首页 > 最新文献

Cyberspace最新文献

英文 中文
Tagging and Tag Recommendation 标签和标签推荐
Pub Date : 2020-06-17 DOI: 10.5772/intechopen.82242
Fabiano M. Belém, Jussara M. Almeida, Marcos A. Gonçalves
Tagging has emerged as one of the best ways of associating metadata with objects (e.g., videos, texts) in Web 2.0 applications. Consisting of freely chosen keywords assigned to objects by users, tags represent a simpler, cheaper, and a more natural way of organizing content than a fixed taxonomy with a controlled vocabulary. Moreover, recent studies have demonstrated that among other textual features such as title, description, and user comments, tags are the most effective to support information retrieval (IR) services such as search, automatic classification, and content recommendation. In this context, tag recommendation services aim at assisting users in the tagging process, allowing users to select some of the recommended tags or to come up with new ones. Besides improving user experience, tag recommendation services potentially improve the quality of the generated tags, benefiting IR services that rely on tags as data sources. Besides the obvious benefit of improving the description of the objects, tag recommendation can be directly applied in IR services such as search and query expansion. In this chapter, we will provide the main concepts related to tagging systems, as well as an overview of tag recommendation techniques, dividing them into two stages of the tag recommendation process: (1) the candidate tag extraction and (2) the candidate tag ranking.
{"title":"Tagging and Tag Recommendation","authors":"Fabiano M. Belém, Jussara M. Almeida, Marcos A. Gonçalves","doi":"10.5772/intechopen.82242","DOIUrl":"https://doi.org/10.5772/intechopen.82242","url":null,"abstract":"Tagging has emerged as one of the best ways of associating metadata with objects (e.g., videos, texts) in Web 2.0 applications. Consisting of freely chosen keywords assigned to objects by users, tags represent a simpler, cheaper, and a more natural way of organizing content than a fixed taxonomy with a controlled vocabulary. Moreover, recent studies have demonstrated that among other textual features such as title, description, and user comments, tags are the most effective to support information retrieval (IR) services such as search, automatic classification, and content recommendation. In this context, tag recommendation services aim at assisting users in the tagging process, allowing users to select some of the recommended tags or to come up with new ones. Besides improving user experience, tag recommendation services potentially improve the quality of the generated tags, benefiting IR services that rely on tags as data sources. Besides the obvious benefit of improving the description of the objects, tag recommendation can be directly applied in IR services such as search and query expansion. In this chapter, we will provide the main concepts related to tagging systems, as well as an overview of tag recommendation techniques, dividing them into two stages of the tag recommendation process: (1) the candidate tag extraction and (2) the candidate tag ranking.","PeriodicalId":34308,"journal":{"name":"Cyberspace","volume":"18 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78802862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Cyberspace and Artificial Intelligence: The New Face of Cyber-Enhanced Hybrid Threats 网络空间和人工智能:网络增强混合威胁的新面貌
Pub Date : 2020-06-17 DOI: 10.5772/intechopen.88648
Carlos Pedro Gonçalves
{"title":"Cyberspace and Artificial Intelligence: The New Face of Cyber-Enhanced Hybrid Threats","authors":"Carlos Pedro Gonçalves","doi":"10.5772/intechopen.88648","DOIUrl":"https://doi.org/10.5772/intechopen.88648","url":null,"abstract":"","PeriodicalId":34308,"journal":{"name":"Cyberspace","volume":"62 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86372813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
5G Road Map to Communication Revolution 5G通信革命路线图
Pub Date : 2020-05-14 DOI: 10.5772/intechopen.92319
Evon M. O. Abu-Taieh, I. A. Hadid, Ali Zolait
The goal of this chapter is to give researchers, practitioners, and students a pedestal to get a comprehensive look at the new technology of communication named 5G. The chapter will present an introduction that shows the importance of 5G to the different uses of the Internet. Then, the chapter will present two essential aspects: (1) 5G research in academia and real world and (2) timeline of Gs. Then, the chapter will discuss three aspects of 5G which are, namely, (1) Regulations, (2) security, and (3) the 5 enabling Technologies. Then, the chapter will discuss the real-life case of South Korea mobile carrier.
