[1]张建华,翁鸣,李晓乐,等. 基于依存句法和二叉树模型的评价对象抽取[J].计算机技术与发展,2016,26(02):52-55.
 ZHANG Jian-hua,WENG Ming,LI Xiao-le,et al. Extraction of Evaluation Object Based on Dependency Parsing and Binary Tree[J].,2016,26(02):52-55.
点击复制

 基于依存句法和二叉树模型的评价对象抽取()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
26
期数:
2016年02期
页码:
52-55
栏目:
智能、算法、系统工程
出版日期:
2016-02-10

文章信息/Info

Title:
 Extraction of Evaluation Object Based on Dependency Parsing and Binary Tree
文章编号:
1673-629X(2016)02-0052-04
作者:
 张建华翁鸣李晓乐刘芳
 广西财经学院 实验教学中心
Author(s):
 ZHANG Jian-huaWENG MingLI Xiao-leLIU Fang
关键词:
 依存句法分析评价对象 二叉树
Keywords:
 dependency parsingevaluation objectbinary tree
分类号:
TP393.4;TP391.1
文献标志码:
A
摘要:
 识别出评论中的评价对象有利于商家了解用户关心的产品特征,为进一步设计和升级产品提供决策。根据词之间的相互依赖关系,提出一种基于依存句法分析和二叉树模型的评价对象识别方法。首先通过依存关系分析,得到句法结构语句;然后采用二叉树模型,将名词和名词词组出现频率高的句法结构构造成二叉树;最后采用二叉树遍历算法对树库中的每一棵二叉树进行遍历,将所得的字符串进行组合,最终得到具有完整意义的评价对象。实验结果表明,该方法在两类测试集上都取得了一定的效果。
Abstract:
 It’s beneficial for finding productions’ feature that users care,by identifying the evaluation objects in comments,which pro-vides decision basis for improving productions’ equality. According to the interdependence between words,an evaluation object identif-ying method based on dependency parsing and binary tree was proposed. By dependency relation analyzing,grammar relations sentences are found. Then construct binary trees with noun and noun phrases based on the binary tree model. Finally,traverse all binary trees,output relative strings,and combined the outputting strings,get evaluation objects with complete meaning. Experimental results show that this method has good effects in two specific test sets.

相似文献/References:

[1]张志宏,吴庆波,邵立松,等.基于飞腾平台TOE协议栈的设计与实现[J].计算机技术与发展,2014,24(07):1.
 ZHANG Zhi-hong,WU Qing-bo,SHAO Li-song,et al. Design and Implementation of TCP/IP Offload Engine Protocol Stack Based on FT Platform[J].,2014,24(02):1.
[2]梁文快,李毅. 改进的基因表达算法对航班优化排序问题研究[J].计算机技术与发展,2014,24(07):5.
 LIANG Wen-kuai,LI Yi. Research on Optimization of Flight Scheduling Problem Based on Improved Gene Expression Algorithm[J].,2014,24(02):5.
[3]黄静,王枫,谢志新,等. EAST文档管理系统的设计与实现[J].计算机技术与发展,2014,24(07):13.
 HUANG Jing,WANG Feng,XIE Zhi-xin,et al. Design and Implementation of EAST Document Management System[J].,2014,24(02):13.
[4]侯善江[],张代远[][][]. 基于样条权函数神经网络P2P流量识别方法[J].计算机技术与发展,2014,24(07):21.
 HOU Shan-jiang[],ZHANG Dai-yuan[][][]. P2P Traffic Identification Based on Spline Weight Function Neural Network[J].,2014,24(02):21.
[5]李璨,耿国华,李康,等. 一种基于三维模型的文物碎片线图生成方法[J].计算机技术与发展,2014,24(07):25.
 LI Can,GENG Guo-hua,LI Kang,et al. A Method of Obtaining Cultural Debris’ s Line Chart Based on Three-dimensional Model[J].,2014,24(02):25.
[6]翁鹤,皮德常. 混沌RBF神经网络异常检测算法[J].计算机技术与发展,2014,24(07):29.
 WENG He,PI De-chang. Chaotic RBF Neural Network Anomaly Detection Algorithm[J].,2014,24(02):29.
[7]刘茜[],荆晓远[],李文倩[],等. 基于流形学习的正交稀疏保留投影[J].计算机技术与发展,2014,24(07):34.
 LIU Qian[],JING Xiao-yuan[,LI Wen-qian[],et al. Orthogonal Sparsity Preserving Projections Based on Manifold Learning[J].,2014,24(02):34.
[8]尚福华,李想,巩淼. 基于模糊框架-产生式知识表示及推理研究[J].计算机技术与发展,2014,24(07):38.
 SHANG Fu-hua,LI Xiang,GONG Miao. Research on Knowledge Representation and Inference Based on Fuzzy Framework-production[J].,2014,24(02):38.
[9]叶偲,李良福,肖樟树. 一种去除运动目标重影的图像镶嵌方法研究[J].计算机技术与发展,2014,24(07):43.
 YE Si,LI Liang-fu,XIAO Zhang-shu. Research of an Image Mosaic Method for Removing Ghost of Moving Targets[J].,2014,24(02):43.
[10]余松平[][],蔡志平[],吴建进[],等. GSM-R信令监测选择录音系统设计与实现[J].计算机技术与发展,2014,24(07):47.
 YU Song-ping[][],CAI Zhi-ping[] WU Jian-jin[],GU Feng-zhi[]. Design and Implementation of an Optional Voice Recording System Based on GSM-R Signaling Monitoring[J].,2014,24(02):47.

更新日期/Last Update: 2016-04-15