Applying Linked Data Technologies for Online Newspapers
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2015, Vol 6, Issue 5
Abstract
The constantly growing data volume at the companies along with the necessity for finding information for the shortest possible time span involves methods of information search different from the ones conventionally used. The semantic technologies, developed in the late 90s and the beginning of the new century, are viewed as a new generation of databases and as text analyzing technologies. The present paper deals with researching the opportunities and examining the advantages of applying the semantic web technologies and the linked data for online newspapers. Besides, a RDF-based ontology for the purposes of a system for study and evaluation of online editions of regional daily newspapers is proposed. SPARQL endpoint is implemented to access the RDF data.
Authors and Affiliations
Tsvetanka Georgieva-Trifonova, Tihomir Stefanov
Authenticating Sensitive Speech-Recitation in Distance-Learning Applications using Real-Time Audio Watermarking
Thispaper focuses on audio-watermarking authentication and integrity-protection within the context of the speech-data transmitted over the Internet in a real-time learning environment.The Arabic Quran recitation through...
Breast Cancer Classification using Global Discriminate Features in Mammographic Images
Breast cancer has become a rapidly prevailing disease among women all over the world. In term of mortality, it is considered to be the second leading cause of death. Death risk can be reduced by early stage detection, f...
Student Facial Authentication Model based on OpenCV’s Object Detection Method and QR Code for Zambian Higher Institutions of Learning
Facial biometrics captures human facial physiological data, converts it into a data item variable so that this stored variable may be used to provide information security services, such as authentication, integrity manag...
Evaluating Confidentiality Impact in Security Risk Scoring Models
Risk scoring models assume that confidentiality evaluation is based on user estimations. Confidentiality evaluation incorporates the impacts of various factors including systems' technical configuration, on the processes...
The Ethical and Social Issues of Information Technology: A Case Study
The present study is conducted among 283 students from University of Zabol to identify the harm and ethical and social issues in the field of information technology and to classify the immoral practices that students are...