An improved TF-IDF approach for text classification *

Size: px
Start display at page:

Download "An improved TF-IDF approach for text classification *"

Transcription

1 Zhang et al. / J Zheiang Univ SCI A(1: Journal of Zheiang University SCIECE ISS E-ail: [email protected] An iproved TF-IDF approach for text classification * ZHAG Yun-tao ( 张 云 涛 1,2, GOG Ling ( 龚 玲 2, WAG Yong-cheng ( 王 永 成 2 ( 1 etwork & Inforation Center, 2 School of Electronic & Inforation Technology, Shanghai Jiaotong University, Shanghai , China E-ail: [email protected]; [email protected]; [email protected] Received Dec. 5, 2003; revision accepted June 26, 2004 Abstract: This paper presents a new iproved ter frequency/inverse docuent frequency (TF-IDF approach which uses confidence, support and characteristic words to enhance the recall and precision of text classification. Synonys defined by a lexicon are processed in the iproved TF-IDF approach. We detailedly discuss and analyze the relationship aong confidence, recall and precision. The experients based on science and technology gave proising results that the new TF-IDF approach iproves the precision and recall of text classification copared with the conventional TF-IDF approach. Key words: Ter frequency/inverse docuent frequency (TF-IDF, Text classification, Confidence, Support, Characteristic words doi: /zus.2005.a0049 Docuent code: A CLC nuber: TP31 ITRODUCTIO The widespread and increasing availability of text docuents in electronic for increases the iportance of using autoatic ethods to analyze the content of text docuents, because the ethod using doain experts to identify new text docuents and allocate the to well-defined categories is tie-consuing and expensive, has liits, and does not provide continuous easure of the degree of confidence with which the allocation was ade (Olivier, As a result, the identification and classification of text docuents based on their contents are becoing iperative. The classification can be done autoatically by separate classifiers learning fro training saples of text docuents. The ain ai of the classifier is to obtain a set of characteristics that reain relatively constant for separate categories of text docuents and to classify the huge nuber of text docuents into soe particular categories (or folders containing * Proect (o supported by the ational atural Science Foundation of China ultiple related text docuents. In text classification, a text docuent ay partially atch any categories. We need to find the best atching category for the text docuent. The ter (word frequency/inverse docuent frequency (TF-IDF approach is coonly used to weigh each word in the text docuent according to how unique it is. In other words, the TF-IDF approach captures the relevancy aong words, text docuents and particular categories. We put forward the novel iproved TF-IDF approach for text classification, and will focus on this approach in the reainder of this paper, and will describe in detail the otivation, ethodology, and ipleentation of the iproved TF-IDF approach. The paper discusses and analyzes the relationship aong confidence, support, recall and precision, and then presents the experiental results. IMPROVED TF-IDF APPROACH Text classification can be effected by various learning approaches of classifier, such as k-nearest neighbor (Sun et al., 2001, decision tree induction,

2 50 Zhang et al. / J Zheiang Univ SCI A(1:49-55 naïve Bayesian (Fan et al., 2001, support vector achine (Huang and Wu, 1998; Larry and Malik, 2001 and latent seantic index (Lin et al., Soe of these techniques are based on, or correlated with, the TF-IDF approach representing text with vector space in which each feature in the text corresponds to a single word. VSM assues that a text docuent d i is represented by a set of words (t 1, t 2,, t n wherein each t i is a word that appears in the text docuent d i, and n denotes the total nuber of various words used to identify the eaning of the text docuent. Word t i has a corresponding weight w i calculated as a cobination of the statistics TF(w i, d i and IDF(w i. Therefore, d i can be represented as a specific n-diensional vector d i as d =( w, w,..., w (1 i 1 2 n Weight is the easure that indicates the statistical iportance of corresponding words. The weight w i of word t i can be deterined by the value of TF(w i, d i *IDF(w i. The TF value is proportional to the frequency of the word in the docuent and the IDF value is inversely proportional to its frequency in the docuent corpus. The function encodes the intuitions that: (1 The ore often a word occurs in a docuent, the ore it is representative of the content of the text; (2 The ore text the word occurs in, the less discriinating it is (Fabrizio, Per word vector d i coonly contains a lot of vector eleents. In order to reduce the vector diension, we shall select eleents by calculating the value of TF*IDF for each eleent in the vector representation. The words selected as vector eleents are called feature words by us. In docuents, the higher-frequency words are ore iportant for representing the content than lower-frequency words. However, soe high-frequency words such as the, for, at having low content discriinating power are listed at the stop-list. The Chinese stop words were partially discussed by Wang (1992. It is clear those words appearing in the stop-list will be deleted fro the set of feature words in order to reduce the aount of diensions and enhance the relevancy between words and docuents or categories. Another preprocessing procedure is steing. In steing, each word is regarded as word-ste for in docuents. For exaple, developent, developed and developing will be all treated as develop. Siilarly to stop-list, steing reduces the aount of diensions and enhances the relevancy between word and docuent or categories. We observed that the author probably uses various words to express the sae/siilar concept in a text docuent. Moreover, a particular category consists of a set of docuents produced by different authors, each of who has different personal traits and stylistic features. Therefore, it is coon that siilar contents in the sae category are expressed with various words by authors. To reduce the aount of diensions and further enhance the relevancy between word and docuent and the relevancy between word and category, synonys are defined by an experiental lexicon constructed by us and all synonys will be processed and considered as the sae word. The calculation of TF, IDF and word weight was discussed by Salton and Buckley (1988, and Salton (1991. Thorsten (1996 analyzed the relationship between text classification using the vector space odel with TF-IDF weight and probabilistic classifiers. The analysis offered theoretical explanation for the TF-IDF word weight and gave insight into the underlying assuptions. These papers consider identically all the words for the text classification. However, we observe that soe words play a doinant role for soe particular categories. These words are called feature word in this paper. In this case, the likelihood that the docuent belongs to a particular category is very high when the docuent contains feature words. The iproved TF-IDF approach uses the feature words to iprove the accuracy of text classification. We initiated two new ters, confidence and support, into the TF-IDF approach. The ters confidence and support were first used in data ining discipline. However, they have soe new and concrete eaning in our approach. Above all, we need to define several variables. We represent docuent d i as a feature word vector d i, in which each coponent w (d i represents the frequency that the word w appears in docuent d i. In addition: (all, c represents the total nuber of docuents aong a particular category c.

