I haven't tried it and is a guess based on reading the code, but you might be able to change the dictionary implementation name in the xml file from UmlsJdbcRareWordDictionary to ConceptFactory, since Umls factory implements from ConceptFactory.
-----Original Message----- From: Miller, Timothy [mailto:timothy.mil...@childrens.harvard.edu] Sent: Saturday, May 14, 2016 2:28 PM To: dev@ctakes.apache.org Subject: Re: Offline access Well, before we had online verification ctakes required downloading umls, extracting the right subset, and building a database for the dictionary tool. You can still do that - it is often necessary for use cases that our default dictionary doesn't have coverage, and while I'm not sure the state of documentation there have been several threads on the list about it. I think if you do it this way you can skip the UMLS verification step (though I don't remember exactly how that works) because you will have been verified at download time. Can Sean or someone verify that this is true? If he builds his own dictionary (with the same subsets) can he skip the online verification? Thanks Tim ________________________________________ From: John Travis Green <john.travis.gr...@gmail.com> Sent: Saturday, May 14, 2016 10:12 AM To: dev@ctakes.apache.org Subject: Offline access I have a dod use case that requires offline umls verification. Anyone accomplish this yet? I recall some chatter awhile back but initial flirtations with google were unsuccessful. thanks!John IMPORTANT WARNING: The information in this message (and the documents attached to it, if any) is confidential and may be legally privileged. It is intended solely for the addressee. Access to this message by anyone else is unauthorized. If you are not the intended recipient, any disclosure, copying, distribution or any action taken, or omitted to be taken, in reliance on it is prohibited and may be unlawful. If you have received this message in error, please delete all electronic copies of this message (and the documents attached to it, if any), destroy any hard copies you may have created and notify me immediately by replying to this email. Thank you. Geisinger Health System utilizes an encryption process to safeguard Protected Health Information and other confidential data contained in external e-mail messages. If email is encrypted, the recipient will receive an e-mail instructing them to sign on to the Geisinger Health System Secure E-mail Message Center to retrieve the encrypted e-mail.