Implement of Semi-automatic Labeling Using Transcripts Text
نویسندگان
چکیده
منابع مشابه
Semi-Automatic Labeling of Training Data Sets in Text Classification
Web includes digital libraries and billions of text documents. A fast and simple search through this sizeable set is important for users and researchers. Since manual or rule based document classification is a difficult, time consuming process, automatic classification systems are absolutely needed. Automatic text classification systems demand extensive and proper training data sets. To provide...
متن کاملSemi-automatic Ontology Extension Using Text Mining
This paper addresses the process of the ontology extension for a selected domain of interest which is defined by keywords and possibly a glossary of relevant terms. A new methodology for semi-automatic ontology extension, aggregating the elements of text mining and user-dialog approaches for ontology extension, is proposed and evaluated. We conduct a set of ranking, tagging and illustrative que...
متن کاملSemi-automatic acquisition and labeling of image data using SOMs
Application of neural networks for real world object recognition suffers from the need to acquire large quantities of labeled image data. We propose a solution that acquires images from a domain at random and structures the data in two steps: Data driven mechanisms extract windows of interest, which are clustered by a SOM. Regions of the SOM in which objects form clusters serve as “suggestions”...
متن کاملAutomatic Labeling of Topic Models Using Text Summaries
Labeling topics learned by topic models is a challenging problem. Previous studies have used words, phrases and images to label topics. In this paper, we propose to use text summaries for topic labeling. Several sentences are extracted from the most related documents to form the summary for each topic. In order to obtain summaries with both high relevance, coverage and discrimination for all th...
متن کاملautomatic verification of authentication protocols using genetic programming
implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...
15 صفحه اولذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Korean Institute of Intelligent Systems
سال: 2015
ISSN: 1976-9172
DOI: 10.5391/jkiis.2015.25.6.585