D.Sailaja, K.Nasaramma, M.Sumender Roy, Venkateswarlu Bondu

Size: px
Start display at page:

Download "D.Sailaja, K.Nasaramma, M.Sumender Roy, Venkateswarlu Bondu"

Transcription

1 Predictive Modeling of Customers in Personalization Alications with Context D.Sailaja, K.Nasaramma, M.Sumender Roy, Venkateswarlu Bondu Nasaramma.K is currently ursuing her M.Tech in Godavari Institute of Engineering and Technology. Rajahmundry, India Sailaja.D is currently ursuing her M.Tech in Avanti Grou of Colleges, Visakhaatnam, India. Sumender Roy is currently working as Professor in Godavari Institute of Engineering and Technology. Rajahmundry, India. Venkateswarlu Bondu ursuing Ph.D in Comuter Science in Andhra University. Abstract--- The idea that context is imortant when redicting customer behavior has been maintained by scholars in marketing and data mining. However, no systematic study measuring how much the contextual information really matters in building customer models in ersonalization alications has been done before. In this roject, we show how imortant the contextual information is when redicting customer behavior and how to use it when building customer models. It is done by conducting an emirical study across a wide range of exerimental conditions. The exerimental results show that context does matter when modeling the behavior of individual customers. These findings have significant imlications for data miners and marketers. They show that contextual information does matter in ersonalization and comanies have different oortunities to make context valuable for imroving redictive erformance of customers behavior. Index Terms Personalization, Context, Data Mining, User Modeling, Predictive Modeling.. INTRODUCTION:. Introduction to Project: Contextual information indeed makes a significant difference in building better customer models in marketing and e-commerce alications. In this roject, we address the question of whether this additional contextual information matters, i.e., does it lead to building better ersonalized models of customer behavior, where by better we assume suerior redictive erformance. This roblem is not trivial because it entails a tradeoff between transaction homogeneity and data sarsity: by roviding contextual information, customer transactions ertaining to this articular context are reduced, making fewer data oints to fit the model, while homogeneity of these transactions increases, making it easier to redict more accurately customer behavior in similar contexts. In data mining terms, this roblem is related to the well-known biasvariance tradeoff, i.e., given contextual information, which effect dominates the other: decreased bias due to the homogeneity of transactions associated with the secified context or increased variance due to insufficient data associated with this context. Therefore the research question that we just described can be summarized as follows: Does context matter for building better models to redicting customer behavior? In this aer, we answer the question emirically by conducting an emirical study on data set across a wide range of exerimental conditions. To answer the question, we built two alternative customer models, one including contextual information and the other one not, and comared their redictive erformances. This study makes the following contributions to studying context in ersonalization alications. First, we demonstrate that context indeed matters when redicting customer behavior for whole or small homogenous grous of customers and gets diluted during the rocess of aggregating customers data. Finally, the context is taking externally, and then used for redicting customer s behavior. We show that the resulting model significantly outerforms the basic uncontextual model..2 Introduction to modules:.2. Collecting dataset externally..2.2 Clustering the data..2.3 Aly redictive modeling on datasets and clusters. 34 P a g e

2 .2. Collecting dataset externally: The exeriment has been conducted on e-retailer dataset which is created by us. For each customer, the following demograhic data were added: age, revious studies, marital status, comosition of the family, lace of living, hobbies, and whether the customer owned a car. The transactional data include: item urchased, rice, day, time, session duration, number of clicks er connection, and the time elased for the web age..2.2 Clustering the data: Aly K-mean clustering algorithm on dataset and divide into clusters: cluster, cluster2 and cluster Aly redictive modeling on dataset and clusters: Aly Naive-Bayes classification algorithm to redict customer behavior on whole dataset and each clusters are cluster, cluster2 and cluster3. 2. PROBLEM FORMULATION: In our roject, first exlain what we mean by context, then how we model customer behavior, and finally, the methodology for comaring contextual and uncontextual models. 2. What Is Context? Many definitions of context can be found in the literature deending on the field of alication, enabling technologies, and the available customer data. The Webster s dictionary defines context as conditions or circumstances which affect something. In the data mining community, context is defined as those events that characterize the life of a customer and can determine a change in his/her references, status, and value for a comany. Examles of context include a new job, the birth of a son, marriage, divorce, and retirement. In the contextaware systems literature, context was initially defined as the location of the user, the identity of eole near the user, the objects around, and the changes in these elements. Other factors have been added to the revious definition. For instance, includes the date, the season, and the temerature. Add the hysical and concetual statuses of interest for a user and include the user s emotional status and broaden the definition to any information that can characterize and is relevant to the interaction between a user and an alication. Some associate the context with the user, while others emhasize how context relates to the alication? Context has temoral (when to deliver), satial (where), and technological (how) dimensions. Context is usually referred to the resent situation, but sometimes the history of ast is considered as well. In this aer, context is defined as the intent of a urchase made by a customer in an e-commerce alication. Different urchasing intents may lead to different tyes of behavior. For examle, the same customer may buy from the same online account different roducts for different reasons: a book for imroving her ersonal work skills, a book as a gift, or an electronic device for her hobby. In general, the context in which a customer erforms a transaction is defined with a set of contextual attributes K that can have a comlicated structure reflecting the comlex nature of this information. Each contextual attribute K in K is defined by a set of q attributes: K = (K;...;Kq) contextual attribute K secifying the intent of a urchasing transaction in an e-retailer alication, considered. K is ersonal context: ersonal urchase made for the work-related or other uroses. Similarly, the Gift value for K can be slit into a gift for a artner or a friend and a gift for arents or others. Thus, K= {PersonalWork; PersonalOther; GiftPartner/Friend; Gift Parent/ Other}. Finally, attribute K to be taken. 2.2 Customer Modeling: Let C be the customer base reresented by N customers. Each customer C i is defined by the set of m demograhic attributes A ={ A ;A 2 ;...;A m }, and a set of r transactions Trans(C i )={ TR i ; TR i2 ;... ; TR ir }, where each transaction TR ij erformed by customer C i is defined by a set of transactional attributes T ={T ; T 2 ;... ; T }. In addition, we also have contextual information K associated with each transaction TR ir, in Fig. reresents a fragment of the customer table containing demograhic, transactional, and contextual information about the customer C i. For examle, customer C i can be defined by demograhic attributes A= {IDuser; Name; Age; Income}, by five transactions Trans(C i )={TR ; TR 2 ; TR 3 ; TR 4 ; TR 5 }, each transaction defined by the transactional attributes: T ={ ProductID; StoreID; Price; TransactionTime}. In general, however, we suort multile contextual attributes. Finally, the customer base C can be artitioned into several segments by comuting summary statistic S for customer C i over the transactions Trans(C i )={TR i ; TR i2 ;... ; TR ik } made by that customer using statistical aggregation and moment function, such as mean. For instance, for the transactions made by the customers in the revious examle, the statistic can be S = {Average rice}. This means, among other things, that each customer C i has a unique summary statistic S and that a customer is reresented with a unique oint in the sace of these summary statistics. After generating such a data oint er customer in the 35 P a g e

