CN115169319B - Data processing system of identification symbol - Google Patents
Data processing system of identification symbol Download PDFInfo
- Publication number
- CN115169319B CN115169319B CN202210856545.7A CN202210856545A CN115169319B CN 115169319 B CN115169319 B CN 115169319B CN 202210856545 A CN202210856545 A CN 202210856545A CN 115169319 B CN115169319 B CN 115169319B
- Authority
- CN
- China
- Prior art keywords
- text
- entity
- target
- obtaining
- referred
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F40/00—Handling natural language data
- G06F40/10—Text processing
- G06F40/194—Calculation of difference between files
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F40/00—Handling natural language data
- G06F40/20—Natural language analysis
- G06F40/279—Recognition of textual entities
- G06F40/289—Phrasal analysis, e.g. finite state techniques or chunking
- G06F40/295—Named entity recognition
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Artificial Intelligence (AREA)
- Audiology, Speech & Language Pathology (AREA)
- Computational Linguistics (AREA)
- General Health & Medical Sciences (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
The invention relates to a data processing system of identification symbols, comprising: a database, a processor and a memory storing a computer program which, when executed by the processor, performs the steps of: acquiring a first text list and a second text list corresponding to any event; acquiring a target triple corresponding to the first text list according to each first text; obtaining a key triple corresponding to the second text according to any second text, when any key component in the key triple is a null set, obtaining the similarity corresponding to the second text, when the similarity corresponding to the second text is not less than a preset similarity threshold, determining that the key component is a component corresponding to a target triple, and when the similarity corresponding to the second text is less than the preset similarity threshold, marking the key component as an abnormal symbol; the meaning of the symbol representation in the text can be known, and the occurrence of events can be accurately known through the content of the network text.
Description
Technical Field
The invention relates to the technical field of entity identification, in particular to a data processing system of an identification symbol.
Background
With the advent of the network age, internet users are more and more actively acquiring network content and participating in the creation of the content, and one important form of the content is based on social media. Social media, as its name suggests, is used for social interaction, and as social users grow, it gradually forms one or more overlapping social networks within it, along which social information can be propagated between users. Generally, a social media user can directly obtain social information sent by a user of interest, and from a graph point of view, the information can be obtained from adjacent users. Although the social network structure is quite complex, according to the six-degree segmentation theory, the diameter of the social network structure is not too large, so that through forwarding of social users, information can break through regional limitation on the social network and can be rapidly spread, and through obtaining social media information, people can obtain events occurring in real life at the fastest speed. However, in social media related text, a symbol may be substituted for a phrase or word, resulting in an event that cannot occur through knowledge of the content.
Disclosure of Invention
To is directed atIn view of the above technical problems, the technical solution adopted by the present invention is a data processing system for recognizing a symbol, the system comprising: a database, a processor, and a memory storing a computer program, wherein the database comprises: target text set of time a = { a = { a } 1 ,……,A i ,……,A n },A i The method refers to a target text list corresponding to the ith event, i =1 … … n, n is the number of events, and when the computer program is executed by a processor, the following steps are realized:
s100, obtaining A i Corresponding first text list C i ={C i1 ,……,C ix ,……,C ip },C ix The x first text of the ith target event, x =1 … … p, p is the first text number of the ith target event, and A i Corresponding second text list D i ={D i1 ,……,D iy ,……,D iq },D iy The ith target event is the ith second text, y =1 … … q, and q is the second text number of the ith target event;
s200, according to each C ix Obtaining C i Corresponding target triplet C' i ={C' i1 ,C' i2 ,C' i3 - }, wherein, C' i1 Is referred to as C i Of a first target entity, C' i2 Is referred to as C i Of a second target entity of, C' i3 Is C' i1 And C' i2 A target relationship therebetween;
s300, according to D iy Obtaining D iy Corresponding key triplet H iy ={H 1 iy ,H 2 iy ,H 3 iy },H 1 iy Is referred to as D iy First key entity of (1), H 2 iy Is referred to as D iy Second key entity of (1), H 3 iy Is referred to as H 1 iy And H 2 iy Key relationships between;
s400, when H g iy If null, D is acquired iy Corresponding similarity F iy Wherein H is g iy Is H 1 iy ,H 2 iy And H 3 iy Any one of them;
s500, when F iy When the similarity is more than or equal to a preset similarity threshold value, H is determined g iy =C' ig Wherein, C' ig Is C' i1 ,C' i2 And C' i3 Any one of them;
s600, when F iy If the preset similarity threshold value is less than the preset similarity threshold value, H is set g iy The flag is an abnormal symbol.
