Greenpeace Magazine and Shoof Sample Clauses

Greenpeace Magazine and Shoof. ‌ Dataset Description Extractor data Data from the extractors is stored inside Marmotta and is queried using the SPARQL endpoint, using Anno4j, as described in section 3.5. To remove complexity and interdependencies between recommendation module and extractors, it is assumed that all content items to be consid- ered for a recommendation task, have previously been annotated within the platform, using the appropriate pipeline. As described in the WP2 broker chapter of this deliverable, broker v3 will provide improved func- tionalities to define such pipelines, and to perform respective jobs, i.e. to execute a specific pipeline using a specific content set. Furthermore, it is assumed that content items referred to by user activities that are fed to the API are mappable to content items analyzed by the platform, as described in the WP2 high-level broker data model. Using this approach, the recommendation provides a best effort service: If annotations are available, the recommendation will use it. If only a subset of annotations exists, recommendation will still work, but its qual- ity might decrease. For the Greenpeace Magazine and Shoof showcase, any pipeline config- uration that produces named entities which can be processed within the recommendation module can be used. With reference to the extractor overview table in section 2.1, the following extractors are required by this specific recommendation: audiodemux to extract audio from video files for further processing, which is especially useful if the audio stream contains speech that can be further processed to deduce information about the content of the video. For details, see section 2.2.9. kaldi2txt to extract audio transcriptions for further processing. The task of speech-to-text extraction for different language is implemented using the Kaldi speech recognition toolkit. For details, see sec- tion 2.2.6. redlink-analysis provides textual analysis for Greenpeace articles and videos, and for Shoof videos. The NER capabilities of this extrac- tor will be used for subsequent clustering and therefore support recommendation of similar items. For details, see section 2.2.7. User behavior data User behavior is tracked as pseudonymous log data, e.g., from Google Analytics. The minimal set of required fields is as follows • date: date of the logging event • eventType: type of the logged event, see below • pagePath: URL to the respective content item • userId: numeric value for each user For the Greenpeace Magazi...
AutoNDA by SimpleDocs

Related to Greenpeace Magazine and Shoof

  • PUBLICITY, LITERATURE, ADVERTISEMENTS AND SOCIAL MEDIA 36.1 COUNTY owns all rights to the name, logos, and symbols of COUNTY. The use and/or reproduction of COUNTY's name, logos, or symbols for any purpose, including commercial advertisement, promotional purposes, announcements, displays, or press releases, without COUNTY's prior written consent is expressly prohibited.

  • LITERATURE, ADVERTISEMENTS, AND SOCIAL MEDIA A. Any written information or literature, including educational or promotional materials, distributed by CONTRACTOR to any person or organization for purposes directly or indirectly related to this Agreement must be approved at least thirty (30) days in advance and in writing by ADMINISTRATOR before distribution. For the purposes of this Agreement, distribution of written materials shall include, but not be limited to, pamphlets, brochures, flyers, newspaper or magazine ads, and electronic media such as the Internet.

  • ADVERTISEMENT AND PROMOTION A. Concessionaire shall not advertise in any manner or form on or about the Concession Premises or any other part of the Area, except by means of such signs or forms of advertising as first shall be approved, in writing, by Department.

  • Access Toll Connecting Trunk Group Architecture 9.2.1 If CBB chooses to subtend a Verizon access Tandem, CBB’s NPA/NXX must be assigned by CBB to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center Area subtends as identified in the LERG.

  • Evaluation Software If the Software is an evaluation version or is provided to You for evaluation purposes, then, unless otherwise approved in writing by an authorized representative of Licensor, Your license to use the Software is limited solely for internal evaluation purposes in non-production use and in accordance with the terms of the evaluation offering under which You received the Software, and expires 90 days from installation (or such other period as may be indicated within the Software). Upon expiration of the evaluation period, You must discontinue use of the Software, return to an original state any actions performed by the Software, and delete the Software entirely from Your system and You may not download the Software again unless approved in writing by an authorized representative of Licensor. The Software may contain an automatic disabling mechanism that prevents its use after a certain period of time. RESTRICTIONS

  • Escorting Visitors Visitors to areas where PHI COUNTY discloses to 4 CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY is 5 contained shall be escorted and such PHI shall be kept out of sight while visitors are in the area.

  • Television The fringe rate for Pension, Health, Holiday Pay, and Vacation Pay (except as provided in Article 8.03, below) shall be a total of the following percentage points during the following periods:

  • Games The Private Party shall not be entitled to introduce any arcade type amusement or gaming machines into the Restaurant Facility without the prior written approval of SANParks.

  • Video This restriction includes, but is not limited to, use of the Beat and/or New Song in television, commercials, film/movies, theatrical works, video games, and in any other form on the Internet which is not expressly permitted herein.

  • Infrastructure Vulnerability Scanning Supplier will scan its internal environments (e.g., servers, network devices, etc.) related to Deliverables monthly and external environments related to Deliverables weekly. Supplier will have a defined process to address any findings but will ensure that any high-risk vulnerabilities are addressed within 30 days.

Time is Money Join Law Insider Premium to draft better contracts faster.