Unsupervised Dependency Parsing, a New PCFG

Total Page:16

File Type:pdf, Size:1020Kb

Unsupervised Dependency Parsing, a New PCFG Unsupervised Dependency Parsing, a new PCFG Marie Arcadias, Guillaume Cleuziou, Edmond Lassalle, Christel Vrain LIFO, Universite´ d’Orleans´ Orange Labs, Lannion Rapport no RR-2014-03 Unsupervised Dependency Parsing, a new PCFG Marie Arcadias Guillaume Cleuziou Edmond Lassalle Christel Vrain Orange Labs / 2 avenue Marzin LIFO / Universite´ d’Orleans´ 22300 Lannion, FRANCE Rue Leonard´ de Vinci [email protected] 45067 Orleans´ cedex 2, FRANCE [email protected] Abstract pendency model is an interesting compromise be- tween the full syntactic analysis and a representa- Dependency learning aims at building a tion as a “bag-of-words”. model that allows transforming textual A large amount of manually annotated ex- sentences into trees representing a syn- amples are necessary for supervised dependency tactical hierarchy between the words of learning. It is a very long and tedious task, and it the sentence. We present an intermediate requires deep linguistic knowledge. Furthermore, model between full syntactic parsing of a it has to be done anew for each kind of text to an- sentence and bags of words. It is based alyze. This explains why the amount of annotated on a very light probabilistic context free text is poor compared to the abundance of different grammar, allowing to express dependen- types of text available on the web. In this paper, cies between the words of a sentence. Our we suggest an unsupervised approach demanding model can be tuned a little depending on only a shallow knowledge on the language and on the language. Experimentally, we were the type of the text. The framework is therefore able to surpass the scores of the DMV Unsupervised Dependency Learning (UDL). reference on attested benchmarks for five over ten languages, such as English, Por- tuguese or Japanese. We give the first re- MD/could_3 sults on French corpora. Learning is very fast and parsing is almost instantaneous. NN/Rice_2 RB/hardly_4 VB/believe_5 PU/._8 1 Introduction and state of the art NN/Cathryn_1 NN/eyes_7 The dependency structure (DS) of a sentence PRP/her_6 shows a syntactic hierarchy between the words, al- lowing then to infer semantic information. Among other applications, dependency structures are used in language modeling (Chelba et al., 1997), tex- Figure 1: Dependency Tree given by the treebank tual entailment (Haghighi et al., 2005), question for the sentence “Cathryn Rice could hardly be- answering (Wang et al., 2007), information ex- lieve her eyes”. traction (Culotta and Sorensen, 2004), lexical on- tology induction (Snow et al., 2004) and machine The Penn Treebank, an American tagged corpus translation (Quirk et al., 2005). of newspaper articles, offers a dependency ver- The DS of a sentence (cf. Figure 1) is a tree, sion, giving the DS of each sentence. Klein and the nodes of which are labelled by the words of Manning (2004) were the first to obtain significant the sentence. One of the words is defined as the results in UDL. They got better scores, on sen- root of the tree (most of the time, the main verb). tences of under 10 words, than the basic attach- Then subtrees, covering contiguous parts of the ment of each word to its next right neighbor. They sentences, are attached to the root. In other words, called their model Dependency Model of Valence a dependency tree is made of directed relations (DMV). between a syntactically strong word (called head) Sentences are coded as sequences of parts-of- and a weaker word (called dependent). The de- speech (POS) tags and are used as inputs for the learning and the parsing algorithms. DMV is a dencies between the words of a sentence. For ex- generative model based on the valence of the POS, ample, in the sentence “Cathryn Rice could hardly i.e. their ability to generate children (i.e. depen- believe her eyes.”, “could” is a dominant to which dents), their number and type of POS. The root of “Rice” is attached to the left, and “hardly”, “be- the sentence is first probabilistically chosen. Then, lieve” and the full stop are attached to the right. this root generates recursively its children among The dependency tree is represented in Figure 1. the other words of the sentence, and the subtree of Our model classifies each word (represented by its each child is built, depending on their POS and POS tag) as a dominant or a dominated item be- relative position (left or right). The estimation side its neighbors. Then, to parse a sentence, the of probabilities includes the type of preferred de- model combines, thanks to intermediate symbols, pendencies (verb over noun rather than noun over the groups of words until each word finds a posi- verb for example). Starting with initial probabil- tion in the dependency tree, as we can see in figure ities tuned manually based on linguistic knowl- 2. edge, an expectation-maximization step learns the probabilities of the model. This is a rich and interesting model, but the pa- rameters initialization is a full and complex prob- lem. It demands both technical innovation from a machine learning expert and a strong linguistic background from an expert of the syntax of the studied language. 