Information Extraction. CS6200 Information Retrieval (and a sort of advertisement for NLP in the spring)

Size: px
Start display at page:

Download "Information Extraction. CS6200 Information Retrieval (and a sort of advertisement for NLP in the spring)"

Transcription

1 Information Extraction CS6200 Information Retrieval (and a sort of advertisement for NLP in the spring) 1

2 Informa(on Extrac(on Automa(cally extract structure from text annotate document using tags to iden(fy extracted structure We ve briefly men(oned one example But part of speech tagging is so low- level it usually doesn t count as IE Named en(ty recogni(on iden(fy words that refer to something of interest in a par(cular applica(on e.g., people, companies, loca(ons, dates, product names, prices, etc. 2

3 Named En(ty Recogni(on Example showing seman(c annota(on of text using XML tags Informa(on extrac(on also includes document structure and more complex features such as rela(onships and events 3

4 Named Entity Recognition The Persian learned men say that the Phoenicians came to our seas from the so-called Red Sea, and having settled in the country which they still occupy, at once began to make long voyages. Among other places to which they carried Egyptian and Assyrian merchandise, they came to Argos, which was at that time preeminent in every way among the people of what is now called Hellas. The Phoenicians came to Argos, and set out their cargo. On the fifth or sixth day after their arrival, when their wares were almost all sold, many women came to the shore and among them especially the daughter of the king, whose name was Io (according to Persians and Greeks alike), the daughter of Inachus. As these stood about the stern of the ship bargaining for the wares they liked, the Phoenicians incited one another to set upon them. Most of the women escaped: Io and others were seized and thrown into the ship, which then sailed away for Egypt. 4

5 Named Entity Recognition The Persian learned men say that the Phoenicians came to our seas from the so-called Red Sea, and having settled in the country which they still occupy, at once began to make long voyages. Among other places to which they carried Egyptian and Assyrian merchandise, they came to Argos, which was at that time preeminent in every way among the people of what is now called Hellas. The Phoenicians came to Argos, and set out their cargo. On the fifth or sixth day after their arrival, when their wares were almost all sold, many women came to the shore and among them especially the daughter of the king, whose name was Io (according to Persians and Greeks alike), the daughter of Inachus. As these stood about the stern of the ship bargaining for the wares they liked, the Phoenicians incited one another to set upon them. Most of the women escaped: Io and others were seized and thrown into the ship, which then sailed away for Egypt. Person 5

6 Named Entity Recognition The Persian learned men say that the Phoenicians came to our seas from the so-called Red Sea, and having settled in the country which they still occupy, at once began to make long voyages. Among other places to which they carried Egyptian and Assyrian merchandise, they came to Argos, which was at that time preeminent in every way among the people of what is now called Hellas. The Phoenicians came to Argos, and set out their cargo. On the fifth or sixth day after their arrival, when their wares were almost all sold, many women came to the shore and among them especially the daughter of the king, whose name was Io (according to Persians and Greeks alike), the daughter of Inachus. As these stood about the stern of the ship bargaining for the wares they liked, the Phoenicians incited one another to set upon them. Most of the women escaped: Io and others were seized and thrown into the ship, which then sailed away for Egypt. Person Location 6

7 Named Entity Recognition The Persian learned men say that the Phoenicians came to our seas from the so-called Red Sea, and having settled in the country which they still occupy, at once began to make long voyages. Among other places to which they carried Egyptian and Assyrian merchandise, they came to Argos, which was at that time preeminent in every way among the people of what is now called Hellas. The Phoenicians came to Argos, and set out their cargo. On the fifth or sixth day after their arrival, when their wares were almost all sold, many women came to the shore and among them especially the daughter of the king, whose name was Io (according to Persians and Greeks alike), the daughter of Inachus. As these stood about the stern of the ship bargaining for the wares they liked, the Phoenicians incited one another to set upon them. Most of the women escaped: Io and others were seized and thrown into the ship, which then sailed away for Egypt. Person Location Ethnic 7

8 Named Entity Recognition The Persian learned men say that the Phoenicians came to our seas from the so-called Red Sea, and having settled in the country which they still occupy, at once began to make long voyages. Among other places to which they carried Egyptian and Assyrian merchandise, they came to Argos, which was at that time preeminent in every way among the people of what is now called Hellas. The Phoenicians came to Argos, and set out their cargo. On the fifth or sixth day after their arrival, when their wares were almost all sold, many women came to the shore and among them especially the daughter of the king, whose name was Io (according to Persians and Greeks alike), the daughter of Inachus. As these stood about the stern of the ship bargaining for the wares they liked, the Phoenicians incited one another to set upon them. Most of the women escaped: Io and others were seized and thrown into the ship, which then sailed away for Egypt. Classes could also be, e.g., Wikipedia articles Person Location Ethnic 7

9 8

10 8

11 8

12 Named Entity Recognition Rule-based Uses lexicons (lists of words and phrases) that categorize names e.g., locations, peoples names, organizations, etc. Rules also used to verify or find new entity names e.g., <number> <word> street for addresses <street address>, <city> or in <city> to verify city names <street address>, <city>, <state> to find new cities <title> <name> to find new names 9

13 Named Entity Recognition Rules either developed manually by trial and error or using machine learning techniques Statistical uses a probabilistic model of the words in and around an entity probabilities estimated using training data (manually annotated text) Hidden Markov Model (HMM) is one approach Conditional Random Fields: similar structure, often higher accuracy, more expensive to train 10

14 HMM for Extraction Resolve ambiguity in a word using context e.g., marathon is a location or a sporting event, boston marathon is a specific sporting event Model context using a generative model of the sequence of words Markov property: the next word in a sequence depends only on a small number of the previous words 11

15 HMM for Extraction Markov Model describes a process as a collection of states with transitions between them each transition has a probability associated with it next state depends only on current state and transition probabilities Hidden Markov Model each state has a set of possible outputs outputs have probabilities 12

16 HMM Sentence Model Each state is associated with a probability distribu(on over words (the output) 13

17 NER as Sequence Tagging The Phoenicians came from the Red Sea 14 14

18 NER as Sequence Tagging O B-E O O O B-L I-L The Phoenicians came from the Red Sea 14 14

19 Sequence Tagging Fed raises interest rates 15 15

20 Sequence Tagging NN NNS NNP VB VBZ Fed raises interest rates 15 15

21 Sequence Tagging NN NNS NNP VB VBZ Fed raises interest rates 15 15

22 Sequence Tagging NN NNS NNP VB VBZ Fed raises interest rates 15 15

23 Sequence Tagging NN NNS NNP VB VBZ Fed raises interest rates 16 16

24 Sequence Tagging NN NNS NNP VB VBZ Fed raises interest rates 16 16

25 Sequence Tagging NN NNS NNP VB VBZ Fed raises interest rates 17 17

26 Sequence Tagging NN NNS NNP VB VBZ Fed raises interest rates 17 17

27 Sequence Tagging NN NNS NNP VB VBZ T n = 5 4 = 625 possible paths! Fed raises interest rates 17 17

28 Sequence Tagging Efficient (linear time) Shortest path = Viterbi algorithm NN NNS NNP VB VBZ T n = 5 4 = 625 possible paths! Fed raises interest rates 17 17

29 Sequence Tagging Efficient (linear time) Shortest path = Viterbi algorithm NN NNS NNP VB VBZ T n = 5 4 = 625 possible paths! Fed raises interest rates Can we specify that Fed always has the same tag in this document? 17 17

30 NER as Sequence Tagging The Phoenicians came from the Red Sea 18 18

31 NER as Sequence Tagging O B-E O O O B-L I-L The Phoenicians came from the Red Sea 18 18

32 NER as Sequence Tagging Capitalized word O B-E O O O B-L I-L The Phoenicians came from the Red Sea 18 18

33 NER as Sequence Tagging Capitalized word Ends in s O B-E O O O B-L I-L The Phoenicians came from the Red Sea 18 18

34 NER as Sequence Tagging Capitalized word Ends in s Ends in ans O B-E O O O B-L I-L The Phoenicians came from the Red Sea 18 18

35 NER as Sequence Tagging Capitalized word Ends in s Ends in ans Previous word the O B-E O O O B-L I-L The Phoenicians came from the Red Sea 18 18

36 NER as Sequence Tagging Capitalized word Ends in s Ends in ans Previous word the Phoenicians in gazetteer O B-E O O O B-L I-L The Phoenicians came from the Red Sea 18 18

37 NER as Sequence Tagging O B-E O O O B-L I-L The Phoenicians came from the Red Sea 19 19

38 NER as Sequence Tagging Not capitalized O B-E O O O B-L I-L The Phoenicians came from the Red Sea 19 19

39 NER as Sequence Tagging Not capitalized Tagged as VB O B-E O O O B-L I-L The Phoenicians came from the Red Sea 19 19

40 NER as Sequence Tagging B-E to right Not capitalized Tagged as VB O B-E O O O B-L I-L The Phoenicians came from the Red Sea 19 19

41 NER as Sequence Tagging O B-E O O O B-L I-L The Phoenicians came from the Red Sea 20 20

42 NER as Sequence Tagging Word sea O B-E O O O B-L I-L The Phoenicians came from the Red Sea 20 20

43 NER as Sequence Tagging Word sea preceded by the ADJ Word sea O B-E O O O B-L I-L The Phoenicians came from the Red Sea 20 20

44 NER as Sequence Tagging Word sea preceded by the ADJ Hard constraint: I-L must follow B-L or I-L Word sea O B-E O O O B-L I-L The Phoenicians came from the Red Sea 20 20

45 Great Ideas in ML: Message Passing adapted from MacKay (2003) textbook 21 21

46 Great Ideas in ML: Message Passing Count the soldiers adapted from MacKay (2003) textbook 21 21

47 Great Ideas in ML: Message Passing Count the soldiers 3 behind you 2 behind you 1 behind you adapted from MacKay (2003) textbook 21 21

48 Great Ideas in ML: Message Passing Count the soldiers there s 1 of me 3 behind you 2 behind you 1 behind you adapted from MacKay (2003) textbook 21 21

49 Great Ideas in ML: Message Passing Count the soldiers there s 1 of me 5 behind you 4 behind you 3 behind you 2 behind you 1 behind you adapted from MacKay (2003) textbook 21 21

50 Great Ideas in ML: Message Passing Count the soldiers 1 before you 2 before you 5 behind you 4 behind you 3 behind you 2 behind you 1 behind you adapted from MacKay (2003) textbook 21 21

51 Great Ideas in ML: Message Passing Count the soldiers 1 before you 2 before you 3 before you 4 before you 5 before you 5 behind you 4 behind you 3 behind you 2 behind you 1 behind you adapted from MacKay (2003) textbook 21 21

52 Great Ideas in ML: Message Passing Count the soldiers 2 before you there s 1 of me only see my incoming messages 3 behind you adapted from MacKay (2003) textbook 22 22

53 Great Ideas in ML: Message Passing Count the soldiers 2 before you there s 1 of me Belief: Must be = 6 of us only see my incoming messages 3 behind you adapted from MacKay (2003) textbook 22 22

54 Great Ideas in ML: Message Passing Count the soldiers 2 before you there s 1 of me Belief: Must be = 6 of us only see my incoming messages 3 behind you adapted from MacKay (2003) textbook 22 22

55 Great Ideas in ML: Message Passing Count the soldiers 1 before you there s 1 of me Belief: Must be = 6 of us only see my incoming messages 4 behind you adapted from MacKay (2003) textbook 23 23

56 Great Ideas in ML: Message Passing Count the soldiers 1 before you there s 1 of me Belief: Must be = 6 of us only see my incoming messages 4 behind you adapted from MacKay (2003) textbook 23 23

57 Great Ideas in ML: Message Passing Each soldier receives reports from all branches of tree adapted from MacKay (2003) textbook 24 24

58 Great Ideas in ML: Message Passing Each soldier receives reports from all branches of tree 3 here 7 here adapted from MacKay (2003) textbook 24 24

59 Great Ideas in ML: Message Passing Each soldier receives reports from all branches of tree 3 here 7 here 1 of me 11 here (= 7+3+1) adapted from MacKay (2003) textbook 24 24

60 Great Ideas in ML: Message Passing Each soldier receives reports from all branches of tree adapted from MacKay (2003) textbook 25 25

61 Great Ideas in ML: Message Passing Each soldier receives reports from all branches of tree 3 here 3 here adapted from MacKay (2003) textbook 25 25

62 Great Ideas in ML: Message Passing Each soldier receives reports from all branches of tree 3 here 7 here (= 3+3+1) 3 here adapted from MacKay (2003) textbook 25 25

63 Great Ideas in ML: Message Passing Each soldier receives reports from all branches of tree adapted from MacKay (2003) textbook 26 26

64 Great Ideas in ML: Message Passing Each soldier receives reports from all branches of tree 7 here 3 here adapted from MacKay (2003) textbook 26 26

65 Great Ideas in ML: Message Passing Each soldier receives reports from all branches of tree 11 here (= 7+3+1) 7 here 3 here adapted from MacKay (2003) textbook 26 26

66 Great Ideas in ML: Message Passing Each soldier receives reports from all branches of tree adapted from MacKay (2003) textbook 27 27

67 Great Ideas in ML: Message Passing Each soldier receives reports from all branches of tree Belief: Must be 14 of us adapted from MacKay (2003) textbook 27 27

68 Great Ideas in ML: Message Passing Each soldier receives reports from all branches of tree 3 here 7 here 3 here Belief: Must be 14 of us adapted from MacKay (2003) textbook 27 27

69 Great Ideas in ML: Message Passing Each soldier receives reports from all branches of tree 3 here 7 here 3 here Belief: Must be 14 of us adapted from MacKay (2003) textbook 28 28

70 Great Ideas in ML: Message Passing Each soldier receives reports from all branches of tree 3 here 7 here 3 here Belief: Must be 14 of us wouldn t work correctly with a loopy (cyclic) graph adapted from MacKay (2003) textbook 28 28

71 Great ideas in ML: Forward-Backward n In the CRF, message passing = forward-backward v n a v n a v n a v n a find preferred tags 29 29

72 Great ideas in ML: Forward-Backward n In the CRF, message passing = forward-backward belief v 1.8 n 0 a 4.2 v n a v n a v n a v n a find preferred tags 29 29

73 Great ideas in ML: Forward-Backward n In the CRF, message passing = forward-backward message α belief v 1.8 n 0 a 4.2 β message v n a v 3 v n 1 n a 6 a v 2 v n a nv an a find preferred tags 29 29

74 Great ideas in ML: Forward-Backward n In the CRF, message passing = forward-backward message α belief v 1.8 n 0 a 4.2 β message v n a v 3 v n 1 n a 6 a v 2 v n a nv an a v 0.3 n 0 a 0.1 find preferred tags 29 29

75 Great ideas in ML: Forward-Backward n In the CRF, message passing = forward-backward α message α belief v 1.8 n 0 a 4.2 β message v 7 n 2 a 1 v n a v 3 v n 1 n a 6 a v 2 v n a nv an a v 0.3 n 0 a 0.1 find preferred tags 29 29

76 Great ideas in ML: Forward-Backward n In the CRF, message passing = forward-backward α message α belief v 1.8 n 0 a 4.2 β message v 7 n 2 a 1 v 3 n 1 a 6 v 2 v n a nv an a v 0.3 n 0 a 0.1 find preferred tags 29 29

77 Great ideas in ML: Forward-Backward n In the CRF, message passing = forward-backward α message α belief v 1.8 n 0 a 4.2 β message v 7 n 2 a 1 v 3 n 1 a 6 v 2 n 1 a 7 v 0.3 n 0 a 0.1 find preferred tags 29 29

78 Great ideas in ML: Forward-Backward n In the CRF, message passing = forward-backward α message α belief v 1.8 n 0 a 4.2 β message v 7 n 2 a 1 v n a v 3 v n 1 n a 6 a v 2 n 1 a 7 v 0.3 n 0 a 0.1 find preferred tags 29 29

79 Great ideas in ML: Forward-Backward n In the CRF, message passing = forward-backward α message α belief v 1.8 n 0 a 4.2 β message β v 7 n 2 a 1 v n a v 3 v n 1 n a 6 a v 2 n 1 a 7 v 3 n 6 a 1 v 0.3 n 0 a 0.1 find preferred tags 29 29

80 Great ideas in ML: Forward-Backward n In the CRF, message passing = forward-backward α message α belief v 1.8 n 0 a 4.2 β message β v 7 n 2 a 1 v n a v 3 v n 1 n a 6 a v 2 v n a nv an a v 3 n 6 a 1 v 0.3 n 0 a 0.1 find preferred tags 29 29

81 Named En(ty Recogni(on Accurate recogni(on requires about 1M words of training data (1,500 news stories) may be more expensive than developing rules for some applica(ons Both rule- based and sta(s(cal can achieve about 90% effec(veness for categories such as names, loca(ons, organiza(ons others, such as product name, can be much worse 30

82 Interna(onaliza(on 2/3 of the Web is in English About 50% of Web users do not use English as their primary language Many (maybe most) search applica(ons have to deal with mul(ple languages monolingual search: search in one language, but with many possible languages cross- language search: search in mul(ple languages at the same (me 31

83 Interna(onaliza(on Many aspects of search engines are language- neutral Major differences: Text encoding (conver(ng to Unicode) Tokenizing (many languages have no word separators) Stemming Cultural differences may also impact interface design and features provided 32

84 Chinese Tokenizing 33

Information Extraction. CS6200 Information Retrieval (and a sort of advertisement for NLP in the spring)

Information Extraction. CS6200 Information Retrieval (and a sort of advertisement for NLP in the spring) Information Extraction CS6200 Information Retrieval (and a sort of advertisement for NLP in the spring) Informa(on Extrac(on Automa(cally extract structure from text annotate document using tags to iden(fy

More information

Part of Speech Tagging & Hidden Markov Models (Part 1) Mitch Marcus CIS 421/521

Part of Speech Tagging & Hidden Markov Models (Part 1) Mitch Marcus CIS 421/521 Part of Speech Tagging & Hidden Markov Models (Part 1) Mitch Marcus CIS 421/521 NLP Task I Determining Part of Speech Tags Given a text, assign each token its correct part of speech (POS) tag, given its

More information

6.02 Fall 2013 Lecture #7

6.02 Fall 2013 Lecture #7 6. Fall Lecture #7 Viterbi decoding of convoluonal codes 6. Fall Lecture 7, Slide # Convolutional Coding Shift Register View + mod p [n] x[n] x[n-] x[n-] The values in the registers define the state of

More information

Relation Extraction, Neural Network, and Matrix Factorization

Relation Extraction, Neural Network, and Matrix Factorization Relation Extraction, Neural Network, and Matrix Factorization Presenter: Haw-Shiuan Chang UMass CS585 guest lecture on 2016 Nov. 17 Most slides prepared by Patrick Verga Relation Extraction Knowledge Graph

More information

Dance Movement Patterns Recognition (Part II)

Dance Movement Patterns Recognition (Part II) Dance Movement Patterns Recognition (Part II) Jesús Sánchez Morales Contents Goals HMM Recognizing Simple Steps Recognizing Complex Patterns Auto Generation of Complex Patterns Graphs Test Bench Conclusions

More information

Research Seminar. Stefano CARRINO fr.ch

Research Seminar. Stefano CARRINO  fr.ch Research Seminar Stefano CARRINO stefano.carrino@hefr.ch http://aramis.project.eia- fr.ch 26.03.2010 - based interaction Characterization Recognition Typical approach Design challenges, advantages, drawbacks

More information

6. FUNDAMENTALS OF CHANNEL CODER

6. FUNDAMENTALS OF CHANNEL CODER 82 6. FUNDAMENTALS OF CHANNEL CODER 6.1 INTRODUCTION The digital information can be transmitted over the channel using different signaling schemes. The type of the signal scheme chosen mainly depends on

More information

WHITE PAPER. NLP TOOL (Natural Language Processing) User Case: isocialcube (Social Networks Campaign Management)

WHITE PAPER. NLP TOOL (Natural Language Processing) User Case: isocialcube (Social Networks Campaign Management) WHITE PAPER NLP TOOL (Natural Language Processing) User Case: isocialcube (Social Networks Campaign Management) www.aynitech.com What does the Customer need? isocialcube s (ISC) helps companies manage

More information

Mobile Wireless Channel Dispersion State Model

Mobile Wireless Channel Dispersion State Model Mobile Wireless Channel Dispersion State Model Enabling Cognitive Processing Situational Awareness Kenneth D. Brown Ph.D. Candidate EECS University of Kansas kenneth.brown@jhuapl.edu Dr. Glenn Prescott

More information

MITOCW MITRES6_012S18_L26-06_300k

MITOCW MITRES6_012S18_L26-06_300k MITOCW MITRES6_012S18_L26-06_300k In this video, we are going to calculate interesting quantities that have to do with the short-term behavior of Markov chains as opposed to those dealing with long-term

More information

Outline. Communications Engineering 1

Outline. Communications Engineering 1 Outline Introduction Signal, random variable, random process and spectra Analog modulation Analog to digital conversion Digital transmission through baseband channels Signal space representation Optimal

More information

CS188 Spring 2010 Section 3: Game Trees

CS188 Spring 2010 Section 3: Game Trees CS188 Spring 2010 Section 3: Game Trees 1 Warm-Up: Column-Row You have a 3x3 matrix of values like the one below. In a somewhat boring game, player A first selects a row, and then player B selects a column.

More information

CS 188: Artificial Intelligence Spring Speech in an Hour

CS 188: Artificial Intelligence Spring Speech in an Hour CS 188: Artificial Intelligence Spring 2006 Lecture 19: Speech Recognition 3/23/2006 Dan Klein UC Berkeley Many slides from Dan Jurafsky Speech in an Hour Speech input is an acoustic wave form s p ee ch

More information

Speech Processing. Simon King University of Edinburgh. additional lecture slides for

Speech Processing. Simon King University of Edinburgh. additional lecture slides for Speech Processing Simon King University of Edinburgh additional lecture slides for 2018-19 assignment Q&A writing exercise Roadmap Modules 1-2: The basics Modules 3-5: Speech synthesis Modules 6-9: Speech

More information

3. Data and sampling. Plan for today

3. Data and sampling. Plan for today 3. Data and sampling Business Statistics Plan for today Reminders and introduction Data: qualitative and quantitative Quantitative data: discrete and continuous Qualitative data discussion Samples and

More information

Extracting Social Networks from Literary Fiction

Extracting Social Networks from Literary Fiction Extracting Social Networks from Literary Fiction David K. Elson, Nicholas Dames, Kathleen R. McKeown Presented by Audrey Lawrence and Kathryn Lingel Introduction Network of 19th century novel's social

More information

CHORD RECOGNITION USING INSTRUMENT VOICING CONSTRAINTS

CHORD RECOGNITION USING INSTRUMENT VOICING CONSTRAINTS CHORD RECOGNITION USING INSTRUMENT VOICING CONSTRAINTS Xinglin Zhang Dept. of Computer Science University of Regina Regina, SK CANADA S4S 0A2 zhang46x@cs.uregina.ca David Gerhard Dept. of Computer Science,

More information

Participant Identification in Haptic Systems Using Hidden Markov Models

Participant Identification in Haptic Systems Using Hidden Markov Models HAVE 25 IEEE International Workshop on Haptic Audio Visual Environments and their Applications Ottawa, Ontario, Canada, 1-2 October 25 Participant Identification in Haptic Systems Using Hidden Markov Models

More information

Introduction to Markov Models

Introduction to Markov Models Introduction to Markov Models But first: A few preliminaries Estimating the probability of phrases of words, sentences, etc. CIS 391 - Intro to AI 2 What counts as a word? A tricky question. How to find

More information

CS 540: Introduction to Artificial Intelligence

CS 540: Introduction to Artificial Intelligence CS 540: Introduction to Artificial Intelligence Mid Exam: 7:15-9:15 pm, October 25, 2000 Room 1240 CS & Stats CLOSED BOOK (one sheet of notes and a calculator allowed) Write your answers on these pages

More information

Chapter 3 Convolutional Codes and Trellis Coded Modulation

Chapter 3 Convolutional Codes and Trellis Coded Modulation Chapter 3 Convolutional Codes and Trellis Coded Modulation 3. Encoder Structure and Trellis Representation 3. Systematic Convolutional Codes 3.3 Viterbi Decoding Algorithm 3.4 BCJR Decoding Algorithm 3.5

More information

Advanced Techniques for Mobile Robotics Location-Based Activity Recognition

Advanced Techniques for Mobile Robotics Location-Based Activity Recognition Advanced Techniques for Mobile Robotics Location-Based Activity Recognition Wolfram Burgard, Cyrill Stachniss, Kai Arras, Maren Bennewitz Activity Recognition Based on L. Liao, D. J. Patterson, D. Fox,

More information

ECE710 Space Time Coding For Wireless Communication HW3

ECE710 Space Time Coding For Wireless Communication HW3 THIS IS FOR LEFT PAGES 1 ECE710 Space Time Coding For Wireless Communication HW3 Zhirong Li Electrical & Computer Engineering Department University of Waterloo, Waterloo, ON, Canada z32li@engmail.uwaterloo.ca

More information

CS188 Spring 2010 Section 3: Game Trees

CS188 Spring 2010 Section 3: Game Trees CS188 Spring 2010 Section 3: Game Trees 1 Warm-Up: Column-Row You have a 3x3 matrix of values like the one below. In a somewhat boring game, player A first selects a row, and then player B selects a column.

More information

CS 188 Introduction to Fall 2014 Artificial Intelligence Midterm

CS 188 Introduction to Fall 2014 Artificial Intelligence Midterm CS 88 Introduction to Fall Artificial Intelligence Midterm INSTRUCTIONS You have 8 minutes. The exam is closed book, closed notes except a one-page crib sheet. Please use non-programmable calculators only.

More information

신경망기반자동번역기술. Konkuk University Computational Intelligence Lab. 김강일

신경망기반자동번역기술. Konkuk University Computational Intelligence Lab.  김강일 신경망기반자동번역기술 Konkuk University Computational Intelligence Lab. http://ci.konkuk.ac.kr kikim01@kunkuk.ac.kr 김강일 Index Issues in AI and Deep Learning Overview of Machine Translation Advanced Techniques in

More information

RADIO SYSTEMS ETIN15. Channel Coding. Ove Edfors, Department of Electrical and Information Technology

RADIO SYSTEMS ETIN15. Channel Coding. Ove Edfors, Department of Electrical and Information Technology RADIO SYSTEMS ETIN15 Lecture no: 7 Channel Coding Ove Edfors, Department of Electrical and Information Technology Ove.Edfors@eit.lth.se 2016-04-18 Ove Edfors - ETIN15 1 Contents (CHANNEL CODING) Overview

More information

Project. B) Building the PWM Read the instructions of HO_14. 1) Determine all the 9-mers and list them here:

Project. B) Building the PWM Read the instructions of HO_14. 1) Determine all the 9-mers and list them here: Project Please choose ONE project among the given five projects. The last three projects are programming projects. hoose any programming language you want. Note that you can also write programs for the

More information

A Gentle Introduction to Dynamic Programming and the Viterbi Algorithm

A Gentle Introduction to Dynamic Programming and the Viterbi Algorithm A Gentle Introduction to Dynamic Programming and the Viterbi Algorithm Dr. Hubert Kaeslin Microelectronics Design Center ETH Zürich Extra teaching material for Digital Integrated Circuit Design, from VLSI

More information

Lesson Activity Toolkit

Lesson Activity Toolkit Lesson Activity Toolkit Tool name Tool definition Ideas for tool use Screen shot of tool Activities Anagram Unscramble given letters to solve problems. Unscramble for word games Category sort - Category

More information

Searching for Solu4ons. Searching for Solu4ons. Example: Traveling Romania. Example: Vacuum World 9/8/09

Searching for Solu4ons. Searching for Solu4ons. Example: Traveling Romania. Example: Vacuum World 9/8/09 Searching for Solu4ons Searching for Solu4ons CISC481/681, Lecture #3 Ben Cartere@e Characterize a task or problem as a search for something In the agent view, a search for a sequence of ac4ons that will

More information

Spreading Codes and Characteristics. Error Correction Codes

Spreading Codes and Characteristics. Error Correction Codes Spreading Codes and Characteristics and Error Correction Codes Global Navigational Satellite Systems (GNSS-6) Short course, NERTU Prasad Krishnan International Institute of Information Technology, Hyderabad

More information

1 Introduction. 1.1 Game play. CSC 261 Lab 4: Adversarial Search Fall Assigned: Tuesday 24 September 2013

1 Introduction. 1.1 Game play. CSC 261 Lab 4: Adversarial Search Fall Assigned: Tuesday 24 September 2013 CSC 261 Lab 4: Adversarial Search Fall 2013 Assigned: Tuesday 24 September 2013 Due: Monday 30 September 2011, 11:59 p.m. Objectives: Understand adversarial search implementations Explore performance implications

More information

Chapter 6: Memory: Information and Secret Codes. CS105: Great Insights in Computer Science

Chapter 6: Memory: Information and Secret Codes. CS105: Great Insights in Computer Science Chapter 6: Memory: Information and Secret Codes CS105: Great Insights in Computer Science Overview When we decide how to represent something in bits, there are some competing interests: easily manipulated/processed

More information

Service Robots in an Intelligent House

Service Robots in an Intelligent House Service Robots in an Intelligent House Jesus Savage Bio-Robotics Laboratory biorobotics.fi-p.unam.mx School of Engineering Autonomous National University of Mexico UNAM 2017 OUTLINE Introduction A System

More information

Rhythm Analysis in Music

Rhythm Analysis in Music Rhythm Analysis in Music EECS 352: Machine Percep;on of Music & Audio Zafar Rafii, Winter 24 Some Defini;ons Rhythm movement marked by the regulated succession of strong and weak elements, or of opposite

More information

NLP, Games, and Robotic Cars

NLP, Games, and Robotic Cars NLP, Games, and Robotic Cars [These slides were created by Dan Klein and Pieter Abbeel for CS188 Intro to AI at UC Berkeley. All CS188 materials are available at http://ai.berkeley.edu.] So Far: Foundational

More information

Channel Coding RADIO SYSTEMS ETIN15. Lecture no: Ove Edfors, Department of Electrical and Information Technology

Channel Coding RADIO SYSTEMS ETIN15. Lecture no: Ove Edfors, Department of Electrical and Information Technology RADIO SYSTEMS ETIN15 Lecture no: 7 Channel Coding Ove Edfors, Department of Electrical and Information Technology Ove.Edfors@eit.lth.se 2012-04-23 Ove Edfors - ETIN15 1 Contents (CHANNEL CODING) Overview

More information

Two Bracketing Schemes for the Penn Treebank

Two Bracketing Schemes for the Penn Treebank Anssi Yli-Jyrä Two Bracketing Schemes for the Penn Treebank Abstract The trees in the Penn Treebank have a standard representation that involves complete balanced bracketing. In this article, an alternative

More information

Communication Theory II

Communication Theory II Communication Theory II Lecture 13: Information Theory (cont d) Ahmed Elnakib, PhD Assistant Professor, Mansoura University, Egypt March 22 th, 2015 1 o Source Code Generation Lecture Outlines Source Coding

More information

Announcements. Today. Speech and Language. State Path Trellis. HMMs: MLE Queries. Introduction to Artificial Intelligence. V22.

Announcements. Today. Speech and Language. State Path Trellis. HMMs: MLE Queries. Introduction to Artificial Intelligence. V22. Introduction to Artificial Intelligence Announcements V22.0472-001 Fall 2009 Lecture 19: Speech Recognition & Viterbi Decoding Rob Fergus Dept of Computer Science, Courant Institute, NYU Slides from John

More information

Lecture 19 (Geometric Optics I Plane and Spherical Optics) Physics Spring 2018 Douglas Fields

Lecture 19 (Geometric Optics I Plane and Spherical Optics) Physics Spring 2018 Douglas Fields Lecture 19 (Geometric Optics I Plane and Spherical Optics) Physics 262-01 Spring 2018 Douglas Fields Optics -Wikipedia Optics is the branch of physics which involves the behavior and properties of light,

More information

Scheduling. Radek Mařík. April 28, 2015 FEE CTU, K Radek Mařík Scheduling April 28, / 48

Scheduling. Radek Mařík. April 28, 2015 FEE CTU, K Radek Mařík Scheduling April 28, / 48 Scheduling Radek Mařík FEE CTU, K13132 April 28, 2015 Radek Mařík (marikr@fel.cvut.cz) Scheduling April 28, 2015 1 / 48 Outline 1 Introduction to Scheduling Methodology Overview 2 Classification of Scheduling

More information

Reinforcement Learning in Games Autonomous Learning Systems Seminar

Reinforcement Learning in Games Autonomous Learning Systems Seminar Reinforcement Learning in Games Autonomous Learning Systems Seminar Matthias Zöllner Intelligent Autonomous Systems TU-Darmstadt zoellner@rbg.informatik.tu-darmstadt.de Betreuer: Gerhard Neumann Abstract

More information

Maximum Likelihood Sequence Detection (MLSD) and the utilization of the Viterbi Algorithm

Maximum Likelihood Sequence Detection (MLSD) and the utilization of the Viterbi Algorithm Maximum Likelihood Sequence Detection (MLSD) and the utilization of the Viterbi Algorithm Presented to Dr. Tareq Al-Naffouri By Mohamed Samir Mazloum Omar Diaa Shawky Abstract Signaling schemes with memory

More information

AN INTRODUCTION TO ERROR CORRECTING CODES Part 2

AN INTRODUCTION TO ERROR CORRECTING CODES Part 2 AN INTRODUCTION TO ERROR CORRECTING CODES Part Jack Keil Wolf ECE 54 C Spring BINARY CONVOLUTIONAL CODES A binary convolutional code is a set of infinite length binary sequences which satisfy a certain

More information

Seman&c Web Mo&va&ng Example

Seman&c Web Mo&va&ng Example Seman&c Web Mo&va&ng Example A Mo&va&ng example Here s a mo&va&ng example, adapted from a presenta&on by Ivan Herman It introduces seman&c web concepts And illustrates the benefits of represen&ng your

More information

CS188 Spring 2014 Section 3: Games

CS188 Spring 2014 Section 3: Games CS188 Spring 2014 Section 3: Games 1 Nearly Zero Sum Games The standard Minimax algorithm calculates worst-case values in a zero-sum two player game, i.e. a game in which for all terminal states s, the

More information

Study Singular They in Contemporary English. Bich Ngoc Do

Study Singular They in Contemporary English. Bich Ngoc Do Study Singular They in Contemporary English Bich Ngoc Do Content 1. Introduction 2. Similar Works 3. Data Collection 4. Statistical Analysis 5. Conclusion 1. Introduction Gender in English O Male-oriented

More information

Sea-battlefield Situation Assessment based on Improved Decision Tree

Sea-battlefield Situation Assessment based on Improved Decision Tree Applied Mechanics and Materials Submitted: 2014-05-14 ISSN: 1662-7482, Vol. 574, pp 639-645 Accepted: 2014-05-15 doi:10.4028/www.scientific.net/amm.574.639 Online: 2014-07-18 2014 Trans Tech Publications,

More information

AERONAUTICAL CHANNEL MODELING FOR PACKET NETWORK SIMULATORS

AERONAUTICAL CHANNEL MODELING FOR PACKET NETWORK SIMULATORS AERONAUTICAL CHANNEL MODELING FOR PACKET NETWORK SIMULATORS Author: Sandarva Khanal Advisor: Dr. Richard A. Dean Department of Electrical and Computer Engineering Morgan State University ABSTRACT The introduction

More information

Battleship as a Dialog System Aaron Brackett, Gerry Meixiong, Tony Tan-Torres, Jeffrey Yu

Battleship as a Dialog System Aaron Brackett, Gerry Meixiong, Tony Tan-Torres, Jeffrey Yu Battleship as a Dialog System Aaron Brackett, Gerry Meixiong, Tony Tan-Torres, Jeffrey Yu Abstract For our project, we built a conversational agent for Battleship using Dialog systems. In this paper, we

More information

Application Areas of AI Artificial intelligence is divided into different branches which are mentioned below:

Application Areas of AI   Artificial intelligence is divided into different branches which are mentioned below: Week 2 - o Expert Systems o Natural Language Processing (NLP) o Computer Vision o Speech Recognition And Generation o Robotics o Neural Network o Virtual Reality APPLICATION AREAS OF ARTIFICIAL INTELLIGENCE

More information

CS 343: Artificial Intelligence

CS 343: Artificial Intelligence CS 343: Artificial Intelligence NLP, Games, and Autonomous Vehicles Prof. Scott Niekum The University of Texas at Austin [These slides based on those of Dan Klein and Pieter Abbeel for CS188 Intro to AI

More information

Department of Electronic Engineering FINAL YEAR PROJECT REPORT

Department of Electronic Engineering FINAL YEAR PROJECT REPORT Department of Electronic Engineering FINAL YEAR PROJECT REPORT BEngECE-2009/10-- Student Name: CHEUNG Yik Juen Student ID: Supervisor: Prof.

More information

Digital Image Processing in Medical Palmistry

Digital Image Processing in Medical Palmistry Digital Image Processing in Medical Palmistry Maduguri Sudhir Department of ECE KITS College, TS, India sudhirkmm@gmail.com E.V.Narayana Department of ECE KITS College, TS, India eluri.narayana@gmail.com

More information

Seman&c Web Mo&va&ng Example

Seman&c Web Mo&va&ng Example Seman&c Web Mo&va&ng Example A Mo&va&ng example Here s a mo&va&ng example, adapted from a presenta&on by Ivan Herman It introduces seman&c web concepts and illustrates the benefits of represen&ng your

More information

11/13/18. Introduction to RNNs for NLP. About Me. Overview SHANG GAO

11/13/18. Introduction to RNNs for NLP. About Me. Overview SHANG GAO Introduction to RNNs for NLP SHANG GAO About Me PhD student in the Data Science and Engineering program Took Deep Learning last year Work in the Biomedical Sciences, Engineering, and Computing group at

More information

Alternation in the repeated Battle of the Sexes

Alternation in the repeated Battle of the Sexes Alternation in the repeated Battle of the Sexes Aaron Andalman & Charles Kemp 9.29, Spring 2004 MIT Abstract Traditional game-theoretic models consider only stage-game strategies. Alternation in the repeated

More information

AUTOMATED MUSIC TRACK GENERATION

AUTOMATED MUSIC TRACK GENERATION AUTOMATED MUSIC TRACK GENERATION LOUIS EUGENE Stanford University leugene@stanford.edu GUILLAUME ROSTAING Stanford University rostaing@stanford.edu Abstract: This paper aims at presenting our method to

More information

SIMULATION VOICE RECOGNITION SYSTEM FOR CONTROLING ROBOTIC APPLICATIONS

SIMULATION VOICE RECOGNITION SYSTEM FOR CONTROLING ROBOTIC APPLICATIONS SIMULATION VOICE RECOGNITION SYSTEM FOR CONTROLING ROBOTIC APPLICATIONS 1 WAHYU KUSUMA R., 2 PRINCE BRAVE GUHYAPATI V 1 Computer Laboratory Staff., Department of Information Systems, Gunadarma University,

More information

Permutations and Combinations

Permutations and Combinations Permutations and Combinations Rosen, Chapter 5.3 Motivating question In a family of 3, how many ways can we arrange the members of the family in a line for a photograph? 1 Permutations A permutation of

More information

Design and Implementation of an Underlay Control Channel for NC-OFDM-Based Networks

Design and Implementation of an Underlay Control Channel for NC-OFDM-Based Networks Design and Implementation of an Underlay Control Channel for NC-OFDM-Based Networks Ratnesh Kumbhkar, Gokul Sridharan, Narayan B. Mandayam, Ivan Seskar (, Rutgers, The State University of New Jersey) and

More information

COMPUTATIONAL LINGUISTIC CREATIVITY

COMPUTATIONAL LINGUISTIC CREATIVITY COMPUTATIONAL LINGUISTIC CREATIVITY Khalid Alnajjar alnajjar[at]cs.helsinki.fi UNIVERSITY OF HELSINKI Department of Computer Science Khalid Alnajjar 6 Nov 2017 1/ 35 OUTLINE Introduction to Computational

More information

Synchronization using Insertion/Deletion Correcting Permutation Codes

Synchronization using Insertion/Deletion Correcting Permutation Codes Synchronization using Insertion/Deletion Correcting Permutation Codes Ling Cheng, Theo G. Swart and Hendrik C. Ferreira Department of Electrical and Electronic Engineering Science University of Johannesburg,

More information

LECTURE VI: LOSSLESS COMPRESSION ALGORITHMS DR. OUIEM BCHIR

LECTURE VI: LOSSLESS COMPRESSION ALGORITHMS DR. OUIEM BCHIR 1 LECTURE VI: LOSSLESS COMPRESSION ALGORITHMS DR. OUIEM BCHIR 2 STORAGE SPACE Uncompressed graphics, audio, and video data require substantial storage capacity. Storing uncompressed video is not possible

More information

Treebanks. LING 5200 Computational Corpus Linguistics Nianwen Xue

Treebanks. LING 5200 Computational Corpus Linguistics Nianwen Xue Treebanks LING 5200 Computational Corpus Linguistics Nianwen Xue 1 Outline Intuitions and tests for constituent structure Representing constituent structures Continuous constituents Discontinuous constituents

More information

Automated Generation of Timestamped Patent Abstracts at Scale to Outsmart Patent-Trolls

Automated Generation of Timestamped Patent Abstracts at Scale to Outsmart Patent-Trolls Automated Generation of Timestamped Patent Abstracts at Scale to Outsmart Patent-Trolls Felix Hamborg, Moustafa Elmaghraby, Corinna Breitinger, Bela Gipp Department of Computer and Information Science

More information

Mikko Myllymäki and Tuomas Virtanen

Mikko Myllymäki and Tuomas Virtanen NON-STATIONARY NOISE MODEL COMPENSATION IN VOICE ACTIVITY DETECTION Mikko Myllymäki and Tuomas Virtanen Department of Signal Processing, Tampere University of Technology Korkeakoulunkatu 1, 3370, Tampere,

More information

Card counting meets hidden Markov models

Card counting meets hidden Markov models University of New Mexico UNM Digital Repository Electrical and Computer Engineering ETDs Engineering ETDs 2-7-2011 Card counting meets hidden Markov models Steven J. Aragon Follow this and additional works

More information

Founding a Colony. I am a member of a colony. Our colony will be named. We are from:

Founding a Colony. I am a member of a colony. Our colony will be named. We are from: Founding a Colony 1 The year is 1650 AD. You are about to leave on a three-month ocean voyage to the New World where you will begin a new life. There are 20 people in your group. Having never been to this

More information

Theory of Computer Games: Concluding Remarks

Theory of Computer Games: Concluding Remarks Theory of Computer Games: Concluding Remarks Tsan-sheng Hsu tshsu@iis.sinica.edu.tw http://www.iis.sinica.edu.tw/~tshsu 1 Practical issues. The open book. The endgame database. Smart usage of resources.

More information

Learning Structured Predictors

Learning Structured Predictors Learning Structured Predictors Xavier Carreras Xerox Research Centre Europe Supervised (Structured) Prediction Learning to predict: given training data { (x (1), y (1) ), (x (2), y (2) ),..., (x (m), y

More information

Why TheProfiler? Save 9me, money, and water by knowing exactly how much moisture your crops need during the growing season.

Why TheProfiler? Save 9me, money, and water by knowing exactly how much moisture your crops need during the growing season. Why TheProfiler? TheProfiler is a soil moisture monitoring system that provides you reliable, ac9onable data that allows you to make well-informed irriga9on decisions. Save 9me, money, and water by knowing

More information

The Cyberne*cs Thought Collec*ve Project

The Cyberne*cs Thought Collec*ve Project The Cyberne*cs Thought Collec*ve Project Using Computa*onal Methods to Reveal Intellectual Context in Archival Material Bethany G. Anderson, Christopher J. Prom, Kevin Hamilton, James A. Hutchinson, Mark

More information

Documentation and Discussion

Documentation and Discussion 1 of 9 11/7/2007 1:21 AM ASSIGNMENT 2 SUBJECT CODE: CS 6300 SUBJECT: ARTIFICIAL INTELLIGENCE LEENA KORA EMAIL:leenak@cs.utah.edu Unid: u0527667 TEEKO GAME IMPLEMENTATION Documentation and Discussion 1.

More information

Statistical Communication Theory

Statistical Communication Theory Statistical Communication Theory Mark Reed 1 1 National ICT Australia, Australian National University 21st February 26 Topic Formal Description of course:this course provides a detailed study of fundamental

More information

A New Forecasting System using the Latent Dirichlet Allocation (LDA) Topic Modeling Technique

A New Forecasting System using the Latent Dirichlet Allocation (LDA) Topic Modeling Technique A New Forecasting System using the Latent Dirichlet Allocation (LDA) Topic Modeling Technique JU SEOP PARK, NA RANG KIM, HYUNG-RIM CHOI, EUNJUNG HAN Department of Management Information Systems Dong-A

More information

Course Outline. Textbook: G. Michael Schneider and Judith L. Gersting, "Invitation to Computer Science C++ Version," 3rd Edition, Thomson, 2004.

Course Outline. Textbook: G. Michael Schneider and Judith L. Gersting, Invitation to Computer Science C++ Version, 3rd Edition, Thomson, 2004. 2005/Sep/12 1 Course Outline Textbook: G. Michael Schneider and Judith L. Gersting, "Invitation to Computer Science C++ Version," 3rd Edition, Thomson, 2004. Outline 1. The Algorithm Foundations of Computer

More information

Multitree Decoding and Multitree-Aided LDPC Decoding

Multitree Decoding and Multitree-Aided LDPC Decoding Multitree Decoding and Multitree-Aided LDPC Decoding Maja Ostojic and Hans-Andrea Loeliger Dept. of Information Technology and Electrical Engineering ETH Zurich, Switzerland Email: {ostojic,loeliger}@isi.ee.ethz.ch

More information

Neural Architectures for Named Entity Recognition

Neural Architectures for Named Entity Recognition Neural Architectures for Named Entity Recognition Presented by Allan June 16, 2017 Slides: http://www.statnlp.org/event/naner.html Some content is taken from the original slides. Named Entity Recognition

More information

Space engineering. Space data links - Telemetry synchronization and channel coding. ECSS-E-ST-50-01C 31 July 2008

Space engineering. Space data links - Telemetry synchronization and channel coding. ECSS-E-ST-50-01C 31 July 2008 ECSS-E-ST-50-01C Space engineering Space data links - Telemetry synchronization and channel coding ECSS Secretariat ESA-ESTEC Requirements & Standards Division Noordwijk, The Netherlands Foreword This

More information

Completing Telephoning Phrases Brainstorming and Roleplays

Completing Telephoning Phrases Brainstorming and Roleplays Completing Telephoning Phrases Brainstorming and Roleplays Work together and brainstorm at least three things for each gap below. Try to make the examples you make up as different as possible, and try

More information

Homeroom. Turn in SIGNED interims. Picture of PINK before electives

Homeroom. Turn in SIGNED interims. Picture of PINK before electives Homeroom Turn in SIGNED interims Picture of PINK before electives Welcome Back! Happy Spirit Week! Need: NOTEBOOKS, New Warm Up Sheet, and Lost Colony story map **Turn in CURRENT EVENTS AND WARM UPS from

More information

Below are four problems which are comparable in organization, complexity and length to the four problems on the upcoming Ling 100 final.

Below are four problems which are comparable in organization, complexity and length to the four problems on the upcoming Ling 100 final. Ling 100 Sample Final Below are four problems which are comparable in organization, complexity and length to the four problems on the upcoming Ling 100 final. Problem 1 Problem 3.4 (Maltese) from the Language

More information

International Journal of Scientific & Engineering Research Volume 9, Issue 3, March ISSN

International Journal of Scientific & Engineering Research Volume 9, Issue 3, March ISSN International Journal of Scientific & Engineering Research Volume 9, Issue 3, March-2018 1605 FPGA Design and Implementation of Convolution Encoder and Viterbi Decoder Mr.J.Anuj Sai 1, Mr.P.Kiran Kumar

More information

Random Signals Detection Estimation And Data Analysis Solution Manual

Random Signals Detection Estimation And Data Analysis Solution Manual Random Signals Detection Estimation And Data Analysis Solution Manual Random Signals Detection Estimation And Data Analysis Solution Manual Editors Samsung Anyway S102 Manual by Staff on February 27, 2009

More information

Simple Large-scale Relation Extraction from Unstructured Text

Simple Large-scale Relation Extraction from Unstructured Text Simple Large-scale Relation Extraction from Unstructured Text Christos Christodoulopoulos and Arpit Mittal Amazon Research Cambridge Alexa Question Answering Alexa, what books did Carrie Fisher write?

More information

Master s Thesis Defense

Master s Thesis Defense Master s Thesis Defense Comparison of Noncoherent Detectors for SOQPSK and GMSK in Phase Noise Channels Afzal Syed August 17, 2007 Committee Dr. Erik Perrins (Chair) Dr. Glenn Prescott Dr. Daniel Deavours

More information

Cómo estructurar un buen proyecto de Machine Learning? Anna Bosch Rue VP Data Launchmetrics

Cómo estructurar un buen proyecto de Machine Learning? Anna Bosch Rue VP Data Launchmetrics Cómo estructurar un buen proyecto de Machine Learning? Anna Bosch Rue VP Data Intelligence @ Launchmetrics annaboschrue@gmail.com Motivating example 90% Accuracy and you want to do better IDEAS: - Collect

More information

Coalescence. Outline History. History, Model, and Application. Coalescence. The Model. Application

Coalescence. Outline History. History, Model, and Application. Coalescence. The Model. Application Coalescence History, Model, and Application Outline History Origins of theory/approach Trace the incorporation of other s ideas Coalescence Definition and descriptions The Model Assumptions and Uses Application

More information

Hour of Code at Box Island! Curriculum

Hour of Code at Box Island! Curriculum Hour of Code at Box Island! Curriculum Welcome to the Box Island curriculum! First of all, we want to thank you for showing interest in using this game with your children or students. Coding is becoming

More information

MAS160: Signals, Systems & Information for Media Technology. Problem Set 4. DUE: October 20, 2003

MAS160: Signals, Systems & Information for Media Technology. Problem Set 4. DUE: October 20, 2003 MAS160: Signals, Systems & Information for Media Technology Problem Set 4 DUE: October 20, 2003 Instructors: V. Michael Bove, Jr. and Rosalind Picard T.A. Jim McBride Problem 1: Simple Psychoacoustic Masking

More information

Real Time Word to Picture Translation for Chinese Restaurant Menus

Real Time Word to Picture Translation for Chinese Restaurant Menus Real Time Word to Picture Translation for Chinese Restaurant Menus Michelle Jin, Ling Xiao Wang, Boyang Zhang Email: mzjin12, lx2wang, boyangz @stanford.edu EE268 Project Report, Spring 2014 Abstract--We

More information

7 Costly Presentation. Mistakes Every Speaker Must Avoid! The Perfect Pitch That Sells.

7 Costly Presentation. Mistakes Every Speaker Must Avoid! The Perfect Pitch That Sells. 7 Costly Presentation Mistakes Every Speaker Must Avoid! 1Bullets Kill Too many bullet points are a nightmare for your audience. Seeing a block of text with a dozen bullet points is when your audience

More information

Building a Business Knowledge Base by a Supervised Learning and Rule-Based Method

Building a Business Knowledge Base by a Supervised Learning and Rule-Based Method KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS VOL. 9, NO. 1, Jan. 2015 407 Copyright 2015 KSII Building a Business Knowledge Base by a Supervised Learning and Rule-Based Method Sungho Shin 1, 2,

More information

Curriculum vitae. Dr Theologos Athanaselis

Curriculum vitae. Dr Theologos Athanaselis Dr Theologos Athanaselis ATHENS, SEPTEMBER 2010 PERSONNAL DATA Full name Theologos Athanaselis Date of birth 28 June 1976 Place of Birth Mytilene Nationality Greek Institute for Language and Speech Processing

More information

SONG RETRIEVAL SYSTEM USING HIDDEN MARKOV MODELS

SONG RETRIEVAL SYSTEM USING HIDDEN MARKOV MODELS SONG RETRIEVAL SYSTEM USING HIDDEN MARKOV MODELS AKSHAY CHANDRASHEKARAN ANOOP RAMAKRISHNA akshayc@cmu.edu anoopr@andrew.cmu.edu ABHISHEK JAIN GE YANG ajain2@andrew.cmu.edu younger@cmu.edu NIDHI KOHLI R

More information

Variations on the Two Envelopes Problem

Variations on the Two Envelopes Problem Variations on the Two Envelopes Problem Panagiotis Tsikogiannopoulos pantsik@yahoo.gr Abstract There are many papers written on the Two Envelopes Problem that usually study some of its variations. In this

More information