Results 21 to 30 of about 71,458 (159)

Creation of intelligent information decision support systems [PDF]

open access: yesE3S Web of Conferences, 2023
The use of intelligent information decision support systems implies considering the problem area's specifics. The object of study is characterized by the following set of features: - quality and efficiency of decision-making; - vagueness of goals and ...
Sultanov Murodjon   +3 more
doaj   +1 more source

Answer Extraction Method for Reading Comprehension Based on Frame Semantics and GraphStructure [PDF]

open access: yesJisuanji kexue, 2023
Machine reading comprehension is one of the most challenging tasks in the field of natural language processing.With the continuous development of deep learning technology and the release of large-scale MRC datasets,the performance of MRC models keep ...
YANG Zhizhuo, XU Lingling, Zhang Hu, LI Ru
doaj   +1 more source

New Reverse Engineering Tool to Transform Oracle10g Code to Entity Relationship Model [PDF]

open access: yesAl-Rafidain Journal of Computer Sciences and Mathematics, 2013
Reverse engineering is one of the important operations performed on programming codes to get their design presented graphically. Reverse engineering is performed on various types of databases to get their particular designs represented by different ...
Nada Saleem, Saad Th.
doaj   +1 more source

ER-LAC: Span-Based Joint Entity and Relation Extraction Model with Multi-Level Lexical and Attention on Context Features

open access: yesApplied Sciences, 2023
In recent years, joint entity–relation extraction (ERE) models have become a hot research topic in natural language processing (NLP). Several studies have proposed a span-based ERE framework, which utilizes simple span embeddings for entity and relation ...
Yaqin Zhu   +5 more
doaj   +1 more source

Chinese Nested Named Entity Recognition Based on Location Embedding and Multilevel Prediction [PDF]

open access: yesJisuanji gongcheng, 2023
Traditional Chinese nested Named Entity Recognition(NER) models often face problems, such as difficulty in accurately locating entity boundaries and blurred boundaries between Chinese characters and vocabulary.
Jianyong DUAN, Yifei ZHU, Hao WANG, Li HE, Xin LI
doaj   +1 more source

Knowledge Graph Completion Based on Half-Edge Principle [PDF]

open access: yesJisuanji gongcheng, 2020
Existing knowledge graph completion algorithms are time-consuming and inaccurate.To address these problems,this paper proposes a multi-layer convolution model based on half-edge.The model introduces the half-edge principle,and uses the descriptive ...
CHENG Tao, CHEN Heng, LI Guanyu
doaj   +1 more source

Entity Alignment Based on Dynamic Graph Attention and Label Propagation [PDF]

open access: yesJisuanji gongcheng
Entity alignment is an effective approach for multi-source database fusion with the aim of identifying co-referring entities in multi-source knowledge graphs. Recently, Graph Convolutional Network (GCN) have emerged as a new paradigm for entity alignment
MO Shaocong, CHEN Qingfeng, XIE Ze, LIU Chunyu, QIU Junlai
doaj   +1 more source

Knowledge Graph-Based Method for Intelligent Generation of Emergency Plans for Water Conservancy Projects

open access: yesIEEE Access, 2023
In response to the issues of poor content correlation and insufficient intelligent decision support in emergency plans for water conservancy projects, a method for intelligent generation of emergency plans based on knowledge graphs is proposed. Utilizing
Lihu Wang   +5 more
doaj   +1 more source

Exploring Large Language Models’ Ability to Describe Entity-Relationship Schema-Based Conceptual Data Models

open access: yesInformation
In the field of databases, Large Language Models (LLMs) have recently been studied for generating SQL queries from textual descriptions, while their use for conceptual or logical data modeling remains less explored.
Andrea Avignone   +3 more
doaj   +1 more source

Access control relationship prediction method based on GNN dual source learning

open access: yes网络与信息安全学报, 2022
With the rapid development and wide application of big data technology, users’ unauthorized access to resources becomes one of the main problems that restrict the secure sharing and controlled access to big data resources.The ReBAC (Relationship-Based ...
Dibin SHAN, Xuehui DU, Wenjuan WANG, Aodi LIU, Na WANG
doaj   +3 more sources

Home - About - Disclaimer - Privacy