Skip to main content
Log in

Event Pattern Analysis and Prediction at Sentence Level using Neuro-Fuzzy Model for Crime Event Detection

  • Theoretical Advances
  • Published:
Pattern Analysis and Applications Aims and scope Submit manuscript

Abstract

Classifying the sentences that describe Events is an important task for many applications. In this paper, Event patterns are identified and extracted at sentence level using term features. The terms that trigger Events along with the sentences are extracted from web documents. The sentence structures are analyzed using POS tags. A hierarchal sentence classification model is proposed by considering specific term features of the sentence and the rules are derived. The rules fail to define a clear boundary between the patterns and create ambiguity and impreciseness. To overcome this, suitable fuzzy rules are derived which gives importance to all term features of the sentence. The fuzzy rules are constructed with more variables and generate sixteen patterns. Artificial Neuro-Fuzzy Inference System (ANFIS) model is proposed for training and classifying the sentence patterns for capturing the knowledge present in sentences. The obtained patterns are assigned linguistic grades based on previous classification knowledge. These grades represent the type and quality of information in the patterns. The membership function is used to evaluate the fuzzy rules. The patterns share the membership values between [0–1] which determines the weights for each pattern. Later, higher weighted patterns are considered to build Event Corpus, which helps in retrieving useful and interested information of Event Instances. The performance of the proposed approach classification is evaluated for ‘Crime’ Event by crawling documents from WWW and also evaluated for benchmark dataset for ‘Die’ Event. It is found that the performance of the proposed approach is encouraging when compared with recently proposed similar approaches.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. Allan J, Carbonell J, Doddington G, Yamron J, Yang Y (1998) Topic detection and tracking pilot study: final report. In: Proceedings of the DARPA broadcast news transcription and understanding workshop, pp 194-218

  2. Allan J, Wade C, Bolivar A (2003) Retrieval and novelty detection at the sentence level. In: SIGIR, pp. 314–321

  3. Aone C, Ramos-Santacruz M (2000) REES: a large-scale relation and event extraction system. In: 6th conference on Applied Natural Language Processing. Morgan Kaufmann Publishers Inc, Washington, pp 76–83

  4. Abuleil S (2007) Using NLP techniques for Tagging Events in Arabic Text. In: 19th IEEE International Conference on Tools with AI, IEEE press, pp 440–443

  5. ACE (automatic content extraction) English Annotation Guidelines for events Version 5.4.3 2005.07.01 Linguistic Data Consortium. http://www.ldc.upenn.edu. Accessed Dec 2013

  6. Breiman L, Friedman J, Olshen RA, Charles JS (1985) Classification and regression trees. Wadsworth and Brooks, Monterey

    MATH  Google Scholar 

  7. Creswell C, Beal JM, Chen J, Cornell LT, Nilsson L, Srihari KR (2006) Automatically extracting nominal mentions of events with a bootstrapped probabilistic classifier. In: COLING/ACL 2006 main conference poster sessions, pp 168–175

  8. Cohen KB, Verspoor K, Johnson H, Roeder C, Ogren P, Baumgartner W, White E, Tipney H, Hunter L (2009) High-precision biological event extraction with a concept recognizer. In: BioNLP09 Shared Task Workshop, pp 50–58

  9. David A (2006) Stages of Event extraction. In: COLING/ACL 2006 Workshop on Annotating and Reasoning about Time and events. ACL, pp 1–8

  10. Filatova E, Hatzivassiloglou V (2004) Event-based extractive summarization. In: ACL 2004 Workshop on Summarization, Barcelona, pp 104–111

  11. Grishman R, Sundheim B (1996) Message understanding conference-6: a brief history. In: Computational linguistics

  12. Hristidis V, Valdivia O, Vlachos M, Yu PS (2006) Continuous term search on multiple text streams. In: CIKM, Arlington, pp 802–803

  13. Hung SH, Lin CH, Hong JS (2010) Web mining for event-based commonsense knowledge using lexico-syntactic pattern matching and semantic role labeling, vol 37. J Expert Systems with Applications, Pergamon Press, Inc. Tarrytown, pp 341–347

  14. http://www.iraqbodycount.org/database/. Accessed Dec 2013

  15. Jang JSR (1993) ANFIS: adaptive-network-based fuzzy inference system. IEEE Trans Syst Man Cybernet 23(5/6):665–685

    Article  Google Scholar 

  16. McCracken N, Ozgencil NE, Symonenko S (2006) Combining techniques for event extraction in summary reports. In: AAAI 2006 Workshop Event Extraction and Synthesis, pp 7–11

