SRA SOLOMON : MUC-4 TEST RESULTS AND ANALYSI S

Size: px
Start display at page:

Download "SRA SOLOMON : MUC-4 TEST RESULTS AND ANALYSI S"

Transcription

1 SRA SOLOMON : MUC-4 TEST RESULTS AND ANALYSI S Chinatu Aone, Doug McKee, Sandy Shinn, Hatte Bleje r Sytem Reearch and Application (SRA ) th Street North Arlington, VA aonec@ra.com INTRODUCTION In thi paper, we report SRA' reult on the MUC-4 tak and decribe how we trained our natural languag e proceing ytem for MUC-4. We alo report on what worked, what didn't work, and leon learned. Our MUC-4 ytem embed the SOLOMON knowledge-baed NLP hell which i deigned for both domain - independence and language-independence. We are currently uing SOLOMON for a Spanih and Japane e text undertanding project in a different domain. Although thi wa our firt year participating in MUC, w e have built and are currently building other data extraction ytem. RESULTS Our TST3 and TST4 reult are hown in Figure 1 and 2. The imilarity of thee core a well a thei r imilarity to SRA-internal teting reult reflect the portability of SRA' MUC-4 ytem. In fact, our cor e on the TST4 text wa better than that of TST3, even though thoe text covered a different time perio d than that of the training text or TST3. Our matched-only preciion and recall for both tet et were very high (TST3 : 68/47, TST4: 73/49). When SOLOMON recognized a MUC event, it did a very accurate and complete job at filling the requiit e template. SOLOMON performance wa tuned o that the all-template recall and preciion were a cloe a poibl e to maximize the F-Meaure. A hown in Figure 3, our F-Meaure teadily increaed over time. The fact that thi lope ha not yet leveled off how SOLOMON' potential for improvement. EFFORT SPENT We pent a total of 9 taff month tarting January 1, 1992 through May 31, 1992 on MUC-4. A takpecific breakdown of effort i hown in Figure 4. The bulk of the work wa pent porting SOLOMON t o a new domain with new vocabulary, concept, template-output format, and fill rule. Approximately 72% of the effort wa domain-dependent. However, about 63% of the total effort wa language-independent, i.e. it would be directly applicable to undertanding text about terrorim in any language. We expect that our Englih MUC-4 ytem could be ported to a new language in about 3 month, given a baic grammar, lexicon and preproceing data imilar to the one which exited for Englih. We partially demontrated thi 137

2 REC PRE OVG FA L MATCHED/MISSING MATCHED/SPURIOUS MATCHED ONLY ALL TEMPLATES TEXT FILTERING F-MEASURES P&R P&R P&2R Figure 1 : TST3 Reult REC PRE OVG FA L MATCHED/MISSING MATCHED/SPURIOUS MATCHED ONLY ALL TEMPLATES TEXT FILTERING F-MEASURES P&R P&R P&2R Figure 2: TST4 Reult claim by howing our MUC-4 ytem proceing Englih, Japanee and Spanih newpaper article about the murder of Jeuit priet at the demontration eion of MUC-4. We pent le than 2 week after the final tet adding MUC-pecific word to Spanih and Japanee lexicon, and extending the grammar of th e two language. Data 40% of the total effort building MUC-data wa pent on lexicon and KB entry acquiition. Much of thi dat a wa acquired automatically. We ued the upplied geographical data to automatically build location lexicon and KB. Uing the development template, we acquired lexical and KB entrie for clae of domain term uch a human and phyical target and terrorit organization. We automatically derived ubcategorization information for the domain verb from the development text (cf. [1]). Thee automatically acquired lexicon and KB did require ome manual cleanup and correction. Certain multi-word phenomena which occur frequently in text but are unuitable for general paring wer e handled by pattern matching during Preproceing. For example, we created pattern for Spanih phrae, complex location phrae, relative time, and name of political, military and terrorit organization. Modification to SOLOMON' broad-coverage Englih grammar included adding more emantic retriction, extending ome phrae-tructure rule, and improving general robutne. Baed on our knowledge engineering effort, we built a et of commonene reaoning rule that are decribed in detail in our ytem decription. Our EXTRACT module recognize MUC-relevant event in the output of SOLOMON and tranlate them into MUC-4 filled template. We implemented all the domainpecific information a mapping rule or imple converion function (e.g. numeric value like "at leat 5 " mean "5-" ). Thi data i tored in the knowledge bae, and i completely language independent. 13 8

3 o T20 ' 30 13{ M T T2 0 M T4 20 T2, 10 T2 i I 0 i I I I I I I I I I I moo JAN 1 MAR 25 MAY 1 MAY17 MAY 31 Hour of Effort Imo /3 1 Noun TST TST T8T Figure 3: Tracking SOLOMON Performanc e Tak Category ~ % of Total Effort DATA 7 1 Knowledge Engineering 1 3 Data Acquiition 3 0 Grammar 7 Pragmatic Inference Rule 1 1 Extract Data 1 0 PROCESSING Meage Zoning 3 Extract Extenion 7 Teting 1 0 Mic. Bug Fixing 10 Figure 4 : Breakdown of Effort Spent for MUC

