Computing with nouns and verbs
The paper makes a case for expanding the range of words that Computing With Words
typically considers to, eventually, all the words in a natural language, thus accounting …
typically considers to, eventually, all the words in a natural language, thus accounting …
An entropy-based evaluation method for knowledge bases of medical information systems
In this paper we introduce a method to develop knowledge bases for medical decision
support systems, with a focus on evaluating such knowledge bases. Departing from earlier …
support systems, with a focus on evaluating such knowledge bases. Departing from earlier …
Ontological semantic technology for detecting insider threat and social engineering
This paper describes a computational system for detecting unintentional inferences in
casual unsolicited and unrestricted verbal output of individuals, potentially responsible for …
casual unsolicited and unrestricted verbal output of individuals, potentially responsible for …
Understanding the unknown: Unattested input processing in natural language
This paper describes the process of deriving the meaning of an unknown word within the
framework of meaning based natural language processing. It uses the clues supplied by the …
framework of meaning based natural language processing. It uses the clues supplied by the …
Ontological detection of phishing emails
Detection of phishing emails is a topic that received a lot of attention both from academia
and industry due to the devastating effects of phishing enabled data breaches have on …
and industry due to the devastating effects of phishing enabled data breaches have on …
Spam filtering by semantics-based text classification
Spam has been a serious and annoying problem for decades. Even though plenty of
solutions have been put forward, there still remains a lot to be promoted in filtering spam …
solutions have been put forward, there still remains a lot to be promoted in filtering spam …
From disambiguation failures to common-sense knowledge acquisition: A day in the life of an Ontological Semantic System
The paper describes a semi-automatic method of identifying common-sense knowledge by
running an ontological semantic system and focusing on its failures to interpret sentences …
running an ontological semantic system and focusing on its failures to interpret sentences …
Comparing machine and human ability to detect phishing emails
This paper compares the results of computer and human efforts to determine whether an
email is legitimate or a phishing attempt. For this purpose, we have run two series of …
email is legitimate or a phishing attempt. For this purpose, we have run two series of …
NL-based communication with firefighting robots
Firefighters put themselves in harm's way while saving others and may even lose their lives
in certain situations, such as toxic fumes, extreme heat, or inhaling smoke. In order to protect …
in certain situations, such as toxic fumes, extreme heat, or inhaling smoke. In order to protect …
Threat assessment using visual hierarchy and conceptual firearms ontology
The work that established and explored the links between visual hierarchy and conceptual
ontology of firearms for the purpose of threat assessment is continued. The previous study …
ontology of firearms for the purpose of threat assessment is continued. The previous study …