期刊文献+
共找到251篇文章
< 1 2 13 >
每页显示 20 50 100
Transfer Hierarchical Attention Network for Generative Dialog System 被引量:6
1
作者 Xiang Zhang Qiang Yang 《International Journal of Automation and computing》 EI CSCD 2019年第6期720-736,共17页
In generative dialog systems, learning representations for the dialog context is a crucial step in generating high quality responses. The dialog systems are required to capture useful and compact information from mutu... In generative dialog systems, learning representations for the dialog context is a crucial step in generating high quality responses. The dialog systems are required to capture useful and compact information from mutually dependent sentences such that the generation process can effectively attend to the central semantics. Unfortunately, existing methods may not effectively identify importance distributions for each lower position when computing an upper level feature, which may lead to the loss of information critical to the constitution of the final context representations. To address this issue, we propose a transfer learning based method named transfer hierarchical attention network(THAN). The THAN model can leverage useful prior knowledge from two related auxiliary tasks, i.e.,keyword extraction and sentence entailment, to facilitate the dialog representation learning for the main dialog generation task. During the transfer process, the syntactic structure and semantic relationship from the auxiliary tasks are distilled to enhance both the wordlevel and sentence-level attention mechanisms for the dialog system. Empirically, extensive experiments on the Twitter Dialog Corpus and the PERSONA-CHAT dataset demonstrate the effectiveness of the proposed THAN model compared with the state-of-the-art methods. 展开更多
关键词 DIALOG system TRANSFER LEARNING deep LEARNING natural language processing(nlp) artificial INTELLIGENCE
原文传递
TriCTI:an actionable cyber threat intelligence discovery system via trigger-enhanced neural network 被引量:5
2
作者 Jian Lu Junjie Yan +5 位作者 Jun Jiang Yitong He Xuren Wang Zhengwei jiang Peian Yang Ning Li 《Cybersecurity》 EI CSCD 2022年第3期18-33,共16页
The cybersecurity report provides unstructured actionable cyber threat intelligence(CTI)with detailed threat attack procedures and indicators of compromise(IOCs),e.g.,malware hash or URL(uniform resource locator)of co... The cybersecurity report provides unstructured actionable cyber threat intelligence(CTI)with detailed threat attack procedures and indicators of compromise(IOCs),e.g.,malware hash or URL(uniform resource locator)of command and control server.The actionable CTI,integrated into intrusion detection systems,can not only prioritize the most urgent threats based on the campaign stages of attack vectors(i.e.,IOCs)but also take appropriate mitigation measures based on contextual information of the alerts.However,the dramatic growth in the number of cybersecurity reports makes it nearly impossible for security professionals to find an efficient way to use these massive amounts of threat intelligence.In this paper,we propose a trigger-enhanced actionable CTI discovery system(TriCTI)to portray a relationship between IOCs and campaign stages and generate actionable CTI from cybersecurity reports through natural language processing(NLP)technology.Specifically,we introduce the“campaign trigger”for an effective explanation of the campaign stages to improve the performance of the classification model.The campaign trigger phrases are the keywords in the sentence that imply the campaign stage.The trained final trigger vectors have similar space representations with the keywords in the unseen sentence and will help correct classification by increasing the weight of the keywords.We also meticulously devise a data augmentation specifically for cybersecurity training sets to cope with the challenge of the scarcity of annotation data sets.Compared with state-of-the-art text classification models,such as BERT,the trigger-enhanced classification model has better performance with accuracy(86.99%)and F1 score(87.02%).We run TriCTI on more than 29k cybersecurity reports,from which we automatically and efficiently collect 113,543 actionable CTI.In particular,we verify the actionability of discovered CTI by using large-scale field data from VirusTotal(VT).The results demonstrate that the threat intelligence provided by VT lacks a part of 展开更多
关键词 Actionable cyber threat intelligence Campaign trigger Indicators of compromise(IOCs) Natural language processing(nlp)
原文传递
TIM: threat context-enhanced TTP intelligence mining on unstructured threat data 被引量:5
3
作者 Yizhe You Jun Jiang +5 位作者 Zhengwei Jiang Peian Yang Baoxu Liu Huamin Feng Xuren Wang Ning Li 《Cybersecurity》 EI CSCD 2022年第2期10-26,共17页
