Research on Digital Library Personalized Information Service Model Based on Agent Model
|
|
- Alvin George
- 5 years ago
- Views:
Transcription
1 Reserch on Digitl Librry Personlized Informtion Service Model Bsed on Model Xu Yn Xi n Physicl Eduction University Xi n, Shnxi, Chin, guilinxuyn@yhoo.com.cn Journl of Digitl Informtion Mngement ABSTRACT: Tking the personlized informtion needs of users s the reserch object, this rticle introduced the individulized service process of digitl librry, estblished the model, built multivrite function by combining with the user preference model, nd expounded the process of personlized informtion cquisition, nlysis nd push. We could conclude tht digitl librry personlized informtion service system operted coordintely between ech module, nd hd complete chin of reltionships. It could discovery nd trck informtion resources independently, effectively solve the problem of informtion overlod, nd relize the optimiztion of user informtion needs. Ctegories nd Subject Descriptors: I.2.11 [Distributed Artificil Intelligence]: Multigent Systems; H.3.7 [Digitl Librries] Generl Terms: Informtion Service Keywords: Digitl Librry, Informtion Service Received: 21 July 2013, Revised 25 August 2013, Accepted 2 September Introduction Along with the development of the virtul informtion system, the user cn esily get informtion, but is difficult to obtin ccurte informtion, especilly for scientific reserch clients nd cdemic users. They urgently need the informtion service with personlity, high qulity which needs the librry to provide specilized nd personlized service ccording to the different requirements of the users. Personlized informtion service rises t the historic moment. It cn ctively provide users with the personlized informtion bsed on the user s interests nd hobbies, let the reder quickly nd ccurtely find needed informtion from the vst mounts of informtion, nd lern utonomously by using librry resources [1]. Under the conditions of personlized informtion service, the user cn mke the corresponding informtion ccording to their requirements, nd digitl librry cn lso ctively service the users nd improve the service qulity ccording to user s needs. However, personlized informtion service needs robust technicl support. is used to design personlized service model of the librry. Tking the user s the center, it reserches the user s behvior nd interest nd serches, orgnizes, selects nd estblishes trgeted, user-oriented personlized service mechnism. The librry ctively serches knowledge for the reder insted of providing informtion pssively, which hs improved the utiliztion of librry resources [2]. There re mny reserches on personlized informtion services of digitl librry in the world. On the personlized push service nd push system of the digitl librry, for exmple, My Librry system put forwrd by Cornell university includes three service contents: Linksmen, My updtes nd Contendents [3]. My librry system developed by zhejing university librry includes such functions s bookmrks, custom librry digitl resources, the ltest informtion, links, serch engine, nd custom WEB pge style. For the reserch of personlized recommendtion service, the typicl reserch projects t brod re: ihrrnin, Cite. The Seer, Fb [4]. Domestic reserch of this re is digitl librry personlized recommendtion system developed by School of informtion, renmin university of Chin nd librry. Adopting the, this rticle designs personlized service model, nd tkes the user s center to reserch the user s behvior, interests nd hbits, nd reserches the personlized informtion service model of digitl librry bsed on. 418 Journl of Digitl Informtion Mngement Volume 11 Number 6 December 2013
2 2. The Process of Personlized Service System in Digitl Librry The contents of personlized informtion service minly includes three modules: the customiztion nd retrievl of personlized informtion, nd personlized service interfce. Therefore, personlized informtion service system is structure which constntly circultes, nd minly hs three modules: the cquisition of user informtion, processing of personlized informtion nd personlized collection mngement nd scheduling which is shown in figure 1: DL collection nd is widely used in business, mnufcturing, finnce, e-commerce, etc. 3.2 The Function of Model technology provides the technicl support for the personlized informtion service of the librry. It hs such chrcteristics s utonomy, socility, ctivity, lerning, nd intelligent. It cn serch the network informtion resources ccording to user s request nd preferences, nd then filter, nlyze nd mine the informtion, finlly send to the user ccording to the priority of the correltion. becuse of its utonomy, it cn substitute the user to get ccess to the informtion ccording to user personlized informtion demnd without user intervention, nd then ctively push the informtion to the user which relize the fundmentl chnge of service mnner. user informtion collection informtion process informtion push 3.3 The Principle of Opertion Firstly, the user submits their informtion needs to intelligent retrievl. Figure 1. The process of personlized service system Digitl librry obtins the user s personlized informtion vi the custom, nd understnds the needs of users, nd then provides users with more ccurte informtion service. Tht is the process of informtion cquisition; nlyze the user s hbits, interests nd the informtion demnd, nd estblish ccurte profiles. At the sme time, keep trck of users condition, djust the content nd view of the digitl librry service in time, relize synchronous updting between user requirements nd informtion service. This is the process of personlized informtion; Personlized collection includes informtion push, mining nd prediction. Informtion push usully dpts the modeling method of user preference. In view of the new users who hve set the needed informtion, it sends the online informtion to the user regulrly or irregulrly by push technology, nd provides convenient conditions for the user. Informtion mining technology deeply nlyzes the informtion tht the user needs, nd then clssifies the informtion bsed on the chrcteristics of informtion content to improve the