Journal of Computer Applications ›› 2016, Vol. 36 ›› Issue (2): 449-454.DOI: 10.11772/j.issn.1001-9081.2016.02.0449
Previous Articles Next Articles
SUN Liping1, GUO Yi1,2, TANG Wenwu1, XU Yongbin1
Received:
2015-08-29
Revised:
2015-09-11
Online:
2016-02-03
Published:
2016-02-10
孙丽萍1, 过弋1,2, 唐文武1, 徐永斌1
通讯作者:
过弋(1975-),男,江苏无锡人,教授,博士,主要研究方向:自然语言处理、智能信息处理、本体工程。
作者简介:
孙丽萍(1990-),女,浙江上虞人,硕士研究生,主要研究方向:自然语言处理;唐文武(1992-),男,福建福鼎人,硕士研究生,主要研究方向:自然语言处理;徐永斌(1990-),男,江苏扬州人,硕士研究生,主要研究方向:自然语言处理。
基金资助:
CLC Number:
SUN Liping, GUO Yi, TANG Wenwu, XU Yongbin. Enterprise abbreviation prediction based on constitution pattern and conditional random field[J]. Journal of Computer Applications, 2016, 36(2): 449-454.
孙丽萍, 过弋, 唐文武, 徐永斌. 基于构成模式和条件随机场的企业简称预测[J]. 计算机应用, 2016, 36(2): 449-454.
Add to citation manager EndNote|Ris|BibTeX
URL: https://www.joca.cn/EN/10.11772/j.issn.1001-9081.2016.02.0449
[1] 王厚峰.汉语缩略语自动处理研究现状[J].中文信息学报,2011,25(5):60-67. (WANG H F. Survey abbreviation processing in Chinese text[J]. Journal of Chinese Information Processing, 2011, 25(5): 60-67.) [2] 邱莎,王付艳,申浩如,等.基于含边界词性特征的中文命名实体识别[J].计算机工程,2012,38(13):128-130. (QIU S, WANG F Y, SHEN H R, et al. Chinese named entity recognition based on part of speech feature with edges[J]. Computer Engineering, 2012, 38(13): 128-130.) [3] 雷静,张舵,冯霞.基于构成模式的汉语机构名识别[C]//SWCL-2008:第四届全国学生计算语言学研讨会会议论文集.北京:中国中文信息学会,2008:431-437. (LEI J, ZHANG D, FENG X. Recognition of Chinese organization name bases on constitution pattern[C]//SWCL-2008: Proceedings of the Fourth National Student Workshop on Computational Linguistics. Beijing: Chinese Information Processing Society of China, 2008: 431-437) [4] 胡万亭,杨燕,尹红风,等.一种基于词频统计的组织机构名识别方法[J].计算机应用研究,2013,30(7): 2014-2016. (HU W T, YANG Y, YIN H F, et al. Organization name recognition based on word frequency statistics[J]. Application Research of Computers, 2013, 30(7): 2014-2016.) [5] 沈嘉懿,李芳,徐飞玉,等.中文组织机构名称与简称的识别[J].中文信息学报,2007,21(6):17-21. (SHEN J, LI F, XU F, et al. Recognition of Chinese organization name and abbreviations[J]. Journal of Chinese Information Processing, 2007, 21(6): 17-21.) [6] CHANG J-S, LAI Y-T. A preliminary study on probabilistic models for Chinese abbreviations[C]//Proceedings of the Third SIGHAN Workshop on Chinese Language Learning. Stroudsburg, PA: Association for Computational Linguistics, 2004: 9-16. [7] 鞠久朋,张伟伟,宁建军,等.CRF与规则相结合的地理空间命名实体识别[J].计算机工程,2011,37(7):210-215. (JU J P, ZHANG W W, NING J J, et al. Geospatial named entities recognition using combination of CRF and rules[J]. Computer Engineering, 2011, 37(7): 210-215.) [8] 刘凯,周雪忠,于剑,等.基于条件随机场的中医临床病历命名实体抽取[J].计算机工程,2014,40(9):312-316. (LIU K, ZHOU X Z, YU J, et al. Named entity extraction of traditional Chinese medicine medical records based on conditional random[J]. Computer Engineering, 2014, 40(9): 312-316.) [9] 张金龙,王石,钱存发.基于CRF和规则的中文医疗机构名称识别[J].计算机应用与软件,2014,31(3):159-162. (ZHANG J L, WANG S, QIAN C F, et al. CRF and rules-based recognition of medical institutions name in Chinese[J]. Computer Application and Software, 2014, 31(3): 159-162.) [10] 陈菘霖.汉语缩略词构词规律的社会心理实证性[J].中国社会语言学,2011(1):83-94. (CHEN S L. The psychological reality of the abbreviations in Chinese morphology[J]. Chinese Social Linguistics, 2011(1): 83-94.) [11] 陈超,朱洪波,王亚强,等.中文财经文本中公司名简称的自动识别[J].四川大学学报(自然科学版),2011,48(2): 308-314. (CHEN C, ZHU H B, WANG Y Q, et al. Automatic recognition of company name abbreviations in Chinese financial texts[J]. Journal of Sichuan University (Natural Science Edition), 2011, 48(2): 308-314.) [12] 杨晓东,晏立,尤慧丽.CCRF与规则相结合的中文机构名识别[J].计算机工程,2011,37(8):169-171. (YANG X D, YAN L, YOU H L. Chinese organization names recognition combined with ccrf and rules[J]. Computer Engineering, 2011, 37(8): 169-171.) [13] LAFFERTY J D, MCCALLUM A, PEREIRA F C N. Conditional random fields: Probabilistic models for segmenting and labeling sequence data[C]//ICML '01: Proceedings of the Eighteenth International Conference on Machine Learning. San Francisco, CA: Morgan Kaufmann Publishers, 2001: 282-289. [14] 焦妍,王厚峰,张龙凯.