In a real world, it is often in a group setting that sensitive information has to be stored in databases of a server. Although personal information does not need to be stored in a server, the secret information shared by group members is likely to be stored there. The shared sensitive information requires more security and privacy protection. To our best knowledge, there is no paper which deals with...
This paper describes a mechanism of defining keywords on our Information Utilization System, which we have proposed to utilize information received via e-mail. Our system utilizes metadata of e-mail messages to organize pieces of information, and keywords are used to classify pieces of information based on their
. This process consists of three phases: data cleaning, data extraction, and data consolidation. Data cleaning is done by validating the format for each email. Data extraction consists of keyword extraction, sentiment analysis, regular expression, entity extraction and summary extraction. Data consolidation is used to
With the increase in the number of user reviews on user review sites, useful tools for extracting good and bad points of services so that users can easily and intuitively understand the quality of the services are required. If the annotations are selected from the pre-defined list, there can always be missing keywords
found will be categorized into three groups: Positive link, Negative link and Neutral link. The objective is to identify whether the link is likely pointing into relevant documents or not. In addition, we also utilize keywords related financial domain to recognize a relevant document. Based on our experiments, the value of
Financed by the National Centre for Research and Development under grant No. SP/I/1/77065/10 by the strategic scientific research and experimental development program:
SYNAT - “Interdisciplinary System for Interactive Scientific and Scientific-Technical Information”.