4 Procein g We pent 1 week porting our exiting Meage Zoner to deal with meage header in MUC meage. The Meage Zoner could already recognize more general meage tructure uch a paragraph and entence. We extended EXTRACT while maintaining domain and language independence of the module. Feature added included event merging and handling of flat MUC template intead of the more object-oriente d databae record that SOLOMON i accutomed to. Our time pent on fixing bug wa ditributed throughout the ytem, but problem in Debri Paring and Debri Semantic received the mot attention. SYSTEM TRAININ G We ued TST2 text for blind teting and the entire 1300 development text for both teting and trainin g material. The development et wa crucial to both our automated data acquiition and our knowledge engineering tak. We performed frequent teting to track and direct our progre. To raie recall, w e focued on data acquiition ; to raie preciion, we focued on tricter definition of "legal" MUC event. To improve overall performance, we focued on more robut yntactic and emantic analyi and mor e reliable event merging. LIMITING FACTOR S The two main limiting factor were the number of development text and template and the amount of tim e allotted for the MUC-4 effort. With more text, we could have applied other more data-intenive automate d acquiition technique and had more example of phenomena to draw upon. With more time, we would add more domain-dependent lexical knowledge and additional pragmatic inference rule. We alo need to tune our EXTRACT mapping rule more finely and improve our dicoure module for both NP reference an d event reference reolution. Integration of exiting on-line reource uch a machine-readable dictionarie, the World Factbook, or WordNet would alo improve ytem performance. A more extenive teting and evaluation trategy at both the blackbox and glabox level would help direct progre, but wa not feaibl e in the amount of time we had. WHAT WAS OR WAS NOT SUCCESSFU L There were everal area where hybrid olution worked very well. Totally automated knowledge acquiition wa quite ucceful when upplemented by manual checking and editing of domain-crucial information. Similarly, augmenting a pure bottom-up parer with "imulated top-down paring" (See SRA ' MUC-4 Sytem Decription) worked well. Improved Debri Semantic and ignificantly extended Pragmatic Inferencing wer e alo important contributor to the ytem' performance. REUSABILITY SRA' SOLOMON NLP ytem ha been deigned for portability and proven to be highly reuable. Thi include portability to other domain, other language, and other application. A hown in Figure 5, a larg e 140

5 SOLOMON Popmaimiu MiW Ylwr Mee fume. U luwm Wad 11maly Wmd4mn MMydp M N+eV [wwq AIM PTV Rr' Mrplrnd nwm k Wprpr«won P Wmnal, g noop fdediin arr1rip nmmmi O+Wrw+ dtl1miimimir11 ~JIiWH Dwainapadk PMT.: NMMU PT,rw IMIRSupw. nom HM~M ertl~o MUC Oi Mo le MU C Emma B lbw 41..dol Smomld SINS, Figure 5: MUC NLP Sytem Reuability part of SOLOMON ' data and almot all of the proceing module are completely reuable for NLP in othe r domain or language. Currently, our Spanih and Japanee data extraction project MURASAKI i uing, without modification, the ame proceing module and the core knowledge bae a thoe ued for MUC-4. The MURASAKI ytem procee Spanih and Japanee language newpaper and journal article a well a TV trancript. Thi project' domain i the AIDS dieae. Thu, the only difference between our MUC-4 ytem an d MURASAKI ytem i that the latter ue Spanih and Japanee lexicon, pattern and grammar, an d MURASAKI domain-dependent knowledge bae. SOLOMON ha alo been embedded in everal Engli h meage undertanding ytem : ALEXIS (operational) and WARBUCKS. LESSONS LEARNED AND REAFFIRMED BY MUC- 4 We have learned and reaffirmed the following point a the mot crucial apect of ucceful text under - tanding for data extraction. Overcoming the Knowledge Acquiition Bottleneck : We mut develop technique and tool for acquiring timely, complete, and proven ytem data. Solving the Paring Problem : We need more robut, emantically contrained yntactic analyi. Grammar mut be broad-coverage and highly accurate on complex input. Developing Sophiticated Dicoure Analyi : We mut handle real world dicoure phenomena foun d in actual text. The dicoure architecture mut be flexible enough to accommodate particular dicour e phenomena which are crucial in particular domain or language. MUC-4 ha reaffirmed our knowledge of what i involved in porting an NLP ytem to a new domain. 9 taff month i a bare minimum for uch an effort. Improved knowledge acquiition tool a well a 141

6 on-line reource are deirable. To enure good reult, it i neceary to have ufficient time for knowledg e engineering, teting and evaluation. Our experience undercore the fact that natural language undertandin g i a highly data-driven problem. The ytem' performance i often proportional to the level of undertandin g of the input and output. The MUC-4 development text and template were extremely helpful in thi regard. Reference [1] Doug McKee and John Maloney. Uing Statitic Gained from Corpora in a Knowledge-Baed NLP Sytem. In Proceeding of The AAAI Workhop on Statitically-Baed NLP Technique,

A Spam Message Filtering Method: focus on run time

A Spam Message Filtering Method: focus on run time , pp.29-33 http://dx.doi.org/10.14257/atl.2014.76.08 A Spam Meage Filtering Method: focu on run time Sin-Eon Kim 1, Jung-Tae Jo 2, Sang-Hyun Choi 3 1 Department of Information Security Management 2 Department

More information

CASE STUDY ALLOCATE SOFTWARE

CASE STUDY ALLOCATE SOFTWARE CASE STUDY ALLOCATE SOFTWARE allocate caetud y TABLE OF CONTENTS #1 ABOUT THE CLIENT #2 OUR ROLE #3 EFFECTS OF OUR COOPERATION #4 BUSINESS PROBLEM THAT WE SOLVED #5 CHALLENGES #6 WORKING IN SCRUM #7 WHAT

More information

Project Management Basics

Project Management Basics Project Management Baic A Guide to undertanding the baic component of effective project management and the key to ucce 1 Content 1.0 Who hould read thi Guide... 3 1.1 Overview... 3 1.2 Project Management

More information

Tap Into Smartphone Demand: Mobile-izing Enterprise Websites by Using Flexible, Open Source Platforms

Tap Into Smartphone Demand: Mobile-izing Enterprise Websites by Using Flexible, Open Source Platforms Tap Into Smartphone Demand: Mobile-izing Enterprie Webite by Uing Flexible, Open Source Platform acquia.com 888.922.7842 1.781.238.8600 25 Corporate Drive, Burlington, MA 01803 Tap Into Smartphone Demand:

More information

SCM- integration: organiational, managerial and technological iue M. Caridi 1 and A. Sianei 2 Dipartimento di Economia e Produzione, Politecnico di Milano, Italy E-mail: maria.caridi@polimi.it Itituto

More information

Laureate Network Products & Services Copyright 2013 Laureate Education, Inc.