  17. Makoto M, Rune S, Jjin-Dong K, Junichi T (2010) Event extraction with complex event classification using rich features. J Bioinform Comput Biol 8(1):131–146

    Article  Google Scholar 

  18. Naughton M, Stokes N, Carthy J (2010) Sentence-level event classification in unstructured texts. Inf Retr Springer 13:132–156

    Article  Google Scholar 

  19. Xu F, Uszkoreit H, Li H (2006) Automatic event and relation detection with seeds of varying complexity. In: AAAI 2006 Workshop Event Extraction and Synthesis, Boston, pp 491–498

  20. Yang Y, Pierce T, Carbonell J (1998) A study on retrospective and on-line event detection. In: SIGIR, pp 28–36

  21. Yang Y, Zhang J, Carbonell J, Jin C (2002) Topic-conditioned novelty detection. In: SIGKDD, pp 688–693

  22. Zhao Q, Bhowmick SS, Sun A (2006) i Wed: an integrated multigraph cut-based approach for detecting Events from a website. In: 10th Pacific-Asia conference on Advances in Knowledge Discovery and Data Mining, Springer-Verlag Berlin, Heidelberg, pp 351–360

  23. Zhao Q, Liu TY, Bhowmick SS, Ma, W.-Y (2006) Event detection from evolution of click-through data. In: 12th ACM SIGKDD international conference on Knowledge discovery and data mining, ACM New York, NY, pp 484–493

  24. Zhou W, Liu Z, Kong Q (2008) A survey of Event-based knowledge processing. J. Chinese J Comput Sci 33(2):160–162 (in Chinese)

    Google Scholar 

  25. http://www.trutv.com/library/crime/. Accessed Dec 2013

  26. He X, Chu WC, Yang H, Yang SJH (1999) “A New Approach to Verify Rule-Based Systems Using Petri Nets”. In: IEEE proceeding of 23th Annual International Computer Software and Applications Conference (COMPSAC’ 99), pp 462–467

Download references

Acknowledgments

The work done is supported by research Grant from MHRD, Govt. of India, under the Grant NITT/Dean-ID/SCSP-TSP/RP/02 dated 11-02-2014 and Indo-US 21st century knowledge initiative programme under Grant F.No/94-5/2013(IC) dated 19-08-2013. The authors acknowledge Guymon Hall, Lecturer, Department of Computer Science, University of Nevada, Las Vegas, USA for proof reading the manuscript.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to A. Vadivel.

Appendix- I

Appendix- I

1.1 Verification of proposed Fuzzy Rules using Fuzzy Petri Nets (FPN)

In general, anomalies in the rules are referred to as verification errors. They are inconsistency, incompleteness, redundancy, etc., and should be identified and removed for the error free rules. Inconsistency in rules generates conflict results, say, the rules R1: p1\(\wedge\) p2 → p3, R2: p3\(\wedge\) p4 → p5, R3: p1\(\wedge\) p2\(\wedge\) p4 → ¬p5 are said to be inconsistent. Incompleteness in rules is generated by missing rules. For example, R1: p1\(\wedge\) p2 → p3 is said to be incomplete if p1 is a fact and p2 is neither a fact nor a conclusion of other rule. Consider rules R1: p1\(\wedge\) p2 → p3, R2: p2\(\wedge\) p1 → p3 and these rules are redundant, since, they refer unnecessary rules in a rule base. Similarly, rules are said to be subsumed when two rules have identical conclusions. Consider the rules R1: p1\(\wedge\) p2 → p3, R2: p2 → p3 where the antecedents of one rule is subset of the antecedents of another. Finally, if the rules have circular dependency say, R1: p1 → p2, R2: p2 → p3, R3: p3 → p1, it is said to be circular rule.

Based on the above discussion, it is imperative that the rule base constructed for any application domain should be validated for having a perfect rule set. In this section, we have used Fuzzy Petri Nets (FPN) for verifying the proposed sentence classification model (SCM). The FPN is a combination of Petri Nets and rule-based knowledge representation. Discussing and explaining FPN is out of scope of this paper and interested reader can refer related research materials [26]. The FPN for the proposed SCM is introduced within a 5-tuple consisting of the input property set (IPS), internal property set (InPS), output property set (OPS), and rule set (RS). Question 1 (Q1) to Question 13 (Q13) represent Input Properties such as term feature(s, et, ct (I) , and ct (NI) ) and POS features (verb, noun, adjective, and adverb) for the Internal Properties “NQASS”, “SQASS”, “QASS”, “HQASS” patterns, respectively.

