Showing posts with label from. Show all posts
Showing posts with label from. Show all posts

From the Mouse to the Smartphone and Beyond

Its that time of the year again, as the nights draw in the free public Gibbons Lectures in Auckland take place. The first lecture is this Thursday the 30th at 6:00pm for a 6:30pm start. Every year the lecture series has a theme and this year its human computer interaction. The first lecture is by Professor Mark Apperley and titled From the Mouse to the Smartphone and Beyond: tracing the development of human-computer interaction. Click the lecture link for full venue details and if you cant attend the lecture will be streamed live and after the event.

from The Universal Machine http://universal-machine.blogspot.com/

IFTTT

Put the internet to work for you.

Delete or edit this Recipe

Read More..

Download Free 140 Page Windows 7 Product Guide from Microsoft

Microsoft Windows 7 has not only enhanced its software application but also marketing and customer services. Though resting having established its dominance in computer operating systems, Microsoft shows that it is not on its laurels or planning to relax its grip on the market. Apart from Microsoft Answers, the Q&A technical support launched in December 2008, and Windows 7 Solution Center, Microsoft is offering the new Windows 7 Product Guide which can be downloaded for free.

The 140-page overview provides a detailed and comprehensive guide to users on how to make full use of Windows 7. The product guide is organized into three sections – Introduction , Windows 7 for You, and Windows 7 for IT Professionals. It also has an overview of the Microsoft Desktop Optimization Pack which explains how companies can use the applications to manage and optimize their desktop functions.

While the Product Guide serves as a manual, the Windows 7 Solution Center offers troubleshooting tips to fix problems. The tech support website is divided into several categories including installation, upgrading, activation, performance, safety, Internet Explorer, entertainment, etc. Although the features and functions of the latest operating systems get increasingly more sophisticated and advanced, users have no excuse to reject Windows 7 due to ignorance or the lack of familiarity and support.

Download Windows 7 Product Guide from Microsoft Download Centre

Read More..

Topic about How To Prevent Access To Drives From Your Computer only video tutorial

Drives From Your Computer













Hlw everyone, this is really amazing tutorial and you can easily create security in your HardDrive disk after watch this videos..
Read More..

Build your own satellite

Honestly! It seems as if increasingly there is no activity that dedicated amateurs arent willing to have a go at. Formerly, building satellites was done by NASA and specialists like the Jet Propulsion Laboratory but thanks to greatly simplified design, called CubeSat, radio amateurs our building and launching their own communications satel lites into low Earth orbit. They even have their own governing organisation called AMSAT. So if you have a project that needs its own communications satellite why not build your own.



from The Universal Machine http://universal-machine.blogspot.com/

IFTTT

Put the internet to work for you.

Turn off or edit this Recipe

Read More..

Sergey and Larry awarded the Seoul Test of Time Award from WWW 2015



Today, at the 24th International World Wide Web Conference (WWW) in Florence, Italy, our company founders, Sergey Brin and Larry Page, received the inaugural Seoul Test-of-Time Award for their 1998 paper “The Anatomy of a Large-Scale Hypertextual Web Search Engine”, which introduced Google to the world at the 7th WWW conference in Brisbane, Australia. I had the pleasure and honor to accept the award on behalf of Larry and Sergey from Professor Chin-Wan Chung, who led the committee that created the award.
Except for the fact that I was myself in Brisbane, it is hard to believe that Google began just as a two-student research project at Stanford University 17 years ago with the goal to “produce much more satisfying search results than existing systems.” Their paper presented two breakthrough concepts: first, using a distributed system built on inexpensive commodity hardware to deal with the size of the index, and second, using the hyperlink structure of the Web as a powerful new relevance signal. By now these ideas are common wisdom, but their paper continues to be very influential: it has over 13,000 citations so far and more are added every day.

