Cyberspace最新文献

筛选
英文 中文
Tagging and Tag Recommendation 标签和标签推荐
Cyberspace Pub Date : 2020-06-17 DOI: 10.5772/intechopen.82242
Fabiano M. Belém, Jussara M. Almeida, Marcos A. Gonçalves
{"title":"Tagging and Tag Recommendation","authors":"Fabiano M. Belém, Jussara M. Almeida, Marcos A. Gonçalves","doi":"10.5772/intechopen.82242","DOIUrl":"https://doi.org/10.5772/intechopen.82242","url":null,"abstract":"Tagging has emerged as one of the best ways of associating metadata with objects (e.g., videos, texts) in Web 2.0 applications. Consisting of freely chosen keywords assigned to objects by users, tags represent a simpler, cheaper, and a more natural way of organizing content than a fixed taxonomy with a controlled vocabulary. Moreover, recent studies have demonstrated that among other textual features such as title, description, and user comments, tags are the most effective to support information retrieval (IR) services such as search, automatic classification, and content recommendation. In this context, tag recommendation services aim at assisting users in the tagging process, allowing users to select some of the recommended tags or to come up with new ones. Besides improving user experience, tag recommendation services potentially improve the quality of the generated tags, benefiting IR services that rely on tags as data sources. Besides the obvious benefit of improving the description of the objects, tag recommendation can be directly applied in IR services such as search and query expansion. In this chapter, we will provide the main concepts related to tagging systems, as well as an overview of tag recommendation techniques, dividing them into two stages of the tag recommendation process: (1) the candidate tag extraction and (2) the candidate tag ranking.","PeriodicalId":34308,"journal":{"name":"Cyberspace","volume":"18 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78802862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Cyberspace and Artificial Intelligence: The New Face of Cyber-Enhanced Hybrid Threats 网络空间和人工智能:网络增强混合威胁的新面貌
Cyberspace Pub Date : 2020-06-17 DOI: 10.5772/intechopen.88648
Carlos Pedro Gonçalves
{"title":"Cyberspace and Artificial Intelligence: The New Face of Cyber-Enhanced Hybrid Threats","authors":"Carlos Pedro Gonçalves","doi":"10.5772/intechopen.88648","DOIUrl":"https://doi.org/10.5772/intechopen.88648","url":null,"abstract":"","PeriodicalId":34308,"journal":{"name":"Cyberspace","volume":"62 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86372813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
5G Road Map to Communication Revolution 5G通信革命路线图
Cyberspace Pub Date : 2020-05-14 DOI: 10.5772/intechopen.92319
Evon M. O. Abu-Taieh, I. A. Hadid, Ali Zolait
{"title":"5G Road Map to Communication Revolution","authors":"Evon M. O. Abu-Taieh, I. A. Hadid, Ali Zolait","doi":"10.5772/intechopen.92319","DOIUrl":"https://doi.org/10.5772/intechopen.92319","url":null,"abstract":"The goal of this chapter is to give researchers, practitioners, and students a pedestal to get a comprehensive look at the new technology of communication named 5G. The chapter will present an introduction that shows the importance of 5G to the different uses of the Internet. Then, the chapter will present two essential aspects: (1) 5G research in academia and real world and (2) timeline of Gs. Then, the chapter will discuss three aspects of 5G which are, namely, (1) Regulations, (2) security, and (3) the 5 enabling Technologies. Then, the chapter will discuss the real-life case of South Korea mobile carrier.","PeriodicalId":34308,"journal":{"name":"Cyberspace","volume":"66 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74474102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Cyberspace as a New Living World and Its Axiological Contexts 网络空间作为一个新的生活世界及其价值论语境
Cyberspace Pub Date : 2020-03-28 DOI: 10.5772/intechopen.91907
S. Tolnaiová, S. Gálik
{"title":"Cyberspace as a New Living World and Its Axiological Contexts","authors":"S. Tolnaiová, S. Gálik","doi":"10.5772/intechopen.91907","DOIUrl":"https://doi.org/10.5772/intechopen.91907","url":null,"abstract":"The subject of the chapter is cyberspace in an axiological perspective, which is our new lifeworld. The focus is particularly on the problem of the quality of our life in its specific circumstances. The aim is (on the background of the characteristics of cyberspace as a lifeworld) to solve the problem of values and significance, but also the risks of our so-called cyber experience. In this context, the aim is also to identify various conditions, axiological indicators and the relevant elements of the quality of our life in cyberspace. The authors pursue their goal using the phenomenological-hermeneutic method within the four parts of the chapter. In part 1, cyberspace is interpreted as a life world that is co-constructed in our acts of communication. In part 2, the problem of values, significance and risks of our cyber experience is discussed. The key variable is digital “well-being.” As they point out in part 3, it should be our morally based value “good life,” which is expressed as “ethos” in our life. In part 4, in this perspective, we are faced with the relevant task of the art of living ‘ars vivendi’ with the necessary coherent self-understanding and value-moral claims and the education should also have a “psychological” dimension.","PeriodicalId":34308,"journal":{"name":"Cyberspace","volume":"46 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83741793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Classification Model for Bullying Posts Detection 欺凌帖子检测的分类模型
