157,272 Hits in 5.3 sec


Sakshi .
2018 International Journal of Advanced Research in Computer Science  
This paper provides a survey of various methods and techniques which are being used in the extraction of proper nouns appeared in the document.  ...  Named Entity Recognition (NER) is the part of Information Extraction which is used to extract important information from the code-mixed and informal data and then classifies these extracting named entities  ...  ME model is used for the better extraction of named entities. Once the one-level NER system is developed then a set of rules is added to detect the nested named entities.  ... 
doi:10.26483/ijarcs.v9i3.6093 fatcat:dul72z4x3rgmngtsmy4vjourny

Entities filtering technique for information extraction in engineering drawing files

M.F.M. Amran, R. Sulaiman, R.M.T.R.L. Ahmad, N.M.M. Yusop, N.A.A. Jamaludin, H. Mohamed
2018 Journal of Fundamental and Applied Sciences  
Ten engineering drawings files was used for testing, showing that the entities filtering technique is able to extract all the entit  ...  This research presents the entities filtering technique for information extraction in engineering dr filtered the entities based on four attributes which are layer, color, entity type and line type.  ...  Table 1 shows the comparison for line entity, whereas Table 3 shows comparison for the text entity. The result for each engineering drawing based on the two technique used have been recorded.  ... 
doi:10.4314/jfas.v9i3s.17 fatcat:kzpr4krxlfhjpfoqsrnb4jy72y

Entity Extraction from the Web with WebKnox [chapter]

David Urbansky, Marius Feldmann, James A. Thom, Alexander Schill
2010 Advances in Soft Computing  
The main contributions of this paper are a new entity retrieval approach, a comparison of different extraction techniques and a more precise entity extraction algorithm.  ...  This paper describes a system for entity extraction from the web. The system uses three different extraction techniques which are tightly coupled with mechanisms for retrieving entity rich web pages.  ...  Figure 4 shows a comparison of 12 queries for the three extraction techniques.  ... 
doi:10.1007/978-3-642-10687-3_20 fatcat:dc3wulqbkffabbhhsxwmlugfdm

Developing a hybrid dictionary-based bio-entity recognition technique

Min Song, Hwanjo Yu, Wook-Shin Han
2015 BMC Medical Informatics and Decision Making  
Bio-entity extraction is a pivotal component for information extraction from biomedical literature.  ...  The dictionary-based bio-entity extraction is the first generation of Named Entity Recognition (NER) techniques.  ...  To this end, we propose a new entity extraction technique comprised of several different techniques.  ... 
doi:10.1186/1472-6947-15-s1-s9 pmid:26043907 pmcid:PMC4460617 fatcat:23l3qeel65fc7ldqsyh2fkatca

PKDE4J: Entity and relation extraction for public knowledge discovery

Min Song, Won Chul Kim, Dahee Lee, Go Eun Heo, Keun Young Kang
2015 Journal of Biomedical Informatics  
Due to an enormous number of scientific publications that cannot be handled manually, there is a rising interest in text-mining techniques for automated information extraction, especially in the biomedical  ...  Most previous studies have primarily focused on the design and performance improvement of either named entity recognition or relation extraction.  ...  We would like to express our sincere thanks to the reviewers for their insightful comments on our paper.  ... 
doi:10.1016/j.jbi.2015.08.008 pmid:26277115 fatcat:sfgmji7zu5efbbo6xyarry7h4e

An Overview of Ontology Learning Process from Arabic Text

Mariam Muhammed, Nesrine Azim, Mervat Gheith
2020 The Egyptian Journal of Language Engineering  
Second, we make a research comparison based on the techniques used and their results. Third, we pointed out the limitations and comments of research works on Arabic Ontology Learning.  ...  The success of the Semantic Web depends on the quality of its ontologies. There is a lot of research work interested in Ontology Learning for Arabic texts.  ...  The researches that used a rule-based approach play an important role in the process of named entities extraction.  ... 
doi:10.21608/ejle.2020.19841.1000 fatcat:s3fe6obmnjdixlr4zqvhtcepsu

A framework for named entity recognition of clinical data

Ravikumar J, Ramakanth Kumar P
2020 Indonesian Journal of Electrical Engineering and Computer Science  
This data is a major asset for getting data from gathering of gigantic measures of surgical information by forcing a few questions and watchwords.  ...  name and symptoms.  ...  RELATED WORK Named entity extraction is a type of information retrieval which focuses on identifying instances i.e., names of various types of entities.  ... 
doi:10.11591/ijeecs.v18.i2.pp946-952 fatcat:pbifpjmfxjfbnoamiauvwpd4qu

A Hybrid Method of Linguistic Features and Clustering Approach for Identifying Biomedical Named Entities

E. Alharbi, S. Tiun
2015 Asian Journal of Applied Sciences  
The process of extracting such names called Named Entity Recognition (NER).  ...  Many approaches have been proposed in terms of extracting chemical compounds however, most of these approaches depend on a supervised learning techniques where the class label is predefined.  ...  Therefore, selecting an appropriate approach for extracting named entities differs between different domains which can also be a challenging issue.  ... 
doi:10.3923/ajaps.2015.210.216 fatcat:3cxngu6sc5fujix27hu6dbksxm