本章的目标是为研究人员、从业者和学生提供一个全面了解名为5G的通信新技术的基础。本章将介绍5G对互联网不同用途的重要性。然后,本章将介绍两个重要方面:(1)学术界和现实世界的5G研究;(2)5G的时间表。然后,本章将讨论5G的三个方面,即(1)法规,(2)安全性和(3)5种使能技术。然后,本章将讨论韩国移动运营商的现实案例。
{"title":"5G Road Map to Communication Revolution","authors":"Evon M. O. Abu-Taieh, I. A. Hadid, Ali Zolait","doi":"10.5772/intechopen.92319","DOIUrl":"https://doi.org/10.5772/intechopen.92319","url":null,"abstract":"The goal of this chapter is to give researchers, practitioners, and students a pedestal to get a comprehensive look at the new technology of communication named 5G. The chapter will present an introduction that shows the importance of 5G to the different uses of the Internet. Then, the chapter will present two essential aspects: (1) 5G research in academia and real world and (2) timeline of Gs. Then, the chapter will discuss three aspects of 5G which are, namely, (1) Regulations, (2) security, and (3) the 5 enabling Technologies. Then, the chapter will discuss the real-life case of South Korea mobile carrier.","PeriodicalId":34308,"journal":{"name":"Cyberspace","volume":"66 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74474102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Cyberspace as a New Living World and Its Axiological Contexts 网络空间作为一个新的生活世界及其价值论语境
Pub Date : 2020-03-28 DOI: 10.5772/intechopen.91907
S. Tolnaiová, S. Gálik
The subject of the chapter is cyberspace in an axiological perspective, which is our new lifeworld. The focus is particularly on the problem of the quality of our life in its specific circumstances. The aim is (on the background of the characteristics of cyberspace as a lifeworld) to solve the problem of values and significance, but also the risks of our so-called cyber experience. In this context, the aim is also to identify various conditions, axiological indicators and the relevant elements of the quality of our life in cyberspace. The authors pursue their goal using the phenomenological-hermeneutic method within the four parts of the chapter. In part 1, cyberspace is interpreted as a life world that is co-constructed in our acts of communication. In part 2, the problem of values, significance and risks of our cyber experience is discussed. The key variable is digital “well-being.” As they point out in part 3, it should be our morally based value “good life,” which is expressed as “ethos” in our life. In part 4, in this perspective, we are faced with the relevant task of the art of living ‘ars vivendi’ with the necessary coherent self-understanding and value-moral claims and the education should also have a “psychological” dimension.
本章的主题是价值论视角下的网络空间,这是我们新的生活世界。重点特别放在具体情况下我们的生活质量问题上。其目的是(在网络空间作为一个生活世界的特征的背景下)解决价值和意义的问题,也是我们所谓的网络体验的风险。在此背景下,目的还在于确定网络空间生活质量的各种条件、价值论指标和相关要素。在本章的四个部分中,作者使用现象学-解释学方法来追求他们的目标。在第一部分中,网络空间被解释为在我们的交流行为中共同构建的生活世界。第二部分讨论了网络体验的价值、意义和风险问题。关键变量是数字“幸福感”。正如他们在第三部分中指出的那样,它应该是我们基于道德的价值观“美好生活”,在我们的生活中表现为“精神”。在第四部分中,在这一视角下,我们面临着与必要的连贯的自我理解和价值道德要求相结合的“临时生存”艺术的相关任务,教育也应该具有“心理”维度。
{"title":"Cyberspace as a New Living World and Its Axiological Contexts","authors":"S. Tolnaiová, S. Gálik","doi":"10.5772/intechopen.91907","DOIUrl":"https://doi.org/10.5772/intechopen.91907","url":null,"abstract":"The subject of the chapter is cyberspace in an axiological perspective, which is our new lifeworld. The focus is particularly on the problem of the quality of our life in its specific circumstances. The aim is (on the background of the characteristics of cyberspace as a lifeworld) to solve the problem of values and significance, but also the risks of our so-called cyber experience. In this context, the aim is also to identify various conditions, axiological indicators and the relevant elements of the quality of our life in cyberspace. The authors pursue their goal using the phenomenological-hermeneutic method within the four parts of the chapter. In part 1, cyberspace is interpreted as a life world that is co-constructed in our acts of communication. In part 2, the problem of values, significance and risks of our cyber experience is discussed. The key variable is digital “well-being.” As they point out in part 3, it should be our morally based value “good life,” which is expressed as “ethos” in our life. In part 4, in this perspective, we are faced with the relevant task of the art of living ‘ars vivendi’ with the necessary coherent self-understanding and value-moral claims and the education should also have a “psychological” dimension.","PeriodicalId":34308,"journal":{"name":"Cyberspace","volume":"46 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83741793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Classification Model for Bullying Posts Detection 欺凌帖子检测的分类模型
