Using Supervised Clustering Technique to Classify Received Messages in 137 Call Center of Tehran City Council

Size: px
Start display at page:

Download "Using Supervised Clustering Technique to Classify Received Messages in 137 Call Center of Tehran City Council"

Transcription

1 Usng Supervsed Clusterng Technque to Classfy Receved Messages n 137 Call Center of Tehran Cty Councl Mahdyeh Haghr 1*, Hamd Hassanpour 2 (1) Informaton Technology engneerng/e-commerce, Shraz Unversty (2) Department of Computer Eng. & IT, Shahrood Unversty of Technology,Shahrood,Iran [email protected]; [email protected] Receved: 2011/05/20; Accepted: 2011/06/14 Pages: Abstract Supervsed clusterng s a data mnng technque that assgns a set of data to predefned classes by analyzng dataset attrbutes. It s consdered as an mportant technque for nformaton retreval, management, and mnng n nformaton systems. Snce customer satsfacton s the man goal of organzatons n modern socety, to meet the requrements, 137 call center of Tehran cty councl s plannng to reduce the watng tme of customers, forwardng ther messages to the approprate servce manager to ncrease servce qualty. The cty councl s currently usng a manual approach dspatchng textual request messages. Snce ths process s very smlar to supervsed clusterng concept, n ths study, we appled the Naïve Bayes algorthm, whch s one of the most common algorthms n the supervsed clusterng arena to classfy receved messages regardng ther subjects. The performance results of the proposed technque ndcate ts hgh effcency n clusterng the receved messages wth 98% accuracy. Keywords: supervsed clusterng, classfcaton, Naïve Bayes algorthm, data mnng 1. Introducton Nowadays, due to the growng development of communcaton and nformaton technologes, our socety needs to take advantages of human and socal resources as much as possble. In ths regard, for nstance, reducng the watng tme of customers, ncreasng servce qualty and smplfyng the communcatons are needed n socal communcatons n ths age. Because of the growng development of IT-based communcaton tools and easy access to telecommuncatons systems such as phones, mobles, computers and the nternet, and due to engagement n dong routne tasks, usng smple and avalable technologes has a specal mportance. Therefore, Tehran muncpalty on a new plan made a system by usng nformaton technology scence and telecommuncaton tools. So, because of the drect vew and ctzens' actve collaboraton and people's nvolvement n managng ther own envronment, cvl tasks can be done quckly and properly. 137 call center of Tehran s founded as an nfrastructure n order to facltate communcatons of ctzens. The receved messages are classfed accordng to ther content nto predefned subject categores n the system by human operators and referred to the proper unt to be surveyed more. 15

2 Usng Supervsed Clusterng Technque to M. Haghr, H. Hassanpour Because of the mplementaton process n 137 call center that s naturally based on specfc and predefned choces, ths paper presents a model to classfy the receved messages automatcally. The proposed model uses a well known technque for textual document clusterng as an mportant step n ndexng, retreval, management and mnng of data n nformaton systems [1]. Clusterng methods are classfed nto two groups: supervsed and unsupervsed clusterng. Supervsed clusterng also known as classfcaton [2], s a data mnng technque used for extractng model from data on dscrete values [3]. Classfcaton evaluates the features of a data set, and then assgns them labels from a predefned set. Ths s the most common capablty of data mnng. Data classfcaton s a two-phase process [3]. In the frst phase, that s called learnng step, classfcaton system s made by a predefned set of data labels or concepts. In ths phase, the classfcaton algorthm makes the classfer by analyzng or learnng from tranng data set. In the second phase - generalzaton step [4], traned model s used to classfy unlabeled data. A test set s used to estmate the classfer performance. The man goal of generalzaton phase s to decrease nose mpact on the classfcaton results and ncrease classfer accuracy. Classfer accuracy on a gven test set s the percentage of tuples that have been correctly classfed. If classfer accuracy s admtted, t can be used to classfy tuples that ther class labels are unknown. Naïve Bayes, Roccho, K-Nearest Neghbors (K-NN), Regresson, Decson Trees, Neural Networks, Support Vector Machnes (SVM) and Decson Rule, can be referred to as the most mportant methods for text classfcatons problem [5]. Unsupervsed clusterng or smply clusterng [2], s n fact an unsupervsed learnng method. The goal s to dvde and gather a set of unstructured objects nto approprate clusters or groups so that smlar objects appear n the same cluster, and dfferent objects n the separate clusters [6,7]. The remander sectons of ths paper are as follows. Secton 2 explans our approach n detal. Followng, Secton 3 ntroduces our dataset and some related challenges related to Persan language of our dataset. Secton 4 s devoted to expermental results, and fnally secton 5 offers conclusons and suggests future work. 2. Introducng the proposed algorthm The classfcaton algorthm s used to classfy receved messages from ctzens n the 137 call center of Tehran cty councl based on Naïve Bayes algorthm. To know more about the mechansm of ths knd of algorthm, we wll explan t n great detals n ths secton. Assume we have m classes. Naïve Bayes classfcaton algorthm assgns X record to a class, say, whch has the maxmum posteror probablty: PC ( X ) > PC ( X ) for 1 j m, j (1) Wth ths assumpton, j maxmzes the posteror probablty. P( X C) PC ( ) P( C X) (2) P( X) 16

3 Journal of Advances n Computer Research (Vol. 2, No. 3, August 2011) Snce the value of P(X) s the same for all classes, to maxmze (2),, t s enough to maxmze. Addtonally f that s named pror probablty s equal for all classes, t s only requred for to be maxmzed. If the pror probablty of classes s dfferent, t s possble to compute from (3): PC ( ) PC, D D (3) where s the number of records of class n the dataset, and s the total number of records n the data set. The amount of computed by (4): P( X C ) =Π P( X C ) (4) n k= 1 k In ths relaton, s the amount of attrbute of for record and s the total number of all attrbutes. If attrbutes are dscrete, then: P( X k C) P( X C ) = C, D (5) Snce our calculaton for classfyng a record, s based on the percentage of occurrng keywords of specal class (weght of the keyword for a subject), formula (6) s used to compute the weght of each keyword for each subject: ( ) P X C thefrequencyofeachkeywordforsubjectc = (6) thefrequencyofeachkeywordforallsubjects a. Offered archtecture for classfcaton Offered archtecture n ths paper can classfy the receved messages from ctzens to predefned subjects. Ths algorthm s presented n fgure (1), weghts keywords of each message for every subject and then calculates the weght of the subjects for each message by summng the weghts of the keywords n each message. Fnally, t assgns to the message the subject wth maxmum weght. 17

