A Hierarchical Tree Model for Update Summarization

Author(s):  
Rumeng Li ◽  
Hiroyuki Shindo
Keyword(s):  
Author(s):  
Tasneem Bani-Mustafa ◽  
Nicola Pedroni ◽  
Enrico Zio ◽  
Dominique Vasseur ◽  
Francois Beaudouin

Risk assessment provides information to support decision-making. Then, the confidence that can be put in its outcomes is fundamental, and this depends on the accuracy, representativeness and completeness of the models used in the risk assessment. A quantitative measure is needed to assess the credibility and trustworthiness of the outcomes obtained from such models, for decision-making purposes. This article proposes a four-level, top-down, hierarchical tree to identify the main attributes and criteria that affect the level of trustworthiness of models used in risk assessment. The level of trustworthiness (Level 1) is broken down into two attributes (Level 2), three sub-attributes and one “leaf” attribute (Level 3), and seven basic “leaf” sub-attributes (Level 4). Based on this hierarchical decomposition, a bottom-up, quantitative approach is employed for the assessment of model trustworthiness, using tangible information and data available for the basic “leaf” sub-attributes (Level 4). Analytical hierarchical process is adopted for evaluating and aggregating the sub-attributes, and Dempster–Shafer theory is adopted to consider the uncertainty and the inconsistency in the experts’ judgments. The approach is applied to a case study concerning the modeling of the residual heat removal system of a nuclear power plant, to compute its failure probability. The relative trustworthiness of two mathematical models of different complexity is evaluated: a fault tree and a multi-states physics-based model. The trustworthiness of the multi-states physics-based model is found to outweigh that of the fault tree model, which can be explained by the fact that multi-states physics-based model takes into account the components failure dependency relations and degradation effects. The feasibility and reasonableness of the approach are, thus, demonstrated, paving the way for its potential applicability to inform decision-making on safety-critical systems.


2020 ◽  
Vol 21 (2) ◽  
pp. 189-202
Author(s):  
Neelima Gullipalli ◽  
Sireesha Rodda

Like other mining, web mining is also necessary to increase the power of web search engine to identify the intended web page and web document. While processing with large datasets, there arises several issues associated with space availability, similarity relationships between different webpage’s and running time. Hence, this paper intends to develop an enhanced web mining model based on two contributions. At first, the hierarchical tree is framed, which produces different categories of the searching queries (different web pages). Next, to hierarchical tree model, enhanced Density-Based Spatial Clustering of Applications with Noise (DBSCAN) technique model is developed by modifying the traditional DBSCAN. This technique results in proper session identification from raw data. Moreover, this technique offers the optimal level of clusters necessitated for hierarchical clustering. After hierarchical clustering, the rule mining is adopted. The traditional rule mining technique is generally based on the frequency; however, this paper intends to enhance the traditional rule mining based on utility factor as the second contribution. Hence the proposed model for web rule mining is termed as Enhanced DBSCAN-based Hierarchical Tree (EDBHT). It benefits in providing the search results depending on high level information (e.g., location), so that the ability of search engine in providing the interesting association rules can be improved. Next, to the implementation, the performance of proposed EDBHT is found to be enhanced when compared over several traditional models.


1994 ◽  
Vol 72 (1-2) ◽  
pp. 95-109 ◽  
Author(s):  
Erik Aurell ◽  
Peter Frick ◽  
Vladislav Shaidurov

2020 ◽  
pp. 57-65
Author(s):  
Eusébio Conceiçã ◽  
João Gomes ◽  
Maria Manuela Lúcio ◽  
Jorge Raposo ◽  
Domingos Xavier Viegas ◽  
...  

This paper refers to a numerical study of the hypo-thermal behaviour of a pine tree in a forest fire environment. The pine tree thermal response numerical model is based on energy balance integral equations for the tree elements and mass balance integral equation for the water in the tree. The simulation performed considers the heat conduction through the tree elements, heat exchanges by convection between the external tree surfaces and the environment, heat exchanges by radiation between the flame and the external tree surfaces and water heat loss by evaporation from the tree to the environment. The virtual three-dimensional tree model has a height of 7.5 m and is constituted by 8863 cylindrical elements representative of its trunks, branches and leaves. The fire front has 10 m long and a 2 m high. The study was conducted taking into account that the pine tree is located 5, 10 or 15 m from the fire front. For these three analyzed distances, the numerical results obtained regarding to the distribution of the view factors, mean radiant temperature and surface temperatures of the pine tree are presented. As main conclusion, it can be stated that the values of the view factor, MRT and surface temperatures of the pine tree decrease with increasing distance from the pine tree in front of fire.