Pub Date : 2019-12-05 DOI: 10.5772/intechopen.88633
K. Nalini, L. Jabasheela
Nowadays, many research tasks are concentrating on Social Media for Analyzing Sentiments and Opinions, Political Issues, Marketing Strategies and many more. Several text mining structures have been designed for different applications. Harassing is a category of claiming social turmoil in different structures and con-duct toward a singular or group, to damage others. Investigation outcomes demonstrated that 7 young people out of 10 become the casualty of cyber bullying. Throughout the world, many prominent cases are existing due to the bad communications over the Web. So there could be suitable solutions for this problem and there is a need to eradicate the lacking in existing strategies in dealing problems with cyber bullying incidents. A prominent aim is to design a scheme to alert the people those who are using social networks and also to prevent them from bullying environments. Tweet corpus carries the messages in the text as well as it has ID, time, and so forth. The messages are imparted in informal form and furthermore, there is variety in the dialect. So, there is a requirement to operate a progression of filtration to handle the raw tweets before feature extraction and frequency extraction. The idea is to regard each tweet as a limited blend over a basic arrangement of topics, each of which is described by dissemination over words, and after that analyze tweets through such topic dispersions. Naturally, bullying topics might be related to higher probabilities for bullying words. An arrangement of training tweets with both bullying and non-bullying texts are required to take in a model that can derive topic distributions from tweets. Topic modeling is used to get lexical collocation designs in the irreverent content and create significant topics for a model.
如今,许多研究任务都集中在社交媒体上,用于分析情绪和观点、政治问题、营销策略等等。已经为不同的应用程序设计了几种文本挖掘结构。骚扰是一种声称社会动荡的不同结构和行为对一个人或群体,伤害他人。调查结果显示,每10名青少年中就有7人成为网络欺凌的受害者。在世界范围内,由于网络上的不良通信而存在许多突出的案例。因此,这个问题可能有合适的解决方案,有必要消除现有策略在处理网络欺凌事件问题方面的不足。一个突出的目标是设计一个方案来提醒那些使用社交网络的人,并防止他们进入欺凌环境。Tweet语料库包含文本中的消息,并具有ID、时间等。这些信息以非正式的形式传递,而且方言也多种多样。因此,在特征提取和频率提取之前,需要操作一系列过滤来处理原始tweet。其思想是将每条推文看作是对基本主题安排的有限混合,每条推文都是通过文字传播来描述的,然后通过这种主题分散来分析推文。当然,欺凌话题可能与欺凌词的高概率相关。在一个可以从tweet中导出主题分布的模型中,需要对包含欺凌文本和非欺凌文本的训练tweet进行排列。主题建模用于获取不相关内容中的词汇搭配设计,并为模型创建有意义的主题。
{"title":"Classification Model for Bullying Posts Detection","authors":"K. Nalini, L. Jabasheela","doi":"10.5772/intechopen.88633","DOIUrl":"https://doi.org/10.5772/intechopen.88633","url":null,"abstract":"Nowadays, many research tasks are concentrating on Social Media for Analyzing Sentiments and Opinions, Political Issues, Marketing Strategies and many more. Several text mining structures have been designed for different applications. Harassing is a category of claiming social turmoil in different structures and con-duct toward a singular or group, to damage others. Investigation outcomes demonstrated that 7 young people out of 10 become the casualty of cyber bullying. Throughout the world, many prominent cases are existing due to the bad communications over the Web. So there could be suitable solutions for this problem and there is a need to eradicate the lacking in existing strategies in dealing problems with cyber bullying incidents. A prominent aim is to design a scheme to alert the people those who are using social networks and also to prevent them from bullying environments. Tweet corpus carries the messages in the text as well as it has ID, time, and so forth. The messages are imparted in informal form and furthermore, there is variety in the dialect. So, there is a requirement to operate a progression of filtration to handle the raw tweets before feature extraction and frequency extraction. The idea is to regard each tweet as a limited blend over a basic arrangement of topics, each of which is described by dissemination over words, and after