Computer Science ›› 2024, Vol. 51 ›› Issue (11A): 240300148-6.doi: 10.11896/jsjkx.240300148

• Intelligent Computing • Previous Articles     Next Articles

Study on Named Entity Recognition of NOTAM Based on BiLSTM-CRF

XIANG Heng, YANG Mingyou, LI Meng   

  1. College of Air Traffic Management,Civil Aviation University of China,Tianjin 300300,China
  • Online:2024-11-16 Published:2024-11-13
  • About author:XIANG Heng,born in 1975,master,associate professor.His main research interests include air traffic control human factors and aeronautical information management.
  • Supported by:
    National Natural Science Foundation of China(U1833103).

Abstract: Aiming at the problem that the current research of International Civil Aviation Organization in digital NOTAMs,which only considers the compatibility with the environment of textual NOTAMs,but not digital NOTAMs,a named entity recognition model for NOTAMs based on BiLSTM-CRF is proposed to realise the automatic recognition of relevant entities in textual NOTAMs and to provide the necessary basic data for the conversion of digital NOTAMs.Comparative experiments are carried out by constructing a NOTAM corpus tagged dataset in three models,LSTM,BiLSTM and BiLSTM-CRF,and the experimental results show that the precision,recall and F1 value of the proposed method is 95%,95% and 95%,respectively,which verifies the effectiveness of the proposed method in the field of NOTAMs and proves that this study can effectively obtain the important entity information in NOTAMs.

Key words: NOTAM, Name entity recognition, Deep learning, BiLSTM, CRF

CLC Number: 

