our novel taxonomy of ontology changes. To test the feasibility of our presented process model, we have implemented the OntoEvol system. It is also presented in this paper.

Semantic-based Clustering of Web Services (pp325-345)
Leonardo de Jesus Silva, Daniela Barreiro Claro, and Denivaldo Lopes
The interoperability needed for the exchange of information between organizations is currently obtained through Service Oriented Architecture (SOA). Through the implementation of Web services, components can be described in a consistent and standardized way. However, there is a high number of published Web services, it is important to have some organization in order to determine specific areas of these services. Thus, our approach proposes creating semantically similar domains of Web services by applying clustering algorithms. Two clustering algorithms were adapted and evaluated. Each cluster was validated in order to analyze whether the Web services were grouped correctly. Our results evaluated each group and the set of categorized services.

Credential Purpose-based Access Control for Personal Data Protection (pp346-360)
Norjihan Abdul Ghani, Harihodin Selamat, and Zailani Mohamed Sidek
Web-based applications enable users to carry out their business transactions virtually at any time and place. They require users to disclose almost all their personal information. Organizations on the other hand will collect, process, and store a huge amount of this information, which results in a greater risk of information disclosure. Enforcing personal information protection in databases requires controlled access to systems and resources and is only granted to authorized users. Previous research on purpose-based access control does not fully support personal data protection, especially users’ rights and less user participation towards their personal data once it is released via web applications. This paper formulates a solution to control access while ensuring that personal data is protected and that users have full control over their own data. This model, which implements two-phase security involving user authentication using personal credential and data authorization based on purpose, is presented. The purpose of this model is to protect personal information that has been collected via web-based applications by using data access control.

Back to JWE Online Front Page