that analyze tweets through such topic dispersions. Naturally, bullying topics might be related to higher probabilities for bullying words. An arrangement of training tweets with both bullying and non-bullying texts are required to take in a model that can derive topic distributions from tweets. Topic modeling is used to get lexical collocation designs in the irreverent content and create significant topics for a model.","PeriodicalId":34308,"journal":{"name":"Cyberspace","volume":"73 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89473970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blind Wavelet-Based Image Watermarking 基于盲小波的图像水印
Pub Date : 2019-11-27 DOI: 10.5772/INTECHOPEN.88131
A. Algarni, Hanaa A. Abdallah
In this chapter, the watermarking technique is blind; blind watermarking does not need any of the original images or any information about it to recover watermark. In this technique the watermark is inserted into the high frequencies. Three-level wavelet transform is applied to the image, and the size of the watermark is equal to the size of the detailed sub-band. Significant coefficients are used to embed the watermark. The proposed technique depends on quantization. The proposed watermarking technique generates images with less degradation.
在本章中,水印技术是盲的;盲水印不需要任何原始图像或任何有关原始图像的信息来恢复水印。在这种技术中,水印被插入到高频中。对图像进行三级小波变换,水印的大小等于详细子带的大小。采用显著系数嵌入水印。所提出的技术依赖于量化。所提出的水印技术产生的图像具有较小的退化。
{"title":"Blind Wavelet-Based Image Watermarking","authors":"A. Algarni, Hanaa A. Abdallah","doi":"10.5772/INTECHOPEN.88131","DOIUrl":"https://doi.org/10.5772/INTECHOPEN.88131","url":null,"abstract":"In this chapter, the watermarking technique is blind; blind watermarking does not need any of the original images or any information about it to recover watermark. In this technique the watermark is inserted into the high frequencies. Three-level wavelet transform is applied to the image, and the size of the watermark is equal to the size of the detailed sub-band. Significant coefficients are used to embed the watermark. The proposed technique depends on quantization. The proposed watermarking technique generates images with less degradation.","PeriodicalId":34308,"journal":{"name":"Cyberspace","volume":"26 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-11-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72652242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Research Design and Methodology 研究设计与方法
Pub Date : 2019-08-07 DOI: 10.5772/INTECHOPEN.85731
Kassu Jilcha Sileyew
{"title":"Research Design and Methodology","authors":"Kassu Jilcha Sileyew","doi":"10.5772/INTECHOPEN.85731","DOIUrl":"https://doi.org/10.5772/INTECHOPEN.85731","url":null,"abstract":"","PeriodicalId":34308,"journal":{"name":"Cyberspace","volume":"43 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89039333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Cyberspace as a New Existential Dimension of Man 网络空间:人的新存在维度
Pub Date : 2019-07-25 DOI: 10.5772/INTECHOPEN.88156
S. Gálik, S. Tolnaiová
Since the second half of the twentieth century, especially from the 1990s to the present, we have seen significant sociocultural changes that have mostly been influenced by information technology. In the area of information technology, it is mainly the Internet that is the essential part of all modern communication technologies such as smartphones, iPads, and so on. The Internet is a new communication space, also called cyberspace, in which we not only communicate but also work, learn, buy, have fun, and so on. It does not seem to be a mere “tool” of our new way of communication, but a dimension that becomes part of our existence. We then have to ask how our existence is changing under the influence of new technologies. How do we change the value system in cyberspace communication? What are the possibilities and risks of communication in cyberspace? These are just some of the issues that arise in connection with communication in cyberspace to which we will seek answers. In the chapter we use the phenomenological and hermeneutic method. Through the phenomenological method, we examine the basic structure of cyberspace (Clark, Ropolyi) and, using a hermeneutic method, examine the differences between communication in cyberspace and old media (Lohisse, Postman, Bystřický).
