Free Essay

Abcdef

In:

Submitted By rudh2010
Words 5700
Pages 23
Improved Matchmaking Algorithm for Semantic Web Services Based on Bipartite Graph Matching
Umesh Bellur, Roshan Kulkarni Kanwal Rekhi School of Information Technology, IIT Bombay umesh@it.iitb.ac.in, roshan@it.iitb.ac.in

Abstract
The ability to dynamically discover and invoke a Web Service is a critical aspect of Service Oriented Architectures. An important component of the discovery process is the matchmaking algorithm itself. In order to overcome the limitations of a syntax-based search, matchmaking algorithms based on semantic techniques have been proposed. Most of them are based on an algorithm originally proposed by M. Paolucci, et al. [21]. In this paper, we analyze this original algorithm and identify some correctness issues with it. We illustrate how these issues are an outcome of the greedy approach adopted by the algorithm. We propose a more exhaustive matchmaking algorithm, based on the concept of matching bipartite graphs, to overcome the problems faced with the original algorithm. We analyze the complexity of both the algorithms and present performance results which show that our algorithm performs as well as the original.

1 Introduction
Loose Coupling is an important principle underlying Service Oriented Architectures. One aspect of loose coupling is the ability to invoke a service provider with little (or no) prior knowledge about it. The publish-find-bind architecture is intended to facilitate this process. Service providers create WSDL [9] descriptions and publish them to UDDI [8] registries. Clients search the registry to locate providers of the desired service. Today, in most cases, the WSDL is compiled into client-stubs and the service is invoked. This approach, however, has several limitations. The WSDL is a specification of the messaging syntax between the client and the provider. It is necessary for a human to interpret the WSDL and then invoke the clientstub with the correct parameters. The search capabilities of UDDI are limited to a syntaxbased search. A client can search the registry for a string

in the service description or it can search the service classification hierarchy (like NAICS [3]) in the TModel. Neither of these techniques are sufficient, for a client, to be able to autonomously choose a service provider and invoke it without human intervention. In order to overcome these limitations, techniques for semantic description and matchmaking of services have been proposed in recent literature. These techniques use semantic concepts from Ontologies to describe the Inputs, Outputs, Pre-conditions and Effects (IOPE) of a service. The discovery process involves the matchmaking of the semantic descriptions offered by the client and the provider. In this paper we analyze the semantic matchmaking algorithm proposed by Paolucci, et al. [21]. We have considerable interest in this algorithm because it has been cited extensively in recent literature and several subsequent proposals ([13], [22], [16], [14]) are based on it. The outline of the paper is as follows: First, we present the algorithm by Paolucci [21]. We then present counterexamples where this algorithm does not generate correct outcomes. We describe our own matchmaking algorithm which overcomes these correctness issues. Finally, we analyze the complexity of the two algorithms and present some experimental results in order to compare their performance.

2 Background and Related Work
Ontologies are used in order to incorporate semantics in web service descriptions. An Ontology models domain knowledge in terms of Concepts and Relationships between them. OWL [12] [11] has evolved as a standard for representation of ontologies on the Web. OWL-S [18] [11], formerly called DAML-S [10], defines an ontology for semantic web services. OWL-S describes a service in terms of its Service Profile, Process Model and Grounding. The Service Profile models the Inputs, Outputs, Pre-conditions and Effects (IOPE) of the service. The Inputs and Outputs in the Service Profile refer to concepts

in ontologies published on the Web. Service Advertisements and search Queries are both expressed in terms of OWL-S descriptions. An ontology reasoner is an important component in the process of semantic matchmaking. A reasoner can infer additional information which has not been explicitly stated in an ontology. Subsumption, concept satisfiability, equivalence and disjointness are some examples of reasoning operations. Many of these operations are used in the semantic matchmaking process. DAML-S is based on a logic formalism called Description Logics (DL). Description Logics and its reasoning are explored in detail by [15] and [19]. Racer [7] and Pellet [5] [23] are some implementations of DL-Reasoners. The Service Profile contains enough information for a matchmaker to determine if a service satisfies the requirements of a client. In fact, several matchmaking algorithms rely only on the matching of Inputs and Outputs of the Service Profiles. One such algorithm has been proposed by M. Paolucci, et al., in [21]. Several extensions to this algorithm have been subsequently proposed by [13] [22] [16] and [14]. Phatak [22] adds ontology mappings and QoS constraints to the algorithm from [21]. Choi [13] expands the search scope of [21] by the use of analogous terms from an ontology server. It also makes use of a rule-based search in order to apply user restrictions and to rank search results. It computes fine-grained rankings by the use of concept similarity (horizontal and vertical closeness between concepts). Jaeger [16] extends the work from [21] by using matching over the properties and over the Service Profile hierarchy. It offers a better (fine-grained) ranking scheme as compared to [21].

∀c ∈ Advtin , ∃d ∈ Queryin , s.t. match(c, d) = F ail. Note that the order of Query and Advt has been transposed between the two expressions above. Suppose outQ ∈ Queryout and outA ∈ Advtout are two concepts. In case of output matching, the match(outQ, outA) function accepts outQ and outA as inputs and returns the degree of match between them. Four degrees of match are defined between a them: • Exact: If outA is an equivalent concept to outQ or outA is a superclass of outQ. In case of a superclass relationship, it is assumed that the service provider has agreed to support every possible subclass of outA. • Plugin: If outA Subsumes outQ. The relation between outA and outR is weaker as compared to the previous case since subsumption is indirectly inferred by the reasoner. It is assumed that the provider has agreed to support some sub-concepts of outA. We hence infer that outA can be plugged in place of the required outR. • Subsume: If outQ Subsumes outA. The set of individuals defined by the concept, outA, is a subset of the set of individuals defined by the concept outR. • Fail: If none of the above conditions are satisfied. These four degrees as ranked as: Exact > Plugin > Subsumes > Fail. Here, x > y indicates that x is ranked higher (is a more desirable match) than y. Greedy Approach: The algorithm adopts a greedy approach towards matching the concept-lists. For example, in the case of output matching, for each concept in the Queryout , it determines a corresponding concept in Advtout to which it has a maximum degree of match. Once all such max-matchings are computed, the minimum match amongst them is the overall degree of match between the Query and the Advertisement.

2.1

Semantic Matchmaking Algorithm

This section describes the algorithm by Paolucci [21]. The algorithm takes a OWL-S Query from the client as input and iterates over every OWL-S Advertisement in its repository in order to determine a match. An Advertisement and a Query match if their Outputs and Inputs, both, match. The algorithm returns a set of matching advertisements sorted according to the degree of match. Let Queryout and Advtout represent the list of output concepts of the Query and Advertisement respectively. Matching the outputs requires the matching between two concept-lists, Queryout and Advtout , as follows: ∀c ∈ Queryout , ∃d ∈ Advtout , s.t. match(c, d) = F ail Let Queryin and Advtin represent the list of input Concepts of the Query and Advertisement respectively. Matching the inputs requires: 2

3 Analysis
In this section we analyze the algorithm [21] from the perspective of correctness. We present counter-examples where the algorithm does not generate correct outcomes.

