首页 > 最新文献

ICTACT Journal on Soft Computing最新文献

英文 中文
COMPARATIVE ANALYSIS OF HUMAN INTERACTION PATTERN MINING APPROACHES 人际互动模式挖掘方法的比较分析
Pub Date : 2020-01-01 DOI: 10.21917/ijsc.2020.0293
S. Uma, J. Suguna
Opinion Mining and Sentiment Analysis in Natural Language Processing (NLP) are challenging, as they require deep understanding. Understanding involves methods that could differentiate between the facts of explicit and implicit, regular and irregular, syntactical and semantic language rules. Researches oriented towards Natural Language Processing and Sentiment Analysis have many unresolved problems like co-reference resolution, negation handling, anaphora resolution, named-entity recognition, and word-sense disambiguation. This paper is proposed to develop an Optimized Partial Ancestral Graph (O-PAG) which is capable of mining patterns in human interactions and compare it with an existing tree based pattern mining approach. The experimental results are exposed to number of frequent interactions made and execution time. Results indicate that the overall performance can reach considerable improvements on using O-PAG approach.
自然语言处理中的意见挖掘和情感分析具有挑战性,因为它们需要深入理解。理解涉及能够区分显性和隐性、规则和不规则、句法和语义语言规则的事实的方法。面向自然语言处理和情感分析的研究有许多悬而未决的问题,如共指消解、否定处理、回指消解、命名实体识别和词义消歧。本文提出了一种能够挖掘人类交互模式的优化偏祖先图(O-PAG),并将其与现有的基于树的模式挖掘方法进行了比较。实验结果暴露于频繁的交互次数和执行时间。结果表明,在使用O-PAG方法的基础上,整体性能可以得到显著的提高。
{"title":"COMPARATIVE ANALYSIS OF HUMAN INTERACTION PATTERN MINING APPROACHES","authors":"S. Uma, J. Suguna","doi":"10.21917/ijsc.2020.0293","DOIUrl":"https://doi.org/10.21917/ijsc.2020.0293","url":null,"abstract":"Opinion Mining and Sentiment Analysis in Natural Language Processing (NLP) are challenging, as they require deep understanding. Understanding involves methods that could differentiate between the facts of explicit and implicit, regular and irregular, syntactical and semantic language rules. Researches oriented towards Natural Language Processing and Sentiment Analysis have many unresolved problems like co-reference resolution, negation handling, anaphora resolution, named-entity recognition, and word-sense disambiguation. This paper is proposed to develop an Optimized Partial Ancestral Graph (O-PAG) which is capable of mining patterns in human interactions and compare it with an existing tree based pattern mining approach. The experimental results are exposed to number of frequent interactions made and execution time. Results indicate that the overall performance can reach considerable improvements on using O-PAG approach.","PeriodicalId":30616,"journal":{"name":"ICTACT Journal on Soft Computing","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41361676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DEEP LEARNING APPROACHES FOR ANSWER SELECTION IN QUESTION ANSWERING SYSTEM FOR CONVERSATION AGENTS 会话主体问答系统中的深度学习方法
Pub Date : 2020-01-01 DOI: 10.21917/ijsc.2020.0289
K. Karpagam, K. Madusudanan, A. Saradha
The conversation agent acts as core interfaces between a system and user in answering users queries with proper responses. Question answering system acquires an important role in the information retrieval field. The deep learning approach enhances the accuracy in answering complex questions. As outcome, the user is receiving the precise answer instead of large document collections. The aim of this paper is to develop a model with deep learning approach for improving answer selection process which supports more relevant answer displaying by conversation agents. To achieve this, word2vector used for word representation and biLSTM attentive model is used for training, testing and disclosure play precise answer. Question type is identified using POS-tagger based Question Pattern analysis (T-QPA) model. The knowledgebase is created from the bench mark datasets bAbI Facebook (simple QA tasks), TREC QA, Yahoo! Answer, Insurance QA dataset. The proposed framework is built by embedding of questions and answers based on bidirectional long short-term memory (biLSTM) attentive models. The similarity between questions and answers has been measured by semantic and cosine similarity. The proposed model reduces the search gap in extracting among user queries and answer sentences in the education domain. The system results are evaluated with the standard metrics MAP, Top 1 accuracy, F1- Score for the answer selection.
