The Information Age has revolutionized the way students learn in the classroom. The United States Military Academy (USMA) emphasizes the importance of Information Technology (IT) through an academy-wide IT specific go...
详细信息
The Information Age has revolutionized the way students learn in the classroom. The United States Military Academy (USMA) emphasizes the importance of Information Technology (IT) through an academy-wide IT specific goal. This goal supports the USMA's mission of producing Army Officers who can respond effectively to technological changes in the defense of our nation. Courses augmented with IT can be daunting for cadets who lack the experience and confidence level to succeed in the course. As a result, these types of courses are avoided by cadets if at all possible. This is not an option for an aspiring officer who will lead the soldiers of tomorrow on a digitized battlefield. Since 1990, cadets have been issued a computer which has played a central role in bringing the power of IT to all graduates of the Military Academy. Integration of IT in the curriculum begins early with every cadet receiving a laptop computer. An integrated software package is included to support any course of instruction. Cadets receive two courses in IT, one in their freshman year and one in their junior year. The freshman course teaches the cadet the basic functionality of the laptop, a basic programming language, and creating a basic website. The junior course builds on the freshman course by teaching the cadets to create an advanced website, design and build a network, manage a database, and create an information system. IT plays a central role in several overlap courses between engineering and the humanities in such areas as information warfare, terrorism, and the legal aspects of intellectual property rights. What makes this approach unique is the methodical diffusion of IT into course design which removes the barrier between learning and the implementation of IT as an academic multiplier. An academy-wide committee consisting of 12 members is responsible for examining collected data to see how well the Military Academy is meeting its LT goal. This data comes from a variety of sources such
This paper puts forward a paradigm to resolve the real-time conflict detection using prior knowledge and context in CSCW plant design system from the plant design practice. Generally speaking, the performance of CSCW ...
详细信息
Infinite games with incomplete information are common in practice. First-price, sealed-bid auctions are a prototypical example. To solve this kind of infinite game, a heuristic approach is to discretise the strategy s...
详细信息
OWL-S Service Profile provides a way to describe services offered by providers and services needed by requesters. But some items in the Profile are not very suitable for describing a requester's demands while some...
详细信息
ISBN:
(纸本)9781577353386
OWL-S Service Profile provides a way to describe services offered by providers and services needed by requesters. But some items in the Profile are not very suitable for describing a requester's demands while some important information about the requester himself such as his identity which may play important role in precondition match are not considered in the Service Profile. In this paper we define an OWL compatible Request Profile ontology especially for service requesters to describe their special properties and their expectation about a service. Then a match algorithm is proposed to match service request described in Request Profile with service advertise described in Service Profile. The experiment results show that the match algorithm is efficient.
Most of existing approaches on event detection in sports video are general audience oriented. The extracted events are then presented to the audience without further analysis. However, professionals, such as soccer co...
详细信息
ISBN:
(纸本)9781595937025
Most of existing approaches on event detection in sports video are general audience oriented. The extracted events are then presented to the audience without further analysis. However, professionals, such as soccer coaches, are more interested in the tactics used in the events. In this paper, we present a novel approach to extract tactic information from the goal event in broadcast soccer video and present the goal event in a tactic mode to the coaches and sports professionals. We first extract goal events with far-view shots based on analysis and alignment of web-casting text and broadcast video. For a detected goal event, we employ a multi-object detection and tracking algorithm to obtain the players and ball trajectories in the shot. Compared with existing work, we proposed an effective tactic representation called aggregate trajectory which is constructed based on multiple trajectories using a novel analysis of temporal-spatial interaction among the players and the ball. The interactive relationship with play region information and hypothesis testing for trajectory temporal-spatial distribution are exploited to analyze the tactic patterns in a hierarchical coarse-to-fine framework. The experimental results on the data of FIFA World Cup 2006 are promising and demonstrate our approach is effective. Copyright 2007 ACM.
Due to the existence of a large amount of legacy information systems, how to obtain the information and integrate the legacy systems is becoming more and more concerned. This paper introduces the integration pattern b...
详细信息
This paper presents a maximum entropy model approach to identifying conjuncts of conjunctive structures in questions of financial domain from on-line discussion *** avoid phrasal ambiguity, only features in lexical an...
详细信息
This paper presents a maximum entropy model approach to identifying conjuncts of conjunctive structures in questions of financial domain from on-line discussion *** avoid phrasal ambiguity, only features in lexical and shallow syntactic level are *** conjunct detection problem is converted into a stepwise boundary identification task, reducing the search space of a n-word sentence from O(n2) to O(n), The best performance on the test set achieves 85.88% recall and 96% *** approach itself is domain-independent and can be used for conjunct identification in questions universally.
This paper presents an approach to combining VoIP auditing and speaker recognition,and an application of using speaker recognition on VoIP voice data is *** this paper,it deals with how to obtain VoIP voice data when ...
详细信息
This paper presents an approach to combining VoIP auditing and speaker recognition,and an application of using speaker recognition on VoIP voice data is *** this paper,it deals with how to obtain VoIP voice data when audio communication:signaling protocol analysis and voice data traffic *** converting the raw voice data to wave files,the speaker recognition can use them to identify the speaker and the result shows it is an effective *** paper also discusses the influence by codec compression and packet loss of VoIP communication.
暂无评论