2 Learning a probabilistic context free grammar The originality of our contribution is the choice of a simple context free grammar which can express Figure 2: Parse of the sentence by the context free dependencies between the words of a sentence. grammar DGdg. Our approach is then decomposed into two parts: learning this probabilistic context free grammar To do that, we consider 5 non terminal symbols (nt) : the start symbol S, two symbols G and D (PCFG) by the Inside-Outside algorithm (Lari representing respectively left and right dominants and Young, 1990), parsing based on the learned and two symbols g and d for left and right domi- PCFG, using a probabilistic version of CYK algo- nated items. The terminals represent the POS tags; they can differ depending on the language and on rithm (Jurafsky and Martin, 2009). Finally, formal the tagger. Here are universal tags used by Mc- trees are transformed into dependency trees. For Donald et al. (2013) (e.g. DET for determiner). the definition of formal grammars, like PCFG, we Σ = fADJ; ADP; ADV; CONJ; DET; NOUN; NUM; suggest the reading of Jurafsky and Martin (2009). PRON;PRT;PUNC;VERB;Xg Inside-Outside is a generative model that can The production rules are in Chomsky normal be considered as an extension of hidden Markov form (this is compulsory for Inside-Outside and models (HMM). Whereas HMM are limited to CYK). Our constraints are : learning regular grammars, Inside-Outside can • The uppercase non terminal dominates the deal with context free grammars. While HMM lowercase non terminal it is associated with use calculations on subsequences before and af- by a production rule. E.g. G ! G d means ter a position t to obtain the probabilities of the that a left dominant splits into another left derivation rules of the grammar, Inside-Outside dominant and a right dominated symbol. algorithm calculates it from subsequences inside and outside two positions t1 and t2. The proba- • A left non terminal g (respectively G) is asso- bilistic version of CYK choses the most probable ciated to the left with D (resp. d). nt ! G d parse among all possible analysis. or nt ! g D. DGdg formalism As already written, the origi- The meaning we impose to the non terminals nality of our contribution is the choice of a simple forbids many rules, and thus limits the size of the context free grammar which can express depen- grammar, while keeping its dependency state of Tuning phase All UDL models are tuned ac- mind. cording to the language of the corpus. For our The first type of rule in Chomsky normal form model, it consists in selecting only the rules of (nt ! nt nt) builds the internal construction of type nt ! terminal which are linguistically rel- the sentences. We call them structure rules. The evant. We already give an example illustrating se- second type of rules in Chomsky normal form lection of such rules for the determiner. In the fol- (nt ! terminal) expresses information whether lowing experimentations, we tune the models ob- a POS can (or cannot) dominate its right or left serving for each language some trees given as a neighbors. For example, in English, we will for- reference in the dependency treebanks. bid rules as nt ! DET for all nt 6= g because a determiner is always dominated by the next right 3 Experiments and results noun. CONLL 2006 3bin 4bin 4ter 5ter 5ter+ The variants Depending on the structure of the + FTB studied language, the structure rules may not fit the Bulgarian 17.7% 23.9 % 22.9% 22.8 % 23.6 % deep split of the sentence. The grammar we pre- Danish 26.7% 20.5% 14.0% 13.9 % 13.6 % Dutch 29.7% 34.6% 30.3% 27.0% 27.0 % sented before is called 4bin because it contains, English 15.3% 29.0% 26.4% 38.1% 39.0% in addition to the start symbol, 4 non terminals French 29.8% 32.9% 42.1% 37.4% 42.2 % (D; G; d and g) and the structure rules are writ- German 20.9% 33.1 % 20.9% 31.5% 31.7% Japanese 31.2% 32.4 % 32.2% 33.4% 64.7% ten in a binary way, according to Chomsky normal Portuguese 30.0% 54.0% 42.0% 37.8% 34.1 % form. Slovene 12.2% 21.5% 23.2% 21.6% 21.8% Spanish 20.8% 39.2 % 39.2% 30.0% 40.2% The meaning of these 4 non terminals attests Swedish 21.2% 18.9 % 21.6% 21.8% 21.8 % the fundamental difference between POS which would dominate from left, those which would Table 3: Scores for all DGdg methods dominate from right and those which would be dominated from right and left.