3 sace of statistics S, customers can be clustered into grous (segments) in that sace using the K-Means clustering technique. Given segment α, of k customers C ;... ; C k, and their resective demograhic A i ={ A i ; A i2 ;...;A im } and transactional data Trans(C i )={ TR i ; TR i2 ;... ; TR ik } for customers i in α, we want to build a single redictive model M α on this segment of customers α : Y =f(x ;X 2 ;...;X );..(); where deendent variable Y is one of the transactional attributes T j, and indeendent variables X ;X 2 ;..;X are all the transactional and demograhic variables, excet variable T j, i.e., they form the set T A T j. The erformance of model M α can be measured using some fitness function f maing the data of this grou of customers α into real, i.e., f( α ) Є R. For examle, model M α can be a decision tree built on data α of customers C ;... ; C k, for the urose of redicting T j variable time of urchase using all the transactional and demograhic variables, excet variable T j as indeendent variables. The fitness function f of model M α can be its redictive accuracy on the outof-samle data. The redictive models do not assume any contextual information since the contextual variable K is not a art of the model. Therefore, we call the model of this tye uncontextual. We define contextual counterarts of redictive model (), where the model takes the following form: Demograhic Attributes A Transactional Attributes T Y =f Kq=a (X ;X 2 ;...;X ); (2) Context K A A m T T K K q TR j A j A jm T j. TR j2 A j A jm T j2. TR jr A j A jm T jr. T j. T j2. T jr.... transactions associated with a articular value of the context attribute K q =α are used for building the model. In this case, the contextual information is used as a label for filtering customer transactions and then droed variable, such as the demograhic and transactional attributes X ;X 2 ;..;X. This means that it is used as one of the attributes for redicting Y.One interesting question when building contextual models is where to lace urchasing transactions of customer C when she bought a gift for customer C 2 : should such a transaction be associated with the urchasing history of customer C or C 2? In this aer, we associate such urchases with customer C and not C 2 for the following reasons: First, these urchases reflect ercetions of customer C about what customer C 2 needs, not the real traits and needs of customer C 2. Second, even though the user may want to interret exectations and references of another individual, it would be very unusual to model behavior of a erson by observing the behavior of another individual. Third, when building a model for customer C, the demograhical and transactional data used in this behavioral model are those related to customer C. One way to handle this roblem of gifts is to define an aroriate context of gifts and urchases for others and treat such urchasing behavior in these contexts. This rovides for extra flexibility because we can treat such urchasing transactions differently in different contexts. For answering the research question (Does context matter?), a comarison between erformance results of redictive models is erformed for the uncontextual () and the contextual (2) models across a wide range of exerimental conditions can be secified by relacing the deendent variable Y in () with the context variable K as K q =f (X ;X 2 ;...;X ); (3). In model (3), the deendent variable is the contextual information. One contextual attribute is inferred at a time. For model (3), f is a redictive function learned via naïve bayes model. 2.3 Figures: Demograhic, transactional, and contextual information about the customers and their transactions.: Fig. Where the model 2 constitute the way of creating a contextual model. Model 2 indicates that only Grahical reresentation of the redictive model: 36 P a g e

4 Fig Results: 3. Does Context Matter? To give a flavor of the results, given the exeriment settings (contextual information, data set, one classifier, two deendent variables)., the below figures resents three grahs generated by lotting the values of the e-retailer data set for contextual information and uncontextual. The grahs are resented in the order of rogressively more refined contextual information. Moreover, most of the contextual models show a better redictive erformance comared to the uncontextual, excet for some cases where the difference is very small. Although for these charts the curves are not always monotonic, the redictive erformance of the contextual models is usually higher than that of the uncontextual model. Analyzing and comaring the erformance curves, the first evident result shows the uncontextual model is always below the other two contextual models. It means that, indeendently from the level of analysis, and from the exerimental settings, gathering contextual information gives better results in terms of customers behavior redictions. Another interesting oint is the monotonic shae of each erformance curve. The results shows better results in context comared to uncontextual in three different stores (store00, store0, and store02). In three stores shows context is better comared to uncontext in two tyes of charts (curve, bar). 37 P a g e

5 Is it necessary to acquire contextual information or is it ossible to infer it from the data? How do we exloit the inferred contextual information for modeling customer behavior? The exeriments will be conducted redicting different transactional variable Y, using more classifier algorithms f, considering more levels of market granularity through finer segments, and generating more contextual models using the further sublevels of the ersonal and gift shoing mode variables. 5. BIBOLOGRAPHY:. Using Context to Imrove Predictive Modeling of Customers in Personalization Alications. Cosimo Palmisano, Alexander Tuzhilin, Michele Gorgoglione. IEEE Transaction on Knowledge and Data Engineering. 4. CONCLUSION & FUTURE WORK: 4. Conclusion: This work has been conducted a comarative study of contextual and un-contextual models across multile dimension of analysis such as the context variable, classifier algorithm and different tyes of metrics. This analysis has been erformed with the aim of demonstrating the relevance of the context in building customer rofiles. Our results show that, in different exerimental settings, the contextual model, in general, outerforms the un-contextual one; this overcome is more relevant. This underlines the fact that the context matters in building customers urchasing rofiles and it should be of great effectiveness if alied for building ersonalized recommendation in the e-commerce environment. 2. Data Mining Concets and Techniques.- Han & Kamber. 3. Increasing Customer Value by Integrating DataMining and Camaign Management Software, Direct Marketing Magazine, Feb, Data Mining: Introductory and Advanced Toics Margaret Dunham. Prentice Hall, Mining the e-commerce data to analyze the target customer behavior. Yuantao Jiang, Siqin Yu. 6. Java Comlete Reference. Herbert Schildt. 7. Unified Modeling Language. Grady Booch. 8. htt:// Further research will be held making more comlex the exerimental settings in order to give more emirical evidence of the results. And will rove two more questions for better redicting 38 P a g e

