A Framework for Plagiarism Detection in Arabic Documents
2015, Computer Science & Information Technology ( CS & IT )
https://doi.org/10.5121/CSIT.2015.50201Abstract
We are developing a web-based plagiarism detection system to detect plagiarism in written Arabic documents. This paper describes the proposed framework of our plagiarism detection system. The proposed plagiarism detection framework comprises of two main components, one global and the other local. The global component is heuristics-based, in which a potentially plagiarized given document is used to construct a set of representative queries by using different best performing heuristics. These queries are then submitted to Google via Google's search API to retrieve candidate source documents from the Web. The local component carries out detailed similarity computations by combining different similarity computation techniques to check which parts of the given document are plagiarised and from which source documents retrieved from the Web. Since this is an ongoing research project, the quality of overall system is not evaluated yet.
References (399)
- Alzahrani, S.M., Salim, N.& Abraham, A.(2012). Understanding plagiarism linguistic patterns, textual features, and detection methods. IEEE transactions on systems, man, and cybernetics-part c: applications and reviews, 42(2), pp. 133-149.
- Eissen, M., Stein, B. & Kulig, M.(2007). Plagiarism detection without reference collections. In Proceedings of the advances in data analysis, pp. 359-366.
- Benno, S., Moshe, K. & Efstathios, S.(2007). Plagiarism analysis, authorship identification, and near- duplicate detection. In Proceedings of the ACM SIGIR Forum PAN07, pp 68-71, New York.
- Clough, P. (2003). Old and new challenges in automatic plagiarism detection. National Plagiarism Advisory Service, (February edition).
- Brin, S., Davis, J., & Garcia-Molina, H.(1995). Copy detection mechanisms for digital documents. In proceedings of the ACM SIGMOD annual conference.
- Shivakumar, N., & Garcia-Molina, H.(1996). Building a scalable and accurate copy detection mechanism. Proceedings of the first ACM international conference on digital libraries.
- Si, Leong, H.V., & Lau, R.W.(97). CHECK: A document plagiarism detection system. In Proceedings of ACM symposium for applied computing, pp. 70-77.
- Broder, A.Z. (1997). On the resemblance and containment of documents. In compression and complexity of sequences , pp. 21-29.
- Monostori, K., Zaslavsky, A., & Schmidt, H. (2000). MatchDetectReveal: Finding overlapping and similar digital documents. In proceedings of information resources management association international conference, pp. 955-957.
- Computer Science & Information Technology (CS & IT)
- Khmelev, D., & Teahan, W. (2003). A repetition based measure for verification of text collections and for text categorization. In Proceedings of the 26th annual international ACM SIGIR conference on research and development in information retrieval, pp. 104-110.
- Runeson, P., Alexandersson, M., & Nyholm, O. (2007). Detection of duplicate defect reports using natural language processing. In proceedings of 29th international conference on software engineering, pp. 499-510.
- Leung, C.-H., & Chan, Y.-Y. (2007). A natural language processing approach to automatic plagiarism detection. In proceedings of the 8th ACM SIGITE conference on information technology education, (pp. 213-218).
- Androutsopoulos, I., & Malakasiotis, P.(2009). A Survey of paraphrasing and textual entailment methods. Technical report, Athens University of Economics and Business, Greece.
- Ceska, Z., & Fox, C.(2009). The influence of text pre-processing on plagiarism detection. In recent advances in natural language processing, RANLP'09 .
- Chong, M., Specia, L., & Mitkov, R. (2010). Using natural language processing for automatic detection of plagiarism. In proceedings of 4th international plagirism conference.
- Alzahrani, S.M. & Salim, N. (2009) Fuzzy semantic-based string similarity for extrinsic plagiarism detection. In Proceedings of the 2nd international conference on the applications of digital information and Web technologies., London, UK.
- Bensalem, I.Rosso, P. & Chikhi, S. (2012). Intrinsic plagiarism detection in Arabic text: preliminary experiments. In Proceedings of the 2nd Spanish conference on information retrieval, Spain.
- Menai, M.(2012) Detection of plagiarism in Arabic documents. International journal of information technology and computer science (IJITCS), 4(10).
- Khan, I.H.,Siddiqui, M. Jambi, K. M., Imran, M & Bagais, A. A. (2014). Query optimization in Arabic plagiarism detection: an empirical study. To appear in International Journal of Intelligent Systems and Applications.
- Khoja, S.(1999). Stemming Arabic Text. Online available: http://zeus.cs.pacificu.edu/shereen/research.htm.
- Siddiqui, M.A., Elhag, S.,Khan, I.H., & Jambi, K. M. Building an Arabic plagiarism detection corpus. To appear in language resources and engineering.
- Haggag, O. & El-Beltagy, S. (2013). Plagiarism candidate retrieval using selective query formulation and discriminative query scoring. In proceedings of PAN, CLEF.
- Ferret (2009). Online available at University of Hertfordshire: http://homepages.feis.herts.ac.uk/~pdgroup/.
- Z. Li, M. Sanghi, Y. Chen, M. Y. Kao, and B. Chavez, "Hamsa: Fast signature generation for zero- day polymorphic worms with provable attack resilience.", IEEE Symposium on Security and Privacy, May 2006.
- YARA Documentation,http://yara.readthedocs.org/en/latest/index.html
- Xu, Wei, Fangfang Zhang, and Sencun Zhu. "The power of obfuscation techniques in malicious JavaScript code: A measurement study." Malicious and Unwanted Software (MALWARE), 2012 7th International Conference on. IEEE, 2012.
- Charikar, Moses S. "Similarity estimation techniques from rounding algorithms." Proceedings of the thiry-fourth annual ACM symposium on Theory of computing. ACM, 2002.
- K. S. Jones, "A statistical interpretation of term specificity and its application in retrieval", Journal of Documentation, Vol.28, No.1, 1972, pp.11-21.
- O. Kraif, (2003) "Repérage de traduction et commutation interlingue :Intérêt et méthodes", Traitement Automatique des LanguesNaturelles TALN 2003, Batz-sur-Mer, France, June 11-14, 2003.
- V. Malaisé, (2005) "Méthodologie linguistique et terminologique pour la structuration d'ontologies différentielles à partir de corpus textuels", doctoral thesis, University of Paris 7 -Denis Diderot, 2005.
- K.W. Church, W. Gale, P. Hanks, and D. Hindle, (1991) "Using statistics inlexical analysis". In Lexical Acquisition, Exploiting On-Line Resourcesto Build a Lexicon, Hillsdale, Michigan, USA: Zernik Uri ed., London,Lawrence Erlbaum Associates, 1991, pp.115-164.
- T. Dunning, (1994) "Accurate Methods for the Statistics of Surprise and Coincidence", Computational Linguistics, vol. 19(1), pp. 61-74, 1994.
- H. Nakagawa, T. Mori, and H. Yumoto, (2003) "Term Extraction Based on Occurrence and Concatenation Frequency", Journal of Natural Language Processing, vol. 10 (1), pp.27-45, 2003.
- B. Daille, (1994) "Approchemixte pour l'extraction de terminologie : statistiquelexicale et filtreslinguistiques", doctoral thesis, University of Paris 7, 1994.
- S. Boulaknadel, B. Daille and D. Aboutajdine, (2008) "A multi-word term extraction program for Arabic language", the 6th international Conference on Language Resources and Evaluation LREC 2008, Marrakech, Morocco, 28-30 May 2008, pp. 1485-1488.
- Abbas, M., Smaili, K., &Berkani, D. (2010) "Tr-classifier and knn evaluation for topic identification tasks", The International Journal on Information and Communication Technologies (IJICT), 3(3), 65- 74.
- Attia, M., Antonio Toral, Lamia Tounsi, PavelPecina and Josef van Genabith,(2010) "Automatic Extraction of Arabic Multiword Expressions", In: Proceedings of the Workshop on Multiword Expressions: from Theory to Applications (MWE 2010), pp: 18-26,Beijing, China. 2010.
- Z. Harris, (1991) "Theory of Language and Information: A Mathematical Approach", Oxford & New York: Clarendon Press, 1991.
- Traboulsi, H,(2009) "Arabic named entity extraction: A local grammar-based approach", In: Pro- ceedings of the International Multiconference on Computer Science and Information Technology, vol. 4, pp. 139-143 (2009) .
- Sag, Ivan A., Timothy Baldwin, Francis Bond, Ann Copestake and Dan Flickinger, (2002) "Multiword Expressions: A Pain in the Neck for NLP" In the 3rd International Conference on Intelligent Text Processing and Computational Linguistics (CICLing-2002), volume 2276 of Lecture Notes in Computer Science, pp. 1.15, London, UK. Springer-Verlag.
- Ramisch, Carlos, Paulo Schreiner, Marco Idiart and Aline Villavicencio, (2008), "An Evaluation of Methodsfor the Extraction of Multiword Expressions", In the Workshop on Multiword Expressions, the 6thInternational Conference on Language Resources and Evaluation (LREC 2008), pp. 50.53. Marrakech, Morocco.
- Pecina, Pavel, (2010) "Lexical association measures and collocation extraction", In Language Resources and Evaluation (2010), 44:137-158.
- Bounhas, I. and Y. Slimani, (2009) "A hybrid approach for Arabic multi-word term extraction", Proceeding of the International Conference on NLP-KE 2009, Department of Computer Science, University of Tunis, Sept. 24-27, Tunis, Tunisia, pp: 1-8. DOI: 10.1109/NLPKE.2009.5313728.
- Helena M. Caseli, Carlos Ramisch, Maria G. V. Nunes, and Aline Villavicencio, (2009) "Alignment- based extraction of multiword expressions", Language resources and evaluation 44 (1-2), 59-77. REFERENCES
- H. Pompi and D. A. Russell, (2012), Advances in fingerprint analysis. Angewandte Chemie International Edition 51, (15):3524-3531.
