SRA SOLOMON : MUC-4 TEST RESULTS AND ANALYSI S
|
|
- Victoria George
- 8 years ago
- Views:
Transcription
1 SRA SOLOMON : MUC-4 TEST RESULTS AND ANALYSI S Chinatu Aone, Doug McKee, Sandy Shinn, Hatte Bleje r Sytem Reearch and Application (SRA ) th Street North Arlington, VA aonec@ra.com INTRODUCTION In thi paper, we report SRA' reult on the MUC-4 tak and decribe how we trained our natural languag e proceing ytem for MUC-4. We alo report on what worked, what didn't work, and leon learned. Our MUC-4 ytem embed the SOLOMON knowledge-baed NLP hell which i deigned for both domain - independence and language-independence. We are currently uing SOLOMON for a Spanih and Japane e text undertanding project in a different domain. Although thi wa our firt year participating in MUC, w e have built and are currently building other data extraction ytem. RESULTS Our TST3 and TST4 reult are hown in Figure 1 and 2. The imilarity of thee core a well a thei r imilarity to SRA-internal teting reult reflect the portability of SRA' MUC-4 ytem. In fact, our cor e on the TST4 text wa better than that of TST3, even though thoe text covered a different time perio d than that of the training text or TST3. Our matched-only preciion and recall for both tet et were very high (TST3 : 68/47, TST4: 73/49). When SOLOMON recognized a MUC event, it did a very accurate and complete job at filling the requiit e template. SOLOMON performance wa tuned o that the all-template recall and preciion were a cloe a poibl e to maximize the F-Meaure. A hown in Figure 3, our F-Meaure teadily increaed over time. The fact that thi lope ha not yet leveled off how SOLOMON' potential for improvement. EFFORT SPENT We pent a total of 9 taff month tarting January 1, 1992 through May 31, 1992 on MUC-4. A takpecific breakdown of effort i hown in Figure 4. The bulk of the work wa pent porting SOLOMON t o a new domain with new vocabulary, concept, template-output format, and fill rule. Approximately 72% of the effort wa domain-dependent. However, about 63% of the total effort wa language-independent, i.e. it would be directly applicable to undertanding text about terrorim in any language. We expect that our Englih MUC-4 ytem could be ported to a new language in about 3 month, given a baic grammar, lexicon and preproceing data imilar to the one which exited for Englih. We partially demontrated thi 137
2 REC PRE OVG FA L MATCHED/MISSING MATCHED/SPURIOUS MATCHED ONLY ALL TEMPLATES TEXT FILTERING F-MEASURES P&R P&R P&2R Figure 1 : TST3 Reult REC PRE OVG FA L MATCHED/MISSING MATCHED/SPURIOUS MATCHED ONLY ALL TEMPLATES TEXT FILTERING F-MEASURES P&R P&R P&2R Figure 2: TST4 Reult claim by howing our MUC-4 ytem proceing Englih, Japanee and Spanih newpaper article about the murder of Jeuit priet at the demontration eion of MUC-4. We pent le than 2 week after the final tet adding MUC-pecific word to Spanih and Japanee lexicon, and extending the grammar of th e two language. Data 40% of the total effort building MUC-data wa pent on lexicon and KB entry acquiition. Much of thi dat a wa acquired automatically. We ued the upplied geographical data to automatically build location lexicon and KB. Uing the development template, we acquired lexical and KB entrie for clae of domain term uch a human and phyical target and terrorit organization. We automatically derived ubcategorization information for the domain verb from the development text (cf. [1]). Thee automatically acquired lexicon and KB did require ome manual cleanup and correction. Certain multi-word phenomena which occur frequently in text but are unuitable for general paring wer e handled by pattern matching during Preproceing. For example, we created pattern for Spanih phrae, complex location phrae, relative time, and name of political, military and terrorit organization. Modification to SOLOMON' broad-coverage Englih grammar included adding more emantic retriction, extending ome phrae-tructure rule, and improving general robutne. Baed on our knowledge engineering effort, we built a et of commonene reaoning rule that are decribed in detail in our ytem decription. Our EXTRACT module recognize MUC-relevant event in the output of SOLOMON and tranlate them into MUC-4 filled template. We implemented all the domainpecific information a mapping rule or imple converion function (e.g. numeric value like "at leat 5 " mean "5-" ). Thi data i tored in the knowledge bae, and i completely language independent. 13 8
3 o T20 ' 30 13{ M T T2 0 M T4 20 T2, 10 T2 i I 0 i I I I I I I I I I I moo JAN 1 MAR 25 MAY 1 MAY17 MAY 31 Hour of Effort Imo /3 1 Noun TST TST T8T Figure 3: Tracking SOLOMON Performanc e Tak Category ~ % of Total Effort DATA 7 1 Knowledge Engineering 1 3 Data Acquiition 3 0 Grammar 7 Pragmatic Inference Rule 1 1 Extract Data 1 0 PROCESSING Meage Zoning 3 Extract Extenion 7 Teting 1 0 Mic. Bug Fixing 10 Figure 4 : Breakdown of Effort Spent for MUC
