11 research outputs found

    Improving Persian Information Retrieval Systems Using Stemming and Part of Speech Tagging

    Get PDF
    With the emergence of vast resources of information, it is necessary to develop methods that retrieve the most relevant information according to needs. These retrieval methods may benefit from natural language constructs to boost their results by achieving higher precision and recall rates. In this study, we have used part of speech properties of terms as extra source of information about document and query terms and have evaluated the impact of such data on the performance of the Persian retrieval algorithms. Also the effect of stemming has been experimented as a complement to this research. Our findings indicate that part of speech tags may have small influence on effectiveness of the retrieved results. However, when this information is combined with stemming it improves the accuracy of the outcomes considerably

    Summary Generation and Evaluation in SumUM

    No full text

    Design and Implementation of an Ontology Algorithm for Web Documents Classification

    No full text

    Capture of Evidence for Summarization: An Application of Enhanced Subjective Logic

    No full text

    Semantic analysis for monitoring insider threats

    Get PDF
    Malicious insiders ’ difficult-to-detect activities pose serious threats to the intelligence community (IC) when these activities go undetected. A novel approach that integrates the results of social network analysis, role-based access monitoring, and semantic analysis of insiders ’ communications as evidence for evaluation by a risk assessor is being tested on an IC simulation. A semantic analysis, by our proven Natural Language Processing (NLP) system, of the insider’s text-based communications produces conceptual representations that are clustered and compared on the expected vs. observed scope. The determined risk level produces an input to a risk analysis algorithm that is merged with outputs from the system’s social network analysis and role-based monitoring modules

    A domain ontology building process for guiding requirements elicitation

    No full text
    [Context and motivation] In Requirements Management, ontologies are used to reconcile gaps in the knowledge and common understanding among stakeholders during requirement elicitation, and therefore significantly improve the quality of the elicited requirements.<p></p> [Question/problem] However, a precondition of state-of-the-art ontology approaches for requirements elicitation is an existing domain ontology. While this is not a trivial precondition, there are only a few reports on approaches to systematically and efficiently build domain ontologies, and these approaches are often highly biased towards their intended use.<p></p> [Principal ideas/results] In this paper, we investigate an approach for building domain ontologies suitable for guiding requirements elicitation. We evaluate the feasibility of the approach based on a real-world industrial use case by analyzing natural language text from technical standards.<p></p> [Contribution] A major outcome is that the proposed approach can help reduce the effort of building domain ontologies from the scratch

    Robust argumentative zoning for sensemaking in scholarly documents

    No full text
    10.1007/978-3-642-23160-5_10Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)6699 LNCS154-17
    corecore