Improving term candidates selection using terminological tokens

نویسندگان

چکیده

Abstract The identification of reliable terms from domain-specific corpora using computational methods is a task that has to be validated manually by specialists, which highly time-consuming activity. To reduce this effort and improve term candidate selection, we implemented the Token Slot Recognition method, filtering method based on terminological tokens used rank extracted candidates corpora. This paper presents implementation developed in linguistic statistical approaches applied for automatic extraction several different languages. We observed outperforms selection ranking higher number at top list than raw frequency, improvement between 15% 25% both precision recall. Our analyses further revealed reduction specialists. In conclusion, automatically been reduced significantly so can easily quickly

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Improving Term Extraction with Terminological Resources

Studies of different term extractors on a corpus of the biomedical domain revealed decreasing performances when applied to highly technical texts. Facing the difficulty or impossibility to customize existing tools, we developed a tunable term extractor. It exploits linguistic-based rules in combination with the reuse of existing terminologies, i.e. exogenous disambiguation. Experiments reported...

متن کامل

Tuning the Selection of Correction Candidates for Garbled Tokens using Error Dictionaries

In previous work, we introduced a method for efficiently selecting from a background dictionary suitable correction candidates for an malformed token of a given input text. In order to select small and meaningful candidate sets, refinements of the Levenshtein distance with restricted sets of substitutions, merges and splits were used. In these experiments, the subset of possible substitutions, ...

متن کامل

Secure Computation Using Leaky Tokens

Leakage-proof hardware tokens have been used to achieve a large number of cryptographic tasks recently. But in real life, due to various physical attacks, it is extremely difficult to construct hardware devices that are guaranteed to be leakage-proof. In this paper, we study the feasibility of general two-party computation using leaky hardware tokens. Our main result is a completeness theorem t...

متن کامل

Improving Human Gait Recognition Using Feature Selection

Human gait, a biometric aimed to recognize individuals by the way they walk has recently come to play an increasingly important role in visual surveillance applications. Most of the existing approaches in this area, however, have mostly been evaluated without explicitly considering the most relevant gait features, which might have compromised the performance. In this paper, we have investigated...

متن کامل

Improving the Selection of Pixel Candidates in Differential Sar Interferometry by a Polarimetric Optimization

This paper presents a general method for using the polarimetric information provided by new satellite sensors in order to improve the performance of PSI methods. Satellite PSI is widely used to obtain accurate maps of the Earth’s surface deformation along time, selecting for processing only those points that are considered as a priori reliable under certain quality criterion, generally known as...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Terminology

سال: 2022

ISSN: ['0929-9971', '1569-9994']

DOI: https://doi.org/10.1075/term.00016.vaz