skip to main content
10.1145/3650215.3650223acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicmlcaConference Proceedingsconference-collections
research-article

Research on the knowledge embedding vector method based on TF-IDF and Auto-Encoder

Published:16 April 2024Publication History

ABSTRACT

At present, most enterprises and organizations attach great importance to the establishment of knowledge base in order to condense and summarize their core competitiveness, so as to inherit knowledge. However, at present, most of the knowledge base is a document library, and the structured information in the knowledge base is very lacking. Based on this, this paper proposes a knowledge embedding vector technology, which combines keyword extraction and text self-coding technology, so as to abstract and represent knowledge semantically in embedded vector space, and achieve the purpose of enriching structured information in knowledge base. Moreover, the knowledge embedding vector technology proposed in this paper can provide theoretical basis for the upper application of knowledge base, such as knowledge graph construction, knowledge search, knowledge recommendation and application.

References

  1. Ling Tian; Xue Zhou; Yan-Ping Wu; Wang-Tao Zhou; Jin-Hao Zhang; Tian-Shu Zhang. Knowledge Graph and Knowledge Reasoning: A Systematic Review [J]. Journal of Electronic Science and Technology, 2022, (02).Google ScholarGoogle Scholar
  2. Rafail Promikyridis [1]; Efthimios Tambouris [1].Using Knowledge Graphs to provide public service information [C].dg.o: Digital Government Research.dg.o 2022: DG.O 2022: The 23rd Annual International Conference on Digital Government Research: Association for Computing Machinery, 2022: 252–259.Google ScholarGoogle Scholar
  3. Paulus, A; Burgdorf, A; Stephan, A; Pomp, A; Meisen, T. Using Node Embeddings to Generate Recommendations for Semantic Model Creation [C]. 2022: 10.Google ScholarGoogle Scholar
  4. Liang Xiao, 1 Nianmin Yao2. Research on Chinese classification based on TF-IDF [C]. Society of Photo-Optical Instrumentation Engineers Proceedings (SPIE Proceedings), 2021.Google ScholarGoogle Scholar
  5. Fang Du [1]; Jiangshe Zhang [1]; Nannan Ji [2]; Junying Hu [1]; Chunxia Zhang [1].Discriminative Representation Learning with Supervised Auto-encoder[J]. Neural Processing Letters, 2019, 49 (2): 507-520.Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Li, Yingying (1); Shen, Bo (1). Research on sentiment analysis of microblogging based on LSA and TF-IDF[C]. 2018, 2018-January.Google ScholarGoogle Scholar
  7. Wendland, André [1]; Zenere, Marco [2]; Niemann, Jörg [3].Introduction to Text Classification: Impact of Stemming and Comparing TF-IDF and Count Vectorization as Feature Extraction Technique [C]. 2021, 1442.Google ScholarGoogle Scholar
  8. KENNETH WARD CHURCH.Word2Vec [J]. Natural Language Engineering, 2017, 23 (01): 155-162.Google ScholarGoogle ScholarCross RefCross Ref
  9. Yushang Mao [1]; Guixuan Zhang [2]; Shuwu Zhang [3].Word Semantic Similarity Based on CiLin and Word2vec [C]. 2020 International Conference on Culture-oriented Science & Technology (ICCST). Culture-oriented Science & Technology (ICCST), International Conference on: 2020.Google ScholarGoogle Scholar
  10. Si-si Zhang [1]; Jian-wei Liu [1]; Xin Zuo [1]; Run-kun Lu [1]; Si-ming Lian [1].Online deep learning based on auto-encoder [J]. Applied Intelligence, 2021, 51 (8): 5420-5439.Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Research on the knowledge embedding vector method based on TF-IDF and Auto-Encoder

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      ICMLCA '23: Proceedings of the 2023 4th International Conference on Machine Learning and Computer Application
      October 2023
      1065 pages
      ISBN:9798400709449
      DOI:10.1145/3650215

      Copyright © 2023 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 16 April 2024

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited
    • Article Metrics

      • Downloads (Last 12 months)1
      • Downloads (Last 6 weeks)1

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format .

    View HTML Format