the index of one of them only applied to the body of
both of them. Future work will involve:
1) Applying the relationship discovery
algorithm to longer relevant text.
2) Performing symmetric experiments by using
the index of Solomon’s textbook with the
text of Goodrich et al.’s textbook.
3) Integrating the two indexes into one index
and repeating the experiments.
4) Running experiments with human subjects
asking them to specify what the relationship
is between two strongly connected concepts.
5) In the intermediate term, implementing the
universal index processing program.
Overall, we are keeping the longer term goal in
mind of finding what the actual relationships are,
between the discovered pairs of concepts. Sentences
with pairs of strongly connected index terms are
likely to contain additional words that are indicative
of possible relationships. As noted, cases were
observed where an index term appeared in a
subsection title but nowhere in the subsection. Thus,
one needs to assume that human readers mentally
concatenate the index term with one or more
sentences of that subsection. This connection needs
to be recovered at all levels of the section hierarchy.
ACKNOWLEDGEMENTS
This work is partially funded by NSF grant
DUE1241687. We thank Pearson and Addison-
Wesley for making their textbooks available, and Dr.
Curtmola and Dr. Rohloff, our domain experts.
REFERENCES
An, Y. J., Geller, J., Wu, Y., Chun, S. A.. 2007, Automatic
Generation of Ontology from the Deep Web. Proc.
DEXA '07, Regensburg, Germany.
BioPortal, 2015. http://bioportal.bioontology.org/.
Bookstein A., Klein S.T., 1990. Information Retrieval
Tools for Literary Analysis, in Database and Expert
Systems Applications, edited by A M. Tjoa, Springer
Verlag, Vienna 1-7.
Caracciolo C., 2006. Designing and Implementing an
Ontology for Logic and Linguistics, Literary &
Linguistic Computing, vol. 21, pp. 29-39.
Choueka Y., Klein S.T., Neuvitz E., 1983. Automatic
Retrieval of Frequent Idiomatic and Collocational
Expressions in a Large Corpus, Journal Assoc.
Literary and Linguistic Computing, Vol. 4, 34-38.
Cimiano P., Hotho A., Staab S., 2005. Learning concept
hierarchies from text corpora using formal concept
analysis, J. Artif. Int. Res., vol. 24, pp. 305-339.
Cohen J., 1960. A coefficient of agreement for nominal
scales. Educational and Psychological Measurement
20 (1): 37–46. doi: 10.1177/001316446002000104.
Fenz S., Ekelhart A., 2009. Formalizing information
security knowledge, in Proc. of the 4th Int. Symposium
on Information, Computer, and Communications
Security, Sydney, Australia: ACM, 183 – 194.
Geller, J., Chun, S., and Wali, A., 2014. A Hybrid
Approach to Developing a Cyber Security Ontology.
In: Proc. of the 3rd Int. Conf. on Data Management
Technol. and Applicat., pp. 377-384, Vienna, Austria.
Geneiatakis D., Lambrinoudakis C., 2007. An ontology
description for SIP security flaws, Comput. Commun.,
vol. 30, pp. 1367-1374.
Goodrich M. T., Tamassia R., 2011. Introduction to
Computer Security, Addison Wesley.
Hearst M. A., 1992. Automatic acquisition of hyponyms
from large text corpora, in Proceedings of the 14th
conference on Computational linguistics – Vol. 2
Nantes, France: Assoc. for Computational Linguistics.
Herzog A., Shahmehri N., Duma C.. 2007. An Ontology
of Information Security, Information Security and
Privacy. 1(4), pp. 1-23.
Hindle D., 1990. Noun classification from predicate-
argument structures, in Proc. of the 28th Ann. Meeting
of Association for Computational Linguistics
Pittsburgh, Pennsylvania: Ass. for Comp. Linguistics.
Jain P., Hitzler P., Sheth A. P., Verma K., Yeh P. Z., 2013.
Ontology alignment for linked open data, in Proc. of
the 9th Int. Conference on the Semantic Web - Volume
Part I Shanghai, China: Springer-Verlag.
Katsurai M., Ogawa T., Haseyama M., 2014. A Cross-
Modal Approach for Extracting Semantic
Relationships Between Concepts Using Tagged
Images. IEEE Trans. on Multimedia 16(4):1059-1074.
Kullback S., Leibler R. A., 1951. On information and
sufficiency. Annals of Math. Statistics 22 (1): 79–86.
Lee C. H., Koo C., Na J. C., 2004. Automatic
Identification of Treatment Relations for Medical
Ontology Learning: An Exploratory Study. In
Knowledge Organization and the Global Information
Society: Proc. of the Eighth International ISKO
Conference. Ergon Verlag, Wurzburg, Germany, pp.
245-250.
Maedche A., Staab S., 2000. Mining Ontologies from
Text, in Knowledge Engineering and Knowledge
Management Methods, Models, and Tools, 12th
International Conference, EKAW 2000. Lecture Notes
in Computer Science, Volume 1937, pp. 189-202.
Meersman R., Tari Z., Kim A., Luo J., Kang M., 2005.
Security Ontology for Annotating Resources, in On
the Move to Meaningful Internet Systems 2005:
CoopIS, DOA, and ODBASE. vol. 3761: Springer, pp.
1483-99.
Musen M. A., Noy N.F., Shah N. H., Whetzel P. L., Chute
C.G., Story M.A., Smith B., NCBO team, 2012. The