自20世纪下半叶以来,特别是从20世纪90年代到现在,我们看到了重大的社会文化变化,这些变化主要受到信息技术的影响。在信息技术领域,主要是互联网是所有现代通信技术(如智能手机、ipad等)的重要组成部分。互联网是一个新的交流空间,也被称为网络空间,我们不仅在其中交流,而且工作,学习,购买,娱乐,等等。它似乎不仅仅是我们新的交流方式的“工具”,而是成为我们存在的一部分。然后,我们不得不问,在新技术的影响下,我们的存在是如何变化的。如何改变网络空间传播中的价值体系?网络空间通信的可能性和风险是什么?这些只是在网络空间交流中出现的一些问题,我们将寻求答案。在本章中,我们使用现象学和解释学的方法。通过现象学方法,我们研究了网络空间的基本结构(Clark, Ropolyi),并使用解释学方法,研究了网络空间与旧媒体传播之间的差异(Lohisse, Postman, Bystřický)。
{"title":"Cyberspace as a New Existential Dimension of Man","authors":"S. Gálik, S. Tolnaiová","doi":"10.5772/INTECHOPEN.88156","DOIUrl":"https://doi.org/10.5772/INTECHOPEN.88156","url":null,"abstract":"Since the second half of the twentieth century, especially from the 1990s to the present, we have seen significant sociocultural changes that have mostly been influenced by information technology. In the area of information technology, it is mainly the Internet that is the essential part of all modern communication technologies such as smartphones, iPads, and so on. The Internet is a new communication space, also called cyberspace, in which we not only communicate but also work, learn, buy, have fun, and so on. It does not seem to be a mere “tool” of our new way of communication, but a dimension that becomes part of our existence. We then have to ask how our existence is changing under the influence of new technologies. How do we change the value system in cyberspace communication? What are the possibilities and risks of communication in cyberspace? These are just some of the issues that arise in connection with communication in cyberspace to which we will seek answers. In the chapter we use the phenomenological and hermeneutic method. Through the phenomenological method, we examine the basic structure of cyberspace (Clark, Ropolyi) and, using a hermeneutic method, examine the differences between communication in cyberspace and old media (Lohisse, Postman, Bystřický).","PeriodicalId":34308,"journal":{"name":"Cyberspace","volume":"18 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82911238","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Combined Deep Learning and Traditional NLP Approaches for Fire Burst Detection Based on Twitter Posts 结合深度学习和传统NLP方法的基于Twitter帖子的火灾探测
Pub Date : 2019-04-18 DOI: 10.5772/INTECHOPEN.85075
Konstantinos-George Thanos, Andrianna Polydouri, A. Danelakis, D. Kyriazanos, S. Thomopoulos
The current chapter introduces a procedure that aims at determining regions that are on fire, based on Twitter posts, as soon as possible. The proposed scheme utilizes a deep learning approach for analyzing the text of Twitter posts announcing fire bursts. Deep learning is becoming very popular within different text applica-tions involving text generalization, text summarization, and extracting text information. A deep learning network is to be trained so as to distinguish valid Twitter fire-announcing posts from junk posts. Next, the posts labeled as valid by the network have undergone traditional NLP-based information extraction where the initial unstructured text is converted into a structured one, from which potential location and timestamp of the incident for further exploitation are derived. Analytic processing is then implemented in order to output aggregated reports which are used to finally detect potential geographical areas that are probably threatened by fire. So far, the part that has been implemented is the traditional NLP-based and has already derived promising results under real-world conditions ’ testing. The deep learning enrichment is to be implemented and expected to build upon the performance of the existing architecture and further improve it.
