• Title/Summary/Keyword: rule language

Search Result 399, Processing Time 0.024 seconds

An effective automated ontology construction based on the agriculture domain

  • Deepa, Rajendran;Vigneshwari, Srinivasan
    • ETRI Journal
    • /
    • v.44 no.4
    • /
    • pp.573-587
    • /
    • 2022
  • The agricultural sector is completely different from other sectors since it completely relies on various natural and climatic factors. Climate changes have many effects, including lack of annual rainfall and pests, heat waves, changes in sea level, and global ozone/atmospheric CO2 fluctuation, on land and agriculture in similar ways. Climate change also affects the environment. Based on these factors, farmers chose their crops to increase productivity in their fields. Many existing agricultural ontologies are either domain-specific or have been created with minimal vocabulary and no proper evaluation framework has been implemented. A new agricultural ontology focused on subdomains is designed to assist farmers using Jaccard relative extractor (JRE) and Naïve Bayes algorithm. The JRE is used to find the similarity between two sentences and words in the agricultural documents and the relationship between two terms is identified via the Naïve Bayes algorithm. In the proposed method, the preprocessing of data is carried out through natural language processing techniques and the tags whose dimensions are reduced are subjected to rule-based formal concept analysis and mapping. The subdomain ontologies of weather, pest, and soil are built separately, and the overall agricultural ontology are built around them. The gold standard for the lexical layer is used to evaluate the proposed technique, and its performance is analyzed by comparing it with different state-of-the-art systems. Precision, recall, F-measure, Matthews correlation coefficient, receiver operating characteristic curve area, and precision-recall curve area are the performance metrics used to analyze the performance. The proposed methodology gives a precision score of 94.40% when compared with the decision tree(83.94%) and K-nearest neighbor algorithm(86.89%) for agricultural ontology construction.

Gloria Naylor's Linden Hills: A Tragic Saga of the Oppressive "Primal Scene" and Deformed "Family Romance" (글로리아 네일러의 『린덴 힐즈』 -억압적 '원장면'과 왜곡된 '가족 로맨스'의 비극)

  • Hwangbo, Kyeong
    • Journal of English Language & Literature
    • /
    • v.58 no.1
    • /
    • pp.21-42
    • /
    • 2012
  • Gloria Naylor's second novel Linden Hills (1985) explores the issues of self-exploration, empowerment, history, and memory by delineating the communal and familial tragedies and the distortion of values prevalent in a prosperous African-American urban community called Linden Hills. Drawing upon the Freud's concept of "primal scene" and "family romance," this paper aims to focus upon the Nedeed family, the founder of Linden Hills, and investigate the compelling traumatogenic force within the family, which is inseparably intertwined with the inversion of values and moral corruption permeating the entire community. The "primal crime" committed by the Nedeed ancestors serves to preserve and perpetuate a tyrannical rule by ruthless patriarchs who reign by underhanded strategies of purposefully neglecting and abusing others, including their own wives. The imprisonment, by Luther Nedeed, of his wife Willa in the family morgue epitomizes the long legacy running in the family-the oppression and burial of the pre-Oedipal, maternal history. Willa's accidental encounter, at the nadir of the family estate and her personal despair, with the faded records of the forgotten and abused Nedeed women exposes the violence-ridden ground of the family's primal scene and the absurdity of family romance the Nedeeds pursued. As the several lines of poem composed by Willie, Willa's male double, show, the hidden, forgotten history of the Nedeed women, in a sense, is the real, which cannot be assimilated to the social symbolic governed by the inhumane patriarchy of the Nedeed family and the success-oriented Linden Hills society. By portraying a catastrophic downfall of the Nedeed family and the futile outcome of its family romance, the ending of Linden Hills conveys implicitly that the contingent symbolic order and its oppressive control, however solid and invincible they may seem, can be toppled down by the real, its nameless forgotten Other.

Revenge of the Flesh: The Return of Sexual and Racial Otherness in Faulkner's Absalom, Absalom! ('육체의 복수' -포크너의 『압살롬, 압살롬!』에 나타난 성적, 인종적 타자의 귀환)

