Proceedings of the Third CIPS-SIGHAN Joint Conference on Chinese Language Processing 2014
DOI: 10.3115/v1/w14-6818
|View full text |Cite
|
Sign up to set email alerts
|

Personal Attributes Extraction Based on the Combination of Trigger Words, Dictionary and Rules

Abstract: Personal Attributes Extraction in Unstructured ChineseText Task is a subtask of The 3rd CIPS-SIGHAN Joint Conference on Chinese Language Processing (CLP-2014). In this report, we propose a method based on the combination of trigger words, dictionary and rules to realize the personal attributes extraction. We introduce the extraction process and show the result of this bakeoff, which can show that our method is feasible and has achieved good effect.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2014
2014
2020
2020

Publication Types

Select...
3
3
2

Relationship

2
6

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 0 publications
0
5
0
Order By: Relevance
“…Kailun Zhang et al [7] propose a method based on the combination of trigger words, dictionary and rules. This system narrow down the extraction scope by building attributes trigger words.…”
Section: Figure 3 the Strict Evaluation Resultsmentioning
confidence: 99%
“…Kailun Zhang et al [7] propose a method based on the combination of trigger words, dictionary and rules. This system narrow down the extraction scope by building attributes trigger words.…”
Section: Figure 3 the Strict Evaluation Resultsmentioning
confidence: 99%
“…The major approaches of NER for Chinese historical texts have been focused on handcrafted heuristic rules [6][7][8][9][10][11] to formulate entity features from context-derived patterns in a quick manner, which depend a lot on relevant domain knowledge. For example, MARKUS 3 [12] is a well-known online platform for automatically tagging a range of historical named entities (personal names, place names and bureaucratic offices, etc.)…”
Section: A Entity Extraction Of Chinese Historical Textsmentioning
confidence: 99%
“…For robust evaluation, we train our model for 5 times with 100 epochs and obtain the average evaluative indicators defined in the part D of Section IV. The model has been implemented through Keras 10 and Tensorflow 11 API. The whole experiment is run on the Google Colab platform 12 with a Tesla P100 GPU.…”
Section: Training Setupmentioning
confidence: 99%
“…Such text-based techniques are limited in the scalability in large code bases and only finding exact match code clone pairs. Second, tree or token-based clone detections [26], [37], [9], [50] are proposed by parsing program into tokens or generate abstract syntax trees representation of the source program. However, above approaches are still not sufficient to detect semantics-similar code clones.…”
Section: Bug Findingsmentioning
confidence: 99%