Since those beginnings Google has continued to grow, with tools that enable small business owners to reach customers, help long lost friends to reunite, and empower users to discover answers. We keep pursuing new ideas and products, generating discoveries that both affect the world and advance the state-of-the-art in Computer Science and related disciplines. From products like Gmail, Google Maps and Google Earth Engine to advances in Machine Intelligence, Computer Vision, and Natural Language Understanding, it is our continuing goal to create useful tools and services that benefit our users.

Larry and Sergey sent a video message to the conference expressing their thanks and their encouragement for future research, in which Sergey said “There is still a ton of work left to do in Search, and on the Web as a whole and I couldn’t think of a more exciting time to be working in this space.” I certainly share this view, and was very gratified by the number of young computer scientists from all over the world that came by the Google booth at the conference to share their thoughts about the future of search, and to explore the possibility of joining our efforts.
Read More..

How the Worlds First Computer Was Rescued From the Scrap Heap

< /tbody>
An ENIAC technician changes a valve
Wired recently published an article on how Ross Perot decided to rescue ENIAC "one" of the worlds first computers (theyre not strictly speaking correct to call ENIAC "the first" computer). Read about this fascinating story here.


from The Universal Machine http://universal-machine.blogspot.com/

IFTTT

Put the internet to work for you.

Turn off or edit this Recipe

Read More..

Running omxplayer from the command line easily using alias

Although I have previously written about running omxplayer via GUI, sometimes I like to control it via command line.
However, since I have my raspberry pi hooked up via HDMI and I like the show to be fullscreened, this requires typing:
omxplayer -r -o hdmi FILE
each time.
In order to make this easier we can use aliases. An alias lets you run a command with a shorter command. For instance:
ll is really an alias of ls - l

You can see what aliases you have by typing alias in the command line.
To temporarily add an alias you can use the command:
alias play=omxplayer -r -o hdmi

However, I want to permanently add this. To do that, Ill edit /home/pi/.bash_aliases
you can do this using vim or nano. Simply add the line alias play=omxplayer -r -o hdmi to this file.

Make sure you log out and log back in for this change to be made. Now we can just type: 

play FILE

To be able to easily find and intelligently play videos automatically, see this page:
http://stevenhickson.blogspot.com/2013/03/playing-videos-intelligently-with.html

Consider donating to further my tinkering.


Places you can find me
Read More..

Hacker Tricks from Insiders A Threat to ERP Systems

Today, with the extensive use of ERP systems world wide, there has also been a flanking growth in security related issues. And although ERP security plans aim at keeping outside intruders from gaining entry to a system’s inner network, the problem gets even bigger when hackers get illegal access to the information on ERP transactions, and when they spread Malware such as worms, spyware and viruses.

One of the main ERP business issues in our internet age is the increase in the number of these so called hackers, with some of them even hosting their own virus-filled websites. While some of them do this for financial gains, others just do it for fun. Largely, security in ERP requires a fresh approach; one that not just focuses on data but also on the security of the transactions involved.

While threats from outsider intrusions and attacks continue to go up, the chances for insider systems misuse has also grown by a long way. The fact is that, at the level of transaction, security flaws can be used more often than not by people inside the system. Although many of the available ERP systems present data encryption features which restrict people from exporting any files, it doesn’t satisfy the need for security from fraudulent insiders who take advantage of the authorization they have.

Though ERP systems have used audit logs for keeping an eye on the transactions made by an insider, or any updates in the system; these don’t give much information on whether the transaction was actually necessary or appropriate. And even though suspicious transactions can be sorted out by internal auditors; many organizations don’t install the audit log feature for their ERP system, as some believe that it may affect the performance of the employees.

What’s more, ERP applications continue to be susceptible to security attacks from outsiders as well, as anyone can now break feeble passwords with plain dictionary attacks. On the other hand, some of the most destructive hacker tricks arrive with the use of social engineering, which is about fooling people into giving out their identification details. Meanwhile, many companies have cut down on security related measures that focus on insiders, as they feel that it may act like an added overhead for their employees, and as it appears to affect their efficiency in carrying out their work.