  • Kwon, Jieun
    • Journal of English Language & Literature
    • /
    • v.58 no.4
    • /
    • pp.701-721
    • /
    • 2012
  • This paper aims to revisit William Faulkner's Absalom, Absalom! by focusing on the corporeal body and its role in dismantling the Southern ideology of white patriarchy. The latter, which is represented by Thomas Sutpen and his attempt to establish a white male dynasty, is a symbolic space in which the corporeal body turns into a symbolic one through the process of inscribing social ideologies on it. However, this symbolic space is also a contending site between the two bodies. The symbolic body of Sutpen cannot entirely erase its corporeal traces, and therefore the corporeal body, which is buried but nonetheless existent, threatens to undermine rules and premises of the symbolic order. Given that, this paper approaches Faulkner's critique of the Southern white patriarchal ideology from the tension that the corporeal body and the symbolic body create. The 'flesh' roughly corresponds to racial and sexual otherness, namely black flesh and the homoerotic desire of male body. Although they-as the matter of race and that of gender - function in different levels of signification, they still share a common purpose in revealing the logical paradox within Sutpen's symbolic order. The idea of pure whiteness that Sutpen subscribes to is a concept that prerequisites the existence of blackness. Likewise, his idea of male homosociality based upon patriarchal legacy stands precariously on the verge of disintegrating into homoetoricism. As internal otherness that Sutpen's symbolic order cannot fully incorporate, the corporeal body functions to indicate the limitation of Sutpen's Design and its body-signification process.

Integration of Ontology Open-World and Rule Closed-World Reasoning (온톨로지 Open World 추론과 규칙 Closed World 추론의 통합)

  • Choi, Jung-Hwa;Park, Young-Tack
    • Journal of KIISE:Software and Applications
    • /
    • v.37 no.4
    • /
    • pp.282-296
    • /
    • 2010
  • OWL is an ontology language for the Semantic Web, and suited to modelling the knowledge of a specific domain in the real-world. Ontology also can infer new implicit knowledge from the explicit knowledge. However, the modeled knowledge cannot be complete as the whole of the common-sense of the human cannot be represented totally. Ontology do not concern handling nonmonotonic reasoning to detect incomplete modeling such as the integrity constraints and exceptions. A default rule can handle the exception about a specific class in ontology. Integrity constraint can be clear that restrictions on class define which and how many relationships the instances of that class must hold. In this paper, we propose a practical reasoning system for open and closed-world reasoning that supports a novel hybrid integration of ontology based on open world assumption (OWA) and non-monotonic rule based on closed-world assumption (CWA). The system utilizes a method to solve the problem which occurs when dealing with the incomplete knowledge under the OWA. The method uses the answer set programming (ASP) to find a solution. ASP is a logic-program, which can be seen as the computational embodiment of non-monotonic reasoning, and enables a query based on CWA to knowledge base (KB) of description logic. Our system not only finds practical cases from examples by the Protege, which require non-monotonic reasoning, but also estimates novel reasoning results for the cases based on KB which realizes a transparent integration of rules and ontologies supported by some well-known projects.

Break Predicting Methods Using Phonetic Symbols Combined with Accents Information in a Japanese Speech Synthesizer (일본어 합성기에서 악센트 정보가 결합된 발음기호를 이용한 Break 예측 방법)

  • Na, Deok-Su;Lee, Jong-Seok;Kim, Jong-Kuk;Bae, Myung-Jin
    • MALSORI
    • /
    • no.62
    • /
    • pp.69-84
    • /
    • 2007
  • Japanese is a language having intonations, which are indicated by the relative differences in pitch heights and the accentual phrases (APs) are placed according to the changes of the accents while a break occurs on a boundary of the APs. Although a break can be predicted by using J-ToBI, which is a rule-based or statistical approach, it is very difficult to predict a break exactly due to the flexibility. Therefore, in this paper, a method which can enhance the quality of synthesized speech by reducing the errors in predicting break indices (BI), are proposed. The method is to use a new definition for the phonetic symbols, which combine the phonetic values of Japanese words with the accents information. Since a stream of defined phonetic symbols includes the information on the changes in intonations, the BI can be easily predicted by dividing the intonation phrase (IP) into several APs. As a result of an experiment, the accuracy of break generations was 98 % and the proposed method contributed itself to enhance the naturalness of synthesized speeches.

  • PDF

The Detection and Correction of Context Dependent Errors of The Predicate using Noun Classes of Selectional Restrictions (선택 제약 명사의 의미 범주 정보를 이용한 용언의 문맥 의존 오류 검사 및 교정)

  • So, Gil-Ja;Kwon, Hyuk-Chul
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.1
    • /
    • pp.25-31
    • /
    • 2014
  • Korean grammar checkers typically detect context-dependent errors by employing heuristic rules; these rules are formulated by language experts and consisted of lexical items. Such grammar checkers, unfortunately, show low recall which is detection ratio of errors in the document. In order to resolve this shortcoming, a new error-decision rule-generalization method that utilizes the existing KorLex thesaurus, the Korean version of Princeton WordNet, is proposed. The method extracts noun classes from KorLex and generalizes error-decision rules from them using the Tree Cut Model and information-theory-based MDL (minimum description length).