- V. Krithika and V. S. Kumar, (2011), Fingerprint identification: A brief literary review.
- J. Bringer H. Chabanne T. Chouta J. Danger M. Favre B. Mael, Y. Bocktaels and T. Graba, (2013), Studying potential side channel leakages on an embedded biometric comparison system. Database 4(5(7)).
- CardLogix Corporation, Smart Card Standards, (2010), http:// www.smartcardbasics.com/smart-card- standards.html, (Last visited 08/08/14).
- C. S. Mlambo, F.V. Nelwamondo, M.E. Mathekga, (2014), Comparison of effective Hough Transform-based fingerprint alignment approaches, International Symposium on Biometrics and Security Technologies, IEEE.(in press)
- ORACLE, "Java Card Technology Documentation" http://docs.oracle.com/javame/javacard/javacard.html, 2012. (Last visited 20/11/14).
- Precise Biometrics, (2013), "Match on Card", http://www.matchoncard.com/what-is-moc/smart- cards-and-fingerprint-recognition/, (Last visited 09/10/2014).
- ORACLE Inc. (2010), Java Card™ 3 Platform, Application Programming Notes.
- Infineon Ltd, (2014) "National ID", http://www.infineon.com/cms/en/product/smart-card-ic, 2014, (Last accessed 18/10/14).
- CardLogix Corporation, (2010) "Smart Card Standards", http:// www.smartcardbasics.com/smart- card-standards.html, 2010, (Last visited 08/10/14).
- A. Paulino, J. Feng and A. Jain, (2013), Latent Fingerprint Matching Using Descriptor-Based Hough Transform, IEEE Transactions on Information Forensics and Security, vol. 8, no. 1, pp. 31-45.
- R. Zhou, D. Zhong, and J. Han, (2013), Fingerprint Identification Using SIFT-Based Minutia Descriptors and Improved All Descriptor-Pair Matching, Sensors, ISSN: 1424-8220.
- F. Chen, X. Huang, and J. Zhou, (2013), Hierarchical Minutiae Matching for fingerprint and Palm print Identification, IEEE Trans-actions on Image Processing:a publication of the IEEE Signal Processing Society, vol. 22, no. 12, pp. 4964-497.
- G. Bebis, T. Deaconu, and M. Georgiopoulos. (1999), Fingerprint identification using Delaunay triangulation. Information Intelligence and Systems, 1999. Proceedings. 1999 International Conference on. IEEE, pp. 452-459.
- P. R. Mendes, A. C. Junior, and D. Menotti , (2010), A Complete System for Fingerprint Authentication using Delaunay Trian-gulation, Reconhecimento de Padroes, DECOM-UFOP, pp. 1- 7.
- C.S. Mlambo, F.V. Nelwamondo, and M.E. Mathekga, (2014), "An improved Hough transform-based _fingerprint alignment approach", International Image Processing, Applications and Systems Conference, IPAS'14, IEEE,(Accepted.).
- C.S. Mlambo, M. Shabalala, M.E. Mathekga, and F.V. Nelwamondo, (2014), Application of Hough transform-based _fingerprint alignment on match on smart cards. International Conference on Cyber Warfare and Security ICCWS, (ICCWS-2015). Accepted.
- T. Uz, G. Bebis, A. Erol and S. Prabhakar, (2009), Minutiae-based Template Synthesis and Matching for Fingerprint Authentication, Computer Vision and Image Understanding, vol. 113(9), pp. 979-992.
- A. Gheibi and A. Mohades, (2013), Stable Geometric Fingerprint Matching, IET Computer Vision Journal.
- V. Gupta and R. Singh, (2012), Image processing and computer vision. Fingerprint Recognition CS676.
- A.C. Lomte, and S.B. Nikam, (2013), "Biometric fingerprint authentication by minutiae extraction using USB token system", International Journal Computer Technology and Applications, Vol. 4, No. 2, pp. 187-191.
- F. Benhammadi, and K. B. Beghdad, (2013), "Embedded Fingerprint Matching on Smart Card", International Journal of Pattern Recognition and Artificial Intelligence, Vol. 27, No. 02. REFERENCES
- K. Majrashi and M. Hamilton, "A Cross-Platform Usability Measurement Model," Lecture Notes on Software Engineering, vol. 3, 2015.
- M. Bell, Service-oriented modeling (SOA): Service analysis, design, and architecture: John Wiley & Sons, 2008.
- M. Rosen, B. Lublinsky, K. T. Smith, and M. J. Balcer, Applied SOA: service-oriented architecture and design strategies: John Wiley & Sons, 2008.
- The Linux Information Inc, "Cross-platform Definition," 2005.
- A. T. Manes, Web Services: A Manager's Guide: Addison-Wesley Longman Publishing Co., Inc., 2003.
- Q. Yu and A. Bouguettaya, Foundations for Efficient Web Service Selection: Springer, 2009.
- N. Ide and J. Pustejovsky, "What does interoperability mean, anyway? Toward an operational definition of interoperability for language technology," in Proceedings of the Second International Conference on Global Interoperability for Language Resources. Hong Kong, China, 2010.
- G. Alonso and F. Casati, "Web services and service-oriented architectures," in Data Engineering, 2005. ICDE 2005. Proceedings. 21st International Conference on, 2005, p. 1147.
- S. K. Feiner, "Environment management for hybrid user interfaces," Personal Communications, IEEE, vol. 7, pp. 50-53, 2000.
- M. Wäljas, K. Segerståhl, K. Väänänen-Vainio-Mattila, and H. Oinas-Kukkonen, "Cross-platform service user experience: a field study and an initial framework," in Proceedings of the 12th international conference on Human computer interaction with mobile devices and services, 2010, pp. 219-228.
- M. A. Schilling, "Toward a general modular systems theory and its application to interfirm product modularity," Academy of management review, vol. 25, pp. 312-334, 2000.
- H. A. Simon, The architecture of complexity: Springer, 1991.
- C. Denis and L. Karsenty, "Inter-usability of multi-device systems: A conceptual framework," Multiple user interfaces: Cross-platform applications and context-aware interfaces, pp. 373-384, 2004.
- H. Wilson, R. Street, and L. Bruce, The multichannel challenge: integrating customer experiences for profit: Routledge, 2008.
- F. G. Kazasis, N. Moumoutzis, N. Pappas, A. Karanastasi, and S. Christodoulakis, "Designing Ubiquitous Personalized TV-Anytime Services," in CAiSE Workshops, 2003.
- P. Fraternali, A. Bozzon, M. Brambilla, V. Croce, K. Hammervold, E. Moore, et al., "Model-driven development of personalized, multichannel interfaces for audiovisual search: the PHAROS approach," NEM Summit, Saint Malo, France, 2009.
- C. Wiberg, K. Jegers, and J. Bodén, "Cross media interaction design," 2007.
- L. V. L. Filgueiras, D. O. Correa, J. S. O. Neto, and R. P. Facis, "X-gov planning: how to apply cross media to government services," in Digital Society, 2008 Second International Conference on the, 2008, pp. 140-145.
- J. Boumans, "Cross-media E-Content Report 8," Published in a series of E-Content Reports by ACTeN (http://www. acten. net), 2004.
- K. Segerståhl, "Crossmedia systems constructed around human activities: a field study and implications for design," in Human-Computer Interaction-INTERACT 2009, ed: Springer, 2009, pp. 354-367.
- K. A. Bharat and L. Cardelli, "Migratory applications," in Proceedings of the 8th annual ACM symposium on User interface and software technology, 1995, pp. 132-142.
- D. Thevenin and J. Coutaz, "Plasticity of user interfaces: Framework and research agenda," in Proceedings of INTERACT, 1999, pp. 110-117.
- B. Johanson, G. Hutchins, T. Winograd, and M. Stone, "PointRight: experience with flexible input redirection in interactive workspaces," in Proceedings of the 15th annual ACM symposium on User interface software and technology, 2002, pp. 227-234.
- M. A. Nacenta, D. Aliakseyeu, S. Subramanian, and C. Gutwin, "A comparison of techniques for multi-display reaching," in Proceedings of the SIGCHI conference on Human factors in computing systems, 2005, pp. 371-380.
- J. T. Biehl, W. T. Baker, B. P. Bailey, D. S. Tan, K. M. Inkpen, and M. Czerwinski, "Impromptu: a new interaction framework for supporting collaboration in multiple display environments and its field evaluation for co-located software development," in Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, 2008, pp. 939-948.
- J. R. Wallace, R. L. Mandryk, and K. M. Inkpen, "Comparing content and input redirection in MDEs," in Proceedings of the 2008 ACM conference on Computer supported cooperative work, 2008, pp. 157-166.
- K. Luyten and K. Coninx, "Distributed user interface elements to support smart interaction spaces," in Multimedia, Seventh IEEE International Symposium on, 2005, p. 8 pp.
- M. Bång, A. Larsson, E. Berglund, and H. Eriksson, "Distributed user interfaces for clinical ubiquitous computing applications," in International Journal of Medical Informatics vol. 74, ed, 2005, pp. 545-551.
- K. Segerståhl and H. Oinas-Kukkonen, "Distributed user experience in persuasive technology environments," in Persuasive Technology, ed: Springer, 2007, pp. 80-91.
- A. a. F. Seffah, Peter, "Workshop on multiples user interfaces over the Internet: engineering and applications trends," In: HM-HCI: French/British Conference on Human Computer Interaction, Lille, France, 2001.
- J. Vanderdonckt, Q. Limbourg, M. Florins, F. Oger, and B. Macq, "Synchronised, model-based design of multiple user interfaces," in Proc. 2001 Workshop on Multiple User Interfaces over the Internet, 2001.