会话代理充当系统和用户之间的核心接口,以正确的响应回答用户的查询。问答系统在信息检索领域发挥着重要作用。深度学习方法提高了回答复杂问题的准确性。结果,用户收到的是精确的答案,而不是大量的文档集合。本文的目的是开发一个具有深度学习方法的模型来改进答案选择过程,该模型支持会话代理显示更相关的答案。为了实现这一点,word2vector用于单词表示,biLSTM注意力模型用于训练、测试和揭示精确答案。使用基于POS标签的问题模式分析(T-QPA)模型来识别问题类型。知识库是根据基准数据集bAbI Facebook(简单的QA任务)、TREC QA、Yahoo!答案,保险QA数据集。所提出的框架是通过嵌入基于双向长短期记忆(biLSTM)注意模型的问题和答案来构建的。通过语义相似度和余弦相似度来衡量问题和答案之间的相似性。所提出的模型减少了在教育领域中提取用户查询和回答句子时的搜索差距。系统结果使用标准指标MAP、Top 1准确性、F1-答案选择分数进行评估。
{"title":"DEEP LEARNING APPROACHES FOR ANSWER SELECTION IN QUESTION ANSWERING SYSTEM FOR CONVERSATION AGENTS","authors":"K. Karpagam, K. Madusudanan, A. Saradha","doi":"10.21917/ijsc.2020.0289","DOIUrl":"https://doi.org/10.21917/ijsc.2020.0289","url":null,"abstract":"The conversation agent acts as core interfaces between a system and user in answering users queries with proper responses. Question answering system acquires an important role in the information retrieval field. The deep learning approach enhances the accuracy in answering complex questions. As outcome, the user is receiving the precise answer instead of large document collections. The aim of this paper is to develop a model with deep learning approach for improving answer selection process which supports more relevant answer displaying by conversation agents. To achieve this, word2vector used for word representation and biLSTM attentive model is used for training, testing and disclosure play precise answer. Question type is identified using POS-tagger based Question Pattern analysis (T-QPA) model. The knowledgebase is created from the bench mark datasets bAbI Facebook (simple QA tasks), TREC QA, Yahoo! Answer, Insurance QA dataset. The proposed framework is built by embedding of questions and answers based on bidirectional long short-term memory (biLSTM) attentive models. The similarity between questions and answers has been measured by semantic and cosine similarity. The proposed model reduces the search gap in extracting among user queries and answer sentences in the education domain. The system results are evaluated with the standard metrics MAP, Top 1 accuracy, F1- Score for the answer selection.","PeriodicalId":30616,"journal":{"name":"ICTACT Journal on Soft Computing","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44934889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
COLLABORATIVE NETWORK SECURITY MANAGEMENT SYSTEM BASED ON ASSOCIATION MINING RULE 基于关联挖掘规则的协同网络安全管理系统
Pub Date : 2014-07-01 DOI: 10.21917/IJSC.2014.0112
Nisha Mariam Varughese
Security is one of the major challenges in open network. There are so many types of attacks which follow fixed patterns or frequently change their patterns. It is difficult to find the malicious attack which does not have any fixed patterns. The Distributed Denial of Service (DDoS) attacks like Botnets are used to slow down the system performance. To address such problems Collaborative Network Security Management System (CNSMS) is proposed along with the association mining rule. CNSMS system is consists of collaborative Unified Threat Management (UTM), cloud based security centre and traffic prober. The traffic prober captures the internet traffic and given to the collaborative UTM. Traffic is analysed by the Collaborative UTM, to determine whether it contains any malicious attack or not. If any security event occurs, it will reports to the cloud based security centre. The security centre generates security rules based on association mining rule and distributes to the network. The cloud based security centre is used to store the huge amount of tragic, their logs and the security rule generated. The feedback is evaluated and the invalid rules are eliminated to improve the system efficiency.
安全是开放网络面临的主要挑战之一。有很多类型的攻击遵循固定的模式或经常改变他们的模式。没有固定模式的恶意攻击很难被发现。利用僵尸网络等分布式拒绝服务攻击降低系统性能。为了解决这些问题,提出了协同网络安全管理系统(CNSMS)和关联挖掘规则。CNSMS系统由协同统一威胁管理(UTM)、云安全中心和流量探测器组成。流量探测器捕获互联网流量并将其提供给协作UTM。协作UTM对流量进行分析,以确定流量是否包含恶意攻击。如果发生任何安全事件,它将向基于云的安全中心报告。安全中心根据关联挖掘规则生成安全规则并分发到网络中。基于云的安全中心用于存储大量的悲剧,它们的日志和生成的安全规则。对反馈进行评估,剔除无效规则,提高系统效率。
{"title":"COLLABORATIVE NETWORK SECURITY MANAGEMENT SYSTEM BASED ON ASSOCIATION MINING RULE","authors":"Nisha Mariam Varughese","doi":"10.21917/IJSC.2014.0112","DOIUrl":"https://doi.org/10.21917/IJSC.2014.0112","url":null,"abstract":"Security is one of the major challenges in open network. There are so many types of attacks which follow fixed patterns or frequently change their patterns. It is difficult to find the malicious attack which does not have any fixed patterns. The Distributed Denial of Service (DDoS) attacks like Botnets are used to slow down the system performance. To address such problems Collaborative Network Security Management System (CNSMS) is proposed along with the association mining rule. CNSMS system is consists of collaborative Unified Threat Management (UTM), cloud based security centre and traffic prober. The traffic prober captures the internet traffic and given to the collaborative UTM. Traffic is analysed by the Collaborative UTM, to determine whether it contains any malicious attack or not. If any security event occurs, it will reports to the cloud based security centre. The security centre generates security rules based on association mining rule and distributes to the network. The cloud based security centre is used to store the huge amount of tragic, their logs and the security rule generated. The feedback is evaluated and the invalid rules are eliminated to improve the system efficiency.","PeriodicalId":30616,"journal":{"name":"ICTACT Journal on Soft Computing","volume":"4 1","pages":"787-790"},"PeriodicalIF":0.0,"publicationDate":"2014-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"68392189","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
OPINION MINING AND SENTIMENT CLASSIFICATION: A SURVEY 意见挖掘与情感分类:一项调查
Pub Date : 2012-10-01 DOI: 10.21917/ijsc.2012.0065
ChandraKala S., S. C.
