identity
→
CapableOf
→
remain anonymous
|
0.68
|
|
identity
→
CapableOf
→
remain hidden
|
0.54
|
|
identity
→
CapableOf
→
interact with each other
|
0.49
|
|
identity
→
CapableOf
→
remains protected
|
0.49
|
|
identity
→
CapableOf
→
consist of logo
|
0.49
|
|
identity
→
CapableOf
→
surround the existence of one t…
|
0.48
|
|
identity
→
CapableOf
→
attracted attention
|
0.47
|
|
identity
→
CapableOf
→
be a driving licence
|
0.44
|
|
identity
→
CapableOf
→
be an identification card
|
0.44
|
|
identity
→
CapableOf
→
change over time
|
0.44
|
|
identity
→
CapableOf
→
identify individual
|
0.41
|
|
identity
→
CapableOf
→
consist of place
|
0.41
|
|
identity
→
CapableOf
→
come into play
|
0.41
|
|
identity
→
CapableOf
→
hold the information
|
0.41
|
|
identity
→
CapableOf
→
reveal password
|
0.40
|
|
identity
→
CapableOf
→
comply with the law
|
0.39
|
|
identity
→
CapableOf
→
evolve over time
|
0.39
|
|
identity
→
CapableOf
→
appear on the label
|
0.39
|
|
identity
→
CapableOf
→
change
|
0.39
|
|
identity
→
CapableOf
→
reveal address
|
0.38
|
|
identity
→
CapableOf
→
reveal login
|
0.38
|
|
identity
→
CapableOf
→
reveal name
|
0.38
|
|
identity
→
CapableOf
→
remain consistent
|
0.37
|
|
identity
→
CapableOf
→
remain unchanged
|
0.37
|
|
identity
→
CapableOf
→
use datum
|
0.37
|
|
identity
→
CapableOf
→
access feature
|
0.37
|
|
identity
→
CapableOf
→
conduct thorough investigation
|
0.37
|
|
identity
→
CapableOf
→
meet technology
|
0.37
|
|
identity
→
CapableOf
→
access function
|
0.36
|
|
identity
→
CapableOf
→
come into being
|
0.36
|
|
identity
→
CapableOf
→
try to access feature
|
0.36
|
|
identity
→
CapableOf
→
try to access function
|
0.36
|
|
identity
→
CapableOf
→
affect the way
|
0.35
|
|
identity
→
CapableOf
→
consist of name
|
0.35
|
|
identity
→
CapableOf
→
take root
|
0.35
|
|
identity
→
CapableOf
→
use mobile device
|
0.35
|
|
identity
→
CapableOf
→
make the request
|
0.34
|
|
identity
→
CapableOf
→
provide their legal rights of d…
|
0.34
|
|
identity
→
CapableOf
→
try to access service
|
0.34
|
|
identity
→
CapableOf
→
become apparent
|
0.33
|
|
identity
→
CapableOf
→
default to default-identity
|
0.33
|
|
identity
→
CapableOf
→
receive instant message
|
0.33
|
|
identity
→
CapableOf
→
affect each other
|
0.32
|
|
identity
→
CapableOf
→
appear on the list of chemicals
|
0.32
|
|
identity
→
CapableOf
→
try to access the user’s account
|
0.32
|
|
identity
→
CapableOf
→
appear on the msds
|
0.31
|
|
identity
→
CapableOf
→
seek stability
|
0.31
|
|
identity
→
CapableOf
→
submit the posting request
|
0.31
|
|
identity
→
CapableOf
→
win the tug-of-war
|
0.31
|
|
identity
→
CapableOf
→
become clear
|
0.29
|
|
identity
→
CapableOf
→
call for security
|
0.29
|
|
identity
→
CapableOf
→
call for system
|
0.29
|
|
identity
→
CapableOf
→
consist of date and place of bi…
|
0.29
|
|
identity
→
CapableOf
→
cover safe web, anti-phishing p…
|
0.29
|
|
identity
→
CapableOf
→
drive the truck
|
0.29
|
|
identity
→
CapableOf
→
grant value added bonus
|
0.29
|
|
identity
→
CapableOf
→
remain undisclosed
|
0.29
|
|
identity
→
CapableOf
→
surround the existence of disco…
|
0.29
|
|
identity
→
CapableOf
→
surround the existence of myste…
|
0.29
|
|
identity
→
CapableOf
→
take precedence
|
0.29
|
|
identity
→
CapableOf
→
use cd-hit
|
0.29
|
|
identity
→
CapableOf
→
carve bloody path
|
0.27
|
|
identity
→
CapableOf
→
depend on the passing of civic …
|
0.27
|
|
identity
→
CapableOf
→
go in hand
|
0.27
|
|
identity
→
CapableOf
→
oversee compliance
|
0.27
|
|
identity
→
CapableOf
→