Laureate Network Products & Services Copyright 2013 Laureate Education, Inc. Laureate Network Product & Service Copyright 2013 Laureate Education, Inc. KEY Coure Name Laureate Faculty Development...3 Laureate Englih Program...9 Language Laureate Signature Product...12 Length Laureate

More information

DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS. G. Chapman J. Cleese E. Idle

DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS. G. Chapman J. Cleese E. Idle DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS G. Chapman J. Cleee E. Idle ABSTRACT Content matching i a neceary component of any ignature-baed network Intruion Detection

More information

Queueing systems with scheduled arrivals, i.e., appointment systems, are typical for frontal service systems,

Queueing systems with scheduled arrivals, i.e., appointment systems, are typical for frontal service systems, MANAGEMENT SCIENCE Vol. 54, No. 3, March 28, pp. 565 572 in 25-199 ein 1526-551 8 543 565 inform doi 1.1287/mnc.17.82 28 INFORMS Scheduling Arrival to Queue: A Single-Server Model with No-Show INFORMS

More information

CHARACTERISTICS OF WAITING LINE MODELS THE INDICATORS OF THE CUSTOMER FLOW MANAGEMENT SYSTEMS EFFICIENCY

CHARACTERISTICS OF WAITING LINE MODELS THE INDICATORS OF THE CUSTOMER FLOW MANAGEMENT SYSTEMS EFFICIENCY Annale Univeritati Apuleni Serie Oeconomica, 2(2), 200 CHARACTERISTICS OF WAITING LINE MODELS THE INDICATORS OF THE CUSTOMER FLOW MANAGEMENT SYSTEMS EFFICIENCY Sidonia Otilia Cernea Mihaela Jaradat 2 Mohammad

More information

DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS

DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS Chritopher V. Kopek Department of Computer Science Wake Foret Univerity Winton-Salem, NC, 2709 Email: kopekcv@gmail.com

More information

Apigee Edge: Apigee Cloud vs. Private Cloud. Evaluating deployment models for API management

Apigee Edge: Apigee Cloud vs. Private Cloud. Evaluating deployment models for API management Apigee Edge: Apigee Cloud v. Private Cloud Evaluating deployment model for API management Table of Content Introduction 1 Time to ucce 2 Total cot of ownerhip 2 Performance 3 Security 4 Data privacy 4

More information

Pekka Helkiö, 58490K Antti Seppälä, 63212W Ossi Syd, 63513T

Pekka Helkiö, 58490K Antti Seppälä, 63212W Ossi Syd, 63513T Pekka Helkiö, 58490K Antti Seppälä, 63212W Oi Syd, 63513T Table of Content 1. Abtract...1 2. Introduction...2 2.1 Background... 2 2.2 Objective and Reearch Problem... 2 2.3 Methodology... 2 2.4 Scoping

More information

Optical Illusion. Sara Bolouki, Roger Grosse, Honglak Lee, Andrew Ng

Optical Illusion. Sara Bolouki, Roger Grosse, Honglak Lee, Andrew Ng Optical Illuion Sara Bolouki, Roger Groe, Honglak Lee, Andrew Ng. Introduction The goal of thi proect i to explain ome of the illuory phenomena uing pare coding and whitening model. Intead of the pare

More information

INFORMATION Technology (IT) infrastructure management

INFORMATION Technology (IT) infrastructure management IEEE TRANSACTIONS ON CLOUD COMPUTING, VOL. 2, NO. 1, MAY 214 1 Buine-Driven Long-term Capacity Planning for SaaS Application David Candeia, Ricardo Araújo Santo and Raquel Lope Abtract Capacity Planning

More information

CASE STUDY BRIDGE. www.future-processing.com

CASE STUDY BRIDGE. www.future-processing.com CASE STUDY BRIDGE TABLE OF CONTENTS #1 ABOUT THE CLIENT 3 #2 ABOUT THE PROJECT 4 #3 OUR ROLE 5 #4 RESULT OF OUR COLLABORATION 6-7 #5 THE BUSINESS PROBLEM THAT WE SOLVED 8 #6 CHALLENGES 9 #7 VISUAL IDENTIFICATION

More information

SELF-MANAGING PERFORMANCE IN APPLICATION SERVERS MODELLING AND DATA ARCHITECTURE

SELF-MANAGING PERFORMANCE IN APPLICATION SERVERS MODELLING AND DATA ARCHITECTURE SELF-MANAGING PERFORMANCE IN APPLICATION SERVERS MODELLING AND DATA ARCHITECTURE RAVI KUMAR G 1, C.MUTHUSAMY 2 & A.VINAYA BABU 3 1 HP Bangalore, Reearch Scholar JNTUH, Hyderabad, India, 2 Yahoo, Bangalore,

More information

Development Progress

Development Progress H T U SO CA'S I R F A : Y R STO ial c o ca i r f A South ytem: e g ity ecur ing covera ing d it Expan t and lim lity a n u a r q g e f n o ni i e n increa orga ny M nke n-za e g a eth ca H Jei harle M

More information

License & SW Asset Management at CES Design Services

License & SW Asset Management at CES Design Services Licene & SW Aet Management at CES Deign Service johann.poechl@iemen.com www.ces-deignservice.com 2003 Siemen AG Öterreich Overview 1. Introduction CES Deign Service 2. Objective and Motivation 3. What

More information

Partial optimal labeling search for a NP-hard subclass of (max,+) problems

Partial optimal labeling search for a NP-hard subclass of (max,+) problems Partial optimal labeling earch for a NP-hard ubcla of (max,+) problem Ivan Kovtun International Reearch and Training Center of Information Technologie and Sytem, Kiev, Uraine, ovtun@image.iev.ua Dreden

More information

A Resolution Approach to a Hierarchical Multiobjective Routing Model for MPLS Networks

A Resolution Approach to a Hierarchical Multiobjective Routing Model for MPLS Networks A Reolution Approach to a Hierarchical Multiobjective Routing Model for MPLS Networ Joé Craveirinha a,c, Rita Girão-Silva a,c, João Clímaco b,c, Lúcia Martin a,c a b c DEEC-FCTUC FEUC INESC-Coimbra International

More information

TIME SERIES ANALYSIS AND TRENDS BY USING SPSS PROGRAMME

TIME SERIES ANALYSIS AND TRENDS BY USING SPSS PROGRAMME TIME SERIES ANALYSIS AND TRENDS BY USING SPSS PROGRAMME RADMILA KOCURKOVÁ Sileian Univerity in Opava School of Buine Adminitration in Karviná Department of Mathematical Method in Economic Czech Republic

