Preview

Alias Name

Good Essays
Open Document
Open Document
1240 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Alias Name
Abstract An individual is typically referred by numerous name aliases on the web. Accurate identification of aliases of a given person name is useful in various web related tasks such as information retrieval, sentiment analysis, personal name disambiguation, and relation extraction. We propose a method to extract aliases of a given personal name from the web. Given a personal name, the proposed method first extracts a set of candidate aliases. Second, we rank the extracted candidates according to the likelihood of a candidate being a correct alias of the given name. We propose a novel, automatically extracted lexical pattern-based approach to efficiently extract a large set of candidate aliases from snippets retrieved from a web search engine. We define numerous ranking scores to evaluate candidate aliases using three approaches: lexical pattern frequency, word co-occurrences in an anchor text graph, and page counts on the web. To construct a robust alias detection system, we integrate the different ranking scores into a single ranking function using ranking support vector machines. We evaluate the proposed method on three data sets: an English personal names data set, an English place names data set, and a Japanese personal names data set. The proposed method outperforms numerous baselines and previously proposed name alias extraction methods, achieving a statistically significant mean reciprocal rank (MRR) of 0.67. Experiments carried out using location names and Japanese personal names suggest the possibility of extending the proposed method to extract aliases for different types of named entities, and for different languages. Moreover, the aliases extracted using the proposed method are successfully utilized in an information retrieval task and improve recall by 20 percent in a relation detection task.

Problem Definition SEARCHING for information about people in the web is one of the most common activities of internet users. Around 30

You May Also Find These Documents Helpful

  • Powerful Essays

    Nt1330 Unit 1 Assignment

    • 883 Words
    • 4 Pages

    Name Entity (NE) is an expression that refers to proper names such as persons, locations, and organizations. For example: Arafat Awajan is a full professor at Princess Sumaya University for Technology in Jordan, then Arafat Awajan, Princess Sumaya University for Technology, and Jordan would be identified as reference to person, an organization, and location, respectively. The task that attempts to locate, extract, and automatically classify named entities into predefined classes or types in open-domain and unstructured texts, such as newspaper articles, was called Name Entity Recognition (NER)[Shaalan 2014].…

    • 883 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    Websites are routinely collecting information about customers and visitors to understand and serve their customers better. Personal information is collected and administrated with integrity, responsibility, and security.…

    • 423 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Answers Hr

    • 501 Words
    • 3 Pages

    1. The SBAR method: Answer | | standardizes the information delivered at handoff points. | | | minimizes the physical strain on the worker. | | | allows employees to work on flexible work schedules. | | | permits employees to access work information remotely.…

    • 501 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Raugh & Atkindon (1975) developed a method of using mental images to help improve memory that they called the ‘key word technique’. The experiment involved two groups of participants who were asked to learn a list of sixty Spanish words. One group was taught the ‘key word technique’ of using mental images to remember the words and the other group was not. When both groups were tested the group who used the ‘key word technique’ remembered more words than the group not taught the method. Another technique for improving memory by using mental images is mnemonics. A mnemonic can be any technique that enables someone to learn information, particularly lists and sequences. For example, in order to learn the spelling of ‘necessary’ using a mnemonic instead of repeating the letters of the word, you would learn the following phrase; Never Eat Cake Eat Salad…

    • 1013 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Verbal Learning Concepts

    • 427 Words
    • 2 Pages

    This paperwork comprises PSYCH 550 Week 5 Learning Team Assignment Verbal Learning Concepts of Memory Paper…

    • 427 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Memory Era - Psychology

    • 428 Words
    • 2 Pages

    The hypothesis is that narrative chaining will increase memory recall. Memory enhancing techniques (mnemonics) are acronyms and rhymes, acrostics, peg-word method, the method of loci and narrative chaining. Narrative chaining is when linking otherwise unrelated items to one another to form a meaningful sequence or story.…

    • 428 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Human Services

    • 635 Words
    • 3 Pages

    At the click of a button, a person is able to search the internet for what he or she needs. In the past 25 years, the internet has hit the largest boom that has yet to be seen on planet earth. The internet is a handy tool that allows a person to access any information he or she desires effortlessly, with little to no cost, depending upon what the person is looking for. The key to using the internet is to understand its purpose and what the site is trying to provide. Not everything that is on the web is legit or trustworthy; this is why it is important to really analyze the website thoroughly before taking too many actions. In today’s paper, I will be analyzing a specific web page and discussing my findings. I will also be discussing the value and relevance of this site to clients or human services agencies.…

    • 635 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Students were presented with 6 lists of 15 words each. After listening to each list we were asked to write down all the words that we remembered. Subsequently, we were given a 36 word recognition test. This test was comprised of 12 correct words, 12 critical non-represented words, and 12 completely unrelated words. Based on the research by Roediger and McDermott I hypothesized that I would find a similarly high percentage of false recall and false recognition items. I expected that at least 30 – 40 percent of my answers would be critical words. However the results were surprising; out of the 15 words on each list, on average I remembered 6.5 correctly, with a high of 10 and a low of 4. However, I did not have any incorrect responses, bringing the percentage of falsely recalled words to 0%. On the false recognition test I had 9/12 correct words, 1/12 critical non-represented words, and 0/12 unrelated words. The full results are shown…