prevent fraud
|
0.27
|
|
identity
→
CapableOf
→
shape our actions
|
0.27
|
|
identity
→
CapableOf
→
take back seat
|
0.27
|
|
identity
→
CapableOf
→
take time
|
0.27
|
|
identity
→
CapableOf
→
use certificate
|
0.27
|
|
identity
→
CapableOf
→
use two-factor authentication
|
0.27
|
|
identity
→
CapableOf
→
become more important
|
0.27
|
|
identity
→
CapableOf
→
connect people
|
0.27
|
|
identity
→
CapableOf
→
retry the logon
|
0.27
|
|
identity
→
CapableOf
→
give sense
|
0.25
|
|
identity
→
CapableOf
→
answer question
|
0.25
|
|
identity
→
CapableOf
→
be an e-mail address
|
0.25
|
|
identity
→
CapableOf
→
complement each other
|
0.25
|
|
identity
→
CapableOf
→
consist of location
|
0.25
|
|
identity
→
CapableOf
→
consist of logotype
|
0.25
|
|
identity
→
CapableOf
→
continue in adolescence
|
0.25
|
|
identity
→
CapableOf
→
continue in early adulthood
|
0.25
|
|
identity
→
CapableOf
→
convey style
|
0.25
|
|
identity
→
CapableOf
→
curate meaningful and interacti…
|
0.25
|
|
identity
→
CapableOf
→
define the in-group
|
0.25
|
|
identity
→
CapableOf
→
define the out-group
|
0.25
|
|
identity
→
CapableOf
→
define the project
|
0.25
|
|
identity
→
CapableOf
→
do all of the attracting
|
0.25
|
|
identity
→
CapableOf
→
embrace other identities
|
0.25
|
|
identity
→
CapableOf
→
influence our attitudes
|
0.25
|
|
identity
→
CapableOf
→
interpret heaven
|
0.25
|
|
identity
→
CapableOf
→
interpret hell
|
0.25
|
|
identity
→
CapableOf
→
interpret revelation
|
0.25
|
|
identity
→
CapableOf
→
match identity-based requirement
|
0.25
|
|
identity
→
CapableOf
→
pass down through genetic memory
|
0.25
|
|
identity
→
CapableOf
→
protect the innocent
|
0.25
|
|
identity
→
CapableOf
→
refer to person
|
0.25
|
|
identity
→
CapableOf
→
reflect complex nature of human…
|
0.25
|
|
identity
→
CapableOf
→
remain separate
|
0.25
|
|
identity
→
CapableOf
→
resonate with consumer
|
0.25
|
|
identity
→
CapableOf
→
retain significant communicativ…
|
0.25
|
|
identity
→
CapableOf
→
shed more light
|
0.25
|
|
identity
→
CapableOf
→
stabilize at the level
|
0.25
|
|
identity
→
CapableOf
→
store datum
|
0.25
|
|
identity
→
CapableOf
→
transcend gender
|
0.25
|
|
identity
→
CapableOf
→
come to life
|
0.24
|
|
identity
→
CapableOf
→
apply for credit cards
|
0.22
|
|
identity
→
CapableOf
→
commit crime
|
0.22
|
|
identity
→
CapableOf
→
endanger safety
|
0.21
|
|
identity
→
CapableOf
→
believe within the network
|
0.19
|
|
identity
→
CapableOf
→
create space
|
0.19
|
|
identity
→
CapableOf
→
exist without action
|
0.19
|
|
identity
→
CapableOf
→
get crucial
|
0.19
|
|
identity
→
CapableOf
→
provide identity management
|
0.19
|
|
identity
→
CapableOf
→
uphold native epistemology
|
0.19
|
|
identity
→
CapableOf
→
vary to wiccan
|
0.19
|
|
identity
→
CapableOf
→
allow for innovative design
|
0.16
|
|
identity
→
CapableOf
→
apply for loan
|
0.16
|
|
identity
→
CapableOf
→
attract traveller
|
0.16
|
|
identity
→
CapableOf
→
connect to system
|
0.16
|
|
identity
→
CapableOf
→
develop through the sharing
|
0.16
|
|
identity
→
CapableOf
→
formalize the process
|
0.16
|
|
identity
→
CapableOf
→
lie in confidence
|
0.16
|
|
identity
→
CapableOf
→
lie in our self-respect
|
0.16
|
|
identity
→
CapableOf
→
provide directory services
|
0.16
|
|
identity
→
CapableOf
→
provide idaas solutions
|
0.16
|
|
identity
→
CapableOf
→
show deep appreciation of the c…
|
0.16
|
|
identity
→
CapableOf
→
suffer real damage
|
0.16
|
|
identity
→
CapableOf
→
use idiom
|
0.16
|
|
identity
→
CapableOf
→
use original language
|
0.16
|
|