4 Usng Supervsed Clusterng Technque to M. Haghr, H. Hassanpour Algorthm SAMANE (Input Message: Strng, Output: Classfcaton of Message) 1- Select a Message; 2- Gve-Token(Message, Token-Set); 3- Fnd New Tokens n Relaton by Tokens n Token-Set and Insert Token-Set and Unte wth Related Token; 4- For Each Token n Token-Set Do Fnd All Message n Database n Whch It Occurs and Insert It n Message-Set; 4-1- For Each Message n Message-Set Do Fnd All Themes (Subjects) Related to Message; Themes-Frequency=Frequency of All Themes for Each Token; 4-2- For Each Theme n Theme-Set Do Weght (Token, Theme) = Frequency of Themes (Subjects)/ Themes-Frequency; 5- For Theme=1 to Number of Themes Do For Token=1 to Number of Tokens Do Sum (Theme) = Sum(Theme)+Weght(Token, Theme); 6- Max=Sum (1); For Theme=2 to Number of Themes Do If Sum(Theme)>Max Then Max=Sum(Theme); 7- Return Class=Subject(Max);. Fgure 1. offered classfcaton algorthm Table (1) represents a sample of the amount of the keywords relaton wth predefned subjects for each message. Ths assumed message has keywords that have been already exsted n subjects of all predefned subjects. Table 1. The relaton between keywords and defned subjects Subject Word Subject m Subject 2 Subject 1 Keyword 1 15% 40% 27% Keyword 2 20% 25% 10% Keyword n 5% 30% 36% Ths algorthm estmates the weght of each keyword n exstng subjects and calculates the weght of each message for each probable subject by computng the total assgned weghts of the keywords n each subject. The way of calculatng the weght of each keyword n dfferent subjects has been shown n (6). 18

5 Journal of Advances n Computer Research (Vol. 2, No. 3, August 2011) The message classfcaton steps are as followng: 1. Select a message from receved messages; 2. Fnd the keywords exstng n the message; 3. Fnd synonyms and words relatng to the keywords and ntegrate them; 4. Make Token-Set (set of the keywords and the synonyms relatng to the message); 5. Send Token-Set to the weght calculaton unt for each subject; 6. Calculate the weghts for each subject for message; 7. Assgn the message to the subject wth the maxmum weght; 8. Regster nformaton so that t can be used for searchng and retrevng. b. The components of the offered archtecture Fgure 2. offered archtecture for classfcaton. Tranng data set Tranng data are sets of nformaton that transfer a knd of knowledge to the learner agent as a presupposed one. Actually, basc dfference between two methods of clusterng results from the dfference between ther learnng methods. Tranng nformaton gven to the system has been dscussed n the followng. - Class Labels The 137 call center of Tehran cty councl has classfed the receved messages from ctzens nto 44 specfc classes and then refers them to the relevant unt. Snce we plan to classfy automatc data based on the current process, and also we want to provde the same condton to compare the two methods, 44 classes wth the same labels are ncluded n the offered system. Moreover a class called "other cases" has been consdered so that a receved message out of the knowledge extent of the system can be classfed. - Tranng messages Each of the 44 classes n the manual system contans some related messages. These messages have been chosen and dscussed by a group of human expertse assgned by Tehran muncpalty and nclude all types of probable problems n every subject. These messages have been known as tranng messages n our system and ntroduced to the system by ther class labels. 19

6 Usng Supervsed Clusterng Technque to M. Haghr, H. Hassanpour - Keywords Preprocessng explores smple data n order to change them to approprate format for tranng [8]. One of the preprocessng phases s to extract keywords. Each document has one or more keywords or key phrases descrbng ts content, where these keywords or key phrases belong to a fnte set called controlled dctonary [5]. If there s a set of tranng documents wth dstnctve keywords for each of them, the process of extractng keywords wll be a supervsed learnng, otherwse wll be an unsupervsed learnng [8]. Due to the nature of our data tranng, we always face the short messages. Our target keywords are also exactly techncal n the urban management and belong to the predefned classes. So dentfyng and defnng these few techncal words whch many of them have been already known ncreases the accuracy and effcency of the system, and requres less tme regardng to dentfyng all the useless words such as addtonal words, conjunctons, pronouns, adverbs, plural suffxes, verbs and, etc. In ths paper we proft from supervsed learnng for keyword extracton. The offered system has been desgned n a way that t can dstngush defned keywords from all the suffxes, prefxes, punctuatons such as ".", ",", ";", "?", etc. and also mult syllabus words. So the keywords have been ntroduced to the system n ther smplest faces.. Test data set The data whch have been used to test the offered system, are the sent messages from the ctzens n the frst fve months n 2011n the dstrcts 1,2, 5 and 7 of the muncpalty of the regon 1 n Tehran. These 356 messages that have been already classfed manually are n 20 classes out of 44 tranng classes. In ths paper, t s supposed that ctzens' messages should be sent n Persan. c. Overcomng Persan language challenges In [9], some of the Persan language challenges n computer especally n the nternet and result of web searchng, have been mentoned. These challenges are as followng: ; «میتواند «and «میتواند «as such «می «unclung 1. Varety n usng clung or ; «درختها «and «درختها «as such «ها «unclung 2. Varety n usng clung or ; «پاکسازي «and «پاكسازي «as 3. Usng some prefxes or suffxes such ; «مسي له «and «مسا له «or «مسو ول «and «مسي ول «as n varous types such «همزه «Usng 4. ; «خانه مسکونی «and «خانە مسکونی «as such ة««usng 5. Usng or not ; «موسا «and «موسی «as such ا««by n Arabc words ended ي««usng 6. Varety n ; «اطاق «and «اتاق «as 7. Varety n spellng some words such 8. Usng European words n natve language or Persan translatons such as «ATM» and ; «خودپرداز «9. Usng or not usng rregular plurals for some words; 10. Transformng Latn words to Persan alphabets wth the orgnal pronuncaton such as ; «سورس «and «source» ; «قران «and «قرآن «as nterchangeably such آ««and ا««Usng Usng or not usng phonetc symbols for words. 20