3 Zhang et al. / J Zheiang Univ SCI A(1: (w, all represents the total nuber of docuents containing feature word w aong the entire training docuents corpus coposed of all categories. (w, c represents the total nuber of docuents containing feature word w aong the particular category c. (w, c represents the total nuber of docuents containing feature word w aong the entire training docuents corpus except the particular category c. (all represents the total nuber of docuents aong the entire training docuents corpus. We define conf(w, c as the confidence degree of feature word w on the particular category c. The value of conf(w, c equals the quotient of the total nuber of docuents containing feature word w aong the particular category c divided by the total nuber of docuents containing feature word w aong the entire training docuents corpus coposed by all categories, as follows conf(w, c = w (, c w (, all (2 We define sup(w as the support of feature word w. The value sup(w equals the quotient of the total nuber of docuents containing feature word w aong the entire training docuents corpus divided by the total nuber of docuents aong the entire training docuents corpus, as follows w (, all sup(w = all ( (3 where 0<conf(w, c 1 (4 0<sup(w 1 (5 Confidence is the easure of certainty to deterine a particular category by a particular feature word. The potential usefulness of a particular feature word is represented by support. The confidence and support of feature words are the doinant easures for text classification. Each easure can be associated with a threshold that can be adusted by user aiing different types of docuents corpus. The doinant easure is defined as do(w, c =f(conf(w, c,sup(w 1 (( conf ( w, c threshold ( sup( w threshold = 0 (( conf ( w, c < threshold ( sup( w < threshold (6 Feature words that eet the threshold (do(w, c =1 are considered as characteristic words cw(w, c. When the set of feature words of a docuent d contains characteristic word cw(w, c, the text docuent d will be classified into the category c. In other words, we can use characteristic word to deterine whether a docuent is classified into a particular category or not. Because we only use a characteristic word to deterine the category of docuents, it is briefly called one-word-location. Siilarly, we ay define (w w k, all, (w w k, c, conf(w w k, c and sup(w w k. For exaple, we define sup(w w k as the support of feature words w and w k. The value sup(w w k equals the quotient of the total nuber of docuents containing feature words w and w k aong the entire training docuents corpus divided by the total nuber aong the entire training docuents corpus, as follows sup(w w k = w ( wk, all all ( (7 In the above situation, we use the feature words w and w k to deterine the category of docuents containing feature words w and w k. Here, the set of feature words w and w k is considered as characteristic word. The case is briefly called two-word-location. We also call the characteristic word as location-word. To find the location-word is not an arduous task. In order to avoid cobinatorial explosion of feature words, we adopt heuristic ethod to choose the location-word. Our experiental knowledge revealed that, it is adequate to choose higher-frequency feature words as the alternate location-word. DISCUSSIO AD AALYSIS Precision of the particular category c is the

4 52 Zhang et al. / J Zheiang Univ SCI A(1:49-55 percentage the nuber of correctly classified docuents aong category c divided by the total nuber of docuents aong category c, and is written as precision(c = TP( c all (, c (8 where, TP(c represents the nuber of correctly classified docuents aong the category c. TP is the abbreviation for true positive. In other words, TP(c is the nuber of docuents in category c classified correctly. Recall on particular category c is the percentage TP(c divided by S(c the total nuber of docuents that should be aong the category c, and is written as Substituting Eq.(11 into Eq.(8 yields expression TP(c =precision(c (all, c =precision(c (TP(c +FP(c precision( c FP( c = (15 1 precision( c Substituting Eq.(10 into Eq.(9 yields expression TP(c =recall(c TP(c +recall(c F(c recall( c F( c = (16 1 recall( c By Eqs.(15 and (16, we obtain : recall(c = TP( c Sc ( (9 (1 precision( c recall( c FP( c = F( c (1 recall( c precision( c (17 where S(c represents the total nuber of docuents that should be aong the category c. The total nuber of docuents that should belong to the category c and be incorrectly classified into other categories is represented as F(c. F eans false negative. Siilarly, the total nuber of docuents that should not belong to the category c and be incorrectly classified into c category is represented as FP(c. FP eans false positive. F(c, c represents the total nuber of docuents that should belong to the category c and be incorrectly classified into c category. Suppose is the total nuber of all categories. According to above definitions, Eqs.(10~(14 can be inferred S(c = TP(c +F(c (10 (all, c = TP(c +FP(c (11 (all = all (, c = Sc ( F(c = FP(c = = 1 = 1 = TP( c+ F( c (12 = 1 F( c, c (13 =1, F( c, c (14 =1, In addition, we can copute the accuracy of text classification on the entire docuent corpus Ω: accuracy(ω = =1 TP( c Ω (18 Ω denotes the nuber of docuents in corpus Ω. ext, we discuss the precision and recall of text classification aong the set in which each docuent contains the location-word. In the situation, the following equation can be inferred according to the definitions of Eqs.(2 and (9 recall(c = conf(w, c (19 However, precision of classification on particular category is relevant with the distribution of docuents and the relationship aong categories. It is reasonable to suppose that categories are independent and that the docuents are the average distribution. In the situation, the following equation can be inferred according to the definitions of Eqs.(2, (3 and (8 precision(c conf(w, c (20 For testing docuents corpus, the precision(c

5 Zhang et al. / J Zheiang Univ SCI A(1: represents the precision and recall(c represents the recall on the category c when the conventional TF-IDF approach is adopted. When the iproved TF-IDF approach is adopted, the testing docuents corpus can be divided into two sets of docuents. One set is the set of docuents that contain the location-word. Another is the set of docuents that do not contain the location-word. Applying Eq.(8, we obtain the precision on the particular category c for testing docuents corpus. When the iproved TF-IDF approach is adopted, the precision equals the quotient of the total nuber of docuents classified correctly into the category c aong the entire testing docuents corpus is divided by the total nuber of docuents aong the entire testing docuents corpus: sup( w ( test conf ( w, c + 1 sup( w TP( c w L precision sup( w ( test + 1 sup( w ( TP( c + FP( c sup( w ( test conf ( w, c + 1 sup( w TP( c w L = 1 precision( c sup( w ( test + 1 sup( w TP( c + TP( c w ( L precision c sup( w ( test( conf ( w, c precision( c precision( c =precision(c + sup( w ( test precision( c + 1 sup( w TP( c w L (21 where (test represents the total nuber of testing docuents corpus and L represents the set of all characteristic words in the category c. It is coon, however that any a category only contains a particular location-word. According to Eqs.(3 and (6, sup( w (test is the nuber of docuents that contain the location-word in the testing docuents corpus and sup( w ( test conf ( w, c is the nuber of docuents that are correctly classified into category c by the location-word. TP(c is the nuber of docuents that will be correctly classified in the category c aong the entire docuents corpus by conventional TF-IDF. The value of 1 sup( w ( test is the nuber of docuents that do not contain the location-word in the testing docuents corpus. Therefore, the value of 1 sup( w TP( c is the nuber of docuents that are correctly classified by the conventional TF-IDF approach aong the set of docuents that do not contain the location-word. According to Eq.(20, the nuber of docuents that are classified into the category c by the location-word is estiated as sup( w ( test. For docuents that do not contain location-word and are classified into the category c by the conventional 1 sup( w TP( c TF-IDF, the nuber is precision( c according to Eqs.(8, (11 and (15. Siilarly, the recall on the particular category c for testing the docuents corpus is obtained by Eqs.(9, (19 and (20 when the iproved TF-IDF approach is adopted.