Evaluating a Web-Based Information System for Managing Master of Science Summer Projects

Evaluating a Web-Based Information System for Managing Master of Science Summer Projects Evaluating a Web-Based Information System for Managing Master of Science Summer Projects Till Rebenich University of Southamton tr08r@ecs.soton.ac.uk Andrew M. Gravell University of Southamton amg@ecs.soton.ac.uk

More information

Synopsys RURAL ELECTRICATION PLANNING SOFTWARE (LAPER) Rainer Fronius Marc Gratton Electricité de France Research and Development FRANCE

Synopsys RURAL ELECTRICATION PLANNING SOFTWARE (LAPER) Rainer Fronius Marc Gratton Electricité de France Research and Development FRANCE RURAL ELECTRICATION PLANNING SOFTWARE (LAPER) Rainer Fronius Marc Gratton Electricité de France Research and Develoment FRANCE Synosys There is no doubt left about the benefit of electrication and subsequently

More information

Risk and Return. Sample chapter. e r t u i o p a s d f CHAPTER CONTENTS LEARNING OBJECTIVES. Chapter 7

Risk and Return. Sample chapter. e r t u i o p a s d f CHAPTER CONTENTS LEARNING OBJECTIVES. Chapter 7 Chater 7 Risk and Return LEARNING OBJECTIVES After studying this chater you should be able to: e r t u i o a s d f understand how return and risk are defined and measured understand the concet of risk

More information

On the predictive content of the PPI on CPI inflation: the case of Mexico

On the predictive content of the PPI on CPI inflation: the case of Mexico On the redictive content of the PPI on inflation: the case of Mexico José Sidaoui, Carlos Caistrán, Daniel Chiquiar and Manuel Ramos-Francia 1 1. Introduction It would be natural to exect that shocks to

More information

Failure Behavior Analysis for Reliable Distributed Embedded Systems

Failure Behavior Analysis for Reliable Distributed Embedded Systems Failure Behavior Analysis for Reliable Distributed Embedded Systems Mario Tra, Bernd Schürmann, Torsten Tetteroo {tra schuerma tetteroo}@informatik.uni-kl.de Deartment of Comuter Science, University of

More information

Electronic Commerce Research and Applications

Electronic Commerce Research and Applications Electronic Commerce Research and Alications 12 (2013) 246 259 Contents lists available at SciVerse ScienceDirect Electronic Commerce Research and Alications journal homeage: www.elsevier.com/locate/ecra

More information

THE director of personalization of one of the major

THE director of personalization of one of the major IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 20, NO. 11, NOVEMBER 2008 1535 Using Context to Improve Predictive Modeling of Customers in Personalization Applications Cosimo Palmisano, Member,

More information

The Online Freeze-tag Problem

The Online Freeze-tag Problem The Online Freeze-tag Problem Mikael Hammar, Bengt J. Nilsson, and Mia Persson Atus Technologies AB, IDEON, SE-3 70 Lund, Sweden mikael.hammar@atus.com School of Technology and Society, Malmö University,

More information

The impact of metadata implementation on webpage visibility in search engine results (Part II) q

The impact of metadata implementation on webpage visibility in search engine results (Part II) q Information Processing and Management 41 (2005) 691 715 www.elsevier.com/locate/inforoman The imact of metadata imlementation on webage visibility in search engine results (Part II) q Jin Zhang *, Alexandra

More information

Buffer Capacity Allocation: A method to QoS support on MPLS networks**

Buffer Capacity Allocation: A method to QoS support on MPLS networks** Buffer Caacity Allocation: A method to QoS suort on MPLS networks** M. K. Huerta * J. J. Padilla X. Hesselbach ϒ R. Fabregat O. Ravelo Abstract This aer describes an otimized model to suort QoS by mean

More information

Analysis of Effectiveness of Web based E- Learning Through Information Technology

Analysis of Effectiveness of Web based E- Learning Through Information Technology International Journal of Soft Comuting and Engineering (IJSCE) Analysis of Effectiveness of Web based E- Learning Through Information Technology Anand Tamrakar, Kamal K. Mehta Abstract-Advancements of

More information

Time-Cost Trade-Offs in Resource-Constraint Project Scheduling Problems with Overlapping Modes

Time-Cost Trade-Offs in Resource-Constraint Project Scheduling Problems with Overlapping Modes Time-Cost Trade-Offs in Resource-Constraint Proect Scheduling Problems with Overlaing Modes François Berthaut Robert Pellerin Nathalie Perrier Adnène Hai February 2011 CIRRELT-2011-10 Bureaux de Montréal

More information

Index Numbers OPTIONAL - II Mathematics for Commerce, Economics and Business INDEX NUMBERS

Index Numbers OPTIONAL - II Mathematics for Commerce, Economics and Business INDEX NUMBERS Index Numbers OPTIONAL - II 38 INDEX NUMBERS Of the imortant statistical devices and techniques, Index Numbers have today become one of the most widely used for judging the ulse of economy, although in

More information

An Efficient Method for Improving Backfill Job Scheduling Algorithm in Cluster Computing Systems

An Efficient Method for Improving Backfill Job Scheduling Algorithm in Cluster Computing Systems The International ournal of Soft Comuting and Software Engineering [SCSE], Vol., No., Secial Issue: The Proceeding of International Conference on Soft Comuting and Software Engineering 0 [SCSE ], San Francisco

More information

Jena Research Papers in Business and Economics

Jena Research Papers in Business and Economics Jena Research Paers in Business and Economics A newsvendor model with service and loss constraints Werner Jammernegg und Peter Kischka 21/2008 Jenaer Schriften zur Wirtschaftswissenschaft Working and Discussion

More information

DAY-AHEAD ELECTRICITY PRICE FORECASTING BASED ON TIME SERIES MODELS: A COMPARISON

DAY-AHEAD ELECTRICITY PRICE FORECASTING BASED ON TIME SERIES MODELS: A COMPARISON DAY-AHEAD ELECTRICITY PRICE FORECASTING BASED ON TIME SERIES MODELS: A COMPARISON Rosario Esínola, Javier Contreras, Francisco J. Nogales and Antonio J. Conejo E.T.S. de Ingenieros Industriales, Universidad

