ctakes-dev mailing list archives

Site index · List index
Message view « Date » · « Thread »
Top « Date » · « Thread »
From "Finan, Sean" <Sean.Fi...@childrens.harvard.edu>
Subject RE: Offline access
Date Mon, 16 May 2016 13:12:18 GMT
The agreement that the ctakes core group was able to achieve with the NLM (distributor of UMLS)
was that ctakes would check a user's access rights upon every use of any database derived
from the UMLS.  The reason for this was that the NLM did not want one valid UMLS user to download
the database and then distribute it for use by unaccredited third parties.  We have stuck
to that agreement.  Upon every initial load of either of the distributed ctakes dictionary
modules the user's entered password is checked online with the NLM user registry.  

I think that a great compromise would be if somebody could create a "remote checkout" tool,
something that checks-out a virtual license for use while you are on the road.  Maybe coordinate
with the NLM on getting such a thing approved.  As ctakes is open source software you could
start toying with such a client first.  To start, delegate to JdbcRareWordDictionary as does
the UmlsJdbcRareWordDictionary, and delegate to JdbcConceptFactory as does the UmlsJdbcConceptFactory
(for the -fast module).  Then point to the new trial "remote checkout" classes in your .xml
setup file (the default being cTakesHsql.xml).  However, do NOT use these classes directly
or in any production scenario as that would not abide by our agreement with the NLM.  Do not
even check them into sandbox without us getting a new agreement to use such a system with
the NLM.  I must emphasize that publicly doing so could cause us to lose our privileges to
distribute a default dictionary.  You would still be able to download your own UMLS database
and create your own dictionary for use with ctakes, but not every user can do that.  And when
creating your client code favor composition over inheritance as the remote checkout client
should not have IS-A, not that I can enforce anything that you do.  

I repeat, NEVER use the JdbcRareWordDictionary and/or JdbcConceptFactory directly unless you
are pointing to a database that was not created using the UMLS as a source.


-----Original Message-----
From: Geise, Brandon D. [mailto:bdgeise@geisinger.edu] 
Sent: Monday, May 16, 2016 8:01 AM
To: dev@ctakes.apache.org
Subject: RE: Offline access

I haven't tried it and is a guess based on reading the code, but you might be able to change
the dictionary implementation name in the xml file from UmlsJdbcRareWordDictionary to ConceptFactory,
since Umls factory implements from ConceptFactory.

-----Original Message-----
From: Miller, Timothy [mailto:Timothy.Miller@childrens.harvard.edu] 
Sent: Saturday, May 14, 2016 2:28 PM
To: dev@ctakes.apache.org
Subject: Re: Offline access

Well, before we had online verification ctakes required downloading umls, extracting the right
subset, and building a database for the dictionary tool. You can still do that - it is often
necessary for use cases that our default dictionary doesn't have coverage, and while I'm not
sure the state of documentation there have been several threads on the list about it. I think
if you do it this way you can skip the UMLS verification step (though I don't remember exactly
how that works) because you will have been verified at download time.

Can Sean or someone verify that this is true? If he builds his own dictionary (with the same
subsets) can he skip the online verification?

From: John Travis Green <john.travis.green@gmail.com>
Sent: Saturday, May 14, 2016 10:12 AM
To: dev@ctakes.apache.org
Subject: Offline access

I have a dod use case that requires offline umls verification. Anyone accomplish this yet?
I recall some chatter awhile back but initial flirtations with google were unsuccessful. thanks!John

IMPORTANT WARNING: The information in this message (and the documents attached to it, if any)
is confidential and may be legally privileged. It is intended solely for the addressee. Access
to this message by anyone else is unauthorized. If you are not the intended recipient, any
disclosure, copying, distribution or any action taken, or omitted to be taken, in reliance
on it is prohibited and may be unlawful. If you have received this message in error, please
delete all electronic copies of this message (and the documents attached to it, if any), destroy
any hard copies you may have created and notify me immediately by replying to this email.
Thank you.

Geisinger Health System utilizes an encryption process to safeguard Protected Health Information
and other confidential data contained in external e-mail messages. If email is encrypted,
the recipient will receive an e-mail instructing them to sign on to the Geisinger Health System
Secure E-mail Message Center to retrieve the encrypted e-mail.

View raw message