Abstract
In light of the Bali bombings, East Asia nations rally the international community into a broad-based coalition to support a war against terrorism. The information sharing among different countries provides a challenge for cross-lingual semantic interoperability. In this work, we model the problem as an associate constraint network and propagation by backmarking is proposed for creating the cross-lingual concept space. The approach deals with structured as well as unstructured data, addresses relevancy of information, offers the user with associative navigation through the information embedded in the database, enables conduction of multiple languages. Evidence is presented to show that a constraint programming approach performs well and has the advantage in terms of tractability, ordering and efficiency over the Hopfield network. The research output consisted of a thesaurus-like, semantic network knowledge base relied on statistical correlation analysis of the semantics embedded in the documents of English/Chinese parallel corpus.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Bartak, R.: Constraint Programming: In Pursuit of the Holy Grail. In: Proceedings of the Week of Doctoral Students (WDS 1999), Part IV, June 1999, pp. 555–564. MatFyzPress, Prague (1999)
Bartak, R.: Theory and Practice of Constraint Propagation. In: Proceedings of the 3rd Workshop on Constraint Programming for Decision and Control (CPDC 2001), Wydavnictvo Pracovni Komputerowej, Gliwice, Poland, June 2001, pp. 7–14 (2001)
Chen, H., Lynch, K.J.: Automatic construction of networks of concepts characterizing document database. IEEE Transactions on Systems, Man and Cybernetics 22(5), 885–902 (1992)
Li, K.W., Yang, C.C.: Automatic Construction of Cross-lingual Networks of Concepts from the Hong Kong SAR Police Department. In: Chen, H., Miranda, R., Zeng, D.D., Demchak, C.C., Schroeder, J., Madhusudan, T. (eds.) ISI 2003. LNCS, vol. 2665, pp. 138–152. Springer, Heidelberg (2003)
Li, K.W., Yang, C.C.: Automatic Cross-Lingual Thesaurus Generated from the Hong Kong SAR Police Department Web Corpus for Crime Analysis. Journal of the American Society for Information Science and Technology (to appear)
Hopfield, J.J.: Neurons with graded response have collective computational properties like those of two-state neurons. Proceedings of the National Academy of Science, USA 81, 3088–3092 (1984)
Hopfield, J.J.: Neural network and physical systems with collective computational abilities. Proceedings of the National Academy of Science, USA 79(4), 2554–2558 (1982)
Kumar, V.: Algorithms for Constraint Satisfaction Problems: A Survey. AI Magazine 13(1), 32–44 (1992)
Montanary, U.: Network constraints fundamental properties and applications to picture processing. Information Sciences 7, 95–132 (1974)
Tsang, E.: Foundations of Constraint Satisfaction. Academic Press, London (1995)
van Beek, P., Dechter, R.: On the Minimallity and Global Consistency of Row- Convex Constraint Networks. Journal of the Association for Computing Machinery 42(3), 543–561 (1995)
van Beek, P., Chen, X.: CPlan: A constraint programming approach to planning. In: Proceedings of the 16th National Conference on Artificial Intelligence, Orlando, Florida (July 1999)
Waltz, D.L.: Understanding line drawings of scenes with shadows. In: Psychology of Computer Vision, McGraw-Hill, New York (1975)
Yang, C.C., Luk, J.: Automatic Generation of English/Chinese Thesaurus Based on a Parallel Corpus in Law. Journal of the American Society for Information Science and Technology, Special Topic Issue on Web Retrieval and Mining: A Machine Learning Perspective 54(7), 671–682 (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Yang, C.C., Li, K.W. (2004). Cross-Lingual Semantics for Crime Analysis Using Associate Constraint Network. In: Chen, H., Moore, R., Zeng, D.D., Leavitt, J. (eds) Intelligence and Security Informatics. ISI 2004. Lecture Notes in Computer Science, vol 3073. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-25952-7_35
Download citation
DOI: https://doi.org/10.1007/978-3-540-25952-7_35
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-22125-8
Online ISBN: 978-3-540-25952-7
eBook Packages: Springer Book Archive