Compared with the prior art, the invention has obvious advantages and beneficial effects. By the technical scheme, the data processing system for the identification symbol provided by the invention can achieve considerable technical progress and practicability, has wide industrial utilization value and at least has the following advantages:
a data processing system for recognizing a symbol of the present invention comprises: a database, a processor, and a memory storing a computer program, wherein the database comprises: a target text set of times which, when executed by a processor, implement the steps of: acquiring a first text list and a second text list corresponding to any event; acquiring a target triple corresponding to the first text list according to each first text; obtaining a key triple corresponding to the second text according to any second text, when any key component in the key triple is a null set, obtaining the similarity corresponding to the second text, when the similarity corresponding to the second text is not less than a preset similarity threshold, determining that the key component is a component corresponding to a target triple, and when the similarity corresponding to the second text is less than the preset similarity threshold, marking the key component as an abnormal symbol; the meaning of the symbol representation in the text can be known, and further, the occurrence of events can be accurately known through the content of the text in the network.
The foregoing description is only an overview of the technical solutions of the present invention, and in order to make the technical means of the present invention more clearly understood, the present invention may be implemented in accordance with the content of the description, and in order to make the above and other objects, features, and advantages of the present invention more clearly understood, the following preferred embodiments are described in detail with reference to the accompanying drawings.
Drawings
Fig. 1 is a flowchart illustrating steps performed by a data processing system for recognizing a symbol according to an embodiment of the present invention.
Detailed Description
To further illustrate the technical means and effects of the present invention adopted to achieve the predetermined objects, the following detailed description will be given with reference to the accompanying drawings and preferred embodiments of a data processing system for acquiring a target position and its effects.
It should be noted that the terms "first," "second," and the like in the description and claims of the present invention and in the drawings described above are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used is interchangeable under appropriate circumstances such that the embodiments of the invention described herein are capable of operation in sequences other than those illustrated or described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or server that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
Example one
This embodiment provides a data processing system for recognizing symbols, where the system includes: a database, a processor, and a memory storing a computer program, wherein the database comprises: goal of time text set a = { a = 1 ,……,A i ,……,A n },A i Referring to a target text list corresponding to the ith event, i =1 … … n, where n is the number of events, when the computer program is executed by a processor, the following steps are implemented, as shown in fig. 1:
s100, obtaining A i Corresponding first text list C i ={C i1 ,……,C ix ,……,C ip },C ix The x first text of the ith target event, x =1 … … p, p is the first text number of the ith target event, and A i Corresponding second text list D i ={D i1 ,……,D iy ,……,D iq },D iy The ith second text of the ith target event is referred to, y =1 … … q, and q is the second text number of the ith target event.
Specifically, the first text and the second text are acquired in the step S100 by:
s101, obtaining A from a database i ={A i1 ,……,A ij ,……,},A ij J =1 … … m, which is the j-th target text corresponding to the ith event i ,m i The number of target texts corresponding to the ith event is referred to.
S103, pair A ij Performing word segmentation to obtain A ij Corresponding target word character string B ij ={B 1 ij ,……,B r ij ,……,B Sj ij },B r ij Means A ij The corresponding r-th target word, r =1 … … Sj, sj means a ij The number of corresponding target words; wherein, any word segmentation processing method in the field falls into the protection scope of the invention.
S105, when B r ij When not a symbol, determine A ij As a first text, it can be understood that: only words and/or phrases are present in the first text.
S107, when B r ij When it is a symbol, determine A ij As a second text, it can be understood that: there are symbols in the second text and the symbols cannot know their meaning.
Specifically, the target text refers to text representing a target event, and the target event refers to an event focused by a user.
Specifically, the target text is text of unofficial media, and preferably, the target text is twitter text.
S200, according to each C ix Obtaining C i Corresponding target triplet C' i ={C' i1 ,C' i2 ,C' i3 Wherein, C' i1 Is referred to as C i Of a first target entity of, C' i2 Is referred to as C i Of a second target entity of, C' i3 Is C' i1 And C' i2 Target relationship between them.