6 54 Zhang et al. / J Zheiang Univ SCI A(1:49-55 recall sup( w ( test conf ( w, c + 1 sup( w TP( c 1 sup( w TP( c sup( w ( test + recall ( c =recall(c sup( w ( test( conf ( w, c recall( c + 1 sup( w TP( c sup( w ( test + recall( c (22 The value of sup( w ( test approxiately represents the nuber of docuents that contain the location-word and should be classified into the category c aong the corpus tested. 1 sup( w TP( c The value of represents the nuber of docuents that do not contain the recall( c location-word and should be classified into the category c aong corpus tested. According to Eqs.(21 and (22, the iproved TF-IDF approach will iprove the precision on category c if the value of conf(w, c is greater than the precision of the conventional TF-IDF approach. Siilarly, the iproved TF-IDF approach will iprove the recall on the category c if the value of conf(w, c is greater than the recall of the conventional TF-IDF approach. EXPERIMETS We perfored two sets of experients. The first experient set was designed to evaluate the distribution of location-word and the relationship between confidence and support. Another was designed to assess the validity of the iproved TF-IDF approach by coparison with the conventional TF-IDF approach. The two sets of experients were based on sae text corpus containing 2138 pieces of science and technology literature. The corpus was partitioned by 7 categories. We randoly sapled two-thirds of the corpus (1425 pieces of docuents for training and used the reaining one-third for testing. We repeated the experient 10 ties and averaged the result. Fig.1 shows the relationship between the value of confidence specified and ratio of docuents that contain the location-word aong the training corpus. When we raised the value of confidence, the nuber of docuents containing the location-word decreased. It eans that the usefulness of location-word specifying a particular category will be lowered if the confidence is increased. Meanwhile, the certainty of classification applying the location-word will be iproved. In other words, when the threshold of confidence is increased: (1 The nuber of texts containing the location-word will decrease. As a result, the nuber of texts that cannot be processed by the iproved TF-IDF approach will increase. (2 The precision and recall will be further increased for texts when the iproved TF-IDF approach applied because the confidence is increased. In brief, the threshold of confidence is a trade-off. Our experient revealed that the best value of confidence was 96%, which however, varied in different saple space. Value of confidence 100% 70% 60% 50% 40% 10% 30% 50% 70% Rate of docuents containing location-word Fig.1 Confidence and location-word Fig.2 shows the precision and recall of all seven categories when the iproved TF-IDF approach and the conventional TF-IDF approach were respectively adopted and the value of confidence was 96%. COCLUSIOS AD FURTHER WORK The iproved TF-IDF approach raises the pre-

7 Zhang et al. / J Zheiang Univ SCI A(1: Precision 94% 92% (a Precision (b Recall 94% 92% (d Precision (c Fig.2 Contrasted precision and recall (a Closed test precision; (b Open test precision; (c Closed test recall; (d Open test recall Conventional TF-IDF Iproved TF-IDF cision and recall of text classification when the value of confidence is evaluated properly. Moreover, the iproved TF-IDF is a language-independent text classification approach. Further experiental work is needed to test the generality of these results. Although science and technology articles can be considered as representative of various types of docuents, we ust see how the findings extend to broader types of docuents such as news, web pages, eail, etc. Another research issue is about how to choose a suitable value of confidence for different corpus. References Fabrizio, S., Machine learning in autoated text categorization. ACM Coputing Surveys, 34(1:1-47. Fan, Y., Zheng, C., Wang, Q.Y., Cai, Q.S., Liu, J., Using naïve bayes to coordinate the classification of web pages. Journal of Software, 12(9: Huang, X.J., Wu, L.D., SVM based classification syste. Pattern Recognition and Artificial Intelligence, 11(2: (in Chinese. Larry, M.M., Malik, Y., One-class SVMs for docuent classification. Journal of Machine Learning Research, 2: Lin, H.F., Gao, T., Yao, T.S., Chinese text visualization. Journal of ortheastern University, 21(5: (in Chinese. Olivier, D.V., Mining E-ail Authorship. Proceedings of Sixth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. Boston, USA. Salton, G., Developents in autoatic text retrieval. Science, 253: Salton, G., Buckley, C., Ter weighting approaches in autoatic text retrieval. Inforation Processing and Manageent, 24(5: Sun, J., Wang, W., Zhong, Y.X., Autoatic text categorization based on k-nearest neighbor. Journal of Beiing University of Posts & Telecos, 24(1:42-46 (in Chinese. Thorsten, J., Probabilistic Analysis of the Rocchio Algorith with TFIDF for Text Categorization. Proceedings of 14th International Conference on Machine Learning. McLean. Virginia, USA, p Wang, Y.C., The Processing Technology and Basis for Chinese Inforation. Shanghai Jiaotong University Press, Shanghai, p (in Chinese.

Applying Multiple Neural Networks on Large Scale Data

Applying Multiple Neural Networks on Large Scale Data 0 International Conference on Inforation and Electronics Engineering IPCSIT vol6 (0) (0) IACSIT Press, Singapore Applying Multiple Neural Networks on Large Scale Data Kritsanatt Boonkiatpong and Sukree

More information

High Performance Chinese/English Mixed OCR with Character Level Language Identification

High Performance Chinese/English Mixed OCR with Character Level Language Identification 2009 0th International Conference on Docuent Analysis and Recognition High Perforance Chinese/English Mixed OCR with Character Level Language Identification Kai Wang Institute of Machine Intelligence,

More information

Online Bagging and Boosting

Online Bagging and Boosting Abstract Bagging and boosting are two of the ost well-known enseble learning ethods due to their theoretical perforance guarantees and strong experiental results. However, these algoriths have been used

More information

INTEGRATED ENVIRONMENT FOR STORING AND HANDLING INFORMATION IN TASKS OF INDUCTIVE MODELLING FOR BUSINESS INTELLIGENCE SYSTEMS