TTPs (Tactics, Techniques, and Procedures), which represent an attacker’s goals and methods, are the long period and essential feature of the attacker. Defenders can use TTP intelligence to perform the penetration te... TTPs (Tactics, Techniques, and Procedures), which represent an attacker’s goals and methods, are the long period and essential feature of the attacker. Defenders can use TTP intelligence to perform the penetration test and compensate for defense deficiency. However, most TTP intelligence is described in unstructured threat data, such as APT analysis reports. Manually converting natural language TTPs descriptions to standard TTP names, such as ATT&CK TTP names and IDs, is time-consuming and requires deep expertise. In this paper, we define the TTP classification task as a sentence classification task. We annotate a new sentence-level TTP dataset with 6 categories and 6061 TTP descriptions from 10761 security analysis reports. We construct a threat context-enhanced TTP intelligence mining (TIM) framework to mine TTP intelligence from unstructured threat data. The TIM framework uses TCENet (Threat Context Enhanced Network) to find and classify TTP descriptions, which we define as three continuous sentences, from textual data. Meanwhile, we use the element features of TTP in the descriptions to enhance the TTPs classification accuracy of TCENet. The evaluation result shows that the average classification accuracy of our proposed method on the 6 TTP categories reaches 0.941. The evaluation results also show that adding TTP element features can improve our classification accuracy compared to using only text features. TCENet also achieved the best results compared to the previous document-level TTP classification works and other popular text classification methods, even in the case of few-shot training samples. Finally, the TIM framework organizes TTP descriptions and TTP elements into STIX 2.1 format as final TTP intelligence for sharing the long-period and essential attack behavior characteristics of attackers. In addition, we transform TTP intelligence into sigma detection rules for attack behavior detection. Such TTP intelligence and rules can help defenders deploy long-term effective threat detection and perform 展开更多
关键词 TTPs Threat intelligence Natural language processing(nlp) Advanced persistent threat(APT)
原文传递
Deep-BERT:Transfer Learning for Classifying Multilingual Offensive Texts on Social Media 被引量:3
4
作者 Md.Anwar Hussen Wadud M.F.Mridha +2 位作者 Jungpil Shin Kamruddin Nur Aloke Kumar Saha 《Computer Systems Science & Engineering》 SCIE EI 2023年第2期1775-1791,共17页
Offensive messages on social media,have recently been frequently used to harass and criticize people.In recent studies,many promising algorithms have been developed to identify offensive texts.Most algorithms analyze ... Offensive messages on social media,have recently been frequently used to harass and criticize people.In recent studies,many promising algorithms have been developed to identify offensive texts.Most algorithms analyze text in a unidirectional manner,where a bidirectional method can maximize performance results and capture semantic and contextual information in sentences.In addition,there are many separate models for identifying offensive texts based on monolin-gual and multilingual,but there are a few models that can detect both monolingual and multilingual-based offensive texts.In this study,a detection system has been developed for both monolingual and multilingual offensive texts by combining deep convolutional neural network and bidirectional encoder representations from transformers(Deep-BERT)to identify offensive posts on social media that are used to harass others.This paper explores a variety of ways to deal with multilin-gualism,including collaborative multilingual and translation-based approaches.Then,the Deep-BERT is tested on the Bengali and English datasets,including the different bidirectional encoder representations from transformers(BERT)pre-trained word-embedding techniques,and found that the proposed Deep-BERT’s efficacy outperformed all existing offensive text classification algorithms reaching an accuracy of 91.83%.The proposed model is a state-of-the-art model that can classify both monolingual-based and multilingual-based offensive texts. 展开更多
关键词 Offensive text classification deep convolutional neural network(DCNN) bidirectional encoder representations from transformers(BERT) natural language processing(nlp)
下载PDF
GraphFlow+:Exploiting Conversation Flow in Conversational Machine Comprehension with Graph Neural Networks
5
作者 Jing Hu Lingfei Wu +2 位作者 Yu Chen Po Hu Mohammed J.Zaki 《Machine Intelligence Research》 EI CSCD 2024年第2期272-282,共11页
The conversation machine comprehension(MC)task aims to answer questions in the multi-turn conversation for a single passage.However,recent approaches don’t exploit information from historical conversations effectivel... The conversation machine comprehension(MC)task aims to answer questions in the multi-turn conversation for a single passage.However,recent approaches don’t exploit information from historical conversations effectively,which results in some references and ellipsis in the current question cannot be recognized.In addition,these methods do not consider the rich semantic relationships between words when reasoning about the passage text.In this paper,we propose a novel model GraphFlow+,which constructs a context graph for each conversation turn and uses a unique recurrent graph neural network(GNN)to model the temporal dependencies between the context graphs of each turn.Specifically,we exploit three different ways to construct text graphs,including the dynamic graph,static graph,and hybrid graph that combines the two.Our experiments on CoQA,QuAC and DoQA show that the GraphFlow+model can outperform the state-of-the-art approaches. 展开更多