More information

How To Prepare For A Mallpox Outbreak

How To Prepare For A Mallpox Outbreak Iue Brief No. 1 Bioterrorim and Health Sytem Preparedne Addreing the Smallpox Threat: Iue, Strategie, and Tool www.ahrq.gov The Agency for Healthcare Reearch and Quality (AHRQ) i the lead agency charged

More information

462 Machine Translation Systems for Europe

462 Machine Translation Systems for Europe 462 Machine Tranlation Sytem for Europe Philipp Koehn School of Informatic Univerity of Edinburgh pkoehn@inf.ed.ac.uk Alexandra Birch School of Informatic Univerity of Edinburgh a.birch@m.ed.ac.uk Ralf

More information

TRADING rules are widely used in financial market as

TRADING rules are widely used in financial market as Complex Stock Trading Strategy Baed on Particle Swarm Optimization Fei Wang, Philip L.H. Yu and David W. Cheung Abtract Trading rule have been utilized in the tock market to make profit for more than a

More information

Optimizing a Semantic Comparator using CUDA-enabled Graphics Hardware

Optimizing a Semantic Comparator using CUDA-enabled Graphics Hardware Optimizing a Semantic Comparator uing CUDA-enabled Graphic Hardware Aalap Tripathy Suneil Mohan, Rabi Mahapatra Embedded Sytem and Codeign Lab codeign.ce.tamu.edu (Preented at ICSC 0, September 9, 0 in

More information

FEDERATION OF ARAB SCIENTIFIC RESEARCH COUNCILS

FEDERATION OF ARAB SCIENTIFIC RESEARCH COUNCILS Aignment Report RP/98-983/5/0./03 Etablihment of cientific and technological information ervice for economic and ocial development FOR INTERNAL UE NOT FOR GENERAL DITRIBUTION FEDERATION OF ARAB CIENTIFIC

More information

Bio-Plex Analysis Software

Bio-Plex Analysis Software Multiplex Supenion Array Bio-Plex Analyi Software The Leader in Multiplex Immunoaay Analyi Bio-Plex Analyi Software If making ene of your multiplex data i your challenge, then Bio-Plex data analyi oftware

More information

How Enterprises Can Build Integrated Digital Marketing Experiences Using Drupal

How Enterprises Can Build Integrated Digital Marketing Experiences Using Drupal How Enterprie Can Build Integrated Digital Marketing Experience Uing Drupal acquia.com 888.922.7842 1.781.238.8600 25 Corporate Drive, Burlington, MA 01803 How Enterprie Can Build Integrated Digital Marketing

More information

Support Vector Machine Based Electricity Price Forecasting For Electricity Markets utilising Projected Assessment of System Adequacy Data.

Support Vector Machine Based Electricity Price Forecasting For Electricity Markets utilising Projected Assessment of System Adequacy Data. The Sixth International Power Engineering Conference (IPEC23, 27-29 November 23, Singapore Support Vector Machine Baed Electricity Price Forecating For Electricity Maret utiliing Projected Aement of Sytem

More information

A technical guide to 2014 key stage 2 to key stage 4 value added measures

A technical guide to 2014 key stage 2 to key stage 4 value added measures A technical guide to 2014 key tage 2 to key tage 4 value added meaure CONTENTS Introduction: PAGE NO. What i value added? 2 Change to value added methodology in 2014 4 Interpretation: Interpreting chool

More information

Two Dimensional FEM Simulation of Ultrasonic Wave Propagation in Isotropic Solid Media using COMSOL

Two Dimensional FEM Simulation of Ultrasonic Wave Propagation in Isotropic Solid Media using COMSOL Excerpt from the Proceeding of the COMSO Conference 0 India Two Dimenional FEM Simulation of Ultraonic Wave Propagation in Iotropic Solid Media uing COMSO Bikah Ghoe *, Krihnan Balaubramaniam *, C V Krihnamurthy

More information

RO-BURST: A Robust Virtualization Cost Model for Workload Consolidation over Clouds

RO-BURST: A Robust Virtualization Cost Model for Workload Consolidation over Clouds !111! 111!ttthhh IIIEEEEEEEEE///AAACCCMMM IIInnnttteeerrrnnnaaatttiiiooonnnaaalll SSSyyymmmpppoooiiiuuummm ooonnn CCCllluuuttteeerrr,,, CCClllooouuuddd aaannnddd GGGrrriiiddd CCCooommmpppuuutttiiinnnggg

More information

Tips For Success At Mercer

Tips For Success At Mercer Tip For Succe At Mercer 2008-2009 A Do-It-Yourelf Guide to Effective Study Skill Produced by the Office of Student Affair Welcome to You may be a recent high chool graduate about to tart your very firt

More information

A Review On Software Testing In SDlC And Testing Tools

A Review On Software Testing In SDlC And Testing Tools www.ijec.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume - 3 Iue -9 September, 2014 Page No. 8188-8197 A Review On Software Teting In SDlC And Teting Tool T.Amruthavalli*,

More information

Linking Example-Based and Rule-Based Machine Translation. Michael Carl, Catherine Pease and Oliver Streiter

Linking Example-Based and Rule-Based Machine Translation. Michael Carl, Catherine Pease and Oliver Streiter Linking Example-Baed and Rule-Baed Machine Tranlation Michael Carl, Catherine Peae and Oliver Streiter Intitut fur Angewandte Informationforchung, Martin-Luther Str. 14 (carl,cath,oliver)@iai.uni-b.de

More information

Benchmarking Bottom-Up and Top-Down Strategies for SPARQL-to-SQL Query Translation

Benchmarking Bottom-Up and Top-Down Strategies for SPARQL-to-SQL Query Translation Benchmarking Bottom-Up and Top-Down Strategie for SPARQL-to-SQL Query Tranlation Kahlev a, Chebotko b,c, John Abraham b, Pearl Brazier b, and Shiyong Lu a a Department of Computer Science, Wayne State

More information

Improving the Performance of Web Service Recommenders Using Semantic Similarity

Improving the Performance of Web Service Recommenders Using Semantic Similarity Improving the Performance of Web Service Recommender Uing Semantic Similarity Juan Manuel Adán-Coello, Carlo Miguel Tobar, Yang Yuming Faculdade de Engenharia de Computação, Pontifícia Univeridade Católica