4 Procein g We pent 1 week porting our exiting Meage Zoner to deal with meage header in MUC meage. The Meage Zoner could already recognize more general meage tructure uch a paragraph and entence. We extended EXTRACT while maintaining domain and language independence of the module. Feature added included event merging and handling of flat MUC template intead of the more object-oriente d databae record that SOLOMON i accutomed to. Our time pent on fixing bug wa ditributed throughout the ytem, but problem in Debri Paring and Debri Semantic received the mot attention. SYSTEM TRAININ G We ued TST2 text for blind teting and the entire 1300 development text for both teting and trainin g material. The development et wa crucial to both our automated data acquiition and our knowledge engineering tak. We performed frequent teting to track and direct our progre. To raie recall, w e focued on data acquiition ; to raie preciion, we focued on tricter definition of "legal" MUC event. To improve overall performance, we focued on more robut yntactic and emantic analyi and mor e reliable event merging. LIMITING FACTOR S The two main limiting factor were the number of development text and template and the amount of tim e allotted for the MUC-4 effort. With more text, we could have applied other more data-intenive automate d acquiition technique and had more example of phenomena to draw upon. With more time, we would add more domain-dependent lexical knowledge and additional pragmatic inference rule. We alo need to tune our EXTRACT mapping rule more finely and improve our dicoure module for both NP reference an d event reference reolution. Integration of exiting on-line reource uch a machine-readable dictionarie, the World Factbook, or WordNet would alo improve ytem performance. A more extenive teting and evaluation trategy at both the blackbox and glabox level would help direct progre, but wa not feaibl e in the amount of time we had. WHAT WAS OR WAS NOT SUCCESSFU L There were everal area where hybrid olution worked very well. Totally automated knowledge acquiition wa quite ucceful when upplemented by manual checking and editing of domain-crucial information. Similarly, augmenting a pure bottom-up parer with "imulated top-down paring" (See SRA ' MUC-4 Sytem Decription) worked well. Improved Debri Semantic and ignificantly extended Pragmatic Inferencing wer e alo important contributor to the ytem' performance. REUSABILITY SRA' SOLOMON NLP ytem ha been deigned for portability and proven to be highly reuable. Thi include portability to other domain, other language, and other application. A hown in Figure 5, a larg e 140
5 SOLOMON Popmaimiu MiW Ylwr Mee fume. U luwm Wad 11maly Wmd4mn MMydp M N+eV [wwq AIM PTV Rr' Mrplrnd nwm k Wprpr«won P Wmnal, g noop fdediin arr1rip nmmmi O+Wrw+ dtl1miimimir11 ~JIiWH Dwainapadk PMT.: NMMU PT,rw IMIRSupw. nom HM~M ertl~o MUC Oi Mo le MU C Emma B lbw 41..dol Smomld SINS, Figure 5: MUC NLP Sytem Reuability part of SOLOMON ' data and almot all of the proceing module are completely reuable for NLP in othe r domain or language. Currently, our Spanih and Japanee data extraction project MURASAKI i uing, without modification, the ame proceing module and the core knowledge bae a thoe ued for MUC-4. The MURASAKI ytem procee Spanih and Japanee language newpaper and journal article a well a TV trancript. Thi project' domain i the AIDS dieae. Thu, the only difference between our MUC-4 ytem an d MURASAKI ytem i that the latter ue Spanih and Japanee lexicon, pattern and grammar, an d MURASAKI domain-dependent knowledge bae. SOLOMON ha alo been embedded in everal Engli h meage undertanding ytem : ALEXIS (operational) and WARBUCKS. LESSONS LEARNED AND REAFFIRMED BY MUC- 4 We have learned and reaffirmed the following point a the mot crucial apect of ucceful text under - tanding for data extraction. Overcoming the Knowledge Acquiition Bottleneck : We mut develop technique and tool for acquiring timely, complete, and proven ytem data. Solving the Paring Problem : We need more robut, emantically contrained yntactic analyi. Grammar mut be broad-coverage and highly accurate on complex input. Developing Sophiticated Dicoure Analyi : We mut handle real world dicoure phenomena foun d in actual text. The dicoure architecture mut be flexible enough to accommodate particular dicour e phenomena which are crucial in particular domain or language. MUC-4 ha reaffirmed our knowledge of what i involved in porting an NLP ytem to a new domain. 9 taff month i a bare minimum for uch an effort. Improved knowledge acquiition tool a well a 141
6 on-line reource are deirable. To enure good reult, it i neceary to have ufficient time for knowledg e engineering, teting and evaluation. Our experience undercore the fact that natural language undertandin g i a highly data-driven problem. The ytem' performance i often proportional to the level of undertandin g of the input and output. The MUC-4 development text and template were extremely helpful in thi regard. Reference [1] Doug McKee and John Maloney. Uing Statitic Gained from Corpora in a Knowledge-Baed NLP Sytem. In Proceeding of The AAAI Workhop on Statitically-Baed NLP Technique,
A Spam Message Filtering Method: focus on run time
, pp.29-33 http://dx.doi.org/10.14257/atl.2014.76.08 A Spam Meage Filtering Method: focu on run time Sin-Eon Kim 1, Jung-Tae Jo 2, Sang-Hyun Choi 3 1 Department of Information Security Management 2 Department
More informationCASE STUDY ALLOCATE SOFTWARE
CASE STUDY ALLOCATE SOFTWARE allocate caetud y TABLE OF CONTENTS #1 ABOUT THE CLIENT #2 OUR ROLE #3 EFFECTS OF OUR COOPERATION #4 BUSINESS PROBLEM THAT WE SOLVED #5 CHALLENGES #6 WORKING IN SCRUM #7 WHAT
More informationProject Management Basics
Project Management Baic A Guide to undertanding the baic component of effective project management and the key to ucce 1 Content 1.0 Who hould read thi Guide... 3 1.1 Overview... 3 1.2 Project Management
More informationTap Into Smartphone Demand: Mobile-izing Enterprise Websites by Using Flexible, Open Source Platforms
Tap Into Smartphone Demand: Mobile-izing Enterprie Webite by Uing Flexible, Open Source Platform acquia.com 888.922.7842 1.781.238.8600 25 Corporate Drive, Burlington, MA 01803 Tap Into Smartphone Demand:
More informationSCM- integration: organiational, managerial and technological iue M. Caridi 1 and A. Sianei 2 Dipartimento di Economia e Produzione, Politecnico di Milano, Italy E-mail: maria.caridi@polimi.it Itituto
More informationLaureate Network Products & Services Copyright 2013 Laureate Education, Inc.