{"title":"OPINION MINING AND SENTIMENT CLASSIFICATION: A SURVEY","authors":"ChandraKala S., S. C.","doi":"10.21917/ijsc.2012.0065","DOIUrl":"https://doi.org/10.21917/ijsc.2012.0065","url":null,"abstract":"","PeriodicalId":30616,"journal":{"name":"ICTACT Journal on Soft Computing","volume":"29 1","pages":"420-427"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"68392100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 69
CATEGORIZATION OF LUNG CARCINOMA USING MULTILAYER PERCEPTRON IN OUTPUT LAYER 输出层基于多层感知器的肺癌分类
Pub Date : 1900-01-01 DOI: 10.21917/ijsc.2020.0288
S. Karthigai, K. Sundaram
Data mining techniques used in many applications as there is an incredible growth in records and it is not feasible to find a solution manually. Amongst them, the medical records in data mining gains more popularity and have many missed values due to emergency cases or complicated situation etc. These missing values have a great influence in the desired output. The traditional mining procedure has to be enhanced to handle that between them and adjust the parameters to minimize the errors. The activation function in the neuron performs the non-linear transformation function making it capable to learn and perform more complex tasks. This function plays a vital role in the output process. This work focus on this function and made some enhancement by applying multi logit regression with Maximum A posteriori method in activation function to handle multi-class classification The proposed Enhanced Activation Function in Multi layer Perceptron is implemented in WEKA 3.9.6. and is compared with traditional MLP with suitable evaluation metrics.
数据挖掘技术在许多应用程序中使用,因为记录的增长令人难以置信,并且手动寻找解决方案是不可行的。其中,数据挖掘中的医疗记录越来越受欢迎,但由于病例紧急或情况复杂等原因,存在许多缺失价值。这些缺失值对期望的输出有很大的影响。必须改进传统的挖掘程序来处理它们之间的关系,并调整参数以使误差最小化。神经元中的激活函数执行非线性转换函数,使其能够学习和执行更复杂的任务。这个函数在输出过程中起着至关重要的作用。本文针对该函数进行了一些增强,在激活函数中应用了多logit回归和最大A后测方法来处理多类分类。本文提出的多层感知器中的增强激活函数在WEKA 3.9.6中实现。并以合适的评价指标与传统MLP进行比较。
{"title":"CATEGORIZATION OF LUNG CARCINOMA USING MULTILAYER PERCEPTRON IN OUTPUT LAYER","authors":"S. Karthigai, K. Sundaram","doi":"10.21917/ijsc.2020.0288","DOIUrl":"https://doi.org/10.21917/ijsc.2020.0288","url":null,"abstract":"Data mining techniques used in many applications as there is an incredible growth in records and it is not feasible to find a solution manually. Amongst them, the medical records in data mining gains more popularity and have many missed values due to emergency cases or complicated situation etc. These missing values have a great influence in the desired output. The traditional mining procedure has to be enhanced to handle that between them and adjust the parameters to minimize the errors. The activation function in the neuron performs the non-linear transformation function making it capable to learn and perform more complex tasks. This function plays a vital role in the output process. This work focus on this function and made some enhancement by applying multi logit regression with Maximum A posteriori method in activation function to handle multi-class classification The proposed Enhanced Activation Function in Multi layer Perceptron is implemented in WEKA 3.9.6. and is compared with traditional MLP with suitable evaluation metrics.","PeriodicalId":30616,"journal":{"name":"ICTACT Journal on Soft Computing","volume":"5 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"68392256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
ICTACT Journal on Soft Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1