Toggle navigation
Home
About
About Journal
Historical Evolution
Indexed In
Awards
Reference Index
Editorial Board
Journal Online
Archive
Project Articles
Most Download Articles
Most Read Articles
Instruction
Contribution Column
Author Guidelines
Template
FAQ
Copyright Agreement
Expenses
Academic Integrity
Contact
Contact Us
Location Map
Subscription
Advertisement
中文
Journals
Publication Years
Keywords
Search within results
(((ZHANG Xiaomin[Author]) AND 1[Journal]) AND year[Order])
AND
OR
NOT
Title
Author
Institution
Keyword
Abstract
PACS
DOI
Please wait a minute...
For Selected:
Download Citations
EndNote
Ris
BibTeX
Toggle Thumbnails
Select
Web information extraction in health field
LI Rujun, ZHANG Jun, ZHANG Xiaomin, GUI Xiaoqing
Journal of Computer Applications 2016, 36 (
1
): 163-170. DOI:
10.11772/j.issn.1001-9081.2016.01.0163
Abstract
(
439
)
PDF
(1223KB)(
440
)
Knowledge map
Save
For the question how to apply the Web Information Extraction (WIE) technology to health field, a Web information extraction method based on WebHarvest was proposed. Through the structure analysis of different health Web sites and the design of health entity extraction rules, the automatic extraction algorithm of health entity and its attributes based on WebHarvest was realized; then they were stored in a relational database after consistency check; in the end, the values of entity attributes were analyzed to recognize entities by using processing method of natural language Ansj to extract relationship among entities. In the health entity extraction experiments, the average
F
-measure of the technology reached 99.9%; in the entity contact extraction experiments, the average
F
-measure reached 80.51%. The experimental results show that the proposed Web information extraction technology has high quality and credibility in the health information extraction.
Reference
|
Related Articles
|
Metrics
Select
Verifiable multi-secret sharing scheme based on linear one-way function
ZHANG Xiaomin
Journal of Computer Applications 2013, 33 (
05
): 1391-1393. DOI:
10.3724/SP.J.1087.2013.01391
Abstract
(
764
)
PDF
(481KB)(
644
)
Knowledge map
Save
Based on Shamir's threshold secret sharing scheme, the security of the linear one-way function and the difficulty of the discrete logarithm problem, a verifiable multi-secret sharing scheme was proposed.In this scheme, each participant needed just one secret share to share a set of secrets.Before recovering the secrets, participants could verify the correctness of the shadow shares provided by other participants.After recovering all of the secrets, the secret shares of the participants were still kept confidential and the secret shares could be used to share a new set of secrets.At the same time,the proposed scheme had fewer public parameters,and it did not require secure communication channels.
Reference
|
Related Articles
|
Metrics
Select
Optimization and improvement for Turbo product code decoding algorithm
LIU Zhao WEI Yanqing ZHANG Xiaoming
Journal of Computer Applications 2013, 33 (
02
): 397-399. DOI:
10.3724/SP.J.1087.2013.00397
Abstract
(
976
)
PDF
(483KB)(
437
)
Knowledge map
Save
The Chase2 algorithm is one of the soft-decision decoding algorithms of Turbo Product Code (TPC). The conventional Chase2 algorithm needs a large amount of computation to calculate the Euclidean distance and search for competing codeword, so it is complex to implement in the hardware. Therefore, on the basis of the conventional Chase2 algorithm, the correlation was substituted as the metric for the Euclidean distance and the process of searching for competing codeword was simplified to reduce the decoding complexity; and the soft-output value was adjusted when there was no competing codeword to improve the coding gain. The simulation results show that, compared with the conventional algorithm, the modified algorithm has better performance and faster decoding speed, and it is suitable for hardware implementation.
Related Articles
|
Metrics