query_id
stringlengths
32
32
query
stringlengths
6
2.48k
positive_passages
listlengths
1
17
negative_passages
listlengths
10
100
subset
stringclasses
7 values
6859ff360948b1da11416508cf3e216f
I have $100,000 in play money… what to do?
[ { "docid": "d41d8cd98f00b204e9800998ecf8427e", "text": "", "title": "" }, { "docid": "538fe0fb7780d4da227f8ac29f58e5f1", "text": "\"For any sort of investment you need to understand your risks first. If you're going to put money into the stock or bond market I would get a hold of Graham's \"\"The Intelligent Investor\"\" first, or any other solid value investing book, and educate yourself on what the risks are. I can't speak about real estate investing but I am sure there are plenty of books describing risks and benefits of that as well. I could see inflation/deflation having an effect there but I think the biggest impact on the landlord front is quality of life in the area you are renting and the quality of the tenant you can get. One crazy tenant and you will be driven mad yourself. As for starting a business, one thing I would like to say is that money does not automatically make money. The business should be driven by a product or service that you can provide first, and the backing seed capital second. In my opinion you will have to put energy and time worth much more than the 100k into a business over time to make it successful so the availability of capital should not be the driving decision here. Hope this helps more than it confuses.\"", "title": "" }, { "docid": "7b3814bee32bbff489cc9ad4c2a1fdb0", "text": "You can start a software company. Than your office will be around the world and you can work whenever you want. If you can appoint some people who can collect work from here and there and the coder around the world can give you the job done(this can be done by posting your work in various freelancing site). It is challenging, because you have to get yourself up-to-date with the technological things.", "title": "" }, { "docid": "1dafd282bb5c66c61fbf2635c3adf89c", "text": "As you have already good on your retirement kitty. Assuming you have a sufficient cash for difficult situations, explore the options of investing in Shares and Mutual Funds. As you are new to Stock Market, begin slowly by investing into Mutual Funds and ETF for precious metals. This will help you understand and give you confidence on markets and returns. Real estate is a good option, the down side being the hassle of getting rental and the illiquid nature of the investment.", "title": "" }, { "docid": "ebc700f37f7823b58cf96ca1d3d587ae", "text": "If you want a concrete investment tip, precious metals (e.g. gold, silver) are on a pretty good run these days, personally I still think they have ways to go as there are just too many problems with modern monetary policy of an almost existential nature, and gold and silver are better stores of value than fiat money. Silver is particularly hot right now, but keep in mind that the increased volatility means increased risk. If the Fed keeps its foot on the pedals of the dollar printing press and we get QE3 this summer, that will most likely mean more people piling into the PMs to hedge against inflation. If the Fed starts to tighten it's policy then that's probably bad news for both equities and bonds and so PMs could be seen as a safe haven investment. These are the main reasons why PMs take up a good portion of my portfolio and will continue to do so untill I see how the global economy plays out over the next couple of years.", "title": "" } ]
[ { "docid": "2c0c8bfb2dacdf0908a0ca468fa7203e", "text": "The following advice assumes that you have a significant amount already in the account in cash equivalents. If you are only talking a few hundred bucks or so, then just jump in at the next dip (like today's). If you have a larger amount to move into equities, the safest approach is to gradually move it into investments over some period of time at regular intervals regardless of what is going on in the market. This mitigates the risk of investing it all into an fund that is peaking at the exact moment you buy. So, for example, you might invest 20% of the total amount each month for 5 months to gradually get into the market. The larger the amount you are investing, the more you probably want to spread it out, but don't spread it out much further than a year or you are losing opportunity cost by leaving your money in cash-type investments with likely a very poor rate of return. This strategy is called dollar-cost averaging if you want to research it more.", "title": "" }, { "docid": "f77161ebc75b3cf13e4813498cc4d564", "text": "There isn't any place you can put $300 and turn it into significant passive income. What you need to do instead is manage the active (work) income that you have so that your money goes farther, freeing income up for reducing debt and investing. Investing $300 one time won't add up to much, but investing $100 a month will turn into wealth over time. Making a monthly budget is the key to managing your income. In the process, you'll find out where your income is going, and you can be intentional about how much you want to spend on different things in your life. You can allocate some of your income to paying down debt and investing, which is what you need to do to get ahead. For some general guidelines on what to do with your money first, read this question: Oversimplify it for me: the correct order of investing. For more specifics on creating a budget, eliminating debt, and building wealth, I recommend the book The Total Money Makeover by Dave Ramsey.", "title": "" }, { "docid": "562199728b298b68e02ab2224814095c", "text": "\"Your only real alternative is something like T-Bills via your broker or TreasuryDirect or short-term bond funds like the Vanguard Short-Term Investment-Grade Fund. The problem with this strategy is that these options are different animals than a money market. You're either going to subject yourself to principal risk or lose the flexibility of withdrawing the money. A better strategy IMO is to look at your overall portfolio and what you actually want. If you have $100k in a money market, and you are not going to need $100k in cash for the forseeable future -- you are \"\"paying\"\" (via the low yield) for flexibility that you don't need. If get your money into an appropriately diversified portfolio, you'll end up with a more optimal return. If the money involved is relatively small, doing nothing is a real option as well. $5,000 at 0.5% yields $25, and a 5% return yields only $250. If you need that money soon to pay tuition, use for living expenses, etc, it's not worth the trouble.\"", "title": "" }, { "docid": "a849b511991ca24f1b68207ffef4b33a", "text": "How do I direct deposit my paycheck into a high yield financial vehicle, like lottery tickets? And can I roll over my winnings into more lottery tickets? I want to wait until I have a few billion before touching it, maybe in a year or two.", "title": "" }, { "docid": "50f0f55d05c9ca3afe2902f82d83e655", "text": "You can't have even a hundred dollars without it being invested somewhere. If it's cash, you're invested in some nation state's currency. If that currency is USD, you have lost about 6% so far this year. But what if you were in the stock market? It's been doing pretty well, no? Thing is, American stocks are priced in American dollars. You have to put those variables together to see what a stock has really been doing.", "title": "" }, { "docid": "b4a07897823bdd213012a5c4d7dcf56d", "text": "\"First: do you understand why it dropped? Was it overvalued before, or is this an overreaction to some piece of news about them, or about their industry, or...? Arguably, if you can't answer that, you aren't paying enough attention to have been betting on that individual stock. Assuming you do understand why this price swing occurred -- or if you're convinced you know better than the folks who sold at that price -- do you believe the stock will recover a significant part of its value any time soon, or at least show a nice rate of growth from where it is now? If so, you might want to hold onto it, risking further losses against the chance of recovering part or all of what is -- at this moment -- only a loss on paper. Basically: if, having just seen it drop, you'd still consider buying it at the new price you should \"\"buy it from yourself\"\" and go on from here. That way at least you aren't doing exactly what you hope to avoid, buying high and selling low. Heck, if you really believe in the stock, you could see this as a buying opportunity... On the other hand, if you do not believe you would buy it now at its new price, and if you see an alternative which will grow more rapidly, you should take your losses and move your money to that other stock. Or split the difference if you aren't sure which is better but can figure out approximately how unsure you are. The question is how you move on from here, more than how you got here. What happened happened. What do you think will happen next, and how much are you willing to bet on it? On the gripping hand: This is part of how the market operates. Risk and potential reward tend to be pretty closely tied to each other. You can reduce risk by diversifying across multiple investments so no one company/sector/market can hurt you too badly --- and almost anyone sane will tell you that you should diversify -- but that means giving up some of the chance for big winnings too. You probably want to be cautious with most of your money and go for the longer odds only with a small portion that you can afford to lose on. If this is really stressing you out, you may not want to play with individual stocks. Mutual funds have some volatility too, but they're inherently diversified to a greater or lesser extent. They will rarely delight you, but they won't usually slap you this way either.\"", "title": "" }, { "docid": "391d43d1cf4f10b5872dc46e5f2045f0", "text": "Alright so you have $12,000 and you want to know what to do with it. The main thing here is, you're new to investments. I suggest you don't do anything quick and start learning about the different kinds of investment options that can be available to you with returns you might appreciate. The most important questions to ask yourself is what are your life goals? What kind of financial freedom do you want, and how important is this $12,000 dollars to you in achieving your life goals. My best advice to you and to anyone else who is looking for a place to put their money in big or small amounts when they have earned this money not from an investment but hard work is to find a talented and professional financial advisor. You need to be educated on the options you have, and keep them in lines of what risks you are willing to take and how important that principal investment is to you. Investing your money is not easy at all, and novices tend to lose their money a lot. The same way you would ask a lawyer for law advice, its best to consult a financial planner for advice, or so they can invest that money for you.", "title": "" }, { "docid": "087e6933bdc64feb0d5331a49f615b23", "text": "\"So, you have $100k to invest, want a low-maintenance investment, and personal finance bores you to death. Oooohhh, investment companies are gonna love you. You'll hand them a wad of cash, and more or less say \"\"do what you want.\"\" You're making someone's day. (Just probably not yours.) Mutual fund companies make money off of you regardless of whether you make money or not. They don't care one bit how carefully you look at your investments. As long as the money is in their hands, they get their fee. If I had that much cash, I'd be looking around for a couple of distressed homes in good neighborhoods to buy as rentals. I could put down payments on two of them, lock in fixed 30-year mortgages at 4% (do you realize how stupid low that is?) and plop tenants in there. Lots of tax write-offs, cash flow, the works. It's a 10% return if you learn about it and do it correctly. Or, there have been a number of really great websites that were sold on Flippa.com that ran into five figures. You could probably pay those back in a year. But that requires some knowledge, too. Anything worthwhile requires learning, maintenance and effort. You'll have to research stocks, mutual funds, bonds, anything, if you want a better than average chance of getting worthwhile returns (that is, something that beats inflation, which savings accounts and CDs are unlikely to do). There is no magic bullet. If someone does manage to find a magic bullet, what happens? Everyone piles on, drives the price up, and the return goes down. Your thing might not be real estate, but what is your thing? What excites you (i.e., doesn't bore you to death)? There are lots of investments out there, but you'll get out of it what you put into it.\"", "title": "" }, { "docid": "d792f323f05b1db6ee224d964a05ab4d", "text": "A safe investment would be to get a 5-year CD from Ally Bank. No minimum deposit and no monthly maintenance fees. 1.74% APY at the moment. I would choose a 5-year CD since the early withdrawal penalty is only 60 days interest, which will be negligible for a $100 investment and increasing the term significantly increases your interest rate. Regarding other suggestions: Even if you find a way purchase stock commission free, it will probably cost a $5-$10 commission to sell, wiping out probably a year or two of gains. Also, I-Bonds must be held for a year minimum, which is problematic. At the end of the day, it's probably not really worth your time to do any of these. $2 a year or $5 a year, it's still fairly insignificant and your time is surely worth more than that.", "title": "" }, { "docid": "ab63ebccd465e91061835ecbb7464e7b", "text": "First, what's the reason? Why do you have that much in cash at all - are you concerned about market volatility, are you planning to buy a house, do you have tens of millions of dollars and this is your slush fund? Are you a house flipper and this is part of business for you? If you need the money for short term use - ie, you're buying a house in cash next month - then as long as you're in a sound bank (one of the big national ones, for example) it seems reasonable. You can never predict a crash like 2008, but it seems unlikely that Chase or Citibank will go under in the next few weeks. If you like to have a cash position, then split the money among multiple banks. Buy a CD at one major bank with some of the amount. My in-laws have a trust which is partially invested in CDs, and they use multiple banks for this purpose to keep their accounts fully insured. Each separate bank you're covered up to 250k, so if you have $150k at Chase and $150k at a local bank, you're covered. (You're also covered in a much larger amount - up to 1MM potentially - if you are married, as you can have a separate account each for $250k and a joint account up to $500k.) Otherwise, why do you have that much in cash? You should invest it in something that will return more than inflation, at a minimum... Edit post-clarifications: $350k is around my level of 'Maybe, maybe not'. You're risking $100k on a pretty low risk (assuming this isn't a small local bank, and even those are pretty low still). In order to remove that risk you have to do something active - ie, take 100k somewhere else, open a new bank account, etc. - which isn't exactly the hardest thing in the world, but it does take effort. Is it worth the 0.001% chance (entirely made up) you lose the 100k? That's $10, if you agree with that risk chance. Up to you. It wouldn't be particularly hard, though, to open an account with an online bank, deposit $100k in there in a 6 month CD, then pay the IRS from your other account and when the 6 month CD expires take the cash back into your active account. Assuming you're not planning on buying a house in the next six months this should be fine, I'd think (and even then you'd still have $150k for the downpayment up front, which is enough to buy a $750k house w/o PMI). Additionally, as several commenters note: if you can reasonably do so, and your money won't be making significant interest, you might choose to pay your taxes now rather than later. This removes the risk entirely; the likely small interest you earn over 3 months may be similar to the amount you'd spend (mostly of your time, plus possibly actual expenses) moving it to another bank. If you're making 2% or 3% this may not be true, but if you're in a 0.25% account like my accounts are, $100k * 0.25% * 0.25 is $62.50, after all.", "title": "" }, { "docid": "992d568e9fb89ec12d5ec9d42554e089", "text": "What is your investing goal? And what do you mean by investing? Do you necessarily mean investing in the stock market or are you just looking to grow your money? Also, will you be able to add to that amount on a regular basis going forward? If you are just looking for a way to get $100 into the stock market, your best option may be DRIP investing. (DRIP stands for Dividend Re-Investment Plan.) The idea is that you buy shares in a company (typically directly from the company) and then the money from the dividends are automatically used to buy additional fractional shares. Most DRIP plans also allow you to invest additional on a monthly basis (even fractional shares). The advantages of this approach for you is that many DRIP plans have small upfront requirements. I just looked up Coca-cola's and they have a $500 minimum, but they will reduce the requirement to $50 if you continue investing $50/month. The fees for DRIP plans also generally fairly small which is going to be important to you as if you take a traditional broker approach too large a percentage of your money will be going to commissions. Other stock DRIP plans may have lower monthly requirements, but don't make your decision on which stock to buy based on who has the lowest minimum: you only want a stock that is going to grow in value. They primary disadvantages of this approach is that you will be investing in a only a single stock (I don't believe that can get started with a mutual fund or ETF with $100), you will be fairly committed to that stock, and you will be taking a long term investing approach. The Motley Fool investing website also has some information on DRIP plans : http://www.fool.com/DRIPPort/HowToInvestDRIPs.htm . It's a fairly old article, but I imagine that many of the links still work and the principles still apply If you are looking for a more medium term or balanced investment, I would advise just opening an online savings account. If you can grow that to $500 or $1,000 you will have more options available to you. Even though savings accounts don't pay significant interest right now, they can still help you grow your money by helping you segregate your money and make regular deposits into savings.", "title": "" }, { "docid": "034885719490c4aa45d6c1e091c10c41", "text": "\"What you're asking for is a short-term, large return investment. When looking for big returns in a short period of time, risk is inevitable. The more risk you are willing to assume, the higher your potential returns. Of course, the flip is is that the higher your risk, the higher the potential to lose all your money! Since this is an exercise for school (and not real money and not your life savings) your best bet is to \"\"go big or go home\"\". You can safely assume 100% risk! Don't look for value stocks, dividend stocks, or anything that pays a steady return over a long period of time. Instead, look for something risky that has the potential of going up, up, up in the next few months. Are you allowed to trade options in your fake portfolio? Options can have big risk and big reward potential. Penny stocks are super volatile, too. Do some research, look for a fad. In other words, you will most likely lose it all. But you get a little lucky, you could win this thing outright by making some risky investments. A 5% chance of winning $3000 vs 95% of going broke may be pretty good odds if everyone else is value investing for just a few months. You will need to get lucky. Go big or go home!\"", "title": "" }, { "docid": "966466d52e4f69435e9bd353a0e53e7d", "text": "You are long the puts. By exercising them you force the underlying stock to be bought from you at your strike price. Let's say your strike it $100 and the stock is currently $25. Buy 100 shares and exercise 1 (bought/long) put. That gives you $7500 of new money, so do the previous sentence over again in as many 'units' as you can.", "title": "" }, { "docid": "c04c94c58cc1e469ef411466c4daa4f9", "text": "\"The €100'000 limit is per bank, where \"\"bank\"\" is defined as a financial institution with a banking license from one of the ECB members. \"\"WeltSparen\"\", is operated by the MHB-Bank which is a German bank, recognized by the Bundesbank. That means your money is initially guaranteed by the Bundesbank. When it's moved to the final saving account, you'll be saving at other banks, which are identified in the individual offerings. This can be an effective technique to split capitals in excess of €100.000. You should obviously look for banks that are backed by ECB member banks, but keep in mind what happened to Iceland: the national banks can also fail. In particular, the Bank of Italy at the moment is looking a bit shaky because Monte dei Paschi di Siena is currently failing and will require a bail-out. There's no official back-up for failing national banks within the ECB system.\"", "title": "" }, { "docid": "51863cda125d76edb58e5d99691c7392", "text": "\"As you've observed, when you're dealing with that amount of money, you're going to have to give up FDIC guarantees. That means that keeping the money in a bank account carries some risk with it: if that particular bank goes bust, you could lose most of your money. There are a few options to stretch the FDIC limit such as CDARS, but likely can't handle your hypothetical $800 million. So, what's a lucky winner to do? There are a few options, including treasury securities, money market funds, and more general capital investments such as stocks and bonds. Which one(s) are best depend on what your goals are, and what kind of risks you find acceptable. Money in the bank has two defining characteristics: its value is very stable, and it is liquid (meaning you can spend it very easily, whenever you want, without incurring costs). Treasury securities and money market funds each focus on one of these characteristics. A treasury security is a piece of paper (or really, an electronic record) saying that the US Federal Government owes you money and when they will pay it back. They are very secure in that the government has never missed a payment, and will move heaven and earth to make sure they won't miss one in the future (even taking into account recent political history). You can buy and sell them on an open market, either through a broker or directly on the Treasury's website. The major downside of these compared to a bank account is that they're not as liquid as cash: you own specific amounts of specific kinds of securities, not just some number of dollars in an account. The government will pay you guaranteed cash on specified dates; if you need cash on different dates, you will need to sell the securities in the open market and the price will be subject to market fluctuations. The other \"\"cash-like\"\" option is money market funds. These are a type of mutual fund offered by financial companies. These funds take your money and spread it out over a wide variety of very low risk, very short term investments, with the goal of ensuring that the full value will never go down and is available at any time. They are very liquid: you can typically transfer cash quickly and easily to a normal bank account, write checks directly, and sometimes even use \"\"online bill pay\"\"-like features. They have a very good track record for stability, too, but no one is guaranteeing them against something going terribly wrong. They are lower risk than a (non-FDIC-insured) bank account, since the investments are spread out across many institutions. Beyond those two somewhat \"\"cash-like\"\" options, there are of course other, more general investments such as stocks, bonds, and real estate. These other options trade away some degree of stability, liquidity, or both, in exchange for better expected returns.\"", "title": "" } ]
fiqa
3c5bbc2dfdc5dcfa5aa8ca0fa34462f0
What is the correct answer for percent change when the start amount is zero dollars $0?
