An entropy-based evaluation method for knowledge bases of medical information systems

CF Hempelmann, U Sakoglu, VP Gurupur… - Expert Systems with …, 2016 - Elsevier
In this paper we introduce a method to develop knowledge bases for medical decision
support systems, with a focus on evaluating such knowledge bases. Departing from earlier …

Ontological semantic technology for detecting insider threat and social engineering

V Raskin, JM Taylor, CF Hempelmann - Proceedings of the 2010 New …, 2010 - dl.acm.org
This paper describes a computational system for detecting unintentional inferences in
casual unsolicited and unrestricted verbal output of individuals, potentially responsible for …

Ontological detection of phishing emails

G Park, J Rayz - … Conference on Systems, Man, and Cybernetics …, 2018 - ieeexplore.ieee.org
Detection of phishing emails is a topic that received a lot of attention both from academia
and industry due to the devastating effects of phishing enabled data breaches have on …

Understanding the unknown: Unattested input processing in natural language

JM Taylor, V Raskin - … conference on fuzzy systems (fuzz-ieee …, 2011 - ieeexplore.ieee.org
This paper describes the process of deriving the meaning of an unknown word within the
framework of meaning based natural language processing. It uses the clues supplied by the …

Spam filtering by semantics-based text classification

W Hu, J Du, Y Xing - 2016 Eighth International Conference on …, 2016 - ieeexplore.ieee.org
Spam has been a serious and annoying problem for decades. Even though plenty of
solutions have been put forward, there still remains a lot to be promoted in filtering spam …

From disambiguation failures to common-sense knowledge acquisition: A day in the life of an Ontological Semantic System

JM Taylor, V Raskin… - 2011 IEEE/WIC/ACM …, 2011 - ieeexplore.ieee.org
The paper describes a semi-automatic method of identifying common-sense knowledge by
running an ontological semantic system and focusing on its failures to interpret sentences …

NL-based communication with firefighting robots

JH Hong, BC Min, JM Taylor, V Raskin… - … on Systems, Man …, 2012 - ieeexplore.ieee.org
Firefighters put themselves in harm's way while saving others and may even lose their lives
in certain situations, such as toxic fumes, extreme heat, or inhaling smoke. In order to protect …

Comparing machine and human ability to detect phishing emails

G Park, LM Stuart, JM Taylor… - 2014 IEEE International …, 2014 - ieeexplore.ieee.org
This paper compares the results of computer and human efforts to determine whether an
email is legitimate or a phishing attempt. For this purpose, we have run two series of …

[PDF][PDF] Towards computational guessing of unknown word meanings: The Ontological Semantic approach

JM Taylor, V Raskin… - Proceedings of the annual …, 2011 - escholarship.org
The paper describes a computational approach for guessing the meanings of previously
unaccounted words in an implemented system for natural language processing. Interested …

Detection and prevention of spam mail with semantics-based text classification of collaborative and content filtering

SP Shyry, YB Jinila - Journal of Physics: Conference Series, 2021 - iopscience.iop.org
Eventhough, conventional technologies are quiet good in separating spam messages, still
soo many measures have to be considered to make more accuracy in spam filtering. In this …