scholarly journals Triple Classification Using Regions and Fine-Grained Entity Typing

Author(s):  
Tiansi Dong ◽  
Zhigang Wang ◽  
Juanzi Li ◽  
Christian Bauckhage ◽  
Armin B. Cremers

A Triple in knowledge-graph takes a form that consists of head, relation, tail. Triple Classification is used to determine the truth value of an unknown Triple. This is a hard task for 1-to-N relations using the vector-based embedding approach. We propose a new region-based embedding approach using fine-grained type chains. A novel geometric process is presented to extend the vectors of pre-trained entities into n-balls (n-dimensional balls) under the condition that head balls shall contain their tail balls. Our algorithm achieves zero energy cost, therefore, serves as a case study of perfectly imposing tree structures into vector space. An unknown Triple (h,r,x) will be predicted as true, when x’s n-ball is located in the r-subspace of h’s n-ball, following the same construction of known tails of h. The experiments are based on large datasets derived from the benchmark datasets WN11, FB13, and WN18. Our results show that the performance of the new method is related to the length of the type chain and the quality of pre-trained entityembeddings, and that performances of long chains with welltrained entity-embeddings outperform other methods in the literature. Source codes and datasets are located at https: //github.com/GnodIsNait/mushroom.

2020 ◽  
Vol 12 (9) ◽  
pp. 145
Author(s):  
Franklin Tchakounté ◽  
Athanase Esdras Yera Pagor ◽  
Jean Claude Kamgang ◽  
Marcellin Atemkeng

To keep its business reliable, Google is concerned to ensure the quality of apps on the store. One crucial aspect concerning quality is security. Security is achieved through Google Play protect and anti-malware solutions. However, they are not totally efficient since they rely on application features and application execution threads. Google provides additional elements to enable consumers to collectively evaluate applications providing their experiences via reviews or showing their satisfaction through rating. The latter is more informal and hides details of rating whereas the former is textually expressive but requires further processing to understand opinions behind it. Literature lacks approaches which mine reviews through sentiment analysis to extract useful information to improve the security aspects of provided applications. This work goes in this direction and in a fine-grained way, investigates in terms of confidentiality, integrity, availability, and authentication (CIAA). While assuming that reviews are reliable and not fake, the proposed approach determines review polarities based on CIAA-related keywords. We rely on the popular classifier Naive Bayes to classify reviews into positive, negative, and neutral sentiment. We then provide an aggregation model to fusion different polarities to obtain application global and CIAA reputations. Quantitative experiments have been conducted on 13 applications including e-banking, live messaging and anti-malware apps with a total of 1050 security-related reviews and 7,835,322 functionality-related reviews. Results show that 23% of applications (03 apps) have a reputation greater than 0.5 with an accent on integrity, authentication, and availability, while the remaining 77% has a polarity under 0.5. Developers should make a lot of effort in security while developing codes and that more efforts should be made to improve confidentiality reputation. Results also show that applications with good functionality-related reputation generally offer a bad security-related reputation. This situation means that even if the number of security reviews is low, it does not mean that the security aspect is not a consumer preoccupation. Unlike, developers put much more time to test whether applications work without errors even if they include possible security vulnerabilities. A quantitative comparison against well-known rating systems reveals the effectiveness and robustness of CIAA-RepDroid to repute apps in terms of security. CIAA-RepDroid can be associated with existing rating solutions to recommend developers exact CIAA aspects to improve within source codes.


Author(s):  
Franklin Tchakounté ◽  
Athanase Esdras Yera Pagore ◽  
Jean Claude Kamgang ◽  
Marcellin Atemkeng

To keep its business reliable, Google is concerned to ensure quality of apps on the store. One crucial aspect concerning quality is security. Security is achieved through Google Play protect and anti-malware solutions. However, they are not totally efficient since they rely on application features and application execution threads. Google provides additional elements to enable consumers to collectively evaluate applications providing their experiences via reviews or showing their satisfaction through rating. The latter is more informal and hides details of rating whereas the former is textually expressive but requires further processing to understand opinions behind. Literature lacks approaches which mine reviews through sentiment analysis to extract useful information to improve security aspects of provided applications. This work goes in this direction and in a fine-grained way, investigates in terms of confidentiality, integrity, availability and authentication (CIAA). While assuming that reviews are reliable and not fake, the proposed approach determines review polarities based on CIAA-related keywords. We rely on the popular classifier Naive Bayes to classify reviews into positive, negative and neutral sentiment. We then provide an aggregation model to fusion different polarities to obtain application global and CIAA reputations. Quantitative experiments have been conducted on 13 applications including e-banking, live messaging and anti-malware apps with a total of 1050 security-related reviews and 7.835.322 functionality-related reviews. Results show that 23% of applications (03 apps) have a reputation greater than 0.5 with an accent on integrity, authentication and availability, while the remaining 77% has a polarity under 0.5. Developers should make lot of efforts in security while developing codes and that more efforts should be made to improve confidentiality reputation. Results also show that applications with good functionality-related reputation generally offer bad security-related reputation. This situation means that even if the number of security reviews is low, it does not mean that security aspect is not a consumer preoccupation. Unlike, developers put much more time to test whether applications works without errors even if they include possible security vulnerabilities. A quantitative comparison against well-known rating systems reveals effectiveness and robustness of CIAA-RepDroid to repute apps in terms of security. CIAA-RepDroid can be associated to existing rating solutions to recommend developers exact CIAA aspects to improve within source codes.