Laureate Network Product & Service Copyright 2013 Laureate Education, Inc. KEY Coure Name Laureate Faculty Development...3 Laureate Englih Program...9 Language Laureate Signature Product...12 Length Laureate
More informationDISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS. G. Chapman J. Cleese E. Idle
DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS G. Chapman J. Cleee E. Idle ABSTRACT Content matching i a neceary component of any ignature-baed network Intruion Detection
More informationQueueing systems with scheduled arrivals, i.e., appointment systems, are typical for frontal service systems,
MANAGEMENT SCIENCE Vol. 54, No. 3, March 28, pp. 565 572 in 25-199 ein 1526-551 8 543 565 inform doi 1.1287/mnc.17.82 28 INFORMS Scheduling Arrival to Queue: A Single-Server Model with No-Show INFORMS
More informationCHARACTERISTICS OF WAITING LINE MODELS THE INDICATORS OF THE CUSTOMER FLOW MANAGEMENT SYSTEMS EFFICIENCY
Annale Univeritati Apuleni Serie Oeconomica, 2(2), 200 CHARACTERISTICS OF WAITING LINE MODELS THE INDICATORS OF THE CUSTOMER FLOW MANAGEMENT SYSTEMS EFFICIENCY Sidonia Otilia Cernea Mihaela Jaradat 2 Mohammad
More informationDISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS
DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS Chritopher V. Kopek Department of Computer Science Wake Foret Univerity Winton-Salem, NC, 2709 Email: kopekcv@gmail.com
More informationApigee Edge: Apigee Cloud vs. Private Cloud. Evaluating deployment models for API management
Apigee Edge: Apigee Cloud v. Private Cloud Evaluating deployment model for API management Table of Content Introduction 1 Time to ucce 2 Total cot of ownerhip 2 Performance 3 Security 4 Data privacy 4
More informationPekka Helkiö, 58490K Antti Seppälä, 63212W Ossi Syd, 63513T
Pekka Helkiö, 58490K Antti Seppälä, 63212W Oi Syd, 63513T Table of Content 1. Abtract...1 2. Introduction...2 2.1 Background... 2 2.2 Objective and Reearch Problem... 2 2.3 Methodology... 2 2.4 Scoping
More informationOptical Illusion. Sara Bolouki, Roger Grosse, Honglak Lee, Andrew Ng
Optical Illuion Sara Bolouki, Roger Groe, Honglak Lee, Andrew Ng. Introduction The goal of thi proect i to explain ome of the illuory phenomena uing pare coding and whitening model. Intead of the pare
More informationINFORMATION Technology (IT) infrastructure management
IEEE TRANSACTIONS ON CLOUD COMPUTING, VOL. 2, NO. 1, MAY 214 1 Buine-Driven Long-term Capacity Planning for SaaS Application David Candeia, Ricardo Araújo Santo and Raquel Lope Abtract Capacity Planning
More informationCASE STUDY BRIDGE. www.future-processing.com
CASE STUDY BRIDGE TABLE OF CONTENTS #1 ABOUT THE CLIENT 3 #2 ABOUT THE PROJECT 4 #3 OUR ROLE 5 #4 RESULT OF OUR COLLABORATION 6-7 #5 THE BUSINESS PROBLEM THAT WE SOLVED 8 #6 CHALLENGES 9 #7 VISUAL IDENTIFICATION
More informationSELF-MANAGING PERFORMANCE IN APPLICATION SERVERS MODELLING AND DATA ARCHITECTURE
SELF-MANAGING PERFORMANCE IN APPLICATION SERVERS MODELLING AND DATA ARCHITECTURE RAVI KUMAR G 1, C.MUTHUSAMY 2 & A.VINAYA BABU 3 1 HP Bangalore, Reearch Scholar JNTUH, Hyderabad, India, 2 Yahoo, Bangalore,
More informationDevelopment Progress
H T U SO CA'S I R F A : Y R STO ial c o ca i r f A South ytem: e g ity ecur ing covera ing d it Expan t and lim lity a n u a r q g e f n o ni i e n increa orga ny M nke n-za e g a eth ca H Jei harle M
More informationLicense & SW Asset Management at CES Design Services
Licene & SW Aet Management at CES Deign Service johann.poechl@iemen.com www.ces-deignservice.com 2003 Siemen AG Öterreich Overview 1. Introduction CES Deign Service 2. Objective and Motivation 3. What
More informationPartial optimal labeling search for a NP-hard subclass of (max,+) problems
Partial optimal labeling earch for a NP-hard ubcla of (max,+) problem Ivan Kovtun International Reearch and Training Center of Information Technologie and Sytem, Kiev, Uraine, ovtun@image.iev.ua Dreden
More informationA Resolution Approach to a Hierarchical Multiobjective Routing Model for MPLS Networks
A Reolution Approach to a Hierarchical Multiobjective Routing Model for MPLS Networ Joé Craveirinha a,c, Rita Girão-Silva a,c, João Clímaco b,c, Lúcia Martin a,c a b c DEEC-FCTUC FEUC INESC-Coimbra International
More informationTIME SERIES ANALYSIS AND TRENDS BY USING SPSS PROGRAMME
TIME SERIES ANALYSIS AND TRENDS BY USING SPSS PROGRAMME RADMILA KOCURKOVÁ Sileian Univerity in Opava School of Buine Adminitration in Karviná Department of Mathematical Method in Economic Czech Republic
