Blog feed search in Persian Blogosphere
Journal Title: Journal of Information Systems and Telecommunication - Year 2014, Vol 2, Issue 4
Abstract
Blogs are one of the main user generated content on the web. So, it is necessary to present retrieval algorithms to the meet information need of weblog users. The goal of blog feed search is to rank blogs regarding their recurrent relevance to the topic of the query. In this paper, the state-of-the-art blog retrieval methods are surveyed and then they are evaluated and compared in Persian blogosphere. Also, one of the best retrieval models is optimized by using data fusion methods. Evaluation of the proposed algorithm is carried out based on a standard Persian weblogs dataset with 45 diverse queries. Our comparisons show considerable improvement over existing blog retrieval algorithms.
Authors and Affiliations
MohammadSadegh Zahedi, Abolfazl Aleahmad, Masoud Rahgozar, Farhad Oroumchian
Joint Source and Channel Analysis for Scalable Video Coding Using Vector Quantization over OFDM System
Conventional wireless video encoders employ variable-length entropy encoding and predictive coding to achieve high compression ratio but these techniques render the extremely sensitive encoded bit-stream to channel error...
Low Distance Airplanes Detection and Tracking Visually using Spectral Residual and KLT Composition
This paper presents the method for detection and tracking airplanes which can be observed visually in low distances from sensors. They are used widely for some reasons such as military or unmanned aerial vehicle (UAV) be...
Pose-Invariant Eye Gaze Estimation Using Geometrical Features of Iris and Pupil Images
In the cases of severe paralysis in which the ability to control the body movements of a person is limited to the muscles around the eyes, eye movements or blinks are the only way for the person to communicate. Interface...
The Separation of Radar Clutters using Multi-Layer Perceptron
Clutter usually has negative influence on the detection performance of radars. So, the recognition of clutters is crucial to detect targets and the role of clutters in detection cannot be ignored. The design of radar det...
Defense against SYN Flooding Attacks: A Scheduling Approach
The TCP connection management protocol sets a position for a classic Denial of Service (DoS) attack, called the SYN flooding attack. In this attack attacker sends a large number of TCP SYN segments, without completing th...