Research on Chinese text and application based on the Latent Dirichlet Allocation

W Mai, M Wei, J Zhang, F Yuan - 2020 3rd International …, 2020 - ieeexplore.ieee.org
Chinese text research has always been a hot and difficult point in natural language
processing. On the one hand, Chinese and English are very different in grammar, resulting …

[PDF][PDF] Obtaining general concepts that represent a set of objects using ontologies

FM Arcas - Universitat Rovira i Virgili, 2012 - webs-deim.urv.cat
The amount of information that a user has to deal with nowadays is huge, usually impossible
to manage. Because of that that there is a need to reduce the amount of information returned …

Semantic attack on anonymised transaction data

A Alshuhail - 2021 - orca.cardiff.ac.uk
Publishing data about individuals is a double-edged sword; it can provide a significant
benefit for a range of organisations to help understand issues concerning individuals, and …

Automatické pojmenovávání skupin slov

M Štefančík - 2017 - dspace.cvut.cz
Úvod nijak nezmiňuje existující řešení-rychlý google search odhalí články" Text Cluster
Labeling using WorrdNet" a podobné. tf_ {i, j} na straně 5 je zřejmě tf_ {w_i, d_j} z …

Ontology Selection for Semantic Similarity Assessment

M Batet, D Sánchez - International Conference on Agents and …, 2015 - scitepress.org
The assessment of the semantic similarity between concepts is a key tool to improve the
understanding of text. The structured knowledge that ontologies provide has been …

Semantic anonymisation of categorical datasets

S Martínez, A Valls, D Sánchez - Advanced Research in Data Privacy, 2015 - Springer
The exploitation of microdata compiled by statistical agencies is of great interest for the data
mining community. However, such data often include sensitive information that can be …

Contributions on semantic similarity and its applications to data privacy

M Batet, D Sánchez - Advanced Research in Data Privacy, 2015 - Springer
Semantic similarity aims at quantifying the resemblance between the meaning of textual
terms. Thus, it represents the corner stone of textual understanding. Given the increasing …

BER analysis of overloaded MC-CDMA cellular system employing sphere decoder in non-ideal sectorization scenario

HRC Mora, NVO Garzón… - 2017 IEEE 13th …, 2017 - ieeexplore.ieee.org
New multiple access techniques aim to increase the spectral efficiency by overloading the
system, ie, with those techniques the number of users served is greater than the number of …

[PDF][PDF] Semantic Disclosure Control: semantics meets data privacy

D Sáncheza, M Batetb - crises-deim.urv.cat
Purpose–To overcome the limitations of purely statistical approaches to data protection, this
paper proposes Semantic Disclosure Control (SeDC): an inherently semantic privacy …

[PDF][PDF] Semantic perturbative privacy-preserving methods for nominal data

MM Rodríguez García - 2017 - crises-deim.urv.cat
The exploitation of personal microdata (such as census data, preferences or medical
records) is of great interest for the data mining community. Such data often include sensitive …