CN115169319B - Data processing system of identification symbol - Google Patents

Data processing system of identification symbol Download PDF

Info

Publication number
CN115169319B
CN115169319B CN202210856545.7A CN202210856545A CN115169319B CN 115169319 B CN115169319 B CN 115169319B CN 202210856545 A CN202210856545 A CN 202210856545A CN 115169319 B CN115169319 B CN 115169319B
Authority
CN
China
Prior art keywords
text
entity
target
obtaining
referred
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210856545.7A
Other languages
Chinese (zh)
Other versions
CN115169319A (en
Inventor
刘羽
张正义
刘宸
傅晓航
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhongke Yuchen Technology Co Ltd
Original Assignee
Zhongke Yuchen Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhongke Yuchen Technology Co Ltd filed Critical Zhongke Yuchen Technology Co Ltd
Priority to CN202210856545.7A priority Critical patent/CN115169319B/en
Publication of CN115169319A publication Critical patent/CN115169319A/en
Application granted granted Critical
Publication of CN115169319B publication Critical patent/CN115169319B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F40/00Handling natural language data
    • G06F40/10Text processing
    • G06F40/194Calculation of difference between files
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F40/00Handling natural language data
    • G06F40/20Natural language analysis
    • G06F40/279Recognition of textual entities
    • G06F40/289Phrasal analysis, e.g. finite state techniques or chunking
    • G06F40/295Named entity recognition

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Artificial Intelligence (AREA)
  • Audiology, Speech & Language Pathology (AREA)
  • Computational Linguistics (AREA)
  • General Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention relates to a data processing system of identification symbols, comprising: a database, a processor and a memory storing a computer program which, when executed by the processor, performs the steps of: acquiring a first text list and a second text list corresponding to any event; acquiring a target triple corresponding to the first text list according to each first text; obtaining a key triple corresponding to the second text according to any second text, when any key component in the key triple is a null set, obtaining the similarity corresponding to the second text, when the similarity corresponding to the second text is not less than a preset similarity threshold, determining that the key component is a component corresponding to a target triple, and when the similarity corresponding to the second text is less than the preset similarity threshold, marking the key component as an abnormal symbol; the meaning of the symbol representation in the text can be known, and the occurrence of events can be accurately known through the content of the network text.