3.1

Degree of Match

[21] assumes that if an advertisement claims to output a certain concept, it commits itself to output every SubClass of that concept. We believe that such an assumption is detrimental to the effectiveness of the matchmaker because of the following reasons:

• In a real-world scenario, a provider for, say Vehicle, is likely to sell some types of Vehicle, but not every type of vehicle. • This assumption encourages the advertisers to advertise more generic concepts. For instance, an advertiser claiming to output Everything – e.g. owl:Thing – will have a Plugin match with every Query. This is undesired since a malicious advertiser can poison the search results. The genuine advertisements will be overwhelmed by the large number of such malicious advertisements. • In the present architecture, the semantic notions exist only in the matchmaking layer. Subsequent stages, like grounding or service invocation, deal with syntax. Consider an advertisement A, which claims to output Vehicle. Assume that this provider can indeed output every type of Vehicle. A query Q is searching for a service which offers a StationWagon. Let us assume that the ontology defines StationWagon as a subclass of Vehicle. The algorithm returns ‘A’ as an Exact match to ‘Q’, using the rules presented earlier. Now, the service provider Grounds the concept, V ehicle, to a concrete XML message. However, there does not exist any invocation mechanism by which the client can automatically express to the provider that it wants a Station Wagon instead of a generic Vehicle. Due to the arguments presented above, we subscribe to an alternative procedure for computing the match() as shown in Algorithm-1. This algorithm inverts the concepts of Plugin and Subsumes. Algorithm 1 PROCEDURE match(outA, outQ) 1: if outA = outQ then 2: return Exact 3: else if outQ superclass of outA then 4: return Plugin 5: else if outQ subsumes outA then 6: return Plugin 7: else if outA subsumes outQ then 8: return Subsumes 9: else 10: return Fail 11: end if A similar approach has also been proposed in [13]. In this section, we have offered stronger arguments in favour of this approach. 3

3.2

False Positives and False Negatives

In this section, we present some counter-examples where the results from the matchmaking algorithm of [21] are incorrect. In the description below, we have considered the process of matching Query outputs. Similar arguments can also be given for the process of matching the inputs. The algorithm from [21] iterates over the list of output concepts of the Query and it tries to find a max-match to an output concept in the Advertisement. Initially, every output concept of the Advertisement is a candidate for such a match. We call this set of output concepts of the Advertisement as a candidate list. The original algorithm does not specify whether a concept from the candidate list is removed once it has been matched. We analyse both the scenarios – with and without the removal of concepts. Both of them yield some incorrect results. 3.2.1 False Positives Suppose a concept from the Advertisement is not removed from the candidate list after it has been matched. Consider an Advertisement for a travel-agent who books Accomodation for their customers in the specified Destination. The Advertisement has the following Inputs and Outputs: Inputs: Outputs: Destination Accommodation, Cost

The concepts Destination, Accommodation, Cost, are defined in a travel ontology. Some parts of the ontology are illustrated in Fig-1. Consider a Query from a client who is planning a vacation. The client wants to make reservations for a Hotel and a Campground at the specified destination. Hotel and Campground, both, are subclasses of the concept Accomodation. The Query has the following Inputs and Outputs: Inputs: Outputs: Destination Hotel, Campground

• The initial candidate list is {Accommodation, Cost}. • The algorithm tries to compute a max-match for Hotel. Using the rule - outA Superclass outQ - this will be flagged as an Exact match with Accommodation. • The algorithm tries to compute a max-match for Campground. Using the same rule, this will be flagged as an Exact match with Accommodation In reality, the Advertisement indeed does not satisfy the Query. Such a match is a false positive result.

We now transpose the order of concepts in the output of the Query and analyse the behaviour of the algorithm. Consider an alternative Query as: Inputs: Outputs: Figure 1. Travel Ontology Such false positive outcomes can be expected whenever two or more concepts from the Query match a single concept in the Advertisement. 3.2.2 False Negatives We now consider a scenario where a concept is removed from the candidate list after it has been matched with a concept from the Query. Consider an Advertisement for a travel-agent who reserves tickets for two kinds of activities at a holiday destination. The inputs and outputs of the Advertisement are given below: Inputs: Outputs: Destination Entertainment, Sport Destination M ovieShow, Bowling

• The algorithm first computes a max-match for M ovieShow. The initial candidate list is: {Entertainment, Sport } M ovieShow subclass Entertainment ⇒ Exact {M ovieShow ∩ Sport = ∅} ⇒ Fail • M ovieShow has a max-match with Entertainment. Hence Entertainment is removed from the candidate list. • The algorithm now attempts a match for Bowling. Since Bowling is subsumed by Sport, it is a Plugin match. The final outcome is thus a Plugin match. In this scenario we see that the outcome of the matchmaker depends on the order of the concepts in the Query. Semantic matchmaking should be agnostic of the syntactic ordering of the concepts in the Advertisements and Queries. We therefore believe that a more exhaustive matchmaking process is desired, instead of the greedy approach adopted by this algorithm.

A client is planning a vacation and desires to make reservations for the following two activities: (i) Bowling (ii) M ovieShow. The inputs and outputs of the Query are given below: Inputs: Outputs: Destination Bowling, M ovieShow

4 Proposed Algorithm
In this section, we propose our matchmaking algorithm based on the notion of matching bipartite graphs. We present some basic concepts on bipartite graphs and then look at the proposed algorithm. Finally, we offer a complexity analysis of the algorithm.

The concepts used above are defined in the travel ontology shown in Fig-1. The solid lines indicate the explicitly asserted relationships. The dotted lines indicate the relationships inferred by the reasoner. • The algorithm will first attempt to compute a max-match for Bowling. The candidate list of the Advertisement outputs is: {Entertainment, Sport}. The following matches are inferred: Bowling subclass Entertainment ⇒ Exact Bowling subsumed by Sport ⇒ Plugin • Bowling has a max-match with Entertainment. Hence Entertainment is removed from the candidate list. • The algorithm now attempts to match the next concept: M ovieShow. Since M ovieShow ∩ Sport = ∅, the match fails. 4

4.1

Bipartite Graphs and Matching

• Bipartite Graph: A Bipartite Graph is a graph G = (V, E) in which the vertex set can be partitioned into two disjoint sets, V = V0 ∪ V1 ,such that every edge e ∈ E has one vertex in V0 and another in V1 . Fig-2 shows a weighted bipartite graph G. • Matching: A matching of a bipartite graph G = (V, E) is subgraph G′ = (V, E ′ ), E ′ ⊆ E, such that no two edges e1 , e2 ∈ E ′ share the same vertex. We say that a vertex v is matched if it is incident to an edge in the matching. Fig-2 also shows one such matching G′ for the graph G. Given a bipartite graph G = (V0 + V1 , E) and its matching G′ , the matching is complete if and only if, all vertices in V0 are matched. The matching G′ in Fig-2 is not a compete matching since vertex x is not matched.

