Presentation for Cognitive Systems Institute Group Speaker Series call on October 15, 2015. Elham Khabiri is a Researcher at the IBM TJ Watson Research Center.
Big Tech & Disinformation: What are the main threats and how can journalists ...Scott A. Hale
Dr Scott A Hale presented these slides at the 2019 News Impact Summit in Lyon, France, hosted by The European Journalism Centre and Google News Initiative
https://newsimpact.io/summits/news-impact-summit-lyon
Big Tech & Disinformation: What are the main threats and how can journalists ...Scott A. Hale
Dr Scott A Hale presented these slides at the 2019 News Impact Summit in Lyon, France, hosted by The European Journalism Centre and Google News Initiative
https://newsimpact.io/summits/news-impact-summit-lyon
Government 2.0: Utilizing Government Information in the ClassroomUCO Gov Docs
UCO FEC Day 2009 presentation. Here is an overview of some government sources you can use in your classrooms for student and faculty research and information finding.
Rapid identification of new drugs through online monitoring tools: The case o...Australian Drug Foundation
The rapid proliferation of new drugs available to Australians has necessitated the use of innovative techniques to monitor their emergence. In this presentation, Monica uses the example of NBOMe drugs (reportedly sold as
‘legal LSD’) to outline 4 ways of monitoring drug use trends online and in real-time (Google Trends, drug user forums, Twitter, and Silk Road). These tools are freely available for use by clinicians, AOD workers and researchers who are seeking further information about new drugs presented by clients, or that are talked about in their work.
Brown, Christopher C. “The Darkening of Government Information.” Presentation given at the Western States Government Information Virtual Conference, 7 August 2014, online.
Overview of Research Data Census preliminary findings for Montana State University Research Council, Sept 3, 2015, Jerry Sheehan, see also http://er.educause.edu/articles/2015/9/data-intensive-science-and-campus-it
Three Studies on Supplementing Survey Data with Active DataStephanie Eckman
As survey costs increase and response rates decrease, researchers are looking to alternative methods to collect data from study subjects. Passive data are data collected from subjects without posing questions and recording responses. Examples are passive data are: location data collected from smartphones; applications installed on smartphones; activity data from fitness devices such as fitbits. Because they are collected without subject involvement, passive data may offer a way to reduce the burden born by our research subjects while also allowing us to collect high quality data needed for social science research. However, preliminary research into how to collect and analyze passive data is needed. In this talk, I present three research studies which use passive data to improve the quality and/or reduce the burden of survey data. The talk will focus on what we have learned and what research remains to be done.
A presentation of a review of Santos et al. (2013) "Forensic DNA databases in European countries: is size linked to performance?" Life Sciences, Society and Policy 9:12 doi:10.1186/2195-7819-9-12
Privacy in Research Data Managemnt - Use CasesMicah Altman
From Integrating Approaches to Privacy across the Research Lifecycle http://privacytools.seas.harvard.edu/fall-2013-workshop
This workshop will consider how emerging tools and perspectives from a variety of disciplines, such as computer science, social science, law, and the health sciences, should be integrated in the management of confidential research data. Multidisciplinary discussion groups will grapple with these issues in the context of exemplar research use cases.
Reflection AssignmentThis week there will be no formal discu.docxringrid1
Reflection Assignment
This week there will be no formal discussion for our class. However, there is a reading assignment. Based on the reading assignment there is a reflection requirement. This is basically a written paragraph of about five to six sentences about what you have read. Your reflection should be posted on the discussion board (remember it is just a paragraph of five to six sentences) regarding your readings for this week. No discussions are required this week.
Reading Assignment
Our reading assignment for our class this week will involve:
Chapter 16 – Internet, Secondary Analysis and Historical Research
Chapter 17 - Intervention
Your class participation is the basis for grading of this requirement. Please note that I am actively going through everyone’s phrase three written assignments. Thank you for your continued diligence in our course.
Under chapter 16 this week, we will explore topics such as incorporating the internet for your research, revisiting participant testing as well as interviewing. Ethical concerns, historical research, and its appraisal.
