• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Zhang Xiaoyu, Li Dongdong, Ren Pengjie, Chen Zhumin, Ma Jun, Ren Zhaochun. Memory Networks Based Knowledge-Aware Medical Dialogue Generation[J]. Journal of Computer Research and Development, 2022, 59(12): 2889-2900. DOI: 10.7544/issn1000-1239.20210851
Citation: Zhang Xiaoyu, Li Dongdong, Ren Pengjie, Chen Zhumin, Ma Jun, Ren Zhaochun. Memory Networks Based Knowledge-Aware Medical Dialogue Generation[J]. Journal of Computer Research and Development, 2022, 59(12): 2889-2900. DOI: 10.7544/issn1000-1239.20210851

Memory Networks Based Knowledge-Aware Medical Dialogue Generation

Funds: This work was supported by the National Natural Science Foundation of China (61902219, 61972234, 62072279, 62102234), the Key Scientific and Technological Innovation Program of Shandong Province (2019JZZY010129), the Natural Science Foundation of Shandong Province(ZR202102230192),the Shandong University Multidisciplinary Research and Innovation Team of Young Scholars (2020QNQT017), the Tencent WeChat Rhino-Bird Focused Research Program (JR-WXG2021411), and the Fundamental Research Funds of Shandong University.
More Information
  • Published Date: November 30, 2022
  • Due to the shortage of medical resources, insufficient time and inconvenient travel, many patients can not get timely diagnosis or treatment. In this paper, a model named MKMed (knowledge-aware memory networks-based medical dialogue generation model) is proposed. It incorporates professional medical external knowledge to generate response. Concretely, the proposed model first tracks knowledge entities from dialogue history by exact word matching. Next, it performs a two-stage prediction in the external knowledge base to select medical entities and corresponding knowledge, which can be used in generating response. The two-stage prediction mainly uses methods for calculating co-occurrence matrix and cosine similarity between entities. Then it uses memory networks to store the information of knowledge and history. Finally, MKMed generates responses incorporating the stored information in the memory networks and uses recurrent neural network with attention mechanism. Experiments are carried out on a large-scale medical dialogue dataset with external knowledge, KaMed, which is a realistic dataset collected from the online platform. The experimental results indicate that the proposed model, MKMed, is significantly superior to the most baselines in terms of fluency, diversity, correctness and professionalism of response generation. This paper reveals that importing external knowledge with rational devised method is helpful for generating more precise and meaningful response.
  • Related Articles

    [1]Ge Zhenxing, Xiang Shuai, Tian Pinzhuo, Gao Yang. Solving GuanDan Poker Games with Deep Reinforcement Learning[J]. Journal of Computer Research and Development, 2024, 61(1): 145-155. DOI: 10.7544/issn1000-1239.202220697
    [2]Liu Qixu, Liu Jiaxi, Jin Ze, Liu Xinyu, Xiao Juxin, Chen Yanhui, Zhu Hongwen, Tan Yaokang. Survey of Artificial Intelligence Based IoT Malware Detection[J]. Journal of Computer Research and Development, 2023, 60(10): 2234-2254. DOI: 10.7544/issn1000-1239.202330450
    [3]Li Qian, Lin Chenhao, Yang Yulong, Shen Chao, Fang Liming. Adversarial Attacks and Defenses Against Deep Learning Under the Cloud-Edge-Terminal Scenes[J]. Journal of Computer Research and Development, 2022, 59(10): 2109-2129. DOI: 10.7544/issn1000-1239.20220665
    [4]Li Minghui, Jiang Peipei, Wang Qian, Shen Chao, Li Qi. Adversarial Attacks and Defenses for Deep Learning Models[J]. Journal of Computer Research and Development, 2021, 58(5): 909-926. DOI: 10.7544/issn1000-1239.2021.20200920
    [5]Chen Yufei, Shen Chao, Wang Qian, Li Qi, Wang Cong, Ji Shouling, Li Kang, Guan Xiaohong. Security and Privacy Risks in Artificial Intelligence Systems[J]. Journal of Computer Research and Development, 2019, 56(10): 2135-2150. DOI: 10.7544/issn1000-1239.2019.20190415
    [6]Cao Zhenfu. New Devolopment of Information Security——For the 60th Anniversary of Journal of Computer Research and Development[J]. Journal of Computer Research and Development, 2019, 56(1): 131-137. DOI: 10.7544/issn1000-1239.2019.20180756
    [7]Wang Yilei, Zhuo Yifan, Wu Yingjie, Chen Mingqin. Question Answering Algorithm on Image Fragmentation Information Based on Deep Neural Network[J]. Journal of Computer Research and Development, 2018, 55(12): 2600-2610. DOI: 10.7544/issn1000-1239.2018.20180606
    [8]Li Chao, Yin Lihua, Guo Yunchuan. Analysis for Probabilistic and Timed Information Flow Security Properties via ptSPA[J]. Journal of Computer Research and Development, 2011, 48(8): 1370-1380.
    [9]Wei Yong, Lian Yifeng, and Feng Dengguo. A Network Security Situational Awareness Model Based on Information Fusion[J]. Journal of Computer Research and Development, 2009, 46(3): 353-362.
    [10]Liu Guohua, Song Jinling, Huang Liming, Zhao Danfeng, Song Li. Measurement and Elimination of Information Disclosure in Publishing Views[J]. Journal of Computer Research and Development, 2007, 44(7): 1227-1235.
  • Cited by

    Periodical cited type(2)

    1. 邵子豪,霍如,王志浩,倪东,谢人超. 基于区块链的移动群智感知数据处理研究综述. 浙江大学学报(工学版). 2024(06): 1091-1106 .
    2. 赵贺贺,高鹏飞,张健明. 英式逆拍卖可以提高第三支柱养老保险市场效率吗?. 长沙民政职业技术学院学报. 2023(01): 74-80 .

    Other cited types(1)

Catalog

    Article views (222) PDF downloads (120) Cited by(3)

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return