Figure 2. Bipartite Graph and its Matching

4.2

Modelling Semantic Matchmaking as Bipartite Matching

Consider a Query Q and Advertisement A. We model the problem of matching their outputs as a problem of matching over a bipartite graph. This involves two steps: Figure 3. Bipartite Graph of Output Concepts • Constructing a Bipartite Graph: Let Qout and Aout be the set of output concepts in Q and A respectively. These constitute the two vertex sets of our bipartite graph. Construct graph G = (V0 + V1 , E), where, V0 = Qout and V1 = Aout . Consider two concepts a ∈ V0 and b ∈ V1 . Let R be the degree of match (Exact, Plugin, Subsume, Fail) between concepts a and b. If R = F ail, we define an edge (a, b) in the graph and label this edge as R. • Defining a Matching Criteria: We compute a complete matching of this bipartite graph. A complete matching will ensure that every concept in the output of the Query is matched to some concept in the output of the Advertisement. We consider the following cases: – Complete matching does not exist: We infer that the match between the Advertisement and the Query has failed. – Multiple complete matchings exist: We should choose a complete matching which is optimal. So far we have not defined any optimality criteria from the perspective of a semantic match. We shall define this below. We assign a numerical weight to every edge in the bipartite graph. The weight of an edge, e = (a, b), is a function of the degree of match between concepts a and b. Degree of Match Exact Plugin Subsumes Weight of edge w1 w2 w3

Fig-3 illustrates a bipartite graph G constructed from Qout and Aout using the procedure described earlier. G′ is a complete matching of G. Let max(wi ) denote the maximum weighted edge in G′ . The maximum weighted edge represents the worst degree of match between the two vertex sets in G′ . This is similar to the notion of global degree of match defined in [21]. We therefore say that max(wi ) denotes the overall degree of match for G′ . Consider a scenario in which several different matchings exist for the given bipartite graph. An optimal matching, from the perspective of semantic matchmaking, is a complete matching in which max(wi ) is minimized. For example, in Fig-3, G′ and G′′ are two complete matchings of G as shown in the figure. We can now infer the following: Matching G′ G′′ max(wi ) w3 ⇒ w2 ⇒ Overall Match Subsume Plugin

Also, w1 < w2 < w3 5

Our algorithm chooses the matching in which max(wi ) is minimized. Since w2 < w3 , G′′ (Plugin) is chosen over G′ (Subsume) as the match. Our discussion so far has only considered the matching of output concepts. The matching of input concepts is a similar process. In case of outputs, every concept in Qout needs to be matched. Whereas in case of inputs, every concept in Ain needs to be matched. Hence we construct a bipartite graph where V0 = Ain and V1 = Qin . So far we have constructed the graph and defined the matching criteria. In the next section, we shall see how the

matching is actually computed.

4.3

Computing the Optimal Matching

The Hungarian algorithm ([17], [20]) computes a complete matching of the bipartite graph such that the sum of weights of the edges in the matching, Σwi , is minimized. The use of Hungarian algorithm for matching bipartite graphs is desired due to its strong polynomial time bound. If |V | is the number of vertices in the graph, the time 3 complexity of the Hungarian algorithm is O(|V | ). This is more efficient than the combinatorial complexity of any brute-force algorithm. In our current problem, we wish to compute a matching such that the max(wi ) is minimized. This optimization criteria is different than the one assumed by the hungarian algorithm. This difference is illustrated in the example from Fig-3. Consider the assignment of weights as: w1 = 1, w2 = 2, w3 = 3. G′ and G′′ are the two matchings of the graph. We can now compute: Matching G′ G′′ max(wi ) 3 (Subsume) 2 (Plugin) Σwi 5 6

• The maximum number of edges in any complete matching of the graph G will be equal to |V0 | • The following relation holds true: w1 < w2 < w3 • The above computation of weights enforces that a single edge of a higher weight will be greater than a set of |V0 | edges of lower weights taken together: wi ≥ wj × |V0 |, ∀j < i (1)

Proof: We use a proof-by-contradiction method to prove the lemma stated earlier. • Given a graph G, let M be a complete matching in which Σwi is minimized. Let (d1 , d2 , d3 , ...) denote the set of edges in M . • Let M ′ be a complete matching in which max(wi ) is minimized. Let (e1 , e2 , e3 , ...) denote the set of edges in M ′ and let emax denote the maximum weight edge in this set. • Assume that the lemma is untrue. Hence, M = M ′ . • Now, there will be at least one edge, dM ∈ M , such that w(dM ) > w(emax ). This is because: – M = M′ – M ′ is a matching in which max(wi ) is minimized. emax is the maximum weight edge in M ′ • w(dM ) > w(emax ) ⇒ w(dM ) > w(ei ), ∀ei ∈ M ′ • The maximum number of edges in M ′ is bounded by |V0 |. Using previous results and Equation-1 from the previous section: w(dM ) > w(ei ), ∀ei ∈ M ′ ⇒ w(dM ) > Σw(ei ) ⇒ Σw(dj ) > Σw(ei ) Here Σw(ei ) and Σw(dj ) denote the sum of weights of all edges in M and M ′ respectively. • Σw(di ) > Σw(ei ) contradicts our assumption that M is a matching having the minimal sum of weights. The contradiction holds as long as we assume that M = M ′ . We can hence infer that both M and M ′ are equivalent.

Our optimization criteria would choose G′′ , whereas the hungarian algorithm would choose G′ as the optimal match. As a result, the hungarian algorithm cannot be directly used to compute the matching that we desire. We hence propose a different technique for the assignment of edge weights such that the following lemma holds true: Lemma: A matching in which Σwi is minimized, is equivalent to a matching in which max(wi ) is minimized If the above lemma holds true, we can indeed use the hungarian algorithm to compute the matching that we desire. We first look at the technique for assignment of edge weights. We then prove that the above lemma holds true for the proposed assignment. In G = (V0 + V1 , E), the values of the edge weights are computed as follows: Degree of Match Exact ⇒ Plugin ⇒ Subsume ⇒ Weight w1 = 1 w2 = (w1 ∗ |V0 |) + 1 w3 = (w2 ∗ |V0 |) + 1

4.4

Our Algorithm

|V0 | = Cardinality of set V0 We note the following properties, which will be used in the subsequent proof: 6

Algorithm-2 defines the search() procedure. It accepts a Query as input and tries to match it with each advertisement in the repository. A match is computed for both, output and input concepts. If the match is not a Fail, it appends the advertisement to the result set. Finally the sorted result set is returned to the client. The match() procedure in Algorithm-3 accepts two concept-lists as inputs and constructs a bipartite graph using

them. It then invokes a hungarian algorithm to compute a complete matching on the graph. The match() procedure is invoked twice in search(). The order of Query and Advertisement in each call is however swapped. The computeW eights() function computes the values of w1 , w2 , w3 , depending on the number of concepts in V0 . It uses the formulae presented in the section “Computation of Edge Weights” to compute the values. The degreeOf M atch() function is a call to the reasoner in order to determine the relationship between the two concepts a and b.

Algorithm 2 search(Query) 1: Result = Empty List
2: 3: 4: 5: 6: 7: 8: 9: 10: 11: 12: 13: 14: 15: 16: 17:

for each Advt in Repository do outM atch = match(Queryout, Advtout ) if (outM atch = Fail) then Skip Advt. Take next Advt. end if inM atch = match(Advtin , Queryin ) if (inM atch = Fail) then Skip Advt. Take next Advt. end if Result.append(Advt, outM atch, inM atch) end for return sort(Result)

4.5

Complexity Analysis

Let N denote the number of advertisements in the repository. The average number of input and output concepts in the Query are denoted by |Qin | and |Qout | respectively. Similarly, the average number of input and output concepts in the Advertisement are denoted by |Ain | and |Aout | respectively. The complexity of the algorithm is analyzed as follows: • Search involves iteration over each Advertisement in the repository. • Weights w0 , w1 , w2 are computed based on |V0 |. This is an O(1) operation. • The graph is constructed by comparing every pair of concepts (a, b), a ∈ Qout , b ∈ Aout . This operation has a complexity of O(|Qout | × |Aout |). • The time complexity of hungarian algorithm is bounded by |Qout |3 The above matching is done twice: Once for outputs, once for inputs. We can thus compute the time complexity of a search as: N × (|Qout | × |Aout | + |Qout |3 ) + (|Ain | × |Qin | + |Ain |3 ) We can now approximate, |Qout | = |Aout | = |Qin | = |Ain | = m. Here, m is independent of the number of advertisements in the repository and is likely to take small integer values (usually 1 to 15). We can hence consider m to be a constant. The time complexity of search is simplified: O N × 2 × {m2 + m3 } = O N (2)

