Friendbook: A Semantic-Based Friend Recommendation System for Social Networks

  Existing social networking services recommend friends to users based on their social graphs, which may not be the most appropriate to reflect a user’s preferences on friend selection in real life. In this paper, we present Friendbook, a novel semantic-based friend recommendation system for social networks, which recommends friends to users based on their [...]

Design for visually impaired to work at Industry using RFID technology.

One of the technical challenges for the modern society to detect and find a solution for visually impaired, with increased security and service motto towards the society helped to bring a solution which would help the visually impaired in the industries and other companies. Here we had come out with a prototype as a way [...]

An Active Learning System Using Smartphone for Improving Students Learning Concentration

In our previous work, it has been shown that the students can improve the learning process by using smartphones. For the professors of the university, it is difficult to offer all necessary information to the students. In addition, they cannot provide the information to satisfy all students because the quantity of knowledge of each student [...]

A satellite based localisation service using a 3G mobile phone as an emergency terminal.

In this paper, a new satellite based search and rescue system is designed. The old one – the COSPAS-SARSAT distress alert detection and distribution system, has been working for 30 years and rescued about 40 thousands of lives world-wide, in spite of low precision of the distress localization and long localization time. In this paper, [...]

Co-Extracting Opinion Targets and Opinion Words from Online Reviews Based on the Word Alignment Model

Mining opinion targets and opinion words from online reviews are important tasks for fine-grained opinion mining, the key component of which involves detecting opinion relations among words. To this end, this paper proposes a novel approach based on the partially-supervised alignment model, which regards identifying opinion relations as an alignment process. Then, a graph-based co-ranking [...]

Author Topic Model-Based Collaborative Filtering for Personalized POI Recommendations

From social media has emerged continuous needs for automatic travel recommendations. Collaborative filtering (CF) is the most well-known approach. However, existing approaches generally suffer from various weaknesses. For example , sparsity can significantly degrade the performance of traditional CF. If a user only visits very few locations, accurate similar user identification becomes very challenging due [...]

PPSGen: Learning-Based Presentation Slides Generation for Academic Papers

In this paper, we investigate a very challenging task of automatically generating presentation slides for academic papers. The generated presentation slides can be used as drafts to help the presenters prepare their formal slides in a quicker way. A novel system called PPSGen is proposed to address this task. It first employs the regression method [...]

A Fuzzy Preference Tree-Based Recommender System for Personalized Business-to-Business E-Services

The Web creates excellent opportunities for businesses to provide personalized online services to their customers. Recommender systems aim to automatically generate personalized suggestions of products/services to customers (businesses or individuals). Although recommender systems have been well studied, there are still two challenges in the development of a recommender system, particularly in real-world B2B e-services: items [...]

Effectiveness of Security Images in Internet Banking

  Internet banking websites often use security images as part of the login process, under the theory that they can help foil phishing attacks. Previous studies, however, have yielded inconsistent results about users’ ability to notice that a security image is missing. This article describes an online study of 482 users that attempts to clarify [...]

Performance Evaluations of Quantum Key Distribution System Architectures

Quantum key distribution (QKD) is the most mature application of the quantum information  eld, o ering the means for two parties to generate secure cryptographic keying material. Employing the laws of quantum physics, QKD can detect eavesdroppers during the key generation process, in which unauthorized observation of quantum communication induces discernible errors. However, QKD [...]