Description

Data processing system of identification symbol
Technical Field
The invention relates to the technical field of entity identification, in particular to a data processing system of an identification symbol.
Background
With the advent of the network age, internet users are more and more actively acquiring network content and participating in the creation of the content, and one important form of the content is based on social media. Social media, as its name suggests, is used for social interaction, and as social users grow, it gradually forms one or more overlapping social networks within it, along which social information can be propagated between users. Generally, a social media user can directly obtain social information sent by a user of interest, and from a graph point of view, the information can be obtained from adjacent users. Although the social network structure is quite complex, according to the six-degree segmentation theory, the diameter of the social network structure is not too large, so that through forwarding of social users, information can break through regional limitation on the social network and can be rapidly spread, and through obtaining social media information, people can obtain events occurring in real life at the fastest speed. However, in social media related text, a symbol may be substituted for a phrase or word, resulting in an event that cannot occur through knowledge of the content.
Disclosure of Invention
To is directed atIn view of the above technical problems, the technical solution adopted by the present invention is a data processing system for recognizing a symbol, the system comprising: a database, a processor, and a memory storing a computer program, wherein the database comprises: target text set of time a = { a = { a } 1 ,……,A i ,……,A n },A i The method refers to a target text list corresponding to the ith event, i =1 … … n, n is the number of events, and when the computer program is executed by a processor, the following steps are realized:
s100, obtaining A i Corresponding first text list C i ={C i1 ,……,C ix ,……,C ip },C ix The x first text of the ith target event, x =1 … … p, p is the first text number of the ith target event, and A i Corresponding second text list D i ={D i1 ,……,D iy ,……,D iq },D iy The ith target event is the ith second text, y =1 … … q, and q is the second text number of the ith target event;
s200, according to each C ix Obtaining C i Corresponding target triplet C' i ={C' i1 ,C' i2 ,C' i3 - }, wherein, C' i1 Is referred to as C i Of a first target entity, C' i2 Is referred to as C i Of a second target entity of, C' i3 Is C' i1 And C' i2 A target relationship therebetween;
s300, according to D iy Obtaining D iy Corresponding key triplet H iy ={H 1 iy ,H 2 iy ,H 3 iy },H 1 iy Is referred to as D iy First key entity of (1), H 2 iy Is referred to as D iy Second key entity of (1), H 3 iy Is referred to as H 1 iy And H 2 iy Key relationships between;
s400, when H g iy If null, D is acquired iy Corresponding similarity F iy Wherein H is g iy Is H 1 iy ,H 2 iy And H 3 iy Any one of them;
s500, when F iy When the similarity is more than or equal to a preset similarity threshold value, H is determined g iy =C' ig Wherein, C' ig Is C' i1 ,C' i2 And C' i3 Any one of them;
s600, when F iy If the preset similarity threshold value is less than the preset similarity threshold value, H is set g iy The flag is an abnormal symbol.
Compared with the prior art, the invention has obvious advantages and beneficial effects. By the technical scheme, the data processing system for the identification symbol provided by the invention can achieve considerable technical progress and practicability, has wide industrial utilization value and at least has the following advantages:
a data processing system for recognizing a symbol of the present invention comprises: a database, a processor, and a memory storing a computer program, wherein the database comprises: a target text set of times which, when executed by a processor, implement the steps of: acquiring a first text list and a second text list corresponding to any event; acquiring a target triple corresponding to the first text list according to each first text; obtaining a key triple corresponding to the second text according to any second text, when any key component in the key triple is a null set, obtaining the similarity corresponding to the second text, when the similarity corresponding to the second text is not less than a preset similarity threshold, determining that the key component is a component corresponding to a target triple, and when the similarity corresponding to the second text is less than the preset similarity threshold, marking the key component as an abnormal symbol; the meaning of the symbol representation in the text can be known, and further, the occurrence of events can be accurately known through the content of the text in the network.
The foregoing description is only an overview of the technical solutions of the present invention, and in order to make the technical means of the present invention more clearly understood, the present invention may be implemented in accordance with the content of the description, and in order to make the above and other objects, features, and advantages of the present invention more clearly understood, the following preferred embodiments are described in detail with reference to the accompanying drawings.
Drawings
Fig. 1 is a flowchart illustrating steps performed by a data processing system for recognizing a symbol according to an embodiment of the present invention.
Detailed Description
To further illustrate the technical means and effects of the present invention adopted to achieve the predetermined objects, the following detailed description will be given with reference to the accompanying drawings and preferred embodiments of a data processing system for acquiring a target position and its effects.
