{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T09:27:46Z","timestamp":1730280466584,"version":"3.28.0"},"reference-count":24,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,6,22]],"date-time":"2022-06-22T00:00:00Z","timestamp":1655856000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,6,22]],"date-time":"2022-06-22T00:00:00Z","timestamp":1655856000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,6,22]]},"DOI":"10.1109\/jcsse54890.2022.9836294","type":"proceedings-article","created":{"date-parts":[[2022,7,28]],"date-time":"2022-07-28T19:47:39Z","timestamp":1659037659000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["Event Detection and Analysis in Thai News Using Bi-LSTM"],"prefix":"10.1109","author":[{"given":"Kallaya","family":"Songklang","sequence":"first","affiliation":[{"name":"King Mongkut&#x0027;s University of Technology North Bangkok,Faculty of Applied Science,Department of Computer and Information Science,Bangkok,Thailand,10800"}]},{"given":"Wilaiporn","family":"Lee","sequence":"additional","affiliation":[{"name":"King Mongkut&#x0027;s University of Technology North Bangkok,Faculty of Applied Science,Department of Computer and Information Science,Bangkok,Thailand,10800"}]},{"given":"Akara","family":"Prayote","sequence":"additional","affiliation":[{"name":"King Mongkut&#x0027;s University of Technology North Bangkok,Faculty of Applied Science,Department of Computer and Information Science,Bangkok,Thailand,10800"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2013.133"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P18-4009"},{"key":"ref12","first-page":"73","article-title":"Joint event extraction via structured prediction with global features","volume":"1","author":"li","year":"0","journal-title":"Proceedings of the 51st Annual Meeting of the Association for Computational Linguistics"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/SNLP.2009.5340924"},{"key":"ref14","article-title":"Terrorism event classification using fuzzy inference systems","author":"inyaem","year":"2010","journal-title":"Arxiv Prepr"},{"journal-title":"Linguistic Data Consortium (LDC)","article-title":"Ace (automatic content extraction) English annotation guidelines for events","year":"2005","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.5281\/ZENODO.3519354"},{"key":"ref17","first-page":"993","article-title":"Latent dirichlet allocation","volume":"3","author":"blei","year":"2003","journal-title":"J Mach Learn Res"},{"key":"ref18","article-title":"Distributed representations of words and phrases and their compositionality","volume":"26","author":"mikolov","year":"2013","journal-title":"Adv Neural Inf Process Syst"},{"key":"ref19","article-title":"Efficient estimation of word representations in vector space","author":"mikolov","year":"2013","journal-title":"Arxiv Prepr"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.3115\/1629235.1629236"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.emnlp-main.49"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.3115\/1620853.1620910"},{"key":"ref5","first-page":"529","article-title":"Joint modeling for chinese event extraction with rich linguistic features","author":"chen","year":"0","journal-title":"Proceedings of COLING 2012"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/N16-1034"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-50496-4_23"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/P15-1017"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2956831"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2018\/584"},{"journal-title":"Pre-trained word vectors of 30+ languages","year":"2022","author":"park","key":"ref20"},{"key":"ref22","article-title":"Activation functions: Comparison of trends in practice and research for deep learning","author":"nwankpa","year":"2018","journal-title":"Arxiv Prepr"},{"key":"ref21","article-title":"Understanding LSTM Networks &#x2014; colah's blog","author":"olah","year":"2015","journal-title":"Understanding LSTM Networks"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-99501-4_20"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01012-6_20"}],"event":{"name":"2022 19th International Joint Conference on Computer Science and Software Engineering (JCSSE)","start":{"date-parts":[[2022,6,22]]},"location":"Bangkok, Thailand","end":{"date-parts":[[2022,6,25]]}},"container-title":["2022 19th International Joint Conference on Computer Science and Software Engineering (JCSSE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9836023\/9836237\/09836294.pdf?arnumber=9836294","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,15]],"date-time":"2022-08-15T20:03:40Z","timestamp":1660593820000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9836294\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,22]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/jcsse54890.2022.9836294","relation":{},"subject":[],"published":{"date-parts":[[2022,6,22]]}}}