3,522 research outputs found

    Detecting and parsing embedded lightweight structures

    Get PDF
    Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2005.Includes bibliographical references (p. 71-72).Text documents, web pages, and source code are all documents that contain language structures that can be parsed with corresponding parsers. Some documents, like JSP pages, Java tutorial pages, and Java source code, often have language structures that are nested within another language structure. Although parsers exist exclusively for the outer and inner language structure, neither is suited for parsing the embedded structures in the context of the document. This thesis presents a new technique for selectively applying existing parsers on intelligently transformed document content. The task of parsing these embedded structures can be broken up into two phases: detection of embedded structures and parsing of those embedded structures. In order to detect embedded structures, we take advantage of the fact that there are natural boundaries in any given language in which these embedded structures can appear. We use these natural boundaries to narrow our search space for embedded structures. We further reduce the search space by using statistical analysis of token frequency for different language types. By combining the use of natural boundaries and the use of token frequency analysis, we can, for any given document, generate a set of regions that have a high probability of being an embedded structure.(cont.) To parse the embedded structures, the text of the region must often be transformed into a form that is readable by the intended parser. Our approach provides a systematic way to transform the document content into a form that is appropriate for the embedded structure parser using simple replacement rules. Using our knowledge of natural boundaries and statistical analysis of token frequency, we are able to locate regions of embedded structures. Combined with replacement rules which transform document content into a parsable form, we are successfully able to parse a range of documents with embedded structures using existing parsers.by Philip Rha.M.Eng

    Effect of storgae conditions on dried scallions

    Get PDF
    Thesis: B.S., Massachusetts Institute of Technology, Department of Food Technology, 1962Includes bibliographical references (leaves 52-54).by Chokyun Rha Song.B.S.B.S. Massachusetts Institute of Technology, Department of Food Technolog

    "Terpi" As A Quantity Of Thermodynamic Potential Energy Supplementary To The Concept Of Work And Heat = Besaran "Terpi" Sebagai Energi Potensial Termodinamika yang Melengkapi Pengertian Kerja dan Kalor

    Get PDF
    ABSTRACT Isothermal reversible thermodynamic processes were studied, where there will not occur flow of heat (q) in the system in accord with the second law of thermodynamic. It appear that the energy flow in the system cannot be explained adequately by considering the flow of P,V â work, usually indicated by w, in accordance with the first law, that is, AU = q + w with q = 0. Therefore, it is necessary to have another kind of work energy (potential) which is not electrical to explain such as the experiment of Boyle that results in the formula PV = C for a close ideal gas system undergoing an isothermal and reversible process. In this paper, a new work potential which is called "terpi" is introduced, and is abbreviated as 2- (tau) and defined as: dr - T dSâv = - dqâ,,. Therefore, dr is also not an exact differential as dw and dq. For any isothermal reversible process, it can be written: 2- = -TAS,ev, and for redox reaction, such as an electrochemical cell, it is noteworthy to distinguish between Z system (2-eyed and z reaction (2-,) which combine together to become an electrical work flow, (wet) done by the system on the surrounding, so that: AG,= Tsyst + Tr =V FE Furthermore, the studies of phase transitions, which occur isothermally, were also considered, e.g. the evaporation of a liquid into vapour at a certain T. The heat given to this process cannot freely flow isothermally, but first it must be changed into terpy and then added to the enthalpy .of the vapour following the equation: 2-vap = -ThSvap -AHvap. Keywords: thermodynamics, heat, work, isothermal, reversibl

    Strategies for bridging the digital divide in education between South and North Korea after unification

    Get PDF
    2007The paper explores ways of bridging the digital divide between the two Koreas and applying ICT to educational development that will be mutually beneficial to North and South Korea on the way towards and after unification. It compares thinking and developments on both sides of the peace line and identifies the different priorities and programs that are currently under way. It shows that North Korea has a great interest in training professionals in the field of digital education but because of its economic conditions. North Korea is selectively training an elite core of ICT specialists to work in a few elite institutions and is still at the embryonic stage of development. By contrast, South Korea's educational development and e-transformation is at the proliferation stage. These differences are seen as constraining educational and economic development when unification becomes a reality. The study suggests that there should be a collaborative approach to addressing these issues and that this should be embarked on as soon as possible. It argues that this should be needs-based and built upon mutual understanding. It also envisages that there will be a need for a cross-sector approach, legal, regulatory and policy changes, expanded access to ICT, enhanced capacity to utilize ICT and professional development and it suggests how these might be achieved within a framework of peaceful coexistence and cooperation in education

    ICTV virus taxonomy profile: polymycoviridae 2022.