It should be noted that the terms "first," "second," and the like in the description and claims of the present invention and in the drawings described above are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used is interchangeable under appropriate circumstances such that the embodiments of the invention described herein are capable of operation in sequences other than those illustrated or described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or server that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
Example one
This embodiment provides a data processing system for recognizing symbols, where the system includes: a database, a processor, and a memory storing a computer program, wherein the database comprises: goal of time text set a = { a = 1 ,……,A i ,……,A n },A i Referring to a target text list corresponding to the ith event, i =1 … … n, where n is the number of events, when the computer program is executed by a processor, the following steps are implemented, as shown in fig. 1:
s100, obtaining A i Corresponding first text list C i ={C i1 ,……,C ix ,……,C ip },C ix The x first text of the ith target event, x =1 … … p, p is the first text number of the ith target event, and A i Corresponding second text list D i ={D i1 ,……,D iy ,……,D iq },D iy The ith second text of the ith target event is referred to, y =1 … … q, and q is the second text number of the ith target event.
Specifically, the first text and the second text are acquired in the step S100 by:
s101, obtaining A from a database i ={A i1 ,……,A ij ,……,
Figure 275891DEST_PATH_IMAGE001
},A ij J =1 … … m, which is the j-th target text corresponding to the ith event i ,m i The number of target texts corresponding to the ith event is referred to.
S103, pair A ij Performing word segmentation to obtain A ij Corresponding target word character string B ij ={B 1 ij ,……,B r ij ,……,B Sj ij },B r ij Means A ij The corresponding r-th target word, r =1 … … Sj, sj means a ij The number of corresponding target words; wherein, any word segmentation processing method in the field falls into the protection scope of the invention.
S105, when B r ij When not a symbol, determine A ij As a first text, it can be understood that: only words and/or phrases are present in the first text.
S107, when B r ij When it is a symbol, determine A ij As a second text, it can be understood that: there are symbols in the second text and the symbols cannot know their meaning.
Specifically, the target text refers to text representing a target event, and the target event refers to an event focused by a user.
Specifically, the target text is text of unofficial media, and preferably, the target text is twitter text.
S200, according to each C ix Obtaining C i Corresponding target triplet C' i ={C' i1 ,C' i2 ,C' i3 Wherein, C' i1 Is referred to as C i Of a first target entity of, C' i2 Is referred to as C i Of a second target entity of, C' i3 Is C' i1 And C' i2 Target relationship between them.
Specifically, the step S200 further includes the steps of:
s201, obtaining C ix Corresponding intermediate triplet C' ix ={C 1 ix ,C 2 ix ,C 3 ix In which C 1 ix Is referred to as C ix First intermediate entity of, C 2 ix Is referred to as C ix A second intermediate entity of, C 3 ix Is referred to as C 1 ix And C 2 ix The intermediate relationship between the triplets, any method for obtaining the triplets in the art falls within the scope of the present invention, and is not described herein again.
S203 according to all C' ix Obtaining C i Corresponding first data list G 1 i ={C 1 i1 ,……,C 1 ix ,……,C 1 ip }、C i Corresponding second data list G 2 i ={C 2 i1 ,……,C 2 ix ,……,C 2 ip And C i Corresponding third data list G 3 i ={C 3 i1 ,……,C 3 ix ,……,C 3 ip }。
S205, according to G 1 i 、G 2 i And G 3 i Obtaining C' i
Further, the step S205 further includes the steps of:
s2051, pair G 1 i Processing and obtainingG 1 i Corresponding first designation list Q 1 i= {Q 1 i1 ,……,Q 1 ,……,Q 1 },Q 1 Means G 1 i α =1 … … β, β being G 1 i A corresponding first specified number of entities; it can be understood that: the first designated entity is a pair G 1 i The first intermediate entity after the deduplication processing, any deduplication processing method in the art, falls within the protection scope of the present invention, and is not described herein again.
S2053, traverse Q 1 i And Q is 1 i The first designated entity with the maximum number is used as a third designated entity; it can be understood that: at the time of obtaining Q 1 i While Q can be controlled 1 Counting the corresponding number, wherein any counting method in the art falls within the protection scope of the invention, and is not described herein again; the third designated entity can be determined quickly.
S2055, according to the preset word list, when Q is 1 When the corresponding main word is consistent with the main word corresponding to the third appointed entity, Q is added 1 Replacing with a third designated entity; it can be understood that: according to Q 1 Obtaining Q from a predetermined entity configuration table 1 Corresponding main words and according to the third appointed entity, obtaining the main words corresponding to the third appointed entity from a preset entity configuration table, and when the main words of the corresponding main words and the main words of the third appointed entity are consistent, Q is used 1 The third designated entity is replaced, so that the entity capable of representing the target event can be accurately determined, and the corresponding meaning can be accurately identified; preferably, the predetermined vocabulary is a vocabulary of synonyms and synonyms, wherein the primary word refers to a primary word characterizing a class of synonyms and synonyms.
S2057, obtaining the number ratio K corresponding to the third appointed entity 1 i Wherein, K is 1 i The following conditions are met:
K 1 i =K 1 i0 /p,K 1 i0 means the total number of third specified entities;
s2059, when K 1 i0 When the number of the entities is more than or equal to a preset entity number threshold value, determining that the third specified entity is C' i1
Further, C' i2 Is obtained from' i1 The acquisition modes are consistent.
In a specific embodiment, the method further comprises the steps of:
s1, obtaining each C ix Corresponding first tag list C 0 ix ={C 01 ix ,……,C 0t ix ,……,C 0k ix },C 0t ix Is referred to as C ix And the corresponding t-th first label, wherein the first label refers to a label of any first text.
S3, obtaining C according to a preset word list 0t ix The corresponding main word.
S5, according to all C 0 ix Obtaining C i Corresponding intermediate tag list E i= {E i1 ,……,E iv ,……,E iz },E iv Is referred to as C i Corresponding v-th intermediate tag, v =1 … … z, z being C i A total number of corresponding middle labels, wherein the middle labels are for all C 0 ix Performing de-duplication processing on the first label; any duplication removing method in the art falls within the protection scope of the present invention, and is not described herein in detail.
S7, according to C 0 ix And E i Obtaining C i Corresponding similarity list F 0 i ={F 0 i1 ,……,F 0 ix ,……,F 0 ip },F 0 ix Is C 0 ix Corresponding similarity, wherein F 0 ix The following conditions are met:
F 0 ix =P 0 z, wherein P 0 Is referred to as C 0 ix In satisfyC 0t ix =E iv The number of first tags.
S9, traverse F 0 i And when F 0 ix Is F 0 i At medium maximum similarity, F is determined 0 ix Corresponding to C 3 ix Is C' i3
In the above, the relationship between the two prepared entities is determined through the tag, the relationship between the entities in different first texts can be unified, and whether the symbols in the texts represent the relationship between the entities or not can be determined continuously.
S300, according to D iy Obtaining D iy Corresponding key triplet H iy ={H 1 iy ,H 2 iy ,H 3 iy },H 1 iy Is referred to as D iy First key entity of (1), H 2 iy Is referred to as D iy Second key entity of (1), H 3 iy Is referred to as H 1 iy And H 2 iy Key relationships between; any method for obtaining triplets in the art falls within the scope of the present invention, and is not described herein.
S400, when H g iy If null, D is acquired iy Corresponding similarity F iy Wherein H is g iy Is H 1 iy ,H 2 iy And H 3 iy Any one of them.
Specifically, F iy The following conditions are met:
F iy =F 1 iy ×W 1 +F 2 iy ×W 2 +F 0 iy wherein, F 1 iy And F 2 iy Refers to the similarity between key components, which refers to H iy Removing H g iy A component other than W 1 Is F 1 iy Corresponding weight value, W 2 Is F 2 iy Corresponding weight value, F 0 iy Is referred to as D iy The target similarity of (1).
Further, F 1 iy And F 2 iy Any method of obtaining word similarity known in the art may be used, e.g., F 1 iy The following conditions are met:
Figure 520927DEST_PATH_IMAGE002
wherein NK iy γ Means the gamma bit value, MK 'in the word vector of the key component' γ Is in C' i In, with NK iy γ The value of gamma bit in the word vector of the component corresponding to the key component is gamma =1 … … phi, which is the vector dimension in the word vector.
Further, F 2 iy And F 1 iy The obtaining methods are consistent, and are not described herein again.
Preferably, W 1 =W 2 And the inaccuracy of similarity caused by the position reversal of the two entities can be avoided.
Further, F 0 iy The following conditions are met:
F 0 iy =P' y /P y wherein, P' y Is D iy The second label and E in the corresponding second label list i Number of labels in the middle of the inner, P y Is D iy A total number of second tags in the corresponding second tag list.
As described above, the meaning of the symbol can be determined by the similarity of the tag and the similarity of other elements in the triplet, and the event occurring can be further accurately known through the content of the network text.
S500, when F iy When the similarity is more than or equal to a preset similarity threshold value, H is determined g iy =C' ig Wherein, C' ig Is C' i1 ,C' i2 And C' i3 Any one of them.
Specifically, C' ig And H g iy Element types in corresponding triplets are consistent, e.g. when H g iy Is the first key entity, C' ig Is a first target entity.
S600, when F iy If the preset similarity threshold value is less than the preset similarity threshold value, H is set g iy The flag is an abnormal symbol.
The embodiment provides a data processing system for recognizing symbols, which includes: a database, a processor, and a memory storing a computer program, wherein the database comprises: a target text set of times which, when executed by a processor, implement the steps of: acquiring a first text list and a second text list corresponding to any event; acquiring a target triple corresponding to the first text list according to each first text; obtaining a key triple corresponding to the second text according to any second text, when any key component in the key triple is a null set, obtaining the similarity corresponding to the second text, when the similarity corresponding to the second text is not less than a preset similarity threshold, determining that the key component is a component corresponding to a target triple, and when the similarity corresponding to the second text is less than the preset similarity threshold, marking the key component as an abnormal symbol; the meaning of the symbol representation in the text can be known, and the occurrence of events can be accurately known through the content of the network text.
Although the present invention has been described with reference to a preferred embodiment, it should be understood that various changes, substitutions and alterations can be made herein without departing from the spirit and scope of the invention as defined by the appended claims.