7 Journal of Advances n Computer Research (Vol. 2, No. 3, August 2011) The only dfference between our data and what found n computer, and the nternet s that our data are messages sent by ther own cell phones or mobles. Due to the present abltes of mobles n our country, cases such as 5 and 12 can't be set forth for dscusson. On the other hand, ctzens are supposed to send ther messages n Persan, so cases 8 and 10 can be gnored, too. Because of the system capacty to extract keywords from all of possble suffxes and prefxes, cases 1 and 2 have been corrected. Our offered system has a complete controlled dctonary that keywords belong to t. Ths dctonary n addton to synonymous words and phrases of keywords, conssts of dfferent spellng of them so that the system can respond to the cases 3, 6, 7 and 9 correctly. But for cases 4 and 11, an ablty s consdered n the system so that all the wrtng styles of vowels such as «,«و««ا and «ي» can be changed to the natve wrtng styles and then t wll survey them. 3. Evaluaton the offered system performance To estmate algorthm performance, three scales Precson(P), Recall(R) and Accuracy(A) were surveyed[10]. Four parameters TP, FN, FP and TN[11] that are defned n table (3), are needed to calculate these scales. Table 3. parameters of effcency scales Text Assgnng to class Not assgnng to class Belongng to class True Postve(tp) False Negatve(fn) Belongng to non class False Postve(fp) True Negatve(tn) Accuracy s the common scale used to evaluate accuracy of machne learnng algorthms. Ths scale s calculated by (7)[12]: tp+ tn A = tp + tn + fp + fn (7) Precson and Recall are scales used to estmate effcency of the text classfcaton algorthm. Precson scale calculates the accuracy of a searchng. Ths scale s calculated by (8)[12]: P tp = tp + fp (8) Recall scale, unlke the precson scale, calculates the rate of perfecton n a searchng [12]: R tp = tp + fn (9) 21

8 Usng Supervsed Clusterng Technque to M. Haghr, H. Hassanpour Table (4) presents the effcency scales of the system n all target classes. The average of ths asset value s used for fnal evaluaton. Table 4. Performance metrcs related to some target classes Class name Accuracy Precson Recall water bus asphalt Socal damages snow Parks and green lands traffc Changng usage Removng and ptchng anmals trees trashes buldng Blockng path washng dredge reparng trouble Ptchng safety marks cleanng Average The results from the surveys showed that the system has totally made acceptable errors n the followng condtons: 1. The nearness of the message content to two or more groups wth the hgh usage and meanng resemblance; 2. The presence of dfferent usage and meanng keywords n the message; 3. Introducng the problem n a statement, wthout gvng any soluton or requestng to solve the problem. The frst error resultng from the hgh meanng resemblance and usage occurs because the rght range of the subject has not been pad attenton. For words such as park that has dfferent meanngs n dfferent sentences, t s necessary to extract not only the defned keywords but also survey the other parts of the sentence so that the target meanng n each sentence can be specfed through the relevant words wth each possble meanng. The thrd error occurs because the range of some groups s too wde. Although the ctzens can help survey ther message better and faster by requestng the muncpalty n ther own messages, at least by makng ther own requests besdes the ntroduced problems. Therefore, to correct the possble errors and ncrease the effcency of the system as much as possble, the followng actons can be taken. 1. Reformng the exstng groups by mergng or splttng the groups of less accuracy; 22

9 Journal of Advances n Computer Research (Vol. 2, No. 3, August 2011) Usng a method besdes usng a dctonary to ndex latent semantc n the sentences made up of the dfferent applcable meanng keywords; 3. Approprate teachng and nformng the ctzens to ask ther own requests n the message. However, despte the ntroduced problems the rate of offered system precson s 87%, and ts Recall s 82%. Of course, we should notce that these acceptable percentages have consderably mproved and makes the system effcency ncrease by overcomng the presented dffcultes. The accuracy measure calculated s over 98%. Ths shows one of the most mportant advantages of the Naïve Bayes algorthm n comparson wth other algorthms that s ts persstence aganst the rrelevant attrbutes and keywords. 4. Concluson In ths paper, a method based on one of the most common supervsed algorthms, Naïve Bayes, was presented to classfy the ctzens' thematc messages n the 137 call center of Tehran cty councl. Ths algorthm uses 44 exstng classes n the manual system as tranng classes, 605 reference messages as ts tranng messages and 356 receved messages from Tehran ctzens n dstrct 4 of Tehran muncpalty of regon 1 for fve months n a year, as ts test data. Applyng ths method and evaluatng ts results proved ths algorthm wth accuracy up to over 98%, s a rght choce for our target. The rate of precson 87% and recallng 82% n classfyng the messages also suggests the comparatve success of the offered system n classfyng the target test data. Moreover, more study on the obtaned results showed that the effcency of the system can be ncreased by reformng the target groups used n the 137 call center and subsequently n the system and addng more convenence to the capacty of ndexng ts latent semantc, and teachng and nformng the ctzens correctly n presentng ther problems and requests. Our suggested future work conssts of usng other methods besde the current algorthm to ncrease accuracy. 5. References [1] Azzag, H., Gunot, C. and Venturn, G., "Data and text mnng wth herarchcal clusterng ants" Sprnger, Swarm Intellgence n Data Mnng. Vol. 34,: , [2] Eck, C., F., Zedat, N. and Zhao, Z., "Supervsed Clusterng- Algorthms and Benefts" 16th IEEE Internatonal Conference on Tools wth Artfcal Intellgence (ICTAI'04): , [3] Mazhar, N., Iman, M., Joudak, M. and Ghelchpour, A., " An overvew of classfcaton and ts algorthms" 3 th Data Mnng Conference (IDMC'09): Tehran, [4] Fazaeljavan, M. and Sadredn, M., H., " Investgatng Classfcaton and Assocaton Rule Mnng Technques for Intruson Detecton" 3 th Data Mnng Conference (IDMC'09): Tehran, [5] Sebastan, F., "Machne learnng n automated text categorzaton" Journal of ACM Computng Surveys., Vol. 34, [6] Fnley, T. and Joachms, T., "Supervsed clusterng wth support vector machnes" ICML '05 Proceedngs of the 22nd nternatonal conference on Machne learnng, [7] Berkhn, P., "Survey Of Clusterng Data Mnng Technques" Sprnger. Vol. 12: 1-56, [8] Ahmad, M., H., Monadjem, A., H. and Ayat, S., "Persan Text Classfcaton Usng Assocaton Rules" 4 th Data Mnng Conference (IDMC'10): Tehran,

10 Usng Supervsed Clusterng Technque to M. Haghr, H. Hassanpour [9] محسنیکبیر نینا میناییبیدگلی بهروز و کاشفی امید "مطالعه و بررسی اثر پیشوند و پسوند در شباهت معنایی جملات زبان فارسی با هدف کاربردي در سیستمهاي بازیابی اطلاعات" سومین کنفرانس دادهکاوي ایران تهران: دانشگاه علم و صنعت ایران [10] Wllams, N., Zander, S. and Armtage, G., "A prelmnary performance comparson of fve machne learnng algorthms for practcal IP traffc flow classfcaton" ACM SIGCOMM Computer Communcaton Revew. Vol. 36, October [11] Nguyen, T., T., T. and Armtage, G., "A survey of technques for nternet traffc classfcaton usng machne learnng" IEEE, Communcatons Surveys & Tutorals. Vol. 10: 56-76, [12] Fard, D., Harb, N. and Rahman, M., Z., "Combnng Nave Bayes and Decson Tree for Adaptve Intruson Detecton" Internatonal Journal of Network Securty & Its Applcatons: 12-25,

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis The Development of Web Log Mnng Based on Improve-K-Means Clusterng Analyss TngZhong Wang * College of Informaton Technology, Luoyang Normal Unversty, Luoyang, 471022, Chna [email protected] Abstract.