More information

OPINION PIECE. It s up to the customer to ensure security of the Cloud

OPINION PIECE. It s up to the customer to ensure security of the Cloud OPINION PIECE It up to the cutomer to enure ecurity of the Cloud Content Don t outource what you don t undertand 2 The check lit 2 Step toward control 4 Due Diligence 4 Contract 4 E-dicovery 4 Standard

More information

QUANTIFYING THE BULLWHIP EFFECT IN THE SUPPLY CHAIN OF SMALL-SIZED COMPANIES

QUANTIFYING THE BULLWHIP EFFECT IN THE SUPPLY CHAIN OF SMALL-SIZED COMPANIES Sixth LACCEI International Latin American and Caribbean Conference for Engineering and Technology (LACCEI 2008) Partnering to Succe: Engineering, Education, Reearch and Development June 4 June 6 2008,

More information

A note on profit maximization and monotonicity for inbound call centers

A note on profit maximization and monotonicity for inbound call centers A note on profit maximization and monotonicity for inbound call center Ger Koole & Aue Pot Department of Mathematic, Vrije Univeriteit Amterdam, The Netherland 23rd December 2005 Abtract We conider an

More information

Trusted Document Signing based on use of biometric (Face) keys

Trusted Document Signing based on use of biometric (Face) keys Truted Document Signing baed on ue of biometric (Face) Ahmed B. Elmadani Department of Computer Science Faculty of Science Sebha Univerity Sebha Libya www.ebhau.edu.ly elmadan@yahoo.com ABSTRACT An online

More information

Control of Wireless Networks with Flow Level Dynamics under Constant Time Scheduling

Control of Wireless Networks with Flow Level Dynamics under Constant Time Scheduling Control of Wirele Network with Flow Level Dynamic under Contant Time Scheduling Long Le and Ravi R. Mazumdar Department of Electrical and Computer Engineering Univerity of Waterloo,Waterloo, ON, Canada

More information

INTERACTIVE TOOL FOR ANALYSIS OF TIME-DELAY SYSTEMS WITH DEAD-TIME COMPENSATORS

INTERACTIVE TOOL FOR ANALYSIS OF TIME-DELAY SYSTEMS WITH DEAD-TIME COMPENSATORS INTERACTIVE TOOL FOR ANALYSIS OF TIMEDELAY SYSTEMS WITH DEADTIME COMPENSATORS Joé Lui Guzmán, Pedro García, Tore Hägglund, Sebatián Dormido, Pedro Alberto, Manuel Berenguel Dep. de Lenguaje y Computación,

More information

Return on Investment and Effort Expenditure in the Software Development Environment

Return on Investment and Effort Expenditure in the Software Development Environment International Journal of Applied Information ytem (IJAI) IN : 2249-0868 Return on Invetment and Effort Expenditure in the oftware Development Environment Dineh Kumar aini Faculty of Computing and IT, ohar

More information

Progress 8 measure in 2016, 2017, and 2018. Guide for maintained secondary schools, academies and free schools

Progress 8 measure in 2016, 2017, and 2018. Guide for maintained secondary schools, academies and free schools Progre 8 meaure in 2016, 2017, and 2018 Guide for maintained econdary chool, academie and free chool July 2016 Content Table of figure 4 Summary 5 A ummary of Attainment 8 and Progre 8 5 Expiry or review

More information

Acceleration-Displacement Crash Pulse Optimisation A New Methodology to Optimise Vehicle Response for Multiple Impact Speeds

Acceleration-Displacement Crash Pulse Optimisation A New Methodology to Optimise Vehicle Response for Multiple Impact Speeds Acceleration-Diplacement Crah Pule Optimiation A New Methodology to Optimie Vehicle Repone for Multiple Impact Speed D. Gildfind 1 and D. Ree 2 1 RMIT Univerity, Department of Aeropace Engineering 2 Holden

More information

Performance of Multiple TFRC in Heterogeneous Wireless Networks

Performance of Multiple TFRC in Heterogeneous Wireless Networks Performance of Multiple TFRC in Heterogeneou Wirele Network 1 Hyeon-Jin Jeong, 2 Seong-Sik Choi 1, Firt Author Computer Engineering Department, Incheon National Univerity, oaihjj@incheon.ac.kr *2,Correponding

More information

Mobile Network Configuration for Large-scale Multimedia Delivery on a Single WLAN

Mobile Network Configuration for Large-scale Multimedia Delivery on a Single WLAN Mobile Network Configuration for Large-cale Multimedia Delivery on a Single WLAN Huigwang Je, Dongwoo Kwon, Hyeonwoo Kim, and Hongtaek Ju Dept. of Computer Engineering Keimyung Univerity Daegu, Republic

More information

A Note on Profit Maximization and Monotonicity for Inbound Call Centers

A Note on Profit Maximization and Monotonicity for Inbound Call Centers OPERATIONS RESEARCH Vol. 59, No. 5, September October 2011, pp. 1304 1308 in 0030-364X ein 1526-5463 11 5905 1304 http://dx.doi.org/10.1287/opre.1110.0990 2011 INFORMS TECHNICAL NOTE INFORMS hold copyright

More information

Design of Compound Hyperchaotic System with Application in Secure Data Transmission Systems

Design of Compound Hyperchaotic System with Application in Secure Data Transmission Systems Deign of Compound Hyperchaotic Sytem with Application in Secure Data Tranmiion Sytem D. Chantov Key Word. Lyapunov exponent; hyperchaotic ytem; chaotic ynchronization; chaotic witching. Abtract. In thi

More information

Principal version published in the University of Innsbruck Bulletin of 8 April 2009, Issue 55, No 233

Principal version published in the University of Innsbruck Bulletin of 8 April 2009, Issue 55, No 233 Note: The following curriculum i a conolidated verion. It i legally non-binding and for informational purpoe only. The legally binding verion are found in the Univerity of Innbruck Bulletin (in German).

More information

Very special thanks to Wolfgang Gentzsch and Burak Yenier for making the UberCloud HPC Experiment possible.