Overall, the threat from insiders seems like the one that causes most of the security issues in organizations these days. And it does look like the future of ERP security would be all about identifying improper use of the system by users inside the organization. After recognizing the significant shortage in ERP security for protecting from insider threats, leading businesses are now using methods that continuously monitor transactions made by authorized users. These work by identifying suspicious transactions and checking whether it is linked to any fraudulent activity. So, if any employee appears to be doing some hacking-like activity, he or she can be instantly contacted though voip and questioned about the reason for such a transaction
Read More..

From Interaction to Understanding

This Thursday evenings Gibbons Lecture is by Mark Billinghurst of the Human Interface Laboratory New Zealand, at The University of Canterbury. The lecture titled From Interaction to Understanding  will focus on Empathic computing where computers can recognise and understand emotions. The lecture is this Thursday the 21st at 6:00pm for a 6:30pm start. Click the lecture link for full venue details and if you cant attend the lecture will be streamed live and after the event.

from The Universal Machine http://universal-machine.blogspot.com/

IFTTT

Put the internet to work for you.

Delete or edit this Recipe

Read More..

From Pixels to Actions Human level control through Deep Reinforcement Learning



Remember the classic videogame Breakout on the Atari 2600? When you first sat down to try it, you probably learned to play well pretty quickly, because you already knew how to bounce a ball off a wall in real life. You may have even worked up a strategy to maximise your overall score at the expense of more immediate rewards. But what if you didnt possess that real-world knowledge — and only had the pixels on the screen, the control paddle in your hand, and the score to go on? How would you, or equally any intelligent agent faced with this situation, learn this task totally from scratch?

This is exactly the question that we set out to answer in our paper “Human-level control through deep reinforcement learning”, published in Nature this week. We demonstrate that a novel algorithm called a deep Q-network (DQN) is up to this challenge, excelling not only at Breakout but also a wide variety of classic videogames: everything from side-scrolling shooters (River Raid) to boxing (Boxing) and 3D car racing (Enduro). Strikingly, DQN was able to work straight “out of the box” across all these games – using the same network architecture and tuning parameters throughout and provided only with the raw screen pixels, set of available actions and game score as input.

The results: DQN outperformed previous machine learning methods in 43 of the 49 games. In fact, in more than half the games, it performed at more than 75% of the level of a professional human player. In certain games, DQN even came up with surprisingly far-sighted strategies that allowed it to achieve the maximum attainable score—for example, in Breakout, it learned to first dig a tunnel at one end of the brick wall so the ball could bounce around the back and knock out bricks from behind.
Video courtesy of Atari Inc. and Mnih et al. “Human-level control through deep reinforcement learning"
So how does it work? DQN incorporated several key features that for the first time enabled the power of Deep Neural Networks (DNN) to be combined in a scalable fashion with Reinforcement Learning (RL)—a machine learning framework that prescribes how agents should act in an environment in order to maximize future cumulative reward (e.g., a game score). Foremost among these was a neurobiologically inspired mechanism, termed “experience replay,” whereby during the learning phase DQN was trained on samples drawn from a pool of stored episodes—a process physically realized in a brain structure called the hippocampus through the ultra-fast reactivation of recent experiences during rest periods (e.g., sleep). Indeed, the incorporation of experience replay was critical to the success of DQN: disabling this function caused a severe deterioration in performance.
Comparison of the DQN agent with the best reinforcement learning methods in the literature. The performance of DQN is normalized with respect to a professional human games tester (100% level) and random play (0% level). Note that the normalized performance of DQN, expressed as a percentage, is calculated as: 100 X (DQN score - random play score)/(human score - random play score). Error bars indicate s.d. across the 30 evaluation episodes, starting with different initial conditions. Figure courtesy of Mnih et al. “Human-level control through deep reinforcement learning”, Nature 26 Feb. 2015.
This work offers the first demonstration of a general purpose learning agent that can be trained end-to-end to handle a wide variety of challenging tasks, taking in only raw pixels as inputs and transforming these into actions that can be executed in real-time. This kind of technology should help us build more useful products—imagine if you could ask the Google app to complete any kind of complex task (“Okay Google, plan me a great backpacking trip through Europe!”).