More information

Forecasting the Direction and Strength of Stock Market Movement

Forecasting the Direction and Strength of Stock Market Movement Forecastng the Drecton and Strength of Stock Market Movement Jngwe Chen Mng Chen Nan Ye [email protected] [email protected] [email protected] Abstract - Stock market s one of the most complcated systems

More information

What is Candidate Sampling

What is Candidate Sampling What s Canddate Samplng Say we have a multclass or mult label problem where each tranng example ( x, T ) conssts of a context x a small (mult)set of target classes T out of a large unverse L of possble

More information

An Interest-Oriented Network Evolution Mechanism for Online Communities

An Interest-Oriented Network Evolution Mechanism for Online Communities An Interest-Orented Network Evoluton Mechansm for Onlne Communtes Cahong Sun and Xaopng Yang School of Informaton, Renmn Unversty of Chna, Bejng 100872, P.R. Chna {chsun,yang}@ruc.edu.cn Abstract. Onlne

More information

How To Classfy Onlne Mesh Network Traffc Classfcaton And Onlna Wreless Mesh Network Traffic Onlnge Network

How To Classfy Onlne Mesh Network Traffc Classfcaton And Onlna Wreless Mesh Network Traffic Onlnge Network Journal of Computatonal Informaton Systems 7:5 (2011) 1524-1532 Avalable at http://www.jofcs.com Onlne Wreless Mesh Network Traffc Classfcaton usng Machne Learnng Chengje GU 1,, Shuny ZHANG 1, Xaozhen

More information

A Replication-Based and Fault Tolerant Allocation Algorithm for Cloud Computing

A Replication-Based and Fault Tolerant Allocation Algorithm for Cloud Computing A Replcaton-Based and Fault Tolerant Allocaton Algorthm for Cloud Computng Tork Altameem Dept of Computer Scence, RCC, Kng Saud Unversty, PO Box: 28095 11437 Ryadh-Saud Araba Abstract The very large nfrastructure

More information

An Alternative Way to Measure Private Equity Performance

An Alternative Way to Measure Private Equity Performance An Alternatve Way to Measure Prvate Equty Performance Peter Todd Parlux Investment Technology LLC Summary Internal Rate of Return (IRR) s probably the most common way to measure the performance of prvate

More information

Searching for Interacting Features for Spam Filtering

Searching for Interacting Features for Spam Filtering Searchng for Interactng Features for Spam Flterng Chuanlang Chen 1, Yun-Chao Gong 2, Rongfang Be 1,, and X. Z. Gao 3 1 Department of Computer Scence, Bejng Normal Unversty, Bejng 100875, Chna 2 Software

More information

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur Module LOSSLESS IMAGE COMPRESSION SYSTEMS Lesson 3 Lossless Compresson: Huffman Codng Instructonal Objectves At the end of ths lesson, the students should be able to:. Defne and measure source entropy..

More information

A Secure Password-Authenticated Key Agreement Using Smart Cards

A Secure Password-Authenticated Key Agreement Using Smart Cards A Secure Password-Authentcated Key Agreement Usng Smart Cards Ka Chan 1, Wen-Chung Kuo 2 and Jn-Chou Cheng 3 1 Department of Computer and Informaton Scence, R.O.C. Mltary Academy, Kaohsung 83059, Tawan,

More information

PEER REVIEWER RECOMMENDATION IN ONLINE SOCIAL LEARNING CONTEXT: INTEGRATING INFORMATION OF LEARNERS AND SUBMISSIONS

PEER REVIEWER RECOMMENDATION IN ONLINE SOCIAL LEARNING CONTEXT: INTEGRATING INFORMATION OF LEARNERS AND SUBMISSIONS PEER REVIEWER RECOMMENDATION IN ONLINE SOCIAL LEARNING CONTEXT: INTEGRATING INFORMATION OF LEARNERS AND SUBMISSIONS Yunhong Xu, Faculty of Management and Economcs, Kunmng Unversty of Scence and Technology,

More information

APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT

APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT Toshhko Oda (1), Kochro Iwaoka (2) (1), (2) Infrastructure Systems Busness Unt, Panasonc System Networks Co., Ltd. Saedo-cho

More information

DEFINING %COMPLETE IN MICROSOFT PROJECT

DEFINING %COMPLETE IN MICROSOFT PROJECT CelersSystems DEFINING %COMPLETE IN MICROSOFT PROJECT PREPARED BY James E Aksel, PMP, PMI-SP, MVP For Addtonal Informaton about Earned Value Management Systems and reportng, please contact: CelersSystems,

More information

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ).

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ). REVIEW OF RISK MANAGEMENT CONCEPTS LOSS DISTRIBUTIONS AND INSURANCE Loss and nsurance: When someone s subject to the rsk of ncurrng a fnancal loss, the loss s generally modeled usng a random varable or

More information

A Performance Analysis of View Maintenance Techniques for Data Warehouses

A Performance Analysis of View Maintenance Techniques for Data Warehouses A Performance Analyss of Vew Mantenance Technques for Data Warehouses Xng Wang Dell Computer Corporaton Round Roc, Texas Le Gruenwald The nversty of Olahoma School of Computer Scence orman, OK 739 Guangtao

More information

Traffic-light a stress test for life insurance provisions

Traffic-light a stress test for life insurance provisions MEMORANDUM Date 006-09-7 Authors Bengt von Bahr, Göran Ronge Traffc-lght a stress test for lfe nsurance provsons Fnansnspetonen P.O. Box 6750 SE-113 85 Stocholm [Sveavägen 167] Tel +46 8 787 80 00 Fax

More information

How To Know The Components Of Mean Squared Error Of Herarchcal Estmator S

How To Know The Components Of Mean Squared Error Of Herarchcal Estmator S S C H E D A E I N F O R M A T I C A E VOLUME 0 0 On Mean Squared Error of Herarchcal Estmator Stans law Brodowsk Faculty of Physcs, Astronomy, and Appled Computer Scence, Jagellonan Unversty, Reymonta

More information

Calculation of Sampling Weights

Calculation of Sampling Weights Perre Foy Statstcs Canada 4 Calculaton of Samplng Weghts 4.1 OVERVIEW The basc sample desgn used n TIMSS Populatons 1 and 2 was a two-stage stratfed cluster desgn. 1 The frst stage conssted of a sample