Very special thanks to Wolfgang Gentzsch and Burak Yenier for making the UberCloud HPC Experiment possible. Digital manufacturing technology and convenient acce to High Performance Computing (HPC) in indutry R&D are eential to increae the quality of our product and the competitivene of our companie. Progre can

More information

Abstract parsing: static analysis of dynamically generated string output using LR-parsing technology

Abstract parsing: static analysis of dynamically generated string output using LR-parsing technology Abtract paring: tatic analyi of dynamically generated tring output uing LR-paring technology Kyung-Goo Doh 1, Hyunha Kim 1, David A. Schmidt 2 1 Hanyang Univerity, Anan, South Korea 2 Kana State Univerity,

More information

Graduation Information 6

Graduation Information 6 # 2 0 142 015 c Graduation Information 6 ata l og # r e x pe firtyea r i e nc e # u top 2 r e nf tra # te ma a lc l #coo y t l acu be t f tie i r ve ni ampu linonc l i h c # ain inag w met # co SECTION

More information

APEC Environmental Goods and Services Work Program

APEC Environmental Goods and Services Work Program APEC Environmental Good and Service In Sydney in 2007 APEC Leader committed, through wide-ranging and ambitiou action, a et out in the Sydney Action Agenda, to enuring the energy need of the economie whilt

More information

Group Mutual Exclusion Based on Priorities

Group Mutual Exclusion Based on Priorities Group Mutual Excluion Baed on Prioritie Karina M. Cenci Laboratorio de Invetigación en Sitema Ditribuido Univeridad Nacional del Sur Bahía Blanca, Argentina kmc@c.un.edu.ar and Jorge R. Ardenghi Laboratorio

More information

Change Management Plan Blackboard Help Course 24/7

Change Management Plan Blackboard Help Course 24/7 MIT 530 Change Management Plan Help Coure 24/7 Submitted by: Sheri Anderon UNCW 4/20/2008 Introduction The Univerity of North Carolina Wilmington (UNCW) i a public comprehenive univerity, one of the ixteen

More information

Cluster-Aware Cache for Network Attached Storage *

Cluster-Aware Cache for Network Attached Storage * Cluter-Aware Cache for Network Attached Storage * Bin Cai, Changheng Xie, and Qiang Cao National Storage Sytem Laboratory, Department of Computer Science, Huazhong Univerity of Science and Technology,

More information

UNDERSTANDING SCHOOL LEADERSHIP AND MANAGEMENT IN CONTEMPORARY NIGERIA

UNDERSTANDING SCHOOL LEADERSHIP AND MANAGEMENT IN CONTEMPORARY NIGERIA ISSN: 2222990 UNDERSTANDING SCHOOL LEADERSHIP AND MANAGEMENT IN CONTEMPORARY NIGERIA Autin N. Noike The Granada Management Intitute, GranadaSpain Email: Autin_dac@yahoo.com Nkaiobi S. Oguzor ederal College

More information

Requirements Engineering Databases: The Good, The Bad, and The Ugly

Requirements Engineering Databases: The Good, The Bad, and The Ugly New England Databae Day (NEDBDay08) February 4, 2008 Requirement Engineering Databae: The Good, The Bad, and The Ugly Brian Berenbach Siemen Corporate Reearch brian.berenbach@iemen.com 1 Agenda Brief Introduction

More information

Encrypted TCP chat using RSA and AES algorithm

Encrypted TCP chat using RSA and AES algorithm Encrypted TCP chat uing RSA and AES algorithm Krzyztof Jakub Szala Bachelor Thei April 2014 Degree Programme in Information Technology Technology, communication and tranport DESCRIPTION Author() SZALA

More information

The Import-Export Paradigm for High-Quality College Courses

The Import-Export Paradigm for High-Quality College Courses Public Policy Editor: Stephen Ruth ruth@gmu.edu The Import-Export Paradigm for High-Quality College Coure An Anwer to Tuition Through-the- Roof Cot Spiral? Stephen Ruth George Maon Univerity Three new

More information

Performance of a Browser-Based JavaScript Bandwidth Test

Performance of a Browser-Based JavaScript Bandwidth Test Performance of a Brower-Baed JavaScript Bandwidth Tet David A. Cohen II May 7, 2013 CP SC 491/H495 Abtract An exiting brower-baed bandwidth tet written in JavaScript wa modified for the purpoe of further

More information

2. METHOD DATA COLLECTION

2. METHOD DATA COLLECTION Key to learning in pecific ubject area of engineering education an example from electrical engineering Anna-Karin Cartenen,, and Jonte Bernhard, School of Engineering, Jönköping Univerity, S- Jönköping,

More information

your Rights Consumer Guarantees Understanding Consumer Electronic Devices, Home Appliances & Home Entertainment Products

your Rights Consumer Guarantees Understanding Consumer Electronic Devices, Home Appliances & Home Entertainment Products Conumer Guarantee Undertanding your Right Conumer Electronic Device, Home Appliance & Home Entertainment Product Voluntary Warranty Guide February 2014 JB Hi-Fi Group Pty Ltd (ABN 37 093 II4 286) The Autralian

More information

Testing Documentation for CCIH Database Management System By: John Reeves, Derek King, and Robert Watts

Testing Documentation for CCIH Database Management System By: John Reeves, Derek King, and Robert Watts Teting Documentation for CCIH Databae Management Sytem By: John Reeve, Derek King, and Robert Watt The teting proce for our project i divided into three part of Unit teting, one part of Integration/Function

More information

REDUCTION OF TOTAL SUPPLY CHAIN CYCLE TIME IN INTERNAL BUSINESS PROCESS OF REAMER USING DOE AND TAGUCHI METHODOLOGY. Abstract. 1.

REDUCTION OF TOTAL SUPPLY CHAIN CYCLE TIME IN INTERNAL BUSINESS PROCESS OF REAMER USING DOE AND TAGUCHI METHODOLOGY. Abstract. 1. International Journal of Advanced Technology & Engineering Reearch (IJATER) REDUCTION OF TOTAL SUPPLY CHAIN CYCLE TIME IN INTERNAL BUSINESS PROCESS OF REAMER USING DOE AND Abtract TAGUCHI METHODOLOGY Mr.