More information

Comparing Dissimilarity Measures for Symbolic Data Analysis

Comparing Dissimilarity Measures for Symbolic Data Analysis Comaring Dissimilarity Measures for Symbolic Data Analysis Donato MALERBA, Floriana ESPOSITO, Vincenzo GIOVIALE and Valentina TAMMA Diartimento di Informatica, University of Bari Via Orabona 4 76 Bari,

More information

Monitoring Frequency of Change By Li Qin

Monitoring Frequency of Change By Li Qin Monitoring Frequency of Change By Li Qin Abstract Control charts are widely used in rocess monitoring roblems. This aer gives a brief review of control charts for monitoring a roortion and some initial

More information

ENFORCING SAFETY PROPERTIES IN WEB APPLICATIONS USING PETRI NETS

ENFORCING SAFETY PROPERTIES IN WEB APPLICATIONS USING PETRI NETS ENFORCING SAFETY PROPERTIES IN WEB APPLICATIONS USING PETRI NETS Liviu Grigore Comuter Science Deartment University of Illinois at Chicago Chicago, IL, 60607 lgrigore@cs.uic.edu Ugo Buy Comuter Science

More information

An important observation in supply chain management, known as the bullwhip effect,

An important observation in supply chain management, known as the bullwhip effect, Quantifying the Bullwhi Effect in a Simle Suly Chain: The Imact of Forecasting, Lead Times, and Information Frank Chen Zvi Drezner Jennifer K. Ryan David Simchi-Levi Decision Sciences Deartment, National

More information

Forensic Science International

Forensic Science International Forensic Science International 214 (2012) 33 43 Contents lists available at ScienceDirect Forensic Science International jou r nal h o me age: w ww.els evier.co m/lo c ate/fo r sc iin t A robust detection

More information

The predictability of security returns with simple technical trading rules

The predictability of security returns with simple technical trading rules Journal of Emirical Finance 5 1998 347 359 The redictability of security returns with simle technical trading rules Ramazan Gençay Deartment of Economics, UniÕersity of Windsor, 401 Sunset, Windsor, Ont.,

More information

Partial-Order Planning Algorithms todomainfeatures. Information Sciences Institute University ofwaterloo

Partial-Order Planning Algorithms todomainfeatures. Information Sciences Institute University ofwaterloo Relating the Performance of Partial-Order Planning Algorithms todomainfeatures Craig A. Knoblock Qiang Yang Information Sciences Institute University ofwaterloo University of Southern California Comuter

More information

Rejuvenating the Supply Chain by Benchmarking using Fuzzy Cross-Boundary Performance Evaluation Approach

Rejuvenating the Supply Chain by Benchmarking using Fuzzy Cross-Boundary Performance Evaluation Approach ICSI International Journal of Engineering and echnology, Vol.2, o.6, December 2 ISS: 793-8236 Rejuvenating the Suly Chain by Benchmarking using uzzy Cross-Boundary erformance Evaluation roach RU SUIL BIDU,

More information

Design of A Knowledge Based Trouble Call System with Colored Petri Net Models

Design of A Knowledge Based Trouble Call System with Colored Petri Net Models 2005 IEEE/PES Transmission and Distribution Conference & Exhibition: Asia and Pacific Dalian, China Design of A Knowledge Based Trouble Call System with Colored Petri Net Models Hui-Jen Chuang, Chia-Hung

More information

A Modified Measure of Covert Network Performance

A Modified Measure of Covert Network Performance A Modified Measure of Covert Network Performance LYNNE L DOTY Marist College Deartment of Mathematics Poughkeesie, NY UNITED STATES lynnedoty@maristedu Abstract: In a covert network the need for secrecy

More information

An inventory control system for spare parts at a refinery: An empirical comparison of different reorder point methods

An inventory control system for spare parts at a refinery: An empirical comparison of different reorder point methods An inventory control system for sare arts at a refinery: An emirical comarison of different reorder oint methods Eric Porras a*, Rommert Dekker b a Instituto Tecnológico y de Estudios Sueriores de Monterrey,

More information

C-Bus Voltage Calculation

C-Bus Voltage Calculation D E S I G N E R N O T E S C-Bus Voltage Calculation Designer note number: 3-12-1256 Designer: Darren Snodgrass Contact Person: Darren Snodgrass Aroved: Date: Synosis: The guidelines used by installers

More information

On-the-Job Search, Work Effort and Hyperbolic Discounting

On-the-Job Search, Work Effort and Hyperbolic Discounting On-the-Job Search, Work Effort and Hyerbolic Discounting Thomas van Huizen March 2010 - Preliminary draft - ABSTRACT This aer assesses theoretically and examines emirically the effects of time references

More information

for UK industrial and scientific companies managed by Business Marketing Online

for UK industrial and scientific companies managed by Business Marketing Online for UK industrial and scientific comanies managed by Business Marketing Online This is a Google AdWords advertisement and so is this... and so is this......advertising with Google Adwords is now essential.

More information

Managing specific risk in property portfolios

Managing specific risk in property portfolios Managing secific risk in roerty ortfolios Andrew Baum, PhD University of Reading, UK Peter Struemell OPC, London, UK Contact author: Andrew Baum Deartment of Real Estate and Planning University of Reading

More information

Machine Learning with Operational Costs

Machine Learning with Operational Costs Journal of Machine Learning Research 14 (2013) 1989-2028 Submitted 12/11; Revised 8/12; Published 7/13 Machine Learning with Oerational Costs Theja Tulabandhula Deartment of Electrical Engineering and

More information

Storage Basics Architecting the Storage Supplemental Handout

Storage Basics Architecting the Storage Supplemental Handout Storage Basics Architecting the Storage Sulemental Handout INTRODUCTION With digital data growing at an exonential rate it has become a requirement for the modern business to store data and analyze it

More information

Web Application Scalability: A Model-Based Approach

Web Application Scalability: A Model-Based Approach Coyright 24, Software Engineering Research and Performance Engineering Services. All rights reserved. Web Alication Scalability: A Model-Based Aroach Lloyd G. Williams, Ph.D. Software Engineering Research