2016 ◽  
Vol 4 (6) ◽  
pp. 26
Author(s):  
Zaidan Ali Jassem

This paper traces the Arabic origins or cognates of the “definite articles” in English and Indo-European languages from a radical linguistic (or lexical root) theory perspective. The data comprises the definite articles in English, German, French, Spanish, Portuguese, Italian, Romanian, Latin, Greek, Macedonian, Russian, Polish, Sanskrit, Hindi, Bengali, Persian, and Arabic. The results clearly indicate that five different types of such articles emerged in the data, all of which have true Arabic cognates with the same or similar forms and meanings, whose differences are due to natural and plausible causes and different routes of linguistic change, especially lexical, semantic, or morphological shift. Therefore, the results support the adequacy of the radical linguistic theory according to which, unlike the Family Tree Model or Comparative Method, Arabic, English, German, French, Latin, Greek, and Sanskrit not only belong to the same language family, renamed Eurabian or Urban family, but also are dialects of the same language, with Arabic being their origin all because only it shares the whole cognates with them all and because it has a huge phonetic, morphological, grammatical, and lexical variety. They also manifest fundamental flaws and grave drawbacks which plague English and Indo-European lexicography for ignoring Arabic as an ultimate ancestor and progenitor not only in the treatment of the topic at hand but in all others in general. On a more general level, they also show that there is a radical language from which all human languages stemmed and which has been preserved almost intact in Arabic, thus being the most conservative and productive language


1992 ◽  
Vol 26 (5-6) ◽  
pp. 1411-1420 ◽  
Author(s):  
S. H. Choudhury ◽  
S. L. Yu ◽  
Y. Y. Haimes

This paper presents an integrated methodology that allows determining the probability of noncompliance for a given wastewater treatment plant. The methodology applies fault-tree analysis, which uses failure probabilities of individual components, to predict the overall system failure probability. The methodology can be divided into two parts : risk identification and risk quantification. In risk identification, the key components in the system are determined by analyzing the contribution of individual component failures toward system failure (i.e., noncompliance). In risk quantification, a fault-tree model is constructed for the particular system, component failure probabilities are estimated, and the fault-tree model is evaluated to determine the probability of occurrence of the top event (i.e., noncompliance). A list can be developed that ranks critical events on the basis of their contributions to the probability of noncompliance. Such a ranking should assist managers to determine which components require most attention for a better performance of the entire system. A wastewater treatment plant for treating metal-bearing rinse water from an electroplating industry is used as an example to demonstrate the application of this methodology.


Author(s):  
Takuya MIYASHITA ◽  
Nobuhito MORI ◽  
Katsuichiro GODA
Keyword(s):  

2021 ◽  
pp. 109442812110029
Author(s):  
Tianjun Sun ◽  
Bo Zhang ◽  
Mengyang Cao ◽  
Fritz Drasgow

With the increasing popularity of noncognitive inventories in personnel selection, organizations typically wish to be able to tell when a job applicant purposefully manufactures a favorable impression. Past faking research has primarily focused on how to reduce faking via instrument design, warnings, and statistical corrections for faking. This article took a new approach by examining the effects of faking (experimentally manipulated and contextually driven) on response processes. We modified a recently introduced item response theory tree modeling procedure, the three-process model, to identify faking in two studies. Study 1 examined self-reported vocational interest assessment responses using an induced faking experimental design. Study 2 examined self-reported personality assessment responses when some people were in a high-stakes situation (i.e., selection). Across the two studies, individuals instructed or expected to fake were found to engage in more extreme responding. By identifying the underlying differences between fakers and honest respondents, the new approach improves our understanding of faking. Percentage cutoffs based on extreme responding produced a faker classification precision of 85% on average.


Sign in / Sign up

Export Citation Format

Share Document