INTEGRATED ENVIRONMENT FOR STORING AND HANDLING INFORMATION IN TASKS OF INDUCTIVE MODELLING FOR BUSINESS INTELLIGENCE SYSTEMS Artificial Intelligence Methods and Techniques for Business and Engineering Applications 210 INTEGRATED ENVIRONMENT FOR STORING AND HANDLING INFORMATION IN TASKS OF INDUCTIVE MODELLING FOR BUSINESS INTELLIGENCE

More information

The Research of Measuring Approach and Energy Efficiency for Hadoop Periodic Jobs

The Research of Measuring Approach and Energy Efficiency for Hadoop Periodic Jobs Send Orders for Reprints to [email protected] 206 The Open Fuels & Energy Science Journal, 2015, 8, 206-210 Open Access The Research of Measuring Approach and Energy Efficiency for Hadoop Periodic

More information

Analyzing Spatiotemporal Characteristics of Education Network Traffic with Flexible Multiscale Entropy

Analyzing Spatiotemporal Characteristics of Education Network Traffic with Flexible Multiscale Entropy Vol. 9, No. 5 (2016), pp.303-312 http://dx.doi.org/10.14257/ijgdc.2016.9.5.26 Analyzing Spatioteporal Characteristics of Education Network Traffic with Flexible Multiscale Entropy Chen Yang, Renjie Zhou

More information

Software Quality Characteristics Tested For Mobile Application Development

Software Quality Characteristics Tested For Mobile Application Development Thesis no: MGSE-2015-02 Software Quality Characteristics Tested For Mobile Application Developent Literature Review and Epirical Survey WALEED ANWAR Faculty of Coputing Blekinge Institute of Technology

More information

Fuzzy Sets in HR Management

Fuzzy Sets in HR Management Acta Polytechnica Hungarica Vol. 8, No. 3, 2011 Fuzzy Sets in HR Manageent Blanka Zeková AXIOM SW, s.r.o., 760 01 Zlín, Czech Republic [email protected] Jana Talašová Faculty of Science, Palacký Univerzity,

More information

Machine Learning Applications in Grid Computing

Machine Learning Applications in Grid Computing Machine Learning Applications in Grid Coputing George Cybenko, Guofei Jiang and Daniel Bilar Thayer School of Engineering Dartouth College Hanover, NH 03755, USA [email protected], [email protected]

More information

Image restoration for a rectangular poor-pixels detector

Image restoration for a rectangular poor-pixels detector Iage restoration for a rectangular poor-pixels detector Pengcheng Wen 1, Xiangjun Wang 1, Hong Wei 2 1 State Key Laboratory of Precision Measuring Technology and Instruents, Tianjin University, China 2

More information

An Innovate Dynamic Load Balancing Algorithm Based on Task

An Innovate Dynamic Load Balancing Algorithm Based on Task An Innovate Dynaic Load Balancing Algorith Based on Task Classification Hong-bin Wang,,a, Zhi-yi Fang, b, Guan-nan Qu,*,c, Xiao-dan Ren,d College of Coputer Science and Technology, Jilin University, Changchun

More information

Extended-Horizon Analysis of Pressure Sensitivities for Leak Detection in Water Distribution Networks: Application to the Barcelona Network

Extended-Horizon Analysis of Pressure Sensitivities for Leak Detection in Water Distribution Networks: Application to the Barcelona Network 2013 European Control Conference (ECC) July 17-19, 2013, Zürich, Switzerland. Extended-Horizon Analysis of Pressure Sensitivities for Leak Detection in Water Distribution Networks: Application to the Barcelona

More information

PERFORMANCE METRICS FOR THE IT SERVICES PORTFOLIO

PERFORMANCE METRICS FOR THE IT SERVICES PORTFOLIO Bulletin of the Transilvania University of Braşov Series I: Engineering Sciences Vol. 4 (53) No. - 0 PERFORMANCE METRICS FOR THE IT SERVICES PORTFOLIO V. CAZACU I. SZÉKELY F. SANDU 3 T. BĂLAN Abstract:

More information

Construction Economics & Finance. Module 3 Lecture-1

Construction Economics & Finance. Module 3 Lecture-1 Depreciation:- Construction Econoics & Finance Module 3 Lecture- It represents the reduction in arket value of an asset due to age, wear and tear and obsolescence. The physical deterioration of the asset

More information

Standards and Protocols for the Collection and Dissemination of Graduating Student Initial Career Outcomes Information For Undergraduates

Standards and Protocols for the Collection and Dissemination of Graduating Student Initial Career Outcomes Information For Undergraduates National Association of Colleges and Eployers Standards and Protocols for the Collection and Disseination of Graduating Student Initial Career Outcoes Inforation For Undergraduates Developed by the NACE

More information

Method of supply chain optimization in E-commerce

Method of supply chain optimization in E-commerce MPRA Munich Personal RePEc Archive Method of supply chain optiization in E-coerce Petr Suchánek and Robert Bucki Silesian University - School of Business Adinistration, The College of Inforatics and Manageent

More information

Design of Model Reference Self Tuning Mechanism for PID like Fuzzy Controller

Design of Model Reference Self Tuning Mechanism for PID like Fuzzy Controller Research Article International Journal of Current Engineering and Technology EISSN 77 46, PISSN 347 56 4 INPRESSCO, All Rights Reserved Available at http://inpressco.co/category/ijcet Design of Model Reference

More information

CRM FACTORS ASSESSMENT USING ANALYTIC HIERARCHY PROCESS

CRM FACTORS ASSESSMENT USING ANALYTIC HIERARCHY PROCESS 641 CRM FACTORS ASSESSMENT USING ANALYTIC HIERARCHY PROCESS Marketa Zajarosova 1* *Ph.D. VSB - Technical University of Ostrava, THE CZECH REPUBLIC [email protected] Abstract Custoer relationship

More information

Performance Evaluation of Machine Learning Techniques using Software Cost Drivers

Performance Evaluation of Machine Learning Techniques using Software Cost Drivers Perforance Evaluation of Machine Learning Techniques using Software Cost Drivers Manas Gaur Departent of Coputer Engineering, Delhi Technological University Delhi, India ABSTRACT There is a treendous rise

More information

Media Adaptation Framework in Biofeedback System for Stroke Patient Rehabilitation

Media Adaptation Framework in Biofeedback System for Stroke Patient Rehabilitation Media Adaptation Fraework in Biofeedback Syste for Stroke Patient Rehabilitation Yinpeng Chen, Weiwei Xu, Hari Sundara, Thanassis Rikakis, Sheng-Min Liu Arts, Media and Engineering Progra Arizona State

More information

Searching strategy for multi-target discovery in wireless networks

Searching strategy for multi-target discovery in wireless networks Searching strategy for ulti-target discovery in wireless networks Zhao Cheng, Wendi B. Heinzelan Departent of Electrical and Coputer Engineering University of Rochester Rochester, NY 467 (585) 75-{878,