Algorithm 3 match(List1, List2 ) 1: Graph G = Empty Graph (V0 + V1 , E) 2: V0 ← List1 3: V1 ← List2 4: (w1 , w2 , w3 ) ← computeWeights(|V0|)
5: 6: 7: 8: 9: 10: 11: 12: 13: 14: 15: 16: 17: 18: 19: 20: 21: 22: 23: 24: 25: 26:

for each concept a in V0 do for each concept b in V1 do degree = degreeOfMatch(a, b) if degree = Fail then Add edge (a, b) to G if (degree = Exact) then w(a, b) = w1 if (degree = Plugin) then w(a, b) = w2 if (degree = Subsume) then w(a, b) = w3 end if end for end for Graph M = hungarianMatch(G) if (M = null) then No complete matching exists return Fail end if Let (a, b) denote Max-Weight Edge in G degree ← degreeOfMatch(a, b) return degree

Although the time complexity expressed here is O(N ), the constant factors involved are quite high. For m = 10, for instance, m3 = 1000. 7

4.5.1 Complexity Comparison The algorithm from [21] iterates over all the advertisements in the repository and performs matching over both, inputs and outputs. If we assume that concepts are not removed from the candidate-list after a match, the time complexity of the algorithm can be expressed as: N × (|Qout | × |Aout |) + (|Ain | × |Qin |) Using simplifications similar to the above, we get: O N × 2 × {m2 } = O N (3)
OWL-S Query Client Results Matchmaking Engine

OWL-S Advt. Repository OWL Ontologies

Pellet Reasoner

Knowledge Base

Figure 4. Implementation

6.1

Correctness

Comparing (2) and (3) we conclude that both (the original and the proposed algorithms) have linear time complexity. However the constants involved in our proposed algorithm are larger.

False Positives: We first test the occurence of false positives. In this case, we use a greedy algorithm which does not remove concepts from the candidate list. The following Query from OWLS-TC is matched against the advertisement repository: Inputs: Outputs: Book TaxedPrice, Price

5 Implementation
The following algorithms were implemented in Java in order to compare their correctness and performance: 1. Our Bipartite Matching algorithm 2. Greedy matchmaking algorithm by Paolucci [21] 3. Brute-Force matching algorithm The Brute-Force algorithm exhaustively compares every possible matching between the concept lists. It then chooses a matching with the best overall degree of match. The Brute-Force algorithm, due to its exhaustive nature, will serve as a reference model to compare the correctness of the Greedy and the Bipartite algorithms. Our implementation is illustrated in Fig-4. The Protege editor [6] is used to browse and edit OWL ontologies. We load the OWL ontologies into the KnowledgeBase defined by the Mindswap OWL-S API [2]. This API is also used to parse the OWL-S Queries and Advertisements. We use the Pellet reasoner [5] [23] to classify the loaded ontologies. The Jena API [1] is used to query the reasoner for concept relationships. In order to compute matchings for bipartite graphs, we use an implementation of the MunkresKuhn (Hungarian) algorithm by [20].

The number of matches flagged by the three algorithms is shown below: Greedy Brute F. Bipartite Exact 1 1 1 Plugin 0 0 0 Subs. 5 0 0 Fail 344 349 349 Total 350 350 350

6 Correctness and Performance Comparison
The OWLS-TC (service retrieval test collection from SemWebCentral) [4] is used to compare the algorithms. We use 7 ontologies (2449 concepts) from OWLS-TC in our KnowledgeBase. About 350 advertisements from OWLSTC were loaded into our advertisement repository. 8

The results of the Bipartite and the Brute-Force algorithm are identical. The Greedy algorithm has flagged 5 subsume matches. These matches are the false positive outcomes. These matches have conditions identical to those illustrated in section 3.2.1 earlier. False Negatives: We now test the occurence of false negatives. For this purpose, we use a greedy algorithm which removes concepts from the candidate list. OWLSTC did not have any Queries which flagged false negatives. We could however construct a few such Queries for the purpose of illustration. At first, 3 Queries were constructed using the ontologies in OWLS-TC. Then, 3 additional Queries were constructed by merely swapping the order of concepts in the first 3 Queries. Since we search for 6 Queries over 350 advertisements, there would be a total of 6 x 350 = 2100 matchings. Ideally, we expect all the 6 queries to match their corresponding advertisements. The actual results are shown below: Greedy Brute F. Bipartite Exact 0 0 0 Plugin 0 0 0 Subs. 3 6 6 Fail 2097 2094 2094 Total 2100 2100 2100

As seen in the results above, the Bipartite algorithm matches all 6 Queries. The Greedy algorithm however generates 3 false negatives. We have thus tested that the Greedy algorithm indeed generates false positive and negative outcomes. On the other hand, the outcomes of the Bipartite matching are identical to that of the Brute Force reference model.

the time complexity of the algorithm by reducing the time required for construction of the bipartite graphs.

References
[1] JENA: Java Framework for Building Semantic Web Applications. http://jena.sourceforge.net/. [2] MINDSWAP: Maryland Information and Network Dynamics Lab Semantic Web Agents Project, OWL-S API. http://www.mindswap.org/2004/owl-s/api/. [3] North American Industry Classification System. http://www.naics.com/. [4] OWL-S Service Retrieval Test Collection. Version 2.1. http://projects.semwebcentral.org/projects/owls-tc/. [5] Pellet: An OWL DL Reasoner. http://pellet.owldl.com/. [6] Protege: Ontology Editor and Knowledge-base framework. http://protege.stanford.edu/. [7] RacerPro: OWL Reasoner and Inference Server for the Semantic Web. http://www.racer-systems.com/. [8] Universal Description Discovery and Integration (UDDI). http://uddi.org/. [9] Web Services Description Language (WSDL). http://www.w3.org/TR/wsdl. [10] A. Ankolekar et al. DAML-S Coalition. DAML-S: Web Service Description for the Semantic Web. ISWC, 2002. [11] G. Antoniou et al. Web Ontology Language: OWL. Handbook on Ontologies in Information Systems, 2003. [12] S. Bechhofer et al. OWL Web Ontology Language Reference. W3C Recommendation: http://www.w3.org/TR/owl-ref/, 2004. [13] O. Choi et al. Extended Semantic Web Services Model for Automatic Integrated Framework. NWESP, 2005. [14] R. Guo et al. Capability Matching of Web Services Based on OWL-S. Proceedings of 16th International Workshop on Database and Expert Systems Applications, 2005. [15] I. Horrocks. Reasoning with Expressive Description Logics: Theory and Practice. 18th International Conference on Automated Deduction, 2002. [16] M. Jaeger et al. Ranked Matching for Service Descriptions using DAML-S. Proceedings of CAiSE’04 Workshops, 2004. [17] H. Kuhn. The Hungarian Method for the Assignment Problem. Naval Research Logistic Quarterly, 1955. [18] D. Martin et al. OWL-S: Semantic Markup for Web Services. Technical Report, Member Submission, W3C http://www.w3.org/Submission/2004/07/, 2004. [19] D. McGuinness et al. The Description Logic Handbook: Theory, implementation and applications. Cambridge University Press, 2003. [20] K. Nedas. Implementation of Munkres-Kuhn (Hungarian) Algorithm. http://www.spatial.maine.edu/ kostas, 2005. [21] M. Paolucci et al. Semantic Matching of Web Service Capabilities. Springer Verlag, LNCS, International Semantic Web Conference, 2002. [22] J. Phatak et al. A Framework for Semantic Web Services Discovery. WIDM, 2005. [23] E. Sirin et al. Pellet: An OWL DL Reasoner. Journal of Web Semantics, 2005.