2018 ◽  
Vol 32 (2) ◽  
pp. 1612-1623 ◽  
Author(s):  
Haihua Zhu ◽  
Dakang Zhong ◽  
Tingshan Zhang ◽  
Guangcheng Liu ◽  
Jingli Yao ◽  
...  

2020 ◽  
Vol 29 (4) ◽  
pp. 685-690
Author(s):  
C. S. Vanaja ◽  
Miriam Soni Abigail

Purpose Misophonia is a sound tolerance disorder condition in certain sounds that trigger intense emotional or physiological responses. While some persons may experience misophonia, a few patients suffer from misophonia. However, there is a dearth of literature on audiological assessment and management of persons with misophonia. The purpose of this report is to discuss the assessment of misophonia and highlight the management option that helped a patient with misophonia. Method A case study of a 26-year-old woman with the complaint of decreased tolerance to specific sounds affecting quality of life is reported. Audiological assessment differentiated misophonia from hyperacusis. Management included retraining counseling as well as desensitization and habituation therapy based on the principles described by P. J. Jastreboff and Jastreboff (2014). A misophonia questionnaire was administered at regular intervals to monitor the effectiveness of therapy. Results A detailed case history and audiological evaluations including pure-tone audiogram and Johnson Hyperacusis Index revealed the presence of misophonia. The patient benefitted from intervention, and the scores of the misophonia questionnaire indicated a decrease in the severity of the problem. Conclusions It is important to differentially diagnose misophonia and hyperacusis in persons with sound tolerance disorders. Retraining counseling as well as desensitization and habituation therapy can help patients who suffer from misophonia.


2017 ◽  
Vol 2 (3) ◽  
pp. 57-62
Author(s):  
Anna Maria Siciliano

This paper presents a successful behavioral case study in treatment of chronic refractory cough in a 60-year-old adult female. The efficacy for speech-language pathology treating chronic cough is discussed along with description of treatment regime. Discussion focuses on therapy approaches used and the patient's report of changes in quality of life and frequency, duration, and severity reduction of her cough after treatment.


2020 ◽  
Vol 3 (2) ◽  
pp. 109-119
Author(s):  
Partono Partono

So far, in implementing school strategies, they tend not to utilize Information and Communication Technology (ICT), despite the availability of ICT resources available. Stages of strategic management are needed to generate the vision, mission, objectives, policy, program, budget, and procedures as well as control and evaluation process as an effort to utilize ICT to improve school quality. Based on the interpretation and the results of the study, it is concluded that schools have organized stages in strategic management that enable schools to have a quality profile. The impact of effective utilization of ICTs for schools is the achievement of effective school management, as per the National Education Standards, which is characterized by effective planning, implementation, control, and evaluation of school ICTs.The purpose of this study is to get a general description, describe, and reveal the Strategic Management of Information and Communication Technology Utilization to Improve the Quality of School Learning in Ciledug Al Musaddadiyah Vocational High School and Garut 1 Vocational High School, both on environmental analysis, strategic formulation, implementation and strategic evaluation. The research method used in this research is the case study method, because the problems studied occur in the place and situation of Ciledug Al Musaddadiyah Vocational School and Vocational High School 1 Garut. The use of case study models in this study is based on the consideration that to provide an overview of the strategic management activities of the use of ICTs carried out at vocational high schools with the ultimate goal of being able to improve the quality of school learning. Based on observations in the field of SMK 1 Garut and SMK Al Musaddadiyah Ciledug Garut is one of the public schools and private schools that have these advantages.


2019 ◽  
Vol 1 (1) ◽  
pp. 16-18 ◽  
Author(s):  
Norafida Bahari ◽  
Nik Azuan Nik Ismail ◽  
Jegan Thanabalan ◽  
Ahmad Sobri Muda

In this article, we evaluate the effectiveness of Cone Beam Computed Tomography, through a case study, in assessing the complication of intracranial bleeding during an endovascular treatment of brain arteriovenous malformation when compared to Multislice-Detector Computed Tomography performed immediately after the procedure. The image quality of Cone Beam Computed Tomography has enough diagnostic value in differentiating between haemorrhage, embolic materials and the arteriovenous malformation nidus to facilitate physicians to decide for further management of the patient.


Author(s):  
Norafida Bahari ◽  
NikAzuan Nik Ismail ◽  
Jegan Thanabalan ◽  
Ahmad Sobri Muda

In this article, we evaluate the effectiveness of Cone Beam Computed Tomography, through a case study, in assessing the complication of intracranial bleeding during an endovascular treatment of brain arteriovenous malformation when compared to Multislice-Detector Computed Tomography performed immediately after the procedure. The image quality of Cone Beam Computed Tomography has enough diagnostic value in differentiating between haemorrhage, embolic materials and the arteriovenous malformation nidus to facilitate physicians to decide for further management of the patient.


Sign in / Sign up

Export Citation Format

Share Document