Applying Linked Data Technologies for Online Newspapers
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2015, Vol 6, Issue 5
Abstract
The constantly growing data volume at the companies along with the necessity for finding information for the shortest possible time span involves methods of information search different from the ones conventionally used. The semantic technologies, developed in the late 90s and the beginning of the new century, are viewed as a new generation of databases and as text analyzing technologies. The present paper deals with researching the opportunities and examining the advantages of applying the semantic web technologies and the linked data for online newspapers. Besides, a RDF-based ontology for the purposes of a system for study and evaluation of online editions of regional daily newspapers is proposed. SPARQL endpoint is implemented to access the RDF data.
Authors and Affiliations
Tsvetanka Georgieva-Trifonova, Tihomir Stefanov
Particle Swarm Optimization for Calibrating and Optimizing Xinanjiang Model Parameters
The Xinanjiang model, a conceptual hydrological model is well known and widely used in China since 1970s. Therefore, most of the parameters in Xinanjiang model have been calibrated and pre-set according to different clim...
Unsupervised Video Surveillance for Anomaly Detection of Street Traffic
Intelligent transportation systems enables the analysis of large multidimensional street traffic data to detect pattern and anomaly, which otherwise is a difficult task. Advancement in computer vision makes great contrib...
A Multi-Level Process Mining Framework for Correlating and Clustering of Biomedical Activities using Event Logs
Cost, time and resources are major factors affecting the quality of hospitals business processes. Bio-medical processes are twisted, unstructured and based on time series making it difficult to do proper process modeling...
Cryptography using Random Rc4 Stream Cipher on SMS for Android-Based Smartphones
Messages sent using the default Short Message Service (SMS) application have to pass the SMS Center (SMSC) to record the communication between the sender and recipient. Therefore, the message security is not guaranteed b...
IMPLEMENTATION OF NODE ENERGY BASED ON ENCRYPTION KEYING
This paper deals with Designing cost-efficient, secure network protocols for any Networks is a challenging problem because node in a network itself is resource-limited. Since the communication cost is the most dominant f...