6.2

Performance

We determine the search-time of the three algorithms with respect to the number of advertisments in the repository. This is presented in Fig-5 below.
350 300 Search Time(ms) 250 200 150 100 50 0 0 50 100 150 200 250 Number of Advertisements 300 350 Brute Force Bipartite Greedy

Figure 5. Query Search Time We observe that the search time of the Bipartite matching algorithm is higher than that of the Greedy algorithm but less than that of the Brute force algorithm. The search time is linear w.r.t. the number of advertisements in the repository. Moreover, the slope of the graph for Bipartite matching is slightly higher than that for the Greedy algorithm. This is because the O(N) expression, in the complexity analysis, has a higher multiplying constant for the Bipartite matching algorithm. These results ascertain the claims made in the complexity analysis section earlier.

7 Conclusion
In this paper we have identified the problems with the matchmaking algorithm from [21] and offered an alternative algorithm to resolve these problems. We have also tested the correctness of our proposed algorithm as compared to [21]. Moreover, the Bipartite matching algorithm offers a much better performance as compared to that of the Brute-Force technique. Our future work is focused on improving the efficiency of this algorithm. In particular, we would like to reduce 9

Similar Documents

Premium Essay

Abcdef

...(Under Decision No: …158/QĐ-ĐHFPT…Date:…7/9/2013) Course name: Business Research Methods Course code: RMB301 Level: Bachelor Implementation period: Summer, 2014 Lecturer: Nguyen Anh Loi E-mail: loina@fpt.edu.vn Phone: 0979521941 1) Main objectives and goals of the course This course introduces students to a number of research methods useful for academic and professional investigations of business practices. By examining the applications, strengths, and weaknesses of methodologies drawn from both the qualitative and quantitative traditions, this course permits an understanding of the various steps involved in designing and executing a research project so that students will be able to conduct their research later. The course aims to provide learners with knowledge and skills in designing and implementing an independent business research project. After the course, students will be able to: 1. Formulate research questions and objectives. 2. Conduct an appropriate literature review. 3. Design and implement appropriate qualitative and/or quantitative research methods. 4. Write a research proposal that can form the basis for their final dissertation. 5. In overall, learners will know necessary steps to carry out a research project and to write a structured report/dissertation. 2) Course Textbook(s)/Resources: a) Mark Saunders, Philip Lewis, and Adrian Thornhill, 2012, Research Methods for Business Students, 6/E, Financial Times Press. (ISBN-10: 0273750755;...

Words: 1883 - Pages: 8

Free Essay

Abcdef

...Circuit Analysis using the Node and Mesh Methods We have seen that using Kirchhoff’s laws and Ohm’s law we can analyze any circuit to determine the operating conditions (the currents and voltages). The challenge of formal circuit analysis is to derive the smallest set of simultaneous equations that completely define the operating characteristics of a circuit. In this lecture we will develop two very powerful methods for analyzing any circuit: The node method and the mesh method. These methods are based on the systematic application of Kirchhoff’s laws. We will explain the steps required to obtain the solution by considering the circuit example shown on Figure 1. R1 + Vs R3 R2 R4 _ Figure 1. A typical resistive circuit. The Node Method. A voltage is always defined as the potential difference between two points. When we talk about the voltage at a certain point of a circuit we imply that the measurement is performed between that point and some other point in the circuit. In most cases that other point is referred to as ground. The node method or the node voltage method, is a very powerful approach for circuit analysis and it is based on the application of KCL, KVL and Ohm’s law. The procedure for analyzing a circuit with the node method is based on the following steps. 1. Clearly label all circuit parameters and distinguish the unknown parameters from the known. 2. Identify all nodes of the circuit. 3. Select a node as the reference node also called the ground and...

Words: 3646 - Pages: 15

Free Essay

Abcdef

...INTERNATIONAL MARKETING ASSIGNMENT Customer buying behavior in emerging markets is very different from the customer buying behavior in developed markets. In emerging markets the major share of theto the Bottom of the Pyramid (BoP). People belonging to the Bop represent economic group with low average incomes. They often earn less than $2 per day for them a key aspect in purchase decisions, therefore, is price and products that are affordable, simple and easily accessible. Let’s take the example of shaving. There are major differences in the behavior of customers in emerging and developed markets. Companies catering to these markets such as P&G often have to adapt to these difference. For example in the US the new Fusion Pro Glide with five blades is the top selling razor of P&G’s Gillette product portfolio priced at around $4. However this product does not address the needs of Indian customers. Most Indian people still shave with double-edged razors while balancing a hand held mirror. P&G realized that in order to enter India they had to investigate the needs of the Indian BoP customers. They sent a research to India to observe the shaving behavior of Indians and to understand the role that shaving plays in their daily life. P&G found out that Indian customers need a simple razor that can use without running water and which limits the risks of cuts while shaving. After conducting this research they introduced a simple razor called the Gillette Guard. It has just one blade, can...

Words: 658 - Pages: 3

Free Essay

Abcdef

...مقدمه: آنچه در تقابل انسان و اطلاعات اهمیت می یابد، دسترسی به دریای از اطلاعات جامع و کامل است که برای نیل به این مهم، نیاز به اخذ تدابیری می باشد تا نتیجه مطلوب حاصل گردد. تا پیش از دهه 1990 کار باکامپیوتر مایه شرمساری بود، و سپس ناگهان همه افراد تمایل داشتند تا با کامپیوتر کار کنند. بسیاری از خانواده ها تمایل داشتند تا سایت های وب مختص خود داشته باشند. شما به اطلاعات نیاز دارید و همانند در آمدن قارچ از زمین در داخل یک جنگل صدها سایت وب در رابطه با هر موضوع قابل تصوری متولدشدند. و حال تصور کنید در دنیای پیچیده و پر کار امروز و با در نظر گرفتن مشغله و دوری راههای ارتباطی و ترافیک های سنگین اگر تمایل داشته باشید با مدیر یا مسئولان سازمان یا ارگان خاصی ارتباط برقرار کنید با چه مشکلاتی روبه رو می شوید. و اگر بخواهید هروز از تغییرات محیط و عملکرد کار باخبر باشید این مشکلات تاچه حد زمان و انرژی شما را میطلبد . و بدین ترتیب در می یابید که داشتن میل ، اینترنت ، وب و.... همه به شما کمک می کنند تا بتوانید در راهبرد کارهایتان هرچه سریعتر و آسانتر کوشا باشید. چه بسا که حتی وجود پایگاه داده ای مستحکم و مطمئن میتواند شما را در این راه مدد کند. معرفی UML : تاريخچه UML يك زبان استاندارد براي نمايش، ايجاد و مستندسازي سيستم هاي نرم‌‌افزاري مبتني بر روشهاي شي‌‌گرا مي‌‌باشد. قبل از UML نيز روشهاي شي‌‌گرايي متعددي توسط‌‌افرادمختلف براي مدل سازي سيستم‌‌هاي ‌شئ‌‌گرا ارائه شده بود. اتفاقي كه باعث ايجاد UML شد بدين‌‌صورت بود كه Rumbough ، طراح متدلوژي OMT به شركت Rational كه متعلق به Booch بود پيوست و آنها تلاش خودرا براي ايجاد يك زبان...

