Approaches for semantic textual similarity

HAN Chengcheng, LI Lei, LIU Tingting… - Journal of East China …, 2020 - xblk.ecnu.edu.cn
This paper summarizes the latest research progress on semantic textual similarity
calculation methods, including string-based, statistics-based, knowledge-based, and deep …

[HTML][HTML] 语义文本相似度计算方法

韩程程, 李磊, 刘婷婷, 高明 - 华东师范大学学报(自然科学版), 2020 - xblk.ecnu.edu.cn
综述了语义文本相似度计算的最新研究进展, 主要包括基于字符串, 基于统计,
基于知识库和基于深度学习的方法. 针对每一类方法, 不仅介绍了其中典型的模型和方法 …

A short text similarity calculation method combining semantic and headword attention mechanism

M Ji, X Zhang - Scientific Programming, 2022 - Wiley Online Library
Short text similarity computation plays an important role in various natural language
processing tasks. Siamese neural networks are widely used in short text similarity …

[HTML][HTML] A hybrid model for the measurement of the similarity between twitter profiles

N Shoeibi, N Shoeibi, P Chamoso, Z Alizadehsani… - Sustainability, 2022 - mdpi.com
Social media platforms have been an undeniable part of our lifestyle for the past decade.
Analyzing the information that is being shared is a crucial step to understanding human …

[Retracted] An English Writing Grammar Error Correction Technology Based on Similarity Algorithm

Q Li - Security and Communication Networks, 2022 - Wiley Online Library
Students are the focus of English writing instruction, which emphasizes their initiative and
creativity in the classroom, fosters the development of their self‐directed learning and …

Textual similarity measurement approaches: A survey (1)

AH Abo-Elghit, AM Al-Zoghby… - The Egyptian Journal of …, 2020 - ejle.journals.ekb.eg
Survey research is appropriate and necessary to address certain research question types.
This paper aims to provide a general overview of the textual similarity in the literature …

An ex-convict recognition method based on text mining

M Qiu, X Zhang, X Wang - International Journal of Security …, 2023 - inderscienceonline.com
Currently, a large proportion of existing cases in the grassroots public security organisations
were committed by ex-convicts. Grassroots police officers cannot directly and rapidly judge …

[PDF][PDF] Similarity Approximation of Twitter Profiles

N Shoeibi, N Shoeibi, P Chamoso… - Journal Not …, 2021 - researchgate.net
Social media platforms have been entirely an undeniable part of the lifestyle for the past
decade. Analyzing the information being shared is a crucial step to understanding human …

Identification of authorship and prevention of fraudulent transactions/cybercrime using efficient high performance machine learning techniques

BJ Sowmya, R Hanumantharaju… - … and Data Mining, 2023 - inderscienceonline.com
Cyber safety is the best skill required among a group of employees in organisations. Many
offenders hide behind anonymous masking, including dishonest purchases, brazen …

Police alarm address recognition and classification based on convolutional neural networks

M Qiu, Z Bi - International Journal of Security and Networks, 2022 - inderscienceonline.com
The assignment of addresses of police alarms is the most significant aspect when receiving
such alarms. However, currently, most areas still adopt modes such as the layer-by-layer …