In review of chapter 17, intervention in research will be explained. As per our text, not all research involves an intervention. Frequently, interventions are seen within improvement projects frequently completed in DNP programs. At this phase of research, the principle investigator interacts with their research team. Documentation stems from the methodology section.
Investigating the internet in research, please know and understand the following.
Internet-based research method
refers to any research method that uses the Internet to collect data. Most commonly, the Web has been used as the means for conducting the study, but e-mail has been used as well. The use of e-mail to collect data dates back to the 1980s while the first uses of the Web to collect data started in the mid-1990s. Whereas e-mail is principally limited to survey and questionnaire methodology, the Web, with its ability to use media, has the ability to execute full experiments and implement a wide variety of research methods. The use of the Internet offers new opportunities for access to participants allowing for larger and more diverse samples.
Reference
Salkind, N. J. (2010).
Encyclopedia of research design
(Vols. 1-0). Thousand Oaks, CA: SAGE Publications, Inc. doi: 10.4135/9781412961288
Secondary analysis
is the re-analysis of either qualitative or quantitative data already collected in a previous study, by a different researcher normally wishing to address a new research question.
Reference
Tate, J. A., Happ, M. B. (2018). Qualitative secondary analysis: A case exemplar.
Journal of Pediatric Health Care
. Volume 32, Issue 3, p. 308-312.
Historical inquiry
proceeds with the formulation of a problem or set of questions worth pursuing. In the most direct approach, students might be encouraged to analyze a document, record, or site itself. Who produced it, when, how, and why? What is the e.
Government 2.0: Utilizing Government Information in the ClassroomUCO Gov Docs
UCO FEC Day 2009 presentation. Here is an overview of some government sources you can use in your classrooms for student and faculty research and information finding.
Rapid identification of new drugs through online monitoring tools: The case o...Australian Drug Foundation
The rapid proliferation of new drugs available to Australians has necessitated the use of innovative techniques to monitor their emergence. In this presentation, Monica uses the example of NBOMe drugs (reportedly sold as
‘legal LSD’) to outline 4 ways of monitoring drug use trends online and in real-time (Google Trends, drug user forums, Twitter, and Silk Road). These tools are freely available for use by clinicians, AOD workers and researchers who are seeking further information about new drugs presented by clients, or that are talked about in their work.
Brown, Christopher C. “The Darkening of Government Information.” Presentation given at the Western States Government Information Virtual Conference, 7 August 2014, online.
Overview of Research Data Census preliminary findings for Montana State University Research Council, Sept 3, 2015, Jerry Sheehan, see also http://er.educause.edu/articles/2015/9/data-intensive-science-and-campus-it
Three Studies on Supplementing Survey Data with Active DataStephanie Eckman
As survey costs increase and response rates decrease, researchers are looking to alternative methods to collect data from study subjects. Passive data are data collected from subjects without posing questions and recording responses. Examples are passive data are: location data collected from smartphones; applications installed on smartphones; activity data from fitness devices such as fitbits. Because they are collected without subject involvement, passive data may offer a way to reduce the burden born by our research subjects while also allowing us to collect high quality data needed for social science research. However, preliminary research into how to collect and analyze passive data is needed. In this talk, I present three research studies which use passive data to improve the quality and/or reduce the burden of survey data. The talk will focus on what we have learned and what research remains to be done.
A presentation of a review of Santos et al. (2013) "Forensic DNA databases in European countries: is size linked to performance?" Life Sciences, Society and Policy 9:12 doi:10.1186/2195-7819-9-12
Privacy in Research Data Managemnt - Use CasesMicah Altman
From Integrating Approaches to Privacy across the Research Lifecycle http://privacytools.seas.harvard.edu/fall-2013-workshop
This workshop will consider how emerging tools and perspectives from a variety of disciplines, such as computer science, social science, law, and the health sciences, should be integrated in the management of confidential research data. Multidisciplinary discussion groups will grapple with these issues in the context of exemplar research use cases.