Words: 2382 - Pages: 10

Premium Essay

Abcdef

...Vol.1 FE Exam Preparation Book Preparation Book for Fundamental Information Technology Engineer Examination Part1: Preparation for Morning Exam Part2: Trial Exam Set INFORMATION-TECHNOLOGY PROMOTION AGENCY, JAPAN FE Exam Preparation Book Vol. 1 Table of Contents Part 1 Chapter 1 PREPARATION FOR MORNING EXAM Computer Science Fundamentals 1.1 Basic Theory of Information 1.1.1 Radix Conversion 1.1.2 Numerical Representations 1.1.3 Non-Numerical Representations 1.1.4 Operations and Accuracy Quiz 1.2 Information and Logic 1.2.1 Logical Operations 1.2.2 BNF 1.2.3 Reverse Polish Notation Quiz 1.3 Data Structures 1.3.1 Arrays 1.3.2 Lists 1.3.3 Stacks 1.3.4 Queues (Waiting lists) 1.3.5 Trees 1.3.6 Hash Quiz 1.4 Algorithms 1.4.1 Search Algorithms 1.4.2 Sorting Algorithms 1.4.3 String Search Algorithms 1.4.4 Graph Algorithms Quiz Questions and Answers 2 3 3 7 10 11 14 15 15 18 21 24 25 25 27 29 30 32 34 37 38 38 41 45 48 50 51 i Chapter 2 Computer Systems 2.1 Hardware 2.1.1 Information Elements (Memory) 2.1.2 Processor Architecture 2.1.3 Memory Architecture 2.1.4 Magnetic Tape Units 2.1.5 Hard Disks 2.1.6 Terms Related to Performance/ RAID 2.1.7 Auxiliary Storage / Input and Output Units 2.1.8 Input and Output Interfaces Quiz 2.2 Operating Systems 2.2.1 Configuration and Objectives of OS 2.2.2 Job Management 2.2.3 Task Management 2.2.4 Data Management and File Organization 2.2.5 Memory Management Quiz 2.3 System Configuration Technology 2.3.1 Client...

Words: 26218 - Pages: 105

Premium Essay

Abcdef

...INSTITUTE OF BUSINESS & MANAGEMENT Final Exam (3rd Semester) Course: Seminar In Professional Development Name: Omer Qadir Butt Roll No: Executive MBA Fall 2013 – 032 Question No. 01 Describe your way forward for personal & professional development? Include action plan with timelines preferably in the table format. Now I am with M/s HI-TECH LUBRICANTS (ZIC) as a Senior Sales Analyst Officer. For the purpose of enhancing my academicals qualification provided my employer allows, I plan to do PHD in Management Sciences which shall also broaden my vision in the job that I am dealing with. I am still trying to enhance my professional skills according to analyzing the brand worth as well as making sales strategies. The data pertaining to my future planning I have given the few facts as under: Goals | Professional Development Activities | Performance Measures | Resource & Support Needed | Target Dates | Assist stake holders and staff in understanding the complete Market Vs Brand Analysis and Making Strategies. | Read Books, work with professional Sales Analysts. | Utilize proper techniques to produce more effective figures for making more professional strategies. | Attending Seminars & conferences on Leadership, Sales & Strategy Plans. | January, 2016 | Question No. 02 How would you improve your professional network and contribution to profession itself? In order to improve my professional...

Words: 419 - Pages: 2

Free Essay

Abcdef

...Melani Hermanus Topic: Critically evaluate the arguments for and against the mining and export of uranium Thesis: Mining and export of uranium is harmful for Australia Issue 3: Environment It has been argue that for decrease the environmental damage caused by uranium mining, the rehabilitation method and strict regulation are should be carried out by every mine owners in Australia. One of the previous study also showed that the Ranger uranium mine has fulfilled the proper tailing control and has had great water management system for every Northern Territory’s mine companies to cover the tailings and waste rock produced by uranium grounds (Harries, et al, 1997). In addition, by this rehabilitation method it could modify the prior environment hazards, for instance it was found an uranium mines was reinstated under modern accurate environmental controls in Nabarlek, Northern Territory (Hancock, et al, 2006). Despite the fact that there is a rehabilitation method and strict regulation enforced by Australian Government with the aim to control the environmental damage, nevertheless nowadays the environmental problem from uranium grounds still exist, the improvement for reduce the damage was not completely success. It has been proofed that the water level to release the uranium wasted was 450 times higher than entire Australian drinking water level (Wu, et al, 2007). Furthermore, critics said the rehabilitation method was a successful story, where this statement could not be verified...

Words: 306 - Pages: 2

Free Essay

Abcdef

...Running Head: JAMES REASON'S SWISS CHEESE THEORY James Reason's Swiss Cheese Theory [Name of the Writer] [Name of the Institution] James Reason's Swiss Cheese Theory Introduction The model of Swiss cheese is a model of accident causation which is used risk management and its analysis in system of healthcare, aviation, and engineering. Swiss Cheeses Model compares human system to Swiss cheese slices. The slices are piled together with one another. Basically it was founded in 1990, by James T. Reason, a British psychologist of University of Manchester. The model gained wide acceptance and has been used by healthcare industry, emergency services organizations, aviation industry, and safety industry since it was developed. It is also known as cumulative act effect. According to a survey, in most of the cases, there can be four levels of failure for an accident: unsafe supervision, unsafe act of themselves, organizational influence, and preconditions for unsafe acts. James T. Reason, in his Swiss Cheese Model developed defenses of organization against the failure and represented barriers as slices of Swiss cheese. And individual weaknesses are shown by the holes in the slices as part of the system, and all holes are different in position and sizes in those slices. The failure of the system occurs when holes in slices simultaneously align in aggregate, giving permission, as James Reason's said “a trajectory of accident opportunity", so that in...

Words: 1244 - Pages: 5

Free Essay

Abcdef

...CỤC THUẾ HÀ TĨNH CỘNG HÒA XÃ HỘI CHỦ NGHĨA VIỆT NAM CHI CỤC THUẾ THẠCH HÀ ĐỘC LẬP - TỰ DO - HẠNH PHÚC SỐ: QĐ/CCT Hà Tĩnh, ngày….tháng….năm 20… QUYẾT ĐỊNH Về việc ban hành Quy chế phối hợp hoạt động giữa Thủ trưởng và Ban chấp hành công đoàn cơ quan CHI CỤC TRƯỞNG CHI CỤC THUẾ THẠCH HÀ - Căn cứ Luật Công đoàn ngày 30 tháng 6 năm 1990 - Căn cứ Nghị định 133/HĐBT ngày 20- 4- 1990 của Hội đồng Bộ trưởng (nay là Chính phủ) hướng dẫn thi hành Luật Công đoàn; Nghị định số 302/HĐBT ngày 19-8-1992 của Hội đồng Bộ trưởng (nay là Chính phủ) về quyền và trách nhiệm của Công đoàn cơ sở trong các doanh nghiệp, cơ quan; - Căn cứ quy chế về mối quan hệ công tác giữa Chính phủ và Tổng LĐLĐ Việt Nam ngày 27- 8 - 1994; - Sauk hi thỏa thuận với Ban chấp hành Công đoàn cơ quan. QUYẾT ĐỊNH Điều 1: Nay ban hành Quy chế phối hợp hoạt động giữa Thủ trưởng và Ban chấp hành Công đoàn cơ quan kèm theo Quyết định này. Điều 2: Quyết định này có hiệu lực kể từ ngày ký. Các phòng, ban, mọi cá nhân, tổ chức thuộc cơ quan chịu trách nhiệm thi hành Quyết định này. Nơi nhận: CHI CỤC TRƯỞNG - LĐLĐ Huyện - Các tổ CĐ - Ban CHCĐ - Lưu VP/CĐ CHI CỤC TRƯỞNG VÀ BCHCĐ CỘNG HÒA XÃ HỘI CHỦ NGHĨA VIỆT NAM CHI CỤC THUẾ THẠCH HÀ ĐỘC LẬP - TỰ DO - HẠNH PHÚC CHI CỤC TRƯỞNG Thạch Hà, ngày tháng năm 2012 QUY CHẾ PHỐI HỢP HOẠT ĐỘNG Giữa Thủ trưởng và Ban chấp hành công đoàn cơ quan (Ban hành kèm...