More information

arxiv:0805.1434v1 [math.pr] 9 May 2008

arxiv:0805.1434v1 [math.pr] 9 May 2008 Degree-distribution stability of scale-free networs Zhenting Hou, Xiangxing Kong, Dinghua Shi,2, and Guanrong Chen 3 School of Matheatics, Central South University, Changsha 40083, China 2 Departent of

More information

Implementation of Active Queue Management in a Combined Input and Output Queued Switch

Implementation of Active Queue Management in a Combined Input and Output Queued Switch pleentation of Active Queue Manageent in a obined nput and Output Queued Switch Bartek Wydrowski and Moshe Zukeran AR Special Research entre for Ultra-Broadband nforation Networks, EEE Departent, The University

More information

Driving Behavior Analysis Based on Vehicle OBD Information and AdaBoost Algorithms

Driving Behavior Analysis Based on Vehicle OBD Information and AdaBoost Algorithms , March 18-20, 2015, Hong Kong Driving Behavior Analysis Based on Vehicle OBD Inforation and AdaBoost Algoriths Shi-Huang Chen, Jeng-Shyang Pan, and Kaixuan Lu Abstract This paper proposes a novel driving

More information

Botnets Detection Based on IRC-Community

Botnets Detection Based on IRC-Community Botnets Detection Based on IRC-Counity Wei Lu and Ali A. Ghorbani Network Security Laboratory, Faculty of Coputer Science University of New Brunswick, Fredericton, NB E3B 5A3, Canada {wlu, ghorbani}@unb.ca

More information

ADJUSTING FOR QUALITY CHANGE

ADJUSTING FOR QUALITY CHANGE ADJUSTING FOR QUALITY CHANGE 7 Introduction 7.1 The easureent of changes in the level of consuer prices is coplicated by the appearance and disappearance of new and old goods and services, as well as changes

More information

AN ALGORITHM FOR REDUCING THE DIMENSION AND SIZE OF A SAMPLE FOR DATA EXPLORATION PROCEDURES

AN ALGORITHM FOR REDUCING THE DIMENSION AND SIZE OF A SAMPLE FOR DATA EXPLORATION PROCEDURES Int. J. Appl. Math. Coput. Sci., 2014, Vol. 24, No. 1, 133 149 DOI: 10.2478/acs-2014-0011 AN ALGORITHM FOR REDUCING THE DIMENSION AND SIZE OF A SAMPLE FOR DATA EXPLORATION PROCEDURES PIOTR KULCZYCKI,,

More information

Evaluating Inventory Management Performance: a Preliminary Desk-Simulation Study Based on IOC Model

Evaluating Inventory Management Performance: a Preliminary Desk-Simulation Study Based on IOC Model Evaluating Inventory Manageent Perforance: a Preliinary Desk-Siulation Study Based on IOC Model Flora Bernardel, Roberto Panizzolo, and Davide Martinazzo Abstract The focus of this study is on preliinary

More information

International Journal of Management & Information Systems First Quarter 2012 Volume 16, Number 1

International Journal of Management & Information Systems First Quarter 2012 Volume 16, Number 1 International Journal of Manageent & Inforation Systes First Quarter 2012 Volue 16, Nuber 1 Proposal And Effectiveness Of A Highly Copelling Direct Mail Method - Establishent And Deployent Of PMOS-DM Hisatoshi

More information

Evaluating Software Quality of Vendors using Fuzzy Analytic Hierarchy Process

Evaluating Software Quality of Vendors using Fuzzy Analytic Hierarchy Process IMECS 2008 9-2 March 2008 Hong Kong Evaluating Software Quality of Vendors using Fuzzy Analytic Hierarchy Process Kevin K.F. Yuen* Henry C.W. au Abstract This paper proposes a fuzzy Analytic Hierarchy

More information

An Approach to Combating Free-riding in Peer-to-Peer Networks

An Approach to Combating Free-riding in Peer-to-Peer Networks An Approach to Cobating Free-riding in Peer-to-Peer Networks Victor Ponce, Jie Wu, and Xiuqi Li Departent of Coputer Science and Engineering Florida Atlantic University Boca Raton, FL 33431 April 7, 2008

More information

An Integrated Approach for Monitoring Service Level Parameters of Software-Defined Networking

An Integrated Approach for Monitoring Service Level Parameters of Software-Defined Networking International Journal of Future Generation Counication and Networking Vol. 8, No. 6 (15), pp. 197-4 http://d.doi.org/1.1457/ijfgcn.15.8.6.19 An Integrated Approach for Monitoring Service Level Paraeters

More information

Resource Allocation in Wireless Networks with Multiple Relays

Resource Allocation in Wireless Networks with Multiple Relays Resource Allocation in Wireless Networks with Multiple Relays Kağan Bakanoğlu, Stefano Toasin, Elza Erkip Departent of Electrical and Coputer Engineering, Polytechnic Institute of NYU, Brooklyn, NY, 0

More information

Pure Bending Determination of Stress-Strain Curves for an Aluminum Alloy

Pure Bending Determination of Stress-Strain Curves for an Aluminum Alloy Proceedings of the World Congress on Engineering 0 Vol III WCE 0, July 6-8, 0, London, U.K. Pure Bending Deterination of Stress-Strain Curves for an Aluinu Alloy D. Torres-Franco, G. Urriolagoitia-Sosa,

More information

Data Set Generation for Rectangular Placement Problems

Data Set Generation for Rectangular Placement Problems Data Set Generation for Rectangular Placeent Probles Christine L. Valenzuela (Muford) Pearl Y. Wang School of Coputer Science & Inforatics Departent of Coputer Science MS 4A5 Cardiff University George

More information

AUC Optimization vs. Error Rate Minimization

AUC Optimization vs. Error Rate Minimization AUC Optiization vs. Error Rate Miniization Corinna Cortes and Mehryar Mohri AT&T Labs Research 180 Park Avenue, Florha Park, NJ 0793, USA {corinna, ohri}@research.att.co Abstract The area under an ROC

More information

SAMPLING METHODS LEARNING OBJECTIVES

SAMPLING METHODS LEARNING OBJECTIVES 6 SAMPLING METHODS 6 Using Statistics 6-6 2 Nonprobability Sapling and Bias 6-6 Stratified Rando Sapling 6-2 6 4 Cluster Sapling 6-4 6 5 Systeatic Sapling 6-9 6 6 Nonresponse 6-2 6 7 Suary and Review of

More information

Research Article Performance Evaluation of Human Resource Outsourcing in Food Processing Enterprises

Research Article Performance Evaluation of Human Resource Outsourcing in Food Processing Enterprises Advance Journal of Food Science and Technology 9(2): 964-969, 205 ISSN: 2042-4868; e-issn: 2042-4876 205 Maxwell Scientific Publication Corp. Subitted: August 0, 205 Accepted: Septeber 3, 205 Published:

More information

The Application of Bandwidth Optimization Technique in SLA Negotiation Process

The Application of Bandwidth Optimization Technique in SLA Negotiation Process The Application of Bandwidth Optiization Technique in SLA egotiation Process Srecko Krile University of Dubrovnik Departent of Electrical Engineering and Coputing Cira Carica 4, 20000 Dubrovnik, Croatia

More information

Adaptive Modulation and Coding for Unmanned Aerial Vehicle (UAV) Radio Channel

Adaptive Modulation and Coding for Unmanned Aerial Vehicle (UAV) Radio Channel Recent Advances in Counications Adaptive odulation and Coding for Unanned Aerial Vehicle (UAV) Radio Channel Airhossein Fereidountabar,Gian Carlo Cardarilli, Rocco Fazzolari,Luca Di Nunzio Abstract In

More information

Audio Engineering Society. Convention Paper. Presented at the 119th Convention 2005 October 7 10 New York, New York USA

Audio Engineering Society. Convention Paper. Presented at the 119th Convention 2005 October 7 10 New York, New York USA Audio Engineering Society Convention Paper Presented at the 119th Convention 2005 October 7 10 New York, New York USA This convention paper has been reproduced fro the authors advance anuscript, without

More information

Factored Models for Probabilistic Modal Logic

Factored Models for Probabilistic Modal Logic Proceedings of the Twenty-Third AAAI Conference on Artificial Intelligence (2008 Factored Models for Probabilistic Modal Logic Afsaneh Shirazi and Eyal Air Coputer Science Departent, University of Illinois

More information

COMBINING CRASH RECORDER AND PAIRED COMPARISON TECHNIQUE: INJURY RISK FUNCTIONS IN FRONTAL AND REAR IMPACTS WITH SPECIAL REFERENCE TO NECK INJURIES

COMBINING CRASH RECORDER AND PAIRED COMPARISON TECHNIQUE: INJURY RISK FUNCTIONS IN FRONTAL AND REAR IMPACTS WITH SPECIAL REFERENCE TO NECK INJURIES COMBINING CRASH RECORDER AND AIRED COMARISON TECHNIQUE: INJURY RISK FUNCTIONS IN FRONTAL AND REAR IMACTS WITH SECIAL REFERENCE TO NECK INJURIES Anders Kullgren, Maria Krafft Folksa Research, 66 Stockhol,

More information

Quality evaluation of the model-based forecasts of implied volatility index

Quality evaluation of the model-based forecasts of implied volatility index Quality evaluation of the odel-based forecasts of iplied volatility index Katarzyna Łęczycka 1 Abstract Influence of volatility on financial arket forecasts is very high. It appears as a specific factor

More information

Evaluating the Effectiveness of Task Overlapping as a Risk Response Strategy in Engineering Projects

Evaluating the Effectiveness of Task Overlapping as a Risk Response Strategy in Engineering Projects Evaluating the Effectiveness of Task Overlapping as a Risk Response Strategy in Engineering Projects Lucas Grèze Robert Pellerin Nathalie Perrier Patrice Leclaire February 2011 CIRRELT-2011-11 Bureaux

More information

Local Area Network Management

Local Area Network Management Technology Guidelines for School Coputer-based Technologies Local Area Network Manageent Local Area Network Manageent Introduction This docuent discusses the tasks associated with anageent of Local Area

More information

Use of extrapolation to forecast the working capital in the mechanical engineering companies

Use of extrapolation to forecast the working capital in the mechanical engineering companies ECONTECHMOD. AN INTERNATIONAL QUARTERLY JOURNAL 2014. Vol. 1. No. 1. 23 28 Use of extrapolation to forecast the working capital in the echanical engineering copanies A. Cherep, Y. Shvets Departent of finance

More information

ASIC Design Project Management Supported by Multi Agent Simulation

ASIC Design Project Management Supported by Multi Agent Simulation ASIC Design Project Manageent Supported by Multi Agent Siulation Jana Blaschke, Christian Sebeke, Wolfgang Rosenstiel Abstract The coplexity of Application Specific Integrated Circuits (ASICs) is continuously

More information

How To Get A Loan From A Bank For Free

How To Get A Loan From A Bank For Free Finance 111 Finance We have to work with oney every day. While balancing your checkbook or calculating your onthly expenditures on espresso requires only arithetic, when we start saving, planning for retireent,

More information

REQUIREMENTS FOR A COMPUTER SCIENCE CURRICULUM EMPHASIZING INFORMATION TECHNOLOGY SUBJECT AREA: CURRICULUM ISSUES

REQUIREMENTS FOR A COMPUTER SCIENCE CURRICULUM EMPHASIZING INFORMATION TECHNOLOGY SUBJECT AREA: CURRICULUM ISSUES REQUIREMENTS FOR A COMPUTER SCIENCE CURRICULUM EMPHASIZING INFORMATION TECHNOLOGY SUBJECT AREA: CURRICULUM ISSUES Charles Reynolds Christopher Fox reynolds @cs.ju.edu [email protected] Departent of Coputer

More information

Calculating the Return on Investment (ROI) for DMSMS Management. The Problem with Cost Avoidance

Calculating the Return on Investment (ROI) for DMSMS Management. The Problem with Cost Avoidance Calculating the Return on nvestent () for DMSMS Manageent Peter Sandborn CALCE, Departent of Mechanical Engineering (31) 45-3167 [email protected] www.ene.ud.edu/escml/obsolescence.ht October 28, 21

More information

2. FINDING A SOLUTION

2. FINDING A SOLUTION The 7 th Balan Conference on Operational Research BACOR 5 Constanta, May 5, Roania OPTIMAL TIME AND SPACE COMPLEXITY ALGORITHM FOR CONSTRUCTION OF ALL BINARY TREES FROM PRE-ORDER AND POST-ORDER TRAVERSALS

More information

Sensors as a Service Oriented Architecture: Middleware for Sensor Networks

Sensors as a Service Oriented Architecture: Middleware for Sensor Networks Sensors as a Service Oriented Architecture: Middleware for Sensor Networks John Ibbotson, Christopher Gibson, Joel Wright, Peter Waggett, IBM U.K Ltd, Petros Zerfos, IBM Research, Boleslaw K. Szyanski,

More information

A quantum secret ballot. Abstract

A quantum secret ballot. Abstract A quantu secret ballot Shahar Dolev and Itaar Pitowsky The Edelstein Center, Levi Building, The Hebrerw University, Givat Ra, Jerusale, Israel Boaz Tair arxiv:quant-ph/060087v 8 Mar 006 Departent of Philosophy

More information

Presentation Safety Legislation and Standards

Presentation Safety Legislation and Standards levels in different discrete levels corresponding for each one to a probability of dangerous failure per hour: > > The table below gives the relationship between the perforance level (PL) and the Safety

More information

The Velocities of Gas Molecules

The Velocities of Gas Molecules he Velocities of Gas Molecules by Flick Colean Departent of Cheistry Wellesley College Wellesley MA 8 Copyright Flick Colean 996 All rights reserved You are welcoe to use this docuent in your own classes

More information

Calculation Method for evaluating Solar Assisted Heat Pump Systems in SAP 2009. 15 July 2013

Calculation Method for evaluating Solar Assisted Heat Pump Systems in SAP 2009. 15 July 2013 Calculation Method for evaluating Solar Assisted Heat Pup Systes in SAP 2009 15 July 2013 Page 1 of 17 1 Introduction This docuent describes how Solar Assisted Heat Pup Systes are recognised in the National

More information

Cooperative Caching for Adaptive Bit Rate Streaming in Content Delivery Networks

Cooperative Caching for Adaptive Bit Rate Streaming in Content Delivery Networks Cooperative Caching for Adaptive Bit Rate Streaing in Content Delivery Networs Phuong Luu Vo Departent of Coputer Science and Engineering, International University - VNUHCM, Vietna [email protected]

More information

Managing Complex Network Operation with Predictive Analytics

Managing Complex Network Operation with Predictive Analytics Managing Coplex Network Operation with Predictive Analytics Zhenyu Huang, Pak Chung Wong, Patrick Mackey, Yousu Chen, Jian Ma, Kevin Schneider, and Frank L. Greitzer Pacific Northwest National Laboratory

More information

Fuzzy Evaluation on Network Security Based on the New Algorithm of Membership Degree Transformation M(1,2,3)

Fuzzy Evaluation on Network Security Based on the New Algorithm of Membership Degree Transformation M(1,2,3) 324 JOURNAL OF NETWORKS, VOL. 4, NO. 5, JULY 29 Fuzzy Evaluation on Networ Security Based on the New Algorith of Mebership Degree Transforation M(,2,3) Hua Jiang School of Econoics and Manageent, Hebei

More information

Modified Latin Hypercube Sampling Monte Carlo (MLHSMC) Estimation for Average Quality Index

Modified Latin Hypercube Sampling Monte Carlo (MLHSMC) Estimation for Average Quality Index Analog Integrated Circuits and Signal Processing, vol. 9, no., April 999. Abstract Modified Latin Hypercube Sapling Monte Carlo (MLHSMC) Estiation for Average Quality Index Mansour Keraat and Richard Kielbasa

More information

This paper studies a rental firm that offers reusable products to price- and quality-of-service sensitive

This paper studies a rental firm that offers reusable products to price- and quality-of-service sensitive MANUFACTURING & SERVICE OPERATIONS MANAGEMENT Vol., No. 3, Suer 28, pp. 429 447 issn 523-464 eissn 526-5498 8 3 429 infors doi.287/so.7.8 28 INFORMS INFORMS holds copyright to this article and distributed

More information

Physics 211: Lab Oscillations. Simple Harmonic Motion.

Physics 211: Lab Oscillations. Simple Harmonic Motion. Physics 11: Lab Oscillations. Siple Haronic Motion. Reading Assignent: Chapter 15 Introduction: As we learned in class, physical systes will undergo an oscillatory otion, when displaced fro a stable equilibriu.

More information

PREDICTION OF POSSIBLE CONGESTIONS IN SLA CREATION PROCESS

PREDICTION OF POSSIBLE CONGESTIONS IN SLA CREATION PROCESS PREDICTIO OF POSSIBLE COGESTIOS I SLA CREATIO PROCESS Srećko Krile University of Dubrovnik Departent of Electrical Engineering and Coputing Cira Carica 4, 20000 Dubrovnik, Croatia Tel +385 20 445-739,

More information

A framework for performance monitoring, load balancing, adaptive timeouts and quality of service in digital libraries

A framework for performance monitoring, load balancing, adaptive timeouts and quality of service in digital libraries Int J Digit Libr (2000) 3: 9 35 INTERNATIONAL JOURNAL ON Digital Libraries Springer-Verlag 2000 A fraework for perforance onitoring, load balancing, adaptive tieouts and quality of service in digital libraries

More information

( C) CLASS 10. TEMPERATURE AND ATOMS

( C) CLASS 10. TEMPERATURE AND ATOMS CLASS 10. EMPERAURE AND AOMS 10.1. INRODUCION Boyle s understanding of the pressure-volue relationship for gases occurred in the late 1600 s. he relationships between volue and teperature, and between

More information

Cross-Domain Metric Learning Based on Information Theory

Cross-Domain Metric Learning Based on Information Theory Proceedings of the Twenty-Eighth AAAI Conference on Artificial Intelligence Cross-Doain Metric Learning Based on Inforation Theory Hao Wang,2, Wei Wang 2,3, Chen Zhang 2, Fanjiang Xu 2. State Key Laboratory

More information

Real Time Target Tracking with Binary Sensor Networks and Parallel Computing

Real Time Target Tracking with Binary Sensor Networks and Parallel Computing Real Tie Target Tracking with Binary Sensor Networks and Parallel Coputing Hong Lin, John Rushing, Sara J. Graves, Steve Tanner, and Evans Criswell Abstract A parallel real tie data fusion and target tracking

More information

Leak detection in open water channels

Leak detection in open water channels Proceedings of the 17th World Congress The International Federation of Autoatic Control Seoul, Korea, July 6-11, 28 Leak detection in open water channels Erik Weyer Georges Bastin Departent of Electrical

More information

Automatic Name-Face Alignment to Enable Cross-Media News Retrieval

Automatic Name-Face Alignment to Enable Cross-Media News Retrieval Proceedings of the Twenty-Third International Joint Conference on Artificial Intelligence Autoatic ae-face Alignent to Enable Cross-Media ews Retrieval Yueie Zhang*, Wei Wu*, Yang Li*, Cheng Jin*, Xiangyang

More information

Preference-based Search and Multi-criteria Optimization

Preference-based Search and Multi-criteria Optimization Fro: AAAI-02 Proceedings. Copyright 2002, AAAI (www.aaai.org). All rights reserved. Preference-based Search and Multi-criteria Optiization Ulrich Junker ILOG 1681, route des Dolines F-06560 Valbonne [email protected]