Recommended publications
  • 5892 Cisco Category: Standards Track August 2010 ISSN: 2070-1721
    Internet Engineering Task Force (IETF) P. Faltstrom, Ed. Request for Comments: 5892 Cisco Category: Standards Track August 2010 ISSN: 2070-1721 The Unicode Code Points and Internationalized Domain Names for Applications (IDNA) Abstract This document specifies rules for deciding whether a code point, considered in isolation or in context, is a candidate for inclusion in an Internationalized Domain Name (IDN). It is part of the specification of Internationalizing Domain Names in Applications 2008 (IDNA2008). Status of This Memo This is an Internet Standards Track document. This document is a product of the Internet Engineering Task Force (IETF). It represents the consensus of the IETF community. It has received public review and has been approved for publication by the Internet Engineering Steering Group (IESG). Further information on Internet Standards is available in Section 2 of RFC 5741. Information about the current status of this document, any errata, and how to provide feedback on it may be obtained at http://www.rfc-editor.org/info/rfc5892. Copyright Notice Copyright (c) 2010 IETF Trust and the persons identified as the document authors. All rights reserved. This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (http://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Simplified BSD License.
    [Show full text]
  • University Microfilms, a XEROX Company, Ann Arbor, Michigan DIFFRACTION by DOUBLY CURVED
    70-26,382 VOLTMER, David Russell, 1939- DIFFRACTION BY DOUBLY CURVED CONVEX SURFACES. The Ohio State University, Ph.D., 1970 Engineering, electrical University Microfilms, A XEROX Company, Ann Arbor, Michigan DIFFRACTION BY DOUBLY CURVED CONVEX SURFACES DISSERTATION Presented in Partial Fulfillment of the Requirements for the Degree Doctor of Philosophy in the Graduate School of The Ohio State University by David Russell Voltmer, B.S., M.S.E.E. ****** The Ohio State University 1970 Approved by 6 & k v t Adviser ^Adviser Department of Electrical Engineering t ACKNOWLEDGMENTS This work, though written in my name, reflects the efforts of many others; I take this opportunity to credit them and to offer my gratitude to them. The continued guidance, encourage­ ment, and assistance of Professor Robert G. Kouyoumjian, my adviser, has been instrumental in the successful completion of this study. Professors Leon Peters, Jr. and Roger C. Rudduck, as members of the reading committee, aided in the editing of the manuscript with their suggestions. I especially thank my wife, Joan, who provided understanding, moral support, and love through a difficult time. The majority of this work was accomplished while I was under the sponsorship of Hughes Aircraft Company. Additional assistance was provided by the stimulation and encouragement of the Plasma Physics Laboratory of the USAF Aerospace Research Laboratories. ii VITA June 4, 1939 Born - Ottumwa, Iowa 1961 Be Sc, Iowa State University, Ames, Iowa 1961-1963 Hughes Work-Study Masters Fellow, Hughes Aircraft Company, Fullerton, California 1963 MoS.EcEc, University of Southern California, Los Angeles, California 1963-1966 Hughes Staff Doctoral Fellow, The Ohio State University, Columbus, Ohio 1966-1969 Research Engineer, Plasma Physics Laboratory, USAF Aerospace Research Laboratories, Wright-Patterson AFB, Ohio 1969-1970 Assistant Professor, Department of Electrical Engineering, Pennsylvania State University, University Park, Pennsylvania FIELDS OF STUDY Major Field: Electrical Engineering Studies in Electromagnetism.
