The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Expansion of query keywords based on semantic relationship is an effective approach to improve the performance of text retrieval. In this paper, a novel approach for text retrieval is presented. The principle of the approach is to construct a integrated semantic tree, and select candidate keywords from the tree. On the tree, all nodes are weighted based on synonymy, hypernymy, and Mutual Information...
Visual verb is a special type of verb. Between the semantic characteristics of modern Chinese visual verbs exists relation of compatibility or repulsion. Through calculation and analysis of the compatibility degree, we find that, in semantic characteristics, the relation can be "compatibility" or "repulsion", which is determined by the features of visual behavior itself. In addition,...
Similarity between two sentences can be determined by either comparing their commonalities or their differences. Commonalities, which reflect similarity judgment, connect the two sentences while differences, which reflect dissimilarity judgment, represent the unique way of self-identification. Although both of them are essential in determining sentence similarity, however, the existing methods only...
The inter-language studies on the textual semantic accessibility scale (SAS) are a new branch of the computational linguistics and the present paper tries to statistically probe into the SASes in English, French and Japanese literature works sampled from the corresponding corpora. Firstly, six control groups are formed by the equidistant texts extracted every 10 pages, 5 pages, 4 pages, 3 pages, 2...
In cooperative intrusion detection, several intrusion detection systems (IDS), network analyzers, vulnerability analyzers and other analyzers are deployed in order to get an overview of the system under consideration. In this case, the definition of a shared vocabulary describing the different information is prominent. Since these pieces of information are structured, we first propose to use description...
In identifying communities in the online environment most approaches consider as the basic tie that connects social actors together some form of direct contact, such as through communication. Other approaches use surrogates for direct ties including copresense, cooccurrence, or structural equivalence. In contrast, this paper focuses on semantic equivalence among social actors, regardless of their...
at the present time, the increase of e-mail spam are heavy to cumber and the spam are vastly spread. These spams cause various problems to the Internet users, such as full incoming mailbox, and wasting time. Therefore, tremendous methods have been proposed but most of them have limitation in the mapping feature and processing time. This paper proposed a method that can detect a set of image e-mail...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.