[ { "docid": "d17d924c5b82e1f761143e2f7cd919da", "text": "\"There is no numerical convention in finance that I have ever seen. If you look at statements or reports that measure growth when the starting value is negative or zero, you typically see \"\"n/a\"\" or \"\"-\"\" or \"\"*\"\" as the result. Any numerical result would be meaningless. Suppose you used 100% and another company had a legitimate 150% gain - where would the 100% change rank? What do my manager and investors expect to see? As a financial analyst - I would not want to see 100%. I would instead rather see something that indicates that the % change is meaningless. As an example, here's the WSJ documentation on change in Net Income: Net Income percent change is the change from the same period from a year ago. Percent change is not provided if either the latest period or the year-ago period contains a net loss. Thinking about it in another context: Yesterday you and your friend had no apples. Today you have 1 and your friend has 20. What percentage increase did you both have? Did you both have a 100% increase? How can you indicate that your friend had a larger \"\"increase\"\"? In that case (and in finance), the context needs to turn from a percentage increase to an absolute increase. A percentage increase is that scenario is meaningless.\"", "title": "" }, { "docid": "590aa6996f150a72de01c54b41dfb58b", "text": "A value of zero or a negative value makes the percent change meaningless. Saying 100% when going from 0 to some other value is simply wrong. I have seen a similar situation several times when looking at a public company with a loss last quarter. On Google Finance or some other service, the PE ratio will be blank, N/A, or something like that. If the company does not currently have earnings, then the PE ratio is meaningless. Likewise, if the company previously did not have earnings, then the percent change of the earnings is meaningless. Also consider the example where the previous value was negative. If the previous value was negative 1 and the current value is positive 99, then this happens: A negative change? But the value went up! Obviously that value does not make sense and should not be shown.", "title": "" }, { "docid": "1bebf9136552042b7b175f8f18b7ff50", "text": "\"I'd personally display \"\"n/a\"\" The only other answer that makes sense to me other is \"\"infinity\"\" (phone keyboard doesn't allow me to input the symbol). This would at least allow you to show direction by using positive and negative infinity and mathematical as the the initial value approaches zero the percentage change approaches infinity which is the closet you can get to a meaningful value\"", "title": "" }, { "docid": "e1ce8250eb72a7472e0fcb696d1dc384", "text": "\"In general, when dealing with quantities like net income that are not restricted to being positive, \"\"percentage change\"\" is a problematic measure. Even with small positive values it can be difficult to interpret. For example, compare these two companies: Company A: Company B: At a glance, I think most people would come away with the impression that both companies did badly in Y2, but A made a much stronger recovery. The difference between 99.7 and 99.9 looks unimportant compared to the difference between 100,000 and 40,000. But if we translate those to dollars: Company A: Y1 $100m, Y2 $0.1m, Y3 $100.1m Company B: Y1 $100m, Y2 $0.3m, Y3 $120.3m Company B has grown by a net of 20% over two years; Company A by only 1%. If you're lucky enough to know that income will always be positive after Y1 and won't drop too close to zero, then this doesn't matter very much and you can just look at year-on-year growth, leaving Y1 as undefined. If you don't have that guarantee, then you may do better to look for a different and more stable metric, the other answers are correct: Y1 growth should be left blank. If you don't have that guarantee, then it might be time to look for a more robust measure, e.g. change in net income as a percentage of turnover or of company value.\"", "title": "" }, { "docid": "dff0902175f068b2fc59f801e6972199", "text": "As has been said before, going from nothing to something is an infinite percent increase! It is not 100%. Maybe you had a dollar and now have $101 that is a 10000% increase! Quite remarkable. I often work with symmetrized percent changes like: spc = 100 * (y2-y1)/(0.5 * (y1+y2)) Where I compute the percent with respect to the average. First this is more stable as often measurements can have noise, the average is more reliable. Second advantage is also that this is symmetric. So going from 95 to 105 is a 10 % increase while going from 105 to 95 a 10% decrease. Of course you need to explain what you show.", "title": "" }, { "docid": "e898bbf75859f38482dd86f748db8f8c", "text": "\"Anyone who has any business looking at growth numbers will know thay are meaningless in the first year, So all they need to know is that it's the first year. It's no different than the Billboard music charts' treatment of the \"\"last week's chart ranking\"\" and \"\"movement up/down\"\" columns. It will help with visual layout if the figure used is about the same size as a percentage number. \"\"New\"\" fits nicely.\"", "title": "" }, { "docid": "ee38726681a5935fb3c798007c9782f8", "text": "In computing, you'd generally return naa%, for 'not a number'. Could you not put '-%' to show there is no value at this point? Surely the people seeing this aren't idiots and understand the charge on 0 is 0?", "title": "" }, { "docid": "9ab34fa1e97c390c4c13e64aa2032e11", "text": "What is the probability of a real occasion (meaning not just an example) being exactly zero? Even if you have 0.1 you can still do the math. Also, it is kind of depending on the occasion. For example, you want to calculate the ROI of an investment for which you had zero capital and you made that investment with leverage, meaning you got a loan. In order to get that loan you should have provided a collateral, so in this case as a starting sum you use the collateral. In another example, say EAT it's difficult to have exactly zero. So, in most cases you won't have to deal with zero values, only positives and negatives.", "title": "" }, { "docid": "92ee9cadaa14d9d89f6ca7d5aaa4a99e", "text": "\"There are some assumptions which can be made in terms of the flexibility you have - I will start with the least flexible assumption and then move to more flexible assumptions. If you must put down a number 1, your go-to for this(\"\"Change the start period to 1\"\"), is pretty good, and it's used frequently for other divide-by-zero calculations like kda in a video game. The problem I have with '1' is that it doesn't allow you to handle various scales. Some problems are dealt with in thousands, some in fractions, and some in hundreds of millions. Therefore, you should change the start period to the smallest significantly measurable number you could reasonably have. Here, that would take your example 0 and 896 and give you an increase of 89,500%. It's not a great result, but it's the best you can hope for if you have to put down a number, and it allows you to keep some of the \"\"meaning in the change.\"\" If you absolutely must put something This is the assumption that most answers have taken - you can put down a symbol, a number with a notation, empty space, etc, but there is going to be a label somewhere called 'Growth' that will exist. I generally agree with what I've seen, particularly the answers from Benjamin Cuninghma and Nath. For the sake of preservation - those answers can be summarized as putting 'N/A' or '-', possibly with a footnote and asterisk. If you can avoid the measurement entirely The root of your question is \"\"What do my manager and investors expect to see?\"\" I think it's valuable to dig even further to \"\"What do my manager and investors really want to know?\"\". They want to know the state of their investment. Growth is often a good measurement of that state, but in cases where you are starting from zero or negative, it just doesn't tell you the right information. In these situations, you should avoid % growth, and instead talk in absolute terms which mention the time frame or starting state. For example:\"", "title": "" } ]
[ { "docid": "b4c8cbc3034a103d9df73fef25e0fa3a", "text": "\"When using Time Value of Money equations, you need to know when the flow starts. A mortgage for example, has a first payment at the end of the first time period, usually 1 month. For savings, one can start the account with a deposit of course, or start by saying \"\"I will deposit $XXX at the end of each month. The answer really depends on the exact details of the situation. In your example, I'm inclined to suggest first flow is 1 year out.\"", "title": "" }, { "docid": "175eb77b00771165926f3d2ac67c4b6d", "text": "I think is an excellent idea. Use free money or almost free to do a lump sump payment. My recommendation is to have a reminder to pay credit card before, almost finishing, the 0% APR period.", "title": "" }, { "docid": "589d5275ed384c541d389fc3a4b612d8", "text": "I am sure everyone is different, but it has helped me a great deal. I have had several card balances go up and the interest on those per month was more than $200 in just interest combined. I transferred the balances over to 0% for 15 months – with a fee, so the upfront cost was about $300. However, over the next 15 months at 0% I'm saving over $200 each month. Now I have the money to pay everything off at 14 months. I will not be paying any interest after that, and I cut up all of my cards so I won't rack up the bills with interest on them anymore. Now, if I can't buy it with a debit card or cash, I don't get it. My cards went up so high after remodeling a home so they were justified. It wasn't because I didn't pay attention to what I could afford. My brother, on the other hand, has trouble using credit cards properly and this doesn't work for him.", "title": "" }, { "docid": "4a6861c5a6ac2146025b8a13d9207d3c", "text": "That's pretty typical for introductory problems. It's leading you into an NPV question. They're keeping the cash flows the same to illustrate the time value of money to show you that even though the free cash flow is the same in year 1 and year 4 or whatever when you discount it to present value today's stream is worth more than tomorrow's", "title": "" }, { "docid": "70d0915408fb98db5d2f5e7cb0c31731", "text": "Assuming cell A1 contains the number of trades: will price up to A1=100 at 17 each, and the rest at 14 each. The key is the MAX and MIN. They keep an item from being counted twice. If X would end up negative, MAX(0,x) clamps it to 0. By extension, if X-100 would be negative, MAX(0, X-100) would be 0 -- ie: that number doesn't increase til X>100. When A1=99, MIN(a1,100) == 99, and MAX(0,a1-100) == 0. When A1=100, MIN(a1,100) == 100, and MAX(0,a1-100) == 0. When A1=101, MIN(a1,100) == 100, and MAX(0,a1-100) == 1. Of course, if the 100th item should be $14, then change the 100s to 99s.", "title": "" }, { "docid": "41d16faa39889d7deb9d94d194aa8873", "text": "It helps to put the numbers in terms of an asset. Say a bottle of wine costs 10 dollars, but the price rises to 20 dollars a year later. The price has risen 100%, and your dollars have lost value. Whereas your ten used to be worth 100% of the price of bottle of wine, they now are worth 50% of the risen price of a bottle of wine so they've lost around 50% of their value. Divide the old price by the new inflated price to measure proportionally how much the old price is of the new price. 10 divided by 20 is 1/2 or .50 or 50%. You can then subtract the old price from the new in proportional terms to find how much value you've lost. 1 minus 1/2 or 1.00 minus .50 or 100% minus 50%.", "title": "" }, { "docid": "1f26c59fd47f52343873a025355c1497", "text": "Let's say the money-giver gets apples by you and he gives you money for them. The money you now have is worth to get apples. If the money now would change its value to negative, the roles would change opposites and you'd owe the money-giver (whom you already gave apples to) even more apples. That's simply insane. The worst money value can be is zero.", "title": "" }, { "docid": "eea446cbb3ebab34ec08cdc4dd791dde", "text": "That would have been a good idea. They don't charge interest on a $0 balance, but if you payoff your account after the cycle date, there is a hidden balance and that balance will accrue interest. It is only a few cents a day. I just don't think it is legal for them to refuse to provide you a payoff quote mid cycle. I'm almost certain. When I worked for Discover it was a key point in training to not give the wrong amount and to make sure to use the calculator in the system to quote a daily balance, how much it goes up per day, and how much they should send if they were mailing the payment, giving consideration for the time it takes to receive/process the payment.", "title": "" }, { "docid": "7bf0d506705cfb813417bf5edc31f44c", "text": "\"Emotion aside, you can calculate the cost of the funds you have tied up at the bank. If I can earn 5% in a CD, my \"\"free\"\" checking with minimum $5000 balance really costs me $250/yr. You have money tied up, I understand, but where would you place it otherwise, and at what return? The subject of frequent trading even at zero cost is worth addressing, but not the real subject of your question. So, I'll leave it for elsewhere.\"", "title": "" }, { "docid": "3bfc351c9143b98206dae397687e2531", "text": "\"Some stocks do fall to zero. I don't have statistics handy, but I'd guess that a majority of all the companies ever started are now bankrupt and worth zero. Even if a company does not go bankrupt, there is no guarantee that it's value will increase forever, even in a general, overall sense. You might buy a stock when it is at or near its peak, and then it loses value and never regains it. Even if a stock will go back up, you can't know for certain that it will. Suppose you bought a stock for $10 and it's now at $5. If you sell, you lose half your money. But if you hold on, it MIGHT go back up and you make a profit. Or it might continue going down and you lose even more, perhaps your entire investment. A rational person might decide to sell now and cut his losses. Of course, I'm sure many investors have had the experience of selling a stock at a loss, and then seeing the price skyrocket. But there have also been plenty of investors who decided to hold on, only to lose more money. (Just a couple of weeks ago a stock I bought for $1.50 was selling for $14. I could have sold for like 900% profit. Instead I decided to hold on and see if it went yet higher. It's now at $2.50. Fortunately I only invested something like $800. If it goes to zero it will be annoying but not ruin me.) On a bigger scale, if you invest in a variety of stocks and hold on to them for a long period of time, the chance that you will lose money is small. The stock market as a whole has consistently gone up in the long term. But the chance is not zero. And a key phrase is \"\"in the long term\"\". If you need the money today, the fact that the market will probably go back up within a few months or a year or so may not help.\"", "title": "" }, { "docid": "2567d6fa7f6d9b36d7fbb5b5533d52b1", "text": ">I don't understand the logic of converting a cost of funds of 4% to a monthly % and then subtracting that number from an annual one (the 1.5%). I know it was wrong, so how would you approach it? >Unfortunately without seeing the case I really can't help you...there was likely much you have left out from above. All the relevant details I received for the case are here. What other info are you looking for?", "title": "" }, { "docid": "aa2964de81eca81d7599394cdb34f979", "text": "First of all any loan will have the last payment be slightly different than the rest. Even if the interest rate is zero it is hard to have a perfect monthly payment amount. By perfect I mean the amount of the loan divided by the number of months would be $ddd.cc0000... When looking at the amortization table the last payment will either be slightly higher or lower to adjust for the rounding that was done. My suspicion is that the rounding would have resulted in a left over 12 cents. It is also possible that you are paying it off slightly early and the computer is simply taking the leftover amount an spreading it over the remaining period of the loan. You could be paying it early because for the main part of the loan was paid to a company that rounds all payments to the higher dollar, or has a minimum monthly payment amount. I looked at the company you mentioned in the question, and searched the site for an amortization tool. I found it, and used the pre-filled in example. https://www.edfinancial.com/amortizationschedule?pmts=120&intr=6.8&prin=25000 If that last payment is not adjusted the borrower will still owe $0.12. The fact it equals your situation is a coincidence. But is does show what can happen.", "title": "" }, { "docid": "7c35140524ccf9b513b1f488b10cb16a", "text": "\"of course if you asked me to give you $24.4955 I can't. No, but if I asked you to give me $24.4955 and you gave me a piece of paper saying \"\"I O U $24.4955\"\", and then this happened repeatedly until I had collected 100 of these pieces of paper from you, then I could give them back to you in exchange for $2449.55 of currency. There's nothing magical about the fact that there doesn't happen to be a $0.001 coin in current circulation. This question has some further information.\"", "title": "" }, { "docid": "16a624a10ee783824d9bef140250bf4d", "text": "Consider inflation. If you invest $10,000 today, you need to make a few hundred dollars interest just to make up for inflation - if there is 3% inflation then a change from $10,000 to $10,300 means you didn't actually make any money.", "title": "" }, { "docid": "838c715b7d504db807ab5448b6489856", "text": "I think examining the effects and potential implications of China's involvement with the stock market may be productive. Some interesting examples would be the failed market circuit breakers and the restrictions of short-selling in 2016. Not sure that this would qualify as a real topic, but may give you food for thought.", "title": "" } ]
fiqa
693132806ed90f1fca106051fd4e8d3b
Optimal way to use a credit card to build better credit?
