Towards Analysis of Biblical Entities and Names using Deep Learning

被引:0
|
作者
Martinjak, Mikolaj [1 ]
Lauc, Davor [2 ]
Skelac, Ines [1 ]
机构
[1] Univ Zagreb, Fac Philosophy & Religious Studies, Zagreb, Croatia
[2] Univ Zagreb, Fac Humanities & Social Sci, Zagreb, Croatia
关键词
Bible; deep learning; gospel of mark; natural language processing; social network analysis;
D O I
10.14569/IJACSA.2023.0140552
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Scholars from various fields have studied the translations of the Bible in different languages to understand the changes that have occurred over time. Taking into account recent advances in deep learning, there is an opportunity to improve the understanding of these texts and conduct analyses that were previously unattainable. This study used deep learning techniques of NLP to analyze the distribution and appearance of names in the Polish, Croatian, and English translations of the Gospel of Mark. Within the scope of social network analysis (SNA), various centrality metrics were used to determine the importance of different entities (names) within the gospel. Degree Centrality, Closeness Centrality, and Betweenness Centrality were leveraged, given their capacity to provide unique insights into the network structure. The findings of this study demonstrate that deep learning could help uncover interesting connections between individuals who may have initially been considered less important. It also highlighted the critical role of onomastic sciences and the philosophy of language in analyzing the richness and importance of human and other proper names in biblical texts. Further research should be conducted to produce more relevant language resources, improve parallel multilingual corpora and annotated data sets for the major languages of the Bible, and develop an accurate end-to-end deep neural model that facilitates joint entity recognition and resolution.
引用
收藏
页码:491 / 497
页数:7
相关论文
共 50 条
  • [31] Towards Low-Cost Pavement Condition Health Monitoring and Analysis Using Deep Learning
    Roberts, Ronald
    Giancontieri, Gaspare
    Inzerillo, Laura
    Di Mino, Gaetano
    APPLIED SCIENCES-BASEL, 2020, 10 (01):
  • [32] Geo-Referencing and Analysis of Entities Extracted from Old Drawings and Photos Using Computer Vision and Deep Learning Algorithms
    David, Liat
    Zohar, Motti
    Shimshoni, Ilan
    ISPRS INTERNATIONAL JOURNAL OF GEO-INFORMATION, 2023, 12 (12)
  • [33] Towards secure intrusion detection systems using deep learning techniques: Comprehensive analysis and review
    Lee, Sang-Woong
    Sidqi, Haval Mohammed
    Mohammadi, Mokhtar
    Rashidi, Shima
    Rahmani, Amir Masoud
    Masdari, Mohammad
    Hosseinzadeh, Mehdi
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2021, 187
  • [34] Algorithmically Generated Domain Names Detection Using Gated Recurrent Unit Deep Learning
    Nadagoudar, Ranjana B.
    Ramakrishna, M.
    JOURNAL OF ELECTRICAL SYSTEMS, 2024, 20 (07) : 469 - 481
  • [35] Sentiment Analysis using Machine Learning and Deep Learning
    Chandra, Yogesh
    Jana, Antoreep
    PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM-2020), 2019, : 1 - 4
  • [36] Towards calibration-invariant spectroscopy using deep learning
    M. Chatzidakis
    G. A. Botton
    Scientific Reports, 9
  • [37] Towards DDoS attack detection using deep learning approach
    Aktar, Sharmin
    Nur, Abdullah Yasin
    COMPUTERS & SECURITY, 2023, 129
  • [38] Towards Adversarial and Unintentional Collisions Detection Using Deep Learning
    Nguyen, Hai N.
    Vo-Huu, Tien
    Vo-Huu, Triet
    Noubir, Guevara
    PROCEEDINGS OF THE 2019 ACM WORKSHOP ON WIRELESS SECURITY AND MACHINE LEARNING (WISEML '19), 2019, : 22 - 24
  • [39] Towards perturbation prediction of biological networks using deep learning
    Li, Diya
    Gao, Jianxi
    SCIENTIFIC REPORTS, 2019, 9 (1)
  • [40] Towards Network Traffic Monitoring Using Deep Transfer Learning
    Dhillon, Harsh
    Haque, Anwar
    2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 1090 - 1097