scholarly journals Using the Cognitive Approach to Coherence Relations for Discourse Annotation

2019 ◽  
Vol 10 (2) ◽  
pp. 1-33
Author(s):  
Jet Hoek ◽  
Jacqueline Evers-Vermeul ◽  
Ted J. M. Sanders

The Cognitive approach to Coherence Relations (Sanders, Spooren, & Noordman, 1992) was originally proposed as a set of cognitively plausible primitives to order coherence relations, but is also increasingly used as a discourse annotation scheme. This paper provides an overview of new CCR distinctions that have been proposed over the years, summarizes the most important discussions about the operationalization of the primitives, and introduces a new distinction (disjunction) to the taxonomy to improve the descriptive adequacy of CCR. In addition, it reflects on the use of the CCR as an annotation scheme in practice. The overall aim of the paper is to provide an overview of state-of-the-art CCR for discourse annotation that can form, together with the original 1992 proposal, a comprehensive starting point for anyone interested in annotating discourse using CCR.

2016 ◽  
Vol 7 (2) ◽  
pp. 1-28 ◽  
Author(s):  
Merel C.J. Scholman ◽  
Jacqueline Evers-Vermeul ◽  
Ted J.M. Sanders

Over the last decennia, annotating discourse coherence relations has gained increasing interest of the linguistics research community. Because of the complexity of coherence relations, there is no agreement on an annotation standard. Current annotation methods often lack a systematic order of coherence relations. In this article, we investigate the usability of the cognitive approach to coherence relations, developed by Sanders et al. (1992, 1993), for discourse annotation. The theory proposes a taxonomy of coherence relations in terms of four cognitive primitives. In this paper, we first develop a systematic, step-wise annotation process. The reliability of this annotation scheme is then tested in an annotation experiment with non-trained, non-expert annotators. An implicit and explicit version of the annotation instruction was created to determine whether the type of instruction influences the annotator agreement. The results show that two of the four primitives, polarity and order of the segments, can be applied reliably by non-trained annotators. The other two primitives, basic operation and source of coherence, are more problematic. Participants using the explicit instruction show higher agreement on the primitives than participants used the implicit instruction. These results are comparable to agreement statistics of other discourse corpora annotated by trained, expert annotators. Given that non-trained, non-expert annotators show similar amounts of agreement, these results indicate that the cognitive approach to coherence relations is a promising method for annotating discourse.


2021 ◽  
pp. 1-30
Author(s):  
F. D. Maia ◽  
J. M. Lourenço da Saúde

ABSTRACT A state-of-the-art review of all the developments, standards and regulations associated with the use of major unmanned aircraft systems under development is presented. Requirements and constraints are identified by evaluating technologies specific to urban air mobility, considering equivalent levels of safety required by current and future civil aviation standards. Strategies, technologies and lessons learnt from remotely piloted aviation and novel unmanned traffic management systems are taken as the starting point to assess operational scenarios for autonomous urban air mobility.


2021 ◽  
Vol 11 (1) ◽  
Author(s):  
Moses Effiong Ekpenyong ◽  
Mercy Ernest Edoho ◽  
Udoinyang Godwin Inyang ◽  
Faith-Michael Uzoka ◽  
Itemobong Samuel Ekaidem ◽  
...  

AbstractWhereas accelerated attention beclouded early stages of the coronavirus spread, knowledge of actual pathogenicity and origin of possible sub-strains remained unclear. By harvesting the Global initiative on Sharing All Influenza Data (GISAID) database (https://www.gisaid.org/), between December 2019 and January 15, 2021, a total of 8864 human SARS-CoV-2 complete genome sequences processed by gender, across 6 continents (88 countries) of the world, Antarctica exempt, were analyzed. We hypothesized that data speak for itself and can discern true and explainable patterns of the disease. Identical genome diversity and pattern correlates analysis performed using a hybrid of biotechnology and machine learning methods corroborate the emergence of inter- and intra- SARS-CoV-2 sub-strains transmission and sustain an increase in sub-strains within the various continents, with nucleotide mutations dynamically varying between individuals in close association with the virus as it adapts to its host/environment. Interestingly, some viral sub-strain patterns progressively transformed into new sub-strain clusters indicating varying amino acid, and strong nucleotide association derived from same lineage. A novel cognitive approach to knowledge mining helped the discovery of transmission routes and seamless contact tracing protocol. Our classification results were better than state-of-the-art methods, indicating a more robust system for predicting emerging or new viral sub-strain(s). The results therefore offer explanations for the growing concerns about the virus and its next wave(s). A future direction of this work is a defuzzification of confusable pattern clusters for precise intra-country SARS-CoV-2 sub-strains analytics.


i-com ◽  
2017 ◽  
Vol 16 (2) ◽  
pp. 181-193 ◽  
Author(s):  
Christian Reuter ◽  
Katja Pätsch ◽  
Elena Runft

AbstractThe Internet and especially social media are not only used for supposedly good purposes. For example, the recruitment of new members and the dissemination of ideologies of terrorism also takes place in the media. However, the fight against terrorism also makes use of the same tools. The type of these countermeasures, as well as the methods, are covered in this work. In the first part, the state of the art is summarized. The second part presents an explorative empirical study of the fight against terrorism in social media, especially on Twitter. Different, preferably characteristic forms are structured within the scope with the example of Twitter. The aim of this work is to approach this highly relevant subject with the goal of peace, safety and safety from the perspective of information systems. Moreover, it should serve following researches in this field as basis and starting point.