[ { "docid": "e691b6e7366ed7139f4b518953281dd1", "text": "\"First I would like to say, do not pay credit card companies in an attempt to improve your credit rating. In my opinion it's not worth the cash and not fair for the consumer. There are many great resources online that give advice on how to improve your credit score. You can even simulate what would happen to your score if you did \"\"this\"\". Credit Karma - will give you your TransUnion credit score for free and offers a simulation calculator. If you only have one credit card, I would start off by applying for another simply because $700 is such a small limit and to pay a $30 annual fee seems outrageous. Try applying with the bank where you hold your savings or checking account they are more likely to approve your application since they have a working relationship with you. All in all I would not go out of my way and spend money I would not have spent otherwise just to increase my credit score, to me this practice is counter intuitive. You are allowed a free credit report from each bureau, once annually, you can get this from www.annualcreditreport.com, this won't include your credit score but it will let you see what banks see when they run your credit report. In addition you should check it over for any errors or possible identity theft. If there are errors you need to file a claim with the credit agency IMMEDIATELY. (edit from JoeT - with 3 agencies to choose from, you can alternate during the year to pull a different report every 4 months. A couple, every 2.) Here are some resources you can read up on: Improve your FICO Credit Score Top 5 Credit Misconceptions 9 fast fixes for your credit scores\"", "title": "" }, { "docid": "a3fce490685e386e16b16c2e938b82cf", "text": "Great question. First, my recommendation would be for you to get a card that does not have a yearly fee. There are many credit cards out there that provide cash back on your purchases or points to redeem for gift cards or other items. Be sure to cancel the credit card that you have now so you don't forget about that yearly fee. Canceling will have a temporary impact on your credit score if the credit card is your longest held line of credit. Second, it is recommended not to use more than 20% of all the available credit, staying above that line can affect your credit score. I think that is what you are hearing about running up large balances on your credit card. If you are worried about staying below the 20% line, you can always request a larger line of credit. Just keep paying it off each month though and you will be fine. You already have a history of credit if you have begun paying off your student loans.", "title": "" }, { "docid": "65d9835f86fa210b70fdb53be783b9df", "text": "\"I answered a similar question, How will going from 75% Credit Utilization to 0% Credit Utilization affect my credit score?, in which I show a graph of how utilization impacts your score. In another answer to Should I keep a credit card open to maintain my credit score?, I discuss the makeup of your score. From your own view at Credit Karma, you can see that age of accounts will help your score, so now is the time to get the right cards and stay with them. My background is technology (electrical engineer) and MBA with a concentration in finance. I'm not a Psychology major. If one is undisciplined, credit can destroy them. If one is disciplined, and pays in full each month, credit is a tool. The quoting of billionaires is a bit disingenuous. I've seen people get turned away at hotels for lack of a credit card. $1000 in cash would not get them into a $200/night room. Yes, a debit card can be used, but the rental car and hotel \"\"reserve\"\" a large amount on the card, so if you don't have a high balance, you may be out of town and out of luck. I'll quote another oft-quoted guru: \"\"no one gets rich on credit card rewards.\"\" No, but I'm on track to pay for my 13 year old's last semester in college with the rewards from a card that goes right into her account. It will be great to make that withdrawal and not need to take the funds from anywhere else. The card has no fee, and I've not paid them a dime in interest. By the way, with 1-20% utilization ideal, you want your total available credit to be 5X the highest monthly balance you'd every hit. Last - when you have a choice between 2% cash reward, and the cash discount Kevin manages, take the discount, obviously.\"", "title": "" }, { "docid": "3b64b7488d616ae026c37b3cf64919b2", "text": "In addition to the already good answers: I am assuming you are playing a long game and have no specific need for a high credit score in the next couple of years. This list is just good practice that will raise you score.", "title": "" }, { "docid": "3dfae77394018b4ded73741d3303cda0", "text": "\"Or here's a better idea: don't have a credit card at all. They offer no real benefits and plenty of dangers. Don't take my word for it, though: \"\"I tell every student class I get, high school students, university students, you know, they'd be better off if they never used credit cards\"\" - Warren Buffet (Net worth: $44 billion) Before anyone says anything about using credit cards \"\"wisely\"\" and getting the rewards points, I can save 15% on many kinds of large purchases ($100+) using cash. You won't find a reward system offering that level of incentive. Two recent examples of cash discounts: After I bought my house I needed a lawnmower and a my wife wanted a new vacuum cleaner. Went to Lowe's and found the ones we wanted. They were $600 combined. Found the manager, stuck five $100 bills in his hand and said \"\"this is what I have, and that is what I need.\"\" 16.6% saved. Bought my daugher a bed recently. Queen box spring and mattress were on sale for $300 but it didn't come with the rails, which they wanted $50 extra for. Went to the bank and got $320 in cash from the bank, walked in, set it in his hand and said, \"\"I need the bed box spring and rails, tax included.\"\" He replied, \"\"Sorry man, I can't. I'm already taking a loss on...\"\" Then he stopped mid sentence, looked down at the cash again and said \"\"Hold on. Let me ask my manager.\"\" Manager walks over, guy explains what I said, manager looks at the cash and says \"\"Make it happen\"\" 14.3 % saved. As for purchasing a home, it is a myth that you need a credit score to obtain a mortgage for a home. Lending institutions can do manual underwriting instead of just relying on your credit score. It is a little tougher to do and banks usually have stricter requirements, but based on the information the OP has given in this and other questions, I think he can easily meet them.\"", "title": "" }, { "docid": "360efed62e0be8d7fcb21739b691634e", "text": "If you have self control and a good handle on your finances, which it sounds like - I suggest the following: Note: #3 is important - if you're not able to pay it off each month don't do this because it will cost you a lot in interest. Make sure to check how interest is calculated in case you don't pay it off in full or miss the due date for a month. If you can do this you'll earn some good benefits from the card using money that you're going to spend anyway, as well as build your credit profile. Regarding annual fees -", "title": "" }, { "docid": "1d0aed06ac08c89d6005ebe963993335", "text": "Most business credit cards do not report to the personal credit report unless the person pays the card late. Given that fact, any debt carried on these cards does not hurt the credit score if it is not reported. You can carry credit card debt on these cards without hurting your credit score. Just apply for business credit cards now to start building this segment of your credit.", "title": "" }, { "docid": "d41d8cd98f00b204e9800998ecf8427e", "text": "", "title": "" } ]
[ { "docid": "4571505cd5e76a598b1090e109add091", "text": "\"A lot of credit card companies these days uses what they call \"\"daily interest\"\" where they charge the interest rate for the number of days till you pay off what you spent. This allows them to make more money than the \"\"period billing\"\". The idea of credit, theoretically, is that there isn't really a day when you can borrow without paying interest - in theory\"", "title": "" }, { "docid": "c3fcbad362ce5138359e0b7103fc7650", "text": "\"The comments section to Dilip's reply is overflowing. First - the OP (Graphth) is correct in that credit scoring has become a game. A series of data points that predicts default probability, but of course, offers little chance to explain why you applied for 3 loans (all refinancing to save money on home or rentals) got new credit cards (to get better rewards) and have your average time with accounts drop like a rock (well, I canceled the old cards). The data doesn't dig that deep. To discuss the \"\"Spend More With Plastic?\"\" phenomenon - I have no skin in the game, I don't sell credit card services. So if the answer is yes, you spend more with cards, I'll accept that. Here's my issue - The studies are all contrived. Give college students $10 cash and $10 gift cards and send them into the cafeteria. Cute, but it produces no meaningful data. I can tell you that when I give my 13yr old $20 cash, it gets spent very wisely. A $20 Starbucks card, and she's treating friends and family to lattes. No study needed, the result is immediate and obvious. Any study worth looking at would first separate the population into two groups, those who pay in full each month and those who carry a balance. Then these two groups would need to be subdivided to study their behavior if they went all cash. Not a simply survey, and not cheap to get a study of the number of people you need for meaningful data. I've read quotes where The David claimed that card users spend 10% more than cash users. While I accept that Graphth's concern is valid, that he may spend more with cards than cash, there is no study (that I can find) which correlates to a percentage result as all studies appear to be contrived with small amounts to spend. As far as playing the game goes - I can charge gas, my cable bill, and a few other things whose dollar amounts can't change regardless. (Unless you're convinced I'll gas up and go joy-riding) Last - I'd love to see any link in the comments to a meaningful study. Quotes where conclusions are stated but no data or methodology don't add much to the discussion. Edit - Do You Spend More with Cash or Credit? is an article by a fellow Personal Finance Blogger. His conclusion is subjective of course, but along the same path that I'm on with this analysis.\"", "title": "" }, { "docid": "ee7f43ee585e6ce72415a9fbc96d715f", "text": "\"Personally, I use my credit cards for everything because I get reward points (or, cash back, depending on the card), and I build credit history. I've had credit cards since I was 18 (now 22), and my credit score is in the higher end 700s which I'm told is pretty good for my age. Additionally, since I put my rent and large purchases on my credit card, I have a lot of reward points. I use these to buy things I wouldn't normally buy to try them out and see if they bring any value into my life. If not, I didn't really lose anything, but I have found value in some of those things. I realize most of this is gamification and consumerism at play, but getting that extra little thing once in a while for \"\"free\"\" which is pretty nice.\"", "title": "" }, { "docid": "01264d3bf1b37ab9fb671b8d57b01293", "text": "I've read multiple times that the way to rebuild the credit score is to get a credit card and then have some minor charges on it every month and have them paid in full every month. Old negative events age and this disciplined activity rebuild the score to some not to horrible levels. Now it's true that it's hard to get reasonably good credit cards when your credit score is poor. Yet it's not necessary to have a good credit card for this case - such things as large credit limit are not needed. All that's needed is a long grace period so that there's no interest between the moment a charge is done and a moment the bill is paid in full at the end of the month. Yes, the card may have rather high interest and rather low credit limit, but it doesn't really matter. I've read once on MSN Money that people are offered credit even while they're in the middle of bankruptcy, so it's not impossible to get a credit card in the described situation. Goes without saying that a lot of discipline will be needed to have all this implemented.", "title": "" }, { "docid": "29fdf38ff4ab2c12206a69cea90ea65b", "text": "\"good vs \"\"bad\"\" debt in the context of that post. At least in the UK this can be a good tactic to reduce the cost of credit card debt. Some things to consider\"", "title": "" }, { "docid": "3cc6c9116769ff348070c66a1ed49129", "text": "\"A credit card is a way to borrow money. That's all. Sometimes the loans are very small - $5 - and sometimes they are larger. You can have a credit card with a company (bank or whatever) that you have no other relationship with. They're not a property of a bank account, they are their own thing. The card you describe sounds exactly like a debit card here, and you can treat your Canadian debit card like your French credit card - you pay for things directly from your bank account, assuming the money is in there. In Canada, many small stores take debit but not credit, so do be sure to get a debit card and not only a credit card. Now as to your specific concerns. You aren't going to \"\"forget to make a wire.\"\" You're going to get a bill - perhaps a paper one, perhaps an email - and it will say \"\"here is everything you charged on your credit card this month\"\" along with a date, which will be perhaps 21 days from the statement date, not the date you used the card. Pay the entire balance (not just the minimum payment) by that date and you'll pay no interest. The bill date will be a specific date each month (eg the 23rd) so you can set yourself a reminder to check and pay your bill once a month. Building a credit history has value if you want to borrow a larger amount of money to buy a car or a house, or to start a business. Unlike the US, it doesn't really have an impact on things like getting a job. If you use your card for groceries, you use it enough, no worries. In 5 years it is nice to look back and see \"\"never paid late; mostly paid the entire amount each month; never went over limit; never went into collections\"\" and so on. In my experience you can tell they like you because they keep raising your limit without you asking them to. If you want to buy a $2500 item and your credit limit is $1500 you could prepay $1000 onto the credit card and then use it. Or you could tell the vendor you'd rather use your debit card. Or you could pay $1500 on the credit card and then rest with your debit card. Lots of options. In my experience once you get up to that kind of money they'd rather not use a credit card because of the merchant fees they pay.\"", "title": "" }, { "docid": "6db3089f91d39270c2273289148ff738", "text": "Ways to build credit without applying for credit cards: It takes some time for these types of actions to positively affect you. I'd say at the very least 6 months. You won't get the full benefit for several years. However, the earlier you get started, the better.", "title": "" }, { "docid": "5e84ad1a155299c3cc4cad8018e600cf", "text": "\"I would not call this a \"\"good\"\" idea. But I wouldn't necessarily call it a bad idea either. Before you even consider it, you need to do a little bit of soul searching. If there is ANY chance that having multiple credit cards could entice you to spend more than you otherwise would, then this is definitely a bad idea. Avoiding temptation is the key to preventing regrettable actions (in all aspects of life). Psychoanalysis aside, let's take a mathematical approach to the question. I believe your conclusion is correct if you add some qualifiers to it: A few years from now, then your credit score will probably be higher than if you just had 1 credit card. Here are some other things to consider: And, saving the best for last: As for the hard inquiries, they should only have an effect on your credit score for 1 year (though they can be seen on your report for 2 years). Final thought: if you decide to do this (and I personally don't recommend it), I would keep the number of applications smaller (3-5 instead of 10-15). I also would only choose cards that have no annual fee. Try to choose 1 card that has 1-2% cash back and make that your regular card.\"", "title": "" }, { "docid": "8488ea9ff8079c25fe41b97703b2ccc6", "text": "this post offers excellent pointers that can help you choose a suitable line of credit you can use for financing your day-to-day expenses. please help up promote it to all your friends especially to those who are planning to apply for and get secured and prepaid credit cards!", "title": "" }, { "docid": "3369ef70fc77b2dbaa0460f96c37ed79", "text": "For many folks these days, not having a credit card is just not practical. Personally, I do quite a bit of shopping online for things not available locally. Cash is not an option in these cases and I don't want to give out my debit card number. So, a strategy is this: use a credit card for a purchase. Then immediately, or within a couple days, pay the credit card with that amount. Sounds simple but it takes a little effort to do it. This strategy gives you the convenience of a credit card and decreases the interest enormously.", "title": "" }, { "docid": "2548412c71407b02dd63b488ad8538f5", "text": "No, don't open a credit card. Get used to paying cash for everything from the beginning. The best situation you can be in is not to have any credit. When it comes time to buy a house, put down %30 percent and your 0 credit score won't matter. This will keep you within your means, and, with governments gathering more and more data, help preserve your anonimity.", "title": "" }, { "docid": "e674ed76f3aa585ef0cb15210fb3b9bb", "text": "\"You don't need to have a bunch of credit cards lying around; just a couple is fine. Get a \"\"rewards\"\" card (without annual fee) that pays you back for use, and use it regularly to buy groceries, for example. Pay it off promptly each month, using the rewards, if you like, to reduce the amount you have to send in. Or you can use the rewards for other purchases; some merchants offer $25 worth of merchandise for $20 in rewards. It used to be the case that you could negotiate a discount for paying cash rather than use a credit card, but that is a lot harder to do now, in many cases because credit-card company contracts with merchants prohibit this practice. Also, merchants often prefer credit cards rather than cash because money-handling is an issue (pay for an armored car to come pick up the day's receipts, or risk getting mugged on the way to the bank, possible burglaries if you leave the money overnight in the store, daily balancing of cash-register trays, etc.) So, not being in debt and being rich enough to not need to be in debt are laudable goals, and you have my best wishes that you will reach them soon, but getting rid of all your credit cards as a part of not being in debt may be more trouble than it is worth. Keep a couple, pay them off promptly, and if you are concerned about being in debt, you can time your charges so that you are in debt at most 2 or 3 days each month.\"", "title": "" }, { "docid": "b324d756f11286a3f2de6da4a67af60b", "text": "\"In the UK, using a credit card adds a layer of protection for consumers. If something goes wrong or you bought something that was actually a scam, if you inform the credit card company with the necessary documents they will typically clear the balance for that purchase (essentially the burden of 'debt' is passed to them and they themselves will have to chase up the necessary people). Section 75 of the Consumer Credit Act I personally use my credit card when buying anything one would consider as \"\"consumer spending\"\" (tvs, furniture ect). I then pay off the credit card immediately. This gives me the normal benefits of the credit card (if you get cashback or points) PLUS the additional consumer credit protection on all my purchases. This, in my opinion is the most effective way of using your credit card.\"", "title": "" }, { "docid": "322a5c40e4c81d952476c0acfbd4c64e", "text": "\"One of the factors of a credit score is the \"\"length of time revolving accounts have been established\"\". Having a credit card with any line of credit will help in this regard. The account will age regardless of your use or utilization. If you are having issues with credit limits and no credit history, you may have trouble getting financing for the purchase. You should be sure you're approved for financing, and not just that the financing option is \"\"available\"\" (potentially with the caveat of \"\"for well qualified borrowers\"\"). Generally, if you've gotten approved for financing, that will come in the form of another credit card account (many contracting and plumbing companies will do this in hopes you will use the card for future purchases) or a bank loan account (more common for auto and home loans). With the credit card account, you might be able to perform a balance transfer, but there are usually fees associated with that. For bank loan accounts, you probably can't pay that off with a credit card. You'll need to transfer money to the account via ACH or send in a check. In short: I wouldn't bet on paying with your current credit card to get any benefit. IANAL. Utilizing promotional offers, whether interest-free for __ months, no balance transfer fees, or whatever, and passing your debt around is not illegal, not fraudulent, and in many cases advised (this is a link), though that is more for people to distribute utilization across multiple cards, and to minimize interest accrued. Many people, myself included, use a credit card for purchasing EVERYTHING, then pay it off in full every month (or sometimes immediately) to reap the benefit of cash back rewards and other cardholder benefits. I've also made a major payment (tuition, actually) on a Discover card, and opened up a new Visa card with 18-months of no interest and no balance transfer fees to let the bill sit for 12 months while I finished school and got a job.\"", "title": "" }, { "docid": "d14711729b97add28c20e2e8b1141186", "text": "\"I'm the contrarian on this forum. Since you asked a \"\"should I ...\"\" question, I'm free to answer \"\"No, you shouldn't increase your limit. Instead, you should close it out\"\". A credit card is a money pump - it pumps money from your account to the bank's profit margins. When I look at my furniture and the bank's furniture, I know exactly who needs my money more (hint: it's not the bank). Credit cards change people's spending patterns. In my first day of training as a Sears salesman, the use of the card was drummed into our heads. People purchase on average 25% more when they use a card than when they pay cash. That's good if you're a retailer or the lender (at that time Sears was both), but no good if you're a consumer. Build up a $1,000 emergency fund (for emergencies only, not \"\"I need a quick latte because I stayed up too late last night\"\"), then savings for 6 to 12 months living expenses. Close and cut up the credit card. Save up and pay cash for everything except possibly your house mortgage. If you have that much cash in the bank, the bankers will be as willing to talk to you as if you had an 800+ score. I have lived both with and without debt. Life without debt is well worth the short term sacrifice early on.\"", "title": "" } ]
fiqa
ab628cd1cdd55010c13798286b6bdd4b
Why do some online stores not ask for the 3-digit code on the back of my credit card?