More information

Software Engineering Management: strategic choices in a new decade

Software Engineering Management: strategic choices in a new decade Software Engineering : trategic choice in a new decade Barbara Farbey & Anthony Finkeltein Univerity College London, Department of Computer Science, Gower St. London WC1E 6BT, UK {b.farbey a.finkeltein}@ucl.ac.uk

More information

Decoding Predictive Marketing AN INTRODUCTORY GUIDE

Decoding Predictive Marketing AN INTRODUCTORY GUIDE Decoding Predictive Marketing AN INTRODUCTORY GUIDE ContentING PAGE 3 Introduction to Predictive Marketing PAGE 10 Hidden Inight in CRM and Marketing Automation PAGE 13 Undertanding Predictive Model PAGE

More information

Products and Services

Products and Services Product and Service With client ranging from mall buinee to Fortune 500 firm, GIS ha vat experience undertanding and delivering on the unique need of a wide range of client. By providing uperior product

More information

The Application of Information Technology in Mechanical, Civil and Automation Engineering

The Application of Information Technology in Mechanical, Civil and Automation Engineering Reearch Programme of the Academy of Finland KITARA 2005-2009 The Application of Information Technology in Mechanical, Civil and Automation Engineering The Application of Information Technology in Mechanical,

More information

Despeckling Synthetic Aperture Radar Images with Cloud Computing using Graphics Processing Units

Despeckling Synthetic Aperture Radar Images with Cloud Computing using Graphics Processing Units Depeckling Synthetic Aperture Radar Image with Cloud Computing uing Graphic Proceing Unit Matej Keneman 1, Dušan Gleich, Amor Chowdhury 1 1 Margento R & D d.o.o., Gopovetka ceta 84, Maribor, Slovenia matej.keneman@gmail.com

More information

Thank you for attending the MDM for the Enterprise Seminar Series!

Thank you for attending the MDM for the Enterprise Seminar Series! Thank you for attending the MDM for the Enterprie Seminar Serie! Pleae do not ditribute thi preentation without permiion from the peaker (ee contact information within.) Thi i jut intended a an additional

More information

Scheduling of Jobs and Maintenance Activities on Parallel Machines

Scheduling of Jobs and Maintenance Activities on Parallel Machines Scheduling of Job and Maintenance Activitie on Parallel Machine Chung-Yee Lee* Department of Indutrial Engineering Texa A&M Univerity College Station, TX 77843-3131 cylee@ac.tamu.edu Zhi-Long Chen** Department

More information

Warehouse Security System based on Embedded System

Warehouse Security System based on Embedded System International Conference on Logitic Engineering, Management and Computer Science (LEMCS 2015) Warehoue Security Sytem baed on Embedded Sytem Gen Li Department of Electronic Engineering, Tianjin Univerity

More information

Strategic Plan of the Codex Alimentarius Commission 2014-2019 1

Strategic Plan of the Codex Alimentarius Commission 2014-2019 1 Strategic Plan of the Codex Alimentariu Commiion 2014-2019 1 STRATEGIC PLAN OF THE CODEX ALIMENTARIUS COMMISSION 2014-2019 INTRODUCTION The Codex Alimentariu Commiion (CAC) wa etablihed by the Food and

More information

How To Control A Power Plant With A Power Control System

How To Control A Power Plant With A Power Control System OVERVIEW Demand-controlled ventilation Leading edge product for demand-controlled ventilation! www.wegon.com Demand-controlled ventilation offer great comfort and low operating cot When the room i in ue,

More information

naifa Members: SERVING AMERICA S NEIGHBORHOODS FOR 120 YEARS

naifa Members: SERVING AMERICA S NEIGHBORHOODS FOR 120 YEARS naifa Member: SERVING AMERICA S NEIGHBORHOODS FOR 120 YEARS National Aociation of Inurance and Financial Advior Serving America Neigborhood for Over 120 Year Since 1890, NAIFA ha worked to afeguard the

More information

Applications of Risk Analysis in Border Security Niyazi Onur Bakir, University of Southern California nbakir@usc.edu

Applications of Risk Analysis in Border Security Niyazi Onur Bakir, University of Southern California nbakir@usc.edu Application of Rik Analyi in Border Security Niyazi Onur Bakir, Univerity of Southern California nbakir@uc.edu 1. Overview... 1. Reearch Accomplihment....1. Security of Incoming Truck to U.S. Southwetern

More information

T-test for dependent Samples. Difference Scores. The t Test for Dependent Samples. The t Test for Dependent Samples. s D

T-test for dependent Samples. Difference Scores. The t Test for Dependent Samples. The t Test for Dependent Samples. s D The t Tet for ependent Sample T-tet for dependent Sample (ak.a., Paired ample t-tet, Correlated Group eign, Within- Subject eign, Repeated Meaure,.. Repeated-Meaure eign When you have two et of core from

More information

Availability of WDM Multi Ring Networks

Availability of WDM Multi Ring Networks Paper Availability of WDM Multi Ring Network Ivan Rado and Katarina Rado H d.o.o. Motar, Motar, Bonia and Herzegovina Faculty of Electrical Engineering, Mechanical Engineering and Naval Architecture, Univerity

More information

BUILT-IN DUAL FREQUENCY ANTENNA WITH AN EMBEDDED CAMERA AND A VERTICAL GROUND PLANE

BUILT-IN DUAL FREQUENCY ANTENNA WITH AN EMBEDDED CAMERA AND A VERTICAL GROUND PLANE Progre In Electromagnetic Reearch Letter, Vol. 3, 51, 08 BUILT-IN DUAL FREQUENCY ANTENNA WITH AN EMBEDDED CAMERA AND A VERTICAL GROUND PLANE S. H. Zainud-Deen Faculty of Electronic Engineering Menoufia

More information

CHAPTER 5 BROADBAND CLASS-E AMPLIFIER

CHAPTER 5 BROADBAND CLASS-E AMPLIFIER CHAPTER 5 BROADBAND CLASS-E AMPLIFIER 5.0 Introduction Cla-E amplifier wa firt preented by Sokal in 1975. The application of cla- E amplifier were limited to the VHF band. At thi range of frequency, cla-e

More information

Achieving Quality Through Problem Solving and Process Improvement

Achieving Quality Through Problem Solving and Process Improvement Quality Aurance Methodology Refinement Serie Achieving Quality Through Problem Solving and Proce Improvement Second Edition By Lynne Miller Franco Jeanne Newman Gaël Murphy Elizabeth Mariani Quality Aurance