A noise tolerant and schema-agnostic blocking technique for entity resolution

Tiago Brasileiro Araújo, Carlos Eduardo Santos Pires, Demetrio Gomes Mestre, Thiago Pereira da Nóbrega, Dimas Cassimiro do Nascimento, Kostas Stefanidis
2019 Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing - SAC '19  
The increasing use of Web systems has become a valuable source of semi-structured data.  ...  To address these challenges, we propose the NA-BLOCKER technique, which is capable of tolerating noisy data to extract information regarding the data schema and generate high-quality blocks.  ...  For instance, to generate the attribute signatures of entity e 1 , in Figure 1 , the attribute values ⟨a name , Jon Snow⟩ and ⟨a house , Stark⟩ are converted into the signatures ⟨a name , [4, 9, 4, 6]  ... 
doi:10.1145/3297280.3299730 dblp:conf/sac/AraujoPMNNS19 fatcat:c3hxvzc25bannfjlwvyy7ovup4

Towards better entity resolution techniques for Web document collections

Surender Reddy Yerva, Zoltan Miklos, Karl Aberer
2010 2010 IEEE 26th International Conference on Data Engineering Workshops (ICDEW 2010)  
These similarity functions capture some aspects of the similarities between Web-pages, where the names occur, thus they perform very differently for the different names.  ...  This entity identification problem is one of the most challenging issues in realizing the Semantic Web or entity-oriented search.  ...  ACKNOWLEDGEMENTS This work is partially supported by the by the FP7 EU Large-scale Integrating Project OKKAM -Enabling a Web of Entities (contract no. ICT-215032).  ... 
doi:10.1109/icdew.2010.5452698 dblp:conf/icde/YervaMA10 fatcat:q7jc4xuv5fay3mjsvxsazmnk7i

Arabic Named Entity Recognition Using Artificial Neural Network

2012 Journal of Computer Science  
Conclusion: These results prove that our technique is capable to recognize named entities of Arabic texts.  ...  The motivation is due to the lack of resources for Arabic named entities and to enhance the accuracy that has been reached in previous NERA systems.  ...  There is scarcity of resources for Arabic named entities and a lack of accuracy in previous NERA systems.  ... 
doi:10.3844/jcssp.2012.1285.1293 fatcat:shsmlkp7qbg5tlvk7mj7v7ffnm

Web Scale Competitor Discovery Using Mutual Information [chapter]

Rui Li, Shenghua Bao, Jin Wang, Yuanjie Liu, Yong Yu
2006 Lecture Notes in Computer Science  
The proposed techniques first extract a set of candidates of the input entity, and then rank them according to the comparability, and finally find and organize the reviews related to both original entity  ...  A company owner wants to know who is the competitor, and a customer also wants to know which company provides similar product or service to what he/she is in want of.  ...  In this paper, we propose a set of effective techniques to perform the task of extracting entity's competitors on the Web.  ... 
doi:10.1007/11811305_87 fatcat:p77qkdd6nrdvhlob45wmrzx42e

A Proof-of-Concept for Orthographic Named Entity Correction in Spanish Voice Queries [chapter]

Julián Moreno Schneider, José Luis Martínez Fernández, Paloma Martínez
2014 Lecture Notes in Computer Science  
The problem considered in this paper is the misrecognition of named entities in Spanish voice queries introducing a proof-of-concept for named entity correction that provides alter-native entities to the  ...  The system finds the most suitable alternative entity from a dictionary previ-ously generated with the existing named entities.  ...  This work has been partially supported by the Regional Government of Madrid under the Research Network MA2VICMR (S2009/TIC-1542) and by the Spanish Center for Industry Technological Development (CDTI,  ... 
doi:10.1007/978-3-319-12093-5_10 fatcat:lzs5n7xswzc7vdqa5dqvaatwci

KGen: a knowledge graph generator from biomedical scientific literature

Anderson Rossanez, Julio Cesar dos Reis, Ricardo da Silva Torres, Hélène de Ribaupierre
2020 BMC Medical Informatics and Decision Making  
Our solution explores natural language processing techniques with the aim of extracting and representing scientific literature knowledge encoded in KGs.  ...  For example, Alzheimer's Disease, a life-threatening degenerative disease that is not yet curable.  ...  The first sub-step is the recognition of named entities in the given sentences, using a NER technique.  ... 
doi:10.1186/s12911-020-01341-5 pmid:33317512 fatcat:gkn23t5lp5eqpnrjoioiqtxrom

A Multi-Classifier Based Prediction Model for Phishing Emails Detection Using Topic Modelling, Named Entity Recognition and Image Processing

C. Emilin Shyni, S. Sarju, S. Swamynathan
2016 Circuits and Systems  
In this paper, we propose a new technique, namely, "A Prediction Model for the Detection of Phishing e-mails using Topic Modelling, Named Entity Recognition and Image Processing".  ...  The features extracted are Topic Modelling features, Named Entity features and Structural features. A multi-classifier prediction model is used to detect the phishing mails.  ...  The output from the CRF Named Entity Labeller is used for extracting the Named Entity, which is the first set of features used for phishing detection.  ... 
doi:10.4236/cs.2016.79217 fatcat:6uo27mgqfvggxaquz525m73uqe
« Previous Showing results 1 — 15 out of 157,272 results