[ { "docid": "59ffc40b4113b4fcee9b4be04039d9c9", "text": "As a general premise: In most of the online transactions in case of dispute the benefit of doubt is given to the customer. IE if the customer refuses to pay and claims that its not his transaction, the card company reverses the charges and does not pay the merchant (or recovers if its already paid). There are many types of online vendors who use a variety of methods to ensure that they are not at loss. Some of these are:", "title": "" }, { "docid": "c84f0f572bfc3e7a3e4c9442340d5088", "text": "Given that the laws on consumer liability for unauthorized transactions mean no cost in most cases, the CVV is there to protect the merchant. Typically a merchant will receive a lower cost from their bank to process the transaction with the CVV code versus without. As far as the Netflix case goes, (or any other recurring billing for that matter) they wouldn't care as much about it because Visa/MC/Amex regulations prohibit storage of the CVV. So if they collect it then it's only used for the first transaction and renewals just use the rest of the card info (name, expiration date, address). Does the presence of CVV indicate the merchant has better security? Maybe, maybe not. It probably means they care about their costs and want to pay the bank as little as possible to process the transaction.", "title": "" }, { "docid": "5fee4c2ada624f9f9dfd3cf43e073b65", "text": "There are different ways of credit card purchase authorizations. if some choose less secure method it's their problem. Merchants are charged back if a stolen card is used.", "title": "" }, { "docid": "d41d8cd98f00b204e9800998ecf8427e", "text": "", "title": "" }, { "docid": "e7c109089f649f7783cff28efe4472e4", "text": "Some businesses verify the shipping address with the credit card company, and refuse to ship to an alternate address without additional, offline verification. Of course, this is only useful for physical goods.", "title": "" }, { "docid": "8862161d023090a19e10c93cd537f166", "text": "@Jeremy Using CVV doesn't decrease the transaction cost. I know this because I have quotes for CC transactions and the cost/transaction doesn't depend on using CVV. That said we don't plan to use CVV because we sell insurance and the likelihood that someone who steals CC will buy insurance is very low.", "title": "" }, { "docid": "a7af83dec07deef1a5cd58c68bc6ad1c", "text": "The truth is that Visa does not require a merchant to enter the cvv number before authorizing a transaction. The only information that is really needed is the credit card number and expiration date.", "title": "" } ]
[ { "docid": "fe6c6b035064b9df1adf8d9f29e0d9c0", "text": "In some case the customer wants the name to be cryptic or misleading. They don't want to advertise the true nature of the business they visited. In other cases the transaction may be reported through another business. A few years ago the local PTA was having a silent auction as a fundraiser. A local business allowed the PTA to use their credit card reader to process transactions over a certain amount. Of course when the credit card statement arrived it looked like you spent $500 at the florist. I have seen PayPal listed when donating to some small charities. I have noted another case where confusion can occur. I used a debit card to buy a soda from a vending machine: the name and location were the name of the vending machine company and the location of their main office. It didn't say soda machine city A. It said Joe's vending company city B. In most cases the business and the credit card company want to make it easy to identify the transactions to keep the cost of research and charge backs to a minimum.", "title": "" }, { "docid": "77f11f50bbd997629b688c1747b28103", "text": "The reason is in your own question. The answer is simple. They use that code to tax the product otherwise it would just be out of pocket expenses.", "title": "" }, { "docid": "58798764a5f701a63768787f72841c06", "text": "Chip and Pin cards are popular in Europe, however in the US we don't have them. Visa/MC and Amex can issue chip and pin cards but no merchants or machines are set up here to take them. Only certain countries in Europe use them and since you could possibly have a US visitor or a non-chip and pin person using your machine or eating at your restaurant they usually allow you to sign or just omit the pin if the card doesn't have a chip. It is definitely less secure, but the entire credit card industry in the US is running right now without it, so I don't think the major credit card companies care too much (they just pass the fraud on to the merchants anyway).", "title": "" }, { "docid": "1efe012004c978e7b829c44528c40646", "text": "Lol you moron. Chip and pin significantly reduced physical retailer fraud when we introduced it in Europe (a decade ago? 15 years?) - a signature is absurdly easy to fake and retailers have little to no way of protecting against it.", "title": "" }, { "docid": "a27715be676e47c2c991c5717c23bdfa", "text": "\"I'm not sure if this answer is going to win me many friends on reddit, but here goes... There's no good reason why they couldn't have just told him the current balance shown on their records, BUT... **There are some good reasons why they can't quote a definitive \"\"payoff\"\" balance to instantly settle the account:** It's very possible to charge something today, and not have it show up on Chase's records until tomorrow, or Monday, or later. There are still places that process paper credit-card transactions, or that deal with 3rd-party payment processors who reconcile transactions M-F, 9-5ish, and so on. - Most transactions these days are authorized the instant you swipe the card, and the merchant won't process until they get authorization back from the CC company. But sometimes those authorizations come from third-party processors who don't bill Chase until later. Some of them might not process a Friday afternoon transaction until close-of-business Monday. - Also, there are things like taxicab fares that might be collected when you exit the cab, but the record exists only in the taxi's onboard machine until they plug it into something else at the end of the shift. - There are still some situations (outdoor flea-markets, auctions, etc) where the merchant takes a paper imprint, and doesn't actually process the payment until they physically mail it in or whatever. - Some small businesses have information-security routines in place where only one person is allowed to process credit-card payments, but where multiple customer service reps are allowed to accept the CC info, write it down on one piece of paper, then either physically hand the paper to the person with processing rights, or deposit the paper in a locked office or mail-slot for later processing. This is obviously not an instant-update system for Chase. (Believe it or not, this system is actually considered to be *more* secure than retaining computerized records unless the business has very rigorous end-to-end info security). So... there are a bunch of legit reasons why a CC company can't necessarily tell you this instant that you only need to pay $x and no more to close the account (although there is no good reason why they shouldn't be able to quote your current balance). What happens when you \"\"close an account\"\" is basically that they stop accepting new charges that were *made* after your notification, but they will still accept and bill you for legit charges that you incurred before you gave them notice. So basically, they \"\"turn off\"\" the credit-card, but they can't guarantee how much you owe until the next billing cycle after this one closes: - You notify them to \"\"close\"\" the account. They stop authorizing new charges. - Their merchant agreements basically give the merchant a certain window to process charges. The CC company process legit charges that were made prior to \"\"closing\"\" the account. - The CC company sends you the final statement *after* that window for any charges has expired, - When that final statement is paid (or if it is zero), *THAT* is when the account is settled and reported to Equifax etc as \"\"paid\"\". So it's hard to tell from your post who was being overly semantic/unreasonable. If the CC company refused to tell the current balance, they were just being dickheads. But if they refused to promise that the current balance shown is enough to instantly settle the account forever, they had legit reasons. Hope that helps.\"", "title": "" }, { "docid": "898499ec5c013cb2425c03238bfdc185", "text": "Credit card companies organize types of businesses into different categories. (They charge different types of businesses different fees.) When a business first sets up their credit card processing merchant account, they need to specify the category. Here is a list of categories that Visa uses. Grocery stores and supermarkets are category number 5411. Other types of businesses, such as the examples you provided in your question, have a different category number. American Express simply looks at the merchant category code for each of your transactions and only gives you rewards for the ones in the grocery store category. It's all automated. They likely don't have a list of every grocery store in the US, and even if they did, they would probably not provide it to the public, for proprietary reasons. If you are in doubt about whether or not a particular store is in the grocery category, you'll just have to charge it to your card and see what happens. Often, the category of transaction will be shown for each transaction on your credit card's website.", "title": "" }, { "docid": "f7c2a78b891bb6313aa4aef5e470df86", "text": "\"Do not store credit cards on your servers! You will get into HUGE trouble if they get stolen. Instead, the whole credit card transaction should be done in a \"\"frame\"\" on a web that is handle by a credit card processor you chose. Once the transaction is finished, you get a code for the credit card number (masked credit card number) that no-one can convert back to a credit card number (except the processor). When you need to charge more or give refund, you use that code to tell the processor what credit card to make the charges/credits to.\"", "title": "" }, { "docid": "398bfb864e3bdee31e346f5c9836893b", "text": "It depends on the seller. If the seller wants, they can collect the information from you and send it to the payment gateway. In that case, they of course have everything that you provide at some point. They are not supposed to keep the security code, and there are rules about keeping the credit card number safe. The first four digits of the credit card number often indicate the bank, although smaller banks may share. But for example a Capital One card would indicate the bank. Other sellers work through a payment gateway that collects the information. Even there, the seller may collect most of the information first and send it to the gateway. In particular, the seller may collect name, email, phone, and address information. And in general the gateway will reveal that kind of information. They will not give the seller credit card info other than the name on the card, expiration date, and possible last four digits. They may report if the address matches the card's billing address (mismatched addresses may mean fraud). Buying through someone like PayPal can provide the least information. For a digital good, PayPal can only expose the buyer's name (which may be a business name) and email (associated with the payment account). However PayPal still has the other information and may expose it under legal action (e.g. if the credit card transaction is reversed or the good sold is illegal). And even PayPal will expose the shipping address for physical goods that require shipping.", "title": "" }, { "docid": "d8ece65eb6ec4ccdf42ad3ecc6bfaf9a", "text": "Merchants are only supposed to verify the presence of a signature, which signifies that the card owner has accepted the terms and conditions of the card / account. It was never really intended to be used to authenticate the card holder, nor is it used as such in practice.", "title": "" }, { "docid": "28349274456d5728c148fd4f35165880", "text": "This is a question with a flawed premise. Credit cards do have two-factor authentication on transactions they consider more at risk to be fraudulent. I've had several times when I bought something relatively expensive and unusual for me, where the CC either initially declined and sent me a text asking to confirm immediately (after which they would approve the charges), or approved but sent me a text right away asking to confirm (after which they'd automatically dispute if I told them to). The first is legitimately what you are asking for; the second is presumably for less risky but still some risk transactions). Ultimately, the reason they don't allow it for every transaction is that not enough people would make use of it to be worth their time to implement it. Particularly given it slows down the transaction significantly (and look at the complaints at the ~10-15 seconds extra EMV authentication takes, imagine that as a minute or more), I think you'd get a single digit percentage of people using that service.", "title": "" }, { "docid": "d18beb46cb0338a631f4fa4b4b77fcea", "text": "My understanding it that the signature requirement is at the retailer's discretion. If the merchant decides to require a signature it protects them against fraudulent charge-back claims, but increases their administrative costs. In some situations it just isn't practical for a retailer to require a signature. Consider for example mail-order or online purchases, which I've never had to sign a credit card slip for.", "title": "" }, { "docid": "fc2ade6041922447eedfb53677d9184a", "text": "\"Here's another rational reason: Discount. This typically works only in smaller stores, where you're talking directly to the owners, but it is sometimes possible to negotiate a few percent off the price when paying by check, since otherwise they'd have to give a few percent to the credit card company. (Occasionally the sales reps at larger stores have the authority to cut this deal, but it's far less common.) Not worth worrying about on small items, but if you're making a large purchase (a bedroom suite, for example) it can pay for lunch. And sometimes the store's willing to give you more discount than that, simply because with checks they don't have to worry about chargebacks or some of the other weirdnesses that can occur in credit card processing. Another reason: Nobody's very likely to steal you check number and try to write themselves a second check or otherwise use it without authorization. It's just too easy to steal credit card info these days to make printing checks worth the effort. But, in the end, the real answer is that there's no rational reason not to use checks. So it takes you a few seconds more to complete the transaction. What were you going to do with those seconds that makes them valuable? Especially if they're seconds that the store is spending bagging your purchase, so there's no lost time... and the effort really isn't all that different from signing the credit card authorization. Quoting Dean Inge: \"\"There are two kinds of fool. One says 'this is old, and therefore good.' The other says 'this is new, and therefore better.'\"\"\"", "title": "" }, { "docid": "697575f46e2273d12899964f4cc6796b", "text": "\"I don't think the reason is \"\"to verify that it is truly me\"\". It should be possible for someone else (friend, relative...) to make a payment on your behalf, using their own card. It is common that \"\"gift cards\"\" are not per-authorized for \"\"Card Not Present\"\" (CNP) use like on the internet, or over the phone. In many cases, you can register your card, online or by speaking to a representative over the phone. After that, you should be able to use it to pay your phone company. Also, depending on where you got the card, you may be able to go to a teller at the issuing bank, and withdraw cash (or get a check), possibly without a fee.\"", "title": "" }, { "docid": "37f1468d33edbdf2cc73c45e8868ae69", "text": "\"Actually in Finland on some bank + debit/credit card + online retailer combinations you type in your card details as you normally do, but after clicking \"\"Buy\"\" you get directed to your own bank's website which asks you to authenticate yourself with online banking credentials. It also displays the amount of money and to which account it is being paid to. After authentication you get directed back to the retailer's website. Cannot say why banks in US haven't implemented this.\"", "title": "" }, { "docid": "5e788b9c0aaa2183ef5c768ba4be1f73", "text": "I used to work for a online payment posting company. Anytime a payment is made via Credit Card to a company that does not have PCI DSS(aka the ability/certification to store credit card information) there is a MD5 checksum(of the confirmation code, not the Credit Card information) that get sent to the company from the processor(billing tree, paypal, etc). The company should be able to send this information back to the processor in order to refund the payment. If the company isn't able to do this, to be honest they shouldn't be taking online credit card payments. And by all means do not send your credit card information in an email. As said above, call the company's customer service line and give them the info to credit your account.", "title": "" } ]
fiqa
84c1114ab0711602609d38f9512c30fd
Why do US retirement funds typically have way more US assets than international assets?
[ { "docid": "7d40e0940f7bca386ac3118b76bbdfbd", "text": "There are a few main economic reasons given why investors show a strong home bias: Interestingly, though if you ask investors about the future of their home country compared with other countries they will generally (though not always) significantly overestimate the future of their own country. It is difficult to definitively say what drives investors but this psychological home bias could be one of the larger factors. Edit in response to the bounty: Maybe this Vanguard article on their recommended international exposure is what you are looking for though they only briefly speculate about why people so consistently show a home bias in investing. The Wikipedia article mentioned above has some very good references and while there may be no complete answer with the certainty that you seek (as there are as many reasons as there are investors) a combination of the above list seems to capture much of what is going on across different countries.", "title": "" }, { "docid": "f267f546a9aa7ca0178a43125fe42b50", "text": "\"It's likely that the main reason is the additional currency risk for non-USD investments. A wider diversification in general lowers risk, but that has to be balanced by the risk incurred when investing abroad. This implies that the key factor isn't so much the country of residence, but the currency of the listing. Euro funds can invest across the whole Euro zone. Things become more complex when you consider countries whose currency is less trusted and whose economy is less diversified. In those cases, the \"\"currency risk\"\" may be more due to the national currency, which justifies a more global investment strategy.\"", "title": "" }, { "docid": "306f3a6fe8fd8857a8f456e4e684ea13", "text": "\"To expand a bit on @MSalters's answer ... When I read your question title I assumed that by \"\"retirement funds\"\" you meant target-date funds that are close to their target dates (say, the 2015 target fund). When I saw that you were referring to all target-date funds, it occurred to me that examining how such funds modify their portfolios over time would actually help answer your question. If you look at a near-term target fund you can see that a smaller percent is invested internationally, the same way a smaller percent is invested in stocks. It's because of risk. Since it's more likely that you will need some of the money soon, and since you'll be cashing out said money in US Dollars, it's risky to have too much invested in foreign currencies. If you need money that's currently invested in a foreign currency and that currency happens to be doing poorly against USD at the moment, then you'll lose money simply because you need it now. This is the same rationale that goes into target-date funds' moving from stocks to bonds over time. Since the value of a stock portfolio has a lot more natural volatility than the value of a bond portfolio, if you're heavily invested in stocks when you need to withdraw money, there's a higher probability that you'll need to cash out just when stocks happen to be doing relatively poorly. Being invested more in bonds around when you'll need your money is less risky. Similarly, being more invested in US dollars than in foreign currencies around when you'll need your money is also less risky.\"", "title": "" }, { "docid": "15a6082d1454328277850caf56f59175", "text": "You need growth in your retirement fund. Sad to say but the broad U.S. marks still has better growth perspective than the emerging markets. Look at China they are only at 6.7% growth for next year the same as this year. Russia's economy is shrinking. These are the other two super powers of 2015. The USA is still the best market to invest in historically and in the present. That's why the USA market tends to be overweight in most retirement portfolios. Now by only investing in the USA market do you miss out on trends internationally? Well you do a bit but not entirely. Many USA companies are highly international in regards to their growth. Here are some: So in short the USA market still seems to be the best growth market and you still get some international exposure. Also by investing in USA companies they sometimes are more ethical in their book keeping as opposed to some other markets. I don't think I'm the only one that is skeptical of the numbers China's government reports.", "title": "" }, { "docid": "d41d8cd98f00b204e9800998ecf8427e", "text": "", "title": "" } ]