Reflection AssignmentThis week there will be no formal discu.docxringrid1
Reflection Assignment
This week there will be no formal discussion for our class. However, there is a reading assignment. Based on the reading assignment there is a reflection requirement. This is basically a written paragraph of about five to six sentences about what you have read. Your reflection should be posted on the discussion board (remember it is just a paragraph of five to six sentences) regarding your readings for this week. No discussions are required this week.
Reading Assignment
Our reading assignment for our class this week will involve:
Chapter 16 – Internet, Secondary Analysis and Historical Research
Chapter 17 - Intervention
Your class participation is the basis for grading of this requirement. Please note that I am actively going through everyone’s phrase three written assignments. Thank you for your continued diligence in our course.
Under chapter 16 this week, we will explore topics such as incorporating the internet for your research, revisiting participant testing as well as interviewing. Ethical concerns, historical research, and its appraisal.
In review of chapter 17, intervention in research will be explained. As per our text, not all research involves an intervention. Frequently, interventions are seen within improvement projects frequently completed in DNP programs. At this phase of research, the principle investigator interacts with their research team. Documentation stems from the methodology section.
Investigating the internet in research, please know and understand the following.
Internet-based research method
refers to any research method that uses the Internet to collect data. Most commonly, the Web has been used as the means for conducting the study, but e-mail has been used as well. The use of e-mail to collect data dates back to the 1980s while the first uses of the Web to collect data started in the mid-1990s. Whereas e-mail is principally limited to survey and questionnaire methodology, the Web, with its ability to use media, has the ability to execute full experiments and implement a wide variety of research methods. The use of the Internet offers new opportunities for access to participants allowing for larger and more diverse samples.
Reference
Salkind, N. J. (2010).
Encyclopedia of research design
(Vols. 1-0). Thousand Oaks, CA: SAGE Publications, Inc. doi: 10.4135/9781412961288
Secondary analysis
is the re-analysis of either qualitative or quantitative data already collected in a previous study, by a different researcher normally wishing to address a new research question.
Reference
Tate, J. A., Happ, M. B. (2018). Qualitative secondary analysis: A case exemplar.
Journal of Pediatric Health Care
. Volume 32, Issue 3, p. 308-312.
Historical inquiry
proceeds with the formulation of a problem or set of questions worth pursuing. In the most direct approach, students might be encouraged to analyze a document, record, or site itself. Who produced it, when, how, and why? What is the e.
#Aprender3C - Recursos Educativos Abiertos y Linked Data en EcuadorAprender 3C
por Nelson Piedra (Universidad Técnica Particular de Loja, Ecuador).
Serie de webinars “Los desafíos de la Educación Abierta en Latinoamérica”.
Organiza: A-REA y Aprender 3C.
Apoyan: OKFN edu, ABGRA, RENABIar, UMET y Conocimiento GyF.
+ info en http://aprender3c.org/
Professor Dagobert Soergel's talk (2009 CISTA Award Recipient): Task-centric ...kristenlabonte
"The task-centric revolution. Weaving information into workflows." Systems should be centered around tasks, not applications. This talk will present ideas and techniques towards the design of task-centric systems.
Critical thinking in english. how to evaluate webpagesMariangel Carreño
Proyecto realizado en el año 2012 con alumnos de 6° año del Liceo N°1 Florida en la asignatura inglés como lengua extranjera sobre la Unidad Temática: Media, en particular sobre internet y cómo evaluar páginas webs.
Mria Pia tackled the terminology trends and shared some interesting examples from her professional experience as a blogger:
1. Communicating about terminology by using social networks.
2. Social networks as available data for carrying out terminology research, in particular for monitoring language changes such as neologisms. More and more researchers are beginning to work on projects consisting in analyzing tweets to catch the next most popular word.
3. Websites are made of content and terminology is the critical part of the user experience.
4. Managing and sharing terminological data: cloud based, collaborative and social platforms.
5. The subject field of terminology is overwhelming, so some websites provide terminological resources in few clicks.
Day 3: Introduction to Information LiteracyBuffy Hamilton
Objectives: 1. To explore and evaluate traditional and uthoritative database information sources. 2. To explore and utilize strategies to effectively use traditional and emerging search engines for information. 3. To explore and evaluate how emerging Web 2.0 tools can be used as sources of information. 4. To explore the merits and drawbacks to collaboratively created open sources of information such as Wikipedia.
