1,909 research outputs found

    Using Cross-Lingual Explicit Semantic Analysis for Improving Ontology Translation

    Get PDF
    Semantic Web aims to allow machines to make inferences using the explicit conceptualisations contained in ontologies. By pointing to ontologies, Semantic Web-based applications are able to inter-operate and share common information easily. Nevertheless, multilingual semantic applications are still rare, owing to the fact that most online ontologies are monolingual in English. In order to solve this issue, techniques for ontology localisation and translation are needed. However, traditional machine translation is difficult to apply to ontologies, owing to the fact that ontology labels tend to be quite short in length and linguistically different from the free text paradigm. In this paper, we propose an approach to enhance machine translation of ontologies based on exploiting the well-structured concept descriptions contained in the ontology. In particular, our approach leverages the semantics contained in the ontology by using Cross Lingual Explicit Semantic Analysis (CLESA) for context-based disambiguation in phrase-based Statistical Machine Translation (SMT). The presented work is novel in the sense that application of CLESA in SMT has not been performed earlier to the best of our knowledge

    Security in Data Mining- A Comprehensive Survey

    Get PDF
    Data mining techniques, while allowing the individuals to extract hidden knowledge on one hand, introduce a number of privacy threats on the other hand. In this paper, we study some of these issues along with a detailed discussion on the applications of various data mining techniques for providing security. An efficient classification technique when used properly, would allow an user to differentiate between a phishing website and a normal website, to classify the users as normal users and criminals based on their activities on Social networks (Crime Profiling) and to prevent users from executing malicious codes by labelling them as malicious. The most important applications of Data mining is the detection of intrusions, where different Data mining techniques can be applied to effectively detect an intrusion and report in real time so that necessary actions are taken to thwart the attempts of the intruder. Privacy Preservation, Outlier Detection, Anomaly Detection and PhishingWebsite Classification are discussed in this paper

    Randomised, double-blind, placebo-controlled trials of non-individualised homeopathic treatment: systematic review and meta-analysis

    Get PDF
    Background: A rigorous systematic review and meta-analysis focused on randomised controlled trials (RCTs) of non-individualised homeopathic treatment has not previously been reported. We tested the null hypothesis that the main outcome of treatment using a non-individualised (standardised) homeopathic medicine is indistinguishable from that of placebo. An additional aim was to quantify any condition-specific effects of non-individualised homeopathic treatment. Methods: Literature search strategy, data extraction and statistical analysis all followed the methods described in a pre-published protocol. A trial comprised ‘reliable evidence’ if its risk of bias was low or it was unclear in one specified domain of assessment. ‘Effect size’ was reported as standardised mean difference (SMD), with arithmetic transformation for dichotomous data carried out as required; a negative SMD indicated an effect favouring homeopathy. Results: Forty-eight different clinical conditions were represented in 75 eligible RCTs. Forty-nine trials were classed as ‘high risk of bias’ and 23 as ‘uncertain risk of bias’; the remaining three, clinically heterogeneous, trials displayed sufficiently low risk of bias to be designated reliable evidence. Fifty-four trials had extractable data: pooled SMD was –0.33 (95% confidence interval (CI) –0.44, –0.21), which was attenuated to –0.16 (95% CI –0.31, –0.02) after adjustment for publication bias. The three trials with reliable evidence yielded a non-significant pooled SMD: –0.18 (95% CI –0.46, 0.09). There was no single clinical condition for which meta-analysis included reliable evidence. Conclusions: The quality of the body of evidence is low. A meta-analysis of all extractable data leads to rejection of our null hypothesis, but analysis of a small sub-group of reliable evidence does not support that rejection. Reliable evidence is lacking in condition-specific meta-analyses, precluding relevant conclusions. Better designed and more rigorous RCTs are needed in order to develop an evidence base that can decisively provide reliable effect estimates of non-individualised homeopathic treatment

    Intramolecular Force Fields and Vibrational Amplitudes of some Octahedral Systems

    Get PDF

    Systems and Methods for Gravity-Independent Gripping and Drilling

    Get PDF
    Systems and methods for gravity independent gripping and drilling are described. The gripping device can also comprise a drill or sampling devices for drilling and/or sampling in microgravity environments, or on vertical or inverted surfaces in environments where gravity is present. A robotic system can be connected with the gripping and drilling devices via an ankle interface adapted to distribute the forces realized from the robotic system

    The Role of Surface Area in Catalytic Gasification of Biomass

    Get PDF
    Gasification of biomass has the potential to provide a carbon-negative source of liquid fuels. The current limited use of gasification is due in part to the high temperatures necessary to achieve high conversion levels. These temperatures can be lowered by the use of catalysts, but the mechanisms by which catalysts affect the reaction rate are not fully understood. Here, the structural component of potassium carbonate’s role in the gasification process was examined. Samples of pinewood sawdust were impregnated with potassium carbonate, then pyrolyzed with N2 in a fixed bed reactor at 750°C (heater thermocouple reading). Half of the char was washed with deionized water twice to remove potassium ions. The char was ground to a 150 micron diameter. Gasification of the samples was performed using CO2 at 750°C and 900°C. Reaction rates over time were compared to the reaction rate of pure pinewood sawdust char. The pure char was then impregnated with K2CO3 and gasified, allowing a comparison to be made between the efficacy of impregnating the sawdust versus the char. Results show that after washing, the impregnated char shows similar or decreased reactivity compared to the pure char. Preliminary results do suggest that impregnation of the sawdust leads to greater reactivity over time than impregnation of the char. The results do not suggest a strong influence of surface area change during impregnation on the reactivity of the char

    Randomized trial of conventional transseptal needle versus radiofrequency energy needle puncture for left atrial access (the TRAVERSE-LA study).

    Get PDF
    BackgroundTransseptal puncture is a critical step in achieving left atrial (LA) access for a variety of cardiac procedures. Although the mechanical Brockenbrough needle has historically been used for this procedure, a needle employing radiofrequency (RF) energy has more recently been approved for clinical use. We sought to investigate the comparative effectiveness of an RF versus conventional needle for transseptal LA access.Methods and resultsIn this prospective, single-blinded, controlled trial, 72 patients were randomized in a 1:1 fashion to an RF versus conventional (BRK-1) transseptal needle. In an intention-to-treat analysis, the primary outcome was time required for transseptal LA access. Secondary outcomes included failure of the assigned needle, visible plastic dilator shavings from needle introduction, and any procedural complication. The median transseptal puncture time was 68% shorter using the RF needle compared with the conventional needle (2.3 minutes [interquartile range {IQR}, 1.7 to 3.8 minutes] versus 7.3 minutes [IQR, 2.7 to 14.1 minutes], P = 0.005). Failure to achieve transseptal LA access with the assigned needle was less common using the RF versus conventional needle (0/36 [0%] versus 10/36 [27.8%], P < 0.001). Plastic shavings were grossly visible after needle advancement through the dilator and sheath in 0 (0%) RF needle cases and 12 (33.3%) conventional needle cases (P < 0.001). There were no differences in procedural complications (1/36 [2.8%] versus 1/36 [2.8%]).ConclusionsUse of an RF needle resulted in shorter time to transseptal LA access, less failure in achieving transseptal LA access, and fewer visible plastic shavings
    corecore