ABSTRACT
Data extraction from files is a prevalent activity in today's electronic health record systems which can be laborious. When document analysis is repetitive (e.g., processing a series of files with the same layout and extraction requirements), relying on data-entry staff to manually perform such tasks is costly and highly insecure. Particularly analyzing a large list of PDF files (as a widely used format) to extract specific data and migrate them to other destinations for later use is both tedious and frustrating to do manually. This paper addresses a very practical requirement of batch extracting data from PDF files in health data document analysis and beyond. Specifically, we propose a Coordinate Based Information Extraction System (CBIES) to instrument a smart and automatic PDF batch data extraction tool, releasing health organizations from duplicate efforts and reducing labor costs. The proposed technique enables users to query a representative PDF document and extract the same data from a series of files in the batch analysis manner swiftly. Furthermore, since security and privacy considerations are essential part of any health record systems, it is included in our approach. Based on CBIES, we implement a prototype tool for PDF batch data extraction technique named, CyberPDF. The tool exhibits great efficiency, security and accuracy in multi-file data processing.
- B. Yildiz, K. Kaiser, S. Miksch, pdf2table: A Method to Extract Table Information from PDF Files, Proceedings of the 2nd Indian International Conference on Artificial Intelligence, 1773--1785 (2005).Google Scholar
- N A. Rosenberg, DISTRUCT: a program for the graphical display of population structure, Molecular Ecology Resources, 4(1), 137--138 (2004)Google Scholar
- L. Leurs, The history of PDF, Retrieved on, 9--19 (2007)Google Scholar
- D. Johnson, The 8 most popular document formats on the web, Retrieved, 2, 14--30 (2014)Google Scholar
- A L. DeFranco, R S. Schmidgall, Cash Budgets, Controls, and Management in Clubs, The Journal of Hospitality Financial Management, 25(2), 112--122 (2017)Google ScholarCross Ref
- C. Ramakrishnan, A. Patnia, E. Hovy, Layout-aware text extraction from full-text PDF of scientific articles, Source code for biology and medicine, 7(1), 7 (2012)Google Scholar
- D. Jiang, X. Yang, Converting PDF to HTML approach based on Text Detection, Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human, 982--985 (2009)Google Scholar
- M. Aiello, C.Monz, L.Todoran, M.Worring, Document understanding for a broad class of documents, International Journal on Document Analysis and Recognition, 5(1), 1--16 (2002)Google Scholar
- E. Bart, P.Sarkar, Information extraction by finding repeated structure, Proceedings of the 9th IAPR International Workshop on Document Analysis Systems, ACM, 175--182 (2010)Google Scholar
- KC. Santosh, A.Bela, Pattern-based approach to table extraction, Iberian Conference on Pattern Recognition and Image Analysis,Springer, 766--773 (2013)Google Scholar
- T. Hassan and R. Baumgartner, Table Recognition and Understanding from PDF Files, Ninth International Conference on Document Analysis and Recognition (ICDAR 2007), 1143--1147 (2007).Google ScholarCross Ref
- D. Maiorca, I. Corona, G. Giacinto, Looking at the bag is not enough to find the bomb: an evasion of structural methods for malicious pdf files detection, Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security, 119--130 (2013)Google Scholar
- A. Lin, S. Prish, S. Der, Associating captured image data with a spreadsheet, U.S. Patent, 9,042,653 (2015)Google Scholar
- G G Parker, Alstyne Van, Two-sided network effects: A theory of information product design, Management science, 51(10), 1494--1504 (2005)Google Scholar
- B C. Lear, C E. Merrill, J M. Lin, AG protein-coupled receptor, groom-of-PDF, is required for PDF neuron action in circadian behavior, Neuron, 48(2), 221--227 (2005)Google ScholarCross Ref
- Y. Aytar, A. Zisserman, Tabula rasa: Model transfer for object category detection, Proceedings of the IEEE International Conference on Computer Vision (ICCV). IEEE, 2252--2259 (2011)Google Scholar
- PDFBox A, Apache PDFBox (2017)Google Scholar
- C L R. MendonÃğa, A M R. Vincenzi, DÃvida TÃlcnica: um estudo de caso com produtos de cÃşdigo aberto, thesis (2014)Google Scholar
- Apache P O I, Java A P I, To Access Microsoft Format Files, http://poi.apache.org (2009)Google Scholar
- P. Gobin, H H. Hall, C R. Hauryluck, Web based integrated customer interface for invoice reporting, U.S. Patent, 6,745,229 (2004)Google Scholar
- A. Alorf, A L. Abbott, Improved Face and Head Detection Based on Traditional Middle Eastern Clothing, International Conference Image Analysis and Recognition, 389--398 (2017)Google Scholar
- Kruse, C. S., Smith, B., Vanderlinden, H., & Nealand, A. (2017). Security Techniques for the Electronic Health Records. Journal of Medical Systems, 41(8), 127. Google ScholarDigital Library
- S. Walker-Roberts, M. Hammoudeh and A. Dehghantanha, "A Systematic Review of the Availability and Efficacy of Countermeasures to Internal Threats in Healthcare Critical Infrastructure," in IEEE Access, vol. 6, pp. 25167--25177, 2018.Google Scholar
- W. Meng, K. K. R. Choo, S. Furnell, A. V. Vasilakos and C. W. Probst, "Towards Bayesian-Based Trust Management for Insider Attacks in Healthcare Software-Defined Networks," in IEEE Transactions on Network and Service Management, vol. 15, no. 2, pp. 761--773, 2018.Google Scholar
- Maiorca, D., Corona, I., & Giacinto, G. Looking at the bag is not enough to find the bomb: an evasion of structural methods for malicious pdf files detection. In Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security, pp. 119--130 (2013).Google Scholar
- Reza M. Parizi, Abdul Azim Ghani, Sai Peck Lee, and Saif Ur Khan. 2017. RAMBUTANS: automatic AOP-specific test generation tool. Int. J. Softw. Tools Technol. Transf. 19, 6 (November 2017), 743--761. Google ScholarDigital Library
- Reza M. Parizi, Abdul Azim Ghani, "Architectural Knowledge Sharing (AKS) Approaches: a Survey ResearchâĂİ, Journal of Theoretical and Applied Information Technology, 1224--1235 (2008).Google Scholar
Index Terms
- CyberPDF: smart and secure coordinate-based automated health PDF data batch extraction
Recommendations
Building Big Data Processing and Visualization Pipeline through Apache Zeppelin
PEARC '18: Proceedings of the Practice and Experience on Advanced Research ComputingBig data analytics pipeline becomes popular for large volume data processing, Apache Zeppelin provides an integrated environment for data ingestion, data discovery, data analytics and data visualization and collaboration with an extended framework which ...
Browser GUI for generating web data extraction rules in Ducky
iiWAS '15: Proceedings of the 17th International Conference on Information Integration and Web-based Applications & ServicesTo benefit from the invaluable data in the World Wide Web, manual extraction or creation of web scraping programs may be necessary. However, these processes can be tedious and complicated. To address these, we have proposed Ducky, which is a Web data ...
Problem-adaptable document analysis and understanding for high-volume applications
Although the Internet is increasingly emerging as “the” widespread platform for information interchange, day-to-day work in companies still necessitates the laborious, manual processing of huge amounts of printed documents. This article presents the ...
Comments