关键词 Conversational machine comprehension(MC) reading comprehension question answering graph neural networks(GNNs) natural language processing(nlp)
原文传递
Unlocking the Potential:A Comprehensive Systematic Review of ChatGPT in Natural Language Processing Tasks
6
作者 Ebtesam Ahmad Alomari 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第10期43-85,共43页
As Natural Language Processing(NLP)continues to advance,driven by the emergence of sophisticated large language models such as ChatGPT,there has been a notable growth in research activity.This rapid uptake reflects in... As Natural Language Processing(NLP)continues to advance,driven by the emergence of sophisticated large language models such as ChatGPT,there has been a notable growth in research activity.This rapid uptake reflects increasing interest in the field and induces critical inquiries into ChatGPT’s applicability in the NLP domain.This review paper systematically investigates the role of ChatGPT in diverse NLP tasks,including information extraction,Name Entity Recognition(NER),event extraction,relation extraction,Part of Speech(PoS)tagging,text classification,sentiment analysis,emotion recognition and text annotation.The novelty of this work lies in its comprehensive analysis of the existing literature,addressing a critical gap in understanding ChatGPT’s adaptability,limitations,and optimal application.In this paper,we employed a systematic stepwise approach following the Preferred Reporting Items for Systematic Reviews and Meta-Analyses(PRISMA)framework to direct our search process and seek relevant studies.Our review reveals ChatGPT’s significant potential in enhancing various NLP tasks.Its adaptability in information extraction tasks,sentiment analysis,and text classification showcases its ability to comprehend diverse contexts and extract meaningful details.Additionally,ChatGPT’s flexibility in annotation tasks reducesmanual efforts and accelerates the annotation process,making it a valuable asset in NLP development and research.Furthermore,GPT-4 and prompt engineering emerge as a complementary mechanism,empowering users to guide the model and enhance overall accuracy.Despite its promising potential,challenges persist.The performance of ChatGP Tneeds tobe testedusingmore extensivedatasets anddiversedata structures.Subsequently,its limitations in handling domain-specific language and the need for fine-tuning in specific applications highlight the importance of further investigations to address these issues. 展开更多
关键词 Generative AI large languagemodel(LLM) natural language processing(nlp) ChatGPT GPT(generative pretraining transformer) GPT-4 sentiment analysis NER information extraction ANNOTATION text classification
下载PDF
Comparative Analysis of Machine Learning Algorithms for Email Phishing Detection Using TF-IDF, Word2Vec, and BERT
7
作者 Arar Al Tawil Laiali Almazaydeh +3 位作者 Doaa Qawasmeh Baraah Qawasmeh Mohammad Alshinwan Khaled Elleithy 《Computers, Materials & Continua》 SCIE EI 2024年第11期3395-3412,共18页
Cybercriminals often use fraudulent emails and fictitious email accounts to deceive individuals into disclosing confidential information,a practice known as phishing.This study utilizes three distinct methodologies,Te... Cybercriminals often use fraudulent emails and fictitious email accounts to deceive individuals into disclosing confidential information,a practice known as phishing.This study utilizes three distinct methodologies,Term Frequency-Inverse Document Frequency,Word2Vec,and Bidirectional Encoder Representations from Transform-ers,to evaluate the effectiveness of various machine learning algorithms in detecting phishing attacks.The study uses feature extraction methods to assess the performance of Logistic Regression,Decision Tree,Random Forest,and Multilayer Perceptron algorithms.The best results for each classifier using Term Frequency-Inverse Document Frequency were Multilayer Perceptron(Precision:0.98,Recall:0.98,F1-score:0.98,Accuracy:0.98).Word2Vec’s best results were Multilayer Perceptron(Precision:0.98,Recall:0.98,F1-score:0.98,Accuracy:0.98).The highest performance was achieved using the Bidirectional Encoder Representations from the Transformers model,with Precision,Recall,F1-score,and Accuracy all reaching 0.99.This study highlights how advanced pre-trained models,such as Bidirectional Encoder Representations from Transformers,can significantly enhance the accuracy and reliability of fraud detection systems. 展开更多
关键词 ATTACKS email phishing machine learning security representations from transformers(BERT) text classifeir natural language processing(nlp)
下载PDF
Improving Entity Linking in Chinese Domain by Sense Embedding Based on Graph Clustering 被引量:1
8
作者 张照博 钟芷漫 +1 位作者 袁平鹏 金海 《Journal of Computer Science & Technology》 SCIE EI CSCD 2023年第1期196-210,共15页