More information

CRITICAL AVIATION INFRASTRUCTURES VULNERABILITY ASSESSMENT TO TERRORIST THREATS

CRITICAL AVIATION INFRASTRUCTURES VULNERABILITY ASSESSMENT TO TERRORIST THREATS Review of the Air Force Academy No (23) 203 CRITICAL AVIATION INFRASTRUCTURES VULNERABILITY ASSESSMENT TO TERRORIST THREATS Cătălin CIOACĂ Henri Coandă Air Force Academy, Braşov, Romania Abstract: The

More information

Alpha Channel Estimation in High Resolution Images and Image Sequences

Alpha Channel Estimation in High Resolution Images and Image Sequences In IEEE Comuter Society Conference on Comuter Vision and Pattern Recognition (CVPR 2001), Volume I, ages 1063 68, auai Hawaii, 11th 13th Dec 2001 Alha Channel Estimation in High Resolution Images and Image

More information

CABRS CELLULAR AUTOMATON BASED MRI BRAIN SEGMENTATION

CABRS CELLULAR AUTOMATON BASED MRI BRAIN SEGMENTATION XI Conference "Medical Informatics & Technologies" - 2006 Rafał Henryk KARTASZYŃSKI *, Paweł MIKOŁAJCZAK ** MRI brain segmentation, CT tissue segmentation, Cellular Automaton, image rocessing, medical

More information

c 2009 Je rey A. Miron 3. Examples: Linear Demand Curves and Monopoly

c 2009 Je rey A. Miron 3. Examples: Linear Demand Curves and Monopoly Lecture 0: Monooly. c 009 Je rey A. Miron Outline. Introduction. Maximizing Pro ts. Examles: Linear Demand Curves and Monooly. The Ine ciency of Monooly. The Deadweight Loss of Monooly. Price Discrimination.

More information

The Advantage of Timely Intervention

The Advantage of Timely Intervention Journal of Exerimental Psychology: Learning, Memory, and Cognition 2004, Vol. 30, No. 4, 856 876 Coyright 2004 by the American Psychological Association 0278-7393/04/$12.00 DOI: 10.1037/0278-7393.30.4.856

More information

Static and Dynamic Properties of Small-world Connection Topologies Based on Transit-stub Networks

Static and Dynamic Properties of Small-world Connection Topologies Based on Transit-stub Networks Static and Dynamic Proerties of Small-world Connection Toologies Based on Transit-stub Networks Carlos Aguirre Fernando Corbacho Ramón Huerta Comuter Engineering Deartment, Universidad Autónoma de Madrid,

More information

TOWARDS REAL-TIME METADATA FOR SENSOR-BASED NETWORKS AND GEOGRAPHIC DATABASES

TOWARDS REAL-TIME METADATA FOR SENSOR-BASED NETWORKS AND GEOGRAPHIC DATABASES TOWARDS REAL-TIME METADATA FOR SENSOR-BASED NETWORKS AND GEOGRAPHIC DATABASES C. Gutiérrez, S. Servigne, R. Laurini LIRIS, INSA Lyon, Bât. Blaise Pascal, 20 av. Albert Einstein 69621 Villeurbanne, France

More information

17609: Continuous Data Protection Transforms the Game

17609: Continuous Data Protection Transforms the Game 17609: Continuous Data Protection Transforms the Game Wednesday, August 12, 2015: 8:30 AM-9:30 AM Southern Hemishere 5 (Walt Disney World Dolhin) Tony Negro - EMC Rebecca Levesque 21 st Century Software

More information

Project Management and. Scheduling CHAPTER CONTENTS

Project Management and. Scheduling CHAPTER CONTENTS 6 Proect Management and Scheduling HAPTER ONTENTS 6.1 Introduction 6.2 Planning the Proect 6.3 Executing the Proect 6.7.1 Monitor 6.7.2 ontrol 6.7.3 losing 6.4 Proect Scheduling 6.5 ritical Path Method

More information

The risk of using the Q heterogeneity estimator for software engineering experiments

The risk of using the Q heterogeneity estimator for software engineering experiments Dieste, O., Fernández, E., García-Martínez, R., Juristo, N. 11. The risk of using the Q heterogeneity estimator for software engineering exeriments. The risk of using the Q heterogeneity estimator for

More information

A Multivariate Statistical Analysis of Stock Trends. Abstract

A Multivariate Statistical Analysis of Stock Trends. Abstract A Multivariate Statistical Analysis of Stock Trends Aril Kerby Alma College Alma, MI James Lawrence Miami University Oxford, OH Abstract Is there a method to redict the stock market? What factors determine

More information

Point Location. Preprocess a planar, polygonal subdivision for point location queries. p = (18, 11)

Point Location. Preprocess a planar, polygonal subdivision for point location queries. p = (18, 11) Point Location Prerocess a lanar, olygonal subdivision for oint location ueries. = (18, 11) Inut is a subdivision S of comlexity n, say, number of edges. uild a data structure on S so that for a uery oint

More information

Two-resource stochastic capacity planning employing a Bayesian methodology

Two-resource stochastic capacity planning employing a Bayesian methodology Journal of the Oerational Research Society (23) 54, 1198 128 r 23 Oerational Research Society Ltd. All rights reserved. 16-5682/3 $25. www.algrave-journals.com/jors Two-resource stochastic caacity lanning

More information

Compensating Fund Managers for Risk-Adjusted Performance

Compensating Fund Managers for Risk-Adjusted Performance Comensating Fund Managers for Risk-Adjusted Performance Thomas S. Coleman Æquilibrium Investments, Ltd. Laurence B. Siegel The Ford Foundation Journal of Alternative Investments Winter 1999 In contrast

More information

Rummage Web Server Tuning Evaluation through Benchmark

Rummage Web Server Tuning Evaluation through Benchmark IJCSNS International Journal of Comuter Science and Network Security, VOL.7 No.9, Setember 27 13 Rummage Web Server Tuning Evaluation through Benchmark (Case study: CLICK, and TIME Parameter) Hiyam S.