We also hope this kind of domain general learning algorithm will give researchers new ways to make sense of complex large-scale data creating the potential for exciting discoveries in fields such as climate science, physics, medicine and genomics. And it may even help scientists better understand the process by which humans learn. After all, as the great physicist Richard Feynman famously said: “What I cannot create, I do not understand.”
Read More..

How to recover any file from corrupted or broken HDs SSDs or SD cards


A couple weeks ago, I lost a Raspberry Pi SD card to corruption that didnt even have backup superblocks to restore. There seemed to be nothing to do about it since I couldnt mount it. Restoring the system wasnt a big deal. However, I really wanted some of the cpp, h, js, php, sh, and other files that I had changed a good bit but hadnt yet backed up or committed. Sure we all back up and/or use git/svn but we have to remember Murphys Law.

This is a guide on how to easily recover those files that you really want but hadnt backed up.

Needed packages

To do this, we are going to use scalpel, xxd, diff, and grep (So we are most definitely using Linux)

You will already most likely have xxd, diff, and grep on your system. To install scalpel, run:
sudo apt-get install scalpel
or yum or pacman or whatever package manager you use.

**Note: It is probably a good idea to make an image of the drive and use scalpel on that if you are able.

Editing Scalpel configuration

The default scalpel configuration file is located at /etc/scalpel.conf
All you need to do is comment out the file types you dont care about and add the filetypes you do care about that arent in there.
To create custom scalpel configurations, we will use a little bit of common sense and xxd as a hex dumper.
Find a different file with the same file type or an older copy of the file you want and run the following command:
xxd -l 0x04 filename.type; xxd -s -0x04 filename.type

This will get the first 4 and last 4 bytes of the file. Which should be enough to make the filetype unique, though you can change this as needed. You should see a pattern with a lot of files.
For instance, my sh files (the ones I wrote) often start with #!/b and end with sac. or fi..
and my cpp files often start with #inc or // and end with }.
Now we will take these hex patterns, reformat them as x?? and put them into the scalpel.conf.
You should use REVERSE whenever the file may continue multiple instances of the end statement. You may also need to increase the file size from 50000 to something much bigger for larger files.

Here are some of my custom scalpel configurations:

php         y        50000    x3cx3fx70x68x70        x3fx3e REVERSE
js y 50000 x3cx73x63x72x69x70x74x20x74x79x70x65x3dx22x74x65x78x74x2fx6ax61x76x61x73x63x72x69x70x74x22x3e x3cx2fx73x63x72x69x70x74x3e 
cpp        y        50000   x23x69x6ex63              x7dx2e  REVERSE      
cpp        y        50000   x2fx2fx20                      x7dx2e             REVERSE
h            y        50000   x23x69x66x6e              x64x69x66 REVERSE
sh           y        50000   x23x21x2fx62              x73x61x63 REVERSE


Running Scalpel

Once your scalpel configuration is finished, you need to start extracting the files. This will probably take a while and will get a lot of files (multiple copies of each that match on your system). It wont know the filename or newest version but we will look at that later. You can run scalpel with the following command:
scalpel -c /etc/scalpel.conf yourcopy.img -o output
or the following if you didnt make a copy of your HDD (you will have to specify the appropriate drive and partition number).
scalpel -c /etc/scalpel.conf /dev/sdx# -o output

Once everything is finished it will be in the output folder and we can look for the newest version of your file.

