Event Detection Using a Self-Constructed Dependency and Graph Convolution Network

نویسندگان

چکیده

The extant event detection models, which rely on dependency parsing, have exhibited commendable efficacy. However, for some long sentences with more words, the results of parsing are complex, because each word corresponds to a directed edge label. These edges do not all provide guidance model, and accuracy tools decreases increase in sentence length, resulting error propagation. To solve these problems, we developed an model that uses self-constructed graph convolution network. First, statistically analyzed ACE2005 corpus prune tree, combined named entity features generate undirected graph. Second, implemented enhanced network using multi-head attention mechanism understand representation nodes Finally, gating semantic structural information sentence, enabling us accomplish task. A series experiments conducted demonstrates proposed method enhances performance model.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Refining a Bayesian Network using a Chain Event Graph

Copyright and reuse: The Warwick Research Archive Portal (WRAP) makes this work of researchers of the University of Warwick available open access under the following conditions. This article is made available under the Creative Commons Attribution 3.0 Unported (CC BY 3.0) license and may be reused according to the conditions of the license. For more details see: A note on versions: The version ...

متن کامل

Study on the new graph constructed by a commutative ring

Let R be a commutative ring and G(R) be a graph with vertices as proper andnon-trivial ideals of R. Two distinct vertices I and J are said to be adjacentif and only if I + J = R. In this paper we study a graph constructed froma subgraph G(R)Δ(R) of G(R) which consists of all ideals I of R such thatI Δ J(R), where J(R) denotes the Jacobson radical of R. In this paper westudy about the relation b...

متن کامل

Analytical framework for measuring network security using exploit dependency graph

Attack graph is a popular tool for modeling multi-staged, correlated attacks on computer networks. Attack graphs have been widely used for measuring network security risks. A major portion of these works, have used host based or state based attack graphs. These attack graph models are either too restrictive or too resource consuming. Also, a significant portion of these works have used ‘probabi...

متن کامل

A Convolution BiLSTM Neural Network Model for Chinese Event Extraction

Chinese event extraction is a challenging task in information extraction. Previous approaches highly depend on sophisticated feature engineering and complicated natural language processing (NLP) tools. In this paper, we first come up with the language specific issue in Chinese event extraction, and then propose a convolution bidirectional LSTM neural network that combines LSTM and CNN to captur...

متن کامل

A Convolution BiLSTM Neural Network Model for Chinese Event Extraction

Chinese event extraction is a challenging task in information extraction. Previous approaches highly depend on sophisticated feature engineering and complicated natural language processing (NLP) tools. In this paper, we first come up with the language specific issue in Chinese event extraction, and then propose a convolution bidirectional LSTM neural network that combines LSTM and CNN to captur...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Applied sciences

سال: 2023

ISSN: ['2076-3417']

DOI: https://doi.org/10.3390/app13063919