Information overload for communities of practiceMurray Turoff
A study of emergency management professionals with emphasis on medical and public health done for NLM. These are slides of a paper presented at Web2008 during ICIS 2008 and you can request a copy of the paper from me directly as well as other work in this area. Check my website for the full NLM report
Similar to Domain Scoping for Subject Matter Experts by Elham Khabiri (20)
Teaching cognitive computing with ibm watsondiannepatricia
Ralph Badinelli, Lenz Chair in the Department of Business Information Technology, Pamplin College of Business of Virginia Tech. presented "Teaching Cognitive Computing with IBM Watson" as part of the Cognitive Systems Institute Speaker Series.
Cognitive systems institute talk 8 june 2017 - v.1.0diannepatricia
José Hernández-Orallo, Full Professor, Department of Information Systems and Computation at the Universitat Politecnica de València, presentation “Evaluating Cognitive Systems: Task-oriented or Ability-oriented?” as part of the Cognitive Systems Institute Speaker Series.
Building Compassionate Conversational Systemsdiannepatricia
Rama Akkiraju, Distinguished Engineer and Master Inventor at IBM, presention "Building Compassionate Conversational Systems" as part of the Cognitive Systems Institute Speaker Series.
“Artificial Intelligence, Cognitive Computing and Innovating in Practice”diannepatricia
Cristina Mele, Full Professor of Management at the University of Napoli “Federico II”, presentation as part of Cognitive Systems Institute Speaker Series
Eric Manser and Will Scott from IBM Research, presentation on "Cognitive Insights Drive Self-driving Accessibility" as part of the Cognitive Systems Institute Speaker Series
Roberto Sicconi and Malgorzata (Maggie) Stys, founders of TeleLingo, presented "AI in the Car" as part of the Cognitive Systems Institute Speaker Series.
“Semantic PDF Processing & Document Representation”diannepatricia
Sridhar Iyengar, IBM Distinguished Engineer at the IBM T. J. Watson Research Center, presention “Semantic PDF Processing & Document Representation” as part of the Cognitive Systems Institute Group Speaker Series.
Joining Industry and Students for Cognitive Solutions at Karlsruhe Services R...diannepatricia
Gerhard Satzger, Director of the Karlsruhe Service Research Institute and two former students and IBMers, Sebastian Hirschl and Kathrin Fitzer, presention"Joining Industry and Students for Cognitive Solutions at Karlsruhe Services Research Center" as part of the Cognitive Systems Institute Speaker Series.
170330 cognitive systems institute speaker series mark sherman - watson pr...diannepatricia
Dr. Mark Sherman, Director of the Cyber Security Foundations group at CERT within CMU’s Software Engineering Institute. , presention “Experiences Developing an IBM Watson Cognitive Processing Application to Support Q&A of Application Security Diagnostics” as part of the Cognitive Systems Institute Speaker Series.
“Fairness Cases as an Accelerant and Enabler for Cognitive Assistance Adoption”diannepatricia
Chuck Howell, Chief Engineer for Intelligence Programs and Integration at the MITRE Corporation, presentation “Fairness Cases as an Accelerant and Enabler for Cognitive Assistance Adoption” as part of the Cognitive Systems Institute Speaker Series.
From complex Systems to Networks: Discovering and Modeling the Correct Network"diannepatricia
From complex Systems to Networks: Discovering and Modeling the Correct Network" by Nitesh Chawla as part of the Cognitive Systems Institute Speaker Series
Nitesh Chawla is the Frank M. Freimann Professor of Computer Science and Engineering, and director of the research center on network and data sciences (iCeNSA) at the University of Notre Dame.
Developing Cognitive Systems to Support Team Cognitiondiannepatricia
Steve Fiore from the University of Central Florida presented “Developing Cognitive Systems to Support Team Cognition” as part of the Cognitive Systems Institute Speaker Series
Kevin Sullivan from the University of Virginia presented: "Cyber-Social Learning Systems: Take-Aways from First Community Computing Consortium Workshop on Cyber-Social Learning Systems" as part of the Cognitive Systems Institute Speaker Series.