- J. McGrenere, R. M. Baecker, and K. S. Booth, "An evaluation of a multiple interface design solution for bloated software," in Proceedings of the SIGCHI conference on Human factors in computing systems, 2002, pp. 164-170.
- A. Seffah and H. Javahery, Multiple user interfaces: cross-platform applications and context-aware interfaces: John Wiley & Sons, 2005.
- A. Seffah, P. Forbrig, and H. Javahery, "Multi-devices "Multiple" user interfaces: development models and research opportunities," in Journal of Systems and Software vol. 73, ed, 2004, pp. 287- 300.
- J. Forlizzi and K. Battarbee, "Understanding experience in interactive systems," in Proceedings of the 5th conference on Designing interactive systems: processes, practices, methods, and techniques, ed, 2004, pp. 261-268.
- W. Albert and T. Tullis, Measuring the user experience: collecting, analyzing, and presenting usability metrics: Newnes, 2013.
- N. Bevan, "Classifying and selecting UX and usability measures," in International Workshop on Meaningful Measures: Valid Useful User Experience Measurement, 2008, pp. 13-18.
- R. W. Picard, "Affective Computing for HCI," in HCI (1), 1999, pp. 829-833.
- F. N. Egger, "Affective design of e-commerce user interfaces: How to maximise perceived trustworthiness," in Proc. Intl. Conf. Affective Human Factors Design, 2001, pp. 317-324.
- D. A. Norman, Emotional design: Why we love (or hate) everyday things: Basic books, 2004.
- H. M. Khalid and M. G. Helander, "Customer emotional needs in product design," Concurrent Engineering, vol. 14, pp. 197-206, 2006.
- S. Baurley, "Interactive and experiential design in smart textile products and applications," Personal and Ubiquitous Computing, vol. 8, pp. 274-281, 2004.
- P. M. Tsang and S. Tse, "A hedonic model for effective web marketing: an empirical examination," Industrial Management & Data Systems, vol. 105, pp. 1039-1052, 2005.
- M. G. Helander, "Hedonomics-affective human factors design," in Proceedings of the Human Factors and Ergonomics Society Annual Meeting, 2002, pp. 978-982.
- T. Lavie and N. Tractinsky, "Assessing dimensions of perceived visual aesthetics of web sites," International journal of human-computer studies, vol. 60, pp. 269-298, 2004.
- N. Jakob and N. Don, "The Definition of User Experience."
- M. Hassenzahl and N. Tractinsky, "User experience-a research agenda," Behaviour & Information Technology, vol. 25, pp. 91-97, 2006.
- L. Alben, "Quality of Experience, Interactions," 1996.
- International Organization for Standardization, Ergonomics of Human-system Interaction: Part 210: Human-centred Design for Interactive Systems: ISO, 2010. Computer Science & Information Technology (CS & IT) 57
- N. Bevan, "Measuring usability as quality of use," Software Quality Journal, vol. 4, pp. 115-130, 1995.
- B. Shackel, "The concept of usability," Visual display terminals: usability issues and health concerns, pp. 45-87, 1984.
- J. Radatz, A. Geraci, and F. Katki, "IEEE standard glossary of software engineering terminology," IEEE Std, vol. 610121990, p. 121990, 1990.
- ISO/IEC 9126, "Information Technology, Software Product Evaluation, Quality Characteristics and Guidelines for their Use," Geneva, Switzerland: International Organization for Standardization., 1991.
- J. Preece, Y. Rogers, H. Sharp, D. Benyon, S. Holland, and T. Carey, Human-computer interaction: Addison-Wesley Longman Ltd., 1994.
- ISO 9241-11, "Ergonomic Requirements for Office Work with Visual Display Terminals (VDTs), Part 11: Guidance on Usability," Geneva, Switzerland: International Organization for Standardization., 1998.
- K. Majrashi and M. Hamilton, User Experience of University Websites: LAP Lambert Academic Publishing, 2014.
- N. Jakob and N. Don, "Mental Models," 2010. REFERENCES
- Gulmire, K. and Ganorkar, S., (2012), "Iris recognition using Gabor wavelet." International Journal of Engineering, Vol. 1, No. 5.
- Masek, L., "Recognition of human iris patterns for biometric identification." PhD thesis.
- Ma, L., Tan, T., Wang, Y. and Zhang, D., (2003) "Personal identification based on iris texture analysis." Pattern Analysis and Machine Intelligence, IEEE Transactions on, Vol. 25, No. 12, pp 1519-1533.
- Daugman, J., (2004), "How iris recognition works." Circuits and Systems for Video Technology, IEEE Transactions on, Vol. 14, No. 1, pp 21-30.
- Belcher, C., and Du, Y. (2008), "A selective feature information approach for iris image-quality measure". Information Forensics and Security, IEEE Transactions on, pp572-577.
- Tabassi, E., (2009), "Biometric Quality Standards" , NIST, Biometric Consortium.,
- Fatukasi, O., Kittler, J., and Poh, N., (2007), "Quality controlled multi-modal fusion of biometric experts.", In Progress in Pattern Recognition, Image Analysis and Applications, pp 881-890.
- Kalka,N. D., Dorairaj, V., Shah,Y. N., Schmid, N. A. and Cukic B.,( 2002), " Image quality assessment for iris biometric." , In Proceedings of the 24th Annual Meeting of the Gesellscha it Klassikation, pp 445-452. Springer.
- Makinana, S., Malumedzha, T., Nelwamondo, F.V, (2014)" Iris Image Quality Assessment Based on Quality Parameters", Proceedings of the 6th Asian Conference on Intelligent Information and Database Systems Part I Lecture Notes in Artificial Intelligence, pp571-580. Springer,
- Kalka, N. D. and Zuo, J. and Schmid, N. A. and Cukic, B., (2006), "Image quality assessment for iris biometric", Defense and Security Symposium, International Society for Optics and Photonics, pp62020D-62020D
- Crete, F., Dolmiere, T., Ladret, P. and Nicolas, M., (2007)," The blur effect: perception and estimation with a new no-reference perceptual blur metric.", Human Vision and Electronic Image in XII, pp6492:64920I.
- Sandre, S-L and Stevens, M. and Mappes, J., (2010), The effect of predator appetite, prey warning coloration and luminance on predator foraging decisions, Behaviour, vol.147, No. 9., 1121-1143, BRILL.
- Du, Y. and Belcher, C. and Zhou, Z. and Ives, R., (2010)," Feature correlation evaluation approach for iris feature quality measure", Signal processing, Vol. 90, No. 4, pp1176-1187, Elsevier.
- Nill, N. B, (2007), "IQF (Image Quality of Fingerprint) Software Application," The MITRE Corporation,
- Bieroza, M. and Baker, A. and Bridgeman, J., (2011),"Classification and calibration of organic matter fluorescence data with multiway analysis methods and artificial neural networks: an operational tool for improved drinking water treatment, "Environmetrics, Vol. 22, No.3, pp256-270, Wiley Online Library.
- Jeong, D. H. and Ziemkiewicz, C. and Ribarsky, W. and Chang, R. and Center, C. V., (2009), "Understanding Principal Component Analysis Using a Visual Analytics Tool," Charlotte Visualization Center, UNC Charlotte, 2009
- Suhr, D. D., (2005), "Principal component analysis vs. exploratory factor analysis," SUGI 30 Proceedings, pp 203-230.
- Proena, H. and Alexandre, L.A., (2005), "UBIRIS: A noisy iris image database," International Conference on Image Analysis and Processing.
- Chinese Academy of Sciences Institute of Automation., (2012), "CASIA Iris Database, Online:" http://http://biometrics.idealtest.org/dbDetailForUser.do?id=4.
- Mann, W.C. and Thompson, S.A., ``Rhetorical Structure Theory: Towards a Functional Theory of Text Organization'', Text, 8(3), pp.243-281, 1988.
- Carlson, L., Marcu, D. and Okurowski, M.E., ``RST Discourse Treebank'', Linguistic Data Consortium 1-58563-223-6, 2002.
- Webber, B.L., Knott, A., Stone, M. and Joshi, A., ``Anaphora and Discourse Structure'', Computational Linguistics 29 (4), pp. 545-588, 2003.
- Radev, D.R., ``A Common Theory of Information Fusion from Multiple Text Source Step One: Cross-Document'', In Proc. of 1st ACL SIGDIAL Workshop on Discourse and Dialogue, Hong Kong, 2000.
- Radev, D.R., Otterbacher, J. and Zhang, Z., CSTBank: Cross-document Structure Theory Bank, http://tangra.si.umich.edu/clair/CSTBank/phase1.htm, 2003.
- Wolf, F., Gibson, E., Fisher, A. and Knight, M.,``DiscourseGraphbank'', Linguistic Data Consortium, Philadelphia, 2005.
- Marcu, D., ``From Discourse Structures to Text Summaries'', In Proc. of the Association for Computational Linguistics (ACL) on Intelligent Scalable Text Summarization, pp. 82-88, 1997.
- Zhang, Z., Blair-Goldensohn, S. and Radev, D.R., ``Towards CST-enhanced Summarization'', In Proc. of the 18th National Conference on Artificial Intelligence (AAAI) , 2002.
- Radev, D.R., Jing, H., Stys, M., Tam, D., ``Centroid-based Summarization of Multiple Documents'', Information Processing and Management 40, pp. 919-938, 2004.
- Uzeda, V.R., Pardo, T.A.S., Nunes, M.G.V.,''A Comprehensive Summary Informativeness Evaluation for RST-based Summarization Methods'', International Journal of Computer Information Systems and Industrial Management Applications (IJCISIM) ISSN: 2150-7988 Vol.1, pp.188-196, 2009.
