Implementation and Evaluation of Four Different Methods of Negation Detection

نویسندگان

  • Sergey Goryachev
  • Margarita Sordo
  • Qing T. Zeng
چکیده

Negation status identification for findings or diagnoses is an important medical data mining problem. Negative qualifier assigned to a medical condition may indicate the absence of the condition, so the ability to reliably identify the negation status of medical concepts affects the quality of results produced by the indexing and search tools. Searching for the best negation algorithm to use in our negation module for the suite of NLP tools, we modified two existing regular expression-based algorithms in an attempt to improve their performance, and created two classification-based methods. The classification-based algorithms were trained on 1745 discharge reports from a Bostonbased hospital. The algorithms were evaluated on 100 randomly-chosen outpatient reports from two different Boston-based hospitals, and the results were compared to the gold standard created by two independent human reviewers. The regular expression and syntactic processingbased algorithms appeared to have better agreement (Kappa = 0.77 to 0.79) with the human reviewers than the classification-based algorithms (Kappa = 0.57 to 0.75). The accuracy of regular expressions methods (91.9-92.3%) was also higher than that of classification based methods (83.5-89.9%). Based on our results, we have selected NegEx algorithm for our negation module.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Hardwar Trojan classification and implementation and offer a new detection approach

A hardware attack that enables the attacker to alter the main circuit with malicious hardware during either design or the fabrication process is studied and analyzed. This attack, known as the hardware Trojan, has different objectives such as destroying hardware, changing circuit characteristics or extracting sensitive information. So hardware Trojan detection and hardware security are critical...

متن کامل

Extraction of Drug-Drug Interaction from Literature through Detecting Linguistic-based Negation and Clause Dependency

Extracting biomedical relations such as drug-drug interaction (DDI) from text is an important task in biomedical NLP. Due to the large number of complex sentences in biomedical literature, researchers have employed some sentence simplification techniques to improve the performance of the relation extraction methods. However, due to difficulty of the task, there is no noteworthy improvement in t...

متن کامل

A Novel Intrusion Detection Systems based on Genetic Algorithms-suggested Features by the Means of Different Permutations of Labels’ Orders

Intrusion detection systems (IDS) by exploiting Machine learning techniques are able to diagnose attack traffics behaviors. Because of relatively large numbers of features in IDS standard benchmark dataset, like KDD CUP 99 and NSL_KDD, features selection methods play an important role. Optimization algorithms like Genetic algorithms (GA) are capable of finding near-optimum combination of the fe...

متن کامل

Evaluation of immunomagnetic separation and the sucrose flotation methods coupled with immunofluorescence or PCR for detection of Cryptosporidium and Giardia (oo)cysts in water samples

Introduction: Detection of Cryptosporidium and Giardia parasites in water samples is usually performed by US Environmental Protection Agency 1623 method. Nevertheless, the USEPA1623 method still need improvement, to prevent and control the water borne parasitic disease. Therefore, we undertook the present study. Materials and methods: Totally 48 surface water samples were collected. Four sampl...

متن کامل

Evaluation of Clinical Trials

In a number of important clinical issues such as evaluation of the efficacy or effectiveness of therapeutic or preventive interventions as well as for comparing the harms of interventions, randomized controlled trials (RCTs) provide the highest levels of evidence, either directly or indirectly. It is obvious that critical appraisal of these studies to assess their validity and precision is of p...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007