    [Show full text]
  • Kyrillische Schrift Für Den Computer
    Hanna-Chris Gast Kyrillische Schrift für den Computer Benennung der Buchstaben, Vergleich der Transkriptionen in Bibliotheken und Standesämtern, Auflistung der Unicodes sowie Tastaturbelegung für Windows XP Inhalt Seite Vorwort ................................................................................................................................................ 2 1 Kyrillische Schriftzeichen mit Benennung................................................................................... 3 1.1 Die Buchstaben im Russischen mit Schreibschrift und Aussprache.................................. 3 1.2 Kyrillische Schriftzeichen anderer slawischer Sprachen.................................................... 9 1.3 Veraltete kyrillische Schriftzeichen .................................................................................... 10 1.4 Die gebräuchlichen Sonderzeichen ..................................................................................... 11 2 Transliterationen und Transkriptionen (Umschriften) .......................................................... 13 2.1 Begriffe zum Thema Transkription/Transliteration/Umschrift ...................................... 13 2.2 Normen und Vorschriften für Bibliotheken und Standesämter....................................... 15 2.3 Tabellarische Übersicht der Umschriften aus dem Russischen ....................................... 21 2.4 Transliterationen veralteter kyrillischer Buchstaben ....................................................... 25 2.5 Transliterationen bei anderen slawischen
    [Show full text]
  • Fee Trairu S~Ifitufa1 Inumtci Tleoltim~A Hudm
    S~ifItufa1 inUMtci tLEOLtIM~a hudm fee trairu is. pas scu IL.OPfSCT0 WCNWNCA0~ AUMaMAn It. TV"c opbc"f uLmmsm A Caum Mwsul for Eaxtin Trani Prollmmi Wift"MVGLmn v BlrATEE Al IVAN. W/W A It p.rinted: April. 1970 ZIformation Rlesources Division/PDIM TAMJ OF Comus IN.R EDUCTW N .. ....I $ ... ............. .................. A. EXTUMM TRADWC- -FHM I ............................. mAdmmwmofm u m a ............................. Ww, Ij . ..................... ... ,1 u lotmAVaud A .. ......... ....... l so n (%Bch lu t .......... ...... Fo Vm u ....... ...... 0 Rw M &Plouru .. ... ... S. T1Dg OFg ilft1 OF AGURLATURAL LXTDGCRE FlG RAM C EXT)OM TUMIAWG- MAK II . .......................... , m Y A d . ........... ...... Hm Fer O AM IkM 160 ..................... 1u Lm " " Pms . .. ............................. Ag.mml lm g . .lm. .. ... .. .. .. .. Cjm,mn m om%m .................................... '. ,.mLAW La mm' .. .. ............................ lulusm 49 .. .. .. .. .. la a llw " .... .. p wm v Ch,am ca ra ...... ............................ ..... we . ° . .° -°• AP IM ........ .... o . .. .. .... .. .. °.o. N tu am a %P nodC to" sow smm snm a" No 0 b oln* a"n 6IN WML kl ia tim o U a aw m &W aer ao OwMeL t pom mu biw bre boe bes p fro a r of in w.l - ow Dowbop .a,UeAsid SIM tmew of Air uir e. MIinJ PretIla As ­ C'UNIVral COm au&Inm NA 1I COOTRal Psgbm P110119 4 but7 1118bw ts a d foair ia ist rare ctent or miarl tm cba directly WMV, dweo Wo a Loral peugram aIs the w ad tow a s of tho biy to s Ue tow anmei olLowd in tM hadboo mre adpt for &M tried i the traWL aI Kos lys skn gtaff Tlwy bave bee sucs in that stato A sbrvej of codkm for 0220"bM trals" wa the first stop MANY '.
    [Show full text]
  • Transdermal Chronopharmaceutical Drug Delivery: Microneedles, Intradermal Infusion Experiments and a Delivery Device
    Michael Vosseler Transdermal chronopharmaceutical drug delivery: microneedles, intradermal infusion experiments and a delivery device Dissertation zur Erlangung des Doktorgrades der Technischen Fakultät der Albert-Ludwigs-Universität Freiburg im Breisgau April 3rd 2013 I Dekan Prof. Dr. Yiannos Manoli Gutachter Prof. Dr. Roland Zengerle Prof. Dr. Holger Reinecke Tag der Prüfung 05.02.2014 Michael Vosseler Hahn-Schickard-Gesellschaft für Angewandte Forschung e.V. Institut für Mikro- und Informationstechnik (HSG-IMIT) Villingen-Schwenningen II Erklärung Ich erkläre, dass ich die vorliegende Arbeit ohne unzulässige Hilfe Dritter und ohne Benutzung anderer als der angegebenen Hilfsmittel angefertigt habe. Die aus ande- ren Quellen direkt oder indirekt übernommenen Daten und Konzepte sind unter An- gabe der Quelle gekennzeichnet. Insbesondere habe ich hierfür nicht die entgeltliche Hilfe von Vermittlungs- oder Beratungsdiensten (Promotionsberaterinnen oder Pro- motionsberater oder anderer Personen) in Anspruch genommen. Niemand hat von mir unmittelbar oder mittelbar geldwerte Leistungen für Arbeiten erhalten, die im Zu- sammenhang mit dem Inhalt der vorgelegten Dissertation stehen. Die Arbeit wurde bisher weder im In- noch im Ausland in gleicher oder ähnlicher Form einer anderen Prüfungsbehörde vorgelegt. Ich erkläre hiermit, dass ich mich noch nie an einer in- oder ausländischen wissen- schaftlichen Hochschule um die Promotion beworben habe oder gleichzeitig be- werbe. Datum/date: Unterschrift/signature: III Abstract The beginning of modern chronotherapy was the delivery of cancer medication according to circadian (about 24 h) rhythms in the 70s and 80s of the last century. Nowadays, there is a lot of knowledge on rhythms of medical conditions and especially on the exacerbation of symptoms with time of day. Chronic conditions ranging from asthma to stroke are studied intensively.
    [Show full text]
  • The Unicode Standard 5.1 Code Charts
    Cyrillic Extended-B Range: A640–A69F The Unicode Standard, Version 5.1 This file contains an excerpt from the character code tables and list of character names for The Unicode Standard, Version 5.1. Characters in this chart that are new for The Unicode Standard, Version 5.1 are shown in conjunction with any existing characters. For ease of reference, the new characters have been highlighted in the chart grid and in the names list. This file will not be updated with errata, or when additional characters are assigned to the Unicode Standard. See http://www.unicode.org/errata/ for an up-to-date list of errata. See http://www.unicode.org/charts/ for access to a complete list of the latest character code charts. See http://www.unicode.org/charts/PDF/Unicode-5.1/ for charts showing only the characters added in Unicode 5.1. See http://www.unicode.org/Public/5.1.0/charts/ for a complete archived file of character code charts for Unicode 5.1. Disclaimer These charts are provided as the online reference to the character contents of the Unicode Standard, Version 5.1 but do not provide all the information needed to fully support individual scripts using the Unicode Standard. For a complete understanding of the use of the characters contained in this file, please consult the appropriate sections of The Unicode Standard, Version 5.0 (ISBN 0-321-48091-0), online at http://www.unicode.org/versions/Unicode5.0.0/, as well as Unicode Standard Annexes #9, #11, #14, #15, #24, #29, #31, #34, #38, #41, #42, and #44, the other Unicode Technical Reports and Standards, and the Unicode Character Database, which are available online.
    [Show full text]
  • ISO/IEC International Standard 10646-1
    JTC1/SC2/WG2 N3381 ISO/IEC 10646:2003/Amd.4:2008 (E) Information technology — Universal Multiple-Octet Coded Character Set (UCS) — AMENDMENT 4: Cham, Game Tiles, and other characters such as ISO/IEC 8824 and ISO/IEC 8825, the concept of Page 1, Clause 1 Scope implementation level may still be referenced as „Implementa- tion level 3‟. See annex N. In the note, update the Unicode Standard version from 5.0 to 5.1. Page 12, Sub-clause 16.1 Purpose and con- text of identification Page 1, Sub-clause 2.2 Conformance of in- formation interchange In first paragraph, remove „, the implementation level,‟. In second paragraph, remove „, and to an identified In second paragraph, remove „with an implementation implementation level chosen from clause 14‟. level‟. In fifth paragraph, remove „, the adopted implementa- Page 12, Sub-clause 16.2 Identification of tion level‟. UCS coded representation form with imple- mentation level Page 1, Sub-clause 2.3 Conformance of de- vices Rename sub-clause „Identification of UCS coded repre- sentation form‟. In second paragraph (after the note), remove „the adopted implementation level,‟. In first paragraph, remove „and an implementation level (see clause 14)‟. In fourth and fifth paragraph (b and c statements), re- move „and implementation level‟. Replace the 6-item list by the following 2-item list and note: Page 2, Clause 3 Normative references ESC 02/05 02/15 04/05 Update the reference to the Unicode Bidirectional Algo- UCS-2 rithm and the Unicode Normalization Forms as follows: ESC 02/05 02/15 04/06 Unicode Standard Annex, UAX#9, The Unicode Bidi- rectional Algorithm, Version 5.1.0, March 2008.
    [Show full text]
  • Semi-Supervised Learning Overview 1 Semi-Supervised Learning
    CS 446 Machine Learning Fall 2016 Nov 10, 2016 Semi-Supervised Learning Professor: Dan Roth Scribe: Ben Zhou, C. Cervantes Overview • Semi-Supervised Learning • Expectation Maximization • K-Means Algorithm 1 Semi-Supervised Learning Consider the problem of prepositional phrase attachment; we want to predict to which preceding phrase a prepositional phrase attaches, as in Buy car with money. Buy car with wheels. In this setting, each sentence has four features (one for each word) and our goal is to predict whether to attach the preposition ("with") to the verb ("buy") or the noun ("car"). Let us further expand the feature space to include all conjunctions, resulting in 15 total features. In the Naive Bayes setting, we want to predict noun or verb, given our features ([x1:::x15]). Therefore, we must estimate P (n) P (v) P (x1jn) P (x1jv) ... P (xnjn) P (xnjv) Note that there are two values for each cell in the column (ex. P (x1jn = 1) and P (x1jn = 0)). Now, given an example (x1; x2:::xn; ?), we compare P (njx) = P (n)P (x1jn):::P (xnjn) P (vjx) = P (v)P (x1jv):::P (xnjv). and predict the label with the highest probability. Consider that after seeing 10 examples, we have Semi-Supervised Learning-1 P (n) = 0:5 P (v) = 0:5 P (x1jn) = 0:75 P (x1jv) = 0:25 P (x2jn) = 0:5 P (x2jv) = 0:25 P (x3jn) = 0:5 P (x3jv) = 0:75 P (x4jn) = 0:5 P (xnjv) = 0:5 If now we have an example of x = [1000], we have 3 P (njx) = 0:5 ∗ 0:75 ∗ 0:5 ∗ 0:5 ∗ 0:5 = 64 3 P (vjx) = 0:5 ∗ 0:25 ∗ 0:75 ∗ 0:25 ∗ 0:5 = 256 According to Naive Bayes, we then compare these two numbers and predict that the label for this example is n.
    [Show full text]
  • Cyrillic # Version Number
    ############################################################### # # TLD: xn--j1aef # Script: Cyrillic # Version Number: 1.0 # Effective Date: July 1st, 2011 # Registry: Verisign, Inc. # Address: 12061 Bluemont Way, Reston VA 20190, USA # Telephone: +1 (703) 925-6999 # Email: [email protected] # URL: http://www.verisigninc.com # ############################################################### ############################################################### # # Codepoints allowed from the Cyrillic script. # ############################################################### U+0430 # CYRILLIC SMALL LETTER A U+0431 # CYRILLIC SMALL LETTER BE U+0432 # CYRILLIC SMALL LETTER VE U+0433 # CYRILLIC SMALL LETTER GE U+0434 # CYRILLIC SMALL LETTER DE U+0435 # CYRILLIC SMALL LETTER IE U+0436 # CYRILLIC SMALL LETTER ZHE U+0437 # CYRILLIC SMALL LETTER ZE U+0438 # CYRILLIC SMALL LETTER II U+0439 # CYRILLIC SMALL LETTER SHORT II U+043A # CYRILLIC SMALL LETTER KA U+043B # CYRILLIC SMALL LETTER EL U+043C # CYRILLIC SMALL LETTER EM U+043D # CYRILLIC SMALL LETTER EN U+043E # CYRILLIC SMALL LETTER O U+043F # CYRILLIC SMALL LETTER PE U+0440 # CYRILLIC SMALL LETTER ER U+0441 # CYRILLIC SMALL LETTER ES U+0442 # CYRILLIC SMALL LETTER TE U+0443 # CYRILLIC SMALL LETTER U U+0444 # CYRILLIC SMALL LETTER EF U+0445 # CYRILLIC SMALL LETTER KHA U+0446 # CYRILLIC SMALL LETTER TSE U+0447 # CYRILLIC SMALL LETTER CHE U+0448 # CYRILLIC SMALL LETTER SHA U+0449 # CYRILLIC SMALL LETTER SHCHA U+044A # CYRILLIC SMALL LETTER HARD SIGN U+044B # CYRILLIC SMALL LETTER YERI U+044C # CYRILLIC
    [Show full text]
  • Clustering on the Unit Hypersphere Using Von Mises-Fisher Distributions
    JournalofMachineLearningResearch6(2005)1345–1382 Submitted 9/04; Revised 4/05; Published 9/05 Clustering on the Unit Hypersphere using von Mises-Fisher Distributions Arindam Banerjee [email protected] Department of Electrical and Computer Engineering University of Texas at Austin Austin, TX 78712, USA Inderjit S. Dhillon [email protected] Department of Computer Sciences University of Texas at Austin Austin, TX 78712, USA Joydeep Ghosh [email protected] Department of Electrical and Computer Engineering University of Texas at Austin Austin, TX 78712, USA Suvrit Sra [email protected] Department of Computer Sciences University of Texas at Austin Austin, TX 78712, USA Editor: Greg Ridgeway Abstract Several large scale data mining applications, such as text categorization and gene expression anal- ysis, involve high-dimensional data that is also inherently directional in nature. Often such data is L2 normalized so that it lies on the surface of a unit hypersphere. Popular models such as (mixtures of) multi-variate Gaussians are inadequate for characterizing such data. This paper proposes a gen- erative mixture-model approach to clustering directional data based on the von Mises-Fisher (vMF) distribution, which arises naturally for data distributed on the unit hypersphere. In particular, we derive and analyze two variants of the Expectation Maximization (EM) framework for estimating the mean and concentration parameters of this mixture. Numerical estimation of the concentra- tion parameters is non-trivial in high dimensions since it involves functional inversion of ratios of Bessel functions. We also formulate two clustering algorithms corresponding to the variants of EM that we derive. Our approach provides a theoretical basis for the use of cosine similarity that has been widely employed by the information retrieval community, and obtains the spherical kmeans algorithm (kmeans with cosine similarity) as a special case of both variants.
    [Show full text]
  • Hard and Soft EM in Bayesian Network Learning from Incomplete Data
    algorithms Article Hard and Soft EM in Bayesian Network Learning from Incomplete Data Andrea Ruggieri 1,†, Francesco Stranieri 1,† , Fabio Stella 1 and Marco Scutari 2,* 1 Department of Informatics, Systems and Communication, Università degli Studi di Milano-Bicocca, 20126 Milano, Italy; [email protected] (A.R.); [email protected] (F.S.); [email protected] (F.S.) 2 Istituto Dalle Molle di Studi sull’Intelligenza Artificiale (IDSIA), 6962 Viganello, Switzerland * Correspondence: [email protected] † These authors contributed equally to this work. Received: 18 November 2020; Accepted: 7 December 2020; Published: 9 December 2020 Abstract: Incomplete data are a common feature in many domains, from clinical trials to industrial applications. Bayesian networks (BNs) are often used in these domains because of their graphical and causal interpretations. BN parameter learning from incomplete data is usually implemented with the Expectation-Maximisation algorithm (EM), which computes the relevant sufficient statistics (“soft EM”) using belief propagation. Similarly, the Structural Expectation-Maximisation algorithm (Structural EM) learns the network structure of the BN from those sufficient statistics using algorithms designed for complete data. However, practical implementations of parameter and structure learning often impute missing data (“hard EM”) to compute sufficient statistics instead of using belief propagation, for both ease of implementation and computational speed. In this paper, we investigate the question: what is the impact of using imputation instead of belief propagation on the quality of the resulting BNs? From a simulation study using synthetic data and reference BNs, we find that it is possible to recommend one approach over the other in several scenarios based on the characteristics of the data.
    [Show full text]
  • The Meaning and Use of Ideophones in Siwu
    PDF hosted at the Radboud Repository of the Radboud University Nijmegen The following full text is a publisher's version. For additional information about this publication click this link. http://hdl.handle.net/2066/91241 Please be advised that this information was generated on 2014-12-22 and may be subject to change. The Meaning and Use of Ideophones in Siwu Mark Dingemanse The Meaning and Use of Ideophones in Siwu Copyright © Mark Dingemanse, 2011 Cover photo: Making palm oil in Akpafu-Mempeasem, Ghana, March 2008 The Meaning and Use of Ideophones in Siwu Een wetenschappelijke proeve op het gebied van Letteren Proefschrift ter verkrijging van de graad van doctor aan de Radboud Universiteit Nijmegen op gezag van de rector magnificus prof. mr. S.C.J.J. Kortmann volgens besluit van college van decanen in het openbaar te verdedigen op maandag 24 oktober 2011 om 15.30 precies door Mark Dingemanse geboren op 5 mei 1983 te Middelburg Promotoren Prof. Dr. Stephen C. Levinson Prof. Dr. Gunter Senft (Universität zu Köln) Copromotor Dr. Felix K. Ameka (Universiteit Leiden) Manuscriptcommissie Prof. Dr. Pieter Muysken Prof. Dr. Tom Güldemann (Humboldt-Universität zu Berlin) Dr. Sotaro Kita (University of Birmingham) This thesis comes with a website containing online supplementary materials: http://thesis.ideophone.org/. Materials available online are marked (S). The research reported in this thesis was supported by a grant from the Max- Planck-Gesellschaft zur Förderung der Wissenschaften, München, Germany. Outline Acknowledgements.................................................................................................................i
    [Show full text]