- Jorge, M.L.C and Pardo, T.S., ``Experiments with CST-based Multi-document Summarization'', Workshop on Graph-based Methods for Natural Language Processing, Association for Computational Linguistics (ACL), pp. 74-82, 2010.
- Louis, A., Joshi, A., and Nenkova, A., ``Discourse Indicators for Content Selection in Summarization'', In Proc. of 11th Annual Meeting of the Special Interest Group on Discourse and Dialogue (SIGDIAL), pp. 147-156, 2010.
- Litkowski, K., ``CL Research Experiments in TREC-10 Question Answering'', The10th Text Retrieval Conference (TREC 2001). NIST Special Publication, pp. 200-250, 2002.
- Verberne, S., Boves, L., and Oostdijk, N., ``Discourse-based Answering of Why-Questions'', TraitementAutomatique des Langues, special issue on Computational Approaches to Discourse and Document Processing, pp. 21-41, 2007.
- Theune, M., ``Contrast in Concept-to-speech Generation'', Computer Speech and Language,16(3-4), ISSN 0885-2308, pp. 491-530, 2002.
- Piwek, P. and Stoyanchev, S., `` Generating Expository Dialogue from Monologue Motivation, Corpus and Preliminary Rules'', In Proc. of 11th Annual Conference of the North American Chapter of the Association for Computational Linguistics (NAACL), 2010.
- McQueen, J., ``Some Methods for Classification and Analysis of Multivariate Observations'', In Proc. of the 5th Berkeley Symposium on Mathematical Statistics and Probability, pp. 281-297, 1967.
- Dunn, J.C., ``A Fuzzy Relative of the ISODATA Process and its Use in Detecting Compact Well- Separated Clusters'', Journal of Cybernetics, pp. 32-57, 1973.
- Johnson, S.C., ``Hierarchical Clustering Schemes'', Psychometrika, pp. 241-254, 1967.
- D'andrade, R.,``U-Statistic Hierarchical Clustering'',Psychometrika, pp.58-67, 1978.
- Ng, A. Y., Jordan,M. I., and Weiss, Y., ``On Spectral Clustering: Analysis and an Algorithm'', In Proc. of Advances in Neural Information Processing Systems (NIPS 14), 2002.
- Hartigan, J. A., Wong, M. A.,``Algorithm AS 136: A K-Means Clustering Algorithm'', Journal of the Royal Statistical Society, Series C (Applied Statistics) 28 (1), pp. 100-108, 1979.
- Hamerly, G. and Elkan, C. ,``Alternatives to the K-means Algorithm that Find Better Clusterings'', In Proc. of the 11th International Conference on Information and Knowledge Management (CIKM), 2002.
- Bezdek, J.C., ``Pattern Recognition with Fuzzy Objective Function Algoritms'', Plenum Press, New York, 1981.
- McKeown,K., Klavans,J., Hatzivassiloglou,V., Barzilay,R. and Eskin, E., `` Towards Multi-document Summarization by Reformulation: Progress and prospects'', In Proc. of the 16th National Conference of the American Association for Artificial Intelligence (AAAI), pp. 453-460, 1999.
- Marcu,D., and Gerber, L.,`` An Inquiry into the Nature of Multidocument Abstracts, Extracts, and their Evaluation'', In Proc. of Annual Conference of the North American Chapter of the Association for Computational Linguistics (NAACL), Workshop on Automatic Summarization, pp. 1-8, 2001.
- Hardy,H., Shimizu,N., Strzalkowski,T., Ting,L., Wise,G.B., and Zhang,X.,`` Cross-document Summarization by Concept Classification'', In Proc. of the 25th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, pp. 121-128, 2002.
- Radev, D.R., Jing,H., and Budzikowska, M., ``Centroid-based Summarization of Multiple Documents: Sentence extraction, Utility-based Evaluation, and User Studies'', In ANLP/NAACL Workshop on Summarization, 2000.
- Carbonell,J.G. and Goldstein, J., `` The Use of MMR, Diversity-based Re-ranking for Reordering Documents and Producing Summaries,'' In Proc. of the 21st Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, pp. 335-336, 1998.
- Stein, G.C., Bagga, A. and Wise,G.B.,`` Multi-Document Summarization: Methodologies and Evaluations'', In Conference TALN, 2000.
- Hatzivassiloglou,V., Klavans,J., and Eskin, E.,`` Detecting Test Similarity Over Short Passages: Exploring Linguistic Feature Combinations via Machine Learning'', In Proc. of Conference on Empirical Methods in Natural Language Processing (EMNLP),1999.
- Hatzivassiloglou,V., Klavans,J., Holcombe,M.L., Barzilay,R., Kan,M-Y., and McKeown, K.R.,`` SimFinder: A Flexible Clustering Tool for Summarization'', In Proc. of Annual Conference of the North American Chapter of the Association for Computational Linguistics (NAACL), Workshop on Automatic Summarization, 2001.
- Cohen, W., `` Learning Trees and Rules with Set-valued Features'', In Proc. of the 14th National Conference on Artificial Intelligence (AAAI), 1996.
- Barzilay,R., Elhadad,N., and McKeown, R.K., ``Sentence Ordering in Multi-document Summarization'', In Proc. of the Human Language Technology Sarkar, K., ``Sentence Clustering- based Summarization of Multiple Text Documents'', TECHNIA -International Journal of Computing Science and Communication Technologies, VOL. 2, NO. 1, (ISSN 0974-3375), pp. 325-335,2009.
- Sarkar, K., ``Sentence Clustering-based Summarization of Multiple Text Documents'', TECHNIA - International Journal of Computing Science and Communication Technologies, VOL. 2, NO. 1, (ISSN 0974-3375), pp. 325-335,2009.
- Wan, X. and Yang, J., ``Multi-Document Summarization Using Cluster-Based Link Analysis'' , In Proc. of the 31st Annual International Conference on Research and Development in Information Retrieval (ACM SIGIR) Conference, pp. 299-306, 2008.
- Erkanand, G.andRadev,D.R., ``LexPageRank:Graph-based Lexical Centrality as Salience in Text Summarization'', Journal of Artificial Intelligence Research 22, pp.457-479, 2004.
- Mihalcea, R., and Tarau. P.,`` A language Independent Algorithm for Single and Multiple Document Summarization'', In Proc. of International Joint Conference on Natural Language Processing (IJCNLP), 2005.
- Wan, X. and Yang. J.,`` Improved Affinity Graph based Multi-document Summarization'', In Proc. of Annual Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies (HLT-NAACL), 2006.
- Otterbacher, J., Radev, D. and Luo, A.,``Revisions that Improve Cohesion in Multidocument Summaries: A Preliminary Study'',In Proc. of Conference on Association of Computer Linguistics (ACL), Workshop on Automatic Summarization, pp. 27-36,2002.
- Teufel, S. and Moens, M.,``Summarizing Scientific Articles: Experiments with Relevance and Rhetorical Structure'', Computational Linguistics 28(4): 409-445, 2002.
- Pardo, T.A.S. and Machado Rino, L.H., ``DMSumm: Review and Assessment'', In Proc. of Advances in Natural Language Processing, 3rd International Conference (PorTAL 2002), pp. 263-274,2002.
- Nik Adilah Hanin BintiZahri, Fumiyo Fukumoto, SuguruMatsuyoshi, ''Exploiting Discourse Relations between Sentences for Text Clustering'', In Proc. of 24th International Conference on Computational Linguistics (COLING 2012), Advances in Discourse Analysis and its Computational Aspects (ADACA) Workshop, pp. 17-31, December 2012, Mumbai, India.
- Vapnik, V. : The Nature of Statistical Learning Theory, Springer, 1995.
- Lin, D., ``PRINCIPAR-An Efficient, Broad-coverage, Principle-based Parser'', In Proc. of 15th International Conference on Computational Linguistics (COLING), pp.482-488, 1994.
- Finkel, J.R., Grenager, T. and Manning, C., ``Incorporating Non-local Information into Information Extraction Systems by Gibbs Sampling'', In Proc. of the 43rd Annual Meeting of the Association for Computational Linguistics (ACL), pp. 363-370, 2005.
- Buckland,L. & Dang, H.,Document Understanding Conference Website, http://duc.nist.gov/
- Kohavi, R. and Provost, F.,``Glossary of Terms'', Machine Learning 30, No.2-3, pp. 271-274, 1998.
- IBM SPSS Statistic Database, ``Cluster Evaluation Algorithm'' http://publib.boulder.ibm.com , 2011.
- Kaufman, L. and Rousseeuw, P., ``Finding Groups in Data: An Introduction to Cluster Analysis'', John Wiley and Sons, London. ISBN: 10: 0471878766, 1990
- Asseisah, M. S., Bahig, H. M., & Daoud, S. S., (2010) Interactive Visualization System for DES. Berlin Heidelberg: Springer-Verlag
- Catrambone, R. & Seay, A. F., (2002) "Using Animation to Help Students Learn Computer Algorithms," The Journal of the Human Factors and Ergonomics Society, vol. 44, pp. 495-511.
- Cattaneo, G., Santis, A. D., & Petrillo, U. F., (2008) "Visualization of cryptographic protocols with GRACE," Journal of Visual Languages and Computing, vol. 19 pp. 258-290.
- Holliday, M. A., (2003 ) "Animation of computer networking concepts," ACM Journal on Educational Resources in Computing (JERIC), vol. 3, pp. 1-26.
- Kazemi, N. & Azadegan, S., "IPsecLite: a tool for teaching security concepts," in SIGCSE '10 Proceedings of the 41st ACM technical symposium on Computer science education NY, USA, 2010.
- Kerren, A. & Stasko, J. T., (2002) "Algorithm animation," Software Visualization, LNCS 2269, pp. 1- 15.