  1. i)

    The Input Properties

The Input Properties are gathered within 13 questions and represented as Q1 to Q13 below:

Q1: is s is verb?

Q8: is ct (I) is adverb?

Q2: is s is non-verb?

Q9: is ct (I) is not adverb?

Q3: is et is noun?

Q10: is ct (NI) is adjective?

Q4: is et is adjective/verb?

Q11: is ct (NI) is not adjective?

Q5: is et is adjective?

Q12: is ct (NI) is adverb?

Q6: is ct (I) is adjective?

Q13: is ct (NI) is not adverb?

Q7: is ct (I) is not adjective?

 

Though complete Input Properties set for all 16 rules of Subjective and Objective classes are given, for want of space and clarity, we consider the rules for the patterns of Subjective Active class (ASS) alone in further discussion and, however, can be extended for other class also.

  1. ii)

    The Internal Properties

The Internal Properties of the SCM are derived using various Input Properties as shown below:

  1. 1.

    The Input Properties Q1, Q4, Q9, and Q13 form an Internal Property called “NQASS” pattern.

  2. 2.

    The Input Properties Q1, Q4, Q9, and Q12 form an Internal Property called “SQASS” pattern.

  3. 3.

    The Input Properties Q1, Q4, Q8, and Q13 form an Internal Property called “QASS” pattern.

  4. 4.

    The Input Properties Q1, Q4, Q8, and Q12 form an Internal Property called “HQASS” pattern.

Below, Input and Internal Properties are deduced and presented in two levels:

1) Level 1:

If Q1 && Q4 && Q9 && Q13 exist then “NQASS” pattern

If Q1 && Q4 && Q9 && Q12 exist then “SQASS” pattern

If Q1 && Q4 && Q8 && Q13 exist then “QASS” pattern

If Q1 && Q4 && Q8 && Q12 exist then “HQASS” pattern

2) Level 2:

If “NQASS” && “SQASS” && “QASS” && “HQASS” patterns exist then sentence set belongs to “ASS” sub-class. Patterns are substituted with membership values. The sample rule base for the proposed SCM is presented below in the structured format:

SCM = (Classification, IPS, InPS, OPS, RS)

SCM.IPS = {Q1, Q2, Q3, Q4, Q5, Q6, Q7, Q8, Q9, Q10, Q11, Q12, Q13}

SCM.InPS = {NQASS, SQASS, QASS, HQASS,}

SCM.OPS = {ASS}

SCM.RS = {R1, R2, R3, R4, R5}

SCM.RS.R1 = {Rule1, P1\(\wedge\) P3\(\wedge\) P9\(\wedge\) P13, P14, 0.25}

SCM.RS.R2 = {Rule2, P1\(\wedge\) P3\(\wedge\) P9\(\wedge\) P12, P15, 0.50}

SCM.RS.R3 = {Rule3, P1\(\wedge\) P3\(\wedge\) P8\(\wedge\) P13, P16, 0.75}

SCM.RS.R4 = {Rule4, P1\(\wedge\) P3\(\wedge\) P8\(\wedge\) P12, P17, 1}

SCM.RS.R5 = {Rule5, P14\(\vee\) P15\(\vee\) P16\(\vee\) P17, P18}

1.1.1 Verification process

For verifying the rule base, it is mapped to an FPN as shown in Fig. 11. A reachability graph is generated using the ω-Net concept algorithm presented in [26]. The verification parameters, such as incompleteness, inconsistency, circularity, and redundancy, are verified using the analysis presented in [26].

Fig. 11
figure 11

Fuzzy petri net representation of the sentence classification model

Based on the obtained FPN, the reachability graph is presented in Fig. 12 and the following conclusions are drawn:

Fig. 12
figure 12

Reachability graph

  1. 1.

    All the places (P) and transitions (T) exist, so there are no incompleteness errors.

  2. 2.

    P14, P15, P16, and P17 are different states of one property, so no inconsistency.

  3. 3.

    There is no loop in the reachability graph, and thus there is no circularity.

  4. 4.

    Finally, there is no redundancy; since, there are no transitions underlined.

It is observed that the fuzzy rules proposed in this paper (Table 6a, b) are verified using FPN for identifying anomalies in the rule base. The reachability graph obtained using well-known algorithm found that there are no anomalies in the rule base.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Vadivel, A., Shaila, S.G. Event Pattern Analysis and Prediction at Sentence Level using Neuro-Fuzzy Model for Crime Event Detection. Pattern Anal Applic 19, 679–698 (2016). https://doi.org/10.1007/s10044-014-0421-7

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10044-014-0421-7

Keywords

Navigation