More information

Semantic Link Analysis for Finding Answer Experts *

Semantic Link Analysis for Finding Answer Experts * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 28, 51-65 (2012) Semantc Lnk Analyss for Fndng Answer Experts * YAO LU 1,2,3, XIAOJUN QUAN 2, JINGSHENG LEI 4, XINGLIANG NI 1,2,3, WENYIN LIU 2,3 AND YINLONG

More information

Mining Multiple Large Data Sources

Mining Multiple Large Data Sources The Internatonal Arab Journal of Informaton Technology, Vol. 7, No. 3, July 2 24 Mnng Multple Large Data Sources Anmesh Adhkar, Pralhad Ramachandrarao 2, Bhanu Prasad 3, and Jhml Adhkar 4 Department of

More information

Enterprise Master Patient Index

Enterprise Master Patient Index Enterprse Master Patent Index Healthcare data are captured n many dfferent settngs such as hosptals, clncs, labs, and physcan offces. Accordng to a report by the CDC, patents n the Unted States made an

More information

Recurrence. 1 Definitions and main statements

Recurrence. 1 Definitions and main statements Recurrence 1 Defntons and man statements Let X n, n = 0, 1, 2,... be a MC wth the state space S = (1, 2,...), transton probabltes p j = P {X n+1 = j X n = }, and the transton matrx P = (p j ),j S def.

More information

Performance Analysis and Coding Strategy of ECOC SVMs

Performance Analysis and Coding Strategy of ECOC SVMs Internatonal Journal of Grd and Dstrbuted Computng Vol.7, No. (04), pp.67-76 http://dx.do.org/0.457/jgdc.04.7..07 Performance Analyss and Codng Strategy of ECOC SVMs Zhgang Yan, and Yuanxuan Yang, School

More information

NEURO-FUZZY INFERENCE SYSTEM FOR E-COMMERCE WEBSITE EVALUATION

NEURO-FUZZY INFERENCE SYSTEM FOR E-COMMERCE WEBSITE EVALUATION NEURO-FUZZY INFERENE SYSTEM FOR E-OMMERE WEBSITE EVALUATION Huan Lu, School of Software, Harbn Unversty of Scence and Technology, Harbn, hna Faculty of Appled Mathematcs and omputer Scence, Belarusan State

More information

Using Content-Based Filtering for Recommendation 1

Using Content-Based Filtering for Recommendation 1 Usng Content-Based Flterng for Recommendaton 1 Robn van Meteren 1 and Maarten van Someren 2 1 NetlnQ Group, Gerard Brandtstraat 26-28, 1054 JK, Amsterdam, The Netherlands, [email protected] 2 Unversty of

More information

Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College

Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College Feature selecton for ntruson detecton Slobodan Petrovć NISlab, Gjøvk Unversty College Contents The feature selecton problem Intruson detecton Traffc features relevant for IDS The CFS measure The mrmr measure

More information

Single and multiple stage classifiers implementing logistic discrimination

Single and multiple stage classifiers implementing logistic discrimination Sngle and multple stage classfers mplementng logstc dscrmnaton Hélo Radke Bttencourt 1 Dens Alter de Olvera Moraes 2 Vctor Haertel 2 1 Pontfíca Unversdade Católca do Ro Grande do Sul - PUCRS Av. Ipranga,

More information

Multiple-Period Attribution: Residuals and Compounding

Multiple-Period Attribution: Residuals and Compounding Multple-Perod Attrbuton: Resduals and Compoundng Our revewer gave these authors full marks for dealng wth an ssue that performance measurers and vendors often regard as propretary nformaton. In 1994, Dens

More information

Design and Development of a Security Evaluation Platform Based on International Standards

Design and Development of a Security Evaluation Platform Based on International Standards Internatonal Journal of Informatcs Socety, VOL.5, NO.2 (203) 7-80 7 Desgn and Development of a Securty Evaluaton Platform Based on Internatonal Standards Yuj Takahash and Yoshm Teshgawara Graduate School

More information

Document Clustering Analysis Based on Hybrid PSO+K-means Algorithm

Document Clustering Analysis Based on Hybrid PSO+K-means Algorithm Document Clusterng Analyss Based on Hybrd PSO+K-means Algorthm Xaohu Cu, Thomas E. Potok Appled Software Engneerng Research Group, Computatonal Scences and Engneerng Dvson, Oak Rdge Natonal Laboratory,

More information

Logistic Regression. Lecture 4: More classifiers and classes. Logistic regression. Adaboost. Optimization. Multiple class classification

Logistic Regression. Lecture 4: More classifiers and classes. Logistic regression. Adaboost. Optimization. Multiple class classification Lecture 4: More classfers and classes C4B Machne Learnng Hlary 20 A. Zsserman Logstc regresson Loss functons revsted Adaboost Loss functons revsted Optmzaton Multple class classfcaton Logstc Regresson

More information

1.1 The University may award Higher Doctorate degrees as specified from time-to-time in UPR AS11 1.

1.1 The University may award Higher Doctorate degrees as specified from time-to-time in UPR AS11 1. HIGHER DOCTORATE DEGREES SUMMARY OF PRINCIPAL CHANGES General changes None Secton 3.2 Refer to text (Amendments to verson 03.0, UPR AS02 are shown n talcs.) 1 INTRODUCTION 1.1 The Unversty may award Hgher

More information

Extending Probabilistic Dynamic Epistemic Logic

Extending Probabilistic Dynamic Epistemic Logic Extendng Probablstc Dynamc Epstemc Logc Joshua Sack May 29, 2008 Probablty Space Defnton A probablty space s a tuple (S, A, µ), where 1 S s a set called the sample space. 2 A P(S) s a σ-algebra: a set

More information

IT09 - Identity Management Policy

IT09 - Identity Management Policy IT09 - Identty Management Polcy Introducton 1 The Unersty needs to manage dentty accounts for all users of the Unersty s electronc systems and ensure that users hae an approprate leel of access to these

More information

To manage leave, meeting institutional requirements and treating individual staff members fairly and consistently.