More informationHow To Prepare For A Mallpox Outbreak
Iue Brief No. 1 Bioterrorim and Health Sytem Preparedne Addreing the Smallpox Threat: Iue, Strategie, and Tool www.ahrq.gov The Agency for Healthcare Reearch and Quality (AHRQ) i the lead agency charged
More information462 Machine Translation Systems for Europe
462 Machine Tranlation Sytem for Europe Philipp Koehn School of Informatic Univerity of Edinburgh pkoehn@inf.ed.ac.uk Alexandra Birch School of Informatic Univerity of Edinburgh a.birch@m.ed.ac.uk Ralf
More informationTRADING rules are widely used in financial market as
Complex Stock Trading Strategy Baed on Particle Swarm Optimization Fei Wang, Philip L.H. Yu and David W. Cheung Abtract Trading rule have been utilized in the tock market to make profit for more than a
More informationOptimizing a Semantic Comparator using CUDA-enabled Graphics Hardware
Optimizing a Semantic Comparator uing CUDA-enabled Graphic Hardware Aalap Tripathy Suneil Mohan, Rabi Mahapatra Embedded Sytem and Codeign Lab codeign.ce.tamu.edu (Preented at ICSC 0, September 9, 0 in
More informationFEDERATION OF ARAB SCIENTIFIC RESEARCH COUNCILS
Aignment Report RP/98-983/5/0./03 Etablihment of cientific and technological information ervice for economic and ocial development FOR INTERNAL UE NOT FOR GENERAL DITRIBUTION FEDERATION OF ARAB CIENTIFIC
More informationBio-Plex Analysis Software
Multiplex Supenion Array Bio-Plex Analyi Software The Leader in Multiplex Immunoaay Analyi Bio-Plex Analyi Software If making ene of your multiplex data i your challenge, then Bio-Plex data analyi oftware
More informationHow Enterprises Can Build Integrated Digital Marketing Experiences Using Drupal
How Enterprie Can Build Integrated Digital Marketing Experience Uing Drupal acquia.com 888.922.7842 1.781.238.8600 25 Corporate Drive, Burlington, MA 01803 How Enterprie Can Build Integrated Digital Marketing
More informationSupport Vector Machine Based Electricity Price Forecasting For Electricity Markets utilising Projected Assessment of System Adequacy Data.
The Sixth International Power Engineering Conference (IPEC23, 27-29 November 23, Singapore Support Vector Machine Baed Electricity Price Forecating For Electricity Maret utiliing Projected Aement of Sytem
More informationA technical guide to 2014 key stage 2 to key stage 4 value added measures
A technical guide to 2014 key tage 2 to key tage 4 value added meaure CONTENTS Introduction: PAGE NO. What i value added? 2 Change to value added methodology in 2014 4 Interpretation: Interpreting chool
More informationTwo Dimensional FEM Simulation of Ultrasonic Wave Propagation in Isotropic Solid Media using COMSOL
Excerpt from the Proceeding of the COMSO Conference 0 India Two Dimenional FEM Simulation of Ultraonic Wave Propagation in Iotropic Solid Media uing COMSO Bikah Ghoe *, Krihnan Balaubramaniam *, C V Krihnamurthy
More informationRO-BURST: A Robust Virtualization Cost Model for Workload Consolidation over Clouds
!111! 111!ttthhh IIIEEEEEEEEE///AAACCCMMM IIInnnttteeerrrnnnaaatttiiiooonnnaaalll SSSyyymmmpppoooiiiuuummm ooonnn CCCllluuuttteeerrr,,, CCClllooouuuddd aaannnddd GGGrrriiiddd CCCooommmpppuuutttiiinnnggg
More informationTips For Success At Mercer
Tip For Succe At Mercer 2008-2009 A Do-It-Yourelf Guide to Effective Study Skill Produced by the Office of Student Affair Welcome to You may be a recent high chool graduate about to tart your very firt
More informationA Review On Software Testing In SDlC And Testing Tools
www.ijec.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume - 3 Iue -9 September, 2014 Page No. 8188-8197 A Review On Software Teting In SDlC And Teting Tool T.Amruthavalli*,
More informationLinking Example-Based and Rule-Based Machine Translation. Michael Carl, Catherine Pease and Oliver Streiter
Linking Example-Baed and Rule-Baed Machine Tranlation Michael Carl, Catherine Peae and Oliver Streiter Intitut fur Angewandte Informationforchung, Martin-Luther Str. 14 (carl,cath,oliver)@iai.uni-b.de
More informationBenchmarking Bottom-Up and Top-Down Strategies for SPARQL-to-SQL Query Translation
Benchmarking Bottom-Up and Top-Down Strategie for SPARQL-to-SQL Query Tranlation Kahlev a, Chebotko b,c, John Abraham b, Pearl Brazier b, and Shiyong Lu a a Department of Computer Science, Wayne State
More informationImproving the Performance of Web Service Recommenders Using Semantic Similarity
