Novel Implementation of Text Mining for Reports
Journal Title: International Journal of Computer Science and Information Technologies - Year 2010, Vol 1, Issue 4
Abstract
In this paper, we propose a text mining system to extract and use the information in radiology reports. The system consists of three main modules: medical finding extractor, report and image retriever. The medical finding extraction module automatically extracts medical findings and associated modifiers to structure radiology reports. The structuring of the free text reports bridges the gap between users and report database, makes the information contained in the reports readily accessible. It also serves as intermediate result to other components of the system. The retrieval module analyzes user’s query and returns the reports and images that match the query. The overall evaluation results are satisfactory, though more thorough testing and evaluation are needed. Our future work includes improving the current system performance and implementing the radiology report generation system using statistical machine translation approach, for which we have designed the general architecture.
Authors and Affiliations
K. Suresh , Venkatesh Sharma , Y. Srinivas , K. Shalini
An overview of interval encoded temporal mining involving prioritized mining, fuzzy mining, and positive and negative rule mining
Databases and data warehouses have become a vital part of many organizations. So useful information and helpful knowledge have to be mined from transactions. In real life, media information has time attributes eith...
A new horizon in data security by Cryptography & Steganography
Steganography and Cryptography are two popular ways of sending vital information in a secret way. One hides the existence of the message and the other distorts the message itself. There are many cryptographic t...
Web Services Security Architectures using RoleBased Access Control
The Web Services Access controls are categorized according to access control granularity and have two approaches: The first approach supports a negotiation-based attribute-based access control to Web Servi...
Information Technology (IT) Security Management in Kenyan Small and Medium Enterprises (SMEs)
The aim of this paper is to study the management of Information Technology (IT) security in Kenyan Small and Medium Enterprises (SMEs). Particularly, this study looks at whether SMEs have a designated employee in charge...
DEVELOPMENT AND VALIDATION OF MEANINGFUL HYBRID E-TRAINING MODEL FOR COMPUTER EDUCATION
Meaningful hybrid e-training experience provides a coherent purpose for strategic educational change through lifelong education and the creation of a knowledge society. A close examination of new hybrid e-training progr...