Enhancement of Bag-of-Words for Legal documents using Legal Statute
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2016, Vol 18, Issue 4
Abstract
Abstract: In this paper Legal statute related to dowry acts has been processed to obtain a distinct set of legal keywords which don’t have a common occurrence in day to day dowry case judgments. This effort coupled with the knowledge of legal expert would give a very much broadened scope for the BoW. These keywords are veryrich in concept and well connected to the domain of dowry acts. The earlier work [22] constructed BoW for dowry case notes of judgments. Current work tries to improve the BoW by widening the scope of dowry related cases. This enriches the Bag-of-Words with high probability legal terms taking precedence over low probabilitynon-legal terms. The enriched BoW set when put through any of the similarity measures or machine learning techniques is bound to give better results when compared to earlier BoW[22].
Authors and Affiliations
B. BasaveswarRao , B. V. RamaKrishna , K. GangadharRao , K. Chandan
An Efficient Content Based Image Retrieval System
Abstract : Content based image retrieval is an active research issue that had been famous from 1990s till present. The main target of CBIR is to get accurate results with lower computational time. This paper discus...
An Efficient Resource Allocation with Adaptive Rate Scheduling For WCDMA Networks
Abstract: WCDMA is a spread spectrum technique that uses a unique spreading code to spread the data before transmission based on its orthogonal property. WCDMA is mainly used for 3rd generation cellular and mobilenetwork...
Resource Allocation in Cloud computing: A Comparative study
Abstract: Cloud computing is summed up as a different model for allowing favorable, network as per demand to use shared devices of computational resources which are collected and then released with marginal management ef...
Main Content Mining from Multi Data Region Deep Web Pages
Abstract: An Automatic Data extraction from the deep web pages is an endeavoring errand. Colossal web substance are gotten to as per well-known interest submitted to Web databases and the returned data records are e...
An Automated Model to Detect Fake Profiles and botnets inOnline Social Networks Using Steganography Technique
Abstract: At the present time, hundreds of millions of active users all around the world are using online socialnetwork, such as Facebook, Twitter, Tumblr and LinkedIn. This service turned out to be one of the most...