Pub Date : 2020-06-17DOI: 10.5772/intechopen.82242
Fabiano M. Belém, Jussara M. Almeida, Marcos A. Gonçalves
Tagging has emerged as one of the best ways of associating metadata with objects (e.g., videos, texts) in Web 2.0 applications. Consisting of freely chosen keywords assigned to objects by users, tags represent a simpler, cheaper, and a more natural way of organizing content than a fixed taxonomy with a controlled vocabulary. Moreover, recent studies have demonstrated that among other textual features such as title, description, and user comments, tags are the most effective to support information retrieval (IR) services such as search, automatic classification, and content recommendation. In this context, tag recommendation services aim at assisting users in the tagging process, allowing users to select some of the recommended tags or to come up with new ones. Besides improving user experience, tag recommendation services potentially improve the quality of the generated tags, benefiting IR services that rely on tags as data sources. Besides the obvious benefit of improving the description of the objects, tag recommendation can be directly applied in IR services such as search and query expansion. In this chapter, we will provide the main concepts related to tagging systems, as well as an overview of tag recommendation techniques, dividing them into two stages of the tag recommendation process: (1) the candidate tag extraction and (2) the candidate tag ranking.
{"title":"Tagging and Tag Recommendation","authors":"Fabiano M. Belém, Jussara M. Almeida, Marcos A. Gonçalves","doi":"10.5772/intechopen.82242","DOIUrl":"https://doi.org/10.5772/intechopen.82242","url":null,"abstract":"Tagging has emerged as one of the best ways of associating metadata with objects (e.g., videos, texts) in Web 2.0 applications. Consisting of freely chosen keywords assigned to objects by users, tags represent a simpler, cheaper, and a more natural way of organizing content than a fixed taxonomy with a controlled vocabulary. Moreover, recent studies have demonstrated that among other textual features such as title, description, and user comments, tags are the most effective to support information retrieval (IR) services such as search, automatic classification, and content recommendation. In this context, tag recommendation services aim at assisting users in the tagging process, allowing users to select some of the recommended tags or to come up with new ones. Besides improving user experience, tag recommendation services potentially improve the quality of the generated tags, benefiting IR services that rely on tags as data sources. Besides the obvious benefit of improving the description of the objects, tag recommendation can be directly applied in IR services such as search and query expansion. In this chapter, we will provide the main concepts related to tagging systems, as well as an overview of tag recommendation techniques, dividing them into two stages of the tag recommendation process: (1) the candidate tag extraction and (2) the candidate tag ranking.","PeriodicalId":34308,"journal":{"name":"Cyberspace","volume":"18 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78802862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-06-17DOI: 10.5772/intechopen.88648
Carlos Pedro Gonçalves
{"title":"Cyberspace and Artificial Intelligence: The New Face of Cyber-Enhanced Hybrid Threats","authors":"Carlos Pedro Gonçalves","doi":"10.5772/intechopen.88648","DOIUrl":"https://doi.org/10.5772/intechopen.88648","url":null,"abstract":"","PeriodicalId":34308,"journal":{"name":"Cyberspace","volume":"62 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86372813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-05-14DOI: 10.5772/intechopen.92319
Evon M. O. Abu-Taieh, I. A. Hadid, Ali Zolait
The goal of this chapter is to give researchers, practitioners, and students a pedestal to get a comprehensive look at the new technology of communication named 5G. The chapter will present an introduction that shows the importance of 5G to the different uses of the Internet. Then, the chapter will present two essential aspects: (1) 5G research in academia and real world and (2) timeline of Gs. Then, the chapter will discuss three aspects of 5G which are, namely, (1) Regulations, (2) security, and (3) the 5 enabling Technologies. Then, the chapter will discuss the real-life case of South Korea mobile carrier.