Words: 1931 - Pages: 8

Free Essay

Temp

...Abcdef Asjdkajsk Sjdkfds ;safjkldjf kjsdfk lajd ajdkfj kajdfkl kfjgkfjg akjdkfjfgkf kjfg; alsdjf ad kjdfkj kjdsfkjd Urafkd Sdkfj kjkd eiukjfks as a dfjf eiujf ajasdkjsf kjdfkj sghuj asfdsfj Abcdef Asjdkajsk Sjdkfds ;safjkldjf kjsdfk lajd ajdkfj kajdfkl kfjgkfjg akjdkfjfgkf kjfg; alsdjf ad kjdfkj kjdsfkjd Urafkd Sdkfj kjkd eiukjfks as a dfjf eiujf ajasdkjsf kjdfkj sghuj asfdsfj Abcdef Asjdkajsk Sjdkfds ;safjkldjf kjsdfk lajd ajdkfj kajdfkl kfjgkfjg akjdkfjfgkf kjfg; alsdjf ad kjdfkj kjdsfkjd Urafkd Sdkfj kjkd eiukjfks as a dfjf eiujf ajasdkjsf kjdfkj sghuj asfdsfj Abcdef Asjdkajsk Sjdkfds ;safjkldjf kjsdfk lajd ajdkfj kajdfkl kfjgkfjg akjdkfjfgkf kjfg; alsdjf ad kjdfkj kjdsfkjd Urafkd Sdkfj kjkd eiukjfks as a dfjf eiujf ajasdkjsf kjdfkj sghuj asfdsfj Abcdef Asjdkajsk Sjdkfds ;safjkldjf kjsdfk lajd ajdkfj kajdfkl kfjgkfjg akjdkfjfgkf kjfg; alsdjf ad kjdfkj kjdsfkjd Urafkd Sdkfj kjkd eiukjfks as a dfjf eiujf ajasdkjsf kjdfkj sghuj asfdsfj Abcdef Asjdkajsk Sjdkfds ;safjkldjf kjsdfk lajd ajdkfj kajdfkl kfjgkfjg akjdkfjfgkf kjfg; alsdjf ad kjdfkj kjdsfkjd Urafkd Sdkfj kjkd eiukjfks as a dfjf eiujf ajasdkjsf kjdfkj sghuj asfdsfj Abcdef Asjdkajsk Sjdkfds ;safjkldjf kjsdfk lajd ajdkfj kajdfkl kfjgkfjg akjdkfjfgkf kjfg; alsdjf ad kjdfkj kjdsfkjd Urafkd Sdkfj kjkd eiukjfks as a dfjf eiujf ajasdkjsf kjdfkj sghuj asfdsfj Abcdef Asjdkajsk Sjdkfds ;safjkldjf kjsdfk...

Words: 297 - Pages: 2

Free Essay

Vietnamese Corporate Bond Market: J

...assessment offence. Student ID: ____________12345678_____________________ Level of Study: ____________Post Graduate_________________ Module Title: ____________Dissertation_______________ Course Title: ____________MAITF1_______________________ Module Tutor : ____________ABC_______________ Student Name: ____________ABC_____________ Student Signature: ____________Anh__________________________ Date of Submission: ____________March 14th, 2010________________ Name of first marker: Mark: Name of second marker: Mark: DISSERTATION PROPOSAL ON VIETNAMESE CORPORATE BOND MARKET: THE CAUSES OF UNDERDEVELOPMENT BY ABCDEF ABCDEF ID: 123456789 14th March, 2010 Table of contents 1. Background of study 4 1. Structure of literature review 6 2. Significance of study 6 3. Research questions and objectives 7 1. Research questions 7 2. Research objectives 7 4. Research methodology 8 1. Research design 9 2. Data collection 9 3. Ethical permission 9 5. Time scale 9 1.6.0 Resources 10 References 11 Appendix 1 12 1. Background The corporate bond market is an important link between savings and investments with the publicly traded debt instruments...

