Twenty-five years of information extraction

2019 ◽  
Vol 25 (06) ◽  
pp. 677-692
Author(s):  
Ralph Grishman

AbstractInformation extraction is the process of converting unstructured text into a structured data base containing selected information from the text. It is an essential step in making the information content of the text usable for further processing. In this paper, we describe how information extraction has changed over the past 25 years, moving from hand-coded rules to neural networks, with a few stops on the way. We connect these changes to research advances in NLP and to the evaluations organized by the US Government.

Author(s):  
Peter Dauvergne

This chapter adds to the book’s understanding of the shifting nature and great challenges confronting environmentalism, especially more radical strands. A glance at the history of Greenpeace reveals sharp differences as the organization was forming in the 1970s; even today the activism of Paul Watson, who left Greenpeace to spearhead the Sea Shepherd Conservation Society, draws the ire of Greenpeace leaders. Since the war on terrorism took root after September 11, 2001, radical activists such as Watson have been increasingly marginalized, with the US government even declaring him an “eco-terrorist.” As this chapter notes, though, many environmentalists who challenge state and business interests face even greater threats, with hundreds murdered over the past two decades. State security agencies are not the only group sidelining radical environmentalists, however; so are business associations, media outlets, and mainstream environmental NGOs.


2019 ◽  
Vol 16 (156) ◽  
pp. 20190010 ◽  
Author(s):  
Xiaoyan Lu ◽  
Jianxi Gao ◽  
Boleslaw K. Szymanski

The polarization of political opinions among members of the US legislative chambers measured by their voting records is greater today than it was 30 years ago. Previous research efforts to find causes of such increase have suggested diverse contributors, like growth of online media, echo chamber effects, media biases or disinformation propagation. Yet, we lack theoretic tools to understand, quantify and predict the emergence of high political polarization among voters and their legislators. Here, we analyse millions of roll-call votes cast in the US Congress over the past six decades. Our analysis reveals the critical change of polarization patterns that started at the end of 1980s. In earlier decades, polarization within each Congress tended to decrease with time. By contrast, in recent decades, the polarization has been likely to grow within each term. To shed light on the reasons for this change, we introduce here a formal model for competitive dynamics to quantify the evolution of polarization patterns in the legislative branch of the US government. Our model represents dynamics of polarization, enabling us to successfully predict the direction of polarization changes in 28 out of 30 US Congresses elected in the past six decades. From the evolution of polarization level as measured by the Rice index, our model extracts a hidden parameter–polarization utility which determines the convergence point of the polarization evolution. The increase in the polarization utility implied by the model strongly correlates with two current trends: growing polarization of voters and increasing influence of election campaign donors. Two largest peaks of the model’s polarization utility correlate with significant political or legislative changes happening at the same time.


Information ◽  
2019 ◽  
Vol 10 (11) ◽  
pp. 332 ◽  
Author(s):  
Kenneth Thibodeau

This paper presents Constructed Past Theory, an epistemological theory about how we come to know things that happened or existed in the past. The theory is expounded both in text and in a formal model comprising UML class diagrams. The ideas presented here have been developed in a half century of experience as a practitioner in the management of information and automated systems in the US government and as a researcher in several collaborations, notably the four international and multidisciplinary InterPARES projects. This work is part of a broader initiative, providing a conceptual framework for reformulating the concepts and theories of archival science in order to enable a new discipline whose assertions are empirically and, wherever possible, quantitatively testable. The new discipline, called archival engineering, is intended to provide an appropriate, coherent foundation for the development of systems and applications for managing, preserving and providing access to digital information, development which is necessitated by the exponential growth and explosive diversification of data recorded in digital form and the use of digital data in an ever increasing variety of domains. Both the text and model are an initial exposition of the theory that both requires and invites further development.


2020 ◽  
Vol 4 (1) ◽  
pp. 1-20
Author(s):  
John Parsons

Narratives of security and threat are continually used to justify morally contentious activities. In the past three years, the United States’ government has increasingly promoted narratives of “criminal migrants” and “immigrant invasions.” In response to perceived threats, the US-Mexico border has undergone a process of militarization. During this time, various border militias have continued to operate along the southern US border. My research was conducted over 11 months with two militias operating on the US-Mexico border I have labeled Border Watch. This militia provides a snippet of how morality is operationalized in the legitimization of actions and how morality is intrinsically linked to security in the lived experiences of its volunteers. In this article, I argue that the volunteers make sense of their experiences away from the border through the narrative espoused by the US government. The resonance between experience and narrative defines the latter as truth and the ability to dismiss counter-narratives. For the volunteers of Border Watch who adhere to a notion of citizenship through the lens of the citizen-soldier ideal, the narrative delivers a moral imperative to act in defense of the nation. Within the nexus of danger, security, and morality, the volunteers of Border Watch conceptualize their project as one in which moral citizens protect the nation and its citizens from an evil Other.