{"title":"5G Road Map to Communication Revolution","authors":"Evon M. O. Abu-Taieh, I. A. Hadid, Ali Zolait","doi":"10.5772/intechopen.92319","DOIUrl":"https://doi.org/10.5772/intechopen.92319","url":null,"abstract":"The goal of this chapter is to give researchers, practitioners, and students a pedestal to get a comprehensive look at the new technology of communication named 5G. The chapter will present an introduction that shows the importance of 5G to the different uses of the Internet. Then, the chapter will present two essential aspects: (1) 5G research in academia and real world and (2) timeline of Gs. Then, the chapter will discuss three aspects of 5G which are, namely, (1) Regulations, (2) security, and (3) the 5 enabling Technologies. Then, the chapter will discuss the real-life case of South Korea mobile carrier.","PeriodicalId":34308,"journal":{"name":"Cyberspace","volume":"66 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74474102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-03-28DOI: 10.5772/intechopen.91907
S. Tolnaiová, S. Gálik
The subject of the chapter is cyberspace in an axiological perspective, which is our new lifeworld. The focus is particularly on the problem of the quality of our life in its specific circumstances. The aim is (on the background of the characteristics of cyberspace as a lifeworld) to solve the problem of values and significance, but also the risks of our so-called cyber experience. In this context, the aim is also to identify various conditions, axiological indicators and the relevant elements of the quality of our life in cyberspace. The authors pursue their goal using the phenomenological-hermeneutic method within the four parts of the chapter. In part 1, cyberspace is interpreted as a life world that is co-constructed in our acts of communication. In part 2, the problem of values, significance and risks of our cyber experience is discussed. The key variable is digital “well-being.” As they point out in part 3, it should be our morally based value “good life,” which is expressed as “ethos” in our life. In part 4, in this perspective, we are faced with the relevant task of the art of living ‘ars vivendi’ with the necessary coherent self-understanding and value-moral claims and the education should also have a “psychological” dimension.
{"title":"Cyberspace as a New Living World and Its Axiological Contexts","authors":"S. Tolnaiová, S. Gálik","doi":"10.5772/intechopen.91907","DOIUrl":"https://doi.org/10.5772/intechopen.91907","url":null,"abstract":"The subject of the chapter is cyberspace in an axiological perspective, which is our new lifeworld. The focus is particularly on the problem of the quality of our life in its specific circumstances. The aim is (on the background of the characteristics of cyberspace as a lifeworld) to solve the problem of values and significance, but also the risks of our so-called cyber experience. In this context, the aim is also to identify various conditions, axiological indicators and the relevant elements of the quality of our life in cyberspace. The authors pursue their goal using the phenomenological-hermeneutic method within the four parts of the chapter. In part 1, cyberspace is interpreted as a life world that is co-constructed in our acts of communication. In part 2, the problem of values, significance and risks of our cyber experience is discussed. The key variable is digital “well-being.” As they point out in part 3, it should be our morally based value “good life,” which is expressed as “ethos” in our life. In part 4, in this perspective, we are faced with the relevant task of the art of living ‘ars vivendi’ with the necessary coherent self-understanding and value-moral claims and the education should also have a “psychological” dimension.","PeriodicalId":34308,"journal":{"name":"Cyberspace","volume":"46 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83741793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-05DOI: 10.5772/intechopen.88633
K. Nalini, L. Jabasheela
Nowadays, many research tasks are concentrating on Social Media for Analyzing Sentiments and Opinions, Political Issues, Marketing Strategies and many more. Several text mining structures have been designed for different applications. Harassing is a category of claiming social turmoil in different structures and con-duct toward a singular or group, to damage others. Investigation outcomes demonstrated that 7 young people out of 10 become the casualty of cyber bullying. Throughout the world, many prominent cases are existing due to the bad communications over the Web. So there could be suitable solutions for this problem and there is a need to eradicate the lacking in existing strategies in dealing problems with cyber bullying incidents. A prominent aim is to design a scheme to alert the people those who are using social networks and also to prevent them from bullying environments. Tweet corpus carries the messages in the text as well as it has ID, time, and so forth. The messages are imparted in informal form and furthermore, there is variety in the dialect. So, there is a requirement to operate a progression of filtration to handle the raw tweets before feature extraction and frequency extraction. The idea is to regard each tweet as a limited blend over a basic arrangement of topics, each of which is described by dissemination over words, and after that analyze tweets through such topic dispersions. Naturally, bullying topics might be related to higher probabilities for bullying words. An arrangement of training tweets with both bullying and non-bullying texts are required to take in a model that can derive topic distributions from tweets. Topic modeling is used to get lexical collocation designs in the irreverent content and create significant topics for a model.