Finding your files

cd into the output directory and you can see all the different filetypes organized.
cd output; ls
For all your graphical file types, i.e. videos and pictures, they should all be listed there and you will have to rename them. 
For your other files, we can use grep recursively to find our newest version. This unfortunately requires you to remember things. It is a good idea to use a function or variable name that you used in order to find your files. Ex:
grep -R "playing()" ./
Searches for the function playing in all your files, this could give you matches in js, php, cpp, c, or h files.
grep -R "::CurlWriter" ./cpp*
Searches for the definition of CurlWriter in all of the cpp files
grep -R "VoiceCommand" ./h*
Searches for the variable or function VoiceCommand in all of your header (h files)

These will probably give you a couple of different results. In my case, these were all different versions of my file. This is a really good chance to use diff. All you have to do is select two of the files and diff to see the differences. Ex:
diff ./sh-5-1/00135386.sh ./sh-5-1/00135393.sh

Once you start getting used to this, you will be better about searching for the newest function or variable name you remember. Once you narrow it down to the newest copy of your file, you can move it elsewhere.
Ex:
mv ./sh-5-1/00135393.sh ~/ImportantFile.sh


There it is, this should allow you to recover almost any file you have created from a corrupted or bad HD, SSD, or SD card.

Places you can find me
Read More..

Compare How London Looks on Google vs Paintings From the 1700s

Nothing serious here, but just a delightful series of pictures that superimpose some 18th-century paintings of London streets over their corresponding Google Street View images. In many cases the streets have barely changed although the details have. View the full set of images on Wired.



from The Universal Machine http://universal-machine.blogspot.com/

IFTTT

Put the internet to work for you.

via Personal Recipe 895909

Read More..

Remembering to forget

With the cost of data storage being so cheap the Internet has the potential to remember everything that is ever posted online, for ever! Whilst historians might relish the idea of a future where the personal details of everyone are searchable centuries back most people like the idea of being able to be forgotten. The European Union is leading the way with legislation that provides a "right to be forgotten" — strictly speaking, a right to have certain kinds of information removed from search engine results. However, in a Kafkaesque twist, my colleague Mark Wilson brought to my attention, the fact that Google in the EU has been ordered to remove links to stories about Google removing links to stories. You can read more about this in this arstechnica story.

from The Universal Machine http://universal-machine.blogspot.com/

IFTTT

Put the internet to work for you.

Delete or edit this Recipe

Read More..

How to extract or get email id from orkut

This is a very simple trick to extract email ID of any orkut user. This Works even if the target is not your friend. Below are the steps to do this:

Steps:-
  • Navigate to the profile page of the member you wish to know the email address.
  • Add that person as a friend.
  • Now navigate to your friends page.
  • On the right hand side, you will find a option to export contacts.
  • Choose Export Contacts Option.

extract or get email id from orkut

  • Fill in the Word Verification on the Next Page.
  • You will be prompted to download the contacts.csv file.
  • Once you have downloaded the file, open it in Microsoft Excel or any other compatible software.
  • You will see all the email addresses including those which have not yet accepted your friend requests but have recieved your friend request.
Read the comment portion for Sudhirs contribution
Read More..

How to Copy Text from Images or protected web pages


Have you ever encountered a situation whereby you would like to copy the text or character from image files or protected webpage but unable to do it? Instead of typing the text manually by referring to the image or protected webpage, now with this simple yet powerful software utility named as JOCR, it allows users to copy text from any image files or protected webpage by utilizing OCR (Optical Character Recognition) technology so that it can be turned into useful character for further processing.

JOCR is a freeware and is pretty easy to use. In order to copy text from any image or protected webpage, you must use JOCR to capture the image or webpage. The image captured will be displayed immediately on the JOCR screen, then you can click on ‘Recognizer’ button to copy the text from the image file. Some of the text supported by JOCR include Chinese, Czech, Danish, Dutch, English, Finnish, French, German, Greek, Hungarian, Italian, Japanese, Korean, Norwegian, Polish, Portuguese, Russian, Spanish, Swedish and Turkish.

