Concepts in web ontologies help machines to un-
derstand data through the meanings they hold. Furthermore,
learning contexts and topics of web documents also have helped
in better semantic-oriented structuring and retrieval of data on
the web. In this short paper we present a novel approach for
domain-independent open learning of domain concepts, context
and topic of any given web document. Our approach is based on a
computational version of the Construction-Integration (CI) model
of text comprehension. Our proposed system mimics the way
humans learn the meanings of textual units and identify domain
concepts, contexts and topics in the form of semantic networks.
We apply our system on a number of web documents with a
range of topics and domains. The resulting semantic networks
provide a quantitative and qualitative insights into the nature of
the given web documents.
This session will discussed the following areas:
1. Intercultural education
2. Intercultural Education
3. Communications and its forms
4. Language and different types of languages
5. Relationship of Language and Culture
This session will discussed the following areas:
1. Intercultural education
2. Intercultural Education
3. Communications and its forms
4. Language and different types of languages
5. Relationship of Language and Culture
Invited Talk: Early Detection of Research Topics Angelo Salatino
Slides of my talk at Chan Zuckerberg Initiative (Meta)
Abstract:
The ability to promptly recognise new research trends is strategic for many stakeholders, including universities, institutional funding bodies, academic publishers and companies. While the literature describes several approaches which aim to identify the emergence of new research topics early in their lifecycle, these rely on the assumption that the topic in question is already associated with a number of publications and consistently referred to by a community of researchers. Hence, detecting the emergence of a new research area at an embryonic stage, i.e., before the topic has been consistently labelled by a community of researchers and associated with a number of publications, is still an open challenge. In this paper, we begin to address this challenge by performing a study of the dynamics preceding the creation of new topics. This study indicates that the emergence of a new topic is anticipated by a significant increase in the pace of collaboration between relevant research areas, which can be seen as the ‘parents’ of the new topic. These initial findings (i) confirm our hypothesis that it is possible in principle to detect the emergence of a new topic at the embryonic stage, (ii) provide new empirical evidence supporting relevant theories in Philosophy of Science, and also (iii) suggest that new topics tend to emerge in an environment in which weakly interconnected research areas begin to cross-fertilise.
Analytic and strategic challenges of serious gamesDavid Gibson
How higher education learning and teaching can learn from serious game developers. Keynote at the 5th annual SeGAH conference concurrent with WWW 2017 held in Perth, Western Australia
Modeling and mining complex networks with feature-rich nodes.Corrado Monti
Slideshow for my PhD dissertation. The core of my work was to analyze the problems of link prediction, label prediction and graph modeling within a single framework of graphs with binary attributes on their nodes.
Generating domain specific sentiment lexicons using the Web Directory acijjournal
In this paper we aim at proposing a method to automatically build a sentiment lexicon which is domain based. There has been a demand for the construction of generated and labeled sentiment lexicon. For data on the social web (E.g., tweets), methods which make use of the synonymy relation don't work well, as we completely ignore the significance of terms belonging to specific domains. Here we propose to
generate a sentiment lexicon for any domain specified, using a twofold method. First we build sentiment scores using the micro-blogging data, and then we use these scores on the ontological structure provided by Open Directory Project [1], to build a custom sentiment lexicon for analyzing domain specific microblogging data.
AUGUR: Forecasting the Emergence of New Research TopicsAngelo Salatino
Being able to rapidly recognise new research trends is strategic for many stakeholders, including universities, institutional funding bodies, academic publishers and companies. The literature pre-sents several approaches to identifying the emergence of new re-search topics, which rely on the assumption that the topic is al-ready exhibiting a certain degree of popularity and consistently referred to by a community of researchers. However, detecting the emergence of a new research area at an embryonic stage, i.e., before the topic has been consistently labelled by a community of researchers and associated with a number of publications, is still an open challenge. We address this issue by introducing Augur, a novel approach to the early detection of research topics. Augur analyses the diachronic relationships between research areas and is able to detect clusters of topics that exhibit dynamics correlated with the emergence of new research topics. Here we also present the Advanced Clique Percolation Method (ACPM), a new communi-ty detection algorithm developed specifically for supporting this task. Augur was evaluated on a gold standard of 1,408 debutant topics in the 2000-2011 interval and outperformed four alternative approaches in terms of both precision and recall.
Evolving a Medical Image Similarity SearchSujit Pal
Slides for talk at Haystack Conference 2018. Covers evolution of an Image Similarity Search Proof of Concept built to identify similar medical images. Discusses various image vectorizing techniques that were considered in order to convert images into searchable entities, an evaluation strategy to rank these techniques, as well as various indexing strategies to allow searching for similar images at scale.