To manage leave, meeting institutional requirements and treating individual staff members fairly and consistently. Corporate Polces & Procedures Human Resources - Document CPP216 Leave Management Frst Produced: Current Verson: Past Revsons: Revew Cycle: Apples From: 09/09/09 26/10/12 09/09/09 3 years Immedately Authorsaton:

More information

FREQUENCY OF OCCURRENCE OF CERTAIN CHEMICAL CLASSES OF GSR FROM VARIOUS AMMUNITION TYPES

FREQUENCY OF OCCURRENCE OF CERTAIN CHEMICAL CLASSES OF GSR FROM VARIOUS AMMUNITION TYPES FREQUENCY OF OCCURRENCE OF CERTAIN CHEMICAL CLASSES OF GSR FROM VARIOUS AMMUNITION TYPES Zuzanna BRO EK-MUCHA, Grzegorz ZADORA, 2 Insttute of Forensc Research, Cracow, Poland 2 Faculty of Chemstry, Jagellonan

More information

WISE-Integrator: An Automatic Integrator of Web Search Interfaces for E-Commerce

WISE-Integrator: An Automatic Integrator of Web Search Interfaces for E-Commerce WSE-ntegrator: An Automatc ntegrator of Web Search nterfaces for E-Commerce Ha He, Wey Meng Dept. of Computer Scence SUNY at Bnghamton Bnghamton, NY 13902 {hahe,meng}@cs.bnghamton.edu Clement Yu Dept.

More information

Web Object Indexing Using Domain Knowledge *

Web Object Indexing Using Domain Knowledge * Web Object Indexng Usng Doman Knowledge * Muyuan Wang Department of Automaton Tsnghua Unversty Bejng 100084, Chna (86-10)51774518 Zhwe L, Le Lu, We-Yng Ma Mcrosoft Research Asa Sgma Center, Hadan Dstrct

More information

Data Mining from the Information Systems: Performance Indicators at Masaryk University in Brno

Data Mining from the Information Systems: Performance Indicators at Masaryk University in Brno Data Mnng from the Informaton Systems: Performance Indcators at Masaryk Unversty n Brno Mkuláš Bek EUA Workshop Strasbourg, 1-2 December 2006 1 Locaton of Brno Brno EUA Workshop Strasbourg, 1-2 December

More information

Software project management with GAs

Software project management with GAs Informaton Scences 177 (27) 238 241 www.elsever.com/locate/ns Software project management wth GAs Enrque Alba *, J. Francsco Chcano Unversty of Málaga, Grupo GISUM, Departamento de Lenguajes y Cencas de

More information

Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network *

Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 24, 819-840 (2008) Data Broadcast on a Mult-System Heterogeneous Overlayed Wreless Network * Department of Computer Scence Natonal Chao Tung Unversty Hsnchu,

More information

Multi-sensor Data Fusion for Cyber Security Situation Awareness

Multi-sensor Data Fusion for Cyber Security Situation Awareness Avalable onlne at www.scencedrect.com Proceda Envronmental Scences 0 (20 ) 029 034 20 3rd Internatonal Conference on Envronmental 3rd Internatonal Conference on Envronmental Scence and Informaton Applcaton

More information

Can Auto Liability Insurance Purchases Signal Risk Attitude?

Can Auto Liability Insurance Purchases Signal Risk Attitude? Internatonal Journal of Busness and Economcs, 2011, Vol. 10, No. 2, 159-164 Can Auto Lablty Insurance Purchases Sgnal Rsk Atttude? Chu-Shu L Department of Internatonal Busness, Asa Unversty, Tawan Sheng-Chang

More information

CS 2750 Machine Learning. Lecture 3. Density estimation. CS 2750 Machine Learning. Announcements

CS 2750 Machine Learning. Lecture 3. Density estimation. CS 2750 Machine Learning. Announcements Lecture 3 Densty estmaton Mlos Hauskrecht [email protected] 5329 Sennott Square Next lecture: Matlab tutoral Announcements Rules for attendng the class: Regstered for credt Regstered for audt (only f there

More information

Support Vector Machines

Support Vector Machines Support Vector Machnes Max Wellng Department of Computer Scence Unversty of Toronto 10 Kng s College Road Toronto, M5S 3G5 Canada [email protected] Abstract Ths s a note to explan support vector machnes.

More information

Lecture 2: Single Layer Perceptrons Kevin Swingler

Lecture 2: Single Layer Perceptrons Kevin Swingler Lecture 2: Sngle Layer Perceptrons Kevn Sngler [email protected] Recap: McCulloch-Ptts Neuron Ths vastly smplfed model of real neurons s also knon as a Threshold Logc Unt: W 2 A Y 3 n W n. A set of synapses

More information

Complex Service Provisioning in Collaborative Cloud Markets

Complex Service Provisioning in Collaborative Cloud Markets Melane Sebenhaar, Ulrch Lampe, Tm Lehrg, Sebastan Zöller, Stefan Schulte, Ralf Stenmetz: Complex Servce Provsonng n Collaboratve Cloud Markets. In: W. Abramowcz et al. (Eds.): Proceedngs of the 4th European

More information

PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 12

PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 12 14 The Ch-squared dstrbuton PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 1 If a normal varable X, havng mean µ and varance σ, s standardsed, the new varable Z has a mean 0 and varance 1. When ths standardsed

More information

RequIn, a tool for fast web traffic inference

RequIn, a tool for fast web traffic inference RequIn, a tool for fast web traffc nference Olver aul, Jean Etenne Kba GET/INT, LOR Department 9 rue Charles Fourer 90 Evry, France [email protected], [email protected] Abstract As networked

More information

A Dynamic Energy-Efficiency Mechanism for Data Center Networks

A Dynamic Energy-Efficiency Mechanism for Data Center Networks A Dynamc Energy-Effcency Mechansm for Data Center Networks Sun Lang, Zhang Jnfang, Huang Daochao, Yang Dong, Qn Yajuan A Dynamc Energy-Effcency Mechansm for Data Center Networks 1 Sun Lang, 1 Zhang Jnfang,

More information

How To Understand The Results Of The German Meris Cloud And Water Vapour Product

How To Understand The Results Of The German Meris Cloud And Water Vapour Product Ttel: Project: Doc. No.: MERIS level 3 cloud and water vapour products MAPP MAPP-ATBD-ClWVL3 Issue: 1 Revson: 0 Date: 9.12.1998 Functon Name Organsaton Sgnature Date Author: Bennartz FUB Preusker FUB Schüller

More information

Traffic State Estimation in the Traffic Management Center of Berlin

Traffic State Estimation in the Traffic Management Center of Berlin Traffc State Estmaton n the Traffc Management Center of Berln Authors: Peter Vortsch, PTV AG, Stumpfstrasse, D-763 Karlsruhe, Germany phone ++49/72/965/35, emal [email protected] Peter Möhl, PTV AG,

More information

Improved SVM in Cloud Computing Information Mining

Improved SVM in Cloud Computing Information Mining Internatonal Journal of Grd Dstrbuton Computng Vol.8, No.1 (015), pp.33-40 http://dx.do.org/10.1457/jgdc.015.8.1.04 Improved n Cloud Computng Informaton Mnng Lvshuhong (ZhengDe polytechnc college JangSu