    • 837 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Gardiner and colleagues (Gardiner & Java, 1990, 1993; Gardiner, Richardson-Klavhen, & Ramponi, 1997) developed a test in which participants are given a recognition task for a list of common words viewed earlier and classify each of the recognized items as something they remember (R response) or know (K response), was on the study list. Participants received detailed instructions so that their R responses and K responses reflect retrieval from episodic and semantic memory. For example, participants are told to make R responses to test items that they can consciously reexperience from the study list (e.g., participants make R responses to test items because in their mind 's eye, they consciously recollect seeing those words on the study list). In contrast, participants are told to make K responses to test items if they (a) are certain those were on the study list but (b) have no specific personal or contextual recollection of the items ' previous presentation. The use of this technique has shown that some…

    • 1555 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    Memory Strategies

    • 275 Words
    • 2 Pages

    The three memory techniques that work best with me are jingles, words, and pegging. I recall information through jingles to be more effective. I memorized telephone numbers of my faculty with a jingle I made up. Their numbers are the same but their extensions are different, so I recalled the information easier. The least effective to me was the story lines because if I am able to create a story I will end up going off track and confuse myself. I learn more from a jingle than words or pegging. As long as the jingle is catchy I am able to retain any information like lyrics from the gold fish commercial; “The snack that smiles back Goldfish”. Every time I come across any goldfish I think about the song. Plus as a visual learner I can connect one thing to another. Using the words memory technique I can also retain information. I used words before this exercise to remember order of operations with PEMDAS; please excuse my dear aunt Sallie, for Parentheses, Exponents, Multiply, Divide, Add and subtract. Using the pegging technique for history is a good way for me to hold on to information as well. In order for me to understand what events happen during a specific decade I use different color note cards to separate the events. I try to make connections through colors; for instincts all the events I am required to learn through the 1970s I use a green note cards and blue note cards for the 80s and red cards for the 90s. In the future I will practice the VCR3 memory technique because of the visualization and concentration.…

    • 275 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    In order to explain the use of various algorithms in this study, the algorithms will be discussed in this research. Naïve Bayes and Apriori will be used against the Stylometry data set. IBk will be used against the Keystroke Capture and Mouse Movement data sets. J48 will be used with the Mushroom Database. The choices of these techniques and their implementation will be discussed in detail in the methodologies section. According to Witten and Frank in Data Mining, the Naïve Bayes method is, “based on Bayes’srule and ‘Naïvely’ assumed independence — it is only valid to multiply probabilities when the According to Witten and Frank in Data Mining, the Naïve Bayes method is, “based on Bayes’s rule and ‘Naïvely’ assumed independence — it is only valid to multiply probabilities when the events are independent. The assumption that attributes are independent in real life certainly is simplistic one events are independent. The assumption that attributes are independent in real life certainly is a simplistic one.…

    • 494 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Objective: To determine the effect of the two learning tools in the memory retention of…

    • 293 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The phenomenon of the personalization of the internet is all around us. Sites such as Google, Facebook and Yahoo are adapting their results for each individual.…

    • 708 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Naive Bayes

    • 7200 Words
    • 29 Pages

    Hand D.J. and Yu K. (2001) Idiot’s Bayes—not so stupid after all? International Statistical Review, 69, 385–398. Hastie T.J. and Tibshirani R.J. (1990) Generalized Additive Models. London: Chapman and Hall. Jamain A. and Hand D.J. (2005) The na¨ve Bayes mystery: A statistical detective ı story. Pattern Recognition Letters, 26, 1752–1760. Jamain A. and Hand D.J. (2008) Mining supervised classification performance studies: A meta-analytic investigation. Journal of Classification, 25, 87–112. Langley P. (1993) Induction of recursive Bayesian classifiers. Proceedings of the Eighth European Conference on Machine Learning, Vienna, Austria: SpringerVerlag, 153–164. Mani S., Pazzani M.J., and West J. (1997) Knowledge discovery from a breast cancer database. Lecture Notes in Artificial Intelligence, 1211, 130–133. Metsis V., Androutsopoulos I., and Paliouras G. (2006) Spam filtering with na¨ve ı Bayes—which na¨ve Bayes? CEAS 2006—Third Conference on Email and Antiı Spam, Mountain View, California. Sahami M., Dumains S., Heckerman D., and Horvitz E. (1998) A Bayesian approach to filtering junk e-mail. In Learning for Text Categorization—Papers from the AAAI Workshop, Madison, Wisconsin, pp. 55–62. Titterington D.M., Murray G.D., Murray L.S., Spiegelhalter D.J., Skene A.M., Habbema J.D.F., and Gelpke G.J. (1981) Comparison of discrimination techniques applied to a complex data set of head injured patients. Journal of the Royal Statistical Society, Series A, 144, 145–175.…

    • 7200 Words
    • 29 Pages
    Good Essays
  • Good Essays

    Statement of Purpose

    • 736 Words
    • 3 Pages

    During the fourth year, I worked towards developing a Web Search Engine integrated with Facebook that helps in displaying customized search results – www.webminer.web44.net. The implementation of a Web Crawler was done using ‘Breadth First Search Algorithm’. This helped me learn the various aspects used by the modern search engines in retrieving data from the World Wide Web. An effective ‘PageRank algorithm’ was implemented for fast searching using ‘Lazy Learning…

    • 736 Words
    • 3 Pages
    Good Essays