{"title":"Classification Model for Bullying Posts Detection","authors":"K. Nalini, L. Jabasheela","doi":"10.5772/intechopen.88633","DOIUrl":"https://doi.org/10.5772/intechopen.88633","url":null,"abstract":"Nowadays, many research tasks are concentrating on Social Media for Analyzing Sentiments and Opinions, Political Issues, Marketing Strategies and many more. Several text mining structures have been designed for different applications. Harassing is a category of claiming social turmoil in different structures and con-duct toward a singular or group, to damage others. Investigation outcomes demonstrated that 7 young people out of 10 become the casualty of cyber bullying. Throughout the world, many prominent cases are existing due to the bad communications over the Web. So there could be suitable solutions for this problem and there is a need to eradicate the lacking in existing strategies in dealing problems with cyber bullying incidents. A prominent aim is to design a scheme to alert the people those who are using social networks and also to prevent them from bullying environments. Tweet corpus carries the messages in the text as well as it has ID, time, and so forth. The messages are imparted in informal form and furthermore, there is variety in the dialect. So, there is a requirement to operate a progression of filtration to handle the raw tweets before feature extraction and frequency extraction. The idea is to regard each tweet as a limited blend over a basic arrangement of topics, each of which is described by dissemination over words, and after that analyze tweets through such topic dispersions. Naturally, bullying topics might be related to higher probabilities for bullying words. An arrangement of training tweets with both bullying and non-bullying texts are required to take in a model that can derive topic distributions from tweets. Topic modeling is used to get lexical collocation designs in the irreverent content and create significant topics for a model.","PeriodicalId":34308,"journal":{"name":"Cyberspace","volume":"73 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89473970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-11-27DOI: 10.5772/INTECHOPEN.88131
A. Algarni, Hanaa A. Abdallah
In this chapter, the watermarking technique is blind; blind watermarking does not need any of the original images or any information about it to recover watermark. In this technique the watermark is inserted into the high frequencies. Three-level wavelet transform is applied to the image, and the size of the watermark is equal to the size of the detailed sub-band. Significant coefficients are used to embed the watermark. The proposed technique depends on quantization. The proposed watermarking technique generates images with less degradation.
{"title":"Blind Wavelet-Based Image Watermarking","authors":"A. Algarni, Hanaa A. Abdallah","doi":"10.5772/INTECHOPEN.88131","DOIUrl":"https://doi.org/10.5772/INTECHOPEN.88131","url":null,"abstract":"In this chapter, the watermarking technique is blind; blind watermarking does not need any of the original images or any information about it to recover watermark. In this technique the watermark is inserted into the high frequencies. Three-level wavelet transform is applied to the image, and the size of the watermark is equal to the size of the detailed sub-band. Significant coefficients are used to embed the watermark. The proposed technique depends on quantization. The proposed watermarking technique generates images with less degradation.","PeriodicalId":34308,"journal":{"name":"Cyberspace","volume":"26 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-11-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72652242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-07-25DOI: 10.5772/INTECHOPEN.88156
S. Gálik, S. Tolnaiová
Since the second half of the twentieth century, especially from the 1990s to the present, we have seen significant sociocultural changes that have mostly been influenced by information technology. In the area of information technology, it is mainly the Internet that is the essential part of all modern communication technologies such as smartphones, iPads, and so on. The Internet is a new communication space, also called cyberspace, in which we not only communicate but also work, learn, buy, have fun, and so on. It does not seem to be a mere “tool” of our new way of communication, but a dimension that becomes part of our existence. We then have to ask how our existence is changing under the influence of new technologies. How do we change the value system in cyberspace communication? What are the possibilities and risks of communication in cyberspace? These are just some of the issues that arise in connection with communication in cyberspace to which we will seek answers. In the chapter we use the phenomenological and hermeneutic method. Through the phenomenological method, we examine the basic structure of cyberspace (Clark, Ropolyi) and, using a hermeneutic method, examine the differences between communication in cyberspace and old media (Lohisse, Postman, Bystřický).