2021 ◽  
Vol 8 (1) ◽  
pp. 421-429
Author(s):  
Yan Puspitarani

Information extraction is part of natural language processing, aiming to find, retrieve, or process information. The data source for information extraction is text. Text cannot be separated from people's daily lives. Through text, a lot of confidential information can be obtained. To produce information, the unstructured text will be converted into structured data. There are many approaches that researchers take to this process. Most of the studies are in English. Therefore, this paper will present current research trends, challenges, and information extraction opportunities using Indonesian.


Author(s):  
Mark J. Rozell ◽  
Clyde Wilcox

The US government is the oldest continuing operating federal system, in part because of its relatively high degree of stability and respect for the rule of law. But does that make the US system a model for other nation-states to emulate? “Federalism in the world” compares and contrasts the federal systems of six countries—Switzerland, Canada, Brazil, Australia, India, and Nigeria—to better recognize the strengths and weaknesses of the US system. The idiosyncratic elements of each nation’s federalism are a function of the social, economic, and political forces that contest politics; the nature of the ethnic, linguistic, political, and other cleavages; and decisions made by leaders in the past.


2020 ◽  
Vol 29 (01) ◽  
pp. 208-220 ◽  
Author(s):  
Udo Hahn ◽  
Michel Oleynik

Objectives: We survey recent developments in medical Information Extraction (IE) as reported in the literature from the past three years. Our focus is on the fundamental methodological paradigm shift from standard Machine Learning (ML) techniques to Deep Neural Networks (DNNs). We describe applications of this new paradigm concentrating on two basic IE tasks, named entity recognition and relation extraction, for two selected semantic classes—diseases and drugs (or medications)—and relations between them. Methods: For the time period from 2017 to early 2020, we searched for relevant publications from three major scientific communities: medicine and medical informatics, natural language processing, as well as neural networks and artificial intelligence. Results: In the past decade, the field of Natural Language Processing (NLP) has undergone a profound methodological shift from symbolic to distributed representations based on the paradigm of Deep Learning (DL). Meanwhile, this trend is, although with some delay, also reflected in the medical NLP community. In the reporting period, overwhelming experimental evidence has been gathered, as illustrated in this survey for medical IE, that DL-based approaches outperform non-DL ones by often large margins. Still, small-sized and access-limited corpora create intrinsic problems for data-greedy DL as do special linguistic phenomena of medical sublanguages that have to be overcome by adaptive learning strategies. Conclusions: The paradigm shift from (feature-engineered) ML to DNNs changes the fundamental methodological rules of the game for medical NLP. This change is by no means restricted to medical IE but should also deeply influence other areas of medical informatics, either NLP- or non-NLP-based.


2013 ◽  
Vol 11 (2) ◽  
pp. 529-531
Author(s):  
Jennifer Clapp

History holds important insights for political scientists concerned with contemporary international development issues. Michael E. Latham and Nick Cullather's recent historical accounts of US foreign policy toward developing countries provide excellent examples of the significance of understanding the past in order to interpret the present. Both books highlight the ways in which strategic concerns of the US government during the Cold War shaped its international aid policies.


2019 ◽  
Vol 13 (1) ◽  
pp. 237
Author(s):  
Feng Guo ◽  
Fen Zhou

China committed to initiate the accession to Government Procurement Agreement when it entered the WTO as a compromise to the requirements made by GPA parties, mostly the developed western countries such as the United States. China started its official attempt to join the GPA on December 28, 2007 by submitting the first offer to the GPA Commission. Six revised offer were then submitted during the past years. The position of the United States and China in international trade changed dramatically since then. This article finds that Trump Administration’s attitude toward China’s accession to GPA is mixed and the US government might impede China’s accession with the analysis on the current American foreign trade policy and the latest development in government procurement in the US’s related international agreements and domestic laws. However, this accession process can only be delayed but not terminated even if the standpoint of the US is proved to be negative due to the theoretical and technical analysis on GPA. Effective and significant measures will be taken by Chinese government since the president Xi Jinping made the statement to accelerate the accession to GPA in Boao Forum in early 2018.


Sign in / Sign up

Export Citation Format

Share Document