Instruction Effects of Teaching Relative Clauses on Comprehension and Production in Korean EFL Classes

  • Chu, Hera
    • English Language & Literature Teaching
    • /
    • v.18 no.1
    • /
    • pp.23-43
    • /
    • 2012
  • This study investigates the effects of three different types of instruction, namely form-based, comprehension-based, and production-based on the development of Korean university students' (n=137) comprehension and production of English relative clauses (RCs). The extent of improvements was analyzed by administering pre-and post-tests consisting of two comprehension tests (selecting the right form of RCs and the right picture descriptions) and one production test (combining two sentences). Findings of this study suggest that all three types of instruction increased participants' comprehension and productions of RCs. However, there appeared differential effects by the instruction type. It was found production-based instruction was most effective in promoting comprehension, followed by comprehension-based instruction. Comprehension-based instruction worked best with the development of production, suggesting that the effects of comprehension training did not only work for increasing comprehension skills, but also transfer to production skills. The type or level of tasks employed for each instruction appeared to play an important role in causing such results. Form-based instruction displayed the lowest improvements in both comprehension and production of RCs. A sentence-combination task employed for form-based instruction appear to result in mere explicit rule explanations without chances to notice rules in context or use their knowledge in practice.

  • PDF

On Subject auxiliary inversion in English (주어-조동사 도치에 관한 소고)

  • Suh, Jin-Hee
    • English Language & Literature Teaching
    • /
    • no.6
    • /
    • pp.143-157
    • /
    • 2000
  • It has been one of the puzzles in the English syntax that so called the rule of subject-auxiliary inversion (SAI) is not allowed in subject wh-movement while it is not obligatory in non-subject wh-movement in a root sentence. This asymmetry has been a puzzle since SAI itself was thought to be a part of question construction as we can observe from yes/no questions. The asymmetry gets more complicated in terms of sentence embedding, i.e no SAI is permitted in the embedded context in question. The goal of this paper is to suggest an unified analysis for this unsolved grammatical phenomena on the basis of Rizzi (1997)'s recent work. The main idea is that SAI is not a I-to-C movement but one of I-to-Focus where Focus is a functional category and its phrase is located between CP and IP. The other proposal is that Wh-movement is no more homogeneous in terms of landing site between a root and an embedded sentence: the target for a wh-phrase in the former is the Spec of FocP (Focus Phrase) but the one in the latter is the Spec of CP as the standard theory assumes. Pesetsky (l999)'s analysis is discussed and its theoretical and empirical shortages are pointed out. Its rather radical proposals such as the one that the nominative case is just an uninterpretable tense feature of DP and the other that 'that' is no longer a complementizer but an element of I(nflection) make it less acceptable in spite of the possibility that it can get rid of Case theory entirely, which would be ideal in the spirit of minimalism.

  • PDF

Comparative Study of Knowledge Extraction on the Industrial Applications

  • Woo, Young-Kwang;Bae, Hyeon;Kim, Sung-Shin;Woo, Kwang-Bang
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.1338-1343
    • /
    • 2003
  • Data is the expression of the language or numerical values that show some characteristics. And information is extracted from data for the specific purposes. The knowledge is utilized as information to construct rules that recognize patterns and make decisions. Today, knowledge extraction and application of the knowledge are broadly accomplished to improve the comprehension and to elevate the performance of systems in several industrial fields. The knowledge extraction could be achieved by some steps that include the knowledge acquisition, expression, and implementation. Such extracted knowledge can be drawn by rules. Clustering (CU, input space partition (ISP), neuro-fuzzy (NF), neural network (NN), extension matrix (EM), etc. are employed for expression the knowledge by rules. In this paper, the various approaches of the knowledge extraction are examined by categories that separate the methods by the applied industrial fields. Also, the several test data and the experimental results are compared and analysed based upon the applied techniques that include CL, ISP, NF, NN, EM, and so on.

  • PDF

Access Control as a Service for Information Protection in Semantic Web based Smart Environment

  • Siddiqui, Isma Farah;Lee, Scott Uk-Jin
    • Journal of Internet Computing and Services
    • /
    • v.17 no.5
    • /
    • pp.9-16
    • /
    • 2016
  • Pervasive computing and Internet of Things (IoT) have recently received considerable interest to deploy solutions for the future Internet. Smart environments are integrated with Semantic Web to provide context-awareness to the processed information. Self-learning techniques have been adopted within smart solutions for efficient retrieval of data but do not process data with privacy parameters for in-place authorization. To overcome this issue, we present a novel approach of deploying access control as a service mechanism within Semantic Web based smart environment by using eXtensible Access Control Markup Language (XACML). The proposed XACML as a Service (XACMLaaS) approach offers fine-grained access control for protecting information within smart environment. In this paper, we have defined mathematical rules for each components of proposed access control service layer. These rules are for implementation of access control using XACML. The proposed approach allows the adaptation of authorization of information at component level and provides scalable solution for authorization policies and rule enforcement within smart environment.