Binod Gyawali
Educational Testing Service, Research and Development, Department Member
- Computer Science, Machine Learning, Natural Language Processing, Syntactic and Semantic Knowledge, Bioinformatics, Signal Processing, and 8 moreMobile Computing, Data Mining, Text Mining, Computer Security, Network Security, Knowledge Representation and Reasoning, Cognitive Science, and Cognitive Psychologyedit
Abstract Evidence Based Medicine (EBM) is the practice of using the knowledge gained from the best medical evidence to make decisions in the effective care of patients. This medical evidence is extracted from medical documents such as... more
Abstract Evidence Based Medicine (EBM) is the practice of using the knowledge gained from the best medical evidence to make decisions in the effective care of patients. This medical evidence is extracted from medical documents such as research papers. The increasing number of available medical documents has imposed a challenge to identify the appropriate evidence and to access the quality of the evidence.
Abstract This paper describes our participation in the closed track of the* SEM 2012 Shared Task of finding the scope of negation. To perform the task, we propose a system that has three components: negation cue detection, scope of... more
Abstract This paper describes our participation in the closed track of the* SEM 2012 Shared Task of finding the scope of negation. To perform the task, we propose a system that has three components: negation cue detection, scope of negation detection, and negated event detection. In the first phase, the system creates a lexicon of negation signals from the training data and uses the lexicon to identify the negation cues.
Page 1. (--TH This Powe (version 2 commonly If you are template Verifying Go to the preferred size of the printed at look like w evaluate t submit yo Using the To add tex and type i click on it frame and Then, clic you can re be found o... more
Page 1. (--TH This Powe (version 2 commonly If you are template Verifying Go to the preferred size of the printed at look like w evaluate t submit yo Using the To add tex and type i click on it frame and Then, clic you can re be found o Modifying This temp column la mouse on click on “ layout op the provid advanced and then S Importing TEXT: Pas placehold side of the PHOTOS: in it and i TABLES: Y external d the way th been past SHAPE th MARGIN va Modifying To change “Design” m from the p your own.
Abstract Phishing sites have become a common approach to steal sensitive information, such as usernames, passwords and credit card details of the internet users. We propose a semisupervised machine learning approach to detect phishing... more
Abstract Phishing sites have become a common approach to steal sensitive information, such as usernames, passwords and credit card details of the internet users. We propose a semisupervised machine learning approach to detect phishing URLs from a set of phishing and spam URLs. Spam emails are the source of these URLs. In reality, the number of phishing URLs received through these spam emails is fewer compared to other URLs.