More information

Finding a Needle in a Haystack: Pinpointing Significant BGP Routing Changes in an IP Network

Finding a Needle in a Haystack: Pinpointing Significant BGP Routing Changes in an IP Network Finding a Needle in a Haystack: Pinointing Significant BGP Routing Changes in an IP Network Jian Wu, Zhuoqing Morley Mao University of Michigan Jennifer Rexford Princeton University Jia Wang AT&T Labs

More information

Concurrent Program Synthesis Based on Supervisory Control

Concurrent Program Synthesis Based on Supervisory Control 010 American Control Conference Marriott Waterfront, Baltimore, MD, USA June 30-July 0, 010 ThB07.5 Concurrent Program Synthesis Based on Suervisory Control Marian V. Iordache and Panos J. Antsaklis Abstract

More information

Memory management. Chapter 4: Memory Management. Memory hierarchy. In an ideal world. Basic memory management. Fixed partitions: multiple programs

Memory management. Chapter 4: Memory Management. Memory hierarchy. In an ideal world. Basic memory management. Fixed partitions: multiple programs Memory management Chater : Memory Management Part : Mechanisms for Managing Memory asic management Swaing Virtual Page relacement algorithms Modeling age relacement algorithms Design issues for aging systems

More information

Measures of Clinic Systems in Clinic Surveys

Measures of Clinic Systems in Clinic Surveys use is not associated with better diabetes care Patrick J. O Connor, MD, MPH, A. Lauren Crain, PhD, Leif I. Solberg, MD, Stehen E. Asche, MA, William A. Rush, PhD, Robin R. Whitebird, PhD, MSW Electronic

More information

Beyond the F Test: Effect Size Confidence Intervals and Tests of Close Fit in the Analysis of Variance and Contrast Analysis

Beyond the F Test: Effect Size Confidence Intervals and Tests of Close Fit in the Analysis of Variance and Contrast Analysis Psychological Methods 004, Vol. 9, No., 164 18 Coyright 004 by the American Psychological Association 108-989X/04/$1.00 DOI: 10.1037/108-989X.9..164 Beyond the F Test: Effect Size Confidence Intervals

More information

VERIFICATION AND VALIDATION OF CFD SIMULATIONS

VERIFICATION AND VALIDATION OF CFD SIMULATIONS ERFATON AND ALDATON OF FD SLATONS by Fred Stern, Robert. Wilson, Hugh W. oleman*, and Eric. Paterson of owa nstitute of Hydraulic Research and * Proulsion Research enter echanical and Aerosace Engineering

More information

A Brief Overview of Intermodal Transportation

A Brief Overview of Intermodal Transportation A Brief Overview of Intermodal Transortation Tolga Bektas Teodor Gabriel Crainic January 2007 CIRRELT-2007-03 Tolga Bektas 1, Teodor Gabriel Crainic 1,* 1 Interuniversity Research Centre on Enterrise Networks,

More information

Softmax Model as Generalization upon Logistic Discrimination Suffers from Overfitting

Softmax Model as Generalization upon Logistic Discrimination Suffers from Overfitting Journal of Data Science 12(2014),563-574 Softmax Model as Generalization uon Logistic Discrimination Suffers from Overfitting F. Mohammadi Basatini 1 and Rahim Chiniardaz 2 1 Deartment of Statistics, Shoushtar

More information

Drinking water systems are vulnerable to

Drinking water systems are vulnerable to 34 UNIVERSITIES COUNCIL ON WATER RESOURCES ISSUE 129 PAGES 34-4 OCTOBER 24 Use of Systems Analysis to Assess and Minimize Water Security Risks James Uber Regan Murray and Robert Janke U. S. Environmental

More information

http://www.ualberta.ca/~mlipsett/engm541/engm541.htm

http://www.ualberta.ca/~mlipsett/engm541/engm541.htm ENGM 670 & MECE 758 Modeling and Simulation of Engineering Systems (Advanced Toics) Winter 011 Lecture 9: Extra Material M.G. Lisett University of Alberta htt://www.ualberta.ca/~mlisett/engm541/engm541.htm

More information

IMPROVING NAIVE BAYESIAN SPAM FILTERING

IMPROVING NAIVE BAYESIAN SPAM FILTERING Master Thesis IMPROVING NAIVE BAYESIAN SPAM FILTERING Jon Kågström Mid Sweden University Deartment for Information Technology and Media Sring 005 Abstract Sam or unsolicited e-mail has become a major roblem

More information

Risk in Revenue Management and Dynamic Pricing

Risk in Revenue Management and Dynamic Pricing OPERATIONS RESEARCH Vol. 56, No. 2, March Aril 2008,. 326 343 issn 0030-364X eissn 1526-5463 08 5602 0326 informs doi 10.1287/ore.1070.0438 2008 INFORMS Risk in Revenue Management and Dynamic Pricing Yuri

More information

Improved Algorithms for Data Visualization in Forensic DNA Analysis

Improved Algorithms for Data Visualization in Forensic DNA Analysis Imroved Algorithms for Data Visualization in Forensic DNA Analysis Noor Maizura Mohamad Noor, Senior Member IACSIT, Mohd Iqbal akim arun, and Ahmad Faiz Ghazali Abstract DNA rofiles from forensic evidence

More information

High Quality Offset Printing An Evolutionary Approach

High Quality Offset Printing An Evolutionary Approach High Quality Offset Printing An Evolutionary Aroach Ralf Joost Institute of Alied Microelectronics and omuter Engineering University of Rostock Rostock, 18051, Germany +49 381 498 7272 ralf.joost@uni-rostock.de

More information

Automatic Search for Correlated Alarms

Automatic Search for Correlated Alarms Automatic Search for Correlated Alarms Klaus-Dieter Tuchs, Peter Tondl, Markus Radimirsch, Klaus Jobmann Institut für Allgemeine Nachrichtentechnik, Universität Hannover Aelstraße 9a, 0167 Hanover, Germany

More information

Applications of Regret Theory to Asset Pricing

Applications of Regret Theory to Asset Pricing Alications of Regret Theory to Asset Pricing Anna Dodonova * Henry B. Tiie College of Business, University of Iowa Iowa City, Iowa 52242-1000 Tel.: +1-319-337-9958 E-mail address: anna-dodonova@uiowa.edu

More information

GAS TURBINE PERFORMANCE WHAT MAKES THE MAP?