Improving the Performance of Web Service Recommender Uing Semantic Similarity Juan Manuel Adán-Coello, Carlo Miguel Tobar, Yang Yuming Faculdade de Engenharia de Computação, Pontifícia Univeridade Católica
More informationOPINION PIECE. It s up to the customer to ensure security of the Cloud
OPINION PIECE It up to the cutomer to enure ecurity of the Cloud Content Don t outource what you don t undertand 2 The check lit 2 Step toward control 4 Due Diligence 4 Contract 4 E-dicovery 4 Standard
More informationQUANTIFYING THE BULLWHIP EFFECT IN THE SUPPLY CHAIN OF SMALL-SIZED COMPANIES
Sixth LACCEI International Latin American and Caribbean Conference for Engineering and Technology (LACCEI 2008) Partnering to Succe: Engineering, Education, Reearch and Development June 4 June 6 2008,
More informationA note on profit maximization and monotonicity for inbound call centers
A note on profit maximization and monotonicity for inbound call center Ger Koole & Aue Pot Department of Mathematic, Vrije Univeriteit Amterdam, The Netherland 23rd December 2005 Abtract We conider an
More informationTrusted Document Signing based on use of biometric (Face) keys
Truted Document Signing baed on ue of biometric (Face) Ahmed B. Elmadani Department of Computer Science Faculty of Science Sebha Univerity Sebha Libya www.ebhau.edu.ly elmadan@yahoo.com ABSTRACT An online
More informationControl of Wireless Networks with Flow Level Dynamics under Constant Time Scheduling
Control of Wirele Network with Flow Level Dynamic under Contant Time Scheduling Long Le and Ravi R. Mazumdar Department of Electrical and Computer Engineering Univerity of Waterloo,Waterloo, ON, Canada
More informationINTERACTIVE TOOL FOR ANALYSIS OF TIME-DELAY SYSTEMS WITH DEAD-TIME COMPENSATORS
INTERACTIVE TOOL FOR ANALYSIS OF TIMEDELAY SYSTEMS WITH DEADTIME COMPENSATORS Joé Lui Guzmán, Pedro García, Tore Hägglund, Sebatián Dormido, Pedro Alberto, Manuel Berenguel Dep. de Lenguaje y Computación,
More informationReturn on Investment and Effort Expenditure in the Software Development Environment
International Journal of Applied Information ytem (IJAI) IN : 2249-0868 Return on Invetment and Effort Expenditure in the oftware Development Environment Dineh Kumar aini Faculty of Computing and IT, ohar
More informationProgress 8 measure in 2016, 2017, and 2018. Guide for maintained secondary schools, academies and free schools
Progre 8 meaure in 2016, 2017, and 2018 Guide for maintained econdary chool, academie and free chool July 2016 Content Table of figure 4 Summary 5 A ummary of Attainment 8 and Progre 8 5 Expiry or review
More informationAcceleration-Displacement Crash Pulse Optimisation A New Methodology to Optimise Vehicle Response for Multiple Impact Speeds
Acceleration-Diplacement Crah Pule Optimiation A New Methodology to Optimie Vehicle Repone for Multiple Impact Speed D. Gildfind 1 and D. Ree 2 1 RMIT Univerity, Department of Aeropace Engineering 2 Holden
More informationPerformance of Multiple TFRC in Heterogeneous Wireless Networks
Performance of Multiple TFRC in Heterogeneou Wirele Network 1 Hyeon-Jin Jeong, 2 Seong-Sik Choi 1, Firt Author Computer Engineering Department, Incheon National Univerity, oaihjj@incheon.ac.kr *2,Correponding
More informationMobile Network Configuration for Large-scale Multimedia Delivery on a Single WLAN
Mobile Network Configuration for Large-cale Multimedia Delivery on a Single WLAN Huigwang Je, Dongwoo Kwon, Hyeonwoo Kim, and Hongtaek Ju Dept. of Computer Engineering Keimyung Univerity Daegu, Republic
More informationA Note on Profit Maximization and Monotonicity for Inbound Call Centers
OPERATIONS RESEARCH Vol. 59, No. 5, September October 2011, pp. 1304 1308 in 0030-364X ein 1526-5463 11 5905 1304 http://dx.doi.org/10.1287/opre.1110.0990 2011 INFORMS TECHNICAL NOTE INFORMS hold copyright
More informationDesign of Compound Hyperchaotic System with Application in Secure Data Transmission Systems
Deign of Compound Hyperchaotic Sytem with Application in Secure Data Tranmiion Sytem D. Chantov Key Word. Lyapunov exponent; hyperchaotic ytem; chaotic ynchronization; chaotic witching. Abtract. In thi
More informationPrincipal version published in the University of Innsbruck Bulletin of 8 April 2009, Issue 55, No 233
Note: The following curriculum i a conolidated verion. It i legally non-binding and for informational purpoe only. The legally binding verion are found in the Univerity of Innbruck Bulletin (in German).