[ { "docid": "4fb93947461cf2614b37f4ea50bbec9b", "text": "Googling vanguard target asset allocation led me to this page on the Bogleheads wiki which has detailed breakdowns of the Target Retirement funds; that page in turn has a link to this Vanguard PDF which goes into a good level of detail on the construction of these funds' portfolios. I excerpt: (To the question of why so much weight in equities:) In our view, two important considerations justify an expectation of an equity risk premium. The first is the historical record: In the past, and in many countries, stock market investors have been rewarded with such a premium. ... Historically, bond returns have lagged equity returns by about 5–6 percentage points, annualized—amounting to an enormous return differential in most circumstances over longer time periods. Consequently, retirement savers investing only in “safe” assets must dramatically increase their savings rates to compensate for the lower expected returns those investments offer. ... The second strategic principle underlying our glidepath construction—that younger investors are better able to withstand risk—recognizes that an individual’s total net worth consists of both their current financial holdings and their future work earnings. For younger individuals, the majority of their ultimate retirement wealth is in the form of what they will earn in the future, or their “human capital.” Therefore, a large commitment to stocks in a younger person’s portfolio may be appropriate to balance and diversify risk exposure to work-related earnings (To the question of how the exact allocations were decided:) As part of the process of evaluating and identifying an appropriate glide path given this theoretical framework, we ran various financial simulations using the Vanguard Capital Markets Model. We examined different risk-reward scenarios and the potential implications of different glide paths and TDF approaches. The PDF is highly readable, I would say, and includes references to quant articles, for those that like that sort of thing.", "title": "" }, { "docid": "4cb559b3a92b5f40f1f5c02c84656f0f", "text": "Because retirement account usually are tax effective vehicles - meaning you will pay less tax on any profits from your investments in a retirement account than you would outside. For example, in my country Australia, for someone on say $60,000 per annum, if you make $10,000 profits on your investments that year you will end up paying 34.5% tax (or $3,450) on that $10,000 profits. If you made the same profits in a retirement account (superannuation fund) you would have only paid 15% tax (or $1,500) on the $10,000 profit. That's less than half the tax. And if you are on a higher income the savings would be even greater. The reason why you can't take the money out of a retirement account is purely because the aim is to build up the funds for your retirement, and not take it out at any time you want. You are given the incentive to pay less tax on any investment profits in order for you to save and grow your funds so that you might have a more comfortable retirement (a time when you might not be able to work any more for your money).", "title": "" }, { "docid": "c483acb58363d9f4b5159678bd56c98e", "text": "\"Answers: 1: No, Sections 1291-1298 of the IRC were passed in the Reagan adminstration. 2: Not only can a foreign company like a chocolate company fall afoul of the definition of PFIC because of the \"\"asset test\"\", which you cite, but it can also be called a PFIC because of the \"\"income test\"\". For example, I have shares in a development-stage Canadian biotech which is considered a PFIC because it has no income at all, except for a minor amount of bank interest on its working capital. This company is by no means \"\"passive\"\" (it has run 31 clinical trials in over 1100 human research subjects, burning $250M of investor's money in the process) nor is it an \"\"investment company\"\", but the stupid IRS considers it to be a \"\"passive foreign investment company\"\"! The IRS looks at it and sees only the bank account, and assumes it is a foreign shell corporation set up to shield the bank interest from them. 3: Yes, a foreign mutual fund is EXACTLY what congress intended to be a PFIC when passed IRC 1291-1298. (Biotechs, candy factories, ect got nailed as innocent bystanders.) Note that if you hold a US mutual fund then every year you'll get a form 1099 in the mail. The 1099 will report your share of the mutual fund's own income and capital gains, which you must report on your taxes. (You can also have capital gains from selling your shares of the mutual fund, but that's a different thing.) Now suppose that there was no PFIC law. Then the US investors in the mutual fund would do better if the mutual fund were in a foreign country, for two reasons: a) The fund would no longer distribute 1099's. That means the shareholders wouldn't have to pay tax every year on their proportions of the fund's own income/gains. The money that would have sooner gone to the IRS can sit around for years earning interest. b) The fund could return profits to shareholders exclusively through capital gains rather than dividends, thus ensuring that all of the investors' income on the fund would be taxed at <15%-20% rather than up to 39%. The fund could do this by returning cash to shareholders exclusively through buybacks. However, the US mutual fund industry doesn't want to move the industry to Canada, and it only takes a few newspaper articles about a foreign loophole to make congress spring to action. 4) It depends. If you have a PEDIGREED QEF election in place (as I do for my biotech shares) then form 8621 takes a few minutes by hand. However, this requires both the company and the investor to fully cooperate with congress's vision for PFICs. The company cooperates by providing a so-called \"\"PFIC annual information sheet\"\", which replaces the 1099 form for a US mutual fund. The investor cooperates by having a \"\"QEF election\"\" in place for EACH AND EVERY TAX YEAR in which he held the stock and by reporting the numbers from the PFIC annual information sheet on his return. (Note that the QEF election persists once made, until revoked. There are subtleties here that I am glossing over, since \"\"deemed sale\"\" elections and other means may be used to modify a share's holding period to come into compliance.) Note that there is software coming out to handle PFICs, and that the software makers will already run their software to make your form 8621 for $75 or so. I should also warn you that the blogs of tax accountants and tax lawyers all contradict each other on the basic issue of whether you can take capital losses on PFICs for which you have no form 8621 elections. (See section 2.3 of my notes http://tinyurl.com/mh9vlnr for commentary on this mess.) I do not know if the software people will tell you which elections are best made on form 8621, though, or advise you if it's time to simply dump your investment. The professional software is at 8621.com, and the individual 8621 preparation is at http://expattaxtools.com/?page_id=242. BTW, in case you're interested, I wrote up a very careful analysis of how to deal with the PFIC situation for the small biotech I invested in in certain cases. It is posted http://tinyurl.com/mh9vlnr. (For tax reasons it was quite fortunate that the share price dipped to near an all-time low on Jan 1, 2015, making the (next) 2015 tax year ripe for a so-called \"\"deemed sale\"\" election. This was only possible because the company provides the necessary \"\"PFIC annual information statements\"\", which your chocolate factory may or may not do.)\"", "title": "" }, { "docid": "49992736fd22c5c34efdd7992ee2229c", "text": "The logic is that the value of America could be determined by adding up the assets of all Americans. If houses are more expensive then America is richer (we own a large number of more expensive houses), even though no additional real assets have been created (as if more houses were built).", "title": "" }, { "docid": "d7541f07a95a913977a15cc8030734b8", "text": "\"I still don't understand this \"\"analysis.\"\" Even when the US became the world's largest economy in 1880, the British Pound remained the reserve currency of choice until the 1950s, some seventy years later! Investors prefer stability and property rights and the US has both, especially when considering the alternatives, i.e. Euro tax takings on bank deposits in Cyprus. What about the yuan? China may have recently surpassed US economic power, but it is very likely in the midst of a massive credit bubble. China has also been fudging some of their numbers and in many cases, chooses not to keep economic records at all. The fact that many Chinese elites themselves are buying property in Vancouver and the US as a safe harbor also does not bode well for their systemic problems IMO. I'm sticking with the dollar for now.\"", "title": "" }, { "docid": "ab49bc410881ee4bc8e5e5d965482653", "text": "\"There are some good answers about the benefits of diversification, but I'm going to go into what is going on mathematically with what you are attempting. I was always under the assumption that as long as two securities are less than perfectly correlated (i.e. 1), that the standard deviation/risk would be less than if I had put 100% into either of the securities. While there does exist a minimum variance portfolio that is a combination of the two with lower vol than 100% of either individually, this portfolio is not necessarily the portfolio with highest utility under your metric. Your metric includes returns not just volatility/variance so the different returns bias the result away from the min-vol portfolio. Using the utility function: E[x] - .5*A*sig^2 results in the highest utility of 100% VTSAX. So here the Sharpe ratio (risk adjusted return) of the U.S. portfolio is so much higher than the international portfolio over the period tracked that the loss of returns from adding more international stocks outweigh the lower risk that you would get from both just adding the lower vol international stocks and the diversification effects from having a correlation less than one. The key point in the above is \"\"over the period tracked\"\". When you do this type of analysis you implicitly assume that the returns/risk observed in the past will be similar to the returns/risk in the future. Certainly, if you had invested 100% in the U.S. recently you would have done better than investing in a mix of US/Intl. However, while the risk and correlations of assets can be (somewhat) stable over time relative returns can vary wildly! This uncertainty of future returns is why most people use a diversified portfolio of assets. What is the exact right amount is a very hard question though.\"", "title": "" }, { "docid": "79ecb26ea9c0236996186ea69aed8152", "text": "\"As you alluded to in your question, there is not one answer that will be true for all mutual funds. In fact, I would argue the question is not specific to mutual funds but can be applied to almost anyone who must make an investment decision: a mutual fund manager, hedge fund manager, or an individual investor. Even though money going into a company 401(k) retirement savings plan is typically automatically allocated to different funds as we have specified, this is generally not the case for other investment accounts. For example, I also have a Roth IRA in which I have some money from each paycheck direct deposited and it's up to me to decide whether to leave that money in cash or to invest it somewhere else. Every time you invest more money into a mutual fund, the fund manager has the same decision to make. There are two commonly used mutual fund figures that relate to your question: turnover rate, and cash reserves. Turnover rate measures the percent of a fund's portfolio that changes every year. For example, a turnover rate of 100% indicates that a fund replaces every asset it held at the beginning of the year with something else at the end of the year – funds with turnover rates greater than 100% average a holding period for a given asset of less than one year, and funds with turnover rates less than 100% average a holding period for a given asset of more than one year. Cash reserves simply measure the amount of money funds choose to keep as cash instead of investing in other assets. Another important distinction to make is between actively managed funds and passively managed funds. Passively managed funds are often referred to as \"\"index funds\"\" and have as their goal only to match the returns of a given index or some other benchmark. Actively managed funds on the other hand try to beat the market by exploiting so-called market inefficiencies; e.g. buying undervalued assets, selling overvalued assets, \"\"timing\"\" the market, etc. To answer your question for a specific fund, I would encourage you to look at the fund's prospectus. I take as one example of a passively managed fund the Vanguard 500 Index Fund (VFINX), a mutual fund that was created to track the S&P 500. In its prospectus, the fund states that, \"\"to track its target index as closely as possible, the Fund attempts to remain fully invested in stocks\"\". Furthermore, the prospectus states that \"\"the fund's daily cash balance may be invested in one or more Vanguard CMT Funds, which are very low-cost money market funds.\"\" Therefore, we would expect both this fund's turnover rate and cash reserves to be extremely low. When we look at its portfolio composition, we see this is true – it is currently at a 4.8% turnover rate and holds 0.0% in short term reserves. Therefore, we can assume this fund is regularly purchasing shares (similar to a dollar cost averaging strategy) instead of holding on to cash and purchasing shares together at a specific time. For actively managed funds, the picture will tend to look a little different. For example, if we look at the Magellan Fund's portfolio composition, we can see it has a turnover rate of 42%, and holds around .95% in cash/short term reserves. In this case, we can safely guess that trading activity may not be as regular as a passively managed fund, as an active manager attempts to time the market. You may find mutual funds that have much higher cash reserves – perhaps 10% or even more. Granted, it is impossible to know the exact trading strategy of a mutual fund, and for good reason – if we knew for example, that a fund purchases shares every day at 2:30PM in order to realign with the S&P 500, then sellers of S&P components could up the prices at that time to exploit the mutual fund's trade strategy. Large traders are constantly trying to find ways to conceal their actual trading activity in order to avoid these exact problems. Finally, I feel obligated to note that it is important to keep in mind that trade frequency is linked to transactions costs – in general, the more frequently an investment manager (whether it be you or a mutual fund manager) executes trades, the more that manager will lose in transactions costs.\"", "title": "" }, { "docid": "e1592b80f5b99de632e7d9825d8bde8e", "text": "Wow this is a bad article. This is a notional amount.... Eg. $500M US equity fund in Australia wants to hedge their US exposure. They buy a $500M forward contract and roll it over quarterly. Each quarter they settle on the difference (let's say $50 - 500k +/- depending on the way FX moves). What matters is the amount owed...not the notional value. Same goes for interest rates. $1B bond fund could short the 10yr to lower interest rate sensitivity...the end value isn't $1B. It's whatever they owe on the difference at settlement. The issue of swap spreads or settlement/liquidity is so much more important!", "title": "" }, { "docid": "0848988ee6bf5d902b7090dcbc46de00", "text": "The location does matter in the case where you introduce currency risk; by leaving you US savings in USD, you're basically working on the assumption that the USD will not lose value against the EUR - if it does and you live in the EUR-zone, you've just misplaced some of your capital. Of course that also works the other way around if the USD appreciates against the EUR, you gained some money.", "title": "" }, { "docid": "56290eb39d292df78b8af33f4e308903", "text": "Mostly you nailed it. It's a good question, and the points you raise are excellent and comprise good analysis. Probably the biggest drawback is if you don't agree with the asset allocation strategy. It may be too much/too little into stocks/bonds/international/cash. I am kind of in this boat. My 401K offers very little choices in funds, but offers Vanguard target funds. These tend to be a bit too conservative for my taste, so I actually put money in the 2060 target fund. If I live that long, I will be 94 in 2060. So if the target funds are a bit too aggressive for you, move down in years. If they are a bit too conservative, move up.", "title": "" }, { "docid": "118c4f391c47a9cef09d2b7a8617650b", "text": "Assuming you're in the United States, then International Equity is an equity from a different country. These stocks or stock funds (which reside in a foreign country) are broken out seperately becuase they are typically influenced by a different set of factors than equities in the United States: foreign currency swings, regional events and politics of various countries.", "title": "" }, { "docid": "9eee8e19e9f44b9229656342cdb3bcb6", "text": "\"Excellent question, though any why question can be challenging to answer because it depends on the financial products in question. At least, I haven't seen many target date retirement funds that include a high percent of foreign stocks, so below explains the ones I've seen which are primarily US stocks. The United States (before the last twenty years) has been seen as a country of stability. This is not true anymore, and it's difficult for my generation to understand because we grew up in the U.S.A being challenged (and tend to think that China and India have always been powers), but when we read investors, like Benjamin Graham (who had significant influence with Warren Buffett), we can see this bias - the U.S.A to them is stable, and other countries are \"\"risky.\"\" Again, with the national debt and the political game in our current time, it does not feel this way. But that bias is often reflect in financial instruments. The US Dollar is still the reserve currency, though it's influence is declining and I would expect it to decline. Contrary to my view (because I could be wrong here) is Mish, who argues that no one wants to have the reserve currency because having a reserve currency brings disadvantages (see here: Bogus Threats to US Reserve Currency Status: No Country Really Wants It!; I present this to show that my view could be wrong). Finally, there tends to be the \"\"go with what you know.\"\" Many of these funds are managed by U.S. citizens, so they tend to have a U.S. bias and feel more comfortable investing their money \"\"at home\"\" (in fact a famous mutual fund manager, Peter Lynch, had a similar mentality - buy the company behind the stock and what company do we tend to know best? The ones around us.). One final note, I'm not saying this mentality is correct, just what the attitude is like. I think you may find that younger mutual fund managers tend to include more foreign stocks, as they've seen that different world.\"", "title": "" }, { "docid": "704b6900ee772c3bc8f88707d1921036", "text": "I'm not a professional, but my understanding is that US funds are not considered PFICs regardless of the fact that they are held in a foreign brokerage account. In addition, be aware that foreign stocks are not considered PFICs (although foreign ETFs may be).", "title": "" }, { "docid": "3a1962707304e58f79eb56f2e61454ad", "text": "Significantly less effort to buy into any of several international bond index funds. Off the top of my head, VTIBX.", "title": "" }, { "docid": "af7535b950b00daa65f3e587fcb3e827", "text": "Most of the “recommendations” are just total market allocations. Within domestic stocks, the performance rotates. Sometimes large cap outperform, sometimes small cap outperform. You can see the chart here (examine year by year): https://www.google.com/finance?chdnp=1&chdd=1&chds=1&chdv=1&chvs=maximized&chdeh=0&chfdeh=0&chdet=1428692400000&chddm=99646&chls=IntervalBasedLine&cmpto=NYSEARCA:VO;NYSEARCA:VB&cmptdms=0;0&q=NYSEARCA:VV&ntsp=0&ei=_sIqVbHYB4HDrgGA-oGoDA Conventional wisdom is to buy the entire market. If large cap currently make up 80% of the market, you would allocate 80% of domestic stocks to large cap. Same case with International Stocks (Developed). If Japan and UK make up the largest market internationally, then so be it. Similar case with domestic bonds, it is usually total bond market allocation in the beginning. Then there is the question of when you want to withdraw the money. If you are withdrawing in a couple years, you do not want to expose too much to currency risks, thus you would allocate less to international markets. If you are investing for retirement, you will get the total world market. Then there is the question of risk tolerance. Bonds are somewhat negatively correlated with Stocks. When stock dips by 5% in a month, bonds might go up by 2%. Under normal circumstances they both go upward. Bond/Stock allocation ratio is by age I’m sure you knew that already. Then there is the case of Modern portfolio theory. There will be slight adjustments to the ETF weights if it is found that adjusting them would give a smaller portfolio variance, while sacrificing small gains. You can try it yourself using Excel solver. There is a strategy called Sector Rotation. Google it and you will find examples of overweighting the winners periodically. It is difficult to time the rotation, but Healthcare has somehow consistently outperformed. Nonetheless, those “recommendations” you mentioned are likely to be market allocations again. The “Robo-advisors” list out every asset allocation in detail to make you feel overwhelmed and resort to using their service. In extreme cases, they can even break down the holdings to 2/3/4 digit Standard Industrial Classification codes, or break down the bond duration etc. Some “Robo-advisors” would suggest you as many ETF as possible to increase trade commissions (if it isn’t commission free). For example, suggesting you to buy VB, VO, VV instead a VTI.", "title": "" } ]
fiqa
4ff3d800c7514df78fef62e54143e374
Is there any way to buy a new car directly from Toyota without going through a dealership?