User Identity Linkage: Data Collection, DataSet Biases, Method, Control and A...IIIT Hyderabad
Online Social Networks (OSNs) are popular platforms for online users. Users typically register and maintain their accounts (user identities) across different OSNs to share a variety of content and remain connected with their friends. Consequently, linking user identities across OSN platforms, referred to as user identity linkage (UIL) becomes a critical problem. Solving this problem enables us to build a more comprehensive view of user’s activities across OSNs, which is highly beneficial for targeted advertisements, recommendations, and many more applications. In the thesis, we propose approaches for analyzing data collection methods, investigating biases in identity linkage datasets, linkage of user identities across social networks, control-ability of user identity linkage, and application of user identity linkage solutions to solve related problems.
Similar to Using Text Comprehension Model for Learning Concepts, Context, and Topic of Web Content (20)
Building RAG with self-deployed Milvus vector database and Snowpark Container...Zilliz
This talk will give hands-on advice on building RAG applications with an open-source Milvus database deployed as a docker container. We will also introduce the integration of Milvus with Snowpark Container Services.
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!SOFTTECHHUB
As the digital landscape continually evolves, operating systems play a critical role in shaping user experiences and productivity. The launch of Nitrux Linux 3.5.0 marks a significant milestone, offering a robust alternative to traditional systems such as Windows 11. This article delves into the essence of Nitrux Linux 3.5.0, exploring its unique features, advantages, and how it stands as a compelling choice for both casual users and tech enthusiasts.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Full-RAG: A modern architecture for hyper-personalizationZilliz
Mike Del Balso, CEO & Co-Founder at Tecton, presents "Full RAG," a novel approach to AI recommendation systems, aiming to push beyond the limitations of traditional models through a deep integration of contextual insights and real-time data, leveraging the Retrieval-Augmented Generation architecture. This talk will outline Full RAG's potential to significantly enhance personalization, address engineering challenges such as data management and model training, and introduce data enrichment with reranking as a key solution. Attendees will gain crucial insights into the importance of hyperpersonalization in AI, the capabilities of Full RAG for advanced personalization, and strategies for managing complex data integrations for deploying cutting-edge AI solutions.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Climate Impact of Software Testing at Nordic Testing Days
Using Text Comprehension Model for Learning Concepts, Context, and Topic of Web Content
1. Using Text Comprehension Model for
Learning Concepts, Context, and Topic
of Web Content
11th International Conference on Semantic Computing
IEEE ICSC 2017 - San Diego, California, USA
Jan 30-Feb 1, 2017
Ismael Ali, Naser Al Madi, Austin Melton
Department of Computer Science
Kent State University
2. Outline
• Text Comprehension
• System Architecture and Workflow
• Semantic Learning
– Semantic Network Construction
– Mathematical Foundation
– Domain Concept Learning
– Topic Learning
– Context Learning
• Experimental Design
• Evaluation Strategy
• Results
• Conclusion and Future Works
3. Abstract
• Role of learning Semantics including concepts, contexts, and
topics from web documents
– semantic-based structuring and retrieving
• We present a novel approach for domain-independent
semantic learning.
• Our approach uses a computational version of the
Construction-Integration (CI) model of text comprehension.
4. Text Comprehension
• Comprehension is a cognitive-based learning process
• Comprehension produces the mental representations:
– perceptual
– verbal
– semantic representations
• CI model simulates the incremental and dynamic task of
comprehending the text and it leads to the construction of a
semantic network (SN)
5. CI as a Cognitive Model of Text Comprehension
This figure from: (Cathleen Wharton and Walter Kintsch, 1991 in ACM SIGART Bulletin)
Surface
Model
Text-Base
Model
Situation
Model
Situation
Model• Time of acquisition
• Recognizing main
concepts
• Integrating them with
background knowledge
6. System Architecture and Workflow
Using Stanford CoreNLP
1. Text tokenization
2. Lemmatization
3. Sentence splitting
- To get the Surface Model.
4. Part of Speech Tagging
5. Anaphora Resolution
Running the
computational CI model
to produce weighted
semantic network
Analysis and
filtering of the
weighted semantic
networks
7. Semantic Network Construction
• Sentences are presented as single units of time (a reading
episode)
• “Knowledge is a familiarity. Awareness or understanding of
something. Such as facts.”
Recognized Concepts
Neglected Concepts
Recognized Associations
Neglected Associations
Fig. 2. Sample Concept Network.
(After running the CI model)
8. • “Knowledge is a familiarity. Awareness or understanding of something. Such
as facts.”
