{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,18]],"date-time":"2025-01-18T20:10:20Z","timestamp":1737231020789,"version":"3.33.0"},"reference-count":16,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2007,3,21]],"date-time":"2007-03-21T00:00:00Z","timestamp":1174435200000},"content-version":"vor","delay-in-days":4462,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Systems &amp;amp; Computers in Japan"],"published-print":{"date-parts":[[1995,1]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>In ordinary written Japanese, words are not separated by spaces. Therefore morphological analysis involves segmenting and tagging sentences. Since each sentence has a huge number of possible tagged segmentations, various criteria have been proposed for making plausible decisions. However, there are still no unified frameworks that incorporate various heuristics, and there has been no comparative evaluation of commonly used heuristics. This paper presents a clear framework to describe various heuristics, and an N\u2010best algorithm for extracting optimal solutions. The time complexity of this algorithm is<jats:italic>O<\/jats:italic>(<jats:italic>nN<\/jats:italic>log<jats:sub>2<\/jats:sub>(1 +<jats:italic>N<\/jats:italic>)), where<jats:italic>n<\/jats:italic>is the sentence length. The advantage of the N\u2010best algorithm over the standard beam search algorithm is also discussed. This paper also presents a comparative evaluation of three major heuristics, and proposes a precise and portable rule\u2010based heuristic. Estimation was done using the aforementioned algorithm and six criteria. The newly proposed heuristic is based upon the Extended Least Bunsetsu (Phrase) Number method.<\/jats:p>","DOI":"10.1002\/scj.4690260107","type":"journal-article","created":{"date-parts":[[2007,7,8]],"date-time":"2007-07-08T03:19:06Z","timestamp":1183864746000},"page":"73-87","source":"Crossref","is-referenced-by-count":0,"title":["A generalized algorithm for Japanese morphological analysis and a comparative evaluation of some heuristics"],"prefix":"10.1002","volume":"26","author":[{"given":"Toru","family":"Hisamitsu","sequence":"first","affiliation":[]},{"given":"Yoshihiko","family":"Nitta","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2007,3,21]]},"reference":[{"issue":"3","key":"e_1_2_1_2_2","first-page":"596","article-title":"A multistage disambiguation method for nonsegmented Kana to Kanji translation","volume":"76","author":"Abe M.","year":"1993","journal-title":"Trans. I.E.I.C.E.(D\u2010II)"},{"volume-title":"Seisen\u2010Rika I","year":"1981","author":"Chikazumi S.","key":"e_1_2_1_3_2"},{"volume-title":"Computer and Intractability, A Guide to the Theory of NP\u2010Completeness","year":"1979","author":"Garey M. R.","key":"e_1_2_1_4_2"},{"issue":"5","key":"e_1_2_1_5_2","first-page":"664","article-title":"A method of detecting and correcting errors in the results of Japanese OCR","volume":"33","author":"Ito N.","year":"1992","journal-title":"Trans. IPSJ"},{"issue":"4","key":"e_1_2_1_6_2","first-page":"337","article-title":"Automatic segmentation for transformation of Kana into Kanji","volume":"20","author":"Makino H.","year":"1979","journal-title":"Trans. IPSJ"},{"key":"e_1_2_1_7_2","unstructured":"E.Matsunobu T.HitakaandS.Yoshida.Syntactic analysis by stochastic Bunsetsu grammar IPSJ Technical Report 56 No. 3 pp.1\u20138(1986)."},{"issue":"9","key":"e_1_2_1_8_2","first-page":"1944","article-title":"A Japanese word formation model and its evaluation","volume":"34","author":"Nagai H.","year":"1993","journal-title":"Trans. IPSJ"},{"issue":"6","key":"e_1_2_1_9_2","first-page":"514","article-title":"Data\u2010structure of a large Japanese dictionary and morphological analysis by using it","volume":"19","author":"Nagao M.","year":"1978","journal-title":"Trans. IPSJ"},{"key":"e_1_2_1_10_2","unstructured":"J.Nakamura K.ImanagaandS.Yoshida.Evaluation of minimum\u2010connective\u2010cost\u2010method for Japanese morphological analysis IEICE Technical Report NLC91\u20101 pp.1\u20138(1991)."},{"key":"e_1_2_1_11_2","doi-asserted-by":"crossref","unstructured":"Y.SagisakaandH.Sato.Word Identification Method for Japanese Text\u2010to\u2010Speech Conversion System Proc. of ICASSP 86 Tokyo pp.2411\u20132414(1986).","DOI":"10.1109\/ICASSP.1986.1169262"},{"key":"e_1_2_1_12_2","unstructured":"Y.Sakamoto.Nihongo Keitaiso Kaiseki no Kihon Sekkei IPSJ Technical Report 38 No. 3 pp.1\u20136(1983)."},{"issue":"4","key":"e_1_2_1_13_2","first-page":"457","article-title":"A method for detecting errors in Japanese sentences using minimum cost path search","volume":"33","author":"Shimomura H.","year":"1992","journal-title":"Trans. IPSJ"},{"issue":"9","key":"e_1_2_1_14_2","first-page":"952","article-title":"Automatic decomposition of Kanji compound words using stochastic estimation","volume":"28","author":"Takeda K.","year":"1987","journal-title":"Trans. IPSJ"},{"key":"e_1_2_1_15_2","unstructured":"Y.Tsutsumi.Zenbun Kana Kanji Henkan Houshiki no Gijutsu Nikkei Computer 1985.11.25 pp.131\u2013139(1985)."},{"issue":"1","key":"e_1_2_1_16_2","first-page":"40","article-title":"Morphological analysis of non\u2010marked\u2010off Japanese sentences by the Least BUNSETSU'S Number Method","volume":"24","author":"Yoshimura K.","year":"1983","journal-title":"Trans. IPSJ"},{"issue":"3","key":"e_1_2_1_17_2","first-page":"294","article-title":"Morphological analysis of Japanese sentences containing unknown words","volume":"30","author":"Yoshimura K.","year":"1989","journal-title":"Trans. IPSJ"}],"container-title":["Systems and Computers in Japan"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fscj.4690260107","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/scj.4690260107","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,18]],"date-time":"2025-01-18T19:36:54Z","timestamp":1737229014000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/scj.4690260107"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1995,1]]},"references-count":16,"journal-issue":{"issue":"1","published-print":{"date-parts":[[1995,1]]}},"alternative-id":["10.1002\/scj.4690260107"],"URL":"https:\/\/doi.org\/10.1002\/scj.4690260107","archive":["Portico"],"relation":{},"ISSN":["0882-1666","1520-684X"],"issn-type":[{"type":"print","value":"0882-1666"},{"type":"electronic","value":"1520-684X"}],"subject":[],"published":{"date-parts":[[1995,1]]}}}