Cyberspace Pub Date : 2019-12-05 DOI: 10.5772/intechopen.88633
K. Nalini, L. Jabasheela
{"title":"Classification Model for Bullying Posts Detection","authors":"K. Nalini, L. Jabasheela","doi":"10.5772/intechopen.88633","DOIUrl":"https://doi.org/10.5772/intechopen.88633","url":null,"abstract":"Nowadays, many research tasks are concentrating on Social Media for Analyzing Sentiments and Opinions, Political Issues, Marketing Strategies and many more. Several text mining structures have been designed for different applications. Harassing is a category of claiming social turmoil in different structures and con-duct toward a singular or group, to damage others. Investigation outcomes demonstrated that 7 young people out of 10 become the casualty of cyber bullying. Throughout the world, many prominent cases are existing due to the bad communications over the Web. So there could be suitable solutions for this problem and there is a need to eradicate the lacking in existing strategies in dealing problems with cyber bullying incidents. A prominent aim is to design a scheme to alert the people those who are using social networks and also to prevent them from bullying environments. Tweet corpus carries the messages in the text as well as it has ID, time, and so forth. The messages are imparted in informal form and furthermore, there is variety in the dialect. So, there is a requirement to operate a progression of filtration to handle the raw tweets before feature extraction and frequency extraction. The idea is to regard each tweet as a limited blend over a basic arrangement of topics, each of which is described by dissemination over words, and after that analyze tweets through such topic dispersions. Naturally, bullying topics might be related to higher probabilities for bullying words. An arrangement of training tweets with both bullying and non-bullying texts are required to take in a model that can derive topic distributions from tweets. Topic modeling is used to get lexical collocation designs in the irreverent content and create significant topics for a model.","PeriodicalId":34308,"journal":{"name":"Cyberspace","volume":"73 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89473970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blind Wavelet-Based Image Watermarking 基于盲小波的图像水印
Cyberspace Pub Date : 2019-11-27 DOI: 10.5772/INTECHOPEN.88131
A. Algarni, Hanaa A. Abdallah
{"title":"Blind Wavelet-Based Image Watermarking","authors":"A. Algarni, Hanaa A. Abdallah","doi":"10.5772/INTECHOPEN.88131","DOIUrl":"https://doi.org/10.5772/INTECHOPEN.88131","url":null,"abstract":"In this chapter, the watermarking technique is blind; blind watermarking does not need any of the original images or any information about it to recover watermark. In this technique the watermark is inserted into the high frequencies. Three-level wavelet transform is applied to the image, and the size of the watermark is equal to the size of the detailed sub-band. Significant coefficients are used to embed the watermark. The proposed technique depends on quantization. The proposed watermarking technique generates images with less degradation.","PeriodicalId":34308,"journal":{"name":"Cyberspace","volume":"26 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-11-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72652242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Research Design and Methodology 研究设计与方法
Cyberspace Pub Date : 2019-08-07 DOI: 10.5772/INTECHOPEN.85731
Kassu Jilcha Sileyew
{"title":"Research Design and Methodology","authors":"Kassu Jilcha Sileyew","doi":"10.5772/INTECHOPEN.85731","DOIUrl":"https://doi.org/10.5772/INTECHOPEN.85731","url":null,"abstract":"","PeriodicalId":34308,"journal":{"name":"Cyberspace","volume":"43 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89039333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Cyberspace as a New Existential Dimension of Man 网络空间:人的新存在维度
Cyberspace Pub Date : 2019-07-25 DOI: 10.5772/INTECHOPEN.88156
S. Gálik, S. Tolnaiová