[ { "docid": "55ecbdac9f18f81e364770a802b869ce", "text": "No you can't buy direct from Toyota. Largely because of many states' laws (assuming you're in the US) requiring a dealer relationship for car purchasing, read about Tesla's struggles with direct to customer sales. Secondly because Toyota corporate simply isn't set up to sell a car directly to a customer. I know there are services that help people through the buying process. If you're finding Toyota dealerships to be this difficult you may consider just buying something from someone who wants to sell to you. If the buying process is this difficult imagine the service relationship. Edit: Additionally, it's important to remember when financing a car that there are essentially two transactions taking place. First you're negotiating the price of the car. Then you negotiate the price of the money (the interest rate). The money does not need to come from the dealership, you can secure your financing rate from a separate bank or local credit union. You should definitely pursue alternate financing if they're quoting you 7.99% with a FICO of 710. But don't tell the dealership you've already got your financing lined up until you're happy with the price of the car.", "title": "" }, { "docid": "8cb7522d6ca3e9bda5671deadac30edc", "text": "I feel your pain. It probably depends on your state, but two things we've tried with some benefit:", "title": "" }, { "docid": "2d233f6bf99fad1cc8751ba1049fd362", "text": "You could consider buying a fairly recent used car from CarMax. They have fixed pricing, and you'd save a good amount of money on the car (since cars lose tons of value in their first year or so).", "title": "" }, { "docid": "10b547be9d05268240b4754171364205", "text": "Any car manufacturer that undercuts their own dealer network would have that network fall apart quickly. Tesla is using a dealer-free distribution model from the start, so they don't have that problem. Toyota doesn't work that way, though. GM imposed a uniform no-haggling policy with their Saturn brand, but that policy was coupled with local monopolies for dealers to make it work. Lexus has also experimented with no-haggling and online ordering (with delivery still taking place at a dealership). The rest of Toyota doesn't work that way, though. Some car manufacturers, such as BMW and Audi, allow you to take delivery of your new car at the factory for a discount. But even then, the transaction still takes place through a dealer. Toyota doesn't work that way, though. For one thing, they work at a different scale. If you buy a Camry in the US, it might be produced in Kentucky, Indiana, or Aichi, depending on business conditions. You say that you want to cut out the middleman, but the fact is that you do require someone to deliver a Toyota to you, like it or not. If you're interested in saving money, consider trying various well documented tips, such as negotiating by e-mail before showing up, pitting dealerships against each other. If you don't want to negotiate, you might be able to take advantage of pre-negotiated dealer prices through Costco. You mentioned that the dealership offered you a 7.99% interest rate for your 710 FICO score. That sounds insanely high — I'd expect deals more like 2% advertised by buyatoyota.com. (Remember, Toyota Motor Credit Corporation exists to help Toyota Motor Corporation sell more cars cheaply.) You can also seek alternate financing online (example) or through your own bank.", "title": "" }, { "docid": "742133d583b237c209e3e151a9afde1f", "text": "\"If there's one reasonably close to you, you could go to a no-haggle dealership. Instead of making you haggle the price downward, they just give a theoretically fixed price that's roughly what the average customer could negotiate down to at a conventional dealer. Then just do your best broken record impression if they still try to sell you dubious addons: \"\"No. No. No. No. No...\"\" The last time I bought a new car (06), a no haggle dealer offered the second best deal I got out of 4 dealerships visited. The one I ended up buying with made an exceptional offer on my trade (comparable to 3rd party sale bluebook value). - My guess is they had a potential customer looking for something like my old car and were hoping to resell it directly instead of flipping it via auction.\"", "title": "" }, { "docid": "546e467b6c8c0761735740fb3cae79cf", "text": "sadly, it is illegal in most states to buy a car directly from the manufacturer. as such, most manufacturers do not offer the option even where it is legal. if you really do know exactly what you want (model, color, options, etc.) i recommend you write down your requirements and send it to every dealer in town (via email or fax). include instructions that if they want your business, they are to reply via email (or fax) with a price within 7 days. at least one dealer will reply, and you can deal with whoever has the best price. notes:", "title": "" }, { "docid": "3afa01632d0806e42be788925051b20c", "text": "You can buy a new Toyota from a non-dealer, but not from Toyota directly as they have no retail distribution capability. There is no need to buy directly from Toyota if you want to get a new car without going through a dealer. In many cases people buy new cars but have to sell them immediately for one reason or another.", "title": "" }, { "docid": "2a4035dd53cf08a9a1e6622434653193", "text": "As someone who was just recently a salesman at Honda, I'd recommend buying a Honda instead :). If you really prefer your Toyota, I always found quote-aggregation services (Truecar, I'm blanking on others) very competitive in their pricing. Alternatively, you could email several dealerships requesting a final sale price inclusive of taxes and tags with the make, model, and accessories you'd wish to purchase, and buy the vehicle from them if your local dealership won't match that price. Please keep in mind this is only persuasive to your local dealership if said competitors are in the same market area (nobody will care if you have a quote from out-of-state). As many other commenters noted, you should arrange your own financing. A staple of the sales process is switching a customer to in-house financing, but this occurs when the dealership offers you better terms than you are getting on your own. So allow them the chance to earn the financing, but don't feel obligated to take it if it doesn't make sense fiscally.", "title": "" }, { "docid": "9e0ebf802f468d7208c1171a500b2fb2", "text": "As others have addressed the legality in their answers, I want to address the idea of the dealership being 'a middleman'. A dealership serves more of a purpose than just 'middlemanning' a car to a consumer. Actually, they consume a great deal of risk. Let's remember that a dealership is really an extension of the OEM, albeit independently owned and operated, the dealership must still answer to the brand they represent, if people have a bad experience with a dealership, a customer might go to another of the same brand, but more often than not they will go to the competition out of spite. Therefore, it's in the dealership's best interest to represent the brand as best as possible, but unfortunately that doesn't always happen. While the internet has made a certain part of a salesman's role null and void, and since this is a finance (read money) Q/A site let's take a moment to consider the risk assume and therefore the value added by a dealership: Test Drive. A car is a huge purchase, and while it's okay to buy a pair of shoes online without trying them on, a car is a bit different of course, we want to make sure it 'fits' before we shell out several thousand dollars. Yes, you (meaning consumers) can look at car pictures and specs online, but if you want to see how that vehicle handles on your town's roads, if it fits in your garage and/or driveway, then you need to take it for a test drive. It's not feasible for OEMs to have millions of people showing up to car plants for a test drive, right? Scalability aside, some business that is handled in automotive plants are confidential and not for the general public to know about. A dealership provides an opportunity for those who live locally to see and experience the car without flying or driving wherever the car was assembled. They provide this at a risk, banking on the fact that a good experience with the vehicle will lead to a sale. Service. A car is a machine, and no machine is perfect, neither will it last forever without proper service. A dealership provides a place for people to bring their vehicles when they need to be serviced. Let's set aside the fact that the service prices are higher than we'd like, because the fact remains most of it is skilled (and warrantied) labor that the majority of people don't want to do themselves. Trade Ins. It is not in an OEMs best interest to accept a vehicle just to sell you another vehicle, especially if that vehicle is from another brand. Dealership's assume this risk, and often offer incentives to do so, hoping it will lead to a sale. That trade in was an asset to you, but is a liability to them, because they now have to liquidate that trade in, just so that you can purchase a car. Sure, you could sell your car yourself, and now you would assume that risk: What if your car is not in perfect shape, or has a lot of miles for it's age? Would it do well in the used car market? What if it takes too long to sell and you miss that Memorial Day car sale at the dealer? This might be okay for some, but generally speaking most people would rather avoid the risk and trade it in at the dealer toward the purchase of a new car rather than the headache of selling it themselves. I'm sure there are more, but those are the one's that immediately sprung to mind. Just like Starbucks, there are terrible dealerships out there and there are great ones, and very few of us venture to farms and jungles just for fresh coffee beans :-)", "title": "" }, { "docid": "d41d8cd98f00b204e9800998ecf8427e", "text": "", "title": "" }, { "docid": "37049d5b4651ff2d2b07af518e8d9f81", "text": "You already got good answers on why you can't buy a Toyota from the factory, but my answer is regarding to the implied second part of your question: how to avoid haggling. I found a good way to avoid the haggling at a car dealership can be simply to not haggle. Go in with a different attitude. The main reason car dealers list inflated prices and then haggle is that they expect the customers to haggle. It is fundamentally based on distrust on both sides. Treat the sales person as your advisor, your business partner, as somebody you trust as an expert in his field, and you'll be surprised how the experience changes. Of course, make sure that the trust is justified. Sales reps have a fine line to walk. Of course they like to sell a car for more money, but they also do not want a reputation of overcharging customers. They'd rather you recommend them to your friends and post good reviews on Yelp. In the end, all reputable dealers effectively have a fixed-price policy, or close to it, even those who don't advertise it, and even for used cars. Haggling just prolongs the process to get there. And sales reps are people. Often people who hate the haggling part of their job as much as you do. I was in the market for a new (used) car a few months ago. In the end, it was between two cars (one of them a Toyota), both from the brand-name dealer's respective used car lots. In both cases, I went in knowing in advance what the car's fair market value was and what I was willing to pay (as well as details about the car, mileage, condition etc. - thanks to the Internet). Both cars were marked significantly higher. As soon as the sales rep realized that I wasn't even trying to haggle - the price dropped to the fair value. I didn't even have to ask for it. The rep even offered some extras thrown into the deal, things I hadn't even asked for (things like towing my old car to the junk yard).", "title": "" }, { "docid": "b4ad89634ccd5f55d903dad9e63ee78e", "text": "Yes, nothing is impossible! :) You can buy it directly from the factory of manufacturer, but then you will have to pay for sea shipping of this car. E.g. you can buy it directly from Japanese Toyota but then you will have to pay to sea cargo ship to deliver your car in container from Japan. Since this car is already your property, before importing to US, I doubt that you would need to pay any custom fees. In the end, the total payment might be a lot cheaper that you can buy there, but you need to be prepared to all this hassle", "title": "" } ]
[ { "docid": "1998aad62501d90096f94e435b798ef6", "text": "The advice given at this site is to get approved for a loan from your bank or credit union before visiting the dealer. That way you have one data point in hand. You know that your bank will loan w dollars at x rate for y months with a monthly payment of Z. You know what level you have to negotiate to in order to get a better deal from the dealer. The dealership you have visited has said Excludes tax, tag, registration and dealer fees. Must finance through Southeast Toyota Finance with approved credit. The first part is true. Most ads you will see exclude tax, tag, registration. Those amounts are set by the state or local government, and will be added by all dealers after the final price has been negotiated. They will be exactly the same if you make a deal with the dealer across the street. The phrase Must finance through company x is done because they want to make sure the interest and fees for the deal stay in the family. My fear is that the loan will also not be a great deal. They may have a higher rate, or longer term, or hit you with many fee and penalties if you want to pay it off early. Many dealers want to nudge you into financing with them, but the unwillingness to negotiate on price may mean that there is a short term pressure on the dealership to do more deals through Toyota finance. Of course the risk for them is that potential buyers just take their business a few miles down the road to somebody else. If they won't budge from the cash price, you probably want to pick another dealer. If the spread between the two was smaller, it is possible that the loan from your bank at the cash price might still save more money compared to the dealer loan at their quoted price. We can't tell exactly because we don't know the interest rates of the two offers. A couple of notes regarding other dealers. If you are willing to drive a little farther when buying the vehicle, you can still go to the closer dealer for warranty work. If you don't need a new car, you can sometimes find a deal on a car that is only a year or two old at a dealership that sells other types of cars. They got the used car as a trade-in.", "title": "" }, { "docid": "c7577a8c25ed9cc6e1deef21bd12ed1a", "text": "One point I don't see above: Consumer's Union (the nonprofit which publishes Consumer Reports) has a service where, for a small fee, they'll send you information about how much the car and each option cost the dealer, how much the dealer is getting back in incentive money from the manufacturer, and some advice about which features are worthwhile, which aren't, and which you should purchase somewhere other than the dealer. Armed with that info, you can discuss the price on an equal footing, negotiating the dealer's necessary profit rather than hiding it behind bogus pricing schemes. Last time I bought a new car, I got this data, walked into the dealer with it visible on my clipboard, offered them $500 over their cost, and basically had the purchase nailed down immediately. It helped that I as willing to accept last year's model and a non-preferred color; that helped him clear inventory and encouraged him to accept the offer. ($500 for 10 minutes' work selling to me, or more after an hour of playing games with someone else plus waiting for that person to walk in the door -- a good salesman will recognize that I'm offering them a good deal. These days I might need to adjust that fair-profit number up a bit; this was about 20 years ago on an $8000 car... but I'm sure CU's paperwork suggests a current starting number.) It isn't quite shelf pricing. But at least it means any haggling is based on near-equal knowledge, so it's much closer to being a fair game.", "title": "" }, { "docid": "c03c89b9c8a7b1f7dc27747751e1c316", "text": "\"This is completely disgusting, utterly unethical, deeply objectionable, and yes, it is almost certainly illegal. The Federal Trade Commission has indeed filed suit, halted ads, etc in a number of cases - but these likely only represent a tiny percentage of all cases. This doesn't make what the car dealer's do ok, but don't expect the SWAT team to bust some heads any time soon - which is kind of sad, but let's deal with the details. Let's see what the Federal Trade Commission has to say in their article, Are Car Ads Taking You for a Ride? Deceptive Car Ads Here are some claims that may be deceptive — and why: Vehicles are available at a specific low price or for a specific discount What may be missing: The low price is after a downpayment, often thousands of dollars, plus other fees, like taxes, licensing and document fees, on approved credit. Other pitches: The discount is only for a pricey, fully-loaded model; or the reduced price or discount offered might depend on qualifications like the buyer being a recent college graduate or having an account at a particular bank. “Only $99/Month” What may be missing: The advertised payments are temporary “teaser” payments. Payments for the rest of the loan term are much higher. A variation on this pitch: You will owe a balloon payment — usually thousands of dollars — at the end of the term. So both of these are what the FTC explicitly says are deceptive practices. Has the FTC taken action in cases similar to this? Yes, they have: “If auto dealers make advertising claims in headlines, they can’t take them away in fine print,” said Jessica Rich, Director of the FTC’s Bureau of Consumer Protection. “These actions show there is a financial cost for violating FTC orders.” In the case referenced above, the owners of a 20+ dealership chain was hit with about $250,000 in fines. If you think that's a tiny portion of the unethical gains they made from those ads in the time they were running, I'd say you were absolutely correct and that's little more than a \"\"cost of doing business\"\" for unscrupulous companies. But that's the state of the US nation at this time, and so we are left with \"\"caveat emptor\"\" as a guiding principle. What can you do about it? Competitors are technically allowed to file suit for deceptive business practices, so if you know any honest dealers in the area you can tip them off about it (try saying that out loud with a serious face). But even better, you can contact the FTC and file a formal complaint online. I wouldn't expect the world to change for your complaint, but even if it just generates a letter it may be enough to let a company know someone is watching - and if they are a big business, they might actually get into a little bit of trouble.\"", "title": "" }, { "docid": "ee60151939fc8a15f134d44755e021c1", "text": "$27,000 for a car?! Please, don't do that to yourself! That sounds like a new-car price. If it is, you can kiss $4k-$5k of that price goodbye the moment you drive it off the lot. You'll pay the worst part of the depreciation on that vehicle. You can get a 4-5 year old Corolla (or similar import) for less than half that price, and if you take care of it, you can get easily another 100k miles out of it. Check out Dave Ramsey's video. (It's funny that the car payment he chooses as his example is the same one as yours: $475! ;) ) I don't buy his take on the 12% return on the stock market (which is fantasy in my book) but buying cars outright instead of borrowing or (gasp) leasing, and working your way up the food chain a bit with the bells/whistles/newness of your cars, is the way to go.", "title": "" }, { "docid": "af8b96a7087be6ba42486f0208c688a7", "text": "I have had it two way now: I got pre-approval from my credit union which just so happened to be one of the bigger vehicle lenders in the metro area. What I found out was that the dealership (which was one of the bigger ones in the metro area) had a computer system that looked up my deal with the credit union. Basically, I signed some contracts and the CU and the dealership did whatever paperwork they needed to without me. I bought a used car and drove it off of the lot that night, and I didn't ever go back (for anything financial) Both my wife and her sister received blank checks that were valid up to a certain amount. In the case of my sister in law, she signed the check, the dealership called to confirm funds and she drove off. In the case of my wife, she ended up negotiating a better deal with dealer finance, but I was assured she only had to sign the check, get it verified and drive the car home.", "title": "" }, { "docid": "277d4423be680399e5c346d4177ce244", "text": "In the UK at least, dealers definitely want you to take finance. They get benefits from the bank (which are not insubstantial) for doing this; these benefits translate directly to increased commission and internal rewards for the individual salesman. It's conceivable that the salesman will be less inclined to put himself out for you in any way by sweetening your deal as much as you'd like, if he's not going to get incentives out of it. Indeed, since he's taking a hit on his commission from you paying in cash, it's in his best interests to perhaps be firmer with you during price negotiation. So, will the salesman be frustrated with you if you choose to pay in cash? Yes, absolutely, though this may manifest in different ways. In some cases the dealer will offer to pay off the finance for you allowing you to pay directly in cash while the dealer still gets the bank referral reward, so that everyone wins. This is a behind-the-scenes secret in the industry which is not made public for obvious reasons (it's arguably verging on fraud). If the salesman likes you and trusts you then you may be able to get such an arrangement. If this does not seem likely to occur, I would not go out of my way to disclose that I am planning to pay with cash. That being said, you'll usually be asked very early on whether you are seeking to pay cash or credit (the salesman wants to know for the reasons outlined above) and there is little use lying about it when you're shortly going to have to come clean anyway.", "title": "" }, { "docid": "438bad75d87d85c9b5fcb2144e7da298", "text": "Ideally you would negotiate a car price without ever mentioning: And other factors that affect the price. You and the dealer would then negotiate a true price for the car, followed by the application of rebates, followed by negotiating for the loan if there is to be one. In practice this rarely happens. The sales rep asks point blank what rebates you qualify for (by asking get-to-know-you questions like where you work or if you served in the armed forces - you may not realize that these are do-you-qualify-for-a-rebate questions) before you've even chosen a model. They take that into account right from the beginning, along with whether they'll make a profit lending you money, or have to spend something to subsidize your zero percent loan. However unlike your veteran's status, your loan intentions are changeable. So when you get to the end you can ask if the price could be improved by paying cash. Or you could try putting the negotiated price on a credit card, and when they don't like that, ask for a further discount to stop you from using the credit card and paying cash.", "title": "" }, { "docid": "fea3ea7f147f19c235bfbfaee7241797", "text": "They'll refund your money (though maybe with a small service charge). I'm sure they regularly deal with new car sales gone wrong.", "title": "" }, { "docid": "ac5e3eceb0f3f7efed7542521895e212", "text": "I have gotten a letter of credit from my credit union stating the maximum amount I can finance. Of course