I haven't tried it and is a guess based on reading the code, but you might be 
able to change the dictionary implementation name in the xml file from 
UmlsJdbcRareWordDictionary to ConceptFactory, since Umls factory implements 
from ConceptFactory.

-----Original Message-----
From: Miller, Timothy [mailto:timothy.mil...@childrens.harvard.edu] 
Sent: Saturday, May 14, 2016 2:28 PM
To: dev@ctakes.apache.org
Subject: Re: Offline access

Well, before we had online verification ctakes required downloading umls, 
extracting the right subset, and building a database for the dictionary tool. 
You can still do that - it is often necessary for use cases that our default 
dictionary doesn't have coverage, and while I'm not sure the state of 
documentation there have been several threads on the list about it. I think if 
you do it this way you can skip the UMLS verification step (though I don't 
remember exactly how that works) because you will have been verified at 
download time.

Can Sean or someone verify that this is true? If he builds his own dictionary 
(with the same subsets) can he skip the online verification?
Thanks
Tim

________________________________________
From: John Travis Green <john.travis.gr...@gmail.com>
Sent: Saturday, May 14, 2016 10:12 AM
To: dev@ctakes.apache.org
Subject: Offline access

I have a dod use case that requires offline umls verification. Anyone 
accomplish this yet? I recall some chatter awhile back but initial flirtations 
with google were unsuccessful. thanks!John




IMPORTANT WARNING: The information in this message (and the documents attached 
to it, if any) is confidential and may be legally privileged. It is intended 
solely for the addressee. Access to this message by anyone else is 
unauthorized. If you are not the intended recipient, any disclosure, copying, 
distribution or any action taken, or omitted to be taken, in reliance on it is 
prohibited and may be unlawful. If you have received this message in error, 
please delete all electronic copies of this message (and the documents attached 
to it, if any), destroy any hard copies you may have created and notify me 
immediately by replying to this email. Thank you.

Geisinger Health System utilizes an encryption process to safeguard Protected 
Health Information and other confidential data contained in external e-mail 
messages. If email is encrypted, the recipient will receive an e-mail 
instructing them to sign on to the Geisinger Health System Secure E-mail 
Message Center to retrieve the encrypted e-mail.

Reply via email to