- Schweitzer, D. & Brown, W., (2009) "Using Visualization to Teach Security," JCSC, vol. 24, pp. 143-150.
- Yuan, X., Vega, P., Qadah, Y., Archer, R., Yu, H., & Xu, J., (2010) "Visualization Tools for Teaching Computer Security," ACM Transactions on Computing Education, vol. 9, pp. 147-155.
- Taylor, B. & Azadegan, S., "Moving Beyond Security Tracks: Integrating Security in CS0 and CS1," in SIGCSE '08: Proceedings of the 39th SIGCSE technical symposium on Computer science education, 2008, pp. 320-324.
- CC2008, "Computer Science 2008, An Interim Revision of CS 2001."
- Bishop, M. & Frincke, D., (2005) "Teaching Secure Programming," IEEE Security and Privacy, vol. 3, pp. 54-56.
- Hoglund, G. & McGraw, G., (2004) Exploiting Software:How to Break Code. Boston: Addison- Wesley.
- Howard, M. & LeBlanc, D., (2003) Writing Secure Code. Redmund, WA: Microsoft Press.
- Stallings, W., (2006) Cryptography and Network Security: Principles and Practices, 4 ed. Upper Saddle River, NJ: Prentice Hall.
- Forouzan, B. A., (2008) Cryptography and Network Security, 1 ed. New York, NY: McGraw-Hill Higher Education.
- Deutsche, A., "CrypTool," 2009.
- Yuan, X., Qadah, Y., Xu, J., Yu, H., Archer, R., & Chu, B., (2007) "An animated learning tool for Kerberos authentication architecture," Journal of Computing Sciences in Colleges, the twelfth annual CCSC Northeastern Conference, vol. 22, pp. 147 -155.
- Hamey, L. G. C., "Teaching Secure Communication Protocols Using a Game Representation," in Australasian Computing Education Conference (ACE2003), Adelaide, Australia, 2002.
- Schweitzer, D., Baird, L., Collins, M., Brown, W., & Sherman, M., "GRASP: a visualization tool for teaching security protocols," in the Tenth Colloquium for Information Systems Security Education, Adelphi, MD, 2006, pp. 1-7.
- Eckert, C., Clausius, T., Esslinger, B., Schneider, J., & Koy, H., "CrypTool," 2003.
- Esslinger, B., "The CrypTool Script: Cryptography, Mathematics, and More," 10 ed: Frankfurt am Main, Germany, 2010.
- Mayouf, M. A. & Shukur, Z., (2008) "Animation of Natural Language Specifications of Authentication Protocol," Journal of Computer Science, vol. 4, pp. 503-508
- Mayouf, M. A. & Shukur, Z., (2009) "Using Animation in Active Learning Tool to Detect Possible Attacks in Cryptographic Protocols," LNCS 5857, pp. 510-520.
- Kehoe, C., Stasko, J., & Taylor, A., (2001) "Rethinking the evaluation of algorithm animations as learning aids: an observational study," International Journal of Human Computer Studies, vol. 54, pp. 265-284.
- Hundhausen, C. D., Douglas, S. A., & Stasko, A. T., (2002) "A meta-study of algorithm visualization effectiveness," Journal of Visual Languages and Computing, vol. 13, pp. 259-290.
- Pallant, J., ( 2010) SPSS Survival Manual: A step by step guide to data analysis using SPSS. Berkshire UK: McGraw-Hill Education.
- Hansen, S. R., Narayanan, N. H., & Douglas, S., (2000) "Helping Learners Visualize and Comprehend Algorithms Interactive Multimedia Electronic " Interactive Multimedia Electronic Journal of Computer-Enhanced Learning, vol. 2, REFERENCES
- Kroll Ontrack, 'Understanding Data Loss'. [Online]. Available: http://www.ontrackdatarecovery.com.au/understanding-data-loss/. [Accessed: 23-Sep-2014].
- M. Foster, 'Save your business with data backup', NetSource Technologies. [Online]. Available: http://www.netsourceinc.com/blog/save-your-business-with-data-backup. [Accessed: 23-Sep-2014].
- Kroll Ontrack, 'Kroll Ontrack study reveals 40 percent of companies lose data annually from their virtual environments', 2013. [Online]. Available: http://www.krollontrack.com/company/news- releases/?getPressRelease=62077. [Accessed: 23-Sep-2014].
- C. Chang, 'A Survey of Data Protection Technologies', 2005 IEEE International Conference on Electro Information Technology, p. 6, 2005.
- M. Dutch, A Data Protection Taxonomy. The Storage Networking Industry Association, 2010, p. 20.
- R. Natarajan, 'RAID 0, RAID 1, RAID 5, RAID 10 Explained with Diagrams', The Geek Stuff, 2010. [Online]. Available: http://www.thegeekstuff.com/2010/08/raid-levels-tutorial/. [Accessed: 23-Sep- 2014].
- M. Staimer, 'Backup in a snap: A guide to snapshot technologies', Storage Technology Magazine, 2009. [Online]. Available: http://searchstorage.techtarget.com/magazineContent/Backup-in-a-snap-A- guide-to-snapshot-technologies. [Accessed: 23-Sep-2014].
- StoneFly, 'Exploring Storage Snapshot technology'. [Online]. Available: http://www.iscsi.com/resources/Storage-Snapshot-Technology.asp. [Accessed: 23-Sep-2014].
- D. Bradbury, 'Remote replication: Comparing data replication methods', ComputerWeekly, 2011. [Online]. Available: http://www.computerweekly.com/feature/Remote-replication-Comparing-data- replication-methods. [Accessed: 23-Sep-2014].
- A. Chervenak, V. Vellanki and Z. Kurmas, 'Protecting file systems: A survey of backup techniques', in Joint NASA and IEEE Mass Storage Conference, 1998.
- P. Dorion, 'Backup vs. archive', Search Data Backup, 2008. [Online]. Available: http://searchdatabackup.techtarget.com/tip/Backup-vs-archive. [Accessed: 23-Sep-2014].
- H. Garcia-Molina, C. Polyzois and R. Hagmann, in Compcon Spring '90. Intellectual Leverage. Digest of Papers. Thirty-Fifth IEEE Computer Society International Conference, 1990, pp. 573-577.
- L. Black, 'The Importance of Data Backup', The Livingston Business Journal, 2014. [Online]. Available: http://www.livingstonbusiness.com/2014/07/20/the-importance-of-data-backup/. [Accessed: 23-Sep-2014].
- Software Testing Class, 'What is Difference Between Two-Tier and Three-Tier Architecture?', 2013. [Online]. Available: http://www.softwaretestingclass.com/what-is-difference-between-two-tier-and- three-tier-architecture/. [Accessed: 23-Sep-2014].
- REFERENCES
- E-learning Systems, http://www.bapsis.com/elearningsystems.htm, [On-line; accessed 19-September- 2014].
- Craciunas, S. & Elsek, I, (2009) The standard model of an e-learning platform, Bucharest, Romania, (Chapter 2).
- Dobre, I., (2010) Critical Study of the present e-learning systems, Academia Romana, Romania, (Chapter 2).
- Edgar, R. W., (2005) Security in e-learning, Springer. Vienna University of Technology, Austria, (Chapter 1).
- Iacob, N., (2010). Data replication in distributed environments, Proceedings of International Scientific Conference ECO-TREND: Brancusi University Targu Jiu, 629-634.
- Jalal, A. & Ahmad, M., (2008). Security Enhancement for E-Learning Portal, Proceedinggs of International Journal of Computer Science and Network Security, Department of Computer Science City University, Peshawar, Pakistan, 41-45.
- Kritzinger, E. & Solms S., (2006). E-learning: Incorporating Information Security Governance, Proceeding of Informing Science and IT Education Conference, Salford (Greater Manchester), England, 319-325.
- Kumar, S. & Kamlesh, D., (2011). Investigation on Security in LMS Moodle, Proceedinggs of International Journal of Information Technology and Knowledge Management, Kurukshetra University, Kurukshetra, India, 233-238.
- Przemek, S. (2007), PHP Session Security, Poland, (Chapter 1).
- Smeureanu, I. & Isaila, N, The Knowledge Transfer Through E-Learning in Business Environment, Economy Informatics, 97-98.
- Alhawiti, K., (2014)"Adaptive Models of Arabic Text", PhD Dissertation, Bangor University.
- Behr F. H., Fossum V., Mitzenmacher M., Xiao D., (2003)"Estimating and Comparing Entropy across Written Natural Languages Using PPM Compression", Proceedings of Data Compression Conference, p416.
- Brown, P., Della Pieta, S., Della Pieta, V., Mercer, R., (1993)"The Mathematics of Machine Translation: Parameter Estimation", Computational Linguistics, Vol. 19, pp263-312.
- Cleary, J. G. & Witten, I. H., (1984)"Data Compression Using Adaptive Coding and Partial String Matching",IEEE Transactions on Communications, Vol. 32, No. 4, pp396-402.
- Fantechi, A., Gnesi, S., Carenini, M., Vanocchi, M., Moreschini, P., (1994)"Assisting Requirement Formalization by Means of Natural Language Translation", Formal Methods in System Design, Vol. 4, No. 3, pp243-263.
- Gale, W.A. & Church, K.W., (1993)"A Program for Aligning Sentences in Bilingual Corpora",ACL'93 29th Annual Meeting, pp177-184.
- Haruno, M. & Yamazaki, T., (1996)"High-performance Bilingual Text Alignment Using Statistical and Dictionary Information", Proceedings of the 34th Annual Meeting of Association for Computational Linguistics, pp131-138.
- Hutchins, W.J.,(1994) "The Encyclopaedia of Languages and Linguistics", ed. R.E.Asher, Oxford: Pergamon Press, Vol. 5, pp2322-2332.
