Bio-NER: Biomedical Named Entity Recognition using Rule-Based and Statistical Learners
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2017, Vol 8, Issue 12
Abstract
The purpose of extracting of Bio-Medical Entities is to recognize the particular entities, whether word or phrases, from the unstructured data contained in the text. This work proposes different approaches and methods, i.e. Machine Learning Hybrid Classification, Rule Based Non-tested Generalized Exemplars and Partial Decision Tree (PART) Learners for Bio-Medical Named Entity Recognition. The Prime objective is to consider, preferably, simple characteristics, such as, affixes and context. In addition, orthographic, Parts of Speech (POS) tags and N-grams are given secondary importance as for as their comparison with affixes and context is concerned. Further, for the very purpose of Bio-medical Diseased Named Recognition, proposal of Rule Based Classifiers along with the Statistical Machine Learning is given. Also, this paper proposes the blend of both preceding methods that jointly construct Hybrid Classification algorithm. Precision, Recall and F-measure – standard metrics- has been put into practice for the evaluation. The results prove that the technique used has far better performance results than the method used before - state-of-art Disease NER (Named Entity Recognition).
Authors and Affiliations
Pir Dino Soomro, Sanotsh Kumar, Banbhrani Banbhrani, Arsalan Ali Shaikh, Hans Raj
Comparative Analysis of K-Means and Fuzzy C-Means Algorithms
In the arena of software, data mining technology has been considered as useful means for identifying patterns and trends of large volume of data. This approach is basically used to extract the unknown pattern from the la...
A P System for Solving All-Solutions of TSP
P system is a parallel computing system based on a membrane computing model. Since the calculation process of the P system has the characteristics of maximum parallelism and Non-determinism, it has been used to solve the...
A Survey on Smartphones Security: Software Vulnerabilities, Malware, and Attacks
Nowadays, the usage of smartphones and their applications have become rapidly popular in people’s daily life. Over the last decade, availability of mobile money services such as mobile-payment systems and app markets hav...
[url=http://thesai.org/Downloads/Volume2No5/Paper%2015-Application%20of%20Fuzzy%20Logic%20Approach%20to%20Software%20Effort%20Estimation.pdf] Application of Fuzzy Logic Approach to Software Effort Estimation[/url]
The most significant activity in software project management is Software development effort prediction. The literature shows several algorithmic cost estimation models such as Boehm’s COCOMO, Albrecht's' Func...
Media Content Access: Image-based Filtering
As the content on the internet contains sensitive adult material, filtering and blocking this content is essential for the social and ethical values of the many societies and organizations. In this paper, the content fil...