4,825 research outputs found

    A Trio Neural Model for Dynamic Entity Relatedness Ranking

    Full text link
    Measuring entity relatedness is a fundamental task for many natural language processing and information retrieval applications. Prior work often studies entity relatedness in static settings and an unsupervised manner. However, entities in real-world are often involved in many different relationships, consequently entity-relations are very dynamic over time. In this work, we propose a neural networkbased approach for dynamic entity relatedness, leveraging the collective attention as supervision. Our model is capable of learning rich and different entity representations in a joint framework. Through extensive experiments on large-scale datasets, we demonstrate that our method achieves better results than competitive baselines.Comment: In Proceedings of CoNLL 201

    Architecture for Cooperative Prefetching in P2P Video-on- Demand System

    Full text link
    Most P2P VoD schemes focused on service architectures and overlays optimization without considering segments rarity and the performance of prefetching strategies. As a result, they cannot better support VCRoriented service in heterogeneous environment having clients using free VCR controls. Despite the remarkable popularity in VoD systems, there exist no prior work that studies the performance gap between different prefetching strategies. In this paper, we analyze and understand the performance of different prefetching strategies. Our analytical characterization brings us not only a better understanding of several fundamental tradeoffs in prefetching strategies, but also important insights on the design of P2P VoD system. On the basis of this analysis, we finally proposed a cooperative prefetching strategy called "cooching". In this strategy, the requested segments in VCR interactivities are prefetched into session beforehand using the information collected through gossips. We evaluate our strategy through extensive simulations. The results indicate that the proposed strategy outperforms the existing prefetching mechanisms.Comment: 13 Pages, IJCN

    Text Summarization Using Semantic Technique

    Get PDF
    This work proposes semantic technique as a new approach for text summarization of online news/ journal articles. This text summarization project contains two part: parsing and semantic analysis. At first, for the parsing, we set up criteria to evaluate importance of sentences within text such as position, length. According to this, only sentences with high score of importance will be selected. The number of sentence selected depends on how much compact that users expect summary output would be. System combines those sentences into summary draft. Second part is semantic analysis; the technique we use here is lexical semantic approach. During this part, system will use Word Net lexical database to analyze words within summary draft. This database had words linked through semantic relations such as synonym, antonym, hyponymy, and more. Our project would end up by evaluation process. We evaluate accuracy of summary output, also compare and find differences between human summary work and system result.

    Investigation of Heterogeneous Approach to Fact Invention of Web Users’ Web Access Behaviour

    Get PDF
    World Wide Web consists of a huge volume of different types of data. Web mining is one of the fields of data mining wherein there are different web services and a large number of web users. Web user mining is also one of the fields of web mining. The web users’ information about the web access is collected through different ways. The most common technique to collect information about the web users is through web log file. There are several other techniques available to collect web users’ web access information; they are through browser agent, user authentication, web review, web rating, web ranking and tracking cookies. The web users find it difficult to retrieve their required information in time from the web because of the huge volume of unstructured and structured information which increases the complexity of the web. Web usage mining is very much important for various purposes such as organizing website, business and maintenance service, personalization of website and reducing the network bandwidth. This paper provides an analysis about the web usage mining techniques. Â

    Log Analysis in Cyber Threat Detection

    Get PDF
    Many organizations have good and well-trained staff that run networks that is well-designed with nicely structured procedures and security policies. However, they are still experiencing threatening situations consistently, as result of some worker\u27s defect or unfavorable circumstances and malicious intent. Hackers are consistently creating new complex way of breaching corporate information systems, and organizations need to protect their data, networks and systems in more reliable and effective ways, the most accurate, potent and effective tools in good security portfolio include incident and audit logs generated by networked devices. However, some organizations comprehend what sort of devices to screen and monitor, what data to catch, or how to appropriately assess the data. Also, a few people have the assets and resources required to keep steady over work. This paper will walk you through the basic premise of log analysis - why it is important, what it can tell you and how to do it. I will talk about the five essential elements of a successful log analysis process, its application to monitoring performance, in continuous process monitoring and security (threat hunting and detection) with commercially available solutions, and open with a lot of rules with Source Solutions and compliance law
    • …
    corecore