More information

Equivalent Tapped Delay Line Channel Responses with Reduced Taps

Equivalent Tapped Delay Line Channel Responses with Reduced Taps Equivalent Tapped Delay Line Channel Responses with Reduced Taps Shweta Sagari, Wade Trappe, Larry Greenstein {shsagari, trappe, ljg}@winlab.rutgers.edu WINLAB, Rutgers University, North Brunswick, NJ

More information

Lecture L26-3D Rigid Body Dynamics: The Inertia Tensor

Lecture L26-3D Rigid Body Dynamics: The Inertia Tensor J. Peraire, S. Widnall 16.07 Dynaics Fall 008 Lecture L6-3D Rigid Body Dynaics: The Inertia Tensor Version.1 In this lecture, we will derive an expression for the angular oentu of a 3D rigid body. We shall

More information

Airline Yield Management with Overbooking, Cancellations, and No-Shows JANAKIRAM SUBRAMANIAN

Airline Yield Management with Overbooking, Cancellations, and No-Shows JANAKIRAM SUBRAMANIAN Airline Yield Manageent with Overbooking, Cancellations, and No-Shows JANAKIRAM SUBRAMANIAN Integral Developent Corporation, 301 University Avenue, Suite 200, Palo Alto, California 94301 SHALER STIDHAM

More information

AutoHelp. An 'Intelligent' Case-Based Help Desk Providing. Web-Based Support for EOSDIS Customers. A Concept and Proof-of-Concept Implementation

AutoHelp. An 'Intelligent' Case-Based Help Desk Providing. Web-Based Support for EOSDIS Customers. A Concept and Proof-of-Concept Implementation //j yd xd/_ ' Year One Report ":,/_i',:?,2... i" _.,.j- _,._".;-/._. ","/ AutoHelp An 'Intelligent' Case-Based Help Desk Providing Web-Based Support for EOSDIS Custoers A Concept and Proof-of-Concept Ipleentation

More information

An Improved Decision-making Model of Human Resource Outsourcing Based on Internet Collaboration

An Improved Decision-making Model of Human Resource Outsourcing Based on Internet Collaboration International Journal of Hybrid Inforation Technology, pp. 339-350 http://dx.doi.org/10.14257/hit.2016.9.4.28 An Iproved Decision-aking Model of Huan Resource Outsourcing Based on Internet Collaboration

More information

Generating Certification Authority Authenticated Public Keys in Ad Hoc Networks

Generating Certification Authority Authenticated Public Keys in Ad Hoc Networks SECURITY AND COMMUNICATION NETWORKS Published online in Wiley InterScience (www.interscience.wiley.co). Generating Certification Authority Authenticated Public Keys in Ad Hoc Networks G. Kounga 1, C. J.

More information

Investing in corporate bonds?

Investing in corporate bonds? Investing in corporate bonds? This independent guide fro the Australian Securities and Investents Coission (ASIC) can help you look past the return and assess the risks of corporate bonds. If you re thinking

More information

Partitioned Elias-Fano Indexes

Partitioned Elias-Fano Indexes Partitioned Elias-ano Indexes Giuseppe Ottaviano ISTI-CNR, Pisa [email protected] Rossano Venturini Dept. of Coputer Science, University of Pisa [email protected] ABSTRACT The Elias-ano

More information

Binary Embedding: Fundamental Limits and Fast Algorithm

Binary Embedding: Fundamental Limits and Fast Algorithm Binary Ebedding: Fundaental Liits and Fast Algorith Xinyang Yi The University of Texas at Austin [email protected] Eric Price The University of Texas at Austin [email protected] Constantine Caraanis

More information

Vectors & Newton's Laws I

Vectors & Newton's Laws I Physics 6 Vectors & Newton's Laws I Introduction In this laboratory you will eplore a few aspects of Newton s Laws ug a force table in Part I and in Part II, force sensors and DataStudio. By establishing

More information

6. Time (or Space) Series Analysis

6. Time (or Space) Series Analysis ATM 55 otes: Tie Series Analysis - Section 6a Page 8 6. Tie (or Space) Series Analysis In this chapter we will consider soe coon aspects of tie series analysis including autocorrelation, statistical prediction,

More information

CLOSED-LOOP SUPPLY CHAIN NETWORK OPTIMIZATION FOR HONG KONG CARTRIDGE RECYCLING INDUSTRY

CLOSED-LOOP SUPPLY CHAIN NETWORK OPTIMIZATION FOR HONG KONG CARTRIDGE RECYCLING INDUSTRY CLOSED-LOOP SUPPLY CHAIN NETWORK OPTIMIZATION FOR HONG KONG CARTRIDGE RECYCLING INDUSTRY Y. T. Chen Departent of Industrial and Systes Engineering Hong Kong Polytechnic University, Hong Kong [email protected]

More information

How To Balance Over Redundant Wireless Sensor Networks Based On Diffluent

How To Balance Over Redundant Wireless Sensor Networks Based On Diffluent Load balancing over redundant wireless sensor networks based on diffluent Abstract Xikui Gao Yan ai Yun Ju School of Control and Coputer Engineering North China Electric ower University 02206 China Received

More information

OpenGamma Documentation Bond Pricing

OpenGamma Documentation Bond Pricing OpenGaa Docuentation Bond Pricing Marc Henrard [email protected] OpenGaa Docuentation n. 5 Version 2.0 - May 2013 Abstract The details of the ipleentation of pricing for fixed coupon bonds and floating rate

More information

Markovian inventory policy with application to the paper industry

Markovian inventory policy with application to the paper industry Coputers and Cheical Engineering 26 (2002) 1399 1413 www.elsevier.co/locate/copcheeng Markovian inventory policy with application to the paper industry K. Karen Yin a, *, Hu Liu a,1, Neil E. Johnson b,2

More information

IMPLEMENTING VIRTUAL DESIGN AND CONSTRUCTION (VDC) IN VEIDEKKE USING SIMPLE METRICS TO IMPROVE THE DESIGN MANAGEMENT PROCESS.

IMPLEMENTING VIRTUAL DESIGN AND CONSTRUCTION (VDC) IN VEIDEKKE USING SIMPLE METRICS TO IMPROVE THE DESIGN MANAGEMENT PROCESS. Ipleenting Virtual Design and Construction (VDC) in Veidekke Using Siple Metrics to Iprove IMPLEMENTING VIRTUAL DESIGN AND CONSTRUCTION (VDC) IN VEIDEKKE USING SIMPLE METRICS TO IMPROVE THE DESIGN MANAGEMENT

More information