More informationVery special thanks to Wolfgang Gentzsch and Burak Yenier for making the UberCloud HPC Experiment possible.
Digital manufacturing technology and convenient acce to High Performance Computing (HPC) in indutry R&D are eential to increae the quality of our product and the competitivene of our companie. Progre can
More informationAbstract parsing: static analysis of dynamically generated string output using LR-parsing technology
Abtract paring: tatic analyi of dynamically generated tring output uing LR-paring technology Kyung-Goo Doh 1, Hyunha Kim 1, David A. Schmidt 2 1 Hanyang Univerity, Anan, South Korea 2 Kana State Univerity,
More informationGraduation Information 6
# 2 0 142 015 c Graduation Information 6 ata l og # r e x pe firtyea r i e nc e # u top 2 r e nf tra # te ma a lc l #coo y t l acu be t f tie i r ve ni ampu linonc l i h c # ain inag w met # co SECTION
More informationAPEC Environmental Goods and Services Work Program
APEC Environmental Good and Service In Sydney in 2007 APEC Leader committed, through wide-ranging and ambitiou action, a et out in the Sydney Action Agenda, to enuring the energy need of the economie whilt
More informationGroup Mutual Exclusion Based on Priorities
Group Mutual Excluion Baed on Prioritie Karina M. Cenci Laboratorio de Invetigación en Sitema Ditribuido Univeridad Nacional del Sur Bahía Blanca, Argentina kmc@c.un.edu.ar and Jorge R. Ardenghi Laboratorio
More informationChange Management Plan Blackboard Help Course 24/7
MIT 530 Change Management Plan Help Coure 24/7 Submitted by: Sheri Anderon UNCW 4/20/2008 Introduction The Univerity of North Carolina Wilmington (UNCW) i a public comprehenive univerity, one of the ixteen
More informationCluster-Aware Cache for Network Attached Storage *
Cluter-Aware Cache for Network Attached Storage * Bin Cai, Changheng Xie, and Qiang Cao National Storage Sytem Laboratory, Department of Computer Science, Huazhong Univerity of Science and Technology,
More informationUNDERSTANDING SCHOOL LEADERSHIP AND MANAGEMENT IN CONTEMPORARY NIGERIA
ISSN: 2222990 UNDERSTANDING SCHOOL LEADERSHIP AND MANAGEMENT IN CONTEMPORARY NIGERIA Autin N. Noike The Granada Management Intitute, GranadaSpain Email: Autin_dac@yahoo.com Nkaiobi S. Oguzor ederal College
More informationRequirements Engineering Databases: The Good, The Bad, and The Ugly
New England Databae Day (NEDBDay08) February 4, 2008 Requirement Engineering Databae: The Good, The Bad, and The Ugly Brian Berenbach Siemen Corporate Reearch brian.berenbach@iemen.com 1 Agenda Brief Introduction
More informationEncrypted TCP chat using RSA and AES algorithm
Encrypted TCP chat uing RSA and AES algorithm Krzyztof Jakub Szala Bachelor Thei April 2014 Degree Programme in Information Technology Technology, communication and tranport DESCRIPTION Author() SZALA
More informationThe Import-Export Paradigm for High-Quality College Courses
Public Policy Editor: Stephen Ruth ruth@gmu.edu The Import-Export Paradigm for High-Quality College Coure An Anwer to Tuition Through-the- Roof Cot Spiral? Stephen Ruth George Maon Univerity Three new
More informationPerformance of a Browser-Based JavaScript Bandwidth Test
Performance of a Brower-Baed JavaScript Bandwidth Tet David A. Cohen II May 7, 2013 CP SC 491/H495 Abtract An exiting brower-baed bandwidth tet written in JavaScript wa modified for the purpoe of further
More information2. METHOD DATA COLLECTION
Key to learning in pecific ubject area of engineering education an example from electrical engineering Anna-Karin Cartenen,, and Jonte Bernhard, School of Engineering, Jönköping Univerity, S- Jönköping,
More informationyour Rights Consumer Guarantees Understanding Consumer Electronic Devices, Home Appliances & Home Entertainment Products
Conumer Guarantee Undertanding your Right Conumer Electronic Device, Home Appliance & Home Entertainment Product Voluntary Warranty Guide February 2014 JB Hi-Fi Group Pty Ltd (ABN 37 093 II4 286) The Autralian
More informationTesting Documentation for CCIH Database Management System By: John Reeves, Derek King, and Robert Watts
Teting Documentation for CCIH Databae Management Sytem By: John Reeve, Derek King, and Robert Watt The teting proce for our project i divided into three part of Unit teting, one part of Integration/Function
More informationREDUCTION OF TOTAL SUPPLY CHAIN CYCLE TIME IN INTERNAL BUSINESS PROCESS OF REAMER USING DOE AND TAGUCHI METHODOLOGY. Abstract. 1.