The minimum pre-requisite of JOCR is Microsoft Office 2003 or higher version, and you must have Microsoft Office Document Imaging (MODI) installed in order for it to work correctly. If you think JOCR is useful, do get a free download here.
Read More..

Generating Value From Your Marketing And Branding

INSPIOR, the B2B digital marketing firm, partnered with NYC & Company, CMI, and Tarsus Media in conjunction with The Port Authority of NY & NJ to engage in an important forum around what companies must do to maximize their marketing and branding in search for new monetization opportunities.

In uncertain times, a good leader can steer an organization in the right direction to achieve business success. Leaders guide marketing and branding strategy, foster creativity, and inspire motivation.

In this forum we will focus on competitive marketing and branding strategy, developing alternative options for challengers and defenders, illustrated with numerous audio-visual examples of unbeatable strategies and approaches.

You Will Learn to:

  1. Build a brand that will increase your visibility - and profits
  2. Tips for successfully managing your team’s marketing and branding
  3. How to use audience targeting to increase value and to develop a compelling USP—unique selling proposition—that differentiates you from all others in the field
  4. Leverage email in your monetization efforts for greater cash flow and profit margins
  5. Marketing strategies for accessing untapped revenue and identifying potential roadblocks
  6. SEO, SEM - Creative Ways to Avoid Mistakes with Paid Search

Ellen Schned

CBS College Sports Senior , Vice President of Affiliate, Marketing and Distribution, CBS

Brett Barndt

Account Executive, INSPIOR.com

Brian Jones

Chief Operating Officer , CMI



Location:


The Port Authority of NY & NJ
115 Broadway, 19th Floor (Between Thames and Cedar Streets)

Conference Room D
New York, NY 10006

For details: Call Guy Derenoncourt: 212 598-4567 ext. 211

About us: INSPIOR, a B2B solutions provider, creates digital marketing solutions for business and senior-level decision makers who proactively seek to deliver an exceptional key stakeholder experience. INSPIOR uses the online channel to strengthen marketing campaigns. INSPIOR helps our clients improve their bottom line and increase the value of their external interactions with existing customers and high-value prospects.
Thanks,

Visit Site.
Read More..

Spam email watch How to protect yourself from spam emails

What is a spam (junk mail) offer?

Spam is an unsolicited (or junk) email. Spam emails usually offer free goods or ‘prizes’, very cheap products (including pharmaceuticals), promises of wealth or other offers that could result in you taking part in a scam. You might be asked to pay a joining fee, to buy something to win a prize or some other benefit, or to call a 190 telephone or fax number (calls made to these numbers are charged at premium rates). Spam emails can basically offer you anything and everything—from fake college degrees to pirated software and counterfeit designer watches—so it pays to be suspicious and delete unsolicited emails.

Spam emails differ from regular printed junk mail in one major way—responding to a scam email can cause you many problems. You may find that malicious software like spyware or key-loggers has been downloaded onto your computer. Your credit card or other personal details may be stolen. You may send away money for something that never arrives or is not what you thought it would be.


Warning signs
You receive an unsolicited email that contains:
  • an invitation to participate in any type of lottery or sweepstake
  • an offer of uninvited gifts or goods from any source
  • an offer from overseas
  • a request to pay a fee to receive more benefits from the same provider
  • an offer from an unregistered lottery
  • an offer of special benefits (eg, wealth, love, health) from someone claiming psychic powers
  • an offer of a gambling system that guarantees winners.

Protect yourself against spam (junk mail) offers
  • Do not open suspicious or unsolicited emails (spam): delete them.
  • Do not click on any links in a spam email, or open any files attached to them.
  • Never call a telephone number that you see in a spam email.
  • NEVER reply to a spam email (even to unsubscribe).
  • Never enter your personal, credit card or online account information on a website that you are not certain is genuine.
  • Never send your personal, credit card or online account details through an email.
  • Use your common sense: the offer may be a scam.
  • Read all the terms and conditions of any offer very carefully: claims of free or very cheap offers often have hidden costs.
  • Do not send any money or pay any fee to claim a prize or lottery winnings.