{"title":"Cyberspace as a New Existential Dimension of Man","authors":"S. Gálik, S. Tolnaiová","doi":"10.5772/INTECHOPEN.88156","DOIUrl":"https://doi.org/10.5772/INTECHOPEN.88156","url":null,"abstract":"Since the second half of the twentieth century, especially from the 1990s to the present, we have seen significant sociocultural changes that have mostly been influenced by information technology. In the area of information technology, it is mainly the Internet that is the essential part of all modern communication technologies such as smartphones, iPads, and so on. The Internet is a new communication space, also called cyberspace, in which we not only communicate but also work, learn, buy, have fun, and so on. It does not seem to be a mere “tool” of our new way of communication, but a dimension that becomes part of our existence. We then have to ask how our existence is changing under the influence of new technologies. How do we change the value system in cyberspace communication? What are the possibilities and risks of communication in cyberspace? These are just some of the issues that arise in connection with communication in cyberspace to which we will seek answers. In the chapter we use the phenomenological and hermeneutic method. Through the phenomenological method, we examine the basic structure of cyberspace (Clark, Ropolyi) and, using a hermeneutic method, examine the differences between communication in cyberspace and old media (Lohisse, Postman, Bystřický).","PeriodicalId":34308,"journal":{"name":"Cyberspace","volume":"18 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82911238","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Combined Deep Learning and Traditional NLP Approaches for Fire Burst Detection Based on Twitter Posts 结合深度学习和传统NLP方法的基于Twitter帖子的火灾探测
Cyberspace Pub Date : 2019-04-18 DOI: 10.5772/INTECHOPEN.85075
Konstantinos-George Thanos, Andrianna Polydouri, A. Danelakis, D. Kyriazanos, S. Thomopoulos
{"title":"Combined Deep Learning and Traditional NLP Approaches for Fire Burst Detection Based on Twitter Posts","authors":"Konstantinos-George Thanos, Andrianna Polydouri, A. Danelakis, D. Kyriazanos, S. Thomopoulos","doi":"10.5772/INTECHOPEN.85075","DOIUrl":"https://doi.org/10.5772/INTECHOPEN.85075","url":null,"abstract":"The current chapter introduces a procedure that aims at determining regions that are on fire, based on Twitter posts, as soon as possible. The proposed scheme utilizes a deep learning approach for analyzing the text of Twitter posts announcing fire bursts. Deep learning is becoming very popular within different text applica-tions involving text generalization, text summarization, and extracting text information. A deep learning network is to be trained so as to distinguish valid Twitter fire-announcing posts from junk posts. Next, the posts labeled as valid by the network have undergone traditional NLP-based information extraction where the initial unstructured text is converted into a structured one, from which potential location and timestamp of the incident for further exploitation are derived. Analytic processing is then implemented in order to output aggregated reports which are used to finally detect potential geographical areas that are probably threatened by fire. So far, the part that has been implemented is the traditional NLP-based and has already derived promising results under real-world conditions ’ testing. The deep learning enrichment is to be implemented and expected to build upon the performance of the existing architecture and further improve it.","PeriodicalId":34308,"journal":{"name":"Cyberspace","volume":"19 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86017031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Text Mining to Facilitate Domain Knowledge Discovery 促进领域知识发现的文本挖掘
Cyberspace Pub Date : 2019-04-08 DOI: 10.5772/INTECHOPEN.85362
Chengbin Wang, Xiaogang Ma
{"title":"Text Mining to Facilitate Domain Knowledge Discovery","authors":"Chengbin Wang, Xiaogang Ma","doi":"10.5772/INTECHOPEN.85362","DOIUrl":"https://doi.org/10.5772/INTECHOPEN.85362","url":null,"abstract":"The high-precision observation and measurement techniques have accelerated the rapid development of geoscience research in the past decades and have pro-duced large amounts of research outputs. Many findings and discoveries were recorded in the geological literature, which is regarded as unstructured data. For these data, traditional research methods have limited functions for integrating and mining them to make knowledge discovery. Text mining based on natural language processing (NLP) provides the necessary method and technology to analyze unstructured geological literature. In this book chapter, we will review the latest researches of text mining in the domain of geoscience and present results from a few case studies. The research includes three major parts: (1) structuralization of geological literature, (2) information extraction and visualization for geological literature, and (3) geological text mining to assist database construction and knowledge discovery.","PeriodicalId":34308,"journal":{"name":"Cyberspace","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84091647","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信