- Kay, M. & Röscheisen, M., (1993)"Text-translation Alignment",Computational Linguistics,Vol. 19, pp121-142.
- Khadivi, S. & Ney, H., (2005)"Automatic Filtering of Bilingual Corpora for Statistical Machine Translation",Natural Language Processing and Information Systems, Vol. 3513, pp263-274.
- Kutuzov, A., (2013)"Improving English-Russian Sentence Alignment through POS Tagging and Damerau-Levenshte in Distance",Association for Computational Linguistics, pp63-68.
- Linguistic Data Consortium, http://catalog.ldc.upenn.edu
- Liu, W., Chang, Z., Teahan, W., (2014)"Experiments with Compression-based Methods for English- Chinese Sentence Alignment",2nd International Conference on Statistical Language and Speech Processing,pp70-81.
- Melamed, I.D., (2000)"Models of Translational Equivalence among Words",Computational Linguistics, Vol. 26, No. 2, pp221-249.
- Mubarak, H., Darwish, K., Adly, N., (2014)"Using Twitter to Collect a Multi-Dialectal Corpus of Arabic",EMNLP 2014 Workshop on Arabic Natural Language Processing.
- Mújdricza-Maydt, É., Körkel-Qu, H., Riezler, S., Padó, S., (2013)"High-Precision Sentence Alignment by Bootstrapping from Wood Standard Annotations",The Prague Bulletin of Mathematical Linguistics, Vol. 99, pp5-16.
- Papageorgiou, H., Cranias, L., Piperidis, S., (1994) "Automatic Alignment in Corpora",Proceedings of 32nd Annual Meeting of Association of Computational Linguistic, pp334-336.
- Shannon, C.E., (1948)"A Mathematical Theory of Communication", Bell System Technical Journal, Vol. 27, pp379-423 &pp623-656.
- Computer Science & Information Technology (CS & IT) 139
- Simard, M., Foster, G.F., Isabelle, P., (1992) "Using Cognates to Align Sentences in Bilingual Corpora",Proceedings of the Fourth International Conference on Theoretical and Methodological Issues in Machine Translation (TMI), pp67-81.
- Teahan, W., (1998)"Modelling English Text",PhD Dissertation, University of Waikato, New Zealand.
- Wu, D., (1994)"Aligning a Parallel English-Chinese Corpus Statistically with Lexical Criteria",ACL'94 32nd Annual Meeting, pp80-87.
- Yu, Q., Max, A., Yvon, F., (2012)"Revisiting Sentence Alignment Algorithms for Alignment Visualization and Evaluation",LREC Workshop, pp10-16.
- Dhinaharan Nagamalai et al. (Eds) : CCSEA, DKMP, AIFU, SEA -2015 pp. 141-154, 2015. © CS & IT-CSCP 2015 DOI : 10.5121/csit.2015.50212
- Lee, Sung-Ju, and Mario Gerla. "AODV-BR: Backup routing in ad hoc networks." Wireless Communications and Networking Confernce, 2000. WCNC. 2000 IEEE. Vol. 3. IEEE, 2000.
- Ding, Ding, Liu Fangai, Li Qianqian, and Yang Guangxu. "An Improved Clustering Algorithm Based on Backup Path." Advances in Information Sciences & Service Sciences 4, no. 8 (2012).
- Zhang, Jie, Choong Kyo Jeong, Goo Yeon Lee, and Hwa Jong Kim. "Cluster-based multi-path routing algorithm for multi-hop wireless network." Future Generation Communication and Networking 1 (2007): 67-75.
- Heinzelman, Wendi Rabiner, Anantha Chandrakasan, and Hari Balakrishnan. "Energy-efficient communication protocol for wireless microsensor networks (LEACH) "System Sciences, 2000. Proceedings of the 33rd Annual Hawaii International Conference on. IEEE, 2000.
- Younis, Mohamed, Moustafa Youssef, and Khaled Arisha. "Energy-aware routing in cluster-based sensor networks." Modeling, Analysis and Simulation of Computer and Telecommunications Systems, 2002. MASCOTS 2002. Proceedings. 10th IEEE International Symposium on. IEEE, 2002.
- Pantazis, Nikolaos A., Stefanos A. Nikolidakis, and Dimitrios D. Vergados. "Energy-efficient routing protocols in wireless sensor networks: A survey."Communications Surveys & Tutorials, IEEE 15.2 (2013): 551-591.
- Perera, Charith, Arkady Zaslavsky, Peter Christen, and Dimitrios Georgakopoulos. "Context aware computing for the internet of things: A survey."Communications Surveys & Tutorials, IEEE 16, no. 1 (2014): 414-454.
- Midha, Surabhi, Ajay K. Sharma, and Geeta Sikka. "A survey on wireless sensor network clustering protocols optimized via game theory." ACM SIGBED Review 11.3 (2014): 8-18.
- Alghanmi Ali, and ChongGun Kim. "Energy efficient load balanced routing protocol for wireless sensor networks." Computer Science (2014).
- Alam, M. G. R., Cho, E. J., Huh, E. N., & Hong, C. S. (2014, January). Cloud based mental state monitoring system for suicide risk reconnaissance using wearable bio-sensors. In Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication (p. 56). ACM.
- Mary Wu, YoungSeok Jung, Chonggun Kim, "The effects of central leader and candidates in Ad Hoc Networks", Information-An International Interdisciplinary Journal, Vol. 14, pp. 3601-3609, 2011.
- Mary Wu, InTaek Leem, Jason J. Jung and ChongGun Kim, "A Resource Reuse Method in Cluster Sensor Networks in Ad Hoc Networks," Intelligent Information and Database Systems, Lecture Notes in Computer Science, Volume 7197/2012, 40-50, 2012.
- Ahmed, Mohammad Helal Uddin, Alam Md Golam Rabiul, Kamal Rossi, Hong Choong Seon, and Sungwon Lee. "Smart grid cooperative communication with smart relay." Journal of Communications and Networks 14, no. 6 (2012): 640-652.
- Mary Wu, Chonggun Kim, "A cost matrix agent for shortest path routing in ad hoc networks," Journal of Network and Computer Applications, 33, 646-652, 2010.
- Mary Wu, SeongGwon Cheon, Chonggun Kim, "A Central Leader Election Method using the Distance Matrix in Ad Hoc Networks", New Challenges for Intelligent Information and Database Systems, Vol. 351, pp. 107-116, 2011.
- Alam, Md, Golam Rabiul, Chayan Biswas, Naushin Nower, and Mohammed Shafiul Alam Khan. "A Reliable Semi-Distributed Load Balancing Architecture of Heterogeneous Wireless etworks." arXiv preprint arXiv:1202.1918 (2012).
- Mary Wu, Byungchul Ahn, ChongGun Kim, "A Channel Reuse Procedure in Clustering Sensor Networks, " Applied Mechanics and Materials V.284-287 pp.1981-1985.
- Jaime Lloret, "Underwater Sensor Nodes and Networks", Sensors 2013, 13(9), 11782-11796
- Faezeh Arab Hassani, Yoshishige Tsuchiya and Hiroshi Mizuta, "In-Plane Resonant Nano-Electro- Mechanical Sensors: A Comprehensive Study on Design, Fabrication and Characterization Challenges", Sensors 2013, 13(7), 9364-9387.
- Fang, Shifeng, Li Da Xu, Yunqiang Zhu, Jiaerheng Ahati, Huan Pei, Jianwu Yan, and Zhihui Liu. "An Integrated System for Regional Environmental Monitoring and Management Based on Internet of Things." IEEE Trans. Industrial Informatics 10, no. 2 (2014): 1596-1605.
- Chang,, L. Tassiulas, "Energy Conserving Routing in Wireless Ad-Hoc Networks," In Proc. International Conference on Computer Communications, Tel-Aviv, Israel, 2000, pp. 22-31.
- Zhang, Jie, Choong Kyo Jeong, Goo Yeon Lee, and Hwa Jong Kim. "Cluster-based multi-path routing algorithm for multi-hop wireless network." Future Generation Communication and Networking 1 (2007): 67-75.
- Dhinaharan Nagamalai et al. (Eds) : CCSEA, DKMP, AIFU, SEA -2015 pp. 155-162, 2015. © CS & IT-CSCP 2015 DOI : 10.5121/csit.2015.50213
- R. Grishman & B. Sundheim (1996) "Message Understanding Conference-6: A Brief History", In Proceedings of 16th International Conference on Computational Linguistics, pp. 466-471.
- D. Nadeau & S. Sekine (2007) "A Survey of Named Entity Recognition and Classification", Linguisticae Investigationes, 30(1):3-26.
- A. Ritter et al. (2011) "Named Entity Recognition in Tweets: An Experimental Study", In Proceedings of the Conference on Empirical Methods in Natural Language Processing, pp. 1524- 1534.
- J. R. Finkel et al. (2005) "Incorporating Non-local Information into Information Extraction Systems by Gibbs Sampling", In Proceedings of the 43rd Annual Meeting of the Association for Computational Linguistics, pp. 363-370.
- R. Yeniterzi (2011) "Exploiting Morphology in Turkish Named Entity Recognition System", In Proceedings of the ACL 2011 Student Session, pp. 105-110.
- G. A. Şeker & G. Eryiğit (2012) "Initial Explorations on using CRFs for Turkish Named Entity Recognition", In Proceedings of the 24th International Conference on Computational Linguistics, pp. 2459-2474.
- S. Özkaya & B. Diri (2011) "Named Entity Recognition by Conditional Random Fields from Turkish Informal Texts" In Proceedings of the IEEE 19th Signal Processing and Communications Applications Conference, pp. 662-665.
- G. Tür et al. (2003) "A Statistical Information Extraction System for Turkish", Natural Language Engineering, vol. 9, pp. 181-210.