{"title":"Cyberspace as a New Existential Dimension of Man","authors":"S. Gálik, S. Tolnaiová","doi":"10.5772/INTECHOPEN.88156","DOIUrl":"https://doi.org/10.5772/INTECHOPEN.88156","url":null,"abstract":"Since the second half of the twentieth century, especially from the 1990s to the present, we have seen significant sociocultural changes that have mostly been influenced by information technology. In the area of information technology, it is mainly the Internet that is the essential part of all modern communication technologies such as smartphones, iPads, and so on. The Internet is a new communication space, also called cyberspace, in which we not only communicate but also work, learn, buy, have fun, and so on. It does not seem to be a mere “tool” of our new way of communication, but a dimension that becomes part of our existence. We then have to ask how our existence is changing under the influence of new technologies. How do we change the value system in cyberspace communication? What are the possibilities and risks of communication in cyberspace? These are just some of the issues that arise in connection with communication in cyberspace to which we will seek answers. In the chapter we use the phenomenological and hermeneutic method. Through the phenomenological method, we examine the basic structure of cyberspace (Clark, Ropolyi) and, using a hermeneutic method, examine the differences between communication in cyberspace and old media (Lohisse, Postman, Bystřický).","PeriodicalId":34308,"journal":{"name":"Cyberspace","volume":"18 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82911238","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-04-18DOI: 10.5772/INTECHOPEN.85075
Konstantinos-George Thanos, Andrianna Polydouri, A. Danelakis, D. Kyriazanos, S. Thomopoulos
The current chapter introduces a procedure that aims at determining regions that are on fire, based on Twitter posts, as soon as possible. The proposed scheme utilizes a deep learning approach for analyzing the text of Twitter posts announcing fire bursts. Deep learning is becoming very popular within different text applica-tions involving text generalization, text summarization, and extracting text information. A deep learning network is to be trained so as to distinguish valid Twitter fire-announcing posts from junk posts. Next, the posts labeled as valid by the network have undergone traditional NLP-based information extraction where the initial unstructured text is converted into a structured one, from which potential location and timestamp of the incident for further exploitation are derived. Analytic processing is then implemented in order to output aggregated reports which are used to finally detect potential geographical areas that are probably threatened by fire. So far, the part that has been implemented is the traditional NLP-based and has already derived promising results under real-world conditions ’ testing. The deep learning enrichment is to be implemented and expected to build upon the performance of the existing architecture and further improve it.
{"title":"Combined Deep Learning and Traditional NLP Approaches for Fire Burst Detection Based on Twitter Posts","authors":"Konstantinos-George Thanos, Andrianna Polydouri, A. Danelakis, D. Kyriazanos, S. Thomopoulos","doi":"10.5772/INTECHOPEN.85075","DOIUrl":"https://doi.org/10.5772/INTECHOPEN.85075","url":null,"abstract":"The current chapter introduces a procedure that aims at determining regions that are on fire, based on Twitter posts, as soon as possible. The proposed scheme utilizes a deep learning approach for analyzing the text of Twitter posts announcing fire bursts. Deep learning is becoming very popular within different text applica-tions involving text generalization, text summarization, and extracting text information. A deep learning network is to be trained so as to distinguish valid Twitter fire-announcing posts from junk posts. Next, the posts labeled as valid by the network have undergone traditional NLP-based information extraction where the initial unstructured text is converted into a structured one, from which potential location and timestamp of the incident for further exploitation are derived. Analytic processing is then implemented in order to output aggregated reports which are used to finally detect potential geographical areas that are probably threatened by fire. So far, the part that has been implemented is the traditional NLP-based and has already derived promising results under real-world conditions ’ testing. The deep learning enrichment is to be implemented and expected to build upon the performance of the existing architecture and further improve it.","PeriodicalId":34308,"journal":{"name":"Cyberspace","volume":"19 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86017031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-04-08DOI: 10.5772/INTECHOPEN.85362
Chengbin Wang, Xiaogang Ma
The high-precision observation and measurement techniques have accelerated the rapid development of geoscience research in the past decades and have pro-duced large amounts of research outputs. Many findings and discoveries were recorded in the geological literature, which is regarded as unstructured data. For these data, traditional research methods have limited functions for integrating and mining them to make knowledge discovery. Text mining based on natural language processing (NLP) provides the necessary method and technology to analyze unstructured geological literature. In this book chapter, we will review the latest researches of text mining in the domain of geoscience and present results from a few case studies. The research includes three major parts: (1) structuralization of geological literature, (2) information extraction and visualization for geological literature, and (3) geological text mining to assist database construction and knowledge discovery.
{"title":"Text Mining to Facilitate Domain Knowledge Discovery","authors":"Chengbin Wang, Xiaogang Ma","doi":"10.5772/INTECHOPEN.85362","DOIUrl":"https://doi.org/10.5772/INTECHOPEN.85362","url":null,"abstract":"The high-precision observation and measurement techniques have accelerated the rapid development of geoscience research in the past decades and have pro-duced large amounts of research outputs. Many findings and discoveries were recorded in the geological literature, which is regarded as unstructured data. For these data, traditional research methods have limited functions for integrating and mining them to make knowledge discovery. Text mining based on natural language processing (NLP) provides the necessary method and technology to analyze unstructured geological literature. In this book chapter, we will review the latest researches of text mining in the domain of geoscience and present results from a few case studies. The research includes three major parts: (1) structuralization of geological literature, (2) information extraction and visualization for geological literature, and (3) geological text mining to assist database construction and knowledge discovery.","PeriodicalId":34308,"journal":{"name":"Cyberspace","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84091647","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}