GAS TURBINE PERFORMANCE WHAT MAKES THE MAP? GAS TURBINE PERFORMANCE WHAT MAKES THE MAP? by Rainer Kurz Manager of Systems Analysis and Field Testing and Klaus Brun Senior Sales Engineer Solar Turbines Incororated San Diego, California Rainer Kurz

More information

Efficient Training of Kalman Algorithm for MIMO Channel Tracking

Efficient Training of Kalman Algorithm for MIMO Channel Tracking Efficient Training of Kalman Algorithm for MIMO Channel Tracking Emna Eitel and Joachim Seidel Institute of Telecommunications, University of Stuttgart Stuttgart, Germany Abstract In this aer, a Kalman

More information

Large-Scale IP Traceback in High-Speed Internet: Practical Techniques and Theoretical Foundation

Large-Scale IP Traceback in High-Speed Internet: Practical Techniques and Theoretical Foundation Large-Scale IP Traceback in High-Seed Internet: Practical Techniques and Theoretical Foundation Jun Li Minho Sung Jun (Jim) Xu College of Comuting Georgia Institute of Technology {junli,mhsung,jx}@cc.gatech.edu

More information

Sage HRMS I Planning Guide. The Complete Buyer s Guide for Payroll Software

Sage HRMS I Planning Guide. The Complete Buyer s Guide for Payroll Software I Planning Guide The Comlete Buyer s Guide for Payroll Software Table of Contents Introduction... 1 Recent Payroll Trends... 2 Payroll Automation With Emloyee Self-Service... 2 Analyzing Your Current Payroll

More information

Learning Human Behavior from Analyzing Activities in Virtual Environments

Learning Human Behavior from Analyzing Activities in Virtual Environments Learning Human Behavior from Analyzing Activities in Virtual Environments C. BAUCKHAGE 1, B. GORMAN 2, C. THURAU 3 & M. HUMPHRYS 2 1) Deutsche Telekom Laboratories, Berlin, Germany 2) Dublin City University,

More information

Asymmetric Information, Transaction Cost, and. Externalities in Competitive Insurance Markets *

Asymmetric Information, Transaction Cost, and. Externalities in Competitive Insurance Markets * Asymmetric Information, Transaction Cost, and Externalities in Cometitive Insurance Markets * Jerry W. iu Deartment of Finance, University of Notre Dame, Notre Dame, IN 46556-5646 wliu@nd.edu Mark J. Browne

More information

INFERRING APP DEMAND FROM PUBLICLY AVAILABLE DATA 1

INFERRING APP DEMAND FROM PUBLICLY AVAILABLE DATA 1 RESEARCH NOTE INFERRING APP DEMAND FROM PUBLICLY AVAILABLE DATA 1 Rajiv Garg McCombs School of Business, The University of Texas at Austin, Austin, TX 78712 U.S.A. {Rajiv.Garg@mccombs.utexas.edu} Rahul

More information

Service Network Design with Asset Management: Formulations and Comparative Analyzes

Service Network Design with Asset Management: Formulations and Comparative Analyzes Service Network Design with Asset Management: Formulations and Comarative Analyzes Jardar Andersen Teodor Gabriel Crainic Marielle Christiansen October 2007 CIRRELT-2007-40 Service Network Design with

More information

From Simulation to Experiment: A Case Study on Multiprocessor Task Scheduling

From Simulation to Experiment: A Case Study on Multiprocessor Task Scheduling From to Exeriment: A Case Study on Multirocessor Task Scheduling Sascha Hunold CNRS / LIG Laboratory Grenoble, France sascha.hunold@imag.fr Henri Casanova Det. of Information and Comuter Sciences University

More information

Service Network Design with Asset Management: Formulations and Comparative Analyzes

Service Network Design with Asset Management: Formulations and Comparative Analyzes Service Network Design with Asset Management: Formulations and Comarative Analyzes Jardar Andersen Teodor Gabriel Crainic Marielle Christiansen October 2007 CIRRELT-2007-40 Service Network Design with

More information

Web Inv. Web Invoicing & Electronic Payments. What s Inside. Strategic Impact of AP Automation. Inefficiencies in Current State

Web Inv. Web Invoicing & Electronic Payments. What s Inside. Strategic Impact of AP Automation. Inefficiencies in Current State Pay tream A D V I S O R S WHITE PAPER Web Inv Web Invoicing Strategic Imact of AP Automation What s Inside Inefficiencies in Current State Key Drivers for Automation Web Invoicing Comonents New Automation

More information

IEEM 101: Inventory control

IEEM 101: Inventory control IEEM 101: Inventory control Outline of this series of lectures: 1. Definition of inventory. Examles of where inventory can imrove things in a system 3. Deterministic Inventory Models 3.1. Continuous review:

More information

Computational Finance The Martingale Measure and Pricing of Derivatives

Computational Finance The Martingale Measure and Pricing of Derivatives 1 The Martingale Measure 1 Comutational Finance The Martingale Measure and Pricing of Derivatives 1 The Martingale Measure The Martingale measure or the Risk Neutral robabilities are a fundamental concet

More information

Fundamental Concepts for Workflow Automation in Practice

Fundamental Concepts for Workflow Automation in Practice Fundamental Concets for Workflow Automation in Practice Stef Joosten and Sjaak Brinkkemer Centre for Telematics and Information Technology, University of Twente, The Netherlands March 12, 1995 This aer

More information

Effect Sizes Based on Means

Effect Sizes Based on Means CHAPTER 4 Effect Sizes Based on Means Introduction Raw (unstardized) mean difference D Stardized mean difference, d g Resonse ratios INTRODUCTION When the studies reort means stard deviations, the referred

More information

Int. J. Advanced Networking and Applications Volume: 6 Issue: 4 Pages: 2386-2392 (2015) ISSN: 0975-0290

Int. J. Advanced Networking and Applications Volume: 6 Issue: 4 Pages: 2386-2392 (2015) ISSN: 0975-0290 2386 Survey: Biological Insired Comuting in the Network Security V Venkata Ramana Associate Professor, Deartment of CSE, CBIT, Proddatur, Y.S.R (dist), A.P-516360 Email: ramanacsecbit@gmail.com Y.Subba

More information

Large firms and heterogeneity: the structure of trade and industry under oligopoly

Large firms and heterogeneity: the structure of trade and industry under oligopoly Large firms and heterogeneity: the structure of trade and industry under oligooly Eddy Bekkers University of Linz Joseh Francois University of Linz & CEPR (London) ABSTRACT: We develo a model of trade

More information

Moving Objects Tracking in Video by Graph Cuts and Parameter Motion Model

Moving Objects Tracking in Video by Graph Cuts and Parameter Motion Model International Journal of Comuter Alications (0975 8887) Moving Objects Tracking in Video by Grah Cuts and Parameter Motion Model Khalid Housni, Driss Mammass IRF SIC laboratory, Faculty of sciences Agadir