International Journal of Advanced Technology & Engineering Reearch (IJATER) REDUCTION OF TOTAL SUPPLY CHAIN CYCLE TIME IN INTERNAL BUSINESS PROCESS OF REAMER USING DOE AND Abtract TAGUCHI METHODOLOGY Mr.
More informationSoftware Engineering Management: strategic choices in a new decade
Software Engineering : trategic choice in a new decade Barbara Farbey & Anthony Finkeltein Univerity College London, Department of Computer Science, Gower St. London WC1E 6BT, UK {b.farbey a.finkeltein}@ucl.ac.uk
More informationDecoding Predictive Marketing AN INTRODUCTORY GUIDE
Decoding Predictive Marketing AN INTRODUCTORY GUIDE ContentING PAGE 3 Introduction to Predictive Marketing PAGE 10 Hidden Inight in CRM and Marketing Automation PAGE 13 Undertanding Predictive Model PAGE
More informationProducts and Services
Product and Service With client ranging from mall buinee to Fortune 500 firm, GIS ha vat experience undertanding and delivering on the unique need of a wide range of client. By providing uperior product
More informationThe Application of Information Technology in Mechanical, Civil and Automation Engineering
Reearch Programme of the Academy of Finland KITARA 2005-2009 The Application of Information Technology in Mechanical, Civil and Automation Engineering The Application of Information Technology in Mechanical,
More informationDespeckling Synthetic Aperture Radar Images with Cloud Computing using Graphics Processing Units
Depeckling Synthetic Aperture Radar Image with Cloud Computing uing Graphic Proceing Unit Matej Keneman 1, Dušan Gleich, Amor Chowdhury 1 1 Margento R & D d.o.o., Gopovetka ceta 84, Maribor, Slovenia matej.keneman@gmail.com
More informationThank you for attending the MDM for the Enterprise Seminar Series!
Thank you for attending the MDM for the Enterprie Seminar Serie! Pleae do not ditribute thi preentation without permiion from the peaker (ee contact information within.) Thi i jut intended a an additional
More informationScheduling of Jobs and Maintenance Activities on Parallel Machines
Scheduling of Job and Maintenance Activitie on Parallel Machine Chung-Yee Lee* Department of Indutrial Engineering Texa A&M Univerity College Station, TX 77843-3131 cylee@ac.tamu.edu Zhi-Long Chen** Department
More informationWarehouse Security System based on Embedded System
International Conference on Logitic Engineering, Management and Computer Science (LEMCS 2015) Warehoue Security Sytem baed on Embedded Sytem Gen Li Department of Electronic Engineering, Tianjin Univerity
More informationStrategic Plan of the Codex Alimentarius Commission 2014-2019 1
Strategic Plan of the Codex Alimentariu Commiion 2014-2019 1 STRATEGIC PLAN OF THE CODEX ALIMENTARIUS COMMISSION 2014-2019 INTRODUCTION The Codex Alimentariu Commiion (CAC) wa etablihed by the Food and
More informationHow To Control A Power Plant With A Power Control System
OVERVIEW Demand-controlled ventilation Leading edge product for demand-controlled ventilation! www.wegon.com Demand-controlled ventilation offer great comfort and low operating cot When the room i in ue,
More informationnaifa Members: SERVING AMERICA S NEIGHBORHOODS FOR 120 YEARS
naifa Member: SERVING AMERICA S NEIGHBORHOODS FOR 120 YEARS National Aociation of Inurance and Financial Advior Serving America Neigborhood for Over 120 Year Since 1890, NAIFA ha worked to afeguard the
More informationApplications of Risk Analysis in Border Security Niyazi Onur Bakir, University of Southern California nbakir@usc.edu
Application of Rik Analyi in Border Security Niyazi Onur Bakir, Univerity of Southern California nbakir@uc.edu 1. Overview... 1. Reearch Accomplihment....1. Security of Incoming Truck to U.S. Southwetern
More informationT-test for dependent Samples. Difference Scores. The t Test for Dependent Samples. The t Test for Dependent Samples. s D
The t Tet for ependent Sample T-tet for dependent Sample (ak.a., Paired ample t-tet, Correlated Group eign, Within- Subject eign, Repeated Meaure,.. Repeated-Meaure eign When you have two et of core from
More informationAvailability of WDM Multi Ring Networks
Paper Availability of WDM Multi Ring Network Ivan Rado and Katarina Rado H d.o.o. Motar, Motar, Bonia and Herzegovina Faculty of Electrical Engineering, Mechanical Engineering and Naval Architecture, Univerity
More informationBUILT-IN DUAL FREQUENCY ANTENNA WITH AN EMBEDDED CAMERA AND A VERTICAL GROUND PLANE
Progre In Electromagnetic Reearch Letter, Vol. 3, 51, 08 BUILT-IN DUAL FREQUENCY ANTENNA WITH AN EMBEDDED CAMERA AND A VERTICAL GROUND PLANE S. H. Zainud-Deen Faculty of Electronic Engineering Menoufia
More informationCHAPTER 5 BROADBAND CLASS-E AMPLIFIER
CHAPTER 5 BROADBAND CLASS-E AMPLIFIER 5.0 Introduction Cla-E amplifier wa firt preented by Sokal in 1975. The application of cla- E amplifier were limited to the VHF band. At thi range of frequency, cla-e
More informationAchieving Quality Through Problem Solving and Process Improvement