Entity linking refers to linking a string in a text to corresponding entities in a knowledge base through candidate entity generation and candidate entity ranking.It is of great significance to some NLP(natural langua... Entity linking refers to linking a string in a text to corresponding entities in a knowledge base through candidate entity generation and candidate entity ranking.It is of great significance to some NLP(natural language processing)tasks,such as question answering.Unlike English entity linking,Chinese entity linking requires more consideration due to the lack of spacing and capitalization in text sequences and the ambiguity of characters and words,which is more evident in certain scenarios.In Chinese domains,such as industry,the generated candidate entities are usually composed of long strings and are heavily nested.In addition,the meanings of the words that make up industrial entities are sometimes ambiguous.Their semantic space is a subspace of the general word embedding space,and thus each entity word needs to get its exact meanings.Therefore,we propose two schemes to achieve better Chinese entity linking.First,we implement an ngram based candidate entity generation method to increase the recall rate and reduce the nesting noise.Then,we enhance the corresponding candidate entity ranking mechanism by introducing sense embedding.Considering the contradiction between the ambiguity of word vectors and the single sense of the industrial domain,we design a sense embedding model based on graph clustering,which adopts an unsupervised approach for word sense induction and learns sense representation in conjunction with context.We test the embedding quality of our approach on classical datasets and demonstrate its disambiguation ability in general scenarios.We confirm that our method can better learn candidate entities’fundamental laws in the industrial domain and achieve better performance on entity linking through experiments. 展开更多
关键词 natural language processing(nlp) domain entity linking computational linguistics word sense disambiguation knowledge graph
原文传递
Traditional Chinese medicine Master XIONG Jibo’s medication experience in treating arthralgia syndrome through data mining 被引量:2
9
作者 DENG Wenxiang ZHANG Jidong +1 位作者 ZHANG Wenan HE Qinghu 《Digital Chinese Medicine》 2022年第2期154-168,共15页
Objective This study aimed to examine and propagate the medication experience and group formula of traditional Chinese medicine(TCM)Master XIONG Jibo in diagnosing and treat-ing arthralgia syndrome(AS)through data min... Objective This study aimed to examine and propagate the medication experience and group formula of traditional Chinese medicine(TCM)Master XIONG Jibo in diagnosing and treat-ing arthralgia syndrome(AS)through data mining.Methods Data of outpatient cases of Professor XIONG Jibo were collected from January 1,2014 to December 31,2018,along with cases recorded in A Real Famous Traditional Chinese Medicine Doctor:XIONG Jibo's Clinical Medical Record 1,which was published in December 2019.The five variables collected from the patients’data were TCM diagnostic information,TCM and western medicine diagnoses,syndrome,treatment,and prescription.A database was established for the collected data with Excel.Using the Python environment,a custom-ized modified natural language processing(NLP)model for the diagnosis and treatment of AS by Professor XIONG Jibo was established to preprocess the data and to analyze the word cloud.Frequency analysis,association rule analysis,cluster analysis,and visual analysis of AS cases were performed based on the Traditional Chinese Medicine Inheritance Computing Platform(V3.0)and RStudio(V4.0.3).Results A total of 610 medical records of Professor XIONG Jibo were collected from the case database.A total of 103 medical records were included after data screening criteria,which comprised 187 times(45 kinds)of prescriptions and 1506 times(125 kinds)of Chinese herbs.The main related meridians were the liver,spleen,and kidney meridians.The properties of Chinese herbs used most were mainly warm,flat,and cold,while the flavors of herbs were mainly bitter,pungent,and sweet.The main patterns of AS included the damp heat,phlegm stasis,and neck arthralgia.The most commonly used herbs for AS were Chuanniuxi(Cyathu-lae Radix),Huangbo(Phellodendri Chinensis Cortex),Cangzhu(Atractylodis Rhizoma),Qinjiao(Gentianae Macrophyllae Radix),Gancao(Glycyrrhizae Radix et Rhizoma),Huangqi(Astragali Radix),and Chuanxiong(Chuanxiong Rhizoma).The most common effect of the herbs was“promoting blood circulation and removin 展开更多
关键词 Traditional Chinese medicine Master XIONG Jibo Arthralgia syndrome Data mining Natural language processing(nlp) Medication experience Association rules
下载PDF
Red Alarm for Pre-trained Models:Universal Vulnerability to Neuron-level Backdoor Attacks
10
作者 Zhengyan Zhang Guangxuan Xiao +6 位作者 Yongwei Li Tian Lv Fanchao Qi Zhiyuan Liu Yasheng Wang Xin Jiang Maosong Sun 《Machine Intelligence Research》 EI CSCD 2023年第2期180-193,共14页