I don't show the dealer the letter until after we have finalized the deal. I Then return in 3 business days with a cashiers check for the purchase price. In one case since the letter was for an amount greater then the purchase price I was able drive the car off the lot without having to make a deposit. In another case they insisted on a $100 deposit before I drove the car off the lot. I have also had them insist on me applying for their in-house loan, which was cancelled when I returned with the cashiers check. The procedure was similar regardless If I was getting a loan from the credit union, or paying for the car without the use of a loan. The letter didn't say how much was loan, and how much was my money. Unless you know the exact amount, including all taxes and fees,in advance you can't get a check in advance. If you are using a loan the bank/credit Union will want the car title in their name.", "title": "" }, { "docid": "16696d4e713c86fc723d4c7c989523ee", "text": "I have in the last few years purchased several used cars from dealers. They have handled it two different ways. They accepted a small check ~$1,000 now, and then gave me three business days to bring the rest as a cashiers check. They also insisted that I submit a application for credit, in case I needed a loan. They accepted a personal check on the spot. Ask them before you drive to the dealer. Of course they would love you to get a loan from them.", "title": "" }, { "docid": "ec6e5622ee2d1e17cd611a3b30c31072", "text": "My suggestion would be to keep it. The value of a new car is that you get to drive it around when it's still new and shiny, and that you know its history. If you maintain it in good condition, both mechanically and cosmetically, then you can have both of those benefits for the life of the car. Your question merges the old car sale and new car purchase transactions together, but that's not correct. The value of your 2010 car has no relationship to the value of any new car you might buy, except incidentally through the market forces that act on each. The car dealership is likely to be skilled at making you feel like your most important criteria are satisfied, but they will try to construct the deal to maximize the money you pay them while making you feel like you're the one maximizing your value. Also note that the dealership cannot give you maximum value for your car, because it costs them money to sell it and they take all the risk. Some of the difference between typical direct-sale and trade-in prices is the commission you are paying them to both sell it for you and absorb the risks in the transaction.", "title": "" }, { "docid": "b605715d4578ff53e0f1b6bc6e390df0", "text": "The car deal makes money 3 ways. If you pay in one lump payment. If the payment is greater than what they paid for the car, plus their expenses, they make a profit. They loan you the money. You make payments over months or years, if the total amount you pay is greater than what they paid for the car, plus their expenses, plus their finance expenses they make money. Of course the money takes years to come in, or they sell your loan to another business to get the money faster but in a smaller amount. You trade in a car and they sell it at a profit. Of course that new transaction could be a lump sum or a loan on the used car... They or course make money if you bring the car back for maintenance, or you buy lots of expensive dealer options. Some dealers wave two deals in front of you: get a 0% interest loan. These tend to be shorter 12 months vs 36,48,60 or even 72 months. The shorter length makes it harder for many to afford. If you can't swing the 12 large payments they offer you at x% loan for y years that keeps the payments in your budget. pay cash and get a rebate. If you take the rebate you can't get the 0% loan. If you take the 0% loan you can't get the rebate. The price you negotiate minus the rebate is enough to make a profit. The key is not letting them know which offer you are interested in. Don't even mention a trade in until the price of the new car has been finalized. Otherwise they will adjust the price, rebate, interest rate, length of loan, and trade-in value to maximize their profit. The suggestion of running the numbers through a spreadsheet is a good one. If you get a loan for 2% from your bank/credit union for 3 years and the rebate from the dealer, it will cost less in total than the 0% loan from the dealer. The key is to get the loan approved by the bank/credit union before meeting with the dealer. The money from the bank looks like cash to the dealer.", "title": "" }, { "docid": "d548dfab650da351f25dd51212badb2e", "text": "Sounds like 'up-selling'. You can harden yourself into being a 'tough sell' but it takes time and a lot of shopping. The quickest way to put up a defense is to never ever make a purchase over $100 without 'sleeping on it'. Just walk away, tell them you'll think it over, and go do some more research. Don't go back into a dealership or store that has hit you with guilt or pressure or a crazy price or whatever. Find a no-haggle or no-frills source, or even a source to buy a used version of the item you want.", "title": "" }, { "docid": "5948efbabe7fdd53df8937b6699b9306", "text": "Many reasons So in general you are paying more for peace of mind when you buy a new car. You expect everything to be working and if not you can take it back to the dealer to have them fix it for free.", "title": "" }, { "docid": "e82d50ce566fea13d4c4b7bd3bb77f65", "text": "I still think it will be rather difficult. Best bet is to call around to the five or so closest dealers and express you are considering the car contingent on price (NOT PAYMENT). Ask for them to send you their best out-the-door price on a base model. Then when you get quotes from each of them, shop the lowest price around. Usually dealers will budge a few hundred bucks to beat other dealers. But a 2018 STI will be difficult, if not impossible, to negotiate a few grand under MSRP. Understand that the people that buy this car are not doing so because it is a great bargain. So dealers can usually push this car at or near MSRP. Lastly, do not set foot in a dealership until you have a firm out-the-door price. They will play sales tricks until you give up on negotiation and will pay anything just to get out of there. The only time you should go to the location is to sign papers and drive away with the car. Do not worry about being nice and congenial with the salesperson. This advice got me my current vehicle at about 15% below the lowest True Car estimate. I don't claim this is the best advice out there but it works.", "title": "" } ]
fiqa
ab4d8ecc78de3d8792c3b47bc2a845f1
Emptying a Roth IRA account
[ { "docid": "29079941bcf673433726120d468485ea", "text": "If you have multiple accounts, you have to empty them all before you can deduct any losses. Your loss is not a capital loss, its a deduction. It is calculated based on the total amount you have withdrawn from all your Roth IRA's, minus the total basis. It will be subject to the 2% AGI treshhold (i.e.: if your AGI is > 100K, none of it is deductible, and you have to itemize to get it). Bottom line - think twice. Summarizing the discussion in comments: If you have a very low AGI, I would guess that your tax liability is pretty low as well. Even if you deduct the whole $2K, and all of it is above the other deductions you have (which in turn is above the standard deduction of almost $6K), you save say $300 if you're in 15% tax bracket. That's the most savings you have. However I'm assuming something here: I'm assuming that you're itemizing your deductions already and they're above the standard deduction. This is very unlikely, with such a low income. You don't have state taxes to deduct, you probably don't spend a lot to deduct sales taxes, and I would argue that with the low AGI you probably don't own property, and if you do - you don't have a mortgage with a significant interest on it. You can be in 15% bracket with AGI between (roughly) $8K and $35K, i.e.: you cannot deduct between $160 and $750 of the $2K, so it's already less than the maximum $300. If your AGI is $8K, the deduction doesn't matter, EIC might cover all of your taxes anyway. If your AGI is $30K, you can deduct only $1400, so if you're in the 15% bracket - you saved $210. That, again, assuming it's above your other deductions, which in turn are already above the standard deduction. Highly unlikely. As I said in the comments - I do not think you can realistically save on taxes because of this loss in such a manner.", "title": "" }, { "docid": "d41d8cd98f00b204e9800998ecf8427e", "text": "", "title": "" } ]
[ { "docid": "3b1313c7fe9c8a6cae73baa0bc146c45", "text": "Indeed, there's no short term/long term issue trading inside the IRA, and in fact, no reporting. If you have a large IRA balance and trade 100 (for example) times per year, there's no reporting at all. As you note, long term gains outside the IRA are treated favorably in the tax code (as of now, 2012) but that's subject to change. Also to consider, The worst thing I did was to buy Apple in my IRA. A huge gain that will be taxed as ordinary income when I withdraw it. Had this been in my regular account, I could sell and pay the long term cap gain rate this year. Last, there's no concept of Wash sale in one's IRA, as there's no taking a loss for shares sold below cost. (To clarify, trading solely within an IRA won't trigger wash sale rules. A realized loss in a taxable account, combined with a purchase inside an IRA can trigger the wash sale rule if the stock is purchased inside the IRA 30 days before or after the sale at a loss. Thank you, Dilip, for the comment.) Aside from the warnings of trading too much or running afoul of frequency restrictions, your observation is correct.", "title": "" }, { "docid": "de8c10a6917e7d079f4d14665fbd746e", "text": "\"One \"\"con\"\" I have not yet seen mentioned: retirement accounts are generally protected from creditors in a bankruptcy. There are limits and exceptions, Roth has a 1.2 million dollar limit and can be split by a divorce QDRO for instance. Link Since it seems you have no income this year, you may may be raiding your IRA for living expenses. If there is a chance you may declare bankruptcy in the next year or so, consider doing that first and raid the IRA for seed money after.\"", "title": "" }, { "docid": "0e2b7face83c9f057e8fb4d0310c93a3", "text": "\"To answer your question point by point - I'd focus on the last point. The back of my business card - Let's focus on Single. The standard deduction and exemption add to over $10K. I look at this as \"\"I can have $250K in my IRA, and my $10K (4%) annual withdrawal will be tax free. It takes another $36,900 to fill the 10 and 15% brackets. $922K saved pretax to have that withdrawn each year, or $1.17M total. That said, I think that depositing to Roth in any year that one is in the 15% bracket or lower can make sense. I also like the Roth Roulette concept, if only for the fact that I am Google's first search result for that phrase. Roth Roulette is systematically converting and recharacterizing each year the portion of the converted assets that have fallen or not risen as far in relative terms. A quick example. You own 3 volatile stocks, and convert them to 3 Roth accounts. A year later, they are (a) down 20%, (b) up 10%, (c) up 50%. You recharacterize the first two, but keep the 3rd in the Roth. You have a tax bill on say $10K, but have $15K in that Roth.\"", "title": "" }, { "docid": "18609349ecc3a4afee9ccc0125829fb0", "text": "Generally, you have 60 days to return funds. If you've been stowing away money in to a Roth IRA and an emergency strikes you pull out contributions sufficient to tackle the emergency while leaving at least the earnings in there. You've never paid taxes on these earnings and the earnings will continue to grow tax free. If you've been stowing away money in a vanilla taxable account and an emergency strikes you pull out whatever amount to tackle the emergency. You've been paying taxes on the earnings all along but there's no paperwork. You can't replace the money in the Roth IRA (outside the 60 day limit except for some specific same year rules that you should iron out with your custodian) but you also haven't lost anything. Either way in the event of an emergency the funds are removed from an account, but in one case you haven't been paying taxes on gains. IF you want to go the route of a Roth IRA wrapper for your emergency fund you shouldn't be touching the funds for small events, tires for your car and the like. If your goal is to juice the tax free nature of the Roth IRA wrapper for as long as you can then repurpose the money for retirement if you never experienced an emergency with the understanding that you may have to gut the account in an emergency, that's fine. If you expect money to routinely come in and out of the account a Roth IRA is a horrible vehicle.", "title": "" }, { "docid": "e13a23ceb7221ef4d45a5947ec9ccb65", "text": "\"One thing people are missing is that you may not be eligible to contribute to a Roth IRA based on your MAGI. There are income \"\"phaseout\"\" ranges which determine how much, if it all you can contribute.\"", "title": "" }, { "docid": "f225093f010c21c4589471b03c48153c", "text": "\"In the case of Fidelity, the answer is \"\"no.\"\" Although when you leave your employer and roll over the account to an IRA, leaving it with Fidelity allowed me to keep money in those closed funds. My Roth IRA was not able/allowed to buy those funds.\"", "title": "" }, { "docid": "7300f3bf77b31b2843cb58762e28c42a", "text": "You are permitted to withdraw the deposits from the Roth with no tax or penalty any time. To Dilip's point, the Roth is a good place to keep the investment, and what you might consider is a 'self-directed' account. This type of IRA or Roth IRA permits a choice of investments that are not typically handled by banks or brokers, including Real Estate and the type of Angel investing you seem to be considering. Note - the rules are tough, you need to be very careful to not be self-dealing, or dealing with certain related parties.", "title": "" }, { "docid": "d2d0ad1b83d45313a4dadac2270bbb42", "text": "\"no, good questions my friend. when did you do this rollover? if it was this year, your firm should have forms that you can fill out to \"\"undo\"\" the roth conversion - only earnings on your investments will be taxed, and everything gets rolled over to a traditional IRA. not fun for tax filing but... you can also leave them as is and pay the taxes (usually only a good option if it's a low income year for the filer). i would consult your tax advisor regardless in this situation.\"", "title": "" }, { "docid": "52456dcf90b012d6a5124b3306c93288", "text": "I wrote an article about this a while ago with detailed instructions, so I'll link to it here. Here's a snippet about how to use the Roth IRA loophole and report it properly: You don’t have any Traditional/Rollover IRA at all. You deposit up to the yearly maximum (currently $5500) into a traditional IRA. In your case, you re-characterized, which means you essentially deposited. The fact that it lost money may help you later if you have extra amounts in Traditional IRA. You convert your traditional IRA to become Roth IRA ($5500 change designation from Traditional IRA to Roth IRA). You fill IRS form 8606 and attach it to your yearly tax return, no tax due. You have a fully funded Roth IRA account. If you have amounts in the Traditional IRA in excess to what you contributed last year - it becomes a bit more complicated and you need to prorate. See my article for a detailed example. On the form 8606 you fill the numbers as they are. You deposited to IRA 5500, you converted 5100, your $400 loss is lost (unless you have more money in IRA from elsewhere). If you completely distribute your IRA, you can deduct the $400 on your Schedule A, if you itemize.", "title": "" }, { "docid": "97793b3a30e5346c88a4c290d48d8e81", "text": "\"That's Imbalance-USD (or whatever your default currency is). This is the default \"\"uncategorized\"\" account. My question is, is it possible to get the \"\"unbalanced\"\" account to zero and eliminate it? Yes, it's possible to get this down to zero, and in fact desirable. Any transactions in there should be reviewed and fixed. You can delete it once you've emptied it, but it will be recreated the next time an unbalanced transaction is entered. Ideally, I figure it should autohide unless there's something in it, but it's a minor annoyance. Presumably you've imported a lot of data into what's known as a transaction account like checking, and it's all going to Imbalance, because it's double entry and it has to go somewhere. Open up the checking account and you'll see they're all going to Imbalance. You'll need to start creating expense, liability and income accounts to direct these into. Once you've got your history all classified, data entry will be easier. Autocomplete will suggest transactions, and online transaction pull will try to guess which account a given transaction should match with based on that data.\"", "title": "" }, { "docid": "aac20c8d1f2573a5249dc783f1d5124e", "text": "\"I wrote the whimsically titled \"\"The Density of Your IRA\"\" to discuss this exact issue. In the 25% bracket, your pretax 401(k) would have $18,000, with a future tax due. But the Roth effectively took $24,000 in pretax dollars, and put the $18K in post tax money in the account. Since the limits are the same, the Roth is a denser account.\"", "title": "" }, { "docid": "ee473ed573e363dc31cbc27f420ce4a4", "text": "\"I think what those articles are saying is: \"\"If you want to leave some money to charity and some to relatives, don't bequeath a Roth to charity while bequeathing taxable accounts to relatives.\"\" In other words, it's not \"\"bad\"\" to leave a Roth IRA to charity, it's just not as good as giving it to humans, if there are humans you want to give money to. In your situation, the total amount you want to leave to relatives is less than the value of your Roth. So it sounds like the advice as it applies to you is: \"\"Don't leave your relatives $30K from your taxable funds while leaving the whole Roth to charity. Instead, leave $30K of your Roth to your relatives, while leaving all the taxable funds to charity (along with the leftover $20K of the Roth).\"\" In other words, the Roth is a \"\"last resort\"\" for charitable giving --- only give away Roth money to charity if you already gave humans all the money you want to give them. (I'm unsure of the details of how you would actually designate portions of the Roth for different beneficiaries, but some googling suggests it is possible.)\"", "title": "" }, { "docid": "d1170a7a6127cb2bff5f0784dc298245", "text": "\"This is the infographic from the Fidelity. It exemplifies what's wrong with the financial industry, and the sad state of innumeracy that we are in. To be clear, Fidelity treats the 401(k) correctly, although the assumption that the withdrawals are all at a marginal 28% is a poor one. The Roth side, they assume the $5000 goes in at a zero tax rate. This is nonsense, as Elaine can't deposit $5000, she has to pay tax first, no? She'd deposit $3600, and would have the identical $27,404 at withdrawal time. And this is pure nonsense - \"\"Let’s look at the numbers another way. Tom takes the $1,400 he saved in taxes from his $5,000 pretax contributions, and invests that money in a taxable brokerage account. That could boost his total at age 75 to $35,445.\"\" The $1400 saved is in his 401(k) already, there's no extra $1400. $5000 went in pretax. Let me go one more step, and explain what I think Joe meant in his comment below - tax table first - At retirement, say a couple has exactly $168,850 of income. With the $20K in standard deduction and exemptions, they are right at the top of the 25% bracket. And have a federal tax bill of $28,925. Overall, an effective rate of 17%. Of course this is a blend from 0%-25%, and I maintain that if some money could have gone in post tax while in the 10%/15% brackets, that would be great, but in the end, if it all skims off at 25%, and comes out at an effective 17%, that's not too bad. The article is incorrect. Misleading. And offends any of us that have any respect for numbers. And the fact that the article claim that \"\"87% found this helpful\"\" just makes me... sad. I've said it elsewhere, and will repeat, there are not just two points in time. The ability to convert Traditional 401(k) to Roth 401(k), and if in IRAs, not just convert, but also recharacterize, opens up other possibilities. It's worth a bit of attention and ongoing paperwork to minimize your lifetime tax bill. Time makes no difference. There is no \"\"crossover point\"\" as with other financial decisions. For this illustration, the results are identical regardless of time. By the way, in today's dollars, it would take $4M pretax to produce an annual withdrawal of $160K. This number is about top 2-3%. The 90%ers need not worry about saving their way to a higher tax bracket.\"", "title": "" }, { "docid": "45760e75a6b20e6f86d656f45746d122", "text": "\"The IRA contribution limit is a limit on the total amount you can contribute to all of your Roth and traditional IRAs. It's not a per-account limit. (See here and here.) Once you've hit the contribution limit on one account, you've hit it on all of them. Even so, supposing you had a reason with try to take money out of one of the accounts, the answer to your question is \"\"sort of\"\". The limit is a limit on your gross contributions, not your net contributions. It is possible to withdraw Roth contributions if you do so before the tax filing deadline for that year, but you must also withdraw (and pay taxes on) any earnings accured during the time the money was in the Roth (see here). In addition, doing this may not be as simple as just taking the money out of your account; you should probably ask your bank about it and let them know you're \"\"undoing\"\" the contribution, since they may otherwise still record the amount as a real contribution and the withdrawal as unqualified early withdrawal (subject to penalties, etc.).\"", "title": "" }, { "docid": "30c3fa9ee32741f71ad214987a63e3a0", "text": "If you keep the account in your name only and your girlfriend is depositing money into it, then she is in effect making gifts of money to you. If the total amount of such gifts exceeds $14K in 2014, she will need to file a gift tax return (IRS Form 709, due April 15 of the following year, but not included with her Federal tax return; it has to be sent to a specific IRS office as detailed in the Instructions for Form 709). She would need to pay gift tax (as computed on Form 709) unless she opts to have the excess over $14K count towards her Federal lifetime combined gift and estate tax exclusion of $5M+ and so no gift tax is due. Most estates in the US are far smaller than $5 million and pay no Federal estate tax at all and for most people, the reduction of the lifetime combined... is of no consequence. Another point (for your girlfriend to think about): if you two should break up and go your separate ways at a later time, you are under no obligation to return her money to her, and if you do choose to do so, you will need to file a gift tax return at that time. If you will be returning her contributions together with all the earnings attributable to her contributions, then keep in mind that you will have paid income taxes on those earnings all along since the account is in your name only. Finally, keep in mind that the I in IRA stands for Individual and your girlfriend is not entitled to put her contributions into your IRA account. Summary: don't do this (or open a joint account as tenants in common) no matter how much you love each other. She should open accounts in her name only and make contributions to those accounts.", "title": "" } ]
fiqa
20b3f054b7c0816d78f351e649f825ed
How to evaluate stocks? e.g. Whether some stock is cheap or expensive?