基于条件随机场与Web数据的缩略语预测[J].中文信息学报,2012,26(2):62-68. (JIAO Y, WANG H F, ZHANG L K. Abbreviation prediction using conditional random field and Web data[J]. Journal of Chinese Information Processing, 2012, 26(2): 62-68) [15] 钱揖丽,冯志茹.基于语块和条件随机场(CRFs)的韵律短语识别[J].中文信息学报,2014,28(5):32-38. (QIAN Y L, FENG Z R. Identification of Chinese prosodic phrase based on chunk and CRF[J]. Journal of Chinese Information Processing, 2014, 28(5): 32-38.) [16] 连誉舜,赵宇明.基于分词信息的中文机构名简称自动生成方法[J].计算机应用与软件,2014,31(4):153-156. (LIAN Y S, ZHAO Y M. An automatic generation method for Chinese organization abbreviations based on segmentation information[J]. Computer Applications and Software, 2014, 31(4): 153-156.) [17] 上海林原信息科技有限公司. HanLP: Han Language Processing [EB/OL]. [2015-04-02]. http://hanlp.linrunsoft.com/. [18] 丁远钧,曹存根,王石,等.从中文Web网页中获取实体简称的研究[J].计算机科学,2012,39(3):174-182. (DING Y J, CAO C G, WANG S, et al. Extracting abbreviated names for Chinese entities from the Web[J]. Computer Science, 2012, 39(3): 174-182.) |
[1] | ZONG Xuejun, HAN Bing, WANG Guogang, NING Bowei, HE Kan, LIAN Lian. TDRFuzzer: fuzzy testing method for industrial control protocols based on adaptive dynamic interval strategy [J]. Journal of Computer Applications, 0, (): 0-0. |
[2] | Ming ZHANG, Le FU, Haifeng WANG. Relay control model for concurrent data flow in edge computing [J]. Journal of Computer Applications, 2024, 44(12): 3876-3883. |
[3] | . Survey of DNS tunneling detection technology research [J]. Journal of Computer Applications, 0, (): 0-0. |
[4] | . Large scale IoT binary component identification based on named entity recognition [J]. Journal of Computer Applications, 0, (): 0-0. |
[5] | Yixi LIU, Jun HE, Bo WU, Bingtong LIU, Ziyu LI. Survey of software security testing techniques in DevSecOps [J]. Journal of Computer Applications, 2024, 44(11): 3470-3478. |
[6] | Chuanlin PANG, Rui TANG, Ruizhi ZHANG, Chuan LIU, Jia LIU, Shibo YUE. Distributed power allocation algorithm based on graph convolutional network for D2D communication systems [J]. Journal of Computer Applications, 2024, 44(9): 2855-2862. |
[7] | Jiepo FANG, Chongben TAO. Hybrid internet of vehicles intrusion detection system for zero-day attacks [J]. Journal of Computer Applications, 2024, 44(9): 2763-2769. |
[8] | ZHANG Yiming, CAO Tengfei. Federated Learning Optimization Algorithm based on Local Drift and Diversity Computing Power [J]. Journal of Computer Applications, 0, (): 0-0. |
[9] | Hang XU, Zhi YANG, Xingyuan CHEN, Bing HAN, Xuehui DU. Coverage-guided fuzzing based on adaptive sensitive region mutation [J]. Journal of Computer Applications, 2024, 44(8): 2528-2535. |
[10] | Hong CHEN, Bing QI, Haibo JIN, Cong WU, Li’ang ZHANG. Class-imbalanced traffic abnormal detection based on 1D-CNN and BiGRU [J]. Journal of Computer Applications, 2024, 44(8): 2493-2499. |
[11] |
GENG Haijun, DONG Yun, HU Zhiguo, CHI Haotian, YANG Jing, YIN Xia.
Encrypted traffic classification method based on Attention-1DCNN-CE#br#
#br#
[J]. Journal of Computer Applications, 0, (): 0-0.
|
[12] | . Summary of network intrusion detection systems based on deep learning [J]. Journal of Computer Applications, 0, (): 0-0. |
[13] | CHEN Ruilong, HU Tao, BU Youjun, YI Peng, HU Xianjun, QIAO Wei. Stacking ensemble adversarial defense method for encrypted malicious traffic detection model [J]. Journal of Computer Applications, 0, (): 0-0. |
[14] | Zhongdai WU, Dezhi HAN, Haibao JIANG, Cheng FENG, Bing HAN, Chongqing CHEN. Review of marine ship communication cybersecurity [J]. Journal of Computer Applications, 2024, 44(7): 2123-2136. |
[15] | Zihao YAO, Yuanming LI, Ziqiang MA, Yang LI, Lianggen WEI. Multi-object cache side-channel attack detection model based on machine learning [J]. Journal of Computer Applications, 2024, 44(6): 1862-1871. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||