More information

Corporate Compliance Policy

Corporate Compliance Policy Cororate Comliance Policy English Edition FOREWORD Dear Emloyees, The global nature of Bayer s oerations means that our activities are subject to a wide variety of statutory regulations and standards

More information

Multiperiod Portfolio Optimization with General Transaction Costs

Multiperiod Portfolio Optimization with General Transaction Costs Multieriod Portfolio Otimization with General Transaction Costs Victor DeMiguel Deartment of Management Science and Oerations, London Business School, London NW1 4SA, UK, avmiguel@london.edu Xiaoling Mei

More information

Expert Systems with Applications

Expert Systems with Applications Exert Systems with Alications 38 (2011) 11984 11997 Contents lists available at ScienceDirect Exert Systems with Alications journal homeage: www.elsevier.com/locate/eswa Review On the alication of genetic

More information

type The annotations of the 62 samples with respect to the cancer types FL, CLL, DLBCL-A, DLBCL-G.

type The annotations of the 62 samples with respect to the cancer types FL, CLL, DLBCL-A, DLBCL-G. alizadeh Samle a from a lymhoma/leukemia gene exression study Samle a for the ISIS method Format x A 2000 x 62 gene exression a matrix of log-ratio values. 2,000 genes with the highest variance across

More information

Franck Cappello and Daniel Etiemble LRI, Université Paris-Sud, 91405, Orsay, France Email: fci@lri.fr

Franck Cappello and Daniel Etiemble LRI, Université Paris-Sud, 91405, Orsay, France Email: fci@lri.fr MPI versus MPI+OenMP on the IBM SP for the NAS Benchmarks Franck Caello and Daniel Etiemble LRI, Université Paris-Sud, 945, Orsay, France Email: fci@lri.fr Abstract The hybrid memory model of clusters

More information

SQUARE GRID POINTS COVERAGED BY CONNECTED SOURCES WITH COVERAGE RADIUS OF ONE ON A TWO-DIMENSIONAL GRID

SQUARE GRID POINTS COVERAGED BY CONNECTED SOURCES WITH COVERAGE RADIUS OF ONE ON A TWO-DIMENSIONAL GRID International Journal of Comuter Science & Information Technology (IJCSIT) Vol 6, No 4, August 014 SQUARE GRID POINTS COVERAGED BY CONNECTED SOURCES WITH COVERAGE RADIUS OF ONE ON A TWO-DIMENSIONAL GRID

More information

Normally Distributed Data. A mean with a normal value Test of Hypothesis Sign Test Paired observations within a single patient group

Normally Distributed Data. A mean with a normal value Test of Hypothesis Sign Test Paired observations within a single patient group ANALYSIS OF CONTINUOUS VARIABLES / 31 CHAPTER SIX ANALYSIS OF CONTINUOUS VARIABLES: COMPARING MEANS In the last chater, we addressed the analysis of discrete variables. Much of the statistical analysis

More information

Learner and Instructional Factors Influencing Learning Outcomes within a Blended Learning Environment

Learner and Instructional Factors Influencing Learning Outcomes within a Blended Learning Environment Lim, D. H., & Morris, M. L. (2009). Learner and Instructional Factors Influencing Outcomes within a Blended Environment. Educational Technology & Society, 12 (4), 282 293. Learner and Instructional Factors

More information

401K Plan. Effective January 1, 2014

401K Plan. Effective January 1, 2014 401K Plan Effective January 1, 2014 Summary Plan Descrition Particiation...2 Contributions...2 Disabled Particiants...4 Definition of Comensation...4 Legal Limits on Contributions...4 Enrollment...5 Investment

More information

Characterizing and Modeling Network Traffic Variability

Characterizing and Modeling Network Traffic Variability Characterizing and Modeling etwork Traffic Variability Sarat Pothuri, David W. Petr, Sohel Khan Information and Telecommunication Technology Center Electrical Engineering and Comuter Science Deartment,

More information

Sage HRMS I Planning Guide. The HR Software Buyer s Guide and Checklist

Sage HRMS I Planning Guide. The HR Software Buyer s Guide and Checklist I Planning Guide The HR Software Buyer s Guide and Checklist Table of Contents Introduction... 1 Recent Trends in HR Technology... 1 Return on Emloyee Investment Paerless HR Workflows Business Intelligence

More information

1 Gambler s Ruin Problem

1 Gambler s Ruin Problem Coyright c 2009 by Karl Sigman 1 Gambler s Ruin Problem Let N 2 be an integer and let 1 i N 1. Consider a gambler who starts with an initial fortune of $i and then on each successive gamble either wins

More information

Sage Timberline Office

Sage Timberline Office Sage Timberline Office Get Started Document Management 9.8 NOTICE This document and the Sage Timberline Office software may be used only in accordance with the accomanying Sage Timberline Office End User

More information

X How to Schedule a Cascade in an Arbitrary Graph

X How to Schedule a Cascade in an Arbitrary Graph X How to Schedule a Cascade in an Arbitrary Grah Flavio Chierichetti, Cornell University Jon Kleinberg, Cornell University Alessandro Panconesi, Saienza University When individuals in a social network

More information

Stochastic Derivation of an Integral Equation for Probability Generating Functions

Stochastic Derivation of an Integral Equation for Probability Generating Functions Journal of Informatics and Mathematical Sciences Volume 5 (2013), Number 3,. 157 163 RGN Publications htt://www.rgnublications.com Stochastic Derivation of an Integral Equation for Probability Generating

More information

Optional Strain-Rate Forms for the Johnson Cook Constitutive Model and the Role of the Parameter Epsilon_0 1 AUTHOR

Optional Strain-Rate Forms for the Johnson Cook Constitutive Model and the Role of the Parameter Epsilon_0 1 AUTHOR Otional Strain-Rate Forms for the Johnson Cook Constitutive Model and the Role of the Parameter Esilon_ AUTHOR Len Schwer Schwer Engineering & Consulting Services CORRESPONDENCE Len Schwer Schwer Engineering

More information

Where you are Where you need to be How you get there Market Intelligence Competitive Insights Winning Strategies

Where you are Where you need to be How you get there Market Intelligence Competitive Insights Winning Strategies Where you are Where you need to be How you get there Market Intelligence Cometitive Insights Winning Strategies The industrial and B2B market research and strategy firm Dominate Your Markets Whether you

More information