The pre-training-then-fine-tuning paradigm has been widely used in deep learning.Due to the huge computation cost for pre-training,practitioners usually download pre-trained models from the Internet and fine-tune them... The pre-training-then-fine-tuning paradigm has been widely used in deep learning.Due to the huge computation cost for pre-training,practitioners usually download pre-trained models from the Internet and fine-tune them on downstream datasets,while the downloaded models may suffer backdoor attacks.Different from previous attacks aiming at a target task,we show that a backdoored pre-trained model can behave maliciously in various downstream tasks without foreknowing task information.Attackers can restrict the output representations(the values of output neurons)of trigger-embedded samples to arbitrary predefined values through additional training,namely neuron-level backdoor attack(NeuBA).Since fine-tuning has little effect on model parameters,the fine-tuned model will retain the backdoor functionality and predict a specific label for the samples embedded with the same trigger.To provoke multiple labels in a specific task,attackers can introduce several triggers with predefined contrastive values.In the experiments of both natural language processing(NLP)and computer vision(CV),we show that NeuBA can well control the predictions for trigger-embedded instances with different trigger designs.Our findings sound a red alarm for the wide use of pre-trained models.Finally,we apply several defense methods to NeuBA and find that model pruning is a promising technique to resist NeuBA by omitting backdoored neurons. 展开更多
关键词 Pre-trained language models backdoor attacks transformers natural language processing(nlp) computer vision(CV)
原文传递
Improving BERT Fine-Tuning via Self-Ensemble and Self-Distillation
11
作者 许一格 邱锡鹏 +1 位作者 周浬皋 黄萱菁 《Journal of Computer Science & Technology》 SCIE EI CSCD 2023年第4期853-866,共14页
Fine-tuning pre-trained language models like BERT have become an effective way in natural language processing(NLP)and yield state-of-the-art results on many downstream tasks.Recent studies on adapting BERT to new task... Fine-tuning pre-trained language models like BERT have become an effective way in natural language processing(NLP)and yield state-of-the-art results on many downstream tasks.Recent studies on adapting BERT to new tasks mainly focus on modifying the model structure,re-designing the pre-training tasks,and leveraging external data and knowledge.The fine-tuning strategy itself has yet to be fully explored.In this paper,we improve the fine-tuning of BERT with two effective mechanisms:self-ensemble and self-distillation.The self-ensemble mechanism utilizes the checkpoints from an experience pool to integrate the teacher model.In order to transfer knowledge from the teacher model to the student model efficiently,we further use knowledge distillation,which is called self-distillation because the distillation comes from the model itself through the time dimension.Experiments on the GLUE benchmark and the Text Classification benchmark show that our proposed approach can significantly improve the adaption of BERT without any external data or knowledge.We conduct exhaustive experiments to investigate the efficiency of the self-ensemble and self-distillation mechanisms,and our proposed approach achieves a new state-of-the-art result on the SNLI dataset. 展开更多
关键词 BERT deep learning fine-tuning natural language processing(nlp) pre-training model
原文传递
RegenX: an NLP recommendation engine for neuroregeneration topics over time
12
作者 Shaan Khosla Leila Abdelrahman +2 位作者 Joseph Johnson Mohammad Samarah Sanjoy K.Bhattacharya 《Annals of Eye Science》 2022年第1期33-41,共9页
Background:In this investigation,we explore the literature regarding neuroregeneration from the 1700s to the present.The regeneration of central nervous system neurons or the regeneration of axons from cell bodies and... Background:In this investigation,we explore the literature regarding neuroregeneration from the 1700s to the present.The regeneration of central nervous system neurons or the regeneration of axons from cell bodies and their reconnection with other neurons remains a major hurdle.Injuries relating to war and accidents attracted medical professionals throughout early history to regenerate and reconnect nerves.Early literature till 1990 lacked specific molecular details and is likely provide some clues to conditions that promoted neuron and/or axon regeneration.This is an avenue for the application of natural language processing(NLP)to gain actionable intelligence.Post 1990 period saw an explosion of all molecular details.With the advent of genomic,transcriptomics,proteomics,and other omics-there is an emergence of big data sets and is another rich area for application of NLP.How the neuron and/or axon regeneration related keywords have changed over the years is a first step towards this endeavor.Methods:Specifically,this article curates over 600 published works in the field of neuroregeneration.We then apply a dynamic topic modeling algorithm based on the Latent Dirichlet allocation(LDA)algorithm to assess how topics cluster based on topics.Results:Based on how documents are assigned to topics,we then build a recommendation engine to assist researchers to access domain-specific literature based on how their search text matches to recommended document topics.The interface further includes interactive topic visualizations for researchers to understand how topics grow closer and further apart,and how intra-topic composition changes over time.Conclusions:We present a recommendation engine and interactive interface that enables dynamic topic modeling for neuronal regeneration. 展开更多
关键词 REGENERATION natural language processing(nlp) machine learning deep learning
下载PDF