More information

Gender Classification for Real-Time Audience Analysis System

Gender Classification for Real-Time Audience Analysis System Gender Classfcaton for Real-Tme Audence Analyss System Vladmr Khryashchev, Lev Shmaglt, Andrey Shemyakov, Anton Lebedev Yaroslavl State Unversty Yaroslavl, Russa [email protected], [email protected], [email protected],

More information

Nordea G10 Alpha Carry Index

Nordea G10 Alpha Carry Index Nordea G10 Alpha Carry Index Index Rules v1.1 Verson as of 10/10/2013 1 (6) Page 1 Index Descrpton The G10 Alpha Carry Index, the Index, follows the development of a rule based strategy whch nvests and

More information

The Greedy Method. Introduction. 0/1 Knapsack Problem

The Greedy Method. Introduction. 0/1 Knapsack Problem The Greedy Method Introducton We have completed data structures. We now are gong to look at algorthm desgn methods. Often we are lookng at optmzaton problems whose performance s exponental. For an optmzaton

More information

Probabilistic Latent Semantic User Segmentation for Behavioral Targeted Advertising*

Probabilistic Latent Semantic User Segmentation for Behavioral Targeted Advertising* Probablstc Latent Semantc User Segmentaton for Behavoral Targeted Advertsng* Xaohu Wu 1,2, Jun Yan 2, Nng Lu 2, Shucheng Yan 3, Yng Chen 1, Zheng Chen 2 1 Department of Computer Scence Bejng Insttute of

More information

A Simple Approach to Clustering in Excel

A Simple Approach to Clustering in Excel A Smple Approach to Clusterng n Excel Aravnd H Center for Computatonal Engneerng and Networng Amrta Vshwa Vdyapeetham, Combatore, Inda C Rajgopal Center for Computatonal Engneerng and Networng Amrta Vshwa

More information

Master s Thesis. Configuring robust virtual wireless sensor networks for Internet of Things inspired by brain functional networks

Master s Thesis. Configuring robust virtual wireless sensor networks for Internet of Things inspired by brain functional networks Master s Thess Ttle Confgurng robust vrtual wreless sensor networks for Internet of Thngs nspred by bran functonal networks Supervsor Professor Masayuk Murata Author Shnya Toyonaga February 10th, 2014

More information

IMPACT ANALYSIS OF A CELLULAR PHONE

IMPACT ANALYSIS OF A CELLULAR PHONE 4 th ASA & μeta Internatonal Conference IMPACT AALYSIS OF A CELLULAR PHOE We Lu, 2 Hongy L Bejng FEAonlne Engneerng Co.,Ltd. Bejng, Chna ABSTRACT Drop test smulaton plays an mportant role n nvestgatng

More information

A Dynamic Load Balancing for Massive Multiplayer Online Game Server

A Dynamic Load Balancing for Massive Multiplayer Online Game Server A Dynamc Load Balancng for Massve Multplayer Onlne Game Server Jungyoul Lm, Jaeyong Chung, Jnryong Km and Kwanghyun Shm Dgtal Content Research Dvson Electroncs and Telecommuncatons Research Insttute Daejeon,

More information

Assessing Student Learning Through Keyword Density Analysis of Online Class Messages

Assessing Student Learning Through Keyword Density Analysis of Online Class Messages Assessng Student Learnng Through Keyword Densty Analyss of Onlne Class Messages Xn Chen New Jersey Insttute of Technology [email protected] Brook Wu New Jersey Insttute of Technology [email protected] ABSTRACT Ths

More information

PAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign

PAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign PAS: A Packet Accountng System to Lmt the Effects of DoS & DDoS Debsh Fesehaye & Klara Naherstedt Unversty of Illnos-Urbana Champagn DoS and DDoS DDoS attacks are ncreasng threats to our dgtal world. Exstng

More information

Conversion between the vector and raster data structures using Fuzzy Geographical Entities

Conversion between the vector and raster data structures using Fuzzy Geographical Entities Converson between the vector and raster data structures usng Fuzzy Geographcal Enttes Cdála Fonte Department of Mathematcs Faculty of Scences and Technology Unversty of Combra, Apartado 38, 3 454 Combra,

More information

Institute of Informatics, Faculty of Business and Management, Brno University of Technology,Czech Republic

Institute of Informatics, Faculty of Business and Management, Brno University of Technology,Czech Republic Lagrange Multplers as Quanttatve Indcators n Economcs Ivan Mezník Insttute of Informatcs, Faculty of Busness and Management, Brno Unversty of TechnologCzech Republc Abstract The quanttatve role of Lagrange

More information

Active Learning for Interactive Visualization

Active Learning for Interactive Visualization Actve Learnng for Interactve Vsualzaton Tomoharu Iwata Nel Houlsby Zoubn Ghahraman Unversty of Cambrdge Unversty of Cambrdge Unversty of Cambrdge Abstract Many automatc vsualzaton methods have been. However,

More information

A Passive Network Measurement-based Traffic Control Algorithm in Gateway of. P2P Systems

A Passive Network Measurement-based Traffic Control Algorithm in Gateway of. P2P Systems roceedngs of the 7th World Congress The Internatonal Federaton of Automatc Control A assve Network Measurement-based Traffc Control Algorthm n Gateway of 2 Systems Ybo Jang, Weje Chen, Janwe Zheng, Wanlang

More information

Introduction CONTENT. - Whitepaper -

Introduction CONTENT. - Whitepaper - OneCl oud ForAl l YourCr t c al Bus nes sappl c at ons Bl uew r esol ut ons www. bl uew r e. c o. uk Introducton Bluewre Cloud s a fully customsable IaaS cloud platform desgned for organsatons who want

More information

Research on Transformation Engineering BOM into Manufacturing BOM Based on BOP

Research on Transformation Engineering BOM into Manufacturing BOM Based on BOP Appled Mechancs and Materals Vols 10-12 (2008) pp 99-103 Onlne avalable snce 2007/Dec/06 at wwwscentfcnet (2008) Trans Tech Publcatons, Swtzerland do:104028/wwwscentfcnet/amm10-1299 Research on Transformaton

More information

Cooperative Load Balancing in IEEE 802.11 Networks with Cell Breathing

Cooperative Load Balancing in IEEE 802.11 Networks with Cell Breathing Cooperatve Load Balancng n IEEE 82.11 Networks wth Cell Breathng Eduard Garca Rafael Vdal Josep Paradells Wreless Networks Group - Techncal Unversty of Catalona (UPC) {eduardg, rvdal, teljpa}@entel.upc.edu;

More information

320 The Internatonal Arab Journal of Informaton Technology, Vol. 5, No. 3, July 2008 Comparsons Between Data Clusterng Algorthms Osama Abu Abbas Computer Scence Department, Yarmouk Unversty, Jordan Abstract:

More information

Effective Network Defense Strategies against Malicious Attacks with Various Defense Mechanisms under Quality of Service Constraints

Effective Network Defense Strategies against Malicious Attacks with Various Defense Mechanisms under Quality of Service Constraints Effectve Network Defense Strateges aganst Malcous Attacks wth Varous Defense Mechansms under Qualty of Servce Constrants Frank Yeong-Sung Ln Department of Informaton Natonal Tawan Unversty Tape, Tawan,

More information

Comparison of Domain-Specific Lexicon Construction Methods for Sentiment Analysis

Comparison of Domain-Specific Lexicon Construction Methods for Sentiment Analysis , pp.152-156 http://d.do.org/10.14257/astl.2016.135.38 Comparson of Doman-Specfc Lecon Constructon Methods for Sentment Analyss Myeong So Km 1, Jong Woo Km 2,3 and Cu Jng 4 1 Department of Mathematcs,

More information

Dynamic Fuzzy Pattern Recognition

Dynamic Fuzzy Pattern Recognition Dynamc Fuzzy Pattern Recognton Von der Fakultät für Wrtschaftswssenschaften der Rhensch-Westfälschen Technschen Hochschule Aachen zur Erlangung des akademschen Grades enes Doktors der Wrtschafts- und Sozalwssenschaften

More information

A Hierarchical Anomaly Network Intrusion Detection System using Neural Network Classification

A Hierarchical Anomaly Network Intrusion Detection System using Neural Network Classification IDC IDC A Herarchcal Anomaly Network Intruson Detecton System usng Neural Network Classfcaton ZHENG ZHANG, JUN LI, C. N. MANIKOPOULOS, JAY JORGENSON and JOSE UCLES ECE Department, New Jersey Inst. of Tech.,

More information

A hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm

A hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm Avalable onlne www.ocpr.com Journal of Chemcal and Pharmaceutcal Research, 2014, 6(7):1884-1889 Research Artcle ISSN : 0975-7384 CODEN(USA) : JCPRC5 A hybrd global optmzaton algorthm based on parallel

More information

Capacity-building and training

Capacity-building and training 92 Toolkt to Combat Traffckng n Persons Tool 2.14 Capacty-buldng and tranng Overvew Ths tool provdes references to tranng programmes and materals. For more tranng materals, refer also to Tool 9.18. Capacty-buldng

More information

Bayesian Network Based Causal Relationship Identification and Funding Success Prediction in P2P Lending

Bayesian Network Based Causal Relationship Identification and Funding Success Prediction in P2P Lending Proceedngs of 2012 4th Internatonal Conference on Machne Learnng and Computng IPCSIT vol. 25 (2012) (2012) IACSIT Press, Sngapore Bayesan Network Based Causal Relatonshp Identfcaton and Fundng Success

More information

ERP Software Selection Using The Rough Set And TPOSIS Methods

ERP Software Selection Using The Rough Set And TPOSIS Methods ERP Software Selecton Usng The Rough Set And TPOSIS Methods Under Fuzzy Envronment Informaton Management Department, Hunan Unversty of Fnance and Economcs, No. 139, Fengln 2nd Road, Changsha, 410205, Chna

More information

A heuristic task deployment approach for load balancing

A heuristic task deployment approach for load balancing Xu Gaochao, Dong Yunmeng, Fu Xaodog, Dng Yan, Lu Peng, Zhao Ja Abstract A heurstc task deployment approach for load balancng Gaochao Xu, Yunmeng Dong, Xaodong Fu, Yan Dng, Peng Lu, Ja Zhao * College of

More information

Using Association Rule Mining: Stock Market Events Prediction from Financial News

Using Association Rule Mining: Stock Market Events Prediction from Financial News Usng Assocaton Rule Mnng: Stock Market Events Predcton from Fnancal News Shubhang S. Umbarkar 1, Prof. S. S. Nandgaonkar 2 1 Savtrba Phule Pune Unversty, Vdya Pratshtan s College of Engneerng, Vdya Nagar,

More information

Financial Mathemetics

Financial Mathemetics Fnancal Mathemetcs 15 Mathematcs Grade 12 Teacher Gude Fnancal Maths Seres Overvew In ths seres we am to show how Mathematcs can be used to support personal fnancal decsons. In ths seres we jon Tebogo,

More information

Vision Mouse. Saurabh Sarkar a* University of Cincinnati, Cincinnati, USA ABSTRACT 1. INTRODUCTION

Vision Mouse. Saurabh Sarkar a* University of Cincinnati, Cincinnati, USA ABSTRACT 1. INTRODUCTION Vson Mouse Saurabh Sarkar a* a Unversty of Cncnnat, Cncnnat, USA ABSTRACT The report dscusses a vson based approach towards trackng of eyes and fngers. The report descrbes the process of locatng the possble

More information

Hosting Virtual Machines on Distributed Datacenters

Hosting Virtual Machines on Distributed Datacenters Hostng Vrtual Machnes on Dstrbuted Datacenters Chuan Pham Scence and Engneerng, KyungHee Unversty, Korea [email protected] Jae Hyeok Son Scence and Engneerng, KyungHee Unversty, Korea [email protected]

More information

How Sets of Coherent Probabilities May Serve as Models for Degrees of Incoherence

How Sets of Coherent Probabilities May Serve as Models for Degrees of Incoherence 1 st Internatonal Symposum on Imprecse Probabltes and Ther Applcatons, Ghent, Belgum, 29 June 2 July 1999 How Sets of Coherent Probabltes May Serve as Models for Degrees of Incoherence Mar J. Schervsh

More information

The program for the Bachelor degrees shall extend over three years of full-time study or the parttime equivalent.

The program for the Bachelor degrees shall extend over three years of full-time study or the parttime equivalent. Bachel of Commerce Bachel of Commerce (Accountng) Bachel of Commerce (Cpate Fnance) Bachel of Commerce (Internatonal Busness) Bachel of Commerce (Management) Bachel of Commerce (Marketng) These Program

More information

1 Example 1: Axis-aligned rectangles

1 Example 1: Axis-aligned rectangles COS 511: Theoretcal Machne Learnng Lecturer: Rob Schapre Lecture # 6 Scrbe: Aaron Schld February 21, 2013 Last class, we dscussed an analogue for Occam s Razor for nfnte hypothess spaces that, n conjuncton

More information

Estimating the Development Effort of Web Projects in Chile

Estimating the Development Effort of Web Projects in Chile Estmatng the Development Effort of Web Projects n Chle Sergo F. Ochoa Computer Scences Department Unversty of Chle (56 2) 678-4364 [email protected] M. Cecla Bastarrca Computer Scences Department Unversty

More information