Quality Aurance Methodology Refinement Serie Achieving Quality Through Problem Solving and Proce Improvement Second Edition By Lynne Miller Franco Jeanne Newman Gaël Murphy Elizabeth Mariani Quality Aurance
More informationTracking Control and Adaptive Local Navigation for Nonholonomic Mobile Robots
Tracking Control and Adaptive Local Navigation for Nonholonomic Mobile Robot Alexander Mojaev Andrea Zell Univerity of Tuebingen, Computer Science Dept., Computer Architecture, Sand, D - 776 Tuebingen,
More informationRisk Management for a Global Supply Chain Planning under Uncertainty: Models and Algorithms
Rik Management for a Global Supply Chain Planning under Uncertainty: Model and Algorithm Fengqi You 1, John M. Waick 2, Ignacio E. Gromann 1* 1 Dept. of Chemical Engineering, Carnegie Mellon Univerity,
More informationAlgorithms for Advance Bandwidth Reservation in Media Production Networks
Algorithm for Advance Bandwidth Reervation in Media Production Network Maryam Barhan 1, Hendrik Moen 1, Jeroen Famaey 2, Filip De Turck 1 1 Department of Information Technology, Ghent Univerity imind Gaton
More informationComparison of Scheduling Algorithms for a Multi-Product Batch-Chemical Plant with a Generalized Serial Network
Comparion of Scheduling Algorithm for a Multi-Product Batch-Chemical Plant with a Generalized Serial Network Niem-Trung L. Tra Thei ubmitted to the faculty of the Virginia Polytechnic Intitute and State
More informationUniversidad de Colima Dirección General de Relaciones Internacionales y Cooperación Académica. List of courses taught in English 2016.
Univeridad de Colima Dirección General de Relacione Internacionale y Cooperación Académica. Lit of coure taught in Englih 2016. SCHOOL OF TOURISM. Bachelor in Tourim Management Semeter January - July 2016.
More informationUnit 11 Using Linear Regression to Describe Relationships
Unit 11 Uing Linear Regreion to Decribe Relationhip Objective: To obtain and interpret the lope and intercept of the leat quare line for predicting a quantitative repone variable from a quantitative explanatory
More informationHUMAN CAPITAL AND THE FUTURE OF TRANSITION ECONOMIES * Michael Spagat Royal Holloway, University of London, CEPR and Davidson Institute.
HUMAN CAPITAL AND THE FUTURE OF TRANSITION ECONOMIES * By Michael Spagat Royal Holloway, Univerity of London, CEPR and Davidon Intitute Abtract Tranition economie have an initial condition of high human
More informationReport 4668-1b 30.10.2010. Measurement report. Sylomer - field test
Report 4668-1b Meaurement report Sylomer - field tet Report 4668-1b 2(16) Contet 1 Introduction... 3 1.1 Cutomer... 3 1.2 The ite and purpoe of the meaurement... 3 2 Meaurement... 6 2.1 Attenuation of
More information! Search engines are highly profitable. n 99% of Google s revenue from ads. n Yahoo, bing also uses similar model
Search engine Advertiement The Economic of Web Search! Search engine are highly profitable Revenue come from elling ad related to querie 99% of Google revenue from ad Yahoo, bing alo ue imilar model CS315
More informationDUE to the small size and low cost of a sensor node, a
1992 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 14, NO. 10, OCTOBER 2015 A Networ Coding Baed Energy Efficient Data Bacup in Survivability-Heterogeneou Senor Networ Jie Tian, Tan Yan, and Guiling Wang
More informationA New Optimum Jitter Protection for Conversational VoIP
Proc. Int. Conf. Wirele Commun., Signal Proceing (Nanjing, China), 5 pp., Nov. 2009 A New Optimum Jitter Protection for Converational VoIP Qipeng Gong, Peter Kabal Electrical & Computer Engineering, McGill
More informationFree Enterprise, the Economy and Monetary Policy
Free Enterprie, the Economy and Monetary Policy free (fre) adj. not cont Free enterprie i the freedom of individual and buinee to power of another; at regulation. It enable individual and buinee to create,
More informationExposure Metering Relating Subject Lighting to Film Exposure
Expoure Metering Relating Subject Lighting to Film Expoure By Jeff Conrad A photographic expoure meter meaure ubject lighting and indicate camera etting that nominally reult in the bet expoure of the film.
More informationAN OVERVIEW ON CLUSTERING METHODS
IOSR Journal Engineering AN OVERVIEW ON CLUSTERING METHODS T. Soni Madhulatha Aociate Preor, Alluri Intitute Management Science, Warangal. ABSTRACT Clutering i a common technique for tatitical data analyi,
More informationUtility-Based Flow Control for Sequential Imagery over Wireless Networks
Utility-Baed Flow Control for Sequential Imagery over Wirele Networ Tomer Kihoni, Sara Callaway, and Mar Byer Abtract Wirele enor networ provide a unique et of characteritic that mae them uitable for building
More informationTowards Control-Relevant Forecasting in Supply Chain Management
25 American Control Conference June 8-1, 25. Portland, OR, USA WeA7.1 Toward Control-Relevant Forecating in Supply Chain Management Jay D. Schwartz, Daniel E. Rivera 1, and Karl G. Kempf Control Sytem
More information