Computer Science ›› 2015, Vol. 42 ›› Issue (10): 239-243.

Previous Articles     Next Articles

Research on Tagging Biomedical Event Trigger

WEI Xiao-mei, HUANG Yu, CHEN Bo and JI Dong-hong   

  • Online:2018-11-14 Published:2018-11-14

Abstract: Event extraction from biomedical literature plays an important role in the knowledge mining in biomedical domain.The trigger identification is the key step in biomedical event extraction.We used rich features including lemma,context,phrase label,word cluster and learned trigger dictionary to build several kinds of CRF models.Then we chose the best model for each type of triggers to combine a hybrid model.The evaluation on the BioNLP 2009 ST data set shows that our approach achieves good performance,which lays foundation for biomedical event extraction.

Key words: Biomedical event,Trigger,CRF model,Brown Cluster,Feature

[1] Kim Jin-dong,Ohta T,Pyysalo S,et al.Overview of BioNLP’09 Shared Task on Event Extraction[C]∥BioNLP Shared Task 2009 Workshop,2009.Boston,MA,USA,2009:1-9
[2] Miwa M,Saetre R,Jin-dong K,et al.Event extraction with complex event classification using rich features[J].Journal of bioinformatics and computational biology,2010,8(1):131-146
[3] Casillas A,de Ilarraza A D,Gojenola K,et al.Using Kybots for extracting events in biomedical texts[C]∥BioNLP Shared Task 2011 Workshop,2011.Portland,Oregon,USA,2011:138-142
[4] Bjǒrne J,et al.Extracting Complex Biological Events with Rich Graph-Based Feature Sets[C]∥Proceedings of the Workshop on BioNLP:Shared Task,2009.Boulder,Colorado,2009:10-18
[5] MacKinlay A,Martinez D,Baldwin T.Biomedical event annotation with CRFs and precision grammars[C]∥Workshop on Current Trends in Biomedical Natural Language Processing,2009.Boulder,Colorado,2009:77-85
[6] Lu Ya-nan,Yao Xiao-yuan,Wei Xiao-mei,et al.CHEMDNERSystem with Mixed Conditional Random Fields and Multi-scale Word Clustering[J].Journal of Cheminformatics,2015,7(Suppl 1):S4
[7] Miller S,Guinness J,Zamanian A.Name Tagging with WordClusters and Discriminative Training[C]∥HLT-NAACL.2004:337-342
[8] Turian J,Ratinov L,Bengio Y.Word representations:a simpleand general method for semi-supervised learning[C]∥Procee-dings of the 48th Annual Meeting of the Association for Computational Linguistics,2010.2010:384-394
[9] Brown P F,deSouza P V,Mercer R L,et al.Class-based n-gram models of natural language[J].Computational Linguistics,1992,8(4):467-479
[10] 刘远超,王晓龙,徐志明,等.文档聚类综述[J].中文信息学报,2006,20(3):55-62 Liu Yuan-chao,Wang Xiao-long,Xu Zhi-ming,et al.A survey of document clustering[J].Journal of Chinese Information Proces-sing,2006,0(3):55-62
[11] Zhang Y,Lin H,Yang Z,et al.Biomolecular event trigger detection using neighborhood hash features[J].Journal of Theoretical Biology, 2013,318(2):22-28
[12] Miwa M,Stre R,Kim J-D,et al.Event extraction with complex event classification using rich features[J].Journal of Bioinformatics & Computational Biology,2010,8(1):131-146

No related articles found!
Full text



[1] . [J]. Computer Science, 2018, 1(1): 1 .
[2] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75, 88 .
[3] XIA Qing-xun and ZHUANG Yi. Remote Attestation Mechanism Based on Locality Principle[J]. Computer Science, 2018, 45(4): 148 -151, 162 .
[4] LI Bai-shen, LI Ling-zhi, SUN Yong and ZHU Yan-qin. Intranet Defense Algorithm Based on Pseudo Boosting Decision Tree[J]. Computer Science, 2018, 45(4): 157 -162 .
[5] WANG Huan, ZHANG Yun-feng and ZHANG Yan. Rapid Decision Method for Repairing Sequence Based on CFDs[J]. Computer Science, 2018, 45(3): 311 -316 .
[6] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[7] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[8] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[9] LIU Qin. Study on Data Quality Based on Constraint in Computer Forensics[J]. Computer Science, 2018, 45(4): 169 -172 .
[10] ZHONG Fei and YANG Bin. License Plate Detection Based on Principal Component Analysis Network[J]. Computer Science, 2018, 45(3): 268 -273 .