An Improved Lda Model in Micro-Blog Tags Extracting Based on Multi- Tags

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Automatically Extracting Grounding Tags From BF Tags

This paper describes how to automatically extract grounding features and segment a dialogue into discourse units, once the dialogue has been annotated with the DRI backwardand forward-looking tags. Such an approach eliminates the need for separate annotation of grounding, making dialogue annotation quicker and removing a possible source of error. A preliminary test of the mapping against a huma...

متن کامل

Blog Classification Using Tags: An Empirical Study

With an exponential growth of Weblogs (or blogs), many blog directories have appeared to help users to locate topical blogs. As tags are commonly used to describe blogs, we study the effectiveness of tags in blog classification. Compared with titles and descriptions, our experiments, using 24,247 blogs, showed that tags could lead to better classification accuracy. It is interesting to observe ...

متن کامل

Extracting user’s interest based on social bookmark tags

Social Networking Services (SNSs) have been gaining popularity in recent years. However, as the number of users of SNS increases, users are forced to spend a great deal of time in order to nd a good friend . The user recommendation system is a good tool that solves this problem, but in that case, the system should understand the user's interests. In the present paper, as a means of extracting a...

متن کامل

Tags, micro-tags and tag editing: improving internet search

Social tagging is an emerging methodology that allows individual users to assign semantic keywords to content on the web. Popular web services allow the community of users to search for content based on these user-defined tags. Tags are typically attached to a whole entity such as a web page (e.g., del.icio.us), a video (e.g., YouTube), a product description (e.g., Amazon) or a photograph (e.g....

متن کامل

Tags for Multi-Protocol Authentication

Formal methods have been proved successful in analyzing different kinds of security protocols. They typically formalize and study the security guarantees provided by cryptographic protocols, when executed by a (possibly unbounded) number of different participants. A key problem in applying formal methods to cryptographic protocols, is the study of multi-protocol systems, where different protoco...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: The Open Cybernetics & Systemics Journal

سال: 2014

ISSN: 1874-110X

DOI: 10.2174/1874110x01408011266