Author(s):  
Thaísa C. Lacerda ◽  
Juliane V. Nunes ◽  
Christiane Gresse von Wangenheim

In this chapter, we discuss the importance of evaluating the usability of mobile applications using tools and technics that consider their specific characteristics. One common way to evaluate usability is using heuristics. However, since many assumptions regarding usability of computer applications are not true for mobile applications, a question arises: does there exist usability heuristics specific for this type of device? To answer this question, we conducted a systematic literature review. We mapped the encountered sets of heuristics to Nielsen's ten heuristics and identified additional ones specifically proposed for this kind of device. Our review indicates that research with respect to usability heuristics for mobile phones are still sparse. Nevertheless, this chapter provides an overview on the state of the art that can guide the design and evaluation of interfaces for mobile applications as well as provide a starting point for the evolution of such customized heuristics.


2019 ◽  
Vol 17 (1) ◽  
pp. 29-47 ◽  
Author(s):  
Theiss Bendixen

Laypeople hold beliefs about economics and policy issues—so-called folk-economic beliefs (FEBs)—that are often wrong or misleading according to professional economists. Here, I critically discuss a recent evolutionary–cognitive approach to understanding folk-economic beliefs. According to this approach (Boyer & Petersen 2018a), some economic beliefs are more prevalent than others, because such beliefs (i.e., folk-economic beliefs) resonate with evolved features of the human mind. I refer to this as the “FEB hypothesis”. A central challenge to the FEB hypothesis, with its heavy reliance on universal cognitive features, is to explain individual and cultural differences in economic beliefs and behavior. This challenge is the starting point for the discussion. Overall, the conclusion of this paper is that the FEB hypothesis relies on unnecessarily strong and controversial theoretical assumptions (e.g., “massive modularity” and the “Environment of Evolutionary Adaptedness”), and that it overlooks important findings from adjacent fields, but that the FEB hypothesis, following some modifications inspired by Dual Inheritance Theory, can be integrated with robust findings from the rest of the evolutionary, cognitive, and anthropological sciences, as well as standard political psychology. Based on this discussion, the paper ends with brief reflections on how to correct inaccurate folk-economic beliefs.


2014 ◽  
Vol 19 (4) ◽  
pp. 342-359 ◽  
Author(s):  
Allen O’Neill

Purpose – The purpose of this paper is to propose a framework for clinical governance, in particular, the compliance of data privacy in a healthcare organisation. Design/methodology/approach – The approach of the research was to highlight problem areas in compliance and governance risk management (governance, risk and compliance (GRC)) in general, and then identify knowledge in other domains that could be combined and applied to improve GRC management, and ultimately improve governance outcomes. Findings – There is a gap in the literature is respect of systems and frameworks to assist organisations in managing the complex minutiae associated with compliance. This paper addresses this gap by proposing a “compliance action framework” which builds on work existing in other domains in relation to education, process control and governance. Research limitations/implications – The present research provides a starting point for an implementation of the framework within a number of organisations, and opens questions for further research in the field. Originality/value – The GRC framework proposed in this paper contributes to the state of the art, by proposing processes for improving the governance capability and compliance outcomes within an organisation for governance of data privacy risk and data protection.


2018 ◽  
Vol 63 ◽  
pp. 1-43
Author(s):  
C. Vuik

In these lecture notes an introduction to Krylov subspace solvers and preconditioners is presented. After a discretization of partial differential equations large, sparse systems of linear equations have to be solved. Fast solution of these systems is very urgent nowadays. The size of the problems can be 1013 unknowns and 1013 equations. Iterative solution methods are the methods of choice for these large linear systems. We start with a short introduction of Basic Iterative Methods. Thereafter preconditioned Krylov subspace methods, which are state of the art, are describeed. A distinction is made between various classes of matrices. At the end of the lecture notes many references are given to state of the art Scientific Computing methods. Here, we will discuss a number of books which are nice to use for an overview of background material. First of all the books of Golub and Van Loan [19] and Horn and Johnson [26] are classical works on all aspects of numerical linear algebra. These books also contain most of the material, which is used for direct solvers. Varga [50] is a good starting point to study the theory of basic iterative methods. Krylov subspace methods and multigrid are discussed in Saad [38] and Trottenberg, Oosterlee and Schüller [42]. Other books on Krylov subspace methods are [1, 6, 21, 34, 39].


2014 ◽  
Vol 64 (1) ◽  
pp. 76-81
Author(s):  
Claudiu-Leonardo Stoia

Abstract The paper presents a brief state-of-the-art survey regarding the use of fuzzy logic in inventory management. Its goal is to motivate enthusiastic entrepreneurs to take into account the benefits of using fuzzy logic inventory control systems. It offers a guide to model an inventory system having a free fuzzy tool as starting point


2015 ◽  
Vol 27 (2) ◽  
pp. 174-181 ◽  
Author(s):  
Shuichi Akizuki ◽  
◽  
Manabu Hashimoto

<div class=""abs_img""> <img src=""[disp_template_path]/JRM/abst-image/00270002/07.jpg"" width=""300"" /> Recognition results</div> This paper introduces a stable 3D object detection method that can be applied to complicated scenes consisting of randomly stacked industrial parts. The proposed method uses a 3D vector pair that consists of paired 3D vectors with a shared starting point. By considering the observability of vector pairs, the proposed method has achieved high recognition performance. The observability factor of the vector pair is calculated by simulating the visible state of the vector pair from various viewpoints. By integrating the observability factor and the distinctiveness factor proposed in our previous work, a few vector pairs that are effective for recognition are automatically extracted from an object model, and then used for the matching process. Experiments have confirmed that the proposed method improves the 88.5% recognition success rate of previous state-of-the-art methods to 93.1%. The processing time of the proposed method is fast enough for robotic bin-picking. </span>


Sign in / Sign up

Export Citation Format

Share Document