Words: 2543 - Pages: 11

Free Essay

I Don Know

........./ l~ ...../..l ....._ l~ ......l_l ......l_l ......l_l ......l_l ......l_l ......l_l ./l....l_l.l .__l_l_/ l .....llll.../ ../...llll... ./....llll,... .l....TT.... l .-------------. ..........(¯`v´¯) ...........`•.¸.•´ ........(●̮̮̃•̃)..(●̮̮̃•̃) ........ /█ ♥/█ ๑•ิ.•ั๑ ๑۩۞۩๑ ♬✿.。.:* ★ ☆ εїз℡❣·۰•●○●ōゃ ♥ ♡๑۩ﺴ ☜ ☞ ☎ ☏♡ ⊙◎ ☺ ☻✖╄ஐﻬ ► ◄ ▧ ▨ ♨ ◐ ◑ ↔ ↕ ▪ ▫ ☼ ♦ ▀ ▄ █▌ ▐░ ▒ ▬♦ ◊ ◦ ☼ ♠♣ ▣ ▤ ▥ ▦ ▩ ◘ ◙ ◈ ♫ ♬ ♪ ♩ ♭ ♪ の ☆ → あ ぃ £ ❤# @ & * ❁ ❀ ✿ ✾ ❃ ✺ ❇ ❈ ❊ ❉ ✱ ✲ ✩ ✫ ✬ ✭ ✮ ✰ ☆ ★ ✪ ¤ ☼ ☀ ☽ ☾ ❤ ♡ ღ☻ ☺ ❂ ◕ ⊕ ☉ Θ o O ♋ ☯ ㊝ ⊙ ◎◑ ◐ ۰ • ● ▪ ▫ 。 ゚ ๑ ☜ ☞ ☂ ♨ ☎ ☏ × ÷ = ≠ ≒ ∞ ˇ ± √ ⊥▶ ▷ ◀ ◁ ☀ ☁ ☂ ☃ ☄ ★ ☆ ☇ ☈ ☉ ☊ ☋ ☌ ☍ ☑ ☒☢ ☸ ☹ ☺ ☻ ☼ ☽ ☾ ♠ ♡ ♢ ♣ ♤ ♥ ♦ ♧ ♨ ♩ ✙ ✈ ✉ ✌ ✁♝ ♞♯♩♪♫♬♭♮ ☎ ☏ ☪ ♈ ♨ ₪ ™ ♂✿ ♥ の ↑ ↓ ← → ↖ ↗ ↙ ↘ ㊣ ◎ ○ ● ⊕ ⊙ ○  △ ▲ ☆ ★ ◇ ◆ ■ □ ▽ ▼ § ¥ 〒 ¢ £ ※ ♀ ♂ &⁂ ℡ ↂ░ ▣ ▤ ▥ ▦ ▧ ✐✌✍✡✓✔✕✖ ♂ ♀ ♥ ♡ ☜ ☞ ☎ ☏ ⊙ ◎ ☺ ☻ ► ◄ ▧ ▨ ♨ ◐ ◑ ↔ ↕ ♥ ♡ ▪ ▫ ☼ ♦ ▀ ▄ █ ▌ ▐ ░ ▒ ▬ ♦ ◊ ◘ ◙ ◦ ☼ ♠ ♣ ▣ ▤ ▥ ▦ ▩ ◘ ◙ ◈ ♫ ♬ ♪ ♩ ♭ ♪ ✄☪☣☢☠░ ▒ ▬ ♦ ◊ ◦ ♠ ♣ ▣ ۰•● ❤ ●•۰► ◄ ▧ ▨ ♨ ◐ ◑ ↔ ↕ ▪ ▫ ☼ ♦♧♡♂♀♠♣♥❤☜☞☎☏⊙◎ ☺☻☼▧▨♨◐◑↔↕▪ ▒ ◊◦▣▤▥ ▦▩◘ ◈◇♬♪♩♭♪の★☆→あぃ£Ю〓§♤♥▶¤๑⊹⊱⋛⋌⋚⊰⊹ ๑۩۩.. ..۩۩๑ ๑۩۞۩๑ ✲ ❈ ✿ ✲ ❈ ➹ ~.~ ◕‿- ❣ ✚ ✪ ✣ ✤ ✥ ✦❉ ❥ ❦ ❧ ❃ ❂ ❁ ❀ ✄ ☪ ☣ ☢ ☠ ☭ღღღ ▶ ▷ ◀ ◁ ☀ ☁ ☂ ☃ ☄ ★ ☆ ☇ ☈ ⊙ ☊ ☋ ☌ ☍ⓛⓞⓥⓔ๑•ิ.•ั๑ ๑۩۞۩๑ ♬✿ ☉♡ ♢ ♣ ♤ ♥ ♦ ♧ ♨ ♩ ✙✈ ✉ ✌ ✁ ✎ ✐ ❀ ✰ ❁ ❤ ❥ ❦❧ ➳ ➽ εїз℡❣·۰•●○●ゃōゃ♥ ♡๑۩ﺴ ☜ ☞ ☎ ☏♡ ⊙◎ ☺ ☻✖╄ஐﻬ ► ◄ ▧ ▨ ♨ ◐ ◑ ↔ ↕ ▪ ▫ ☼ ♦ ▀ ▄ █▌ ▐░ ▒ ▬♦ ◊ ◦ ☼ ♠♣ ▣ ▤ ▥ ▦ ▩ ◘ ◙ ◈ ♫ ♬ ♪ ♩ ♭ ♪ の ☆ → あ ぃ £ ❤ ❁ ❀ ✿ ✾ ❃ ✺ ❇ ❈ ❊ ❉ ✱ ✲ ✩ ✫ ✬ ✭ ✮ ✰ ☆ ★ ✪ ¤ ☼ ☀ ☽ ☾ ❤ ♡ ღ☻ ☺ ❂ ◕ ⊕ ☉ Θ o O ♋ ☯ ㊝ ⊙ ◎ ◑ ◐ ۰ • ● ▪ ▫ 。 ゚ ๑ ☜ ☞ ☂ ♨...

Words: 2496 - Pages: 10

Free Essay

Inquality

...the number or the variable you are multiplying or dividing by is negative. • -7x > 14 • 4x + 3 > 6x , • -1/2 x < ¾ , 1. Is x > y ? i.. wx > wy ii. w2 x > w2 y Concepts: • If a < 2 and a < 7 then a < ? . Use number line to understand this concept. • If x 2 > x then what is the range of x’s values? • If x 2 < x , then what is range of x’s values? • x 6 < x5 < x4 < x3 means what ? • -1< x < 0 , Pattern of even powers X6 < x4 < x2 . pattern of odd powers x5 > x3 > x • x even >= 0 • x odd > 0 means what ? • If a combination of a set of variables (multiplication/division) is positive then even no of negatives are there. So if abcdef/ gh > 0 then can we say abcd/efgh > 0 ? • If ab < 0 , or a/ b < 0 , then what can we conclude about sign of a and b ? • If a2b3 < 0 means what ? • If a3b5 < 0 , what can we conclude about sign of a and b ? • If x > y , can we say x 2 > y2 ? • If x > y then can we say x 3 > y 3 ? • If a > b then can we say a m > b m Easy/Medium 2. Is a2 / b > 0 ?(b not equal to zero) i. -2 < a< 4 ii. -3 < b < 5 3. Is a2 / b < 0 ? (b not equal to zero) i. -2 < a< 4 ii. 2 < b < 5 Medium/ Hard 4. Is a2 / b > 0 ? (b not equal to zero) i. -2 < a< 4 ii. 2 < b < 5 5. If -1 < x < 0 , which of the following must be true ? i. x5 < x4 ii. x 3 <...

Words: 905 - Pages: 4

Premium Essay

Cc Psychology

...Applying Anxiety to Rational Emotive Behavioral Theory Mizelle Hines St. Cloud State University Theories that can be applied to help clients cope with anxiety consist of Existential Therapy, Rational Emotive Behavioral Therapy and Gestalt Therapy. It should be noted that the focus of this essay will be on REBT. Anxiety is a feeling of dread that results from repressed feelings, memories, and experiences that emerge to the surface of awareness (Corey, 2009). However, anxiety is not only a feeling; anxiety affects your mind and body. If one’s anxiety level is too high, they may show physical symptoms. It may begin as chest pain, but result in the numbing of an entire limb or even half of a person’s body (Carleton, 2009). Anxiety is seen as a condition or disorder, but it is also noted as a metaphysical and spiritual problem (Costello, 2011). One can experience anxiety due to irrational thoughts that they have created through their cognitions. If a student has the belief that they need to ace every single class, they may become filled with anxiety when a lot of assignments are close to being due. Anxiety is fairly common amongst teens and young adults. The reason for that is because these groups of people are beginning to be brought into the “real world”; therefore there are a lot of changes constantly occurring. With changes there are also uncertainties as well, which can cause someone to experience anxiety. Anxiety can prevent people from fully living their...

Words: 1276 - Pages: 6

Premium Essay

Acc 499

...1. Which cost accumulation procedure is most applicable in continuous mass-production manufacturing environments? (Points: 1)        [pic]standard        [pic]actual        [pic]process        [pic]job order 2. Process costing is used in companies that _______. (Points: 1)        [pic]engage in road and bridge construction        [pic]produce sailboats made to customer specifications        [pic]produce bricks for sale to the public        [pic]construct houses according to customer plans 3. A producer of ____ would not use a process costing system. (Points: 1)        [pic]gasoline        [pic]potato chips        [pic]blank videotapes        [pic]stained glass windows 4. Equivalent units of production are equal to the _______. (Points: 1)        [pic]units completed by a production department in the period        [pic]number of units worked on during the period by a production department        [pic]number of whole units that could have been completed if all work of the period had been used to produce whole units        [pic]identifiable units existing at the end of the period in a production department 5. In a process costing system using the weighted average method, cost per equivalent unit for a given cost component is found by dividing which of the following by EUP? (Points: 1)        [pic]only current period cost        [pic]current period cost plus the cost of beginning inventory        [pic]current period cost less the cost...

Words: 992 - Pages: 4