Do your homework
Remember that letters, emails and other approaches offering you something that looks too good to be true are almost always scams.

If you are interested in what the email is offering, contact your local office of fair trading to see if they can tell you more about the offer.

If you are interested in an offer, use a search engine to locate the firm’s website address. Be sure that you know what the offer is actually for, what the total cost will be and what to do if something goes wrong (e.g. the product is not delivered or does not work).

Seek independent advice from an accountant or solicitor if a significant amount of money is involved. Don’t provide your credit card or bank account details to ANYBODY you are not completely sure about.


Decide
If you receive a spam offer, the best thing to do is delete the email. Do NOT respond. Do not email back, do not call any telephone number listed in the email and do not send any money, credit card details or other personal details to the scammers. Responding only indicates youre interested and you could end up with lots more fake offers in the future.

If you are interested in what the spam email is offering, it is still best not to follow any link contained in the email. Internet links do not always lead where their name says they do. Sometimes, clicking on a link will download a program to your computer. Make sure you have done your homework before doing anything to take up an offer from a spam email.

Source:- http://www.scamwatch.gov.au/
There is a website dedicated to spam. You can read lots more. Visit
Read More..

Free eMagazines from Auckland City Library

Auckland City Library has just announced that it is making hundreds of magazines available to members for free as eMagazines that you can read on your computer, tablet or smartphone. Joining the library is free and so there has never been a better reason for getting a library card. Click here for information on had to access the magazines.

from The Universal Machine http://universal-machine.blogspot.com/

IFTTT

Put the internet to work for you.

Turn off or edit this Recipe

Read More..

How To Download From Utorrent



You can easily download from utorrent after watch this video.......
Read More..

A Multilingual Corpus of Automatically Extracted Relations from Wikipedia



In Natural Language Processing, relation extraction is the task of assigning a semantic relationship between a pair of arguments. As an example, a relationship between the phrases “Ottawa” and “Canada” is “is the capital of”. These extracted relations could be used in a variety of applications ranging from Question Answering to building databases from unstructured text.

While relation extraction systems work accurately for English and a few other languages, where tools for syntactic analysis such as parsers, part-of-speech taggers and named entity analyzers are readily available, there is relatively little work in developing such systems for most of the worlds languages where linguistic analysis tools do not yet exist. Fortunately, because we do have translation systems between English and many other languages (such as Google Translate), we can translate text from a non-English language to English, perform relation extraction and project these relations back to the foreign language.
Relation extraction in a Spanish sentence using the cross-lingual relation extraction pipeline.
In Multilingual Open Relation Extraction Using Cross-lingual Projection, that will appear at the 2015 Conference of the North American Chapter of the Association for Computational Linguistics – Human Language Technologies (NAACL HLT 2015), we use this idea of cross-lingual projection to develop an algorithm that extracts open-domain relation tuples, i.e. where an arbitrary phrase can describe the relation between the arguments, in multiple languages from Wikipedia. In this work, we also evaluated the performance of extracted relations using human annotations in French, Hindi and Russian.

Since there is no such publicly available corpus of multilingual relations, we are releasing a dataset of automatically extracted relations from the Wikipedia corpus in 61 languages, along with the manually annotated relations in 3 languages (French, Hindi and Russian). It is our hope that our data will help researchers working on natural language processing and encourage novel applications in a wide variety of languages. More details on the corpus and the file formats can be found in this README file.

We wish to thank Bruno Cartoni, Vitaly Nikolaev, Hidetoshi Shimokawa, Kishore Papineni, John Giannandrea and their teams for making this data release possible. This dataset is licensed by Google Inc. under the Creative Commons Attribution-ShareAlike 3.0 License.
Read More..