utomtion level of informtion retrievl. Informtion prediction nlyzes the previous informtion, then predicts the informtion point nd direction of future informtion. And then sends the predicted informtion to the user. 3. Estblishment of Model 3.1 The Conception of Technology is concept tht develops in the field of rtificil intelligence (AJ) [5]. It cn continue role of softwre entity which hs the cpbility of perception, problem solving nd communicting with the outside world. It cn utomticlly serch the informtion tht the user my be interest in ccording to the user-defined criteri, nd psses it to the specified plce ccording to the specified time. It becomes the medition of ccess to resources. technology is brnch of distributed computing, Secondly, strts the retrievl function, nlyzes nd understnds the user s informtion demnd, utomticlly goes into the digitl librry, tlks to librry server, nd retrieves, nlyzes nd processes the user interfce. Thirdly, optimize the results ccording to the needs nd the wy of thinking of users. Finlly, send the optimized results to the user. Intelligent is the ltest softwre design pttern which is beyond the technology of client/server oriented system. According to the design pttern of Agenÿintelligent retrievl designs the informtion ccess system which cn utomticlly retrieve the user interfce, dtbse of digitl librry nd the informtion resources ccording to the chrcteristics nd the wy of thinking of informtion users to dpt to the environment of the librry. 3.4 The Estblishment of Model The bstrct model of cn be expressed s: Ag: RE Ac, of which the set of the externl environment condition is: E = {e, e,... }, the ction set of is Ac = {,,... }, R is the performnce set of stte chnge of E nd Ac. According to the chnge of environmentl condition, the model mps stte to ction, nd mkes the motor output ct on the environment, to chieve closed loop. The specific process is shown in figure 2. see next stte ction Input perceptul informtion motor output Externl environment (E) Figure 2. The bstrct model of Strting from the initil internl stte i0, observes the externl environment stte e, genertes perception Journl of Digitl Informtion Mngement Volume 11 Number 6 December
3 user requirement feedbck to user return the results personlized service units provide informtion personlity nlysis find dtbse server devition mplifying djust informtion service units to obtin strtegy contrstive nlysis repository Figure 3. The cquisition process of gent personlized informtion function see (e), nd updtes the internl stte of through the function next, nd then chnges to next [i0, see (e) ], finlly compres with stte librry. selects n ction r through the ction { next [ i0, see (e) ] }, where r is lternting sequence in the environmentl condition e nd : r: e0 0 e1 1 e u 1 eu, where is the body of n ction. After the ction, continues to percept the outside world by see, updte the stte through next, nd select the ction performed through ction. 4. The Anlysis of Model Function 4.1 The Acquisition Process of Personlized Informtion The key of personlized service is the cquisition of the user s dynmic informtion. There re two wys to obtin the informtion for Intelligent : one is to regulrly poll Web log, nd regulrly collect user s informtion; the other is to trck the in rel time, finds the chnges nd cts timely to nlyze the user s personlized informtion. The specific process is shown in figure 3. According to user requirements, personlity nlysis connects with the dtbse tht cn store user informtion, entrusts them to find the informtion which mtches the model, judges through the knowledge bse relted rules to extrct the personlized informtion service, nd sends results to personlity nlysis, nd then djusts the weights of the lgorithm, finlly feedbck the results to the user[6]. When the user submits the ppliction of digitl librry, for exmple, retrieve clss in personlity nlysis will dd the digitl librry, nd gives certin weight, nd constructs structure of personlized informtion by resoning lgorithm. Then retrieve the informtion round the personlized informtion structure, extrcts the personlized informtion nd then feedbcks the nlysis to personlity nlysis. The result includes digitl librry, nd system forecst informtion, such s digitl librry, distributed librry, digitl librry construction, etc.. After the retrievl, djust the corresponding weights of knowledge resoning lgorithm. 4.2 The Anlysis Process of Personlized Informtion Personlized processing module is the core of the whole system, which is responsible for the norml opertion of the whole system. It minly processes user demnd, extrcts the content nd trnsltes into the informtion tht cn identify by the mchines. Its structure is s follows: User informtion collection minly collects dt from the subscriber interfce module, nd clssifies simply, nd then sends the collecting informtion to the personlity nlysis which is key prt of the personlized processing module. According to the corresponding rules of knowledge bse, it uses resoning lgorithms to process the collecting informtion, seprtes out the user interfce lyer Informtion collection Mngement Messge scheduling repository (rule bse) personlized nlysis respository user informtion bse Figure 4. Anlysis process of personlized informtion 420 Journl of Digitl Informtion Mngement Volume 11 Number 6 December 2013