本章介绍了一种程序,旨在根据Twitter上的帖子,尽快确定起火地区。该方案利用深度学习方法来分析Twitter上宣布火灾的帖子的文本。深度学习在不同的文本应用程序中变得非常流行,包括文本泛化、文本摘要和提取文本信息。我们将训练一个深度学习网络,以区分有效的Twitter火公告和垃圾帖子。接下来,通过网络标记为有效的帖子进行传统的基于nlp的信息提取,将初始的非结构化文本转换为结构化文本,从中派生出事件的潜在位置和时间戳,以供进一步利用。然后实施分析处理,以便输出汇总报告,这些报告用于最终检测可能受到火灾威胁的潜在地理区域。到目前为止,已经实现的部分是传统的基于nlp的,并且已经在现实条件下的测试中得到了很好的结果。深度学习的丰富将被实现,并期望建立在现有架构的性能之上,并进一步改进它。
{"title":"Combined Deep Learning and Traditional NLP Approaches for Fire Burst Detection Based on Twitter Posts","authors":"Konstantinos-George Thanos, Andrianna Polydouri, A. Danelakis, D. Kyriazanos, S. Thomopoulos","doi":"10.5772/INTECHOPEN.85075","DOIUrl":"https://doi.org/10.5772/INTECHOPEN.85075","url":null,"abstract":"The current chapter introduces a procedure that aims at determining regions that are on fire, based on Twitter posts, as soon as possible. The proposed scheme utilizes a deep learning approach for analyzing the text of Twitter posts announcing fire bursts. Deep learning is becoming very popular within different text applica-tions involving text generalization, text summarization, and extracting text information. A deep learning network is to be trained so as to distinguish valid Twitter fire-announcing posts from junk posts. Next, the posts labeled as valid by the network have undergone traditional NLP-based information extraction where the initial unstructured text is converted into a structured one, from which potential location and timestamp of the incident for further exploitation are derived. Analytic processing is then implemented in order to output aggregated reports which are used to finally detect potential geographical areas that are probably threatened by fire. So far, the part that has been implemented is the traditional NLP-based and has already derived promising results under real-world conditions ’ testing. The deep learning enrichment is to be implemented and expected to build upon the performance of the existing architecture and further improve it.","PeriodicalId":34308,"journal":{"name":"Cyberspace","volume":"19 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86017031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Text Mining to Facilitate Domain Knowledge Discovery 促进领域知识发现的文本挖掘
Pub Date : 2019-04-08 DOI: 10.5772/INTECHOPEN.85362
Chengbin Wang, Xiaogang Ma
The high-precision observation and measurement techniques have accelerated the rapid development of geoscience research in the past decades and have pro-duced large amounts of research outputs. Many findings and discoveries were recorded in the geological literature, which is regarded as unstructured data. For these data, traditional research methods have limited functions for integrating and mining them to make knowledge discovery. Text mining based on natural language processing (NLP) provides the necessary method and technology to analyze unstructured geological literature. In this book chapter, we will review the latest researches of text mining in the domain of geoscience and present results from a few case studies. The research includes three major parts: (1) structuralization of geological literature, (2) information extraction and visualization for geological literature, and (3) geological text mining to assist database construction and knowledge discovery.
近几十年来,高精度的观测和测量技术加速了地球科学研究的快速发展,并产生了大量的研究成果。许多发现和发现被记录在地质文献中,这些文献被视为非结构化数据。对于这些数据,传统的研究方法对于整合和挖掘数据进行知识发现的作用有限。基于自然语言处理(NLP)的文本挖掘为分析非结构化地质文献提供了必要的方法和技术。在本章中,我们将回顾地球科学领域文本挖掘的最新研究,并介绍一些案例研究的结果。研究包括三个主要部分:(1)地质文献的结构化;(2)地质文献的信息提取和可视化;(3)地质文本挖掘,以辅助数据库建设和知识发现。
{"title":"Text Mining to Facilitate Domain Knowledge Discovery","authors":"Chengbin Wang, Xiaogang Ma","doi":"10.5772/INTECHOPEN.85362","DOIUrl":"https://doi.org/10.5772/INTECHOPEN.85362","url":null,"abstract":"The high-precision observation and measurement techniques have accelerated the rapid development of geoscience research in the past decades and have pro-duced large amounts of research outputs. Many findings and discoveries were recorded in the geological literature, which is regarded as unstructured data. For these data, traditional research methods have limited functions for integrating and mining them to make knowledge discovery. Text mining based on natural language processing (NLP) provides the necessary method and technology to analyze unstructured geological literature. In this book chapter, we will review the latest researches of text mining in the domain of geoscience and present results from a few case studies. The research includes three major parts: (1) structuralization of geological literature, (2) information extraction and visualization for geological literature, and (3) geological text mining to assist database construction and knowledge discovery.","PeriodicalId":34308,"journal":{"name":"Cyberspace","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84091647","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
Cyberspace
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1