- O. Bayraktar & T. T. Temizel (2008) "Person Name Extraction From Turkish Financial News Text Using Local Grammar Based Approach", In 23rd International Symposium on Computer and Information Sciences.
- D. Küçük & A. Yazıcı (2009) "Named Entity Recognition Experiments on Turkish Texts" In Proceedings of the 8th International Conference on Flexible Query Answering Systems, pp. 524-535.
- D. Küçük & A. Yazıcı (2012) "A Hybrid Named Entity Recognizer for Turkish", Expert Systems With Applications, vol. 39, pp. 2733-2742.
- S. Tatar & İ. Çiçekli (2011) "Automatic Rule Learning Exploiting Morphological Features for Named Entity Recognition in Turkish", Journal of Information Sciences, vol. 37, pp. 137-151.
- G. Çelikkaya et al. (2013) "Named Entity Recognition on Real Data", In Proceedings of the 7th International Conference on Application Information and Communication Technologies, pp. 1-5.
- D. Küçük & R. Steinberger (2014) "Experiments to Improve Named Entity Recognition on Turkish Tweets", In Proceedings of the 5th Workshop on Language Analysis for Social Media, pp. 71-78.
- D. Ramage et al. (2009) "Labeled LDA: A Supervised Topic Model for Credit Attribution in Multi- labeled corpora", In Proceedings of the Conference on Empirical Methods in Natural Language Processing, vol. 1, pp. 248-256.
- X. Liu et al. (2011) "Recognizing Named Entities in Tweets", In Proceedings of the 49th Annual Meeting of the Association for Computational Linguistics, pp. 359-367.
- C. Li et al. (2012) "TwiNER: Named Entity Recognition in Targeted Twitter Stream", In Proceedings of the 35th International ACM SIGIR Conference on Research and Development in Information Retrieval, pp. 721-730.
- D. Oliveira et al. (2013) "FS-NER A Lightweight Filter-Stream Approach to Named Entity Recognition on Twitter Data", In Proceedings of the 22nd International Conference on World Wide Web Companion, pp. 597-604.
- K. Oflazer (1994) "Two-Level Description of Turkish Morphology", Literary and Linguistic Computing, vol. 9, pp. 137-148.
- H. Sak et al. (2008) "Turkish Language Resources: Morphological Parser, Morphological Disambiguator and Web Corpus", 6th International Conference on Natural Language Processing, vol. 5221, pp. 417-427.
- V. Levenshtein (1966) "Binar Codes Capable of Correcting Deletions, Insertions, and Revelsals", Soviet Physics Doklady, vol. 10, pp. 707-710.
- E. F. Tjong Kim Sang & J. Veenstra (1999) "Representing Texting Chunks", In Proceedings of the 7th Conference of the European Association for Computational Linguistics, pp. 173-179.
- Dhinaharan Nagamalai et al. (Eds) : CCSEA, DKMP, AIFU, SEA -2015 pp. 163-173, 2015. © CS & IT-CSCP 2015 DOI : 10.5121/csit.2015.50214
- Jiawei Han and MichelineKamber, "Data Mining Concepts and Techniques, 2/e", Morgan Kaufmann Publishers, An imprint of Elsevier, 2010.
- C.F. Chien and L.F. Chen, "Data mining to improve personnel selection and enhance human capital: A case study in high-technology industry", Expert Systems and Applications, vol. 34, 2008, pp. 280- 290.
- HamidahJantan et al, "Human Talent Prediction in HRM using C4.5 Classification Algorithm", (IJCSE) International Journal on Computer Science and Engineering Vol. 02, No. 08, 2010, pp. 2526- 2534.
- Suma.V, Pushpavathi T.P, and Ramaswamy. V, "An Approach to Predict Software Project Success by Data Mining Clustering", International Conference on Data Mining and Computer Engineering (ICDMCE'2012), pp. 185-190.
- P. Singh, Comparing the effectiveness of machine learning algorithms for defect prediction, International Journal of Information Technology and Knowledge Management, 2009, pp. 481-483.
- J. R. Quinlan, "Introduction of decision tree", Journal of Machine learning, 1986, pp. 81-106.
- Witten I. Frank E., and Hall M., "Data Mining: Practical Machine Learning Tools and Techniques", 3rd Edition, Morgan Kaufmann Publishers, 2011.
- A. Kusiak, J. A. Kern, K. H. Kernstine, and B. Tseng, "Autonomous decision-making: A data mining approach," IEEE Trans. Inform. Technol. Biomedicine, vol. 4, no. 4, pp. 274-284, Aug. 2000.
- A. S. Chang, &Leu, S.S., "Data mining model for identifying project profitability variables," International Journal of Project Management, vol. 24, pp. 199-206, 2006.
- T. R. Gopalakrishnan Nair, V. Suma, Pranesh Kumar Tiwari," Analysis of Test Efficiency during Software Development Process",2nd Annual International Conference on Software Engineering and Applications (SEA 2011)
- J. R. Quinlan, "C4.5: Programs for Machine Learning", Morgan Kaufmann Publishers, Inc, 1992.
- OdedMaimon, LiorRokach, "The Data Mining and Knowledge Discovery Handbook", Springer publication,2005.
- Sangita Gupta , Suma V, " Empirical study on selection of team members for software project-A data mining approach" , International Journal of Computer Science and Informatics, ISSN (PRINT): 2231 -5292, Vol 3, no 2, 2013,pp 97-102.Sangita Gupta, Suma V: Prediction of Human Performance Capability during Software Development using Classification. ICT and Critical Infrastructure: REFERENCES
- Abass, F., Hayat, M., Shahzad, A., & Riaz, A. (2011). Analysis of Knowledge Management in the Public Sector of Pakistan. European Journal of Social Sciences, 19, (4), 471-478.
- Abokhodiar, E. S. (2013). Knowledge management implementation at the Women's Branch of the Institute of Public Administration in Saudi Arabia: A Proposed Model. Excellence in Higher Education, 4: 119-128
- Bouthillier, F. & Shearer, K. (2002). Understanding knowledge management and information management: the need for an empirical perspective. Information Research, 8(1).
- Chumjit, S. (2012). Knowledge management in higher education in Thailand. ProQuest, UMI Dissertations Publishing.
- Domingue, J. & Motta, E. (1999). A knowledge-based news server supporting ontology-driven story enrichment and knowledge retrieval. In Proceedings of the 11th European Workshop on Knowledge Acquisition, Modeling, and Management (EKAW 1999), Dagstuhl Castle, Germany, Springer- Verlag, Berlin, pp. 103-20.
- Firestone, J. M. (2001). Key Issues in Knowledge Management. Knowledge and Innovation. Journal of the KMCI, 1(3), 8-38.
- Herring, J. P. (1999). Key intelligence topics: a process to identify and define intelligence needs. Competitive Intelligence Review, 10(2), 4-14.
- Kidwell, J. J., Linde, K. M. V., & Johnson, S. L. (2000). Applying corporate knowledge management practices in higher education. Educause Quarterly, 4, 28-33.
- Laal, M. (2011). Knowledge management in higher education. Procedia Computer Science, 3, 544- 549.
- McGee, J. E. & Sawyer, O. O. (2003). Uncertainty and information search activities: A study of owner-managers of small high-technology manufacturing firms. Journal of Small Business Management, 41(4), 385-401.
- NHS National Library for Health. (2005). What is knowledge management? ABC of Knowledge Management; 1-68.
- Parker, K. R. & Nitse, P. S. (2001). Improving competitive intelligence gathering for knowledge management systems. In Proceedings of the 2001 International Symposium on Information Systems and Engineering -ISE'2001-Workshop: Knowledge Management Systems: Concepts, Technologies and Applications, Las Vegas, Nevada.
- Parker, K. R., Nitse, P. S., Flowers, K. A. (2005). Libraries as knowledge management centers. Library Management, 26(4/5), 176-189.
- Petrides, L. A. & Nodine, T. R. (2003). Knowledge management in education: Defining the landscape. Retrieved October 25, 2014, from: http://iskme.path.net/kmeducation.pdf
- Rowley, J. (2000). Is Higher Education Ready for Knowledge Management? The International Journal of Educational Management, 14(7), 325-333.
- Sadeh, T. & Walker, J. (2003). Library portals: toward the Semantic Web, New Library World, 104(1184/1185), 11-19.
- Yusoff, M. Y. M., Mahmood, A. K., & Jaafar, J. (2012). A Study of KM process and KM enabler in a Malaysian Community College. Journal of Knowledge Management Practice, 13(1). Retrieved October 24, 2014, from: http://www.tlainc.com/articl297.htm
- Knowledge Economic City. (2012). The New Gateway to Madinah. Retrieved December 12, 2014, from: http://www.madinahkec.com/en/project/kec
- Yaghi, K., & Zamzami, O. A. (2014). Obstacles of Implemeting Knowledge Management in the High Education Institutes -Saudi Arabia (Analytical study). International Multilingual Academic Journal, 1(1).
- Al-Hussain, A. Z., (2011). Barriers to Knowledge Management in Saudi Arabia. Unpublished Dissertation, The George Washington University, Proquest. 213 pages; 3481091. Ministry of Education. (2004). The Development of Education, 47th Session of the International Conference on Education, September 8-11, 2004, Geneva.
- Alsereihy, H. A., Alyoubi, B. A., & El-Emary, I. M. M. (2012). Effectiveness of Knowledge Management Strategies on Business Organizations in KSA: Critical Reviewing Study. Middle-East Journal of Scientific Research, 12 (2): 223-233.
- Omona, W., & Lubega, J. T. (2012). Enhancing Knowledge Management Using ICT in Higher Education: An Empirical Assessment, Journal of Knowledge Management Practice, 13(3).
