A Novel Way To Automatically Mine Comparable Entities From Comparative Questions
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 11
Abstract
A comparison activity usually contains search for applicable web pages containing information about the targeted products, find competing products, read reviews and identify pros and cons. In this paper we focus on finding a set of comparable entities given a user’s input entity. Comparing one thing with another is a archetypal part of human decision making process. Conversely it is not all the time simple to know what to compare and what are the substitutes. To deal with this complexity we present a novel way to automatically mine comparable entities from comparative questions that users posted online. To make sure high accuracy and high recall we develop a weakly-supervised bootstrapping method for comparative question recognition and similar entity extraction by leveraging a large online question archive. Both considerably do better than an existing state-of-the-art method.
Authors and Affiliations
P Ujwala Sai, N Rajesh Babu
Four Stage Encryption
Symmetric key Block ciphers have proven and widely used encryption and decryption methods. Still they lack security without proper modes of operations. A four stage encryption method suggested in this paper provides a...
Performance evaluation of different Segmentation techniques for Underwater and Arial images
The quality of underwater images is directly affected by water medium, atmosphere medium, pressure and Temperature. Arial images are affected by space temperature and solar noise. The segmentation is the most challen...
Storage Correctness Verification and Data Regaining In Cloud
Users no longer hold physical possession of the outsourced data makes the data integrity protection in cloud computing a formidable task particularly for users with constrained computing resources. Moreover users sho...
Survey on Different Data Hiding Techniques
Data is a vital resource in all areas. With the wide use of internet, the security of the data being transmitted over internet also became an important challenge. Now data security over internet has been an important...
Technical Survey of Heart of Propagation Models: A Spectrum Analysis
In this paper, we exhibit a sneak peak of dynamic spectrum access approaches. Different methodologies foreseen for dynamic spectrum access a r e expansively characterized under three models: selective model, impartin...