Specifically, the step S200 further includes the steps of:
s201, obtaining C ix Corresponding intermediate triplet C' ix ={C 1 ix ,C 2 ix ,C 3 ix In which C 1 ix Is referred to as C ix First intermediate entity of, C 2 ix Is referred to as C ix A second intermediate entity of, C 3 ix Is referred to as C 1 ix And C 2 ix The intermediate relationship between the triplets, any method for obtaining the triplets in the art falls within the scope of the present invention, and is not described herein again.
S203 according to all C' ix Obtaining C i Corresponding first data list G 1 i ={C 1 i1 ,……,C 1 ix ,……,C 1 ip }、C i Corresponding second data list G 2 i ={C 2 i1 ,……,C 2 ix ,……,C 2 ip And C i Corresponding third data list G 3 i ={C 3 i1 ,……,C 3 ix ,……,C 3 ip }。
S205, according to G 1 i 、G 2 i And G 3 i Obtaining C' i 。
Further, the step S205 further includes the steps of:
s2051, pair G 1 i Processing and obtainingG 1 i Corresponding first designation list Q 1 i= {Q 1 i1 ,……,Q 1 iα ,……,Q 1 iβ },Q 1 iα Means G 1 i α =1 … … β, β being G 1 i A corresponding first specified number of entities; it can be understood that: the first designated entity is a pair G 1 i The first intermediate entity after the deduplication processing, any deduplication processing method in the art, falls within the protection scope of the present invention, and is not described herein again.
S2053, traverse Q 1 i And Q is 1 i The first designated entity with the maximum number is used as a third designated entity; it can be understood that: at the time of obtaining Q 1 i While Q can be controlled 1 iα Counting the corresponding number, wherein any counting method in the art falls within the protection scope of the invention, and is not described herein again; the third designated entity can be determined quickly.
S2055, according to the preset word list, when Q is 1 iα When the corresponding main word is consistent with the main word corresponding to the third appointed entity, Q is added 1 iα Replacing with a third designated entity; it can be understood that: according to Q 1 iα Obtaining Q from a predetermined entity configuration table 1 iα Corresponding main words and according to the third appointed entity, obtaining the main words corresponding to the third appointed entity from a preset entity configuration table, and when the main words of the corresponding main words and the main words of the third appointed entity are consistent, Q is used 1 iα The third designated entity is replaced, so that the entity capable of representing the target event can be accurately determined, and the corresponding meaning can be accurately identified; preferably, the predetermined vocabulary is a vocabulary of synonyms and synonyms, wherein the primary word refers to a primary word characterizing a class of synonyms and synonyms.
S2057, obtaining the number ratio K corresponding to the third appointed entity 1 i Wherein, K is 1 i The following conditions are met:
K 1 i =K 1 i0 /p,K 1 i0 means the total number of third specified entities;
s2059, when K 1 i0 When the number of the entities is more than or equal to a preset entity number threshold value, determining that the third specified entity is C' i1 。
Further, C' i2 Is obtained from' i1 The acquisition modes are consistent.
In a specific embodiment, the method further comprises the steps of:
s1, obtaining each C ix Corresponding first tag list C 0 ix ={C 01 ix ,……,C 0t ix ,……,C 0k ix },C 0t ix Is referred to as C ix And the corresponding t-th first label, wherein the first label refers to a label of any first text.
S3, obtaining C according to a preset word list 0t ix The corresponding main word.
S5, according to all C 0 ix Obtaining C i Corresponding intermediate tag list E i= {E i1 ,……,E iv ,……,E iz },E iv Is referred to as C i Corresponding v-th intermediate tag, v =1 … … z, z being C i A total number of corresponding middle labels, wherein the middle labels are for all C 0 ix Performing de-duplication processing on the first label; any duplication removing method in the art falls within the protection scope of the present invention, and is not described herein in detail.
S7, according to C 0 ix And E i Obtaining C i Corresponding similarity list F 0 i ={F 0 i1 ,……,F 0 ix ,……,F 0 ip },F 0 ix Is C 0 ix Corresponding similarity, wherein F 0 ix The following conditions are met:
F 0 ix =P 0 z, wherein P 0 Is referred to as C 0 ix In satisfyC 0t ix =E iv The number of first tags.
