|
|
|
Qishun Mei and Xuhui Li
To address the limitations of existing methods of short-text entity disambiguation, specifically in terms of their insufficient feature extraction and reliance on massive training samples, we propose an entity disambiguation model called COLBERT, which f...
ver más
|
|
|
|
|
|
|
Carlos Vargas and Hiram Ponce
In this paper we propose the Recurrent Embedded Topic Model (RETM) which is a modification of the Embedded Topic Modelling (ETM) by reusing the Continuous Bag of Words (CBOW) that the model had implemented and applying it to a recurrent neural network (L...
ver más
|
|
|
|
|
|
|
Sudheesh R, Muhammad Mujahid, Furqan Rustam, Rahman Shafique, Venkata Chunduri, Mónica Gracia Villar, Julién Brito Ballester, Isabel de la Torre Diez and Imran Ashraf
Chatbots are AI-powered programs designed to replicate human conversation. They are capable of performing a wide range of tasks, including answering questions, offering directions, controlling smart home thermostats, and playing music, among other functi...
ver más
|
|
|
|
|
|
|
Dongling Ma, Chunhong Zhang, Liang Zhao, Qingji Huang and Baoze Liu
Monitoring, analyzing, and managing public sentiment surrounding urban emergencies hold significant importance for city governments in executing effective response strategies and maintaining social stability. In this study, we present a study which was c...
ver más
|
|
|
|
|
|
|
Gabriele Papadia, Massimo Pacella, Massimiliano Perrone and Vincenzo Giliberti
The paper deals with the analysis of conversation transcriptions between customers and agents in a call center of a customer care service. The objective is to support the analysis of text transcription of human-to-human conversations, to obtain reports o...
ver más
|
|
|
|
|
|
|
Xuansu Gao, Chengwu Liao, Chao Chen and Ruiyuan Li
Cycling?as a sustainable and convenient exercise and travel mode?has become increasingly popular in modern cities. In recent years, with the proliferation of sport apps and GPS mobile devices in daily life, the accumulated cycling trajectories have opene...
ver más
|
|
|
|
|
|
|
Konstantinos Charmanas, Nikolaos Mittas and Lefteris Angelis
Security vulnerabilities constitute one of the most important weaknesses of hardware and software security that can cause severe damage to systems, applications, and users. As a result, software vendors should prioritize the most dangerous and impactful ...
ver más
|
|
|
|
|
|
|
Yue Deng and Rixing He
The determination of a reasonable spatial analysis unit is an essential step in urban functional zone (UFZ) division, which significantly affects the results. However, most studies on the division of functional zones are based on excessively large spatia...
ver más
|
|
|
|
|
|
|
Ning Li, Kefu Chen and Huixin He
According to the natural language perspective, UGC has been significantly used for the screening of key nodes in knowledge discovery and strategic investment. This article presents a new research framework that is proposed for the decomposition of UGC kn...
ver más
|
|
|
|
|
|
|
Gaocai Li, Mingzheng Liu, Xinyu Zhang, Chengbo Wang, Kee-hung Lai and Weihuachao Qian
Recognition and understanding of ship motion patterns have excellent application value for ship navigation and maritime supervision, i.e., route planning and maritime risk assessment. This paper proposes a semantic recognition method for ship motion patt...
ver más
|
|
|
|