{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:30:49Z","timestamp":1750221049260,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,10,22]],"date-time":"2018-10-22T00:00:00Z","timestamp":1540166400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,10,22]]},"DOI":"10.1145\/3207677.3278062","type":"proceedings-article","created":{"date-parts":[[2018,10,18]],"date-time":"2018-10-18T14:19:29Z","timestamp":1539872369000},"page":"1-7","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Text Analysis of Cases Description in Urban Management Field Based on Knowledge Atlas"],"prefix":"10.1145","author":[{"given":"Xutong","family":"Liu","sequence":"first","affiliation":[{"name":"School of Computer Science and Technology, Donghua University, China"}]},{"given":"Hui","family":"Song","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Donghua University, China"}]},{"given":"Longqi","family":"Dai","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Donghua University, China"}]},{"given":"Bo","family":"Xu","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Donghua University, China"}]}],"member":"320","published-online":{"date-parts":[[2018,10,22]]},"reference":[{"issue":"18","key":"e_1_3_2_1_1_1","first-page":"115","article-title":"Short text feature generation and selection methods for urban management cases and their applications","volume":"53","author":"Wei Wen","year":"2017","journal-title":"Computer Engineering and Applications"},{"key":"e_1_3_2_1_2_1","unstructured":"Wei Wenyan Lv Xin and Gao Yan. Application of text mining technology in case analysis of public security. Journal of Hunan Police Academy 29(3) 98--104.  Wei Wenyan Lv Xin and Gao Yan. Application of text mining technology in case analysis of public security. Journal of Hunan Police Academy 29(3) 98--104."},{"key":"e_1_3_2_1_3_1","unstructured":"Shi Qian Kun. 2013. Research on text topic mining and text static visualization based on LDA model. Guangxi University.  Shi Qian Kun. 2013. Research on text topic mining and text static visualization based on LDA model. Guangxi University."},{"issue":"4","key":"e_1_3_2_1_4_1","first-page":"589","article-title":"Overview of knowledge mapping technology","volume":"45","author":"Xu Zenglin","year":"2016","journal-title":"Journal of University of Electronic Science and technology of China"},{"key":"e_1_3_2_1_5_1","unstructured":"Lacquer Guilin Gao Huan and Wu Tian Xing. 2017. Progress in knowledge mapping research. Intelligence engineering 3(1) 4--25.  Lacquer Guilin Gao Huan and Wu Tian Xing. 2017. Progress in knowledge mapping research. Intelligence engineering 3(1) 4--25."},{"volume-title":"International Conference on Web Information Systems Engineering (pp. 73--82)","year":"2002","author":"Bun K K","key":"e_1_3_2_1_6_1"},{"issue":"6","key":"e_1_3_2_1_7_1","first-page":"874","article-title":"A Chinese text topic extraction method based on word frequency","volume":"40","author":"Yinghua Ma","year":"2003","journal-title":"Computer Research and Development"},{"key":"e_1_3_2_1_8_1","article-title":"Clustering and topic extraction of mass short text based on frequent itemsets","author":"Min Peng","year":"2015","journal-title":"Journal of Computer Research &amp; Development."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"Zhu Y Li L and Luo L. 2013. Learning to Classify Short Text with Topic Model and External Knowledge. Knowledge Science Engineering and Management. Springer Berlin Heidelberg.  Zhu Y Li L and Luo L. 2013. Learning to Classify Short Text with Topic Model and External Knowledge. Knowledge Science Engineering and Management. Springer Berlin Heidelberg.","DOI":"10.1007\/978-3-642-39787-5_41"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1277741.1277909"},{"key":"e_1_3_2_1_11_1","article-title":"Phrase subject extraction based on synonyms and hownet","author":"Zeng C.","year":"2015","journal-title":"Journal of Xiamen University."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"Graves A Fern\u00e1ndez S and Schmidhuber J. 2005. Bidirectional LSTM Networks for Improved Phoneme Classification and Recognition. Artificial Neural Networks: Formal Models and Their Applications - ICANN 2005. Springer Berlin Heidelberg.   Graves A Fern\u00e1ndez S and Schmidhuber J. 2005. Bidirectional LSTM Networks for Improved Phoneme Classification and Recognition. Artificial Neural Networks: Formal Models and Their Applications - ICANN 2005. Springer Berlin Heidelberg.","DOI":"10.1007\/11550907_126"},{"issue":"2","key":"e_1_3_2_1_14_1","first-page":"282","article-title":"Conditional Random Fields: Probabilistic Models for Segmenting and Labeling Sequence Data","volume":"3","author":"Lafferty J D","year":"2001","journal-title":"Proceedings of Icml"},{"key":"e_1_3_2_1_15_1","unstructured":"Huang Z Xu W and Yu K. 2015. Bidirectional LSTM-CRF Models for Sequence Tagging. Computer Science.  Huang Z Xu W and Yu K. 2015. Bidirectional LSTM-CRF Models for Sequence Tagging. Computer Science."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"Xu B Xu Y and Liang J et al. 2017. CN-DBpedia: A Never-Ending Chinese Knowledge Extraction System. From Theory to Practice. 428--438.  Xu B Xu Y and Liang J et al. 2017. CN-DBpedia: A Never-Ending Chinese Knowledge Extraction System. From Theory to Practice. 428--438.","DOI":"10.1007\/978-3-319-60045-1_44"},{"key":"e_1_3_2_1_17_1","unstructured":"http:\/\/pan.baidu.com\/s\/1boPm2x5  http:\/\/pan.baidu.com\/s\/1boPm2x5"},{"key":"e_1_3_2_1_18_1","first-page":"249","article-title":"Understanding the difficulty of training deep feedforward neural networks","volume":"9","author":"Glorot X","year":"2010","journal-title":"Journal of Machine Learning Research"}],"event":{"name":"CSAE '18: The 2nd International Conference on Computer Science and Application Engineering","acronym":"CSAE '18","location":"Hohhot China"},"container-title":["Proceedings of the 2nd International Conference on Computer Science and Application Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3207677.3278062","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3207677.3278062","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:44:12Z","timestamp":1750207452000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3207677.3278062"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10,22]]},"references-count":18,"alternative-id":["10.1145\/3207677.3278062","10.1145\/3207677"],"URL":"https:\/\/doi.org\/10.1145\/3207677.3278062","relation":{},"subject":[],"published":{"date-parts":[[2018,10,22]]},"assertion":[{"value":"2018-10-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}