An Improved Lda Model in Micro-Blog Tags Extracting Based on Multi- Tags
نویسندگان
چکیده
منابع مشابه
Automatically Extracting Grounding Tags From BF Tags
This paper describes how to automatically extract grounding features and segment a dialogue into discourse units, once the dialogue has been annotated with the DRI backwardand forward-looking tags. Such an approach eliminates the need for separate annotation of grounding, making dialogue annotation quicker and removing a possible source of error. A preliminary test of the mapping against a huma...
متن کاملBlog Classification Using Tags: An Empirical Study
With an exponential growth of Weblogs (or blogs), many blog directories have appeared to help users to locate topical blogs. As tags are commonly used to describe blogs, we study the effectiveness of tags in blog classification. Compared with titles and descriptions, our experiments, using 24,247 blogs, showed that tags could lead to better classification accuracy. It is interesting to observe ...
متن کاملExtracting user’s interest based on social bookmark tags
Social Networking Services (SNSs) have been gaining popularity in recent years. However, as the number of users of SNS increases, users are forced to spend a great deal of time in order to nd a good friend . The user recommendation system is a good tool that solves this problem, but in that case, the system should understand the user's interests. In the present paper, as a means of extracting a...
متن کاملTags, micro-tags and tag editing: improving internet search
Social tagging is an emerging methodology that allows individual users to assign semantic keywords to content on the web. Popular web services allow the community of users to search for content based on these user-defined tags. Tags are typically attached to a whole entity such as a web page (e.g., del.icio.us), a video (e.g., YouTube), a product description (e.g., Amazon) or a photograph (e.g....
متن کاملTags for Multi-Protocol Authentication
Formal methods have been proved successful in analyzing different kinds of security protocols. They typically formalize and study the security guarantees provided by cryptographic protocols, when executed by a (possibly unbounded) number of different participants. A key problem in applying formal methods to cryptographic protocols, is the study of multi-protocol systems, where different protoco...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: The Open Cybernetics & Systemics Journal
سال: 2014
ISSN: 1874-110X
DOI: 10.2174/1874110x01408011266