Transactions of the Association for Computational Linguistics, 2018
This work lays the foundation for automated assessments of narrative quality in student writing. ... more This work lays the foundation for automated assessments of narrative quality in student writing. We first manually score essays for narrative-relevant traits and sub-traits, and measure inter-annotator agreement. We then explore linguistic features that are indicative of good narrative writing and use them to build an automated scoring system. Experiments show that our features are more effective in scoring specific aspects of narrative quality than a state-of-the-art feature set.
ABSTRACT We used MetaMap and YTEX as a basis for the construc- tion of two separate systems to pa... more ABSTRACT We used MetaMap and YTEX as a basis for the construc- tion of two separate systems to participate in the 2013 ShARe/CLEF eHealth Task 1[9], the recognition of clinical concepts. No modifications were directly made to these systems, but output concepts were filtered using stop concepts, stop concept text and UMLS semantic type. Con- cept boundaries were also adjusted using a small collection of rules to increase precision on the strict task. Overall MetaMap had better per- formance than YTEX on the strict task, primarily due to a 20% perfor- mance improvement in precision. In the relaxed task YTEX had better performance in both precision and recall giving it an overall F-Score 4.6% higher than MetaMap on the test data. Our results also indicated a 1.3% higher accuracy for YTEX in UMLS CUI mapping.
In this paper, we address the problem of quantifying the overall extent to which a test-taker's e... more In this paper, we address the problem of quantifying the overall extent to which a test-taker's essay deals with the topic it is assigned (prompt). We experiment with a number of models for word topicality, and a number of approaches for aggregating word-level indices into text-level ones. All models are evaluated for their ability to predict the holistic quality of essays. We show that the best text-topicality model provides a significant improvement in a state-of-art essay scoring system. We also show that the findings of the relative merits of different models generalize well across three different datasets.
Abstract Evidence Based Medicine (EBM) is the practice of using the knowledge gained from the bes... more Abstract Evidence Based Medicine (EBM) is the practice of using the knowledge gained from the best medical evidence to make decisions in the effective care of patients. This medical evidence is extracted from medical documents such as research papers. The increasing number of available medical documents has imposed a challenge to identify the appropriate evidence and to access the quality of the evidence.
Abstract This paper describes our participation in the closed track of the* SEM 2012 Shared Task ... more Abstract This paper describes our participation in the closed track of the* SEM 2012 Shared Task of finding the scope of negation. To perform the task, we propose a system that has three components: negation cue detection, scope of negation detection, and negated event detection. In the first phase, the system creates a lexicon of negation signals from the training data and uses the lexicon to identify the negation cues.
Page 1. (--TH This Powe (version 2 commonly If you are template Verifying Go to the preferred siz... more Page 1. (--TH This Powe (version 2 commonly If you are template Verifying Go to the preferred size of the printed at look like w evaluate t submit yo Using the To add tex and type i click on it frame and Then, clic you can re be found o Modifying This temp column la mouse on click on “ layout op the provid advanced and then S Importing TEXT: Pas placehold side of the PHOTOS: in it and i TABLES: Y external d the way th been past SHAPE th MARGIN va Modifying To change “Design” m from the p your own.
Abstract Phishing sites have become a common approach to steal sensitive information, such as use... more Abstract Phishing sites have become a common approach to steal sensitive information, such as usernames, passwords and credit card details of the internet users. We propose a semisupervised machine learning approach to detect phishing URLs from a set of phishing and spam URLs. Spam emails are the source of these URLs. In reality, the number of phishing URLs received through these spam emails is fewer compared to other URLs.
Transactions of the Association for Computational Linguistics, 2018
This work lays the foundation for automated assessments of narrative quality in student writing. ... more This work lays the foundation for automated assessments of narrative quality in student writing. We first manually score essays for narrative-relevant traits and sub-traits, and measure inter-annotator agreement. We then explore linguistic features that are indicative of good narrative writing and use them to build an automated scoring system. Experiments show that our features are more effective in scoring specific aspects of narrative quality than a state-of-the-art feature set.
ABSTRACT We used MetaMap and YTEX as a basis for the construc- tion of two separate systems to pa... more ABSTRACT We used MetaMap and YTEX as a basis for the construc- tion of two separate systems to participate in the 2013 ShARe/CLEF eHealth Task 1[9], the recognition of clinical concepts. No modifications were directly made to these systems, but output concepts were filtered using stop concepts, stop concept text and UMLS semantic type. Con- cept boundaries were also adjusted using a small collection of rules to increase precision on the strict task. Overall MetaMap had better per- formance than YTEX on the strict task, primarily due to a 20% perfor- mance improvement in precision. In the relaxed task YTEX had better performance in both precision and recall giving it an overall F-Score 4.6% higher than MetaMap on the test data. Our results also indicated a 1.3% higher accuracy for YTEX in UMLS CUI mapping.
In this paper, we address the problem of quantifying the overall extent to which a test-taker's e... more In this paper, we address the problem of quantifying the overall extent to which a test-taker's essay deals with the topic it is assigned (prompt). We experiment with a number of models for word topicality, and a number of approaches for aggregating word-level indices into text-level ones. All models are evaluated for their ability to predict the holistic quality of essays. We show that the best text-topicality model provides a significant improvement in a state-of-art essay scoring system. We also show that the findings of the relative merits of different models generalize well across three different datasets.
Abstract Evidence Based Medicine (EBM) is the practice of using the knowledge gained from the bes... more Abstract Evidence Based Medicine (EBM) is the practice of using the knowledge gained from the best medical evidence to make decisions in the effective care of patients. This medical evidence is extracted from medical documents such as research papers. The increasing number of available medical documents has imposed a challenge to identify the appropriate evidence and to access the quality of the evidence.
Abstract This paper describes our participation in the closed track of the* SEM 2012 Shared Task ... more Abstract This paper describes our participation in the closed track of the* SEM 2012 Shared Task of finding the scope of negation. To perform the task, we propose a system that has three components: negation cue detection, scope of negation detection, and negated event detection. In the first phase, the system creates a lexicon of negation signals from the training data and uses the lexicon to identify the negation cues.
Page 1. (--TH This Powe (version 2 commonly If you are template Verifying Go to the preferred siz... more Page 1. (--TH This Powe (version 2 commonly If you are template Verifying Go to the preferred size of the printed at look like w evaluate t submit yo Using the To add tex and type i click on it frame and Then, clic you can re be found o Modifying This temp column la mouse on click on “ layout op the provid advanced and then S Importing TEXT: Pas placehold side of the PHOTOS: in it and i TABLES: Y external d the way th been past SHAPE th MARGIN va Modifying To change “Design” m from the p your own.
Abstract Phishing sites have become a common approach to steal sensitive information, such as use... more Abstract Phishing sites have become a common approach to steal sensitive information, such as usernames, passwords and credit card details of the internet users. We propose a semisupervised machine learning approach to detect phishing URLs from a set of phishing and spam URLs. Spam emails are the source of these URLs. In reality, the number of phishing URLs received through these spam emails is fewer compared to other URLs.
Uploads
Papers by Binod Gyawali