Automated Harvesting of Loss and Damage Information from Open Sources

Size: px
Start display at page:

Download "Automated Harvesting of Loss and Damage Information from Open Sources"

Transcription

1 Automated Harvesting of Loss and Damage Information from Open Sources Mao Kezhi School of Electrical and Electronic Engineering Nanyang Technological University 04 August 2017 Mao Kezhi (EEE-NTU) AKEOS 04 August / 17

2 Outline 1 Introduction 2 Automatic Knowledge Extraction from Open Sources 3 Outstanding Merits of AKEOS 4 Conclusion and Future Work Mao Kezhi (EEE-NTU) AKEOS 04 August / 17

3 Introduction (i) Harvesting Loss and Damage Information from Open Sources Events such as terrorism attack, earthquake, flood, typhoon etc often happen in the region or other part of the world; News agencies, big and small, have tens of thousands of journalists around the world, who publish their first-hand information of events online at the first time; Online news serves as a major source of information nowadays. (ii) Automated Harvesting Each news article may only report part of the facts of an event; Reading a large number of articles to get a comprehensive understanding of an event is laborious and time consuming; An automated system is desired to automatically extract key information of an events from the open sources. Mao Kezhi (EEE-NTU) AKEOS 04 August / 17

4 Architecture of AKEOS Mao Kezhi (EEE-NTU) AKEOS 04 August / 17

5 Automatic Knowledge Extraction from Open Sources (i) Input to the System The name of an event: for example, 2011 Tohoku earthquake, 2015 Paris attack; An image, for example Mao Kezhi (EEE-NTU) AKEOS 04 August / 17

6 (ii) Relevant Documents Search Scan websites of news agencies and governments etc; Crawl the text from the relevant web links. (iii) Knowledge Extraction Knowledge extraction outcome is the key information of an event; For example, 2011 Tohoku earthquake: Mao Kezhi (EEE-NTU) AKEOS 04 August / 17

7 (iv) Knowledge Visualization Knowledge graph of 2011 Tohoku earthquake Mao Kezhi (EEE-NTU) AKEOS 04 August / 17

8 (iv) Knowledge Visualization Knowledge graph of 2015 Nepal earthquake Mao Kezhi (EEE-NTU) AKEOS 04 August / 17

9 (iv) Knowledge Visualization Knowledge graph of 2015 Bangkok attack Mao Kezhi (EEE-NTU) AKEOS 04 August / 17

10 (iv) Knowledge Visualization Knowledge graph of 2016 Jakarta attack Mao Kezhi (EEE-NTU) AKEOS 04 August / 17

11 (iv) Knowledge Visualization Knowledge graph of 2015 Paris attack Mao Kezhi (EEE-NTU) AKEOS 04 August / 17

12 (v) Knowledge Base Generation Consolidate knowledge extracted the same type of events, for example, all earthquakes happened in the past; Store the consolidated knowledge in relational database; Perform query to the database to find, for example, earthquakes with magnitude higher than 7, earthquakes killing more than 1000, earthquakes in Japan between 2001 and 2017 etc; Explore relations between entities, for example, the relation between magnitude and tsunami etc; Discover hidden patterns. Mao Kezhi (EEE-NTU) AKEOS 04 August / 17

13 Automatic Knowledge Extraction from Open Sources (v) Knowledge Base Generation Knowledge base of earthquakes Mao Kezhi (EEE-NTU) AKEOS 04 August / 17

14 (vi) Bayesian Network Inference Engine Construction The knowledge base can used to construct Bayesian Network inference engine for predictive and diagnostic reasoning; This involves identification of causal relation between entities; This also involves conditional probability estimation based on the knowledge base. Mao Kezhi (EEE-NTU) AKEOS 04 August / 17

15 (vi) Bayesian Network Inference Engine Construction Bayesian network of earthquake Mao Kezhi (EEE-NTU) AKEOS 04 August / 17

16 Outstanding Merits of AKEOS (i) AKEOS is Task-independent Can be used to extract knowledge of any types of events; Automatically determine what key information to extract, without the need of human intervention. (ii) AKEOS has evolving learning capability Introduce a time dimension for developing events; Facts of an event update over time; Public attentions change overtime; Evolving learning makes the information extracted is up to date. (iii) AKEOS is an end-to-end system With query words as the input and inference engine as the end product Unstructured text converted to structure data for readily use of AI Mao Kezhi (EEE-NTU) AKEOS 04 August / 17

17 Conclusion and future work Conclusion AKEOS is a knowledge extraction system for general purpose; AKEOS has good accuracy. Future Work AKEOS can be tailored for automated harvesting of loss and damage information; Improved performance is expected. Mao Kezhi (EEE-NTU) AKEOS 04 August / 17

Risk-Aware Rapid Data Evacuation for Large- Scale Disasters in Optical Cloud Networks

Risk-Aware Rapid Data Evacuation for Large- Scale Disasters in Optical Cloud Networks Risk-Aware Rapid Data Evacuation for Large- Scale Disasters in Optical Cloud Networks Presenter: Yongcheng (Jeremy) Li PhD student, School of Electronic and Information Engineering, Soochow University,

More information

Technical Working Session on Profiling Equity Focused Information

Technical Working Session on Profiling Equity Focused Information Technical Working Session on Profiling Equity Focused Information Using to create, knowledge and wisdom (with a particular focus on meta) 23 26 June, 2015 UN ESCAP, Bangkok 24/06/2015 1 Aims 1. Outline

More information

TIM 50 - Business Information Systems

TIM 50 - Business Information Systems TIM 50 - Business Information Systems Lecture 15 UC Santa Cruz Nov 10, 2016 Class Announcements n Database Assignment 2 posted n Due 11/22 The Database Approach to Data Management The Final Database Design

More information

Recovery and Reconstruction. towards disaster resilient communities - from lessons learnt in Japan - 24 August 2004.

Recovery and Reconstruction. towards disaster resilient communities - from lessons learnt in Japan - 24 August 2004. Recovery and Reconstruction towards disaster resilient communities - from lessons learnt in Japan - 24 August 2004 Tadashi HARADA Deputy Director General for Disaster Management Cabinet Office, Government

More information

Next-generation IT Platforms Delivering New Value through Accumulation and Utilization of Big Data

Next-generation IT Platforms Delivering New Value through Accumulation and Utilization of Big Data Next-generation IT Platforms Delivering New Value through Accumulation and Utilization of Big Data 46 Next-generation IT Platforms Delivering New Value through Accumulation and Utilization of Big Data

More information

Promoting Disaster Reduction through Multi- National Cooperation in Asia region. ADRC Activities. Jun 2009 Asian Disaster Reduction Center (ADRC)

Promoting Disaster Reduction through Multi- National Cooperation in Asia region. ADRC Activities. Jun 2009 Asian Disaster Reduction Center (ADRC) Promoting Disaster Reduction through Multi- National Cooperation in Asia region ADRC Activities Jun 2009 Asian Disaster Reduction Center (ADRC) Overview of ADRC (as of April 2009) Type: International Organization

More information

Self-Guided Collaboration: A Technique to Coordinate Crisis Management Response for Homeland Defense

Self-Guided Collaboration: A Technique to Coordinate Crisis Management Response for Homeland Defense Self-Guided Collaboration: A Technique to Coordinate Crisis Management Response for Homeland Defense 9 th ICCRTS: Copenhagen, 2004 The Need for Coordinated Response 9/11 exposed key shortcomings Sharing

More information

Anti-Tsunami Measures in Asia Pacific Region

Anti-Tsunami Measures in Asia Pacific Region Anti-Tsunami Measures in Asia Pacific Region Yuko Morikawa Japan International Cooperation Agency, JICA Peru Office 16th August 2016 Sendai Framework for Disaster Risk Reduction(2015-2030) The

More information

Sequential Dependency and Reliability Analysis of Embedded Systems. Yu Jiang Tsinghua university, Beijing, China

Sequential Dependency and Reliability Analysis of Embedded Systems. Yu Jiang Tsinghua university, Beijing, China Sequential Dependency and Reliability Analysis of Embedded Systems Yu Jiang Tsinghua university, Beijing, China outline Motivation Background Reliability Block Diagram, Fault Tree Bayesian Network, Dynamic

More information

Annual Report Network for Crisis Management - Bangkok & Tokyo

Annual Report Network for Crisis Management - Bangkok & Tokyo Annual Report 2011 - Network for Crisis Management - Bangkok & Tokyo To share knowhow, technology and experience on crisis management The Framework of Network for Crisis Management 1. Asian Crisis Management

More information

Australia-Indonesia Facility for

Australia-Indonesia Facility for The Tenth ASEAN Regional Forum Inter-Sessional Meeting on Disaster Relief Australia-Indonesia Facility for Disaster Reduction Bangkok, 2-3 September, 2010 The Australia-Indonesia Who is the Facility Facility

More information

Maximizing the Value of STM Content through Semantic Enrichment. Frank Stumpf December 1, 2009

Maximizing the Value of STM Content through Semantic Enrichment. Frank Stumpf December 1, 2009 Maximizing the Value of STM Content through Semantic Enrichment Frank Stumpf December 1, 2009 What is Semantics and Semantic Processing? Content Knowledge Framework Technology Framework Search Text Images

More information

BIG DATA SCIENCE PROFESSIONAL Certification. Big Data Science Professional

BIG DATA SCIENCE PROFESSIONAL Certification. Big Data Science Professional BIG DATA SCIENCE PROFESSIONAL Certification Big Data Science Professional Big Data Science Professional (BDSCP) certifications are formal accreditations that prove proficiency in specific areas of Big

More information

TIM 50 - Business Information Systems

TIM 50 - Business Information Systems TIM 50 - Business Information Systems Lecture 15 UC Santa Cruz May 20, 2014 Announcements DB 2 Due Tuesday Next Week The Database Approach to Data Management Database: Collection of related files containing

More information

Overview of the Esri Disaster Response Program and Lessons Learned from Past Events. Jeff Baranyi

Overview of the Esri Disaster Response Program and Lessons Learned from Past Events. Jeff Baranyi Overview of the Esri Disaster Response Program and Lessons Learned from Past Events Jeff Baranyi Mission Statement The mission of the Esri Public Safety Assistance Program is to establish Esri as a good

More information

Data Stewardship Core by Maria C Villar and Dave Wells

Data Stewardship Core by Maria C Villar and Dave Wells Data Stewardship Core by Maria C Villar and Dave Wells All rights reserved. Reproduction in whole or part prohibited except by written permission. Product and company names mentioned herein may be trademarks

More information

BIG DATA SCIENTIST Certification. Big Data Scientist

BIG DATA SCIENTIST Certification. Big Data Scientist BIG DATA SCIENTIST Certification Big Data Scientist Big Data Science Professional (BDSCP) certifications are formal accreditations that prove proficiency in specific areas of Big Data. To obtain a certification,

More information

Chapter 6. Foundations of Business Intelligence: Databases and Information Management VIDEO CASES

Chapter 6. Foundations of Business Intelligence: Databases and Information Management VIDEO CASES Chapter 6 Foundations of Business Intelligence: Databases and Information Management VIDEO CASES Case 1a: City of Dubuque Uses Cloud Computing and Sensors to Build a Smarter, Sustainable City Case 1b:

More information

Cake and Grief Counseling Will be Available: Using Artificial Intelligence for Forensics Without Jeopardizing Humanity.

Cake and Grief Counseling Will be Available: Using Artificial Intelligence for Forensics Without Jeopardizing Humanity. Cake and Grief Counseling Will be Available: Using Artificial Intelligence for Forensics Without Jeopardizing Humanity Jesse Kornblum Outline Introduction Artificial Intelligence Spam Detection Clustering

More information

Application Layer in Science Data Systems:

Application Layer in Science Data Systems: Application Layer in Science Data Systems: Case Study of Digital Typhoon and 2011 Great Tohoku Earthquake Asanobu KITAMOTO National Institute of Informatics / JST http://agora.ex.nii.ac.jp/~kitamoto/ Introduction

More information

Mississippi Emergency Management Agency. Shawn Wise. Office Of Preparedness

Mississippi Emergency Management Agency. Shawn Wise. Office Of Preparedness Mississippi Emergency Management Agency Shawn Wise Mississippi Emergency Management Agency Office Of Preparedness All-Hazard Agency MEMA s Mission MEMA is a Coordinating Agency. State/Local Partnerships

More information

DISTRIBUTION A: Distribution approved for public release.

DISTRIBUTION A: Distribution approved for public release. AFRL-AFOSR-JP-TR-2017-0025 Fusion and Sense Making of Heterogeneous Sensor Network and Other Sources Zhongxiang Shen NANYANG TECHNOLOGICAL UNIVERSITY 03/16/2017 Final Report DISTRIBUTION A: Distribution

More information

Emergency Telecommunications as the ASP Regional Initiative

Emergency Telecommunications as the ASP Regional Initiative 0 Emergency Telecommunications as the ASP Regional Initiative Japan s International Contribution in the Field of ICT for Disaster Risk Reduction Mutsuharu NAKAJIMA Director for International Policy Coordination

More information

Need to access completely for Ebook PDF improving disaster management the role of it in

Need to access completely for Ebook PDF improving disaster management the role of it in Improving Disaster Management The Role Of It In Mitigation Preparedness Response And Recovery Author Committee On Using Information Technology To Enhance Disaster Management May 2007 IMPROVING DISASTER

More information

Cloud Computing and Communication

Cloud Computing and Communication IEEE ICC 2013 Industry & Business Panel Budapest, June 11, 2013 Cloud Computing and Communication ~ Introductory ~ Yasunori Mochizuki Vice President, Central Research Laboratories, NEC Corporation Page

More information

Analysis of Local Appearance-based Face Recognition on FRGC 2.0 Database

Analysis of Local Appearance-based Face Recognition on FRGC 2.0 Database Analysis of Local Appearance-based Face Recognition on FRGC 2.0 Database HAZIM KEMAL EKENEL (ISL),, Germany e- mail: ekenel@ira.uka.de web: http://isl.ira.uka.de/~ekenel/ http://isl.ira.uka.de/face_recognition/

More information

A TEXT MINER ANALYSIS TO COMPARE INTERNET AND MEDLINE INFORMATION ABOUT ALLERGY MEDICATIONS Chakib Battioui, University of Louisville, Louisville, KY

A TEXT MINER ANALYSIS TO COMPARE INTERNET AND MEDLINE INFORMATION ABOUT ALLERGY MEDICATIONS Chakib Battioui, University of Louisville, Louisville, KY Paper # DM08 A TEXT MINER ANALYSIS TO COMPARE INTERNET AND MEDLINE INFORMATION ABOUT ALLERGY MEDICATIONS Chakib Battioui, University of Louisville, Louisville, KY ABSTRACT Recently, the internet has become

More information

Using Information and Communications Technology (ICT) for Disaster Preparedness and Response

Using Information and Communications Technology (ICT) for Disaster Preparedness and Response Using Information and Communications Technology (ICT) for Disaster Preparedness and Response Feasibility Study of Restoring Connectivity through the use of the Movable and Deployable ICT Resource Unit

More information

A Government Health Agency Trusts Tenable to Protect Patient Data and Manage Expanding Attack Surface

A Government Health Agency Trusts Tenable to Protect Patient Data and Manage Expanding Attack Surface A Government Health Agency Trusts Tenable to Protect Patient Data and Manage Expanding Attack Surface ORGANIZATION SNAPSHOT The level of visibility Tenable.io provides is phenomenal, something we just

More information

Threat and Hazard Identification and Risk Assessment (THIRA) In Progress Review (IPR) July 2012

Threat and Hazard Identification and Risk Assessment (THIRA) In Progress Review (IPR) July 2012 Threat and Hazard Identification and Risk Assessment (THIRA) In Progress Review (IPR) 2 13 July 2012 1 Roll Call Region A Region B Region C Region D Region E Region F Region G Region H Region I STL UASI

More information

Data Management Glossary

Data Management Glossary Data Management Glossary A Access path: The route through a system by which data is found, accessed and retrieved Agile methodology: An approach to software development which takes incremental, iterative

More information

Development of an Ontology-Based Portal for Digital Archive Services

Development of an Ontology-Based Portal for Digital Archive Services Development of an Ontology-Based Portal for Digital Archive Services Ching-Long Yeh Department of Computer Science and Engineering Tatung University 40 Chungshan N. Rd. 3rd Sec. Taipei, 104, Taiwan chingyeh@cse.ttu.edu.tw

More information

Overview of Web Mining Techniques and its Application towards Web

Overview of Web Mining Techniques and its Application towards Web Overview of Web Mining Techniques and its Application towards Web *Prof.Pooja Mehta Abstract The World Wide Web (WWW) acts as an interactive and popular way to transfer information. Due to the enormous

More information

Earthquake Early Warning

Earthquake Early Warning Earthquake Early Warning 1 CISN California Integrated Seismic Network 2000 seismic station sites Seismic networks Information products Real-time/rapid products Detections, locations, magnitudes ShakeMaps

More information

VAT/GST Analytics by Deloitte User Guide August 2017

VAT/GST Analytics by Deloitte User Guide August 2017 VAT/GST Analytics by Deloitte User Guide August 2017 Contents What is VAT/GST Analytics? What is Qlik Sense? The Associative Model How to access Qlik Sense? Navigate through Qlik Sense A quick overview

More information

Signed on December 22 nd, 2015 MINISTRY OF INDUSTRY MINISTRY OF ECONOMY, TRADE AND INDUSTRY

Signed on December 22 nd, 2015 MINISTRY OF INDUSTRY MINISTRY OF ECONOMY, TRADE AND INDUSTRY MEMORANDUM OF COOPERATION BETWEEN THE MINISTRY OF ECONOMY, TRADE AND INDUSTRY OF JAPAN AND THE DEPARTMENT OF INDUSTRIAL WORKS, MINISTRY OF INDUSTRY OF THAILAND ON STRENGTHENING THE RISK-BASED CHEMICAL

More information

Powering Knowledge Discovery. Insights from big data with Linguamatics I2E

Powering Knowledge Discovery. Insights from big data with Linguamatics I2E Powering Knowledge Discovery Insights from big data with Linguamatics I2E Gain actionable insights from unstructured data The world now generates an overwhelming amount of data, most of it written in natural

More information

Competitive Analysis. Version 1.0. February 2017

Competitive Analysis. Version 1.0. February 2017 Competitive Analysis Version 1.0 February 2017 WWW.SOLIDASYSTEMS.COM Introduction This document discusses competitive advantages between Systems security appliances and other security solutions in the

More information

Ferdinand Kayser President and CEO, SES ASTRA S.A. 29th April French Senate Civil Protection

Ferdinand Kayser President and CEO, SES ASTRA S.A. 29th April French Senate Civil Protection Ferdinand Kayser President and CEO, SES ASTRA S.A. 29th April French Senate Civil Protection SES GLOBAL Group Structure 100.0% 100.0% North America Europe 28.7% 19.9% Latin America 75.0% 34.1% Nordic Area

More information

A Database Driven Initial Ontology for Crisis, Tragedy, and Recovery

A Database Driven Initial Ontology for Crisis, Tragedy, and Recovery A Database Driven Initial Ontology for Crisis, Tragedy, and Recovery ABSTRACT Many databases and supporting software have been developed to track the occurrences of natural disasters, manmade disasters,

More information

White Paper: Next generation disaster data infrastructure CODATA LODGD Task Group 2017

White Paper: Next generation disaster data infrastructure CODATA LODGD Task Group 2017 White Paper: Next generation disaster data infrastructure CODATA LODGD Task Group 2017 Call for Authors This call for authors seeks contributions from academics and scientists who are in the fields of

More information

Outcomes of the Sendai Framework of Disaster Risk Reduction and the 3rd World Conference on Disaster Risk Reduction

Outcomes of the Sendai Framework of Disaster Risk Reduction and the 3rd World Conference on Disaster Risk Reduction Outcomes of the Sendai Framework of Disaster Risk Reduction and the 3rd World Conference on Disaster Risk Reduction Kiyoshi NATORI Executive Director of Asian Disaster Reduction Center The Third UN World

More information

Sentinel Asia Evolution

Sentinel Asia Evolution Sentinel Asia Evolution 1st JPTM for Sentinel Asia Step3 27 29 November 2013 Kazuya Kaku Kk JPT Secretariat JapanAerospace Exploration Agency Background Frequent catastrophic disasters, e.g. recent Typhoon

More information

Massive Scalability With InterSystems IRIS Data Platform

Massive Scalability With InterSystems IRIS Data Platform Massive Scalability With InterSystems IRIS Data Platform Introduction Faced with the enormous and ever-growing amounts of data being generated in the world today, software architects need to pay special

More information

DSM GENERATION FROM STEREOSCOPIC IMAGERY FOR DAMAGE MAPPING, APPLICATION ON THE TOHOKU TSUNAMI

DSM GENERATION FROM STEREOSCOPIC IMAGERY FOR DAMAGE MAPPING, APPLICATION ON THE TOHOKU TSUNAMI DSM GENERATION FROM STEREOSCOPIC IMAGERY FOR DAMAGE MAPPING, APPLICATION ON THE TOHOKU TSUNAMI Cyrielle Guérin, Renaud Binet, Marc Pierrot-Deseilligny To cite this version: Cyrielle Guérin, Renaud Binet,

More information

TX360 Use Cases And Case Studies

TX360 Use Cases And Case Studies SWAN ISLAND NETWORKS EXAMPLES TX60 Use Cases And Case Studies 205 Swan Island Networks, Inc. Introduction For over a decade, Swan Island Networks has been providing innovative threat intelligence and situational

More information

Overview. Introduction. Damage Assessment Process Questions objective Data Collection Data Examination Analysis Reporting. Case Study.

Overview. Introduction. Damage Assessment Process Questions objective Data Collection Data Examination Analysis Reporting. Case Study. Alexis Kwasinski Field Damage Assessments as a Design Tool for Information and Communications Technology Systems that are Resilient to Natural Disasters Overview Introduction Damage Assessment Process

More information

Implementation and Future Plans for Global IoT Maintenance System

Implementation and Future Plans for Global IoT Maintenance System FEATURED ARTICLES Public and Social Infrastructure for Safe and Pleasant Cities Implementation and Future Plans for Global IoT System There is an accelerating global trend, especially in industry, for

More information

Making your agency s sites more accessible to web search engine users. Implementing the Sitemap protocol

Making your agency s sites more accessible to web search engine users. Implementing the Sitemap protocol Making your agency s sites more accessible to web search engine users Implementing the Sitemap protocol Agenda Common barriers to web search engine crawling Supporting the two levels of search The Sitemap

More information

Post Emergency Transition to Recovery

Post Emergency Transition to Recovery Post Emergency Transition to Recovery The National Academy of Sciences Beebe Symposium Washington, DC May 13, 2014 Gerilee W. Bennett National Disaster Recovery Planning Division National Nuclear/Radiological

More information

Breaking down information silos to improve GSOC efficiency and effectiveness

Breaking down information silos to improve GSOC efficiency and effectiveness Breaking down information silos to improve GSOC efficiency and effectiveness Microsoft s Global Security Operations teams adopted Visual Command Center from IDV Solutions, an Everbridge company, to reduce

More information

Master Data Management And Data Governance 2 E

Master Data Management And Data Governance 2 E We have made it easy for you to find a PDF Ebooks without any digging. And by having access to our ebooks online or by storing it on your computer, you have convenient answers with master data management

More information

Observation by the Internet Fixed-Point Monitoring System (TALOT2) for November 2011

Observation by the Internet Fixed-Point Monitoring System (TALOT2) for November 2011 Observation by the Internet Fixed-Point Monitoring System (TALOT2) for November 2011 Attachment 3 1. To General Internet Users According to the Internet Fixed-Point Monitoring System (TALOT2), 86,568 unwanted

More information

Obtaining Rough Set Approximation using MapReduce Technique in Data Mining

Obtaining Rough Set Approximation using MapReduce Technique in Data Mining Obtaining Rough Set Approximation using MapReduce Technique in Data Mining Varda Dhande 1, Dr. B. K. Sarkar 2 1 M.E II yr student, Dept of Computer Engg, P.V.P.I.T Collage of Engineering Pune, Maharashtra,

More information

Advantages Of Electronic Word Processing Over Manual Word Processing

Advantages Of Electronic Word Processing Over Manual Word Processing Advantages Of Electronic Word Processing Over Manual Word Processing 2 advantages of using a word processing package over a hand writing a document? What are the advantages of computer processing over

More information

New Madrid Earthquake Catastrophic Planning Project Overview

New Madrid Earthquake Catastrophic Planning Project Overview New Madrid Earthquake Catastrophic Planning Project Overview Presented by: Jim Wilkinson Executive Director, CUSEC Derek Estes Acting Chief, FEMA Catastrophic Disaster Planning Branch EIIP - EMForum.org

More information

AHA CENTRE. ASEAN Coordinating Centre for Humanitarian Assistance on Disaster Management

AHA CENTRE. ASEAN Coordinating Centre for Humanitarian Assistance on Disaster Management Geo-referenced Information and Application @ Presented at : Regional Workshop on Geo-referenced Disaster Risk Management Information System for South-East and East Asia, and the Pacific Bangkok 20-22 February

More information

Search Engines. Charles Severance

Search Engines. Charles Severance Search Engines Charles Severance Google Architecture Web Crawling Index Building Searching http://infolab.stanford.edu/~backrub/google.html Google Search Google I/O '08 Keynote by Marissa Mayer Usablity

More information

How and Why have millions of sites been already IPv6 ready? - IPv6 Deployment Status Report in Japan Takashi Arano Intec Netcore, Inc.

How and Why have millions of sites been already IPv6 ready? - IPv6 Deployment Status Report in Japan Takashi Arano Intec Netcore, Inc. IPv6 Summit in China 2007 How and Why have millions of sites been already IPv6 ready? - IPv6 Deployment Status Report in Japan - 2007.4.13 Takashi Arano Intec Netcore, Inc. 1 Telecom Carriers have started

More information

Record Linkage using Probabilistic Methods and Data Mining Techniques

Record Linkage using Probabilistic Methods and Data Mining Techniques Doi:10.5901/mjss.2017.v8n3p203 Abstract Record Linkage using Probabilistic Methods and Data Mining Techniques Ogerta Elezaj Faculty of Economy, University of Tirana Gloria Tuxhari Faculty of Economy, University

More information

Disaster Information Management System and ASEAN wide-range cooperation with ICT

Disaster Information Management System and ASEAN wide-range cooperation with ICT Prepared for the seminar for 総務省 ITU 災害通信シンポジウム Disaster Information Management System and ASEAN wide-range cooperation with ICT Takeshi Nakamura Member, Study Group on ICT for Disaster Management, Japan-ASEAN

More information

IS4H TOOLKIT TOOL: Workshop on Developing a National ehealth Strategy (Workshop Template)

IS4H TOOLKIT TOOL: Workshop on Developing a National ehealth Strategy (Workshop Template) IS4H TOOLKIT TOOL: Workshop on Developing a National ehealth Strategy (Workshop Template) Department of Evidence and Intelligence for Action in Health PAHO/WHO Workshop on Developing a National ehealth

More information

Information Management Platform Release Date Version Highlights compared to previous version

Information Management Platform Release Date Version Highlights compared to previous version For over 30 years ZyLAB has been working with professionals in the litigation, auditing, security and intelligence communities to develop the best solutions for investigating and managing large sets of

More information

Breaking down information silos to improve GSOC efficiency and effectiveness

Breaking down information silos to improve GSOC efficiency and effectiveness Breaking down information silos to improve GSOC efficiency and effectiveness Microsoft s Global Security Operations teams adopted Visual Command Center from IDV Solutions, an Everbridge company, to reduce

More information

GENERIC CONTROL SYSTEM ARCHITECTURE FOR CRITICAL INFRASTRUCTURE PROTECTION

GENERIC CONTROL SYSTEM ARCHITECTURE FOR CRITICAL INFRASTRUCTURE PROTECTION GENERIC CONTROL SYSTEM ARCHITECTURE FOR CRITICAL INFRASTRUCTURE PROTECTION Hrvoje Sagrak 1 Introduction In an interconnected world that we live in, protection of our societies and values relies highly

More information

End-to-End data mining feature integration, transformation and selection with Datameer Datameer, Inc. All rights reserved.

End-to-End data mining feature integration, transformation and selection with Datameer Datameer, Inc. All rights reserved. End-to-End data mining feature integration, transformation and selection with Datameer Fastest time to Insights Rapid Data Integration Zero coding data integration Wizard-led data integration & No ETL

More information

Introduction to Data Mining and Data Analytics

Introduction to Data Mining and Data Analytics 1/28/2016 MIST.7060 Data Analytics 1 Introduction to Data Mining and Data Analytics What Are Data Mining and Data Analytics? Data mining is the process of discovering hidden patterns in data, where Patterns

More information

ITU FRAMEWORK FOR COOPERATION IN EMERGENCIES

ITU FRAMEWORK FOR COOPERATION IN EMERGENCIES ITU FRAMEWORK FOR COOPERATION IN EMERGENCIES 1. Overview and Background In 2005 (10-14 January), the United Nations organized the International Meeting to Review the Implementation of the Programme of

More information

DISASTER RISK REDUCTION AND MANAGEMENT USING ICT

DISASTER RISK REDUCTION AND MANAGEMENT USING ICT DISASTER RISK REDUCTION AND MANAGEMENT USING ICT Presented by: Paolo Jonas Alan Information and Communications Technology Division Office of Civil Defense Scope of Presentation I. THE PHILIPPINE DISASTER

More information

Information Management Fundamentals by Dave Wells

Information Management Fundamentals by Dave Wells Information Management Fundamentals by Dave Wells All rights reserved. Reproduction in whole or part prohibited except by written permission. Product and company names mentioned herein may be trademarks

More information

Management Information Systems MANAGING THE DIGITAL FIRM, 12 TH EDITION FOUNDATIONS OF BUSINESS INTELLIGENCE: DATABASES AND INFORMATION MANAGEMENT

Management Information Systems MANAGING THE DIGITAL FIRM, 12 TH EDITION FOUNDATIONS OF BUSINESS INTELLIGENCE: DATABASES AND INFORMATION MANAGEMENT MANAGING THE DIGITAL FIRM, 12 TH EDITION Chapter 6 FOUNDATIONS OF BUSINESS INTELLIGENCE: DATABASES AND INFORMATION MANAGEMENT VIDEO CASES Case 1: Maruti Suzuki Business Intelligence and Enterprise Databases

More information

Education & Training. B. 3. Education & Training. Stefan Heuer / Managing Director TÜV Rheinland Thailand.

Education & Training. B. 3. Education & Training. Stefan Heuer / Managing Director TÜV Rheinland Thailand. Education & Training Stefan Heuer / Managing Director TÜV Rheinland Thailand stefan.heuer@tha.tuv.com 1 Awareness Preparedness Action & Reaction 2 Awareness - education of all related parties (government,

More information

Report on Progress at the Center for Engineering Strong Motion Data (CESMD)

Report on Progress at the Center for Engineering Strong Motion Data (CESMD) Report on Progress at the Center for Engineering Strong Motion Data (CESMD) H. Haddadi, A. Shakal, M. Huang & J. Parrish California Geological Survey, USA C. Stephens, W. Savage & W. Leith U. S. Geological

More information

DHS Automated Information Sharing (AIS) Program

DHS Automated Information Sharing (AIS) Program DHS Automated Information Sharing (AIS) Program 2018 Infoblox Inc. All rights reserved. Page 1 of 5 2018 Infoblox Inc. All rights reserved. DHS Automated Information Sharing (AIS) Program Infoblox AIS

More information

ABOUT THE EVENT. Using ICT for Effective Disaster Management: Caribbean Forum 2006, July 2006, Ocho Rios, Jamaica

ABOUT THE EVENT. Using ICT for Effective Disaster Management: Caribbean Forum 2006, July 2006, Ocho Rios, Jamaica ABOUT THE EVENT 1. Background Increasingly, natural disasters are causing considerable loss of life and disrupting national economies, severely weakening the affected countries. While neither natural nor

More information

Knowledge-based Decision Making for Simulating Cyber Attack Behaviors

Knowledge-based Decision Making for Simulating Cyber Attack Behaviors Knowledge-based Decision Making for Simulating Cyber Attack Behaviors Stephen Moskal (sfm5015@rit.edu) Dr. Michael Kuhl, Dr. Shanchieh Jay Yang Rochester Institute of Technology Department of Computer

More information

Utilizing Terrorism Early Warning Groups to Meet the National Preparedness Goal. Ed Reed Matthew G. Devost Neal Pollard

Utilizing Terrorism Early Warning Groups to Meet the National Preparedness Goal. Ed Reed Matthew G. Devost Neal Pollard Utilizing Terrorism Early Warning Groups to Meet the National Preparedness Goal Ed Reed Matthew G. Devost Neal Pollard May 11, 2005 Vision The Terrorism Early Warning Group concept fulfills the intelligence

More information

Resolution: Advancing the National Preparedness for Cyber Security

Resolution: Advancing the National Preparedness for Cyber Security Government Resolution No. 2444 of February 15, 2015 33 rd Government of Israel Benjamin Netanyahu Resolution: Advancing the National Preparedness for Cyber Security It is hereby resolved: Further to Government

More information

Enterprise Situational Intelligence

Enterprise Situational Intelligence DATA SHEET Enterprise Situational Intelligence You can attain a real-time, authoritative view of your network infrastructure using Lumeta ESI. Running in an always-on mode, ESI delivers network indexing,

More information

WHITE PAPER. Operationalizing Threat Intelligence Data: The Problems of Relevance and Scale

WHITE PAPER. Operationalizing Threat Intelligence Data: The Problems of Relevance and Scale WHITE PAPER Operationalizing Threat Intelligence Data: The Problems of Relevance and Scale Operationalizing Threat Intelligence Data: The Problems of Relevance and Scale One key number that is generally

More information

Free Download BitDefender Client Security 1 Year 50 PCs softwares download ]

Free Download BitDefender Client Security 1 Year 50 PCs softwares download ] Free Download BitDefender Client Security 1 Year 50 PCs softwares download ] Description: The foundation of business security The security requirements for any new or existing company no matter how large

More information

Taming Structured And Unstructured Data With SAP HANA Running On VCE Vblock Systems

Taming Structured And Unstructured Data With SAP HANA Running On VCE Vblock Systems 1 Taming Structured And Unstructured Data With SAP HANA Running On VCE Vblock Systems The Defacto Choice For Convergence 2 ABSTRACT & SPEAKER BIO Dealing with enormous data growth is a key challenge for

More information

The Root Cause of Unstructured Data Problems is Not What You Think

The Root Cause of Unstructured Data Problems is Not What You Think The Root Cause of Unstructured Data Problems is Not What You Think PRESENTATION TITLE GOES HERE Bruce Thompson, CEO Action Information Systems www.expeditefile.com What is this presentation all about?

More information

Supporting Customer Growth Strategies by Anticipating Market Change End-to-end Optimization of Value Chains

Supporting Customer Growth Strategies by Anticipating Market Change End-to-end Optimization of Value Chains Concept Supporting Customer Growth Strategies by Anticipating Market Change End-to-end Optimization of Value Chains Changes in economic and social conditions, which include the growing diversity of consumer

More information

Earthquake Early Warning based on smartphones

Earthquake Early Warning based on smartphones Earthquake Early Warning based on smartphones Earthquake Early Warning (EEW) systems involve very high Capex. Therefore, EEW systems have been installed in a very limited number of regions. Applying crowdsourcing

More information

Metadata Topic Harmonization and Semantic Search for Linked-Data-Driven Geoportals -- A Case Study Using ArcGIS Online

Metadata Topic Harmonization and Semantic Search for Linked-Data-Driven Geoportals -- A Case Study Using ArcGIS Online Metadata Topic Harmonization and Semantic Search for Linked-Data-Driven Geoportals -- A Case Study Using ArcGIS Online Yingjie Hu 1, Krzysztof Janowicz 1, Sathya Prasad 2, and Song Gao 1 1 STKO Lab, Department

More information

Unique Phishing Attacks (2008 vs in thousands)

Unique Phishing Attacks (2008 vs in thousands) The process of attempting to acquire sensitive information, such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication. In the 2 nd half

More information

A Level ICT Transition Pack

A Level ICT Transition Pack Sawtry Village Academy Extended Certificate Level 3 in IT- Single Award Diploma Level 3 in IT Double Award A Level ICT Transition Pack A Level ICT- Skills for the real business world In today s world,

More information

Cybersecurity: Incident Response Short

Cybersecurity: Incident Response Short Cybersecurity: Incident Response Short August 2017 Center for Development of Security Excellence Contents Lesson 1: Incident Response 1-1 Introduction 1-1 Incident Definition 1-1 Incident Response Capability

More information

A general framework for critical infrastructure interdependencies modeling using economic input-output model and network analysis

A general framework for critical infrastructure interdependencies modeling using economic input-output model and network analysis A general framework for critical infrastructure interdependencies modeling using economic input-output model and network analysis Jiwei LIN Institute of Catastrophe Risk Management, Interdisciplinary Graduate

More information

Mobile Wireless Sensor Network enables convergence of ubiquitous sensor services

Mobile Wireless Sensor Network enables convergence of ubiquitous sensor services 1 2005 Nokia V1-Filename.ppt / yyyy-mm-dd / Initials Mobile Wireless Sensor Network enables convergence of ubiquitous sensor services Dr. Jian Ma, Principal Scientist Nokia Research Center, Beijing 2 2005

More information

3-5 December 2018, WMO Headquarters, Geneva, Switzerland (Salle C1)

3-5 December 2018, WMO Headquarters, Geneva, Switzerland (Salle C1) WMO Consultation Workshop on the Provision of Meteorological, Hydrological and Climate Information Products and Services to United Nations and other Humanitarian Agencies 3-5 December 2018, WMO Headquarters,

More information

Vulnerability Analysis of information systems (Modeling of interaction between information systems and social infrastructures)

Vulnerability Analysis of information systems (Modeling of interaction between information systems and social infrastructures) Vulnerability Analysis of information systems (Modeling of interaction between information systems and social infrastructures) Ichiro Murase Team Leader of Security Technology Team, Information Technology

More information

GC-APWG Global Changing Asian-Pacific Wide Grid. Dr. Guoqing Li, CEODE/CAS 25,May,2008 UN GAID E-SDDC, Shanghai

GC-APWG Global Changing Asian-Pacific Wide Grid. Dr. Guoqing Li, CEODE/CAS 25,May,2008 UN GAID E-SDDC, Shanghai GC-APWG Global Changing Asian-Pacific Wide Grid Dr. Guoqing Li, CEODE/CAS 25,May,2008 UN GAID E-SDDC, Shanghai What will be demonstrated about GC-APWG? Background Target Technical Architecture Team structure

More information

Improving Domain Names Utilization

Improving Domain Names Utilization Improving Domain Names Utilization Ning Kong June 27, 2017 Content Status Quo of Chinese Phishing Websites Anti-Phishing Alliance of China (APAC) Suggestions for Improving Domain Names Utilization Q &

More information

Case Study: InaSAFE for Disaster Risk Assessment in South Sulawesi

Case Study: InaSAFE for Disaster Risk Assessment in South Sulawesi Case Study: InaSAFE for Disaster Risk Assessment in South Sulawesi Background From April to June 2015, the Australia Indonesia Facility for Disaster Reduction (AIFDR) and Humanitarian OpenStreetMap Team

More information

BSC Smart Cities Initiative

BSC Smart Cities Initiative www.bsc.es BSC Smart Cities Initiative José Mª Cela CASE Director josem.cela@bsc.es CITY DATA ACCESS 2 City Data Access 1. Standardize data access (City Semantics) Define a software layer to keep independent

More information

New York Department of Financial Services Cybersecurity Regulation Compliance and Certification Deadlines

New York Department of Financial Services Cybersecurity Regulation Compliance and Certification Deadlines New York Department of Financial Services Cybersecurity Regulation Compliance and Certification Deadlines New York Department of Financial Services ( DFS ) Regulation 23 NYCRR 500 requires that entities

More information

A Survey Of Different Text Mining Techniques Varsha C. Pande 1 and Dr. A.S. Khandelwal 2

A Survey Of Different Text Mining Techniques Varsha C. Pande 1 and Dr. A.S. Khandelwal 2 A Survey Of Different Text Mining Techniques Varsha C. Pande 1 and Dr. A.S. Khandelwal 2 1 Department of Electronics & Comp. Sc, RTMNU, Nagpur, India 2 Department of Computer Science, Hislop College, Nagpur,

More information

Development of the framework for disaster mitigating information sharing platform and its application to a local government

Development of the framework for disaster mitigating information sharing platform and its application to a local government Risk Analysis VI 433 Development of the framework for disaster mitigating information sharing platform and its application to a local government T. Suzuki 1 & Y. Hada 2 1 Interdiciplinary Graduate School

More information