Claims (7)

1. A data processing system for recognizing symbols, said system comprising: a database, a processor, and a memory storing a computer program, wherein the database comprises: target text set of events a = { a = { a = } 1 ,……,A i ,……,A n },A i The method refers to a target text list corresponding to the ith event, i =1 … … n, n is the number of events, and when the computer program is executed by a processor, the following steps are realized:
s100, obtaining A i Corresponding first text list C i ={C i1 ,……,C ix ,……,C ip },C ix The x first text of the ith target event, x =1 … … p, p is the first text number of the ith target event, and A i Corresponding second text list D i ={D i1 ,……,D iy ,……,D iq },D iy The method includes that the method is the y second text of the ith target event, y =1 … … q, and q is the second text number of the ith target event, wherein the first text and the second text are obtained in the step of S100 through the following steps:
s101, obtaining A from a database i ={A i1 ,……,A ij ,……,A imi },A ij J =1 … … m is the j target text corresponding to the ith event i ,m i The number of target texts corresponding to the ith event is referred to;
s103, pair A ij Performing word segmentation to obtain A ij Corresponding target word character string B ij ={B 1 ij ,……,B r ij ,……,B Sj ij },B r ij Means A ij The corresponding r < th > target word, r =1 … … Sj, sj means A ij The number of corresponding target words;
s105, when B r ij When not a symbol, determining A ij Is a first text;
s107, when B r ij When it is a symbol, determining A ij The second text is the first text;
s200, according to each C ix Obtaining C i Corresponding target triplet C' i ={C' i1 ,C' i2 ,C' i3 Wherein, C' i1 Is referred to as C i First object of (2)Entity, C' i2 Is referred to as C i Of a second target entity of, C' i3 Is C' i1 And C' i2 Wherein, the step S200 further comprises the following steps:
s201, obtaining C ix Corresponding intermediate triplet C' ix ={C 1 ix ,C 2 ix ,C 3 ix In which C is 1 ix Is referred to as C ix First intermediate entity of, C 2 ix Is referred to as C ix A second intermediate entity of, C 3 ix Is referred to as C 1 ix And C 2 ix The intermediate relationship between the two or more of them,
s203 according to all C' ix Obtaining C i Corresponding first data list G 1 i ={C 1 i1 ,……,C 1 ix ,……,C 1 ip }、C i Corresponding second data list G 2 i ={C 2 i1 ,……,C 2 ix ,……,C 2 ip And C i Corresponding third data list G 3 i ={C 3 i1 ,……,C 3 ix ,……,C 3 ip };
S205, according to G 1 i 、G 2 i And G 3 i Obtaining C' i
S300, according to D iy Obtaining D iy Corresponding key triplet H iy ={H 1 iy ,H 2 iy ,H 3 iy },H 1 iy Is referred to as D iy First key entity of (1), H 2 iy Is referred to as D iy Second key entity of (1), H 3 iy Is referred to as H 1 iy And H 2 iy Key relationships between;
s400, when H g iy If null, D is acquired iy Corresponding similarity F iy Wherein H is g iy Is H 1 iy ,H 2 iy And H 3 iy Any one of them;
s500, when F iy When the similarity is more than or equal to a preset similarity threshold value, H is determined g iy =C' ig Wherein, C' ig Is C' i1 ,C' i2 And C' i3 Any one of them;
s600, when F iy If the preset similarity threshold value is less than the preset similarity threshold value, H is set g iy The flag is an abnormal symbol.
2. The data processing system for identification symbols of claim 1, further comprising the step of, in the step S205:
s2051, pair G 1 i Processing to obtain G 1 i Corresponding first designation list Q 1 i= {Q 1 i1 ,……,Q 1 ,……,Q 1 },Q 1 Means G 1 i α =1 … … β, β being G 1 i Corresponding first designated entity quantity, wherein the first designated entity is G 1 i The first intermediate entity after the de-duplication process,
s2053, traverse Q 1 i And Q is 1 i The first designated entity with the maximum number is used as a third designated entity;
s2055, according to the preset entity configuration table, when Q is 1 When the corresponding body is consistent with the body corresponding to the third appointed entity, Q is added 1 Replacing with a third designated entity;
s2057, obtaining the number ratio K corresponding to the third appointed entity 1 i Wherein, K is 1 i The following conditions are met:
K 1 i =K 1 i0 /p,K 1 i0 refers to the total number of third specified entities;
s2059, when K 1 i0 Not less than predetermined fruitWhen the body number is a threshold value, determining that the third designated entity is C' i1
3. Data processing system for identification symbols according to claim 1, characterised in that C' i2 Is obtained from' i1 The acquisition modes are consistent.
4. The data processing system for identification symbols of claim 1, wherein F is iy The following conditions are met:
F iy =F 1 iy ×W 1 +F 2 iy ×W 2 +F 0 iy wherein F is 1 iy And F 2 iy Is indicated at H iy Removing H g iy Other than W 1 Is F 1 iy Corresponding weight value, W 2 Is F 2 iy Corresponding weight value, F 0 iy Is referred to as D iy The target similarity of (1).
5. The data processing system for identification symbols of claim 4 wherein W is 1 =W 2
6. Data processing system for identification symbols according to claim 1, characterised in that C' ig And H g iy The element types in the corresponding triples are consistent.
7. The data processing system for identification symbols of claim 1, wherein said target text is text of an unofficial media.
CN202210856545.7A 2022-07-21 2022-07-21 Data processing system of identification symbol Active CN115169319B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210856545.7A CN115169319B (en) 2022-07-21 2022-07-21 Data processing system of identification symbol