Metaphor Analysis Method Based on Latent Semantic Analysis
13
作者 TAO Ran WEI Yaping YANG Tangfeng 《Journal of Donghua University(English Edition)》 CAS 2021年第1期83-90,共8页
Current research on metaphor analysis is generally knowledge-based and corpus-based,which calls for methods of automatic feature extraction and weight calculation.Combining natural language processing(NLP),latent sema... Current research on metaphor analysis is generally knowledge-based and corpus-based,which calls for methods of automatic feature extraction and weight calculation.Combining natural language processing(NLP),latent semantic analysis(LSA),and Pearson correlation coefficient,this paper proposes a metaphor analysis method for extracting the content words from both literal and metaphorical corpus,calculating correlation degree,and analyzing their relationships.The value of the proposed method was demonstrated through a case study by using a corpus with keyword“飞翔(fly)”.When compared with the method of Pearson correlation coefficient,the experiment shows that the LSA can produce better results with greater significance in correlation degree.It is also found that the number of common words that appeared in both literal and metaphorical word bags decreased with the correlation degree.The case study also revealed that there are more nouns appear in literal corpus,and more adjectives and adverbs appear in metaphorical corpus.The method proposed will benefit NLP researchers to develop the required step-by-step calculation tools for accurate quantitative analysis. 展开更多
关键词 latent semantic analysis(LSA) METAPHOR natural language processing(nlp) pearson correlation coefficient
下载PDF
Language-Segmented Study Based on TripAdvisor Reviews Related to Memorable Tourist Experiences
14
作者 Fernando Toro Sánchez 《Journal of Tourism and Hospitality Management》 2021年第4期204-220,共17页
The Memorable Tourist Experience(MTE)is a scientific concept within the studies on tourism that is developed based on several related constructions:Perceived Confidence,Sincerity,Authenticity,and Satisfaction.This wor... The Memorable Tourist Experience(MTE)is a scientific concept within the studies on tourism that is developed based on several related constructions:Perceived Confidence,Sincerity,Authenticity,and Satisfaction.This work takes this model established by the work of Dr.Babak Taheri in 2018 on Monuments World Heritage of UNESCO,adopting an alternative data collection method to the face-to-face survey.Therefore,this work takes as a source of data the reviews collected in the recommendation platform TripAdvisor,working the same constructions of the MTE,with the collection of similar terms and the relationships between them.In order to highlight the terms,a first step is established with the use of Natural Language Processing(NLP),followed by the use of Machine Learning(ML)techniques to generate the relationships between the constructors defined in the models.The study makes a comparison using the method,in immaterial nature such as a flamenco show in the city of Seville;Flamenco has been declared by UNESCO an intangible World Heritage Site since 2010.The results of the study go in two directions:on the one hand to find similarities in the study of the specific MTE of both monuments with the hypotheses worked in the original model of Taheri.In addition to highlighting possible distinctive elements of each case and,and furthermore within the value contribution of the visit when it is led by an official tour guide,on the other hand,give presence to the model of obtaining data by reviews as a complementary data source of any tourist study.The data collection and analysis from both NLP and ML techniques permit the scientific study and the tourist operators to develop better value propositions to users and understanding of heterogeneous behaviors in the tourism industry.The study of reviews within the MTE allows identifying the stimulus that leads the user to choose an activity and hire it.These studies are extendable to other industries and business models,given the importance that references acquire within the consumer will 展开更多
关键词 Memorable Tourist Experience(MTE) TripAdvisor World Heritage Site Machine Learning(ML) Natural Language processing(nlp)
下载PDF
A Use Case of Patent Classification Using Deep Learning with Transfer Learning
15
作者 Roberto Henriques Adria Ferreira Mauro Castelli 《Journal of Data and Information Science》 CSCD 2022年第3期49-70,共22页
Purpose:Patent classification is one of the areas in Intellectual Property Analytics(IPA),and a growing use case since the number of patent applications has been increasing worldwide.We propose using machine learning ... Purpose:Patent classification is one of the areas in Intellectual Property Analytics(IPA),and a growing use case since the number of patent applications has been increasing worldwide.We propose using machine learning algorithms to classify Portuguese patents and evaluate the performance of transfer learning methodologies to solve this task.Design/methodology/approach:We applied three different approaches in this paper.First,we used a dataset available by INPI to explore traditional machine learning algorithms and ensemble methods.After preprocessing data by applying TF-IDF,FastText