  • V355
[1]CAAC.Specification for the Preparation and Issuance of CivilAviation NOTAMS [Z].2011:30P.;A4.
[2]EUROCONTROL.Digital NOTAM Specification[EB/OL].[2024-03-15].https://ext.eurocontrol.int/aixm_confluence/display/DNOTAM/Digital+NOTAM+Specification.
[3]GUO X Y,HE T T.Survey about Research on Information Extraction [J].Computer Science,2015,42(2):14-17,38.
[4]GAO X,WANG S,ZHU J W,et al.Overview of Named Entity Recognition Tasks [J].Computer Science,2023,50(S1):26-33.
[5]RABINER L R.A tutorial on hidden Markov models and selec-ted applications in speech recognition [J].Proc IEEE,1989,77.
[6]PIETRA S D,PIETRA V D,MERCER R L,et al.Adaptive language modeling using minimum discriminant estimation[C]//IEEE International Conference on Acoustics.IEEE,1992:633-636.
[7]LAFFERTY J,MCCALLUM A,PEREIRA F C N.Conditional Random Fields:Probabilistic Models for Segmenting and Labeling Sequence Data[C]//Proceedings of the 18th International Conference on Machine Learning(ICML 2001).2001:282-289.
[8]CHEN P H,LIN C J,SCHLKOPF B.A Tutorial on v-support vector machines [J].Applied Stochastic Models in Business and Industry,2005,21(2):111-136.
[9]BIKEL D M,SCHWARTZ R,WEISCHEDEL R M.An Algorithm that Learns What's in a Name [J].Machine Learning,1999,34:211-231.
[10]BORTHWICK A,STERLING J,AGICHTEIN E,et al.Description of the MENE named entity system as used in MUC-7[C]//Proceedings of the 7th Message Understanding Conference,Virginia.Stroudsburg:ACL,1998:1-7.
[11]MCCALLUM A,LI W.Early Results for Named Entity Recognition with Conditional Random Fields,Feature Induction and Web-Enhanced Lexicons [J].Association for Computational Linguistics,2003,4:188-191.
[12]TAKEUCHI K,COLLIER N.Use of Support vector machinesin extended named entity recognition[C]//Proceedings of the 6th Conference on Natural Language Learning,Taipei,China,Aug 24-Sep 1,2002.Stroudsburg:ACL,2002:184-190.
[13]COLLOBERT R,WESTON J,BOTTOU L,et al.Natural Language Processing(almost) from Scratch [J].Journal of Machine Learning Research,2011,12(1):2493-2537.
[14]HUANG Z,XU W,YU K.Bidirectional LSTM-CRF Models forSequence Tagging [J].arXiv:1508.01991,2015.
[15]CETOLI A,BRAGAGLIA S,O'HARNEY A D,et al.Graph convolutional networks for named entity recognition[C]//Proceedings of the 16th International Workshop on Treebanks and Linguistic Theories.Stroudsburg:ACL,2018:37-45.
[16]DEVLIN J,CHANG M W,LEE K,et al.BERT:Pre-training of Deep Bidirectional Transformers for Language Understanding [C]//Proceedings of the 2019 Conference of the North American Chapter of the Association for Computational Linguistics:Human Language Technologies,Volume 1(Long and Short Papers).2019:4171-4186.
[17]GUO Z X,DENG X L.Intelligent Identification Method of LegalCase Entity Based on BERT-BiLSTM-CRF [J].Journal of Beijing University of Posts and Telecommunications,2021,44(4):129-134.
[18]LIU H,ZHANG Z X,WANG Y F.A Review on Main Optimization Methods of BERT [J].Data Analysis and Knowledge Discovery,2021,5(1):3-15.
[19]LI H F,ZENG C,HU H Q,etal.Research on Text Classification of NOTAM Based on Machine Learning [J].Journal of Ci-vil Aviation,2022,6(4):6-9.
[20]XIANG H,ZHANG C,LI M.Identification method for non-normative NOTAM based on NLP [J].Journal of Civil Aviation University of China,2022,40(2):14-18.
[21]PAN Z X,LUO Y H,LI RZ.Research on Extraction of Notam Information [J].Modern Computer,2022,28(2):82-87.
[1] DU Yu, YU Zishu, PENG Xiaohui, XU Zhiwei. Padding Load:Load Reducing Cluster Resource Waste and Deep Learning Training Costs [J]. Computer Science, 2024, 51(9): 71-79.
[2] XU Jinlong, GUI Zhonghua, LI Jia'nan, LI Yingying, HAN Lin. FP8 Quantization and Inference Memory Optimization Based on MLIR [J]. Computer Science, 2024, 51(9): 112-120.
[3] CHEN Siyu, MA Hailong, ZHANG Jianhui. Encrypted Traffic Classification of CNN and BiGRU Based on Self-attention [J]. Computer Science, 2024, 51(8): 396-402.
[4] SUN Yumo, LI Xinhang, ZHAO Wenjie, ZHU Li, LIANG Ya’nan. Driving Towards Intelligent Future:The Application of Deep Learning in Rail Transit Innovation [J]. Computer Science, 2024, 51(8): 1-10.
[5] KONG Lingchao, LIU Guozhu. Review of Outlier Detection Algorithms [J]. Computer Science, 2024, 51(8): 20-33.
[6] TANG Ruiqi, XIAO Ting, CHI Ziqiu, WANG Zhe. Few-shot Image Classification Based on Pseudo-label Dependence Enhancement and NoiseInterferenceReduction [J]. Computer Science, 2024, 51(8): 152-159.
[7] XIAO Xiao, BAI Zhengyao, LI Zekai, LIU Xuheng, DU Jiajin. Parallel Multi-scale with Attention Mechanism for Point Cloud Upsampling [J]. Computer Science, 2024, 51(8): 183-191.
[8] ZHANG Junsan, CHENG Ming, SHEN Xiuxuan, LIU Yuxue, WANG Leiquan. Diversified Label Matrix Based Medical Image Report Generation [J]. Computer Science, 2024, 51(8): 200-208.
[9] GUO Fangyuan, JI Genlin. Video Anomaly Detection Method Based on Dual Discriminators and Pseudo Video Generation [J]. Computer Science, 2024, 51(8): 217-223.
[10] GAN Run, WEI Xianglin, WANG Chao, WANG Bin, WANG Min, FAN Jianhua. Backdoor Attack Method in Autoencoder End-to-End Communication System [J]. Computer Science, 2024, 51(7): 413-421.
[11] LI Jiaying, LIANG Yudong, LI Shaoji, ZHANG Kunpeng, ZHANG Chao. Study on Algorithm of Depth Image Super-resolution Guided by High-frequency Information ofColor Images [J]. Computer Science, 2024, 51(7): 197-205.
[12] SHI Dianxi, GAO Yunqi, SONG Linna, LIU Zhe, ZHOU Chenlei, CHEN Ying. Deep-Init:Non Joint Initialization Method for Visual Inertial Odometry Based on Deep Learning [J]. Computer Science, 2024, 51(7): 327-336.
[13] FAN Yi, HU Tao, YI Peng. Host Anomaly Detection Framework Based on Multifaceted Information Fusion of SemanticFeatures for System Calls [J]. Computer Science, 2024, 51(7): 380-388.
[14] YANG Heng, LIU Qinrang, FAN Wang, PEI Xue, WEI Shuai, WANG Xuan. Study on Deep Learning Automatic Scheduling Optimization Based on Feature Importance [J]. Computer Science, 2024, 51(7): 22-28.
[15] LIANG Fang, XU Xuyao, ZHAO Kailong, ZHAO Xuanfeng, ZHANG Guijun. Remote Template Detection Algorithm and Its Application in Protein Structure Prediction [J]. Computer Science, 2024, 51(6A): 230600225-7.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!