Event Detection Using a Self-Constructed Dependency and Graph Convolution Network
نویسندگان
چکیده
The extant event detection models, which rely on dependency parsing, have exhibited commendable efficacy. However, for some long sentences with more words, the results of parsing are complex, because each word corresponds to a directed edge label. These edges do not all provide guidance model, and accuracy tools decreases increase in sentence length, resulting error propagation. To solve these problems, we developed an model that uses self-constructed graph convolution network. First, statistically analyzed ACE2005 corpus prune tree, combined named entity features generate undirected graph. Second, implemented enhanced network using multi-head attention mechanism understand representation nodes Finally, gating semantic structural information sentence, enabling us accomplish task. A series experiments conducted demonstrates proposed method enhances performance model.
منابع مشابه
Refining a Bayesian Network using a Chain Event Graph
Copyright and reuse: The Warwick Research Archive Portal (WRAP) makes this work of researchers of the University of Warwick available open access under the following conditions. This article is made available under the Creative Commons Attribution 3.0 Unported (CC BY 3.0) license and may be reused according to the conditions of the license. For more details see: A note on versions: The version ...
متن کاملStudy on the new graph constructed by a commutative ring
Let R be a commutative ring and G(R) be a graph with vertices as proper andnon-trivial ideals of R. Two distinct vertices I and J are said to be adjacentif and only if I + J = R. In this paper we study a graph constructed froma subgraph G(R)Δ(R) of G(R) which consists of all ideals I of R such thatI Δ J(R), where J(R) denotes the Jacobson radical of R. In this paper westudy about the relation b...
متن کاملAnalytical framework for measuring network security using exploit dependency graph
Attack graph is a popular tool for modeling multi-staged, correlated attacks on computer networks. Attack graphs have been widely used for measuring network security risks. A major portion of these works, have used host based or state based attack graphs. These attack graph models are either too restrictive or too resource consuming. Also, a significant portion of these works have used ‘probabi...
متن کاملA Convolution BiLSTM Neural Network Model for Chinese Event Extraction
Chinese event extraction is a challenging task in information extraction. Previous approaches highly depend on sophisticated feature engineering and complicated natural language processing (NLP) tools. In this paper, we first come up with the language specific issue in Chinese event extraction, and then propose a convolution bidirectional LSTM neural network that combines LSTM and CNN to captur...
متن کاملA Convolution BiLSTM Neural Network Model for Chinese Event Extraction
Chinese event extraction is a challenging task in information extraction. Previous approaches highly depend on sophisticated feature engineering and complicated natural language processing (NLP) tools. In this paper, we first come up with the language specific issue in Chinese event extraction, and then propose a convolution bidirectional LSTM neural network that combines LSTM and CNN to captur...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Applied sciences
سال: 2023
ISSN: ['2076-3417']
DOI: https://doi.org/10.3390/app13063919