The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper presents a case study of discovering and classifying verbs in large web-corpora. Many tasks in natural language processing require corpora containing billions of words, and with such volumes of data co-occurrence extraction becomes one of the performance bottlenecks in the Vector Space Models of computational linguistics. We propose a co-occurrence extraction kernel based on ternary trees...
The extraction of semantic contexts is a relevant issue in information retrieval to provide high quality query results. This paper introduces the semantic context underlying a set of given input concepts as defined by the relevant multiple explanation paths connecting the input concepts in a collaborative network. A pheromone-like model based on this approach is introduced for the detection and the...
Nowadays, an ever increasing number of news articles is published on a daily basis. Especially after notable national and international events or disasters, news coverage rises tremendously. Temporal summarization is an approach to automatically summarize such information in a timely manner. Summaries are created incrementally with progressing time, as soon as new information is available. Given a...
This paper studied the key factors influencing consumer purchase decision on infant milk powders under the context of e-commerce. In recent years there have been several scandals exposed about Chinese milk powders, causing major concerns among consumers and scholars. Meanwhile, e-commerce is fast developing in China, this study is aimed to understand what are the key factors influencing the consumer...
Today, user generated content and online shared opinions are gaining relevance as a source of information not only for other consumers but also for retailers. However, the huge number of posted opinions makes difficult any manual analysis. This paper proposes a new approach for gender discourse analysis based on the semantic analysis of the content of shared reviews in electronic word of mouth communities...
This paper describes a method for automatically ranking a dictionary of swear words based on their level of rudeness. The final ranking is generated by combining two baseline rankings: 1) using the normalized accumulated cosine similarity between the word embeddings of the swear word and the n-best list of closest neighborhoods, and 2) using a pseudo-relevance feedback and bootstrapping algorithm...
Adaptive security can take dynamic trade-off decisions autonomously at runtime and is considered a key desirable attribute in the Internet of Things (IoT). However, there is no clear evidence that it can handle these trade-offs optimally to add value to such a complex and dynamic network. We present a scenario-based approach to recognize and evaluate typical security trade-off situations in the IoT...
Social media (SM) has seen an exponential growth since its inception on the web, making it an interesting and unexplored area of research. The positives and the novelty of the SM sites have resulted in its integration to our daily lives. Unfortunately, there are repercussions to its adoption, including but not limited to uncontrollable daily dedicated hours; loneliness creating the need to use it...
Existing work in the semantic relatedness literature has already considered various information sources such as WordNet, Wikipedia and Web search engines to identify the semantic relatedness between two words. We will show that existing semantic relatedness measures might not be directly applicable to microblogging content such as tweets due to i) the informality and short length of microblogging...
The Islamic websites play an important role in disseminating Islamic knowledge and information about Islamic ruling. Their number and the content they provide is continuously increasing which require in-depth investigations in content evaluation automation. In this paper, we are proposing the use of conceptual reasoning for detecting inconsistencies in case of Fatwas evaluation. Inconsistencies are...
This article presents an exploratory study undertaken during the initial phase of the Adults Digital Literacy Project (LIDIA), aimed at identifying situations where adults are hindered from exercising their full citizenship, due to their lack of digital technologies knowledge. Within the framework of an action-research methodology, a questionnaire was applied to 106 adults, aged between 26 and 92...
Contemporary human behaviours using the Internet and social media are an extension of behaviours seen long before the knowledge society. In particular, online identities and avatars, and the behaviours associated with these, have strong precedents in literature, in philosophy and in medieval carnival. The philosopher Mikhail Bakhtin has described these phenomena in detail. The growth in scale of such...
Named Entity Disambiguation (NED) aims at dis-ambiguating named entity mentions in a text to their corre-sponding entries in a knowledge base such as Wikipedia. Itis a fundamental task in Natural Language Processing (NLP)and has many applications such as information extraction, information retrieval, and knowledge acquisition. In the pastdecade, a number of methods have been proposed for theNED task...
Despite the advancements made towards learning such as technological innovations in the classroom and access to learning in general, there are significant challenges that remain especially the modes of delivery of quality education apart from the traditional classroom teaching and learning. In the endeavour to discover feasible solutions for these challenges, much trust has been put in new data and...
Hindi is the fourth largest spoken language in the world. Nowadays in India, working on Internet using Hindi language is becoming popular. But Hindi language has several ambiguous words which affect on sense of the Hindi sentence. The word "Ambiguous" refers to "having more than one meaning or senses". The technique of examining the correct meaning of a word as specified in a given...
The current emergency services are mostly using old-fashioned generic voice-based technologies. Hence, proliferating smart and powerful end-user devices, which are quasi-permanently connected to the Internet is still weakly considered. Given that fact, we design and develop YouSOS, a framework extending the usability of conventional SOS services. YouSOS is built in a way that centralizes rescue operations'...
The widespread use of the HTTP and hypertext makes it possible to freely publish new information and expose it in the context of its description. Unfortunately, this is a human-centric environment that cannot easily be adapted to an application-centric approach, which is required to provide distributed enterprise management and real-time process control. In this article new architecture is presented...
The paper presents considerations on the concept of big data. The aim of the paper is to confront the attempts of defining big data with its common understanding by different groups of users. In this research the group of respondents are students of Warsaw University of Economics. The authors advocate that the student's opinion and attitude to big data can be important regarding the fact that they...
The shift of the Internet usage from a host to host interconnection to a content retrieval becomes an indisputable fact. Information Centric Networking (ICN) paradigm is proposed as a Future Internet architecture adapted to this change. By identifying the content and not the host, this new design enables many interesting features such as in-network data storage and caching. ICN network components...
Since IoT devices can cause problems, such as invasion of privacy and threat to our safety, security in IoT is the most important element. IoT is an environment in which various devices to communicate an environment in which various devices communicate with one another without user intervention or with minimal user intervention. Therefore, authentication and access control technology between IoT devices...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.