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210856545.7A CN115169319B (en) 2022-07-21 2022-07-21 Data processing system of identification symbol

Publications (2)

Publication Number Publication Date
CN115169319A CN115169319A (en) 2022-10-11
CN115169319B true CN115169319B (en) 2023-02-07

Family

ID=83494694

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210856545.7A Active CN115169319B (en) 2022-07-21 2022-07-21 Data processing system of identification symbol

Country Status (1)

Country Link
CN (1) CN115169319B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116167339B (en) * 2022-12-02 2023-08-15 中科雨辰科技有限公司 Data processing system for acquiring link entity based on entity relationship
CN115964190B (en) * 2022-12-07 2023-07-14 中科雨辰科技有限公司 Data processing system for updating historical event information

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112632274A (en) * 2020-10-29 2021-04-09 中科曙光南京研究院有限公司 Abnormal event classification method and system based on text processing

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9443005B2 (en) * 2012-12-14 2016-09-13 Instaknow.Com, Inc. Systems and methods for natural language processing
US10108600B2 (en) * 2016-09-16 2018-10-23 Entigenlogic Llc System and method of attribute, entity, and action organization of a data corpora
CN114580392B (en) * 2022-04-29 2022-07-29 中科雨辰科技有限公司 Data processing system for identifying entity
CN114579675B (en) * 2022-05-05 2022-07-15 中科雨辰科技有限公司 Data processing system for determining common finger event

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112632274A (en) * 2020-10-29 2021-04-09 中科曙光南京研究院有限公司 Abnormal event classification method and system based on text processing

Also Published As

Publication number Publication date
CN115169319A (en) 2022-10-11

Similar Documents

Publication Publication Date Title
CN115169319B (en) Data processing system of identification symbol
CN108038183B (en) Structured entity recording method, device, server and storage medium
US11036791B2 (en) Computerized system and method for determining non-redundant tags from a user&#39;s network activity
CN107025239B (en) Sensitive word filtering method and device
JP2017224184A (en) Machine learning device
CN109584094B (en) Interpersonal path rapid positioning system, method and medium
CN109918556B (en) Method for identifying depressed mood by integrating social relationship and text features of microblog users
WO2010088052A1 (en) Methods and systems for matching records and normalizing names
CN109492168B (en) Visual tourism interest recommendation information generation method based on tourism photos
US20150254327A1 (en) System and method for rectifying a typographical error in a text file
CN110837568A (en) Entity alignment method and device, electronic equipment and storage medium
CN111090994A (en) Chinese-internet-forum-text-oriented event place attribution province identification method
CN114785505A (en) Data processing system for acquiring abnormal equipment
CN102693258A (en) High-accuracy similarity search system
CN113326363B (en) Searching method and device, prediction model training method and device and electronic equipment
CN108415971B (en) Method and device for recommending supply and demand information by using knowledge graph
CN116846690B (en) IPv6 network space mapping method based on industry classification and probability model
CN116578708A (en) Paper data name disambiguation algorithm based on graph neural network
CN113806565B (en) Data processing system for text labeling
JP2017091436A (en) Feature word selection device
CN113792545B (en) News event activity name extraction method based on deep learning
CN113688257B (en) Author name identity judging method based on large-scale literature data
CN113495964B (en) Triad screening method, device, equipment and readable storage medium
CN104317912B (en) Image meaning automatic marking method based on neighborhood and learning distance metric
CN110096704B (en) Dynamic theme discovery method for short text stream

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant