<listing id="l9bhj"><var id="l9bhj"></var></listing>
<var id="l9bhj"><strike id="l9bhj"></strike></var>
<menuitem id="l9bhj"></menuitem>
<cite id="l9bhj"><strike id="l9bhj"></strike></cite>
<cite id="l9bhj"><strike id="l9bhj"></strike></cite>
<var id="l9bhj"></var><cite id="l9bhj"><video id="l9bhj"></video></cite>
<menuitem id="l9bhj"></menuitem>
<cite id="l9bhj"><strike id="l9bhj"><listing id="l9bhj"></listing></strike></cite><cite id="l9bhj"><span id="l9bhj"><menuitem id="l9bhj"></menuitem></span></cite>
<var id="l9bhj"></var>
<var id="l9bhj"></var>
<var id="l9bhj"></var>
<var id="l9bhj"><strike id="l9bhj"></strike></var>
<ins id="l9bhj"><span id="l9bhj"></span></ins>
Volume 41 Issue 9
Sep.  2019
Turn off MathJax
Article Contents
YI Shi-xiang, YIN Hong-peng, ZHENG Heng-yi. Public security event trigger identification based on Bidirectional LSTM[J]. Chinese Journal of Engineering, 2019, 41(9): 1201-1207. doi: 10.13374/j.issn2095-9389.2019.09.012
Citation: YI Shi-xiang, YIN Hong-peng, ZHENG Heng-yi. Public security event trigger identification based on Bidirectional LSTM[J]. Chinese Journal of Engineering, 2019, 41(9): 1201-1207. doi: 10.13374/j.issn2095-9389.2019.09.012

Public security event trigger identification based on Bidirectional LSTM

doi: 10.13374/j.issn2095-9389.2019.09.012
More Information
  • Corresponding author: YIN Hong-peng, E-mail: yinhongpeng@gmail.com
  • Received Date: 2019-01-05
  • Publish Date: 2019-09-01
  • As the internet coverage continues to expand, obtaining valuable information from a large amount of fragmented semi-structured text data has become a huge challenge considering the vast amount of social public information. Event trigger identification technology can effectively mine and refine text information so that the users can quickly and accurately get what they need; thus, it has gradually become an active research area in the field of natural language processing. An event trigger word is generally a word or phrase that marks the occurrence of the event, then trigger word identification has been applied to many aspects and plays an important role in the fields of knowledge base construction, intelligent search engine, automatic question answering robot, and automatic summarization. However, the text data are characterized by high dimensionality and ambiguity. The existing identification methods are mostly based on manual complex feature engineering or only consider the features in a certain text window. In this process, manual analysis and selection of a large number of features are required. Considerable reliance on natural language processing tools leads to the inability of applying the model on a large scale, and there are problems of erroneous cascade communication and complicated feature engineering. This paper proposed a fusion model based on the bidirectional long short-term memory (BiLSTM) and feed-forward neural networks to complete the trigger identification task for public security events. First, the high-level features of the entire text were extracted through BiLSTM to avoid manual feature extraction, which was associated with the existing machine learning methods. Then, contacted features were used to input feed-forward neural networks and identify event triggers. The experimental results show that the proposed method achieves good performance in the Chinese emergency corpus, CEC, and the Micro-F1 is 78.47%. In addition, the importance of different contacted features was also discussed in trigger word recognition tasks, and the importance of three types of features, namely part of speech, syntax, and entity, in text analysis was analyzed. It is concluded that syntactic features are most helpful to the task of event-trigger word recognition.

     

  • loading
  • [1]
    Bj?rne J. Biomedical Event Extraction with Machine Learning [Dissertation]. Turku: University of Turku, 2014
    [2]
    軒小星, 廖濤, 高貝貝. 中文事件觸發詞的自動抽取研究. 計算機與數字工程, 2015, 43(3): 457 doi: 10.3969/j.issn1672-9722.2015.03.026

    Xuan X X, Liao T, Gao B B. Automatic extraction of Chinese event trigger word. Comput Digit Eng, 2015, 43(3): 457 doi: 10.3969/j.issn1672-9722.2015.03.026
    [3]
    何馨宇, 李麗雙. 基于雙向LSTM和兩階段方法的觸發詞識別. 中文信息學報, 2017, 31(6): 147 doi: 10.3969/j.issn.1003-0077.2017.06.020

    He X Y, Li L S. Trigger detection based on bidirectional LSTM and two-stage method. J Chin Inform Process, 2017, 31(6): 147 doi: 10.3969/j.issn.1003-0077.2017.06.020
    [4]
    Pyysalo S, Ohta T, Miwa M, et al. Event extraction across multiple levels of biological organization. Bioinformatics, 2012, 28(18): i575 doi: 10.1093/bioinformatics/bts407
    [5]
    Zhou D Y, Zhong D Y, He Y L. Event trigger identification for biomedical events extraction using domain knowledge. Bioinformatics, 2014, 30(11): 1587 doi: 10.1093/bioinformatics/btu061
    [6]
    Wei X M, Zhu Q, Lyu C, et al. A hybrid method to extract triggers in biomedical events. J Digit Inform Manage, 2015, 13(4): 298 http://smartsearch.nstl.gov.cn/paper_detail.html?id=1bf664c0d6c16db5dc030d6e4a7d251f
    [7]
    Lousteau-Cazalet C, Barakat A, Belaud J P, et al. A decision support system for eco-efficient biorefinery process comparison using a semantic approach. Comput Electron Agric, 2016, 127: 351 doi: 10.1016/j.compag.2016.06.020
    [8]
    陳自巖, 黃宇, 王洋, 等. 一種非監督的事件觸發詞檢測和分類方法. 國外電子測量技術, 2016, 35(7): 91 doi: 10.3969/j.issn.1002-8978.2016.07.022

    Chen Z Y, Huang Y, Wang Y, et al. Unsupervised method for event trigger identification and classification. Foreign Electron Meas Technol, 2016, 35(7): 91 doi: 10.3969/j.issn.1002-8978.2016.07.022
    [9]
    Wang Y, Wang J, Lin H F, et al. Bidirectional long short-term memory with CRF for detecting biomedical event trigger in FastText semantic space. BMC Bioinf, 2018, 19(Suppl 20): 507 http://www.ncbi.nlm.nih.gov/pubmed/30577839
    [10]
    Amami M, Elkhlifi A, Faiz R. Biological event extraction using SVM and composite kernel function//The Extraction and Knowledge Management Conference. Bordeaux, 2012: 333(Amami M, Elkhlifi A, Faiz R. Biological event extraction using SVM and composite kernel function//Conférence Internationale Francophone sur l'Extraction et la Gestion des Connaissances. Bordeaux, 2012: 333
    [11]
    Vanegas J A, Matos S, González F, et al. An overview of biomolecular event extraction from scientific documents. Comput Math Methods Med, 2015, 2015: 571381 http://www.ncbi.nlm.nih.gov/pmc/articles/PMC4637451/
    [12]
    Wang Y, Wang J, Lin H F, et al. Biomedical event trigger detection based on bidirectional LSTM and CRF//2017 IEEE International Conference on Bioinformatics and Biomedicine (BIBM). Kansas City, 2017: 445
    [13]
    Bengio Y, Ducharme R, Vincent P, et al. A neural probabilistic language model. J Mach Learn Res, 2003, 3: 1137 http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=11468885&site=ehost-live
    [14]
    Peters M E, Neumann M, Iyyer M, et al. Deep contextualized word representations//Proceedings of the 2018 Conference of the North American Chapter of the Association for Computational Linguistics. New Orleans, 2018: 2227
    [15]
    Srivastava N, Hinton G, Krizhevsky A, et al. Dropout: a simple way to prevent neural networks from overfitting. J Mach Learn Res, 2014, 15(1): 1929 http://dl.acm.org/citation.cfm?id=2670313&preflayout=flat
    [16]
    來斯惟. 基于神經網絡的詞和文檔語義向量表示方法研究[學位論文]. 北京: 中國科學院大學, 2016

    Lai S W. Word and Document Embeddings Based on Neural Network Approaches [Dissertation]. Beijing: The University of Chinese Academy of Sciences, 2016
    [17]
    Devlin J, Chang M W, Lee K, et al. Bert: Pre-training of deep bidirectional transformers for language understanding//Proceedings of the 2019 Conference of the North American Chapter of the Association for Computational Linguistics. Minneapolis, 2019
    [18]
    Wang J, Li H L, An Y, et al. Biomedical event trigger detection based on convolutional neural network. Int J Data Min Bioinf, 2016, 15(3): 195 doi: 10.1504/IJDMB.2016.077067
  • 加載中

Catalog

    通訊作者: 陳斌, bchen63@163.com
    • 1. 

      沈陽化工大學材料科學與工程學院 沈陽 110142

    1. 本站搜索
    2. 百度學術搜索
    3. 萬方數據庫搜索
    4. CNKI搜索

    Figures(3)  / Tables(4)

    Article views (1250) PDF downloads(49) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return
    久色视频