4 personlized content, such s the user s personl informtion, journl website tht user often visits, the keyword used, the user s IP ddress nd frequency of ccess, etc. When the processing is completed, put the results into the informtion dtbse or pss it to the informtion presenttion module, nd chnge the knowledge bse. Knowledge bse is repository which minly sves the dtbse needed, processing results, nd the dt send bck to the user fter processing [7]. At the sme time, the knowledge bse is lso rule bse nd cn nlyzes, judges ccording to the rules. Informtion scheduling schedules the dtbse ccording to the chrcter prmeter through precess of personlity nlysis, nd selects the pproprite informtion for the user, menwhile, feedbck the user s ctivity informtion to the personlity nlysis, nd reprocess by the personlity nlysis. Mngement is responsible to coordinte nd mnge other s. 4.3 The Push of Personlized Informtion of The min function of push dule is to recommend informtion to users fter the process of recommending module ccording to the previous informtion. The user preference modeling in personlized recommendtion system of digitl librry describes the integrtion of informtion requirements from submission to cncelltion, including dynmic renewl to ccurtely reflect the user s preference. User preference model cn be formlized s triple: P : P = (M, F, ψ) Of which M = {M (0), M (1),... M (M),... M (n) }, N = {F (1), F (2), F (M),... F (n) }, ψ : M F M, {M (M + 1) = (ψ M (i), F (i + 1) ), i = 0, 1,..., n} Here, M is the stte set produced in the process of use of the user preference model; F is the feedbck informtion set collected for the user preference model, nd its role is to drive the updting process; ψ represents the renewl function of the user preference model. Where, M (0) is the initil stte of the user model; M (i) mens user preference mode updted i times; F (i) is the informtion of updting M (i + 1) fter feedbck the ith times. The formlized description reflects tht the user preference model is updting constntly, nd synchronously flls the user s preference [8]. In view of the chrcteristics of user in digitl librry recommender system, this pper rises the question tht combines the short-term nd long-term interests. Set the long-term preference got bsed on their ge, professionl bckground, eduction level, etc; set the nlyzed preferences s the short-term preferences, such s the clssified preference, the smple documents nd query, nd so on. In the finl considertion of user preferences, we determine the preference model α M L + (1 α) M S, where M L is the eigenvector of long-term preference, M S M S is the eigenvector for short-term preference, α is the prmeter between (0 ~ 1), nd djusts the influence of the short-term nd long-term interests. Describe clssifiction system T s tree structure: T = (C, R), where C ={c1, c2,..., ci,...cn}, nd it is the set tht belongs to ll ctegories in the clssifiction system, ci is the i ctegory; R = R = { ci, cj r 1 < i < j < n}, which mens hyponymy mong the clssifictions in C nd ci, cj r mens ci is the clssifiction of cj. Bsed on the rule-bsed, we conclude tht the user my be interest in some ctegory, such s ci, cj, ck, etc, nd {ct1, ct2,..., cti,... } cn be pplied to ci. Thus M L cn be shown s M L = ci cj,... ck, = {ct1, ct2,..., cti} {ct 1, ct 2,..., ct i}... = {ct1, ct2,..., cti,... ct 1, ct 2,..., ct i} As to the condition tht the user selects multiple ctegories, we cn consider ccording to whether the preference ctegory is child-prent or sibling when we estblish the user preference model in the user preference model. In the condition tht the user selects multiple preference clssifiction, the initil preference model M S is expressed s: M L = α ci β cj = α{ct1, ct2,..., cti} β {ct 1, ct 2,..., ct i,...} = {αct1, αct2,..., αcti,... βct 1, βct 2,..., βct i,...} Where α nd β re the weights of preference of sibling clssifiction. As to the subclssing, we cn give n ttenution fctorγ (0 < γ < 1) shown s follows: M S = αγ {cj ci, cj r} β ci = {αγct1, αγct2,..., αγcti,... βct 1, βct 2,..., βct i,...} Recommended results cn be recommended to the user by push system (push), or obtined through the pull (pull). In the trditionl Internet services, informtion trnsmission ws processed ccording to the Pull mode, nd the serve provided by servicer is pssive. The user himself finds informtion. The Push mode provided by technology is ctive informtion service network, is the informtion for the user, the server for the user s informtion, tht is informtion finds users. The server gets the user s demnds nd pushes the informtion retrieved. technology service not only conveys informtion to users, but lso cn push users the updting nd dynmic informtion ccording to user s preset informtion chnnels nd requests to relize the rel personlized informtion service[9]. The reliztion of the individulized informtion service is to use intelligent technology to comprehensively mine the user s interests, nd utomticlly recognize nd extrct ccording to the user specific informtion object templte, nd then pss Journl of Digitl Informtion Mngement Volume 11 Number 6 December
5 the filtered results to the user in ccordnce with user requirements. Finlly relize the circultion of the whole service system. 5. Results nd Discussion From the bove nlysis, the whole personlized informtion system of digitl librry minly composes of three modules, nd the module is close relted with ech other, which hs formed complete chin of reltions. The whole system model is bsed on the user, nd tkes the coordintion between every link s the proof, which fully relized the personlized service of digitl librry. At present, the digitl librry personlized service is still in infncy, but s the digitl librry develops to networking, shring, users doesn t just fce with librry, but huge net-librry bsed on number of librries. It is difficult for user to obtin the ccurte informtion. The librry personlized service nd resource discovery nd trcking processed by the personlized service system independently, cn effectively solve the problem of informtion overlod, nd relize the optimiztion of informtion needs. Design the librry personlized service model with, hs high guidnce in reserching nd relizing the librry personlized service system, nd is good try is to relize the wide-re digitl librry personlized service. However, in terms of theoreticl reserch nd technology, the Internet oriented digitl librry personlized ctive informtion service is system engineering with multiinterdisciplinry, nd needs the integrted ppliction of kinds of theories nd technologies, such s informtion retrievl, rtificil intelligence, dt mining nd so on. Therefore, librries of ll types nd t ll levels should deeply reserches the relted problems on the bsis of the existing service, especilly the pplied reserch of the technologies, such s semntic Web, ontology, net, mbient intelligence, etc [10]. It cn solve the problems, such s how to mke use of ontology technology to ccurtely obtin the user preference informtion, how to crry out precise retrievl of informtion resources, how to semnticlly mtch the user preferences nd informtion resources, how to use semntic grid to solve contrdictions of the scle nd efficiency of the personlized ctive informtion service nd how to effectively crry out individulized ctive informtion service in the intelligence environment, etc. Obviously, only the effective technology integrtion, nd good solution to these problems,cn mke the user s the orgnizer of informtion resource, menwhile, uses the informtion efficiently nd enjoys convenient service. References [1] Lin, Ning. (2012). Reserch on the individul service model of the digitl librry on the bsis of the intelligent. The Journl of the Librry Science in Jingxi. (3) [2] Zhenxing, Hou., Hongyn, Cui. (2013). Reserch on personlized ctive informtion service model of digitl librry. Informtion Science. (3) [3] Weixin, Xu. (2013). Construction of personlized informtion service system of digitl librry. Journl of Nnchng College of Eduction. (2) [4] Yufeng, Zhng.,Chungye, Yn. (2010). Reserch on the model of personlized informtion service bsed on gent. Informtion Science. (5) [5] Yongxin, Li., Pengwei, Zhu. (2011). Reserch on personlized informtion push service model bsed on. Informtion Technology. (7) [6] Xiqun, Hung. (2006). The Modeling of User Profile in the Digitl Librry Recommender System. Informtion Science. (1) [7] Xiulin, Chen. (2008). induvidution cpcity informtion serches system be pplied in figure librry science flt roof. Science nd Technology of West Chin. (1) [8] Xioyong, Lin. (2006). Reliztion of personlized informtion service bsed on gent technology. Journl of Librry Science. (4) [9] Jun, Zhng. (2013). The ppliction of ElGml encryption technology to the informtion security of digitl librry. IAES Journl of Electricl nd Electronics Engineering. 11 (12). [10] Genjin, Yu., kunpeng, Weng. (2013). Intrusion detection system nd technology of lyered wireless sensor network bsed on. IAES Journl of Electricl nd Electronics Engineering. 11 (8) Journl of Digitl Informtion Mngement Volume 11 Number 6 December 2013
Complete Coverage Path Planning of Mobile Robot Based on Dynamic Programming Algorithm Peng Zhou, Zhong-min Wang, Zhen-nan Li, Yang Li
2nd Interntionl Conference on Electronic & Mechnicl Engineering nd Informtion Technology (EMEIT-212) Complete Coverge Pth Plnning of Mobile Robot Bsed on Dynmic Progrmming Algorithm Peng Zhou, Zhong-min
More informationvcloud Director Service Provider Admin Portal Guide vcloud Director 9.1
vcloud Director Service Provider Admin Portl Guide vcloud Director 9. vcloud Director Service Provider Admin Portl Guide You cn find the most up-to-dte technicl documenttion on the VMwre website t: https://docs.vmwre.com/
More informationc360 Add-On Solutions
c360 Add-On Solutions Functionlity Dynmics CRM 2011 c360 Record Editor Reltionship Explorer Multi-Field Serch Alerts Console c360 Core Productivity Pck "Does your tem resist using CRM becuse updting dt
More informationIZT DAB ContentServer, IZT S1000 Testing DAB Receivers Using ETI
IZT DAB ContentServer, IZT S1000 Testing DAB Receivers Using ETI Appliction Note Rel-time nd offline modultion from ETI files Generting nd nlyzing ETI files Rel-time interfce using EDI/ETI IZT DAB CONTENTSERVER
More informationL. Yaroslavsky. Fundamentals of Digital Image Processing. Course
L. Yroslvsky. Fundmentls of Digitl Imge Processing. Course 0555.330 Lecture. Imge enhncement.. Imge enhncement s n imge processing tsk. Clssifiction of imge enhncement methods Imge enhncement is processing
More informationA Scalable and Reliable Mobile Agent Computation Model
A Sclble nd Relible Mobile Agent Computtion Model Yong Liu, Congfu Xu, Zhohui Wu, nd Yunhe Pn College of Computer Science, Zhejing University Hngzhou 310027, Chin cckffe@yhoo.com.cn Abstrct. This pper
More informationFile Manager Quick Reference Guide. June Prepared for the Mayo Clinic Enterprise Kahua Deployment
File Mnger Quick Reference Guide June 2018 Prepred for the Myo Clinic Enterprise Khu Deployment NVIGTION IN FILE MNGER To nvigte in File Mnger, users will mke use of the left pne to nvigte nd further pnes
More informationSmall Business Networking
Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology
More informationPreserving Constraints for Aggregation Relationship Type Update in XML Document
Preserving Constrints for Aggregtion Reltionship Type Updte in XML Document Eric Prdede 1, J. Wenny Rhyu 1, nd Dvid Tnir 2 1 Deprtment of Computer Science nd Computer Engineering, L Trobe University, Bundoor
More informationMigrating vrealize Automation to 7.3 or March 2018 vrealize Automation 7.3
Migrting vrelize Automtion to 7.3 or 7.3.1 15 Mrch 2018 vrelize Automtion 7.3 You cn find the most up-to-dte technicl documenttion on the VMwre website t: https://docs.vmwre.com/ If you hve comments bout
More informationSmall Business Networking
Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology
More informationHow to Design REST API? Written Date : March 23, 2015
Visul Prdigm How Design REST API? Turil How Design REST API? Written Dte : Mrch 23, 2015 REpresenttionl Stte Trnsfer, n rchitecturl style tht cn be used in building networked pplictions, is becoming incresingly
More informationIn the last lecture, we discussed how valid tokens may be specified by regular expressions.
LECTURE 5 Scnning SYNTAX ANALYSIS We know from our previous lectures tht the process of verifying the syntx of the progrm is performed in two stges: Scnning: Identifying nd verifying tokens in progrm.
More informationSmall Business Networking
Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology
More informationEngineer-to-Engineer Note
Engineer-to-Engineer Note EE-295 Technicl notes on using Anlog Devices DSPs, processors nd development tools Visit our Web resources http://www.nlog.com/ee-notes nd http://www.nlog.com/processors or e-mil
More informationEasyMP Network Projection Operation Guide
EsyMP Network Projection Opertion Guide Contents 2 Introduction to EsyMP Network Projection EsyMP Network Projection Fetures... 5 Disply Options... 6 Multi-Screen Disply Function... 6 Movie Sending Mode...
More informationOverview. Network characteristics. Network architecture. Data dissemination. Network characteristics (cont d) Mobile computing and databases
Overview Mobile computing nd dtbses Generl issues in mobile dt mngement Dt dissemintion Dt consistency Loction dependent queries Interfces Detils of brodcst disks thlis klfigopoulos Network rchitecture
More informationEfficient Regular Expression Grouping Algorithm Based on Label Propagation Xi Chena, Shuqiao Chenb and Ming Maoc
4th Ntionl Conference on Electricl, Electronics nd Computer Engineering (NCEECE 2015) Efficient Regulr Expression Grouping Algorithm Bsed on Lbel Propgtion Xi Chen, Shuqio Chenb nd Ming Moc Ntionl Digitl
More informationSmall Business Networking
Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology
More informationA Transportation Problem Analysed by a New Ranking Method
(IJIRSE) Interntionl Journl of Innovtive Reserch in Science & Engineering ISSN (Online) 7-07 A Trnsporttion Problem Anlysed by New Rnking Method Dr. A. Shy Sudh P. Chinthiy Associte Professor PG Scholr
More informationSmall Business Networking
Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology
More informationThe Distributed Data Access Schemes in Lambda Grid Networks
The Distributed Dt Access Schemes in Lmbd Grid Networks Ryot Usui, Hiroyuki Miygi, Yutk Arkw, Storu Okmoto, nd Noki Ymnk Grdute School of Science for Open nd Environmentl Systems, Keio University, Jpn
More informationSmall Business Networking
Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology
More informationA New Learning Algorithm for the MAXQ Hierarchical Reinforcement Learning Method
A New Lerning Algorithm for the MAXQ Hierrchicl Reinforcement Lerning Method Frzneh Mirzzdeh 1, Bbk Behsz 2, nd Hmid Beigy 1 1 Deprtment of Computer Engineering, Shrif University of Technology, Tehrn,
More informationStatistical classification of spatial relationships among mathematical symbols
2009 10th Interntionl Conference on Document Anlysis nd Recognition Sttisticl clssifiction of sptil reltionships mong mthemticl symbols Wl Aly, Seiichi Uchid Deprtment of Intelligent Systems, Kyushu University
More informationTool Vendor Perspectives SysML Thus Far
Frontiers 2008 Pnel Georgi Tec, 05-13-08 Tool Vendor Perspectives SysML Thus Fr Hns-Peter Hoffmnn, Ph.D Chief Systems Methodologist Telelogic, Systems & Softwre Modeling Business Unit Peter.Hoffmnn@telelogic.com
More informationAn Integrated Simulation System for Human Factors Study
An Integrted Simultion System for Humn Fctors Study Ying Wng, Wei Zhng Deprtment of Industril Engineering, Tsinghu University, Beijing 100084, Chin Foud Bennis, Dmien Chblt IRCCyN, Ecole Centrle de Nntes,
More informationSmall Business Networking
Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology
More informationElena Baralis, Silvia Chiusano Politecnico di Torino. Pag. 1. Query optimization. DBMS Architecture. Query optimizer. Query optimizer.
DBMS Architecture SQL INSTRUCTION OPTIMIZER Dtbse Mngement Systems MANAGEMENT OF ACCESS METHODS BUFFER MANAGER CONCURRENCY CONTROL RELIABILITY MANAGEMENT Index Files Dt Files System Ctlog DATABASE 2 Query
More informationEngineer-to-Engineer Note
Engineer-to-Engineer Note EE-204 Technicl notes on using Anlog Devices DSPs, processors nd development tools Visit our Web resources http://www.nlog.com/ee-notes nd http://www.nlog.com/processors or e-mil
More informationVulnerability Analysis of Electric Power Communication Network. Yucong Wu
2nd Interntionl Conference on Advnces in Mechnicl Engineering nd Industril Informtics (AMEII 2016 Vulnerbility Anlysis of Electric Power Communiction Network Yucong Wu Deprtment of Telecommunictions Engineering,
More informationEngineer To Engineer Note
Engineer To Engineer Note EE-208 Technicl Notes on using Anlog Devices' DSP components nd development tools Contct our technicl support by phone: (800) ANALOG-D or e-mil: dsp.support@nlog.com Or visit
More informationSmall Business Networking
Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology
More informationFunctor (1A) Young Won Lim 10/5/17
Copyright (c) 2016-2017 Young W. Lim. Permission is grnted to copy, distribute nd/or modify this document under the terms of the GNU Free Documenttion License, Version 1.2 or ny lter version published
More informationFig.25: the Role of LEX
The Lnguge for Specifying Lexicl Anlyzer We shll now study how to uild lexicl nlyzer from specifiction of tokens in the form of list of regulr expressions The discussion centers round the design of n existing
More informationUnit #9 : Definite Integral Properties, Fundamental Theorem of Calculus
Unit #9 : Definite Integrl Properties, Fundmentl Theorem of Clculus Gols: Identify properties of definite integrls Define odd nd even functions, nd reltionship to integrl vlues Introduce the Fundmentl
More informationMcAfee Network Security Platform
NTBA Applince T-200 nd T-500 Quick Strt Guide Revision B McAfee Network Security Pltform 1 Instll the mounting rils Position the mounting rils correctly nd instll them t sme levels. At the front of the
More informationpdftoolbox Server 4 Manual
pdftoolbox Server 4 Mnul Mnul Pge 2 Mnul Lst modified: 27 Februry 2009 2009 by clls softwre gmbh, Berlin, Germny All rights reserved All trdemrks re the property of their respective owners. Mnul Pge Content
More informationFunctor (1A) Young Won Lim 8/2/17
Copyright (c) 2016-2017 Young W. Lim. Permission is grnted to copy, distribute nd/or modify this document under the terms of the GNU Free Documenttion License, Version 1.2 or ny lter version published
More information2 Computing all Intersections of a Set of Segments Line Segment Intersection
15-451/651: Design & Anlysis of Algorithms Novemer 14, 2016 Lecture #21 Sweep-Line nd Segment Intersection lst chnged: Novemer 8, 2017 1 Preliminries The sweep-line prdigm is very powerful lgorithmic design
More informationpdfapilot Server 2 Manual
pdfpilot Server 2 Mnul 2011 by clls softwre gmbh Schönhuser Allee 6/7 D 10119 Berlin Germny info@cllssoftwre.com www.cllssoftwre.com Mnul clls pdfpilot Server 2 Pge 2 clls pdfpilot Server 2 Mnul Lst modified:
More informationCompatibility Testing - A Must Do of the Web Apps. By Premalatha Shanmugham & Kokila Elumalai
Comptibility Testing - A Must Do of the Web Apps By Premlth Shnmughm & Kokil Elumli Agend The Need The Impct The Chllenges The Strtegy The Checklist Metrics Inferences The Rod Ahed 2 2012 Indium Softwre
More informationA Formalism for Functionality Preserving System Level Transformations
A Formlism for Functionlity Preserving System Level Trnsformtions Smr Abdi Dniel Gjski Center for Embedded Computer Systems UC Irvine Center for Embedded Computer Systems UC Irvine Irvine, CA 92697 Irvine,
More informationCOMP 423 lecture 11 Jan. 28, 2008
COMP 423 lecture 11 Jn. 28, 2008 Up to now, we hve looked t how some symols in n lphet occur more frequently thn others nd how we cn sve its y using code such tht the codewords for more frequently occuring
More informationSmall Business Networking
Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology
More informationEngineer To Engineer Note
Engineer To Engineer Note EE-169 Technicl Notes on using Anlog Devices' DSP components nd development tools Contct our technicl support by phone: (800) ANALOG-D or e-mil: dsp.support@nlog.com Or visit
More informationvcloud Director Tenant Portal Guide vcloud Director 9.1
vcloud Director Tennt Portl Guide vcloud Director 9.1 You cn find the most up-to-dte technicl documenttion on the VMwre website t: https://docs.vmwre.com/ If you hve comments bout this documenttion, submit
More informationEasyMP Multi PC Projection Operation Guide
EsyMP Multi PC Projection Opertion Guide Contents 2 Introduction to EsyMP Multi PC Projection 5 EsyMP Multi PC Projection Fetures... 6 Connection to Vrious Devices... 6 Four-Pnel Disply... 6 Chnge Presenters
More informationEpson iprojection Operation Guide (Windows/Mac)
Epson iprojection Opertion Guide (Windows/Mc) Contents 2 Introduction to Epson iprojection 5 Epson iprojection Fetures... 6 Connection to Vrious Devices... 6 Four-Pnel Disply... 6 Chnge Presenters nd Projection
More informationSection 10.4 Hyperbolas
66 Section 10.4 Hyperbols Objective : Definition of hyperbol & hyperbols centered t (0, 0). The third type of conic we will study is the hyperbol. It is defined in the sme mnner tht we defined the prbol
More informationCS 268: IP Multicast Routing
Motivtion CS 268: IP Multicst Routing Ion Stoic April 5, 2004 Mny pplictions requires one-to-mny communiction - E.g., video/udio conferencing, news dissemintion, file updtes, etc. Using unicst to replicte
More informationGraph Exploration: Taking the User into the Loop
Grph Explortion: Tking the User into the Loop Dvide Mottin, Anj Jentzsch, Emmnuel Müller Hsso Plttner Institute, Potsdm, Germny 2016/10/24 CIKM2016, Indinpolis, US Who we re Dvide Mottin grph mining, novel
More informationAgilent Mass Hunter Software
Agilent Mss Hunter Softwre Quick Strt Guide Use this guide to get strted with the Mss Hunter softwre. Wht is Mss Hunter Softwre? Mss Hunter is n integrl prt of Agilent TOF softwre (version A.02.00). Mss
More informationOn the Detection of Step Edges in Algorithms Based on Gradient Vector Analysis
On the Detection of Step Edges in Algorithms Bsed on Grdient Vector Anlysis A. Lrr6, E. Montseny Computer Engineering Dept. Universitt Rovir i Virgili Crreter de Slou sin 43006 Trrgon, Spin Emil: lrre@etse.urv.es
More informationSynchronizability of Conversations Among Web Services
1 Synchronizbility of Converstions Among Web Services Xing Fu, Tevfik Bultn, Jinwen Su Abstrct We present frmework for nlyzing interctions mong web services tht communicte with synchronous messges. We
More informationEngineer To Engineer Note
Engineer To Engineer Note EE-186 Technicl Notes on using Anlog Devices' DSP components nd development tools Contct our technicl support by phone: (800) ANALOG-D or e-mil: dsp.support@nlog.com Or visit
More informationTree Structured Symmetrical Systems of Linear Equations and their Graphical Solution
Proceedings of the World Congress on Engineering nd Computer Science 4 Vol I WCECS 4, -4 October, 4, Sn Frncisco, USA Tree Structured Symmetricl Systems of Liner Equtions nd their Grphicl Solution Jime
More informationTixeo compared to other videoconferencing solutions
compred to other videoconferencing solutions for V171026EN , unique solution on the video conferencing field Adobe Connect Web RTC Vydio for High security level, privcy Zero impct on network security policies
More informationVoIP for the Small Business
Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. TechAdvisory.org SME Reports sponsored by Voice over Internet Protocol (VoIP)
More informationSimrad ES80. Software Release Note Introduction
Simrd ES80 Softwre Relese 1.3.0 Introduction This document descries the chnges introduced with the new softwre version. Product: ES80 Softwre version: 1.3.0 This softwre controls ll functionlity in the
More informationINTRODUCTION TO SIMPLICIAL COMPLEXES
INTRODUCTION TO SIMPLICIAL COMPLEXES CASEY KELLEHER AND ALESSANDRA PANTANO 0.1. Introduction. In this ctivity set we re going to introduce notion from Algebric Topology clled simplicil homology. The min
More informationNOTES. Figure 1 illustrates typical hardware component connections required when using the JCM ICB Asset Ticket Generator software application.
ICB Asset Ticket Genertor Opertor s Guide Septemer, 2016 Septemer, 2016 NOTES Opertor s Guide ICB Asset Ticket Genertor Softwre Instlltion nd Opertion This document contins informtion for downloding, instlling,
More informationUT1553B BCRT True Dual-port Memory Interface
UTMC APPICATION NOTE UT553B BCRT True Dul-port Memory Interfce INTRODUCTION The UTMC UT553B BCRT is monolithic CMOS integrted circuit tht provides comprehensive MI-STD- 553B Bus Controller nd Remote Terminl
More informationCHAPTER III IMAGE DEWARPING (CALIBRATION) PROCEDURE
CHAPTER III IMAGE DEWARPING (CALIBRATION) PROCEDURE 3.1 Scheimpflug Configurtion nd Perspective Distortion Scheimpflug criterion were found out to be the best lyout configurtion for Stereoscopic PIV, becuse
More informationEnginner To Engineer Note
Technicl Notes on using Anlog Devices DSP components nd development tools from the DSP Division Phone: (800) ANALOG-D, FAX: (781) 461-3010, EMAIL: dsp_pplictions@nlog.com, FTP: ftp.nlog.com Using n ADSP-2181
More informationApplication-Level Traffic Monitoring and an Analysis on IP Networks
Appliction-Level Trffic Monitoring nd n Anlysis on IP Networks Myung-Sup Kim, Young J. Won, nd Jmes Won-Ki Hong Trditionl trffic identifiction methods bsed on wellknown port numbers re not pproprite for
More informationII. THE ALGORITHM. A. Depth Map Processing
Lerning Plnr Geometric Scene Context Using Stereo Vision Pul G. Bumstrck, Bryn D. Brudevold, nd Pul D. Reynolds {pbumstrck,brynb,pulr2}@stnford.edu CS229 Finl Project Report December 15, 2006 Abstrct A
More informationCS 432 Fall Mike Lam, Professor a (bc)* Regular Expressions and Finite Automata
CS 432 Fll 2017 Mike Lm, Professor (c)* Regulr Expressions nd Finite Automt Compiltion Current focus "Bck end" Source code Tokens Syntx tree Mchine code chr dt[20]; int min() { flot x = 42.0; return 7;
More informationCS321 Languages and Compiler Design I. Winter 2012 Lecture 5
CS321 Lnguges nd Compiler Design I Winter 2012 Lecture 5 1 FINITE AUTOMATA A non-deterministic finite utomton (NFA) consists of: An input lphet Σ, e.g. Σ =,. A set of sttes S, e.g. S = {1, 3, 5, 7, 11,
More information6.2 Volumes of Revolution: The Disk Method
mth ppliction: volumes by disks: volume prt ii 6 6 Volumes of Revolution: The Disk Method One of the simplest pplictions of integrtion (Theorem 6) nd the ccumultion process is to determine so-clled volumes
More informationA HYDRAULIC SIMULATOR FOR AN EXCAVATOR
P-06 Proceedings of the 7th JFPS Interntionl Symposium on Fluid Power TOYAMA 008 September 5-8 008 A HYDRAULIC SIMULATOR FOR AN EXCAVATOR Soon-Kwng Kwon* Je-Jun Kim* Young-Mn Jung* Chn-Se Jung* Chng-Don
More informationDeposit a Technical Report in PubRep
Technicl in Lst Updte:19.12.016 Te c h n i c l Technicl s re mjor source of scientific informtion, prepred for institutionl nd wider distribution. They re considered grey literture since they re scientific
More informationAlignment of Long Sequences. BMI/CS Spring 2012 Colin Dewey
Alignment of Long Sequences BMI/CS 776 www.biostt.wisc.edu/bmi776/ Spring 2012 Colin Dewey cdewey@biostt.wisc.edu Gols for Lecture the key concepts to understnd re the following how lrge-scle lignment
More informationCSCI 3130: Formal Languages and Automata Theory Lecture 12 The Chinese University of Hong Kong, Fall 2011
CSCI 3130: Forml Lnguges nd utomt Theory Lecture 12 The Chinese University of Hong Kong, Fll 2011 ndrej Bogdnov In progrmming lnguges, uilding prse trees is significnt tsk ecuse prse trees tell us the
More informationUNIT 11. Query Optimization
UNIT Query Optimiztion Contents Introduction to Query Optimiztion 2 The Optimiztion Process: An Overview 3 Optimiztion in System R 4 Optimiztion in INGRES 5 Implementing the Join Opertors Wei-Png Yng,
More informationInternational Conference on Mechanics, Materials and Structural Engineering (ICMMSE 2016)
\ Interntionl Conference on Mechnics, Mterils nd tructurl Engineering (ICMME 2016) Reserch on the Method to Clibrte tructure Prmeters of Line tructured Light Vision ensor Mingng Niu1,, Kngnin Zho1, b,
More informationGENERATING ORTHOIMAGES FOR CLOSE-RANGE OBJECTS BY AUTOMATICALLY DETECTING BREAKLINES
GENEATING OTHOIMAGES FO CLOSE-ANGE OBJECTS BY AUTOMATICALLY DETECTING BEAKLINES Efstrtios Stylinidis 1, Lzros Sechidis 1, Petros Ptis 1, Spiros Sptls 2 Aristotle University of Thessloniki 1 Deprtment of
More informationCKX-CCSW Confluency checker INSTRUCTIONS. Software for research/education This software is designed to use in research and or education fields.
INSTRUCTIONS Confluency checker NOTE: This instruction mnul is for the Olympus confluency checker. To ensure the sfety, obtin optimum performnce nd to fmilirize yourself fully with the use of this softwre,
More informationMATH 25 CLASS 5 NOTES, SEP
MATH 25 CLASS 5 NOTES, SEP 30 2011 Contents 1. A brief diversion: reltively prime numbers 1 2. Lest common multiples 3 3. Finding ll solutions to x + by = c 4 Quick links to definitions/theorems Euclid
More informationECE 468/573 Midterm 1 September 28, 2012
ECE 468/573 Midterm 1 September 28, 2012 Nme:! Purdue emil:! Plese sign the following: I ffirm tht the nswers given on this test re mine nd mine lone. I did not receive help from ny person or mteril (other
More informationMcAfee Network Security Platform
Mnger Applince Quick Strt Guide Revision B McAfee Network Security Pltform This guide is high-level description of how to instll nd configure the Mnger Applince. For more detiled instlltion informtion,
More informationWhat are suffix trees?
Suffix Trees 1 Wht re suffix trees? Allow lgorithm designers to store very lrge mount of informtion out strings while still keeping within liner spce Allow users to serch for new strings in the originl
More informationMIPS I/O and Interrupt
MIPS I/O nd Interrupt Review Floting point instructions re crried out on seprte chip clled coprocessor 1 You hve to move dt to/from coprocessor 1 to do most common opertions such s printing, clling functions,
More informationA REINFORCEMENT LEARNING APPROACH TO SCHEDULING DUAL-ARMED CLUSTER TOOLS WITH TIME VARIATIONS
A REINFORCEMENT LEARNING APPROACH TO SCHEDULING DUAL-ARMED CLUSTER TOOLS WITH TIME VARIATIONS Ji-Eun Roh (), Te-Eog Lee (b) (),(b) Deprtment of Industril nd Systems Engineering, Kore Advnced Institute
More informationCS201 Discussion 10 DRAWTREE + TRIES
CS201 Discussion 10 DRAWTREE + TRIES DrwTree First instinct: recursion As very generic structure, we could tckle this problem s follows: drw(): Find the root drw(root) drw(root): Write the line for the
More informationReducing a DFA to a Minimal DFA
Lexicl Anlysis - Prt 4 Reducing DFA to Miniml DFA Input: DFA IN Assume DFA IN never gets stuck (dd ded stte if necessry) Output: DFA MIN An equivlent DFA with the minimum numer of sttes. Hrry H. Porter,
More informationMidterm 2 Sample solution
Nme: Instructions Midterm 2 Smple solution CMSC 430 Introduction to Compilers Fll 2012 November 28, 2012 This exm contins 9 pges, including this one. Mke sure you hve ll the pges. Write your nme on the
More informationEngineer To Engineer Note
Engineer To Engineer Note EE-188 Technicl Notes on using Anlog Devices' DSP components nd development tools Contct our technicl support by phone: (800) ANALOG-D or e-mil: dsp.support@nlog.com Or visit
More informationScalable extensible middleware framework for context-aware mobile applications (SCAMMP)
Sclble extensible middlewre frmework for context-wre mobile pplictions (SCAMMP) Hssn Sbeyti 1, Mohmd Mlli 1, Khlid Al-Tht 2, Ahmd Fdlllh 1, nd Mohmd Youssef 3 1 Fculty of Computer Studies, Arb Open University,
More informationVoIP for the Small Business
Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the
More informationA Fast Imaging Algorithm for Near Field SAR
Journl of Computing nd Electronic Informtion Mngement ISSN: 2413-1660 A Fst Imging Algorithm for Ner Field SAR Guoping Chen, Lin Zhng, * College of Optoelectronic Engineering, Chongqing University of Posts
More informationLooking up objects in Pastry
Review: Pstry routing tbles 0 1 2 3 4 7 8 9 b c d e f 0 1 2 3 4 7 8 9 b c d e f 0 1 2 3 4 7 8 9 b c d e f 0 2 3 4 7 8 9 b c d e f Row0 Row 1 Row 2 Row 3 Routing tble of node with ID i =1fc s - For ech
More informationVoIP for the Small Business
VoIP for the Smll Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become
More information05-247r2 SAT: Add 16-byte CDBs and PIO modes 1 September 2005
To: T10 Technicl Committee From: Robert Sheffield, Intel (robert.l.sheffield@intel.com) Dte: 1 September 2005 Subject: 05-247r2 SAT: Add 16-byte CDBs nd PIO modes Revision history Revision 0 (16 June 2005)
More informationDigital approximation to extended depth of field in no telecentric imaging systems
Journl of Physics: Conference Series Digitl pproximtion to extended depth of field in no telecentric imging systems To cite this rticle: J E Meneses nd C R Contrers 0 J Phys: Conf Ser 74 0040 View the
More informationCS143 Handout 07 Summer 2011 June 24 th, 2011 Written Set 1: Lexical Analysis
CS143 Hndout 07 Summer 2011 June 24 th, 2011 Written Set 1: Lexicl Anlysis In this first written ssignment, you'll get the chnce to ply round with the vrious constructions tht come up when doing lexicl
More informationGeometric transformations
Geometric trnsformtions Computer Grphics Some slides re bsed on Shy Shlom slides from TAU mn n n m m T A,,,,,, 2 1 2 22 12 1 21 11 Rows become columns nd columns become rows nm n n m m A,,,,,, 1 1 2 22
More informationFrom Dependencies to Evaluation Strategies
From Dependencies to Evlution Strtegies Possile strtegies: 1 let the user define the evlution order 2 utomtic strtegy sed on the dependencies: use locl dependencies to determine which ttriutes to compute
More informationToday. CS 188: Artificial Intelligence Fall Recap: Search. Example: Pancake Problem. Example: Pancake Problem. General Tree Search.
CS 88: Artificil Intelligence Fll 00 Lecture : A* Serch 9//00 A* Serch rph Serch Tody Heuristic Design Dn Klein UC Berkeley Multiple slides from Sturt Russell or Andrew Moore Recp: Serch Exmple: Pncke
More informationVoIP for the Small Business
Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the
More information