“IT Technology Trends in 2017… and Beyond”diannepatricia
William Chamberlin, IBM Distinguished Market Intelligence Professional, presented “IT Technology Trends in 2017… and Beyond” as part of the Cognitive Systems Institute Speaker Series on January 26, 2017.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
I have heard many times that architecture is not important for the front-end. Also, many times I have seen how developers implement features on the front-end just following the standard rules for a framework and think that this is enough to successfully launch the project, and then the project fails. How to prevent this and what approach to choose? I have launched dozens of complex projects and during the talk we will analyze which approaches have worked for me and which have not.
"Impact of front-end architecture on development cost", Viktor Turskyi
Domain Scoping for Subject Matter Experts by Elham Khabiri
1. Domain
Scoping
for
Subject
Ma4er
Experts
Elham
Khabiri,
Ma4hew
Riemer,
Fenno
F.
Heath
III,
Richard
Hull
Oct
15
2. IntroducFon
• Exploring
Social
Media
is
essenFal
for
SMEs
– To
discover
relevant
content
around
a
subject
– To
analyze
senFment
about
a
subject
– Example:
Possible
changes
to
the
common-‐
core
by
government,
how
it
is
reflected
in
social
media
– What
are
the
vocabularies
that
arFcles,
media,
use
to
address
relevant
discussions
• Provide
a
tool
to
define
scope
of
vocabulary
– Suggest
SMEs
what
vocabularies
to
search
for
in
the
news
and
social
media
– Construct
“domain
model”:
family
of
vocab
and
extractors
– Different
Algorithm
and
datasets
are
offered
by
the
tool
• Dataset:
Common
Crawl,
BoardReader
News
and
Forums,
Google
News
• Methods:
CollocaFon,
TFIDF,
NN
(Word2Vec
and
Glove)
4. Different
Methods
and
Datasets
Generates
terms
that
occur
frequently
with
one
or
more
of
the
seed
terms
with
a
frequency
that
is
relaFvely
high
as
compared
with
how
ocen
they
occur
in
“all”
documents.
5. Different
Methods
and
Datasets
Generates
terms
that
are
“similar”
to
the
seed
terms.
The
similarity
metric
is
based
on
an
analysis
of
a
large
family
of
news
arFcles
from
2013,
that
were
gathered
by
Google.
1M
unigrams,
1M
bigrams,
1M
trigrams.
6. Different
Methods
and
Datasets
GLOVE
(Pennington,
Socher,
Manning):
Generates
terms
that
are
“similar”
to
the
seed
terms.
The
similarity
metric
is
based
on
an
analysis
of
a
large
family
of
web
documents
from
the
last
7
years,
that
were
gathered
by
Common
Crawl.
3M
unigrams,
10K
bigrams.
7. Different
Methods
and
Datasets
Generates
term
pairs
that
occur
with
one
or
more
of
the
seed
terms
with
a
frequency
that
is
relaFvely
high
as
compared
with
how
ocen
they
occur
in
“all”
documents.
8. Finding
Relevant
EnFFes:
Using
Wikipedia
Phase1:
DisambiguaFon
Phase2:
Find
Synonyms
C:
Youth
E:
World
EducaFon
Services
C:
EducaFon
issues
C:
History
of
EducaFon
C:
EducaFon
reform
E:
Shlomo
Dovrat
Wikipedia
Categories
Wikipedia
EnFFes
E:
EducaFon
Reform
E:
Common
Core
State
Init.
DisambiguaFon:
Atlas
V
is
called
Common
Core
Booster
10. Using
Wikipedia
American
Educator,
proponent
of
homeschooling
C:
Youth
E:
World
EducaFon
Services
C:
EducaFon
issues
C:
History
of
EducaFon
C:
EducaFon
reform
E:
Shlomo
Dovrat
E:
School-‐to-‐
work
transiFon
E:
EducaFon
reform