Filters








1,652 Hits in 4.8 sec

The value of Twitter data for determining the emotional responses of people to urban green spaces: A case study and critical evaluation

Helen Roberts, Jon Sadler, Lee Chapman
2018 Urban Studies  
Wendy Guan from Harvard University's Center for Geographic Analysis for her support through providing us with the Twitter data for our study.  ...  Acknowledgments We would like to express our gratitude to the Austrian Science Fund (FWF) for supporting the project "Urban Emotions", reference number I-3022. We would also like to thank Dr.  ...  Instead, the aims of this article are twofold: 1) To compare the outcomes of manual, fully automated and semi-supervised learning methods of sentiment analysis on the same corpus of tweets 2) To evaluate  ... 
doi:10.1177/0042098017748544 fatcat:mn4wdel3qneafhqcak3p7u4tj4

Investigating the Emotional Responses of Individuals to Urban Green Space Using Twitter Data: A Critical Comparison of Three Different Methods of Sentiment Analysis

Helen Roberts, Bernd Resch, Jon Sadler, Lee Chapman, Andreas Petutschnig, Stefan Zimmer
2018 Urban Planning  
Future attempts to develop more reliable and accurate algorithms of sentiment analysis are needed and should focus on semi-automated methods.  ...  In urban research, Twitter data have the potential to provide additional information about urban citizens, their activities, mobility patterns and emotion.  ...  Wendy Guan from Harvard University's Center for Geographic Analysis for her support through providing us with the Twitter data for our study.  ... 
doi:10.17645/up.v3i1.1231 fatcat:zn6uumrsrzd7tdpck5wi2vndhq

The Status Quo of Ontology Learning from Unstructured Knowledge Sources for Knowledge Management [chapter]

Andreas Scheuermann, Jens Obermann
2014 IFIP Advances in Information and Communication Technology  
Ontologies constitute a basic ingredient of Knowledge Management; thus, ontology learning from unstructured knowledge sources is of particular interest since it bears the potential to bring significant  ...  The review results are analyzed, synthesized, and discussed to give an account of the current stateof-the-art for contributing to an enhanced understanding of ontology learning from unstructured knowledge  ...  The work presented in this paper was partly funded by the German Federal Ministry of Education and Research under the project InterLogGrid (BMBF 01IG09010E).  ... 
doi:10.1007/978-3-642-54897-0_5 fatcat:wvhiuv47pre45it4s5ltffdple

Spam, a Digital Pollution and Ways to Eradicate It

2019 International Journal of Engineering and Advanced Technology  
We then compared all the methods present in the papers to see which method or combination of methods could give the best result in detecting spam.  ...  Due to the growing popularity of the microblogging and networking sites like twitter, Gmail, Facebook etc., there has been an increase in the number of spammers.  ...  One study suggested that over 15% of the active twitter users are automated spam bots.  ... 
doi:10.35940/ijeat.b4107.129219 fatcat:uze7gfg3wrgjdmetvpuhzhl7p4

Automated Text Analysis and International Relations: The Introduction and Application of a Novel Technique for Twitter

Emre Hatipoğlu, Osman Zeki Gökçe, İnanç Arın, Yücel Saygın
2018 All Azimuth A journal of foreign policy and peace  
Significant advances in automated textual analysis have tried to address such challenges of social media data.  ...  To illustrate the usefulness of this technique, we present some of our findings from a project we conducted on Turkish sentiments on Twitter towards Syrian refugees.  ...  Automated sentiment analysis and machine coding of text is another option. 60 Language used on Twitter, however, is "dirty" (i.e., unstructured), hence very difficult to form a relevant "ontology" from  ... 
doi:10.20991/allazimuth.476852 fatcat:hnxdgvdqq5hbvpbvc5z7gwfs7a

A framework for syntactic and semantic quality evaluation of ontologies [article]

Vivek Iyer, Lalit Mohan Sanagavarapu, Raghu Reddy
2021 arXiv   pre-print
The increasing focus on Web 3.0 is leading to automated creation and enrichment of ontologies and other linked datasets.  ...  Alongside automation, quality evaluation of enriched ontologies can impact software reliability and reuse.  ...  Automated or semi-automated approaches to ontology enrichment are increasingly popular, driven by increased availability of domain-relevant internet data and  ... 
arXiv:2112.08543v1 fatcat:5l4h42ymura57ittm5me74ho44

A Literature Research on Machine Learning Techniques used for Training Annotated Corpus

2019 International journal of recent technology and engineering  
Various algorithms are used to perform tasks. The purpose of this survey is to find out algorithms that are often used by researchers to perform annotation tasks, especially on text data.  ...  The result of this survey will be referred by the authors as the basis for subsequent research that will be conducted, especially in the semi-automatic annotation method.  ...  The result of this study will be used as the basis for the use of algorithms in subsequent research that will be conducted, especially in the semi-automatic annotation method of the BahasaMelayu and Bahasa  ... 
doi:10.35940/ijrte.b1063.0882s819 fatcat:muibxiveqffgxp3zobarh27kru