[ { "docid": "84cbadbf74d336dd11ac4556a53dc886", "text": "\"If you are looking for numerical metrics I think the following are popular: Price/Earnings (P/E) - You mentioned this very popular one in your question. There are different P/E ratios - forward (essentially an estimate of future earnings by management), trailing, etc.. I think of the P/E as a quick way to grade a company's income statement (i.e: How much does the stock cost verusus the amount of earnings being generated on a per share basis?). Some caution must be taken when looking at the P/E ratio. Earnings can be \"\"massaged\"\" by the company. Revenue can be moved between quarters, assets can be depreciated at different rates, residual value of assets can be adjusted, etc.. Knowing this, the P/E ratio alone doesn't help me determine whether or not a stock is cheap. In general, I think an affordable stock is one whose P/E is under 15. Price/Book - I look at the Price/Book as a quick way to grade a company's balance sheet. The book value of a company is the amount of cash that would be left if everything the company owned was sold and all debts paid (i.e. the company's net worth). The cash is then divided amoung the outstanding shares and the Price/Book can be computed. If a company had a price/book under 1.0 then theoretically you could purchase the stock, the company could be liquidated, and you would end up with more money then what you paid for the stock. This ratio attempts to answer: \"\"How much does the stock cost based on the net worth of the company?\"\" Again, this ratio can be \"\"massaged\"\" by the company. Asset values have to be estimated based on current market values (think about trying to determine how much a company's building is worth) unless, of course, mark-to-market is suspended. This involves some estimating. Again, I don't use this value alone in determing whether or not a stock is cheap. I consider a price/book value under 10 a good number. Cash - I look at growth in the cash balance of a company as a way to grade a company's cash flow statement. Is the cash account growing or not? As they say, \"\"Cash is King\"\". This is one measurement that can not be \"\"massaged\"\" which is why I like it. The P/E and Price/Book can be \"\"tuned\"\" but in the end the company cannot hide a shrinking cash balance. Return Ratios - Return on Equity is a measure of the amount of earnings being generated for a given amount of equity (ROE = earnings/(assets - liabilities)). This attempts to measure how effective the company is at generating earnings with a given amount of equity. There is also Return on Assets which measures earnings returns based on the company's assets. I tend to think an ROE over 15% is a good number. These measurements rely on a company accurately reporting its financial condition. Remember, in the US companies are allowed to falsify accounting reports if approved by the government so be careful. There are others who simply don't follow the rules and report whatever numbers they like without penalty. There are many others. These are just a few of the more popular ones. There are many other considerations to take into account as other posters have pointed out.\"", "title": "" }, { "docid": "b55537ea38f39ad5dca50ded39529760", "text": "Its like anything else, you need to study and learn more about investing in general and the stocks you are looking at buying or selling. Magazines are a good start -- also check out the books recommended in another question. If you're looking at buying a stock for the mid/long term, look at things like this: Selling is more complicated and more frequently screwed up:", "title": "" }, { "docid": "d41d8cd98f00b204e9800998ecf8427e", "text": "", "title": "" }, { "docid": "91b720167fd3efe4a248785f4df1a208", "text": "\"duffbeer's answers are reasonable for the specific question asked, but it seems to me the questioner is really wanting to know what stocks should I buy, by asking \"\"do you simply listen to 'experts' and hope they are right?\"\" Basic fundamental analysis techniques like picking stocks with a low PE or high dividend yield are probably unlikely to give returns much above the average market because many other people are applying the same well-known techniques.\"", "title": "" }, { "docid": "cfc6a71d87f7cc84ff75401a7965d421", "text": "I look at the following ratios and how these ratios developed over time, for instance how did valuation come down in a recession, what was the trough multiple during the Lehman crisis in 2008, how did a recession or good economy affect profitability of the company. Valuation metrics: Enterprise value / EBIT (EBIT = operating income) Enterprise value / sales (for fast growing companies as their operating profit is expected to be realized later in time) and P/E Profitability: Operating margin, which is EBIT / sales Cashflow / sales Business model stability and news flow", "title": "" } ]
[ { "docid": "a4afa8c2f6d30d437aba51b7bd25b53b", "text": "Knowing the answer to this question is generally not as useful as it may seem. The stock's current price is the consensus of thousands of people who are looking at the many relevant factors (dividend rate, growth prospects, volatility, risk, industry, etc.) that determine its value. A stock's price is the market's valuation of the cash flows it entitles you to in the future. Researching a stock's value means trying to figure out if there is something relevant to these cash flows that the market doesn't know about or has misjudged. Pretty much anything we can list for you here that will affect a stock's price is something the market knows about, so it's not likely to help you know if something is mispriced. Therefore it's not useful to you. If you are not a true expert on how important the relevant factors are and how the market is reacting to them currently (and often even if you are), then you are essentially guessing. How likely are you to catch something that the thousands of other investors have missed and how likely are you to miss something that other investors have understood? I don't view gambling as inherently evil, but you should be clear and honest with yourself about what you are doing if you are trying to outperform the market. As people become knowledgeable about and experienced with finance, they try less and less to be the one to find an undervalued stock in their personal portfolio. Instead they seek to hold a fully diversified portfolio with low transactions costs and build wealth in the long term without wasting time and money on the guessing game. My suggestion for you is to transition as quickly as you can to behave like someone who knows a lot about finance.", "title": "" }, { "docid": "8a6e87ece5bda5dbb3720b8f90837b88", "text": "\"Here is how I would approach that problem: 1) Find the average ratios of the competitors: 2) Find the earnings and book value per share of Hawaiian 3) Multiply the EPB and BVPS by the average ratios. Note that you get two very different numbers. This illustrates why pricing from ratios is inexact. How you use those answers to estimate a \"\"price\"\" is up to you. You can take the higher of the two, the average, the P/E result since you have more data points, or whatever other method you feel you can justify. There is no \"\"right\"\" answer since no one can accurately predict the future price of any stock.\"", "title": "" }, { "docid": "946f3ce23e6c568eac2af2495c403eae", "text": "There's only one real list that states what people think stock prices should be, and that's the stocks order book. That lists the prices at which stock owners are willing to buy stocks now, and the price that buyers are willing to pay. A secondary measure is the corresponding options price. Anything else is just an opinion and not backed by money.", "title": "" }, { "docid": "7c7e2492482cabf5a89816370180c36c", "text": "The only recommendation I have is to try the stock screener from Google Finance : https://www.google.com/finance?ei=oJz9VenXD8OxmAHR263YBg#stockscreener", "title": "" }, { "docid": "0ecb2a725e650028ba832f98801a01b8", "text": "I'd recommend looking at fundamental analysis as well -- technical analysis seems to be good for buy and sell points, but not for picking what to buy. You can get better outperformance by buying the right stuff, and it can be surprisingly easy to create a formula that works. I'd check out Morningstar, AAII, or Equities Lab (fairly complicated but it lets you do technical and fundamental analysis together). Also read Benjamin Graham, and/or Ken Fisher (they are wildly different, which is why I recommend them both).", "title": "" }, { "docid": "7398abe8544fccf27a34b60e839f28b3", "text": "You can check whether the company whose stock you want to buy is present on an european market. For instance this is the case for Apple at Frankfurt.", "title": "" }, { "docid": "a4000a40d44e3fe823985daf10c1d0a8", "text": "Stock valuation is a really sticky business, although they are ways to value it, it is somewhat subjective(expectations are calculated). But it will be at premium most likely, can't tell how much without any numbers.(wouldn't be able to tell with the numbers as well since i do not have any knowledge in the sector)", "title": "" }, { "docid": "076724614177d21d3c98defd53abe1b4", "text": "REIT's are a different beast than your normal corporate stock (such as $AAPL). Here is a good article to get you started. From there you can do some more research into what you think you will need to truly evaluate an REIT. How To Assess A Real Estate Investment Trust (REIT) Excerpt: When evaluating REITs, you will get a clearer picture by looking at funds from operations (FFO) rather than looking at net income. If you are seriously considering the investment, try to calculate adjusted funds from operations (AFFO), which deducts the likely expenditures necessary to maintain the real estate portfolio. AFFO is also a good measure of the REIT's dividend-paying capacity. Finally, the ratio price-to-AFFO and the AFFO yield (AFFO/price) are tools for analyzing an REIT: look for a reasonable multiple combined with good prospects for growth in the underlying AFFO. Good luck!", "title": "" }, { "docid": "60c9eac57d227944f7dd9dfc37899a80", "text": "\"First, to mention one thing - better analysis calls for analyzing a range of outcomes, not just one; assigning a probability on each, and comparing the expected values. Then moderating the choice based on risk tolerance. But now, just look at the outcome or scenario of 3% and time frame of 2 days. Let's assume your investable capital is exactly $1000 (multiply everything by 5 for $5,000, etc.). A. Buy stock: the value goes to 103; your investment goes to $1030; net return is $30, minus let's say $20 commission (you should compare these between brokers; I use one that charges 9.99 plus a trivial government fee). B. Buy an call option at 100 for $0.40 per share, with an expiration 30 days away (December 23). This is a more complicated. To evaluate this, you need to estimate the movement of the value of a 100 call, $0 in and out of the money, 30 days remaining, to the value of a 100 call, $3 in the money, 28 days remaining. That movement will vary based on the volatility of the underlying stock, an advanced topic; but there are techniques to estimate that, which become simple to use after you get the hang of it. At any rate, let's say that the expected movement of the option price in this scenario is from $0.40 to $3.20. Since you bought 2500 share options for $1000, the gain would be 2500 times 2.8 = 7000. C. Buy an call option at 102 for $0.125 per share, with an expiration 30 days away (December 23). To evaluate this, you need to estimate the movement of the value of a 102 call, $2 out of the money, 30 days remaining, to the value of a 102 call, $1 in the money, 28 days remaining. That movement will vary based on the volatility of the underlying stock, an advanced topic; but there are techniques to estimate that, which become simple to use after you get the hang of it. At any rate, let's say that the expected movement of the option price in this scenario is from $0.125 to $ 1.50. Since you bought 8000 share options for $1000, the gain would be 8000 times 1.375 = 11000. D. Same thing but starting with a 98 call. E. Same thing but starting with a 101 call expiring 60 days out. F., ... Etc. - other option choices. Again, getting the numbers right for the above is an advanced topic, one reason why brokerages warn you that options are risky (if you do your math wrong, you can lose. Even doing that math right, with a bad outcome, loses). Anyway you need to \"\"score\"\" as many options as needed to find the optimal point. But back to the first paragraph, you should then run the whole analysis on a 2% gain. Or 5%. Or 5% in 4 days instead of 2 days. Do as many as are fruitful. Assess likelihoods. Then pull the trigger and buy it. Try these techniques in simulation before diving in! Please! One last point, you don't HAVE to understand how to evaluate projected option price movements if you have software that does that for you. I'll punt on that process, except to mention it. Get the general idea? Edit P.S. I forgot to mention that brokers need love for handling Options too. Check those commission rates in your analysis as well.\"", "title": "" }, { "docid": "3ffd7588e47bdcfbf842058ec577af8f", "text": "\"Answering this question is weird, because it is not really precise in what you mean. Do you want all stocks in the US? Do you want a selection of stocks according to parameters? Do you just want a cool looking graph? However, your possible misuse of the word derivative piqued my interest. Your reference to gold and silver seems to indicate that you do not know what a derivative actually is. Or what it would do in a portfolio. The straightforward way to \"\"see\"\" an efficient frontier is to do the following. For a set of stocks (in this case six \"\"randomly\"\" selected ones): library(quantmod) library(fPortfolio) library(PerformanceAnalytics) getSymbols(c(\"\"STZ\"\", \"\"RAI\"\", \"\"AMZN\"\", \"\"MSFT\"\", \"\"TWX\"\", \"\"RHT\"\"), from = \"\"2012-06-01\"\", to = \"\"2017-06-01\"\") returns &lt;- NULL tickerlist &lt;- c(\"\"STZ\"\", \"\"RAI\"\", \"\"AMZN\"\", \"\"MSFT\"\", \"\"TWX\"\", \"\"RHT\"\") for (ticker in tickerlist){ returns &lt;- cbind(returns, monthlyReturn(Ad(eval(as.symbol(ticker))))) } colnames(returns) &lt;- tickerlist returns &lt;- as.timeSeries(returns) frontier &lt;- portfolioFrontier(returns) png(\"\"frontier.png\"\", width = 800, height = 600) plot(frontier, which = \"\"all\"\") dev.off() minvariancePortfolio(returns, constraints = \"\"LongOnly\"\") Portfolio Weights: STZ RAI AMZN MSFT TWX RHT 0.1140 0.3912 0.0000 0.1421 0.1476 0.2051 Covariance Risk Budgets: STZ RAI AMZN MSFT TWX RHT 0.1140 0.3912 0.0000 0.1421 0.1476 0.2051 Target Returns and Risks: mean Cov CVaR VaR 0.0232 0.0354 0.0455 0.0360 https://imgur.com/QIxDdEI The minimum variance portfolio of these six assets has a mean return is 0.0232 and variance is 0.0360. AMZN does not get any weight in the portfolio. It kind of means that the other assets span it and it does not provide any additional diversification benefit. Let us add two ETFs that track gold and silver to the mix, and see how little difference it makes: getSymbols(c(\"\"GLD\"\", \"\"SLV\"\"), from = \"\"2012-06-01\"\", to = \"\"2017-06-01\"\") returns &lt;- NULL tickerlist &lt;- c(\"\"STZ\"\", \"\"RAI\"\", \"\"AMZN\"\", \"\"MSFT\"\", \"\"TWX\"\", \"\"RHT\"\", \"\"GLD\"\", \"\"SLV\"\") for (ticker in tickerlist){ returns &lt;- cbind(returns, monthlyReturn(Ad(eval(as.symbol(ticker))))) } colnames(returns) &lt;- tickerlist returns &lt;- as.timeSeries(returns) frontier &lt;- portfolioFrontier(returns) png(\"\"weights.png\"\", width = 800, height = 600) weightsPlot(frontier) dev.off() # Optimal weights out &lt;- minvariancePortfolio(returns, constraints = \"\"LongOnly\"\") wghts &lt;- getWeights(out) portret1 &lt;- returns%*%wghts portret1 &lt;- cbind(monthprc, portret1)[,3] colnames(portret1) &lt;- \"\"Optimal portfolio\"\" # Equal weights wghts &lt;- rep(1/8, 8) portret2 &lt;- returns%*%wghts portret2 &lt;- cbind(monthprc, portret2)[,3] colnames(portret2) &lt;- \"\"Equal weights portfolio\"\" png(\"\"performance_both.png\"\", width = 800, height = 600) par(mfrow=c(2,2)) chart.CumReturns(portret1, ylim = c(0, 2)) chart.CumReturns(portret2, ylim = c(0, 2)) chart.Drawdown(portret1, main = \"\"Drawdown\"\", ylim = c(-0.06, 0)) chart.Drawdown(portret2, main = \"\"Drawdown\"\", ylim = c(-0.06, 0)) dev.off() https://imgur.com/sBHGz7s Adding gold changes the minimum variance mean return to 0.0116 and the variance stays about the same 0.0332. You can see how the weights change at different return and variance profiles in the picture. The takeaway is that adding gold decreases the return but does not do a lot for the risk of the portfolio. You also notice that silver does not get included in the minimum variance efficient portfolio (and neither does AMZN). https://imgur.com/rXPbXau We can also compare the optimal weights to an equally weighted portfolio and see that the latter would have performed better but had much larger drawdowns. Which is because it has a higher volatility, which might be undesirable. --- Everything below here is false, but illustrative. So what about the derivative part? Let us assume you bought an out of the money call option with a strike of 50 on MSFT at the beginning of the time series and held it to the end. We need to decide on the the annualized cost-of-carry rate, the annualized rate of interest, the time to maturity is measured in years, the annualized volatility of the underlying security is proxied by the historical volatility. library(fOptions) monthprc &lt;- Ad(MSFT)[endpoints(MSFT, \"\"months\"\")] T &lt;- length(monthprc) # 60 months, 5 years vol &lt;- sd(returns$MSFT)*sqrt(12) # annualized volatility optprc &lt;- matrix(NA, 60, 1) for (t in 1:60) { s &lt;- as.numeric(monthprc[t]) optval &lt;- GBSOption(TypeFlag = \"\"c\"\", S = s, X = 50, Time = (T - t) / 12, r = 0.001, b = 0.001, sigma = vol) optprc[t] &lt;- optval@price } monthprc &lt;- cbind(monthprc, optprc) colnames(monthprc) &lt;- c(\"\"MSFT\"\", \"\"MSFTCall50\"\") MSFTCall50rets &lt;- monthlyReturn(monthprc[,2]) colnames(MSFTCall50rets) &lt;- \"\"MSFTCall50rets\"\" returns &lt;- merge(returns, MSFTCall50rets) wghts &lt;- rep(1/9, 9) portret3 &lt;- returns%*%wghts portret3 &lt;- cbind(monthprc, portret3)[,3] colnames(portret3) &lt;- \"\"Equal weights derivative portfolio\"\" png(\"\"performance_deriv.png\"\", width = 800, height = 600) par(mfrow=c(2,2)) chart.CumReturns(portret2, ylim = c(0, 4.5)) chart.CumReturns(portret3, ylim = c(0, 4.5)) chart.Drawdown(portret2, main = \"\"Drawdown\"\", ylim = c(-0.09, 0)) chart.Drawdown(portret3, main = \"\"Drawdown\"\", ylim = c(-0.09, 0)) dev.off() https://imgur.com/SZ1xrYx Even though we have a massively profitable instrument in the derivative. The portfolio analysis does not include it because of the high volatility. However, if we just use equal weighting and essentially take a massive position in the out of the money call (which would not be possible in real life), we get huge drawdowns and volatility, but the returns are almost two fold. But nobody will sell you a five year call. Others can correct any mistakes or misunderstandings in the above. It hopefully gives a starting point. Read more at: https://en.wikipedia.org/wiki/Modern_portfolio_theory https://en.wikipedia.org/wiki/Option_(finance) The imgur album: https://imgur.com/a/LoBEY\"", "title": "" }, { "docid": "7c9353f6a0cae024f3d16f95ca48999b", "text": "\"Check your math... \"\"two stocks, both with a P/E of 2 trading at $40 per share lets say, and one has an EPS of 5 whereas the other has an EPS of 10 is the latter a better purchase?\"\" If a stock has P/E of 2 and price of $40 it has an EPS of $20. Not $10. Not $5.\"", "title": "" }, { "docid": "0a7f714f0a3b50be1430a11363a34698", "text": "Aswath Damodaran's [Investment Valuation 3rd edition](http://www.amazon.com/Investment-Valuation-Techniques-Determining-University/dp/1118130731/ref=sr_1_12?ie=UTF8&amp;qid=1339995852&amp;sr=8-12&amp;keywords=aswath+damodaran) (or save money and go with a used copy of the [2nd edition](http://www.amazon.com/gp/offer-listing/0471414905/ref=dp_olp_used?ie=UTF8&amp;condition=used)) He's a professor at Stern School of Business. His [website](http://pages.stern.nyu.edu/~adamodar/) and [blog](http://aswathdamodaran.blogspot.