and Doc2Vec,the models were evaluated by cross-validation in 5 folds.In a second approach,we used two different Neural Networks architectures,a Convolutional Neural Network(CNN)and a bi-directional Long Short-Term Memory(BiLSTM).Finally,we used pre-trained BERT,DistilBERT,and ULMFiT models in the third approach.Findings:BERTTimbau,a BERT architecture model pre-trained on a large Portuguese corpus,presented the best results for the task,even though with a performance of only 4%superior to a LinearSVC model using TF-IDF feature engineering.Research limitations:The dataset was highly imbalanced,as usual in patent applications,so the classes with the lowest samples were expected to present the worst performance.That result happened in some cases,especially in classes with less than 60 training samples.Practical implications:Patent classification is challenging because of the hierarchical classification system,the context overlap,and the underrepresentation of the classes.However,the final model presented an acceptable performance given the size of the dataset and the task complexity.This model can support the decision and improve the time by proposing a category in the second level of ICP,which is one of the critical phases of the grant patent process.Originality/value:To our knowledge,the proposed models were never implemented for Portuguese patent classification. 展开更多
关键词 Natural Language processing(nlp) Patent classification Transfer Learning Bi-directional Encoder Representations for Transformers(BERT)
下载PDF
TSLocator: A Transformer-Based Approach to Bug Localization
16
作者 HU Cheng XIAO Yuliang 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2021年第2期200-206,共7页
For projects with thousands of files, finding the locations of bugs is time-consuming and labor-intensive. Bug reports as a potential resource to help locate bugs in source codes have been used to design automatic too... For projects with thousands of files, finding the locations of bugs is time-consuming and labor-intensive. Bug reports as a potential resource to help locate bugs in source codes have been used to design automatic tools to solve this problem. Existing information retrieval(IR)-based bug localization methods rely heavily on the similarity score between bug report and historical reports. As deep learning methods show great advantages in calculating text semantic similarity, we adapt the transformer network with IR-based bug localization methods to design a novel approach, TSLocator, to bug localization. In TSLocator, we propose five new features between bug reports and source codes. We use SVMRank to model the relation between all the six features and the actual buggy file. Given a new bug report, TSLocator automatically calculates the features and linearly weights the features to produce a suspicious score for all candidate files. TSLocator recommends a list of suspicious buggy files ranked by the score. The experimental results show that TSLocator outperforms existing methods in accuracy and performance of bug localization. 展开更多
关键词 bug localization TRANSFORMER information retrieval SVM(support vector machine) natural language processing(nlp)
原文传递
Spontaneous Language Analysis in Alzheimer’s Disease:Evaluation of Natural Language Processing Technique for Analyzing Lexical Performance
17
作者 Liu Ning Yuan Zhenming 《Journal of Shanghai Jiaotong university(Science)》 EI 2022年第2期160-167,共8页
Language disorder,a common manifestation of Alzheimer’s disease(AD),has attracted widespread attention in recent years.This paper uses a novel natural language processing(NLP)method,compared with latest deep learning... Language disorder,a common manifestation of Alzheimer’s disease(AD),has attracted widespread attention in recent years.This paper uses a novel natural language processing(NLP)method,compared with latest deep learning technology,to detect AD and explore the lexical performance.Our proposed approach is based on two stages.First,the dialogue contents are summarized into two categories with the same category.Second,term frequency—inverse document frequency(TF-IDF)algorithm is used to extract the keywords of transcripts,and the similarity of keywords between the groups was calculated separately by cosine distance.Several deep learning methods are used to compare the performance.In the meanwhile,keywords with the best performance are used to analyze AD patients’lexical performance.In the Predictive Challenge of Alzheimer’s Disease held by iFlytek in 2019,the proposed AD diagnosis model achieves a better performance in binary classification by adjusting the number of keywords.The F1 score of the model has a considerable improvement over the baseline of 75.4%,and the training process of which is simple and efficient.We analyze the keywords of the model and find that AD patients use less noun and verb than normal controls.A computer-assisted AD diagnosis model on small Chinese dataset is proposed in this paper,which provides a potential way for assisting diagnosis of AD and analyzing lexical performance in clinical setting. 展开更多
关键词 natural language processing(nlp) Alzheimer's disease(AD) mild cognitive impairment term frequency-inverse document frequency(TF-IDF) bag of words
原文传递