• Episodes of {e1
, e2
, ... , ei
} are background knowledge for episode {ei+1
}
• Weights on edges represents the semantic association strength
Fig. 2. Sample Concept Network.
(After running the CI model)
1. concept recognition threshold (S) is 7
for Fig. 2
– s(“something”) = 6
– e1 + e2 < S
– s(“Awareness”) = 12
– e3 + e4 > S
2. association recognition threshold (I)
is 5 for Fig. 2
– i(“Knowledge”,”facts”) < I
– i(“Knowledge”,”Awareness”) > I
Semantic Network Construction
9. 1. Associative Matrix is generated from Text-base model
2. Each sentence forms an Individual Concept Network, ICN
3. All ICN graphs are combined to create the Base Semantic Network, BSN
Semantic Network Construction:
Semantic Association Graph
C1-Sent-ID C2-Sent-ID;in which
C2 1st occured
C3-Sent-ID C4-Sent-ID ... Cn-Sent-ID
1 2 3 4 ... n
C1 C2 C3 C4 ... Cn
1 C1
2 C2
3 C3 Sentence-ID of 1st
episode, which
C3 and C2
are co-occurrence
4 C4
... ...
n Cn
10. - Finding weights and thresholds:
4. BSN shows recognized the which were neglected concepts and associations
6. BSN Semantic network is represented as a set of inequalities:
- Inequalities set upper- and lower-bound for concept (S) and association (I) recognition thresholds
- Linear programming finds the suitable values for all variables to satisfy the inequalities
7. Finding values for the variable vector X that satisfies the inequalities; by minimizing the problem
specified in:
Semantic Network Construction:
Mathematical Foundation
Where:
- f is the linear objective function
- A is the left hand side of the inequalities
- B is the right hand side of the inequalities
- LB is the lower bound of the solution
- UB is the upper bound of the solution
- The resulting variable vector contains
weights for nodes and associations, along
with individual thresholds (S) and (I) values
for recognizing concepts and associations.
11. Domain Concepts Learning
• variable vector used to construct the semantic network Gi
= (Ci
, Ei
)
• Then the concept filtering performed to learn domain concepts
• Domain concepts for web document di
are the concepts in a subgraph G*
i
of
its semantic network Gi
:
- G*
i
= (C*
i
, E*
i
) where;C*
i
⊂ Ci
, and Ei
*
⊂ Ei
• Filtering mechanisms:
(1) statistical-based filtering: mean threshold and median threshold
(2) positive-based filtering: suggested for the proposed cognitive-based
semantic learning approach
12. Topic Learning
• Foreach domain concept ci
∈ C*
i
in dj
calculate the Topic Identification
Weight (Tiw):
– CIw
(ci
) : the weight calculated the computational CI model
– Eigenvector(ci
) : the value of eigenvector centrality measure as the
function of the centralities of its neighbors
– e(ci
) is the episode in which the given concept ci
first appeared
• Topic Identification:
– Topic concept of di
is the concept with the highest Tiw weight
– The most influential node in the semantic network G*
i
of domain
concept set
13. Context Learning
• The context of the di
is the all the nearest neighbor (nodes
with distance k=1) to the topic concept
• Thus the context includes :
– the most semantically associated to the topic concept
– a normal distribution of a concept selection from
different sections of the text
14. Experimental Design
• A diverse set of ten randomly selected web documents
from Wikipedia
– astronomy, brain, cognition, ecology, knowledge, law,
literacy, robotic, virus and tennis
• Testing the the openness (domain-independency) property
of our approach in learning semantics of the web contents
15. Evaluation Strategies
• Results of filtering mechanisms are evaluated by human judgment strategy [4]:
1. A set of seven human judges (domain experts) selected, KSU
2. Human judges were asked to evaluate the list(s) of all potential concepts learned
from the CI model for each web document
3. Then asked to identify whether the concepts belonged to a given domain or not
4. Next, domain concepts identified by the domain experts were compared against the
domain concepts identified by each concept filtering strategy.
5. Then the quality of each concept filtering strategy was evaluated.
• The evaluation performed using the binary evaluation measures from IR: Precision, Recall
and F1
17. Context and Topic Analysis
Context for web document of EcologyTopic-Concept for web document of Ecology
18. • We investigated a novel approach for open learning of the concepts,
contexts, and topics of web contents.
• Our approach is based on the Construction-Integration (CI) model of text
comprehension, which mimics the way humans learn the semantic
components of a web document.
• We also highlighted the use of cognitive science results in learning
semantics from web content.
• Our work is a step toward our future research on cognition and open
based:
– Ontology Learning
– Ontology Selection
Conclusion and Future Work