Learn More
OBJECTIVES To automatically evaluate the quality of health information on the Internet, we presents a method for detecting indicators for quality of health information. METHODS An automatic indicator detection tool (AIDT) was developed in the following steps: (1) 18 initial technical criteria were chosen; (2) multiple measurable indicators were defined(More)
Privacy compliance for free text documents is a challenge facing many organizations. Named entity recognition techniques and machine learning methods can be used to detect private information, such as personally identifiable information (PII) and personal health information (PHI) in free text documents. However, these methods cannot measure the level of(More)
Simple clustering methods such as hierarchical clustering and k-means are widely used for gene expression data analysis; but they are unable to deal with noise and high dimensionality associated with the microarray gene expression data. Consensus clustering appears to improve the robustness and quality of clustering results. Incorporating prior knowledge in(More)
More and more public data sets which contain information about individuals are published in recent years. The urgency to reduce the risk of privacy disclosure from such data sets makes the approaches of privacy protection for data publishing widely employed. There are two popular models for privacy protection: k-anonymity and l-diversity. k-anonymity(More)
A rough mill production system is an unpredictable dynamic system for which the effects on production of many factors are strongly interrelated A dishibuted decision support system for dynamic jag (a load -of lumber) selection in defect sensitive production is proposed Case-Bosed Reasoning and heuristic rules determine recommended jags for cut-lists in the(More)
Consumers face barriers when seeking health information on the Internet. A Personalized Health Information Retrieval System (PHIRS) is proposed to recommend health information for consumers. The system consists of four modules: (1) User modeling module captures user inverted exclamation mark s preference and health interests; (2) Automatic quality filtering(More)
With the growing use of computers and the Internet, it has become difficult for organizations to locate and effectively manage sensitive personally identifiable information (PII). This problem becomes even more evident in collaborative computing environments. PII may be hidden anywhere within the file system of a computer. As well, in the course of(More)