
Security News
MCP Community Begins Work on Official MCP Metaregistry
The MCP community is launching an official registry to standardize AI tool discovery and let agents dynamically find and install MCP servers.
KeyCARE is a Python library designed for the unsupervised keyword extraction from biomedical documents with the use of different algorithms, the classification of the keywords according to their semantic nature, and the extraction of is a relations among those keywords and with other terminologies.
A framework for biomedical Keyword Extraction, term Categorization, and semantic Relation.
KeyBERT provides a common interface for extracting, categorizing and associating terms extracted from a text:
Installation can be done using pypi:
pip install keycare
You might also need to install spacy's es_core_news_sm:
python3 -m spacy download es_core_news_sm
The library is built on 3 main processes: keyword extraction, term categorization and relations extraction. The two first processes have been implemented within a same pipeline in the class TermExtractor
, which automatically extracts classified keywords frim pieces of text. The relations extraction process among term pairs or groups of terms is implemented in the other main class, RelExtractor
.
For the use of TermExtractor with default parameters, use the following code:
from keycare.TermExtractor import TermExtractor
extractor = TermExtractor()
extractor("...") # Introduce your text here
extractor.keywords
This code calls TermExtractor with default parameters on a piece of text and returns the extracted keywords with their assigned class.
For the use of RelExtractor with default parameters, use the following code:
from keycare.RelExtractor import RelExtractor
relextractor = RelExtractor()
relextractor("...", "...") # Introduce your term pairs here
relextractor.relations
This code calls RelExtractor with default parameters on pairs of terms and returns the existing relation among them.
For further information on the functioning of the library and the available parameters refer to the tutorials in the nbs folder.
This library has been developed with Python 3.10.12
Any contributions you make are greatly appreciated. For contributing:
Fork/Clone the Project in your system
git clone https://github.com/nlp4bia-bsc/keycare.git
Create a new virtual environment
python3 -m venv .env_keycare
Activate the new environment
source .env_keycare/bin/activate
Install the requirements
pip install -r requirements.txt
Create your Feature Branch (git checkout -b feature/AmazingFeature
)
Update requirements file (pip freeze > requirements.txt
)
Commit your Changes (git commit -m 'Add some AmazingFeature'
)
Push to the Branch (git push origin feature/AmazingFeature
)
Open a Pull Request from github.
Follow this tutorial to create a branch.
A paper on the library will soon be published. Please cite if you use the library in scientific works.
FAQs
KeyCARE is a Python library designed for the unsupervised keyword extraction from biomedical documents with the use of different algorithms, the classification of the keywords according to their semantic nature, and the extraction of is a relations among those keywords and with other terminologies.
We found that keycare demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
The MCP community is launching an official registry to standardize AI tool discovery and let agents dynamically find and install MCP servers.
Research
Security News
Socket uncovers an npm Trojan stealing crypto wallets and BullX credentials via obfuscated code and Telegram exfiltration.
Research
Security News
Malicious npm packages posing as developer tools target macOS Cursor IDE users, stealing credentials and modifying files to gain persistent backdoor access.