More information

Tracking Control and Adaptive Local Navigation for Nonholonomic Mobile Robots

Tracking Control and Adaptive Local Navigation for Nonholonomic Mobile Robots Tracking Control and Adaptive Local Navigation for Nonholonomic Mobile Robot Alexander Mojaev Andrea Zell Univerity of Tuebingen, Computer Science Dept., Computer Architecture, Sand, D - 776 Tuebingen,

More information

Risk Management for a Global Supply Chain Planning under Uncertainty: Models and Algorithms

Risk Management for a Global Supply Chain Planning under Uncertainty: Models and Algorithms Rik Management for a Global Supply Chain Planning under Uncertainty: Model and Algorithm Fengqi You 1, John M. Waick 2, Ignacio E. Gromann 1* 1 Dept. of Chemical Engineering, Carnegie Mellon Univerity,

More information

Algorithms for Advance Bandwidth Reservation in Media Production Networks

Algorithms for Advance Bandwidth Reservation in Media Production Networks Algorithm for Advance Bandwidth Reervation in Media Production Network Maryam Barhan 1, Hendrik Moen 1, Jeroen Famaey 2, Filip De Turck 1 1 Department of Information Technology, Ghent Univerity imind Gaton

More information

Comparison of Scheduling Algorithms for a Multi-Product Batch-Chemical Plant with a Generalized Serial Network

Comparison of Scheduling Algorithms for a Multi-Product Batch-Chemical Plant with a Generalized Serial Network Comparion of Scheduling Algorithm for a Multi-Product Batch-Chemical Plant with a Generalized Serial Network Niem-Trung L. Tra Thei ubmitted to the faculty of the Virginia Polytechnic Intitute and State

More information

Universidad de Colima Dirección General de Relaciones Internacionales y Cooperación Académica. List of courses taught in English 2016.

Universidad de Colima Dirección General de Relaciones Internacionales y Cooperación Académica. List of courses taught in English 2016. Univeridad de Colima Dirección General de Relacione Internacionale y Cooperación Académica. Lit of coure taught in Englih 2016. SCHOOL OF TOURISM. Bachelor in Tourim Management Semeter January - July 2016.

More information

Unit 11 Using Linear Regression to Describe Relationships

Unit 11 Using Linear Regression to Describe Relationships Unit 11 Uing Linear Regreion to Decribe Relationhip Objective: To obtain and interpret the lope and intercept of the leat quare line for predicting a quantitative repone variable from a quantitative explanatory

More information

HUMAN CAPITAL AND THE FUTURE OF TRANSITION ECONOMIES * Michael Spagat Royal Holloway, University of London, CEPR and Davidson Institute.

HUMAN CAPITAL AND THE FUTURE OF TRANSITION ECONOMIES * Michael Spagat Royal Holloway, University of London, CEPR and Davidson Institute. HUMAN CAPITAL AND THE FUTURE OF TRANSITION ECONOMIES * By Michael Spagat Royal Holloway, Univerity of London, CEPR and Davidon Intitute Abtract Tranition economie have an initial condition of high human

More information

Report 4668-1b 30.10.2010. Measurement report. Sylomer - field test

Report 4668-1b 30.10.2010. Measurement report. Sylomer - field test Report 4668-1b Meaurement report Sylomer - field tet Report 4668-1b 2(16) Contet 1 Introduction... 3 1.1 Cutomer... 3 1.2 The ite and purpoe of the meaurement... 3 2 Meaurement... 6 2.1 Attenuation of

More information

! Search engines are highly profitable. n 99% of Google s revenue from ads. n Yahoo, bing also uses similar model

! Search engines are highly profitable. n 99% of Google s revenue from ads. n Yahoo, bing also uses similar model Search engine Advertiement The Economic of Web Search! Search engine are highly profitable Revenue come from elling ad related to querie 99% of Google revenue from ad Yahoo, bing alo ue imilar model CS315

More information

DUE to the small size and low cost of a sensor node, a

DUE to the small size and low cost of a sensor node, a 1992 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 14, NO. 10, OCTOBER 2015 A Networ Coding Baed Energy Efficient Data Bacup in Survivability-Heterogeneou Senor Networ Jie Tian, Tan Yan, and Guiling Wang

More information

A New Optimum Jitter Protection for Conversational VoIP

A New Optimum Jitter Protection for Conversational VoIP Proc. Int. Conf. Wirele Commun., Signal Proceing (Nanjing, China), 5 pp., Nov. 2009 A New Optimum Jitter Protection for Converational VoIP Qipeng Gong, Peter Kabal Electrical & Computer Engineering, McGill

More information

Free Enterprise, the Economy and Monetary Policy

Free Enterprise, the Economy and Monetary Policy Free Enterprie, the Economy and Monetary Policy free (fre) adj. not cont Free enterprie i the freedom of individual and buinee to power of another; at regulation. It enable individual and buinee to create,

More information

Exposure Metering Relating Subject Lighting to Film Exposure

Exposure Metering Relating Subject Lighting to Film Exposure Expoure Metering Relating Subject Lighting to Film Expoure By Jeff Conrad A photographic expoure meter meaure ubject lighting and indicate camera etting that nominally reult in the bet expoure of the film.

More information

AN OVERVIEW ON CLUSTERING METHODS

AN OVERVIEW ON CLUSTERING METHODS IOSR Journal Engineering AN OVERVIEW ON CLUSTERING METHODS T. Soni Madhulatha Aociate Preor, Alluri Intitute Management Science, Warangal. ABSTRACT Clutering i a common technique for tatitical data analyi,

More information

Utility-Based Flow Control for Sequential Imagery over Wireless Networks

Utility-Based Flow Control for Sequential Imagery over Wireless Networks Utility-Baed Flow Control for Sequential Imagery over Wirele Networ Tomer Kihoni, Sara Callaway, and Mar Byer Abtract Wirele enor networ provide a unique et of characteritic that mae them uitable for building

More information

Towards Control-Relevant Forecasting in Supply Chain Management

Towards Control-Relevant Forecasting in Supply Chain Management 25 American Control Conference June 8-1, 25. Portland, OR, USA WeA7.1 Toward Control-Relevant Forecating in Supply Chain Management Jay D. Schwartz, Daniel E. Rivera 1, and Karl G. Kempf Control Sytem

More information