Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A Named Entity Recognition Method and Device Based on Composable Weak Authenticator

A named entity recognition and entity recognition technology, applied in neural learning methods, instruments, biological neural network models, etc., can solve problems such as large differences in entity boundaries, failure, and strong subjective consciousness, so as to enrich training samples and increase robustness. Effect

Active Publication Date: 2022-05-17
SHANDONG UNIV
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the prior art, when any one of the above two links makes a mistake, the final named entity recognition error will be caused: the current named entity recognition method usually regards the above two processes as one (traditional named entity recognition methods usually use the named entity Recognition is regarded as a sequence labeling task, using a deep network combined with a conditional random field for entity labeling, that is, combining entity boundary recognition and entity type recognition into one task), or processing one of the processes separately, resulting in the learning process, I do not know which one Links lead to the failure of the final entity recognition
[0004] The naming of entities can be freely defined according to the needs in different fields without strict constraints, strong subjective consciousness, and large differences in the boundaries of entities, making named entity recognition more difficult
Fields that require entity recognition lack a large number of labeled named entity recognition data sets, which seriously affects the effect of supervised learning methods. Therefore, how to use the limited entity labeling data in the field to learn more effectively is the key to achieving good results in named entity recognition. The essential

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Named Entity Recognition Method and Device Based on Composable Weak Authenticator
  • A Named Entity Recognition Method and Device Based on Composable Weak Authenticator
  • A Named Entity Recognition Method and Device Based on Composable Weak Authenticator

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0128] An algorithm framework for named entity recognition based on a composable weak authenticator, including: an entity recognition part and a result authentication part;

[0129] The entity recognition part is used to complete the recognition task and obtain the recognition result;

[0130] The result authentication part includes two or more weak authenticators, which are respectively used to verify and authenticate the recognition results on the subdivision targets corresponding to each weak authenticator.

[0131] The algorithm architecture also includes an information input layer to be identified, an entity identification layer, a data conversion layer and a weak authenticator output layer;

[0132] The information input layer to be identified performs feature extraction: this layer includes a feature extraction module; the text input to be identified and the entity description input are processed by the feature extraction module as the first input information of the ent...

Embodiment 2

[0145] According to the algorithm architecture of named entity recognition based on combinable weak authenticators described in Embodiment 1, the architecture also includes a training information flow, and the training information flow specifically includes: a pre-training information flow and a joint training information flow;

[0146] Among them, the pre-training information flow includes the entity recognition module pre-training information flow, the boundary weak authenticator pre-training information flow and the type weak authenticator pre-training information flow;

[0147] Pre-training information flow of the entity recognition module: the feature extraction module in the input layer of the information to be recognized and the entity recognition module in the entity recognition layer participate in the training, and the weak authenticator layer closes the input and output interfaces; the training data is the original training marked corpus;

[0148] Boundary weak authe...

Embodiment 3

[0152] As described in Embodiment 1, based on the algorithm architecture of the named entity recognition of the combinable weak authenticator, the entity recognition module includes multiple sets of neural network series and activation functions of the neural network. Preferably, each set of neural networks can have an extraction sequence The network structure of feature capabilities, such as Bi-LSTM neural network (Bidirectional Long Short-Term Memory, Bidirectional Long Short-Term Memory), Bi-GRU neural network (Bidirectional Gate Recurrent Unit, bidirectional gated recurrent unit) or deep convolutional neural network, etc.

[0153] Preferably, the feature extraction module is loaded with a pre-trained language model based on the self-attention mechanism; preferably, the BERT algorithm is loaded.

[0154] A neural network (such as Bi-LSTM neural network, Bi-GRU neural network or deep convolutional neural network, etc.) and a neural network activation function (such as sigmoid...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An algorithm framework for named entity recognition based on a combinable weak authenticator, including: an entity recognition part and a result authentication part; the entity recognition part is used to complete the recognition task and obtain a recognition result; the result authentication part includes two and The above weak authenticators are respectively used to verify and authenticate the recognition results on the subdivision targets corresponding to each weak authenticator. The weak authenticator described in the present invention is a module capable of independently accomplishing a subdivision goal, and the required training data can be automatically generated on the existing task corpus. The weak authenticator and entity recognition parts form an end-to-end network for optimized learning using supervised methods. The invention uses a combinable weak authenticator to assist the process of named entity recognition, effectively improves the accuracy of entity recognition, and can be easily and quickly adapted and expanded in a specific field entity recognition scene.

Description

technical field [0001] The invention relates to a named entity recognition method and device based on a combinable weak authenticator, and belongs to the technical field of named entity recognition. Background technique [0002] Named entity recognition refers to the process of locating entity boundaries in text and classifying entities based on a predefined set of entity types. Named entity recognition results provide support for many downstream tasks such as knowledge graph construction, relation extraction, and information retrieval. Early named entity recognition mainly recognized simple entities such as names of people, places, and organizations. With the continuous expansion of the application field of named entity recognition, the types of entities have gradually increased, and there are some domain-specific entities in special fields. Type, such as the drug name in the biomedical field, etc. [0003] Named entity recognition can be subdivided into at least two proc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F40/295G06N3/04G06N3/08G06F40/30
CPCG06F40/295G06N3/049G06N3/08G06F40/30G06N3/044G06N3/045
Inventor 孙宇清吴佳琪刘天元
Owner SHANDONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products