    Get PDF
    Members of the family Polymycoviridae are small viruses with multi-segmented and non-conventionally encapsidated double-stranded (ds) RNA genomes. Typically, polymycoviruses have four genomic segments, although some have up to eight. The genus Polymycovirus includes several species whose members infect fungi (ascomycetes and basidiomycetes), and oomycetes, altering host morphology, sporulation, growth and virulence. This is a summary of the International Committee on Taxonomy of Viruses (ICTV) Report on the family Polymycoviridae, which is available at ictv.global/report/polymycoviridae

    Evaluation and Developmental Plans for Interactive Videoconferencing System in Distance Education

    Get PDF
    1997In the fall of 1995, Korea National Open University launched a project to research use of the information super-highway with funds from the Ministry of Information and Communication. As a result, an interactive videoconference network was introduced for educational programs in the geographically scattered regional and local study centers. Using this network, the project connected 14 centers, introduced interactive tutorial sessions, held various meetings among university members in different places, encouraged open discussions among students, faculty members, and general citizens, and created non-degree programs using the system. Detailed evaluation has revealed that the majority of the instructors and participants have had a favorable impression of this system. Despite its shortcomings, the Investlgaors have found that VCS is here to stay

    A Measure of Monetary Policy Transparency: How Newsworthy are the Actions of the FOMC?

    Get PDF
    There are two main goals of this paper. The first goal for this paper is to create a quantifiable measure for transparency that captures public interpretation of FOMC policy decisions. We focus on the extent to which the FOMC conveys itself and its policy decisions with their official statements, which are released immediately after each meeting, to the public at large. To do this, we create an index that attempts to isolate the communicative success between the FOMC and the public in a twofold process that involves a trio of documents. First, we need to account for how the Federal Reserve’s practice of transparency has evolved over time. Namely, we need to be sensitive toward (i) the Fed's institutional changes in its release of materials and (ii) the differing lag times at which these materials were released. To do this, we first establish transparency by computing the similarity values between discourse within the transcripts and reporting in the statements (previously the Record of Policy Actions) are high. This step is necessary as it not only establishes the Fed's definition of central bank transparency, but it also acts as a proof of concept in preparation for our second step. Next, we compute the similarity between the statements and the news articles that report on the statements. If we want to provide meaning to this definition of transparency, understanding public interpretation of Fed policy is necessary. I create a transparency index series from 1984 to 2012 using a computational linguistics technique called Latent Dirichlet Allocation (LDA), and the idea is that a higher similarity number indicates that the FOMC is more transparent in their communication. My second goal is to understand if transparency affects the way monetary policy is propagated.Bachelor of Art

    Fundamental mechanisms of telomerase action in yeasts and mammals: understanding telomeres and telomerase in cancer cells

    Get PDF
    Aberrant activation of telomerase occurs in 85-90% of all cancers and underpins the ability of cancer cells to bypass their proliferative limit, rendering them immortal. The activity of telomerase is tightly controlled at multiple levels, from transcriptional regulation of the telomerase components to holoenzyme biogenesis and recruitment to the telomere, and finally activation and processivity. However, studies using cancer cell lines and other model systems have begun to reveal features of telomeres and telomerase that are unique to cancer. This review summarizes our current knowledge on the mechanisms of telomerase recruitment and activation using insights from studies in mammals and budding and fission yeasts. Finally, we discuss the differences in telomere homeostasis between normal cells and cancer cells, which may provide a foundation for telomere/telomerase targeted cancer treatments
    corecore