Information Extraction. CS6200 Information Retrieval (and a sort of advertisement for NLP in the spring)
|
|
- Peregrine Walker
- 5 years ago
- Views:
Transcription
1 Information Extraction CS6200 Information Retrieval (and a sort of advertisement for NLP in the spring) 1
2 Informa(on Extrac(on Automa(cally extract structure from text annotate document using tags to iden(fy extracted structure We ve briefly men(oned one example But part of speech tagging is so low- level it usually doesn t count as IE Named en(ty recogni(on iden(fy words that refer to something of interest in a par(cular applica(on e.g., people, companies, loca(ons, dates, product names, prices, etc. 2
3 Named En(ty Recogni(on Example showing seman(c annota(on of text using XML tags Informa(on extrac(on also includes document structure and more complex features such as rela(onships and events 3
4 Named Entity Recognition The Persian learned men say that the Phoenicians came to our seas from the so-called Red Sea, and having settled in the country which they still occupy, at once began to make long voyages. Among other places to which they carried Egyptian and Assyrian merchandise, they came to Argos, which was at that time preeminent in every way among the people of what is now called Hellas. The Phoenicians came to Argos, and set out their cargo. On the fifth or sixth day after their arrival, when their wares were almost all sold, many women came to the shore and among them especially the daughter of the king, whose name was Io (according to Persians and Greeks alike), the daughter of Inachus. As these stood about the stern of the ship bargaining for the wares they liked, the Phoenicians incited one another to set upon them. Most of the women escaped: Io and others were seized and thrown into the ship, which then sailed away for Egypt. 4
5 Named Entity Recognition The Persian learned men say that the Phoenicians came to our seas from the so-called Red Sea, and having settled in the country which they still occupy, at once began to make long voyages. Among other places to which they carried Egyptian and Assyrian merchandise, they came to Argos, which was at that time preeminent in every way among the people of what is now called Hellas. The Phoenicians came to Argos, and set out their cargo. On the fifth or sixth day after their arrival, when their wares were almost all sold, many women came to the shore and among them especially the daughter of the king, whose name was Io (according to Persians and Greeks alike), the daughter of Inachus. As these stood about the stern of the ship bargaining for the wares they liked, the Phoenicians incited one another to set upon them. Most of the women escaped: Io and others were seized and thrown into the ship, which then sailed away for Egypt. Person 5
6 Named Entity Recognition The Persian learned men say that the Phoenicians came to our seas from the so-called Red Sea, and having settled in the country which they still occupy, at once began to make long voyages. Among other places to which they carried Egyptian and Assyrian merchandise, they came to Argos, which was at that time preeminent in every way among the people of what is now called Hellas. The Phoenicians came to Argos, and set out their cargo. On the fifth or sixth day after their arrival, when their wares were almost all sold, many women came to the shore and among them especially the daughter of the king, whose name was Io (according to Persians and Greeks alike), the daughter of Inachus. As these stood about the stern of the ship bargaining for the wares they liked, the Phoenicians incited one another to set upon them. Most of the women escaped: Io and others were seized and thrown into the ship, which then sailed away for Egypt. Person Location 6
7 Named Entity Recognition The Persian learned men say that the Phoenicians came to our seas from the so-called Red Sea, and having settled in the country which they still occupy, at once began to make long voyages. Among other places to which they carried Egyptian and Assyrian merchandise, they came to Argos, which was at that time preeminent in every way among the people of what is now called Hellas. The Phoenicians came to Argos, and set out their cargo. On the fifth or sixth day after their arrival, when their wares were almost all sold, many women came to the shore and among them especially the daughter of the king, whose name was Io (according to Persians and Greeks alike), the daughter of Inachus. As these stood about the stern of the ship bargaining for the wares they liked, the Phoenicians incited one another to set upon them. Most of the women escaped: Io and others were seized and thrown into the ship, which then sailed away for Egypt. Person Location Ethnic 7
8 Named Entity Recognition The Persian learned men say that the Phoenicians came to our seas from the so-called Red Sea, and having settled in the country which they still occupy, at once began to make long voyages. Among other places to which they carried Egyptian and Assyrian merchandise, they came to Argos, which was at that time preeminent in every way among the people of what is now called Hellas. The Phoenicians came to Argos, and set out their cargo. On the fifth or sixth day after their arrival, when their wares were almost all sold, many women came to the shore and among them especially the daughter of the king, whose name was Io (according to Persians and Greeks alike), the daughter of Inachus. As these stood about the stern of the ship bargaining for the wares they liked, the Phoenicians incited one another to set upon them. Most of the women escaped: Io and others were seized and thrown into the ship, which then sailed away for Egypt. Classes could also be, e.g., Wikipedia articles Person Location Ethnic 7
9 8
10 8
11 8
12 Named Entity Recognition Rule-based Uses lexicons (lists of words and phrases) that categorize names e.g., locations, peoples names, organizations, etc. Rules also used to verify or find new entity names e.g., <number> <word> street for addresses <street address>, <city> or in <city> to verify city names <street address>, <city>, <state> to find new cities <title> <name> to find new names 9
13 Named Entity Recognition Rules either developed manually by trial and error or using machine learning techniques Statistical uses a probabilistic model of the words in and around an entity probabilities estimated using training data (manually annotated text) Hidden Markov Model (HMM) is one approach Conditional Random Fields: similar structure, often higher accuracy, more expensive to train 10
14 HMM for Extraction Resolve ambiguity in a word using context e.g., marathon is a location or a sporting event, boston marathon is a specific sporting event Model context using a generative model of the sequence of words Markov property: the next word in a sequence depends only on a small number of the previous words 11
15 HMM for Extraction Markov Model describes a process as a collection of states with transitions between them each transition has a probability associated with it next state depends only on current state and transition probabilities Hidden Markov Model each state has a set of possible outputs outputs have probabilities 12
16 HMM Sentence Model Each state is associated with a probability distribu(on over words (the output) 13
17 NER as Sequence Tagging The Phoenicians came from the Red Sea 14 14
18 NER as Sequence Tagging O B-E O O O B-L I-L The Phoenicians came from the Red Sea 14 14
19 Sequence Tagging Fed raises interest rates 15 15
20 Sequence Tagging NN NNS NNP VB VBZ Fed raises interest rates 15 15
21 Sequence Tagging NN NNS NNP VB VBZ Fed raises interest rates 15 15
22 Sequence Tagging NN NNS NNP VB VBZ Fed raises interest rates 15 15
23 Sequence Tagging NN NNS NNP VB VBZ Fed raises interest rates 16 16
24 Sequence Tagging NN NNS NNP VB VBZ Fed raises interest rates 16 16
25 Sequence Tagging NN NNS NNP VB VBZ Fed raises interest rates 17 17
26 Sequence Tagging NN NNS NNP VB VBZ Fed raises interest rates 17 17
27 Sequence Tagging NN NNS NNP VB VBZ T n = 5 4 = 625 possible paths! Fed raises interest rates 17 17
28 Sequence Tagging Efficient (linear time) Shortest path = Viterbi algorithm NN NNS NNP VB VBZ T n = 5 4 = 625 possible paths! Fed raises interest rates 17 17
29 Sequence Tagging Efficient (linear time) Shortest path = Viterbi algorithm NN NNS NNP VB VBZ T n = 5 4 = 625 possible paths! Fed raises interest rates Can we specify that Fed always has the same tag in this document? 17 17
30 NER as Sequence Tagging The Phoenicians came from the Red Sea 18 18
31 NER as Sequence Tagging O B-E O O O B-L I-L The Phoenicians came from the Red Sea 18 18
32 NER as Sequence Tagging Capitalized word O B-E O O O B-L I-L The Phoenicians came from the Red Sea 18 18
33 NER as Sequence Tagging Capitalized word Ends in s O B-E O O O B-L I-L The Phoenicians came from the Red Sea 18 18
34 NER as Sequence Tagging Capitalized word Ends in s Ends in ans O B-E O O O B-L I-L The Phoenicians came from the Red Sea 18 18
35 NER as Sequence Tagging Capitalized word Ends in s Ends in ans Previous word the O B-E O O O B-L I-L The Phoenicians came from the Red Sea 18 18
36 NER as Sequence Tagging Capitalized word Ends in s Ends in ans Previous word the Phoenicians in gazetteer O B-E O O O B-L I-L The Phoenicians came from the Red Sea 18 18
37 NER as Sequence Tagging O B-E O O O B-L I-L The Phoenicians came from the Red Sea 19 19
38 NER as Sequence Tagging Not capitalized O B-E O O O B-L I-L The Phoenicians came from the Red Sea 19 19
39 NER as Sequence Tagging Not capitalized Tagged as VB O B-E O O O B-L I-L The Phoenicians came from the Red Sea 19 19
40 NER as Sequence Tagging B-E to right Not capitalized Tagged as VB O B-E O O O B-L I-L The Phoenicians came from the Red Sea 19 19
41 NER as Sequence Tagging O B-E O O O B-L I-L The Phoenicians came from the Red Sea 20 20
42 NER as Sequence Tagging Word sea O B-E O O O B-L I-L The Phoenicians came from the Red Sea 20 20
43 NER as Sequence Tagging Word sea preceded by the ADJ Word sea O B-E O O O B-L I-L The Phoenicians came from the Red Sea 20 20
44 NER as Sequence Tagging Word sea preceded by the ADJ Hard constraint: I-L must follow B-L or I-L Word sea O B-E O O O B-L I-L The Phoenicians came from the Red Sea 20 20
45 Great Ideas in ML: Message Passing adapted from MacKay (2003) textbook 21 21
46 Great Ideas in ML: Message Passing Count the soldiers adapted from MacKay (2003) textbook 21 21
47 Great Ideas in ML: Message Passing Count the soldiers 3 behind you 2 behind you 1 behind you adapted from MacKay (2003) textbook 21 21
48 Great Ideas in ML: Message Passing Count the soldiers there s 1 of me 3 behind you 2 behind you 1 behind you adapted from MacKay (2003) textbook 21 21
49 Great Ideas in ML: Message Passing Count the soldiers there s 1 of me 5 behind you 4 behind you 3 behind you 2 behind you 1 behind you adapted from MacKay (2003) textbook 21 21
50 Great Ideas in ML: Message Passing Count the soldiers 1 before you 2 before you 5 behind you 4 behind you 3 behind you 2 behind you 1 behind you adapted from MacKay (2003) textbook 21 21
51 Great Ideas in ML: Message Passing Count the soldiers 1 before you 2 before you 3 before you 4 before you 5 before you 5 behind you 4 behind you 3 behind you 2 behind you 1 behind you adapted from MacKay (2003) textbook 21 21
52 Great Ideas in ML: Message Passing Count the soldiers 2 before you there s 1 of me only see my incoming messages 3 behind you adapted from MacKay (2003) textbook 22 22
53 Great Ideas in ML: Message Passing Count the soldiers 2 before you there s 1 of me Belief: Must be = 6 of us only see my incoming messages 3 behind you adapted from MacKay (2003) textbook 22 22
54 Great Ideas in ML: Message Passing Count the soldiers 2 before you there s 1 of me Belief: Must be = 6 of us only see my incoming messages 3 behind you adapted from MacKay (2003) textbook 22 22
55 Great Ideas in ML: Message Passing Count the soldiers 1 before you there s 1 of me Belief: Must be = 6 of us only see my incoming messages 4 behind you adapted from MacKay (2003) textbook 23 23
56 Great Ideas in ML: Message Passing Count the soldiers 1 before you there s 1 of me Belief: Must be = 6 of us only see my incoming messages 4 behind you adapted from MacKay (2003) textbook 23 23
57 Great Ideas in ML: Message Passing Each soldier receives reports from all branches of tree adapted from MacKay (2003) textbook 24 24
58 Great Ideas in ML: Message Passing Each soldier receives reports from all branches of tree 3 here 7 here adapted from MacKay (2003) textbook 24 24
59 Great Ideas in ML: Message Passing Each soldier receives reports from all branches of tree 3 here 7 here 1 of me 11 here (= 7+3+1) adapted from MacKay (2003) textbook 24 24
60 Great Ideas in ML: Message Passing Each soldier receives reports from all branches of tree adapted from MacKay (2003) textbook 25 25
61 Great Ideas in ML: Message Passing Each soldier receives reports from all branches of tree 3 here 3 here adapted from MacKay (2003) textbook 25 25
62 Great Ideas in ML: Message Passing Each soldier receives reports from all branches of tree 3 here 7 here (= 3+3+1) 3 here adapted from MacKay (2003) textbook 25 25
63 Great Ideas in ML: Message Passing Each soldier receives reports from all branches of tree adapted from MacKay (2003) textbook 26 26
64 Great Ideas in ML: Message Passing Each soldier receives reports from all branches of tree 7 here 3 here adapted from MacKay (2003) textbook 26 26
65 Great Ideas in ML: Message Passing Each soldier receives reports from all branches of tree 11 here (= 7+3+1) 7 here 3 here adapted from MacKay (2003) textbook 26 26
66 Great Ideas in ML: Message Passing Each soldier receives reports from all branches of tree adapted from MacKay (2003) textbook 27 27
67 Great Ideas in ML: Message Passing Each soldier receives reports from all branches of tree Belief: Must be 14 of us adapted from MacKay (2003) textbook 27 27
68 Great Ideas in ML: Message Passing Each soldier receives reports from all branches of tree 3 here 7 here 3 here Belief: Must be 14 of us adapted from MacKay (2003) textbook 27 27
69 Great Ideas in ML: Message Passing Each soldier receives reports from all branches of tree 3 here 7 here 3 here Belief: Must be 14 of us adapted from MacKay (2003) textbook 28 28
70 Great Ideas in ML: Message Passing Each soldier receives reports from all branches of tree 3 here 7 here 3 here Belief: Must be 14 of us wouldn t work correctly with a loopy (cyclic) graph adapted from MacKay (2003) textbook 28 28
71 Great ideas in ML: Forward-Backward n In the CRF, message passing = forward-backward v n a v n a v n a v n a find preferred tags 29 29
72 Great ideas in ML: Forward-Backward n In the CRF, message passing = forward-backward belief v 1.8 n 0 a 4.2 v n a v n a v n a v n a find preferred tags 29 29
73 Great ideas in ML: Forward-Backward n In the CRF, message passing = forward-backward message α belief v 1.8 n 0 a 4.2 β message v n a v 3 v n 1 n a 6 a v 2 v n a nv an a find preferred tags 29 29
74 Great ideas in ML: Forward-Backward n In the CRF, message passing = forward-backward message α belief v 1.8 n 0 a 4.2 β message v n a v 3 v n 1 n a 6 a v 2 v n a nv an a v 0.3 n 0 a 0.1 find preferred tags 29 29
75 Great ideas in ML: Forward-Backward n In the CRF, message passing = forward-backward α message α belief v 1.8 n 0 a 4.2 β message v 7 n 2 a 1 v n a v 3 v n 1 n a 6 a v 2 v n a nv an a v 0.3 n 0 a 0.1 find preferred tags 29 29
76 Great ideas in ML: Forward-Backward n In the CRF, message passing = forward-backward α message α belief v 1.8 n 0 a 4.2 β message v 7 n 2 a 1 v 3 n 1 a 6 v 2 v n a nv an a v 0.3 n 0 a 0.1 find preferred tags 29 29
77 Great ideas in ML: Forward-Backward n In the CRF, message passing = forward-backward α message α belief v 1.8 n 0 a 4.2 β message v 7 n 2 a 1 v 3 n 1 a 6 v 2 n 1 a 7 v 0.3 n 0 a 0.1 find preferred tags 29 29
78 Great ideas in ML: Forward-Backward n In the CRF, message passing = forward-backward α message α belief v 1.8 n 0 a 4.2 β message v 7 n 2 a 1 v n a v 3 v n 1 n a 6 a v 2 n 1 a 7 v 0.3 n 0 a 0.1 find preferred tags 29 29
79 Great ideas in ML: Forward-Backward n In the CRF, message passing = forward-backward α message α belief v 1.8 n 0 a 4.2 β message β v 7 n 2 a 1 v n a v 3 v n 1 n a 6 a v 2 n 1 a 7 v 3 n 6 a 1 v 0.3 n 0 a 0.1 find preferred tags 29 29
80 Great ideas in ML: Forward-Backward n In the CRF, message passing = forward-backward α message α belief v 1.8 n 0 a 4.2 β message β v 7 n 2 a 1 v n a v 3 v n 1 n a 6 a v 2 v n a nv an a v 3 n 6 a 1 v 0.3 n 0 a 0.1 find preferred tags 29 29
81 Named En(ty Recogni(on Accurate recogni(on requires about 1M words of training data (1,500 news stories) may be more expensive than developing rules for some applica(ons Both rule- based and sta(s(cal can achieve about 90% effec(veness for categories such as names, loca(ons, organiza(ons others, such as product name, can be much worse 30
82 Interna(onaliza(on 2/3 of the Web is in English About 50% of Web users do not use English as their primary language Many (maybe most) search applica(ons have to deal with mul(ple languages monolingual search: search in one language, but with many possible languages cross- language search: search in mul(ple languages at the same (me 31
83 Interna(onaliza(on Many aspects of search engines are language- neutral Major differences: Text encoding (conver(ng to Unicode) Tokenizing (many languages have no word separators) Stemming Cultural differences may also impact interface design and features provided 32
84 Chinese Tokenizing 33
Information Extraction. CS6200 Information Retrieval (and a sort of advertisement for NLP in the spring)
Information Extraction CS6200 Information Retrieval (and a sort of advertisement for NLP in the spring) Informa(on Extrac(on Automa(cally extract structure from text annotate document using tags to iden(fy
More informationPart of Speech Tagging & Hidden Markov Models (Part 1) Mitch Marcus CIS 421/521
Part of Speech Tagging & Hidden Markov Models (Part 1) Mitch Marcus CIS 421/521 NLP Task I Determining Part of Speech Tags Given a text, assign each token its correct part of speech (POS) tag, given its
More information6.02 Fall 2013 Lecture #7
6. Fall Lecture #7 Viterbi decoding of convoluonal codes 6. Fall Lecture 7, Slide # Convolutional Coding Shift Register View + mod p [n] x[n] x[n-] x[n-] The values in the registers define the state of
More informationRelation Extraction, Neural Network, and Matrix Factorization
Relation Extraction, Neural Network, and Matrix Factorization Presenter: Haw-Shiuan Chang UMass CS585 guest lecture on 2016 Nov. 17 Most slides prepared by Patrick Verga Relation Extraction Knowledge Graph
More informationDance Movement Patterns Recognition (Part II)
Dance Movement Patterns Recognition (Part II) Jesús Sánchez Morales Contents Goals HMM Recognizing Simple Steps Recognizing Complex Patterns Auto Generation of Complex Patterns Graphs Test Bench Conclusions
More informationResearch Seminar. Stefano CARRINO fr.ch
Research Seminar Stefano CARRINO stefano.carrino@hefr.ch http://aramis.project.eia- fr.ch 26.03.2010 - based interaction Characterization Recognition Typical approach Design challenges, advantages, drawbacks
More information6. FUNDAMENTALS OF CHANNEL CODER
82 6. FUNDAMENTALS OF CHANNEL CODER 6.1 INTRODUCTION The digital information can be transmitted over the channel using different signaling schemes. The type of the signal scheme chosen mainly depends on
More informationWHITE PAPER. NLP TOOL (Natural Language Processing) User Case: isocialcube (Social Networks Campaign Management)
WHITE PAPER NLP TOOL (Natural Language Processing) User Case: isocialcube (Social Networks Campaign Management) www.aynitech.com What does the Customer need? isocialcube s (ISC) helps companies manage
More informationMobile Wireless Channel Dispersion State Model
Mobile Wireless Channel Dispersion State Model Enabling Cognitive Processing Situational Awareness Kenneth D. Brown Ph.D. Candidate EECS University of Kansas kenneth.brown@jhuapl.edu Dr. Glenn Prescott
More informationMITOCW MITRES6_012S18_L26-06_300k
MITOCW MITRES6_012S18_L26-06_300k In this video, we are going to calculate interesting quantities that have to do with the short-term behavior of Markov chains as opposed to those dealing with long-term
More informationOutline. Communications Engineering 1
Outline Introduction Signal, random variable, random process and spectra Analog modulation Analog to digital conversion Digital transmission through baseband channels Signal space representation Optimal
More informationCS188 Spring 2010 Section 3: Game Trees
CS188 Spring 2010 Section 3: Game Trees 1 Warm-Up: Column-Row You have a 3x3 matrix of values like the one below. In a somewhat boring game, player A first selects a row, and then player B selects a column.
More informationCS 188: Artificial Intelligence Spring Speech in an Hour
CS 188: Artificial Intelligence Spring 2006 Lecture 19: Speech Recognition 3/23/2006 Dan Klein UC Berkeley Many slides from Dan Jurafsky Speech in an Hour Speech input is an acoustic wave form s p ee ch
More informationSpeech Processing. Simon King University of Edinburgh. additional lecture slides for
Speech Processing Simon King University of Edinburgh additional lecture slides for 2018-19 assignment Q&A writing exercise Roadmap Modules 1-2: The basics Modules 3-5: Speech synthesis Modules 6-9: Speech
More information3. Data and sampling. Plan for today
3. Data and sampling Business Statistics Plan for today Reminders and introduction Data: qualitative and quantitative Quantitative data: discrete and continuous Qualitative data discussion Samples and
More informationExtracting Social Networks from Literary Fiction
Extracting Social Networks from Literary Fiction David K. Elson, Nicholas Dames, Kathleen R. McKeown Presented by Audrey Lawrence and Kathryn Lingel Introduction Network of 19th century novel's social
More informationCHORD RECOGNITION USING INSTRUMENT VOICING CONSTRAINTS
CHORD RECOGNITION USING INSTRUMENT VOICING CONSTRAINTS Xinglin Zhang Dept. of Computer Science University of Regina Regina, SK CANADA S4S 0A2 zhang46x@cs.uregina.ca David Gerhard Dept. of Computer Science,
More informationParticipant Identification in Haptic Systems Using Hidden Markov Models
HAVE 25 IEEE International Workshop on Haptic Audio Visual Environments and their Applications Ottawa, Ontario, Canada, 1-2 October 25 Participant Identification in Haptic Systems Using Hidden Markov Models
More informationIntroduction to Markov Models
Introduction to Markov Models But first: A few preliminaries Estimating the probability of phrases of words, sentences, etc. CIS 391 - Intro to AI 2 What counts as a word? A tricky question. How to find
More informationCS 540: Introduction to Artificial Intelligence
CS 540: Introduction to Artificial Intelligence Mid Exam: 7:15-9:15 pm, October 25, 2000 Room 1240 CS & Stats CLOSED BOOK (one sheet of notes and a calculator allowed) Write your answers on these pages
More informationChapter 3 Convolutional Codes and Trellis Coded Modulation
Chapter 3 Convolutional Codes and Trellis Coded Modulation 3. Encoder Structure and Trellis Representation 3. Systematic Convolutional Codes 3.3 Viterbi Decoding Algorithm 3.4 BCJR Decoding Algorithm 3.5
More informationAdvanced Techniques for Mobile Robotics Location-Based Activity Recognition
Advanced Techniques for Mobile Robotics Location-Based Activity Recognition Wolfram Burgard, Cyrill Stachniss, Kai Arras, Maren Bennewitz Activity Recognition Based on L. Liao, D. J. Patterson, D. Fox,
More informationECE710 Space Time Coding For Wireless Communication HW3
THIS IS FOR LEFT PAGES 1 ECE710 Space Time Coding For Wireless Communication HW3 Zhirong Li Electrical & Computer Engineering Department University of Waterloo, Waterloo, ON, Canada z32li@engmail.uwaterloo.ca
More informationCS188 Spring 2010 Section 3: Game Trees
CS188 Spring 2010 Section 3: Game Trees 1 Warm-Up: Column-Row You have a 3x3 matrix of values like the one below. In a somewhat boring game, player A first selects a row, and then player B selects a column.
More informationCS 188 Introduction to Fall 2014 Artificial Intelligence Midterm
CS 88 Introduction to Fall Artificial Intelligence Midterm INSTRUCTIONS You have 8 minutes. The exam is closed book, closed notes except a one-page crib sheet. Please use non-programmable calculators only.
More information신경망기반자동번역기술. Konkuk University Computational Intelligence Lab. 김강일
신경망기반자동번역기술 Konkuk University Computational Intelligence Lab. http://ci.konkuk.ac.kr kikim01@kunkuk.ac.kr 김강일 Index Issues in AI and Deep Learning Overview of Machine Translation Advanced Techniques in
More informationRADIO SYSTEMS ETIN15. Channel Coding. Ove Edfors, Department of Electrical and Information Technology
RADIO SYSTEMS ETIN15 Lecture no: 7 Channel Coding Ove Edfors, Department of Electrical and Information Technology Ove.Edfors@eit.lth.se 2016-04-18 Ove Edfors - ETIN15 1 Contents (CHANNEL CODING) Overview
More informationProject. B) Building the PWM Read the instructions of HO_14. 1) Determine all the 9-mers and list them here:
Project Please choose ONE project among the given five projects. The last three projects are programming projects. hoose any programming language you want. Note that you can also write programs for the
More informationA Gentle Introduction to Dynamic Programming and the Viterbi Algorithm
A Gentle Introduction to Dynamic Programming and the Viterbi Algorithm Dr. Hubert Kaeslin Microelectronics Design Center ETH Zürich Extra teaching material for Digital Integrated Circuit Design, from VLSI
More informationLesson Activity Toolkit
Lesson Activity Toolkit Tool name Tool definition Ideas for tool use Screen shot of tool Activities Anagram Unscramble given letters to solve problems. Unscramble for word games Category sort - Category
More informationSearching for Solu4ons. Searching for Solu4ons. Example: Traveling Romania. Example: Vacuum World 9/8/09
Searching for Solu4ons Searching for Solu4ons CISC481/681, Lecture #3 Ben Cartere@e Characterize a task or problem as a search for something In the agent view, a search for a sequence of ac4ons that will
More informationSpreading Codes and Characteristics. Error Correction Codes
Spreading Codes and Characteristics and Error Correction Codes Global Navigational Satellite Systems (GNSS-6) Short course, NERTU Prasad Krishnan International Institute of Information Technology, Hyderabad
More information1 Introduction. 1.1 Game play. CSC 261 Lab 4: Adversarial Search Fall Assigned: Tuesday 24 September 2013
CSC 261 Lab 4: Adversarial Search Fall 2013 Assigned: Tuesday 24 September 2013 Due: Monday 30 September 2011, 11:59 p.m. Objectives: Understand adversarial search implementations Explore performance implications
More informationChapter 6: Memory: Information and Secret Codes. CS105: Great Insights in Computer Science
Chapter 6: Memory: Information and Secret Codes CS105: Great Insights in Computer Science Overview When we decide how to represent something in bits, there are some competing interests: easily manipulated/processed
More informationService Robots in an Intelligent House
Service Robots in an Intelligent House Jesus Savage Bio-Robotics Laboratory biorobotics.fi-p.unam.mx School of Engineering Autonomous National University of Mexico UNAM 2017 OUTLINE Introduction A System
More informationRhythm Analysis in Music
Rhythm Analysis in Music EECS 352: Machine Percep;on of Music & Audio Zafar Rafii, Winter 24 Some Defini;ons Rhythm movement marked by the regulated succession of strong and weak elements, or of opposite
More informationNLP, Games, and Robotic Cars
NLP, Games, and Robotic Cars [These slides were created by Dan Klein and Pieter Abbeel for CS188 Intro to AI at UC Berkeley. All CS188 materials are available at http://ai.berkeley.edu.] So Far: Foundational
More informationChannel Coding RADIO SYSTEMS ETIN15. Lecture no: Ove Edfors, Department of Electrical and Information Technology
RADIO SYSTEMS ETIN15 Lecture no: 7 Channel Coding Ove Edfors, Department of Electrical and Information Technology Ove.Edfors@eit.lth.se 2012-04-23 Ove Edfors - ETIN15 1 Contents (CHANNEL CODING) Overview
More informationTwo Bracketing Schemes for the Penn Treebank
Anssi Yli-Jyrä Two Bracketing Schemes for the Penn Treebank Abstract The trees in the Penn Treebank have a standard representation that involves complete balanced bracketing. In this article, an alternative
More informationCommunication Theory II
Communication Theory II Lecture 13: Information Theory (cont d) Ahmed Elnakib, PhD Assistant Professor, Mansoura University, Egypt March 22 th, 2015 1 o Source Code Generation Lecture Outlines Source Coding
More informationAnnouncements. Today. Speech and Language. State Path Trellis. HMMs: MLE Queries. Introduction to Artificial Intelligence. V22.
Introduction to Artificial Intelligence Announcements V22.0472-001 Fall 2009 Lecture 19: Speech Recognition & Viterbi Decoding Rob Fergus Dept of Computer Science, Courant Institute, NYU Slides from John
More informationLecture 19 (Geometric Optics I Plane and Spherical Optics) Physics Spring 2018 Douglas Fields
Lecture 19 (Geometric Optics I Plane and Spherical Optics) Physics 262-01 Spring 2018 Douglas Fields Optics -Wikipedia Optics is the branch of physics which involves the behavior and properties of light,
More informationScheduling. Radek Mařík. April 28, 2015 FEE CTU, K Radek Mařík Scheduling April 28, / 48
Scheduling Radek Mařík FEE CTU, K13132 April 28, 2015 Radek Mařík (marikr@fel.cvut.cz) Scheduling April 28, 2015 1 / 48 Outline 1 Introduction to Scheduling Methodology Overview 2 Classification of Scheduling
More informationReinforcement Learning in Games Autonomous Learning Systems Seminar
Reinforcement Learning in Games Autonomous Learning Systems Seminar Matthias Zöllner Intelligent Autonomous Systems TU-Darmstadt zoellner@rbg.informatik.tu-darmstadt.de Betreuer: Gerhard Neumann Abstract
More informationMaximum Likelihood Sequence Detection (MLSD) and the utilization of the Viterbi Algorithm
Maximum Likelihood Sequence Detection (MLSD) and the utilization of the Viterbi Algorithm Presented to Dr. Tareq Al-Naffouri By Mohamed Samir Mazloum Omar Diaa Shawky Abstract Signaling schemes with memory
More informationAN INTRODUCTION TO ERROR CORRECTING CODES Part 2
AN INTRODUCTION TO ERROR CORRECTING CODES Part Jack Keil Wolf ECE 54 C Spring BINARY CONVOLUTIONAL CODES A binary convolutional code is a set of infinite length binary sequences which satisfy a certain
More informationSeman&c Web Mo&va&ng Example
Seman&c Web Mo&va&ng Example A Mo&va&ng example Here s a mo&va&ng example, adapted from a presenta&on by Ivan Herman It introduces seman&c web concepts And illustrates the benefits of represen&ng your
More informationCS188 Spring 2014 Section 3: Games
CS188 Spring 2014 Section 3: Games 1 Nearly Zero Sum Games The standard Minimax algorithm calculates worst-case values in a zero-sum two player game, i.e. a game in which for all terminal states s, the
More informationStudy Singular They in Contemporary English. Bich Ngoc Do
Study Singular They in Contemporary English Bich Ngoc Do Content 1. Introduction 2. Similar Works 3. Data Collection 4. Statistical Analysis 5. Conclusion 1. Introduction Gender in English O Male-oriented
More informationSea-battlefield Situation Assessment based on Improved Decision Tree
Applied Mechanics and Materials Submitted: 2014-05-14 ISSN: 1662-7482, Vol. 574, pp 639-645 Accepted: 2014-05-15 doi:10.4028/www.scientific.net/amm.574.639 Online: 2014-07-18 2014 Trans Tech Publications,
More informationAERONAUTICAL CHANNEL MODELING FOR PACKET NETWORK SIMULATORS
AERONAUTICAL CHANNEL MODELING FOR PACKET NETWORK SIMULATORS Author: Sandarva Khanal Advisor: Dr. Richard A. Dean Department of Electrical and Computer Engineering Morgan State University ABSTRACT The introduction
More informationBattleship as a Dialog System Aaron Brackett, Gerry Meixiong, Tony Tan-Torres, Jeffrey Yu
Battleship as a Dialog System Aaron Brackett, Gerry Meixiong, Tony Tan-Torres, Jeffrey Yu Abstract For our project, we built a conversational agent for Battleship using Dialog systems. In this paper, we
More informationApplication Areas of AI Artificial intelligence is divided into different branches which are mentioned below:
Week 2 - o Expert Systems o Natural Language Processing (NLP) o Computer Vision o Speech Recognition And Generation o Robotics o Neural Network o Virtual Reality APPLICATION AREAS OF ARTIFICIAL INTELLIGENCE
More informationCS 343: Artificial Intelligence
CS 343: Artificial Intelligence NLP, Games, and Autonomous Vehicles Prof. Scott Niekum The University of Texas at Austin [These slides based on those of Dan Klein and Pieter Abbeel for CS188 Intro to AI
More informationDepartment of Electronic Engineering FINAL YEAR PROJECT REPORT
Department of Electronic Engineering FINAL YEAR PROJECT REPORT BEngECE-2009/10-- Student Name: CHEUNG Yik Juen Student ID: Supervisor: Prof.
More informationDigital Image Processing in Medical Palmistry
Digital Image Processing in Medical Palmistry Maduguri Sudhir Department of ECE KITS College, TS, India sudhirkmm@gmail.com E.V.Narayana Department of ECE KITS College, TS, India eluri.narayana@gmail.com
More informationSeman&c Web Mo&va&ng Example
Seman&c Web Mo&va&ng Example A Mo&va&ng example Here s a mo&va&ng example, adapted from a presenta&on by Ivan Herman It introduces seman&c web concepts and illustrates the benefits of represen&ng your
More information11/13/18. Introduction to RNNs for NLP. About Me. Overview SHANG GAO
Introduction to RNNs for NLP SHANG GAO About Me PhD student in the Data Science and Engineering program Took Deep Learning last year Work in the Biomedical Sciences, Engineering, and Computing group at
More informationAlternation in the repeated Battle of the Sexes
Alternation in the repeated Battle of the Sexes Aaron Andalman & Charles Kemp 9.29, Spring 2004 MIT Abstract Traditional game-theoretic models consider only stage-game strategies. Alternation in the repeated
More informationAUTOMATED MUSIC TRACK GENERATION
AUTOMATED MUSIC TRACK GENERATION LOUIS EUGENE Stanford University leugene@stanford.edu GUILLAUME ROSTAING Stanford University rostaing@stanford.edu Abstract: This paper aims at presenting our method to
More informationSIMULATION VOICE RECOGNITION SYSTEM FOR CONTROLING ROBOTIC APPLICATIONS
SIMULATION VOICE RECOGNITION SYSTEM FOR CONTROLING ROBOTIC APPLICATIONS 1 WAHYU KUSUMA R., 2 PRINCE BRAVE GUHYAPATI V 1 Computer Laboratory Staff., Department of Information Systems, Gunadarma University,
More informationPermutations and Combinations
Permutations and Combinations Rosen, Chapter 5.3 Motivating question In a family of 3, how many ways can we arrange the members of the family in a line for a photograph? 1 Permutations A permutation of
More informationDesign and Implementation of an Underlay Control Channel for NC-OFDM-Based Networks
Design and Implementation of an Underlay Control Channel for NC-OFDM-Based Networks Ratnesh Kumbhkar, Gokul Sridharan, Narayan B. Mandayam, Ivan Seskar (, Rutgers, The State University of New Jersey) and
More informationCOMPUTATIONAL LINGUISTIC CREATIVITY
COMPUTATIONAL LINGUISTIC CREATIVITY Khalid Alnajjar alnajjar[at]cs.helsinki.fi UNIVERSITY OF HELSINKI Department of Computer Science Khalid Alnajjar 6 Nov 2017 1/ 35 OUTLINE Introduction to Computational
More informationSynchronization using Insertion/Deletion Correcting Permutation Codes
Synchronization using Insertion/Deletion Correcting Permutation Codes Ling Cheng, Theo G. Swart and Hendrik C. Ferreira Department of Electrical and Electronic Engineering Science University of Johannesburg,
More informationLECTURE VI: LOSSLESS COMPRESSION ALGORITHMS DR. OUIEM BCHIR
1 LECTURE VI: LOSSLESS COMPRESSION ALGORITHMS DR. OUIEM BCHIR 2 STORAGE SPACE Uncompressed graphics, audio, and video data require substantial storage capacity. Storing uncompressed video is not possible
More informationTreebanks. LING 5200 Computational Corpus Linguistics Nianwen Xue
Treebanks LING 5200 Computational Corpus Linguistics Nianwen Xue 1 Outline Intuitions and tests for constituent structure Representing constituent structures Continuous constituents Discontinuous constituents
More informationAutomated Generation of Timestamped Patent Abstracts at Scale to Outsmart Patent-Trolls
Automated Generation of Timestamped Patent Abstracts at Scale to Outsmart Patent-Trolls Felix Hamborg, Moustafa Elmaghraby, Corinna Breitinger, Bela Gipp Department of Computer and Information Science
More informationMikko Myllymäki and Tuomas Virtanen
NON-STATIONARY NOISE MODEL COMPENSATION IN VOICE ACTIVITY DETECTION Mikko Myllymäki and Tuomas Virtanen Department of Signal Processing, Tampere University of Technology Korkeakoulunkatu 1, 3370, Tampere,
More informationCard counting meets hidden Markov models
University of New Mexico UNM Digital Repository Electrical and Computer Engineering ETDs Engineering ETDs 2-7-2011 Card counting meets hidden Markov models Steven J. Aragon Follow this and additional works
More informationFounding a Colony. I am a member of a colony. Our colony will be named. We are from:
Founding a Colony 1 The year is 1650 AD. You are about to leave on a three-month ocean voyage to the New World where you will begin a new life. There are 20 people in your group. Having never been to this
More informationTheory of Computer Games: Concluding Remarks
Theory of Computer Games: Concluding Remarks Tsan-sheng Hsu tshsu@iis.sinica.edu.tw http://www.iis.sinica.edu.tw/~tshsu 1 Practical issues. The open book. The endgame database. Smart usage of resources.
More informationLearning Structured Predictors
Learning Structured Predictors Xavier Carreras Xerox Research Centre Europe Supervised (Structured) Prediction Learning to predict: given training data { (x (1), y (1) ), (x (2), y (2) ),..., (x (m), y
More informationWhy TheProfiler? Save 9me, money, and water by knowing exactly how much moisture your crops need during the growing season.
Why TheProfiler? TheProfiler is a soil moisture monitoring system that provides you reliable, ac9onable data that allows you to make well-informed irriga9on decisions. Save 9me, money, and water by knowing
More informationThe Cyberne*cs Thought Collec*ve Project
The Cyberne*cs Thought Collec*ve Project Using Computa*onal Methods to Reveal Intellectual Context in Archival Material Bethany G. Anderson, Christopher J. Prom, Kevin Hamilton, James A. Hutchinson, Mark
More informationDocumentation and Discussion
1 of 9 11/7/2007 1:21 AM ASSIGNMENT 2 SUBJECT CODE: CS 6300 SUBJECT: ARTIFICIAL INTELLIGENCE LEENA KORA EMAIL:leenak@cs.utah.edu Unid: u0527667 TEEKO GAME IMPLEMENTATION Documentation and Discussion 1.
More informationStatistical Communication Theory
Statistical Communication Theory Mark Reed 1 1 National ICT Australia, Australian National University 21st February 26 Topic Formal Description of course:this course provides a detailed study of fundamental
More informationA New Forecasting System using the Latent Dirichlet Allocation (LDA) Topic Modeling Technique
A New Forecasting System using the Latent Dirichlet Allocation (LDA) Topic Modeling Technique JU SEOP PARK, NA RANG KIM, HYUNG-RIM CHOI, EUNJUNG HAN Department of Management Information Systems Dong-A
More informationCourse Outline. Textbook: G. Michael Schneider and Judith L. Gersting, "Invitation to Computer Science C++ Version," 3rd Edition, Thomson, 2004.
2005/Sep/12 1 Course Outline Textbook: G. Michael Schneider and Judith L. Gersting, "Invitation to Computer Science C++ Version," 3rd Edition, Thomson, 2004. Outline 1. The Algorithm Foundations of Computer
More informationMultitree Decoding and Multitree-Aided LDPC Decoding
Multitree Decoding and Multitree-Aided LDPC Decoding Maja Ostojic and Hans-Andrea Loeliger Dept. of Information Technology and Electrical Engineering ETH Zurich, Switzerland Email: {ostojic,loeliger}@isi.ee.ethz.ch
More informationNeural Architectures for Named Entity Recognition
Neural Architectures for Named Entity Recognition Presented by Allan June 16, 2017 Slides: http://www.statnlp.org/event/naner.html Some content is taken from the original slides. Named Entity Recognition
More informationSpace engineering. Space data links - Telemetry synchronization and channel coding. ECSS-E-ST-50-01C 31 July 2008
ECSS-E-ST-50-01C Space engineering Space data links - Telemetry synchronization and channel coding ECSS Secretariat ESA-ESTEC Requirements & Standards Division Noordwijk, The Netherlands Foreword This
More informationCompleting Telephoning Phrases Brainstorming and Roleplays
Completing Telephoning Phrases Brainstorming and Roleplays Work together and brainstorm at least three things for each gap below. Try to make the examples you make up as different as possible, and try
More informationHomeroom. Turn in SIGNED interims. Picture of PINK before electives
Homeroom Turn in SIGNED interims Picture of PINK before electives Welcome Back! Happy Spirit Week! Need: NOTEBOOKS, New Warm Up Sheet, and Lost Colony story map **Turn in CURRENT EVENTS AND WARM UPS from
More informationBelow are four problems which are comparable in organization, complexity and length to the four problems on the upcoming Ling 100 final.
Ling 100 Sample Final Below are four problems which are comparable in organization, complexity and length to the four problems on the upcoming Ling 100 final. Problem 1 Problem 3.4 (Maltese) from the Language
More informationInternational Journal of Scientific & Engineering Research Volume 9, Issue 3, March ISSN
International Journal of Scientific & Engineering Research Volume 9, Issue 3, March-2018 1605 FPGA Design and Implementation of Convolution Encoder and Viterbi Decoder Mr.J.Anuj Sai 1, Mr.P.Kiran Kumar
More informationRandom Signals Detection Estimation And Data Analysis Solution Manual
Random Signals Detection Estimation And Data Analysis Solution Manual Random Signals Detection Estimation And Data Analysis Solution Manual Editors Samsung Anyway S102 Manual by Staff on February 27, 2009
More informationSimple Large-scale Relation Extraction from Unstructured Text
Simple Large-scale Relation Extraction from Unstructured Text Christos Christodoulopoulos and Arpit Mittal Amazon Research Cambridge Alexa Question Answering Alexa, what books did Carrie Fisher write?
More informationMaster s Thesis Defense
Master s Thesis Defense Comparison of Noncoherent Detectors for SOQPSK and GMSK in Phase Noise Channels Afzal Syed August 17, 2007 Committee Dr. Erik Perrins (Chair) Dr. Glenn Prescott Dr. Daniel Deavours
More informationCómo estructurar un buen proyecto de Machine Learning? Anna Bosch Rue VP Data Launchmetrics
Cómo estructurar un buen proyecto de Machine Learning? Anna Bosch Rue VP Data Intelligence @ Launchmetrics annaboschrue@gmail.com Motivating example 90% Accuracy and you want to do better IDEAS: - Collect
More informationCoalescence. Outline History. History, Model, and Application. Coalescence. The Model. Application
Coalescence History, Model, and Application Outline History Origins of theory/approach Trace the incorporation of other s ideas Coalescence Definition and descriptions The Model Assumptions and Uses Application
More informationHour of Code at Box Island! Curriculum
Hour of Code at Box Island! Curriculum Welcome to the Box Island curriculum! First of all, we want to thank you for showing interest in using this game with your children or students. Coding is becoming
More informationMAS160: Signals, Systems & Information for Media Technology. Problem Set 4. DUE: October 20, 2003
MAS160: Signals, Systems & Information for Media Technology Problem Set 4 DUE: October 20, 2003 Instructors: V. Michael Bove, Jr. and Rosalind Picard T.A. Jim McBride Problem 1: Simple Psychoacoustic Masking
More informationReal Time Word to Picture Translation for Chinese Restaurant Menus
Real Time Word to Picture Translation for Chinese Restaurant Menus Michelle Jin, Ling Xiao Wang, Boyang Zhang Email: mzjin12, lx2wang, boyangz @stanford.edu EE268 Project Report, Spring 2014 Abstract--We
More information7 Costly Presentation. Mistakes Every Speaker Must Avoid! The Perfect Pitch That Sells.
7 Costly Presentation Mistakes Every Speaker Must Avoid! 1Bullets Kill Too many bullet points are a nightmare for your audience. Seeing a block of text with a dozen bullet points is when your audience
More informationBuilding a Business Knowledge Base by a Supervised Learning and Rule-Based Method
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS VOL. 9, NO. 1, Jan. 2015 407 Copyright 2015 KSII Building a Business Knowledge Base by a Supervised Learning and Rule-Based Method Sungho Shin 1, 2,
More informationCurriculum vitae. Dr Theologos Athanaselis
Dr Theologos Athanaselis ATHENS, SEPTEMBER 2010 PERSONNAL DATA Full name Theologos Athanaselis Date of birth 28 June 1976 Place of Birth Mytilene Nationality Greek Institute for Language and Speech Processing
More informationSONG RETRIEVAL SYSTEM USING HIDDEN MARKOV MODELS
SONG RETRIEVAL SYSTEM USING HIDDEN MARKOV MODELS AKSHAY CHANDRASHEKARAN ANOOP RAMAKRISHNA akshayc@cmu.edu anoopr@andrew.cmu.edu ABHISHEK JAIN GE YANG ajain2@andrew.cmu.edu younger@cmu.edu NIDHI KOHLI R
More informationVariations on the Two Envelopes Problem
Variations on the Two Envelopes Problem Panagiotis Tsikogiannopoulos pantsik@yahoo.gr Abstract There are many papers written on the Two Envelopes Problem that usually study some of its variations. In this
More information