Disambiguating Identity Web References Using Web 2.0 Data and Semantics

Matthew Rowe, Fabio Ciravegna
2010 Social Science Research Network  
Within this paper we present a detailed approach to monitor the web presence of a given individual by obtaining background knowledge from Web 2.0 platforms to support automated disambiguation processes  ...  We present two disambiguation techniques; the first using a semi-supervised machine learning technique known as Self-training and the second using a graph-based technique known as Random Walks, we explain  ...  of automated disambiguation techniques must benefit from the use of seed data.  ... 
doi:10.2139/ssrn.3199481 fatcat:pl3vfuyhozcixl5gnigioltxem

Disambiguating identity web references using Web 2.0 data and semantics

Matthew Rowe, Fabio Ciravegna
2010 Journal of Web Semantics  
Within this paper we present a detailed approach to monitor the web presence of a given individual by obtaining background knowledge from Web 2.0 platforms to support automated disambiguation processes  ...  We present two disambiguation techniques; the first using a semi-supervised machine learning technique known as Self-training and the second using a graph-based technique known as Random Walks, we explain  ...  of automated disambiguation techniques must benefit from the use of seed data.  ... 
doi:10.1016/j.websem.2010.04.005 fatcat:lu5d4gztbvd23jjys4oew3wsfe

Automated machine learning approaches for emergency response and coordination via social media in the aftermath of a disaster: A review

Lokabhiram Dwarakanath, Amirrudin Kamsin, Rasheed Abubakar Rasheed, Anitha Anandhan, Liyana Shuib
2021 IEEE Access  
Many of those recent research articles discuss automated machine learning approaches to extract disaster, indicating posts useful for coordination from various social media posts.  ...  Despite this, there is a scarcity of comprehensive review of all the major research works pertaining to the utilization of machine learning approaches for disaster response using social media posts.  ...  an automated method.  ... 
doi:10.1109/access.2021.3074819 fatcat:2ebym34ewjcgzn7im7gaac7udy

Probabilistic Topic Models for Enriching Ontology from Texts

Anis Tissaoui, Salma Sassi, Richard Chbeir
2020 SN Computer Science  
However, the main challenge in ontology enrichment is its learning, since there is still a lack of relevant approach able to achieve automatic enrichment from a textual corpus or dataset of various topics  ...  In this paper, we describe a new approach for automatic learning of terminological ontologies from textual corpus based on probabilistic models.  ...  Challenge 1: How to provide easy-to-conduct learning of ontologies? -Criterion 1: Degree of Automation criterion (i.e., 'Automatic' or 'Semi-automatic'). -Criterion 2: Evaluation criteria.  ... 
doi:10.1007/s42979-020-00349-y fatcat:75ujrafeczecdgyiyv27dxks2a

Ontology-based Approach for Identifying the Credibility Domain in Social Big Data [article]

Pornpit Wongthontham, Bilal Abu-Salih
2018 arXiv   pre-print
To address this challenge, semantic analysis of textual data is focused in this paper. We propose an ontology-based approach to extract semantics of textual data and define the domain of data.  ...  Case studies are used to demonstrate this approach. We experiment and evaluate our proposed approach with a public dataset collected from Twitter and from the politics domain.  ...  Ontology is an explicit specification of a conceptualisation (Gruber, 1993) . The specification is the representation of the conceptualisations in a concrete form (Stevens, 2001) .  ... 
arXiv:1801.01624v2 fatcat:h74phmtnu5gzhkqjial5urqmrq

Ontology-based sentiment analysis of twitter posts

Efstratios Kontopoulos, Christos Berberidis, Theologos Dergiades, Nick Bassiliades
2013 Expert systems with applications  
This paper proposes the deployment of original ontology-based techniques towards a more efficient sentiment analysis of Twitter posts.  ...  Micro-blogging is one of the most popular Web 2.0 applications and related services, like Twitter, have evolved into a practical means for sharing opinions on almost all aspects of everyday life.  ...  ''Education and Lifelong Learning'' of the Ministry of Education, Lifelong Learning and Religious affairs and is funded by the European Commission (European Social Fund -ESF) and from national resources  ... 
doi:10.1016/j.eswa.2013.01.001 fatcat:rutjtmipzjdp3j2uhgzwiwbyju

What are the attackers doing now? Automating cyber threat intelligence extraction from text on pace with the changing threat landscape: A survey [article]

Md Rayhanur Rahman, Rezvan Mahdavi-Hezaveh, Laurie Williams
2021 arXiv   pre-print
such as threat prioritization, automated threat modelling to utilize knowledge from past cybersecurity incidents.  ...  Cybersecurity researchers have contributed to the automated extraction of CTI from textual sources, such as threat reports and online articles, where cyberattack strategies, procedures, and tools are described  ...  Twitter data.  ... 
arXiv:2109.06808v1 fatcat:tgb7swrslnhppbpg24cyub2sr4

A Bird's Eye View of Natural Language Processing and Requirements Engineering

Assad Alzayed, Ahmed Al-Hunaiyyan
2021 International Journal of Advanced Computer Science and Applications  
Many of these problems stem from a lack of participation by the stakeholders in both phases. Thus, we address the application of NLP during the process of requirements elicitation and analysis.  ...  We reviewed the current literature to evaluate how NLP supports RE and to examine research developments.  ...  ACKNOWLEDGMENT The authors wish to thank the Public Authority for Applied Education and Training for providing the resources needed to conduct this research.  ... 
doi:10.14569/ijacsa.2021.0120512 fatcat:ljjzxsx2pbgx3jpwa2jdppnbfq
« Previous Showing results 1 — 15 out of 1,652 results