- Gopal, V., & Shobha, K. (2012). Knowledge management in higher education. Asian Journal of Research in Social Sciences and Humanities, 2(8). Retrieved December 12, 2014, from: http://www.indianjournals.com/ijor.aspx?target=ijor:ajrssh&volume=2&issue=8&article=006
- Ramanigopal, C. (2012). Knowledge management strategies in higher education. International Journal of Advanced Research in Management (Ijarm), 3(1), pp. 20-29.
- Steyn, G.M. (2004), Harnessing the power of knowledge in higher education, Educational Development, 124(4), 615-630.
- N. Ben Amour. Qualitative Possibilistic Graphical models From Independence to propagation algorithm. PhD thesis, Université d'Artois, 2002.
- D. Dubois, J. Lang, and H. Prade. Possibilistic logic. In Handbook of Logic in Articial Intelligence and Logic Programming, (D. Gabbay et al., eds, 3, Oxford University Press :pages 439-513, 1994.
- D. Dubois, D. Le Berre, H. Prade, and R. Sabaddin. Using possibilistic logic for modeling qualitative decision: Atms based algorithms. In Fundamenta Informaticae, 37 :1-30, 1999.
- D. Dubois and H. Prade. (with the collaboration of H. Farreny, R. Martin-Clouaire and C. Testemale). Possibility Theory -An Approach to Computerized Processing of Uncertainty. Plenum Press, New York., 1988
- D. Dubois and H. Prade. Possibility theory and data fusion in poorly informed environments. In Control Engineering Practice, volume 2(5), pages 811823, 1994.
- D. Dubois and H. Prade. Possibility theory as a basis for qualitative decision theory. In 14th International Joint Conference on Artificial Intelligence (IJCAI'95), Montréal, pages 1924-1930, 1995.
- D. Dubois and H. Prade. Possibility theory: qualitative and quantitative aspects. In Handbook of Defeasible Reasoning and Uncertainty Management Systems. (D. Gabbay, Ph. Smets, eds.), Vol. 1: Quantified Representations of Uncertainty and Imprecision, (Ph. Smets, ed.) Kluwer, Dordrecht: 169- 226, 1998.
- F. Haned-Khellaf S. Benferhat and I. Zeddigha. Computing optimal optimistic decisions using min- based possibilistic networks. In North American Fuzzy Information Processing Society, Berkeley NAFIPS 2012, JUIN 2012.
- L. Garcia and R. Sabbadin. Diagrammes d'influence possibilistes. Revue d'Intelligence Artificielle, 21(4): 521-554, 2007.
- J. Gebhardt and R. Kruse. Background and perspectives of possibilistic graphical models. In 4th European Conference on Symbolic and Quantitative Approaches to Reasoning and Uncertainty (ECS- QARU'97), LNAI 2143, pages 108-121, 1997.
- A. Mokhtari S. Benferhat, F. Haned-Khellaf and I. Zeddigha. A possibilistic graphical model for handling decision problems under uncertainty. In 8th conference of the European Society for Fuzzy Logic and Technology, EUSFLAT-2013, September 2013.
- R. Sabbadin. Une approche logique de la résolution de problèmes de décision sous incertitude basée sur les atms. In Actes du 11ème Congrés Reconnaissance des Formes et Intelligence Artificielle (RFIA'98), Clermont-Ferrand, pages 391-400, 20-22 janvier 1998.
- P.P Shenoy. Valuation based systems: A framework for managing uncertainty in expert systems. In Fuzzy Logic for the Management of Uncertainty, pages 83104. L. A. Zadeh and J. Kacprzyk, Eds. John Wiley and Sons, New York, NY, 1992.
- P.P Shenoy. A comparison of graphical techniques for decision analysis. In European Journal of Operational Research, volume 78, pages 1-21, 1994.
- F.Titouna. Fusion de réseaux causaux possibilistes. PhD thesis, Université d'Artois, 2009.
- L. Zadeh. Fuzzy sets as a basis for a theory of possibility. Fuzzy Sets and Systems, 1 :3-28, 1978. Dhinaharan Nagamalai et al. (Eds) : CCSEA, DKMP, AIFU, SEA -2015 pp. 197-212, 2015. © CS & IT-CSCP 2015 DOI : 10.5121/csit.2015.50217
- Koller, D. & Friedman, N. (2009) Probabilistic Graphical Models, MIT Press.
- Mas-Colell, A., Whinston, M.D. & Green, J.R. (1995) Microeconomic Theory, Oxford University Press.
- Markowitz, H. (1952) 'Portfolio Selection', Journal of Finance, Vol. 7, No. 1.
- Ingersoll Jr., J.E. (1987) Theory of Financial Decision Making, Rowman and Littlefield.
- Benartzi, S. & Thaler, R.H. (2001) 'Naive diversification strategies in defined contribution saving plans', American Economic Review, 91(1), pp. 79-98.
- De Miguel, V., Garlappi, L. & Uppal, R. (2009) 'Optimal versus naive diversification: How inefficient is the portfolio strategy?', Review of Financial Studies, 22.
- LaViers, A., Rahmani, A. & Egerstedt, M. (2010) 'Dynamic Spectral Clustering', Proceedings of the 19th International Symposium on Mathematical Theory of Networks and Systems -MTNS 2010, July.
- Chi, Y., Song, X., Zhou, D., Hino, K. & Tseng, B.L. (2007) 'Evolutionary Spectral Clustering by Incorporating Temporal Smoothness', Proceedings of the 13th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, ACM, New York.
- Diaconis, P. & Shahshahani, M. (1981) 'Generating a Random Permutation with Random Transpositions', Zeitschrift für Wahrscheinlichkeitstheorie und Verwandte Gebiete, 57(2), pp 159-179. REFERENCES
- Bettenburg N, Shang W, Ibrahim W, et al. An Empirical Study on Inconsistent Changes to Code Clones at Release Level[C]//Proc. of the 2009 16th Working Conference on Reverse Engineering. IEEE Press, pp. 85-94, 2009.
- Zibran M F, Roy C K. The Road to Software Clone Management: A Survey[R], Technical Report 2012-03, The University of Saskatchewan, Canada, 2012, pp. 1-66.
- M. Kim, V. Sazawal, D. Notkin, and G. C. Murphy, "An Empirical Study of Code Clone Genealogies," Proc. ESEC-FSE, 2005, pp. 187-196.
- F. Rahman, C. Bird, P. Devanbu, "Clones: What is that Smell?," Proc. MSR, 2010, pp. 72-81.
- Bakota T, Ferenc R, Gyimothy T. Clone smells in Software evolution[C]//IEEE International Conference on Software Maintenance. Washington DC: IEEE Computer Society, 2007:24-33.
- Barbour L, Khomh F, Zou Y. Late propagation in software clones[C]//Proceedings of the 27th IEEE International Conference on Software Maintenance. Washington DC:IEEE Computer Society, 2011: 273-282.
- Gode N, Koschke R. Incremental Clone Detection[C]//Proceedings of the 2009 European Conference on Software Maintenance and Reengineering. Washington DC:IEEE Computer Society, 2009: 219-228.
- Saha R K, Roy C K, Schneider K A. An automatic framework for extracting and classifying near-miss clone genealogies[C]//Software Maintenance (ICSM), 2011 27th IEEE International Conference on. IEEE, 2011: 293-302.
- Duala-Ekoko E, Robillard M P. Tracking Code Clones in Evolving Software[C]//Proceedings of the 29th international conference on Software Engineering. Washington DC:IEEE Computer Society, 2007:158-167.
- C.X. Zhai, Statistical language models for information retrieval, Synthesis Lectures on Human Language Technologies 1 (1) (2008) 1-141.
- I. Porteous, D. Newman, A. Ihler, A. Asuncion, P. Smyth, M. Welling, Fast collapsed Gibbs sampling for latent Dirichlet allocation, in: Proceeding of the 14th International Conference on Knowledge Discovery and Data Mining, 2008, pp. 569-577.
- D.M. Blei, J.D. Lafferty, Topic models, in: Text Mining: Classification, Clustering, and Applications, Chapman & Hall, London, UK, 2009, pp. 71-94.
- Kuhn A, Ducasse S, Gírba T. Semantic clustering: Identifying topics in source code. Information and Software Technology, 2007, 49(3):230-243
- Thomas S W, Adams B, Hassan A E, et al. Studying software evolution using topic models[J]. Science of Computer Programming, 2012
- Asuncion H, Asuncion A, Taylor R. Software traceability with topic modeling.32nd ACM/IEEE International Conference on Software Engineering (ICSE). 2010:95-104
- Tian K, Revelle M, Poshyvanyk D. Using Latent Dirichlet Allocation for automatic categorization of software. 6th IEEE International Working Conference on Mining Software Repositories (MSR). 2009:163-166
- Gethers M, Savage T, Di Penta M, et al. CodeTopics: Which topic am I coding now? 33rd International Conference on Software Engineering (ICSE). 2011:1034-1036
- HAN Xiaodong ,WANG Xiaobo, LIU Chao.Retrieval method for traceability links between source code and Chinese documentation[J]. Journal of Hefei University of Technology: Natural Science, 2010 ,33(2):188-192.
- JIN Jing, LI Meng, HUA Zhebang, SONG Huaida, ZHAO Junfeng, XIE Bing. Code function recognition approach based on LDA and static analysis[J]. Computer Engineering and Applications,2013(15).
- Liu Y, Poshyvanyk D, Ferenc R, et al. Modeling class cohesion as mixtures of latent topics[C]//Software Maintenance, 2009. ICSM 2009. IEEE International Conference on. IEEE, 2009: 233-242
- Lukins S, Kraft N, Etzkorn L. Bug localization using latent Dirichlet allocation. Information and Software Technology, 2010, 52(9):972-990.