XGBRS Framework Integrated with Word2Vec Sentiment Analysis for Augmented Drug Recommendation
18
作者 Shweta Paliwal Amit Kumar Mishra +2 位作者 Ram Krishn Mishra Nishad Nawaz M.Senthilkumar 《Computers, Materials & Continua》 SCIE EI 2022年第9期5345-5362,共18页
Machine Learning is revolutionizing the era day by day and the scope is no more limited to computer science as the advancements are evident in the field of healthcare.Disease diagnosis,personalized medicine,and Recomm... Machine Learning is revolutionizing the era day by day and the scope is no more limited to computer science as the advancements are evident in the field of healthcare.Disease diagnosis,personalized medicine,and Recommendation system(RS)are among the promising applications that are using Machine Learning(ML)at a higher level.A recommendation system helps inefficient decision-making and suggests personalized recommendations accordingly.Today people share their experiences through reviews and hence designing of recommendation system based on users’sentiments is a challenge.The recommendation system has gained significant attention in different fields but considering healthcare,little is being done from the perspective of drugs,disease,and medical recommendations.This study is engrossed in designing a recommendation system that is based on the fusion of sentiment analysis and radiant boosting.The polarity of the sentiments is analyzed through user reviews and the processed data is fed into the Extreme Gradient Boosting(XGBOOST)framework to generate the drug recommendation.To establish the applicability of the concept a comparative study is performed between the proposed approach and the existing approaches. 展开更多
关键词 Recommendation system Word2Vec XGBOOST sentiment analysis natural language processing(nlp) machine learning
下载PDF
Researching the Research: Applying Machine Learning Techniques to Dissertation Classification
19
作者 Suzanna Schmeelk Tonya L.Fields +2 位作者 Lisa R.Ellrodt Ion C.Freeman Ashley J.Haigler 《Journal of Computer Science Research》 2020年第4期7-15,共9页
This research examines industry-based dissertation research in a doctoralcomputing program through the lens of machine learning algorithms todetermine if natural language processing-based categorization on abstractsal... This research examines industry-based dissertation research in a doctoralcomputing program through the lens of machine learning algorithms todetermine if natural language processing-based categorization on abstractsalone is adequate for classification. This research categorizes dissertationby both their abstracts and by their full-text using the GraphLabCreate library from Apple’s Turi to identify if abstract analysis is anadequate measure of content categorization, which we found was not. Wealso compare the dissertation categorizations using IBM’s Watson Discoverydeep machine learning tool. Our research provides perspectiveson the practicality of the manual classification of technical documents;and, it provides insights into the: (1) categories of academic work createdby experienced fulltime working professionals in a Computing doctoralprogram, (2) viability and performance of automated categorization of theabstract analysis against the fulltext dissertation analysis, and (3) natuallanguage processing versus human manual text classification abstraction. 展开更多
关键词 Machine learning Natural language processing(nlp) Abstract vs fulltext dissertation analysis Industry-based Dissertation research classification GraphLab Create library IBM Watson Discovery
下载PDF
Automatic Generation of UML Class Diagrams for Object-oriented Design and Programing Course
20
作者 Chunyan Ma Jing Chen +1 位作者 Zheng Chang Jiangbin Zheng 《计算机教育》 2021年第12期157-165,共9页
UML Class diagram generation from textual requirements is an important task in object-oriented design and programing course.This study proposes a method for automatically generating class diagrams from Chinese textual... UML Class diagram generation from textual requirements is an important task in object-oriented design and programing course.This study proposes a method for automatically generating class diagrams from Chinese textual requirements on the basis of Natural Language Processing(NLP)and mapping rules for sentence pattern matching.First,classes are identified through entity recognition rules and candidate class pruning rules using NLP from requirements.Second,class attributes and relationships between classes are extracted using mapping rules for sentence pattern matching on the basis of NLP.Third,we developed an assistant tool integrated into a precision micro classroom system for automatic generation of class diagram,to effectively assist the teaching of object-oriented design and programing course.Results are evaluated with precision,accuracy and recall from eight requirements of object-oriented design and programing course using truth values created by teachers.Our research should benefit beginners of object-oriented design and programing course,who may be students or software developers.It helps them to create correct domain models represented in the UML class diagram. 展开更多
关键词 UML class diagram Natural Language processing(nlp) object-oriented design and programming course automatic generation
下载PDF
上一页 1 2 13 下一页 到第
使用帮助 返回顶部