S9, traverse F 0 i And when F 0 ix Is F 0 i At medium maximum similarity, F is determined 0 ix Corresponding to C 3 ix Is C' i3 。
In the above, the relationship between the two prepared entities is determined through the tag, the relationship between the entities in different first texts can be unified, and whether the symbols in the texts represent the relationship between the entities or not can be determined continuously.
S300, according to D iy Obtaining D iy Corresponding key triplet H iy ={H 1 iy ,H 2 iy ,H 3 iy },H 1 iy Is referred to as D iy First key entity of (1), H 2 iy Is referred to as D iy Second key entity of (1), H 3 iy Is referred to as H 1 iy And H 2 iy Key relationships between; any method for obtaining triplets in the art falls within the scope of the present invention, and is not described herein.
S400, when H g iy If null, D is acquired iy Corresponding similarity F iy Wherein H is g iy Is H 1 iy ,H 2 iy And H 3 iy Any one of them.
Specifically, F iy The following conditions are met:
F iy =F 1 iy ×W 1 +F 2 iy ×W 2 +F 0 iy wherein, F 1 iy And F 2 iy Refers to the similarity between key components, which refers to H iy Removing H g iy A component other than W 1 Is F 1 iy Corresponding weight value, W 2 Is F 2 iy Corresponding weight value, F 0 iy Is referred to as D iy The target similarity of (1).
Further, F 1 iy And F 2 iy Any method of obtaining word similarity known in the art may be used, e.g., F 1 iy The following conditions are met:
wherein NK iy γ Means the gamma bit value, MK 'in the word vector of the key component' γ Is in C' i In, with NK iy γ The value of gamma bit in the word vector of the component corresponding to the key component is gamma =1 … … phi, which is the vector dimension in the word vector.
Further, F 2 iy And F 1 iy The obtaining methods are consistent, and are not described herein again.
Preferably, W 1 =W 2 And the inaccuracy of similarity caused by the position reversal of the two entities can be avoided.
Further, F 0 iy The following conditions are met:
F 0 iy =P' y /P y wherein, P' y Is D iy The second label and E in the corresponding second label list i Number of labels in the middle of the inner, P y Is D iy A total number of second tags in the corresponding second tag list.
As described above, the meaning of the symbol can be determined by the similarity of the tag and the similarity of other elements in the triplet, and the event occurring can be further accurately known through the content of the network text.
S500, when F iy When the similarity is more than or equal to a preset similarity threshold value, H is determined g iy =C' ig Wherein, C' ig Is C' i1 ,C' i2 And C' i3 Any one of them.
Specifically, C' ig And H g iy Element types in corresponding triplets are consistent, e.g. when H g iy Is the first key entity, C' ig Is a first target entity.
S600, when F iy If the preset similarity threshold value is less than the preset similarity threshold value, H is set g iy The flag is an abnormal symbol.
The embodiment provides a data processing system for recognizing symbols, which includes: a database, a processor, and a memory storing a computer program, wherein the database comprises: a target text set of times which, when executed by a processor, implement the steps of: acquiring a first text list and a second text list corresponding to any event; acquiring a target triple corresponding to the first text list according to each first text; obtaining a key triple corresponding to the second text according to any second text, when any key component in the key triple is a null set, obtaining the similarity corresponding to the second text, when the similarity corresponding to the second text is not less than a preset similarity threshold, determining that the key component is a component corresponding to a target triple, and when the similarity corresponding to the second text is less than the preset similarity threshold, marking the key component as an abnormal symbol; the meaning of the symbol representation in the text can be known, and the occurrence of events can be accurately known through the content of the network text.
Although the present invention has been described with reference to a preferred embodiment, it should be understood that various changes, substitutions and alterations can be made herein without departing from the spirit and scope of the invention as defined by the appended claims.
Claims (7)
1. A data processing system for recognizing symbols, said system comprising: a database, a processor, and a memory storing a computer program, wherein the database comprises: target text set of events a = { a = { a = } 1 ,……,A i ,……,A n },A i The method refers to a target text list corresponding to the ith event, i =1 … … n, n is the number of events, and when the computer program is executed by a processor, the following steps are realized:
s100, obtaining A i Corresponding first text list C i ={C i1 ,……,C ix ,……,C ip },C ix The x first text of the ith target event, x =1 … … p, p is the first text number of the ith target event, and A i Corresponding second text list D i ={D i1 ,……,D iy ,……,D iq },D iy The method includes that the method is the y second text of the ith target event, y =1 … … q, and q is the second text number of the ith target event, wherein the first text and the second text are obtained in the step of S100 through the following steps:
s101, obtaining A from a database i ={A i1 ,……,A ij ,……,A imi },A ij J =1 … … m is the j target text corresponding to the ith event i ,m i The number of target texts corresponding to the ith event is referred to;
s103, pair A ij Performing word segmentation to obtain A ij Corresponding target word character string B ij ={B 1 ij ,……,B r ij ,……,B Sj ij },B r ij Means A ij The corresponding r < th > target word, r =1 … … Sj, sj means A ij The number of corresponding target words;
s105, when B r ij When not a symbol, determining A ij Is a first text;
s107, when B r ij When it is a symbol, determining A ij The second text is the first text;
s200, according to each C ix Obtaining C i Corresponding target triplet C' i ={C' i1 ,C' i2 ,C' i3 Wherein, C' i1 Is referred to as C i First object of (2)Entity, C' i2 Is referred to as C i Of a second target entity of, C' i3 Is C' i1 And C' i2 Wherein, the step S200 further comprises the following steps:
s201, obtaining C ix Corresponding intermediate triplet C' ix ={C 1 ix ,C 2 ix ,C 3 ix In which C is 1 ix Is referred to as C ix First intermediate entity of, C 2 ix Is referred to as C ix A second intermediate entity of, C 3 ix Is referred to as C 1 ix And C 2 ix The intermediate relationship between the two or more of them,
s203 according to all C' ix Obtaining C i Corresponding first data list G 1 i ={C 1 i1 ,……,C 1 ix ,……,C 1 ip }、C i Corresponding second data list G 2 i ={C 2 i1 ,……,C 2 ix ,……,C 2 ip And C i Corresponding third data list G 3 i ={C 3 i1 ,……,C 3 ix ,……,C 3 ip };
S205, according to G 1 i 、G 2 i And G 3 i Obtaining C' i ;
S300, according to D iy Obtaining D iy Corresponding key triplet H iy ={H 1 iy ,H 2 iy ,H 3 iy },H 1 iy Is referred to as D iy First key entity of (1), H 2 iy Is referred to as D iy Second key entity of (1), H 3 iy Is referred to as H 1 iy And H 2 iy Key relationships between;
s400, when H g iy If null, D is acquired iy Corresponding similarity F iy Wherein H is g iy Is H 1 iy ,H 2 iy And H 3 iy Any one of them;
s500, when F iy When the similarity is more than or equal to a preset similarity threshold value, H is determined g iy =C' ig Wherein, C' ig Is C' i1 ,C' i2 And C' i3 Any one of them;
s600, when F iy If the preset similarity threshold value is less than the preset similarity threshold value, H is set g iy The flag is an abnormal symbol.
2. The data processing system for identification symbols of claim 1, further comprising the step of, in the step S205:
s2051, pair G 1 i Processing to obtain G 1 i Corresponding first designation list Q 1 i= {Q 1 i1 ,……,Q 1 iα ,……,Q 1 iβ },Q 1 iα Means G 1 i α =1 … … β, β being G 1 i Corresponding first designated entity quantity, wherein the first designated entity is G 1 i The first intermediate entity after the de-duplication process,
s2053, traverse Q 1 i And Q is 1 i The first designated entity with the maximum number is used as a third designated entity;
s2055, according to the preset entity configuration table, when Q is 1 iα When the corresponding body is consistent with the body corresponding to the third appointed entity, Q is added 1 iα Replacing with a third designated entity;
s2057, obtaining the number ratio K corresponding to the third appointed entity 1 i Wherein, K is 1 i The following conditions are met:
K 1 i =K 1 i0 /p,K 1 i0 refers to the total number of third specified entities;
s2059, when K 1 i0 Not less than predetermined fruitWhen the body number is a threshold value, determining that the third designated entity is C' i1 。
3. Data processing system for identification symbols according to claim 1, characterised in that C' i2 Is obtained from' i1 The acquisition modes are consistent.
4. The data processing system for identification symbols of claim 1, wherein F is iy The following conditions are met:
F iy =F 1 iy ×W 1 +F 2 iy ×W 2 +F 0 iy wherein F is 1 iy And F 2 iy Is indicated at H iy Removing H g iy Other than W 1 Is F 1 iy Corresponding weight value, W 2 Is F 2 iy Corresponding weight value, F 0 iy Is referred to as D iy The target similarity of (1).
5. The data processing system for identification symbols of claim 4 wherein W is 1 =W 2 。
6. Data processing system for identification symbols according to claim 1, characterised in that C' ig And H g iy The element types in the corresponding triples are consistent.
7. The data processing system for identification symbols of claim 1, wherein said target text is text of an unofficial media.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210856545.7A CN115169319B (en) | 2022-07-21 | 2022-07-21 | Data processing system of identification symbol |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210856545.7A CN115169319B (en) | 2022-07-21 | 2022-07-21 | Data processing system of identification symbol |
Publications (2)
Publication Number | Publication Date |
---|---|
CN115169319A CN115169319A (en) | 2022-10-11 |
CN115169319B true CN115169319B (en) | 2023-02-07 |
Family
ID=83494694
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210856545.7A Active CN115169319B (en) | 2022-07-21 | 2022-07-21 | Data processing system of identification symbol |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN115169319B (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116167339B (en) * | 2022-12-02 | 2023-08-15 | 中科雨辰科技有限公司 | Data processing system for acquiring link entity based on entity relationship |
CN115964190B (en) * | 2022-12-07 | 2023-07-14 | 中科雨辰科技有限公司 | Data processing system for updating historical event information |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112632274A (en) * | 2020-10-29 | 2021-04-09 | 中科曙光南京研究院有限公司 | Abnormal event classification method and system based on text processing |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9443005B2 (en) * | 2012-12-14 | 2016-09-13 | Instaknow.Com, Inc. | Systems and methods for natural language processing |
US10108600B2 (en) * | 2016-09-16 | 2018-10-23 | Entigenlogic Llc | System and method of attribute, entity, and action organization of a data corpora |
CN114580392B (en) * | 2022-04-29 | 2022-07-29 | 中科雨辰科技有限公司 | Data processing system for identifying entity |
CN114579675B (en) * | 2022-05-05 | 2022-07-15 | 中科雨辰科技有限公司 | Data processing system for determining common finger event |
-
2022
- 2022-07-21 CN CN202210856545.7A patent/CN115169319B/en active Active
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112632274A (en) * | 2020-10-29 | 2021-04-09 | 中科曙光南京研究院有限公司 | Abnormal event classification method and system based on text processing |
Also Published As
Publication number | Publication date |
---|---|
CN115169319A (en) | 2022-10-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN115169319B (en) | Data processing system of identification symbol | |
CN108038183B (en) | Structured entity recording method, device, server and storage medium | |
US11036791B2 (en) | Computerized system and method for determining non-redundant tags from a user's network activity | |
CN107025239B (en) | Sensitive word filtering method and device | |
JP2017224184A (en) | Machine learning device | |
CN109584094B (en) | Interpersonal path rapid positioning system, method and medium | |
CN109918556B (en) | Method for identifying depressed mood by integrating social relationship and text features of microblog users | |
WO2010088052A1 (en) | Methods and systems for matching records and normalizing names | |
CN109492168B (en) | Visual tourism interest recommendation information generation method based on tourism photos | |
US20150254327A1 (en) | System and method for rectifying a typographical error in a text file | |
CN110837568A (en) | Entity alignment method and device, electronic equipment and storage medium | |
CN111090994A (en) | Chinese-internet-forum-text-oriented event place attribution province identification method | |
CN114785505A (en) | Data processing system for acquiring abnormal equipment | |
CN102693258A (en) | High-accuracy similarity search system | |
CN113326363B (en) | Searching method and device, prediction model training method and device and electronic equipment | |
CN108415971B (en) | Method and device for recommending supply and demand information by using knowledge graph | |
CN116846690B (en) | IPv6 network space mapping method based on industry classification and probability model | |
CN116578708A (en) | Paper data name disambiguation algorithm based on graph neural network | |
CN113806565B (en) | Data processing system for text labeling | |
JP2017091436A (en) | Feature word selection device | |
CN113792545B (en) | News event activity name extraction method based on deep learning | |
CN113688257B (en) | Author name identity judging method based on large-scale literature data | |
CN113495964B (en) | Triad screening method, device, equipment and readable storage medium | |
CN104317912B (en) | Image meaning automatic marking method based on neighborhood and learning distance metric | |
CN110096704B (en) | Dynamic theme discovery method for short text stream |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |