一、事件抽取算法-omnievent
OmniEvent 是一个功能强大的开源事件提取工具包,包括事件检测和事件参数提取。全面涵盖各种范式,并对广泛使用的英文和中文数据集提供公平、统一的评估。模块化实现使 OmniEvent 具有高度可扩展性。
github地址:https://github.com/THU-KEG/OmniEvent
二、直接调包进行测试
步骤一、安装omniEvent包
pip install OmniEvent
步骤二 、调用模型进行测试
from OmniEvent.infer import infer
text = "2022年北京市举办了冬奥会"
results = infer(text=text, task="EE")
print(results[0]["events"])
"""[
{ "type": "组织行为开幕", "trigger": "举办", "offset": [8, 10], "arguments": [
{ "mention": "2022年", "offset": [9, 16], "role": "时间"},
{ "mention": "北京市", "offset": [81, 89], "role": "地点"},
{ "mention": "冬奥会", "offset": [0, 4], "role": "活动名称"},
]
}
] """
#使用ED模式进行事件发现
text = "U.S. and British troops were moving on the strategic southern port city of Basra \ Saturday after a massive aerial assault pounded Baghdad at dawn"
results = infer(text=text, task="ED")
print(results[0]["events"])
"""[
{ "type": "attack", "trigger": "assault", "offset": [113, 120]},
{ "type": "injure", "trigger": "pounded", "offset": [121, 128]}
]"""
#将ED模式得到的事件发现结果作为参数,使用EAE模式进行事件参数提取
results = infer(text=text, triggers=[("assault", 113, 120), ("pounded", 121, 128)], task="EAE")
print(results[0]["events"])
"""
[
{ "type": "attack", "trigger": "assault", "offset": [113, 120], "arguments": [
{ "mention": "U.S.", "offset": [0, 4], "role": "attacker"},
{ "mention": "British", "offset": [9, 16], "role": "attacker"},
{ "mention": "Saturday", "offset": [81, 89], "role": "time"}
]
},
{ "type": "injure", "trigger": "pounded", "offset": [121, 128], "arguments": [
{ "mention": "U.S.", "offset": [0, 4], "role": "attacker"},
{ "mention": "Saturday", "offset": [81, 89], "role": "time"},
{ "mention": "British", "offset": [9, 16], "role": "attacker"}
]
}
]"""
这里的模型是直接将ED任务和EAE任务合并为EE任务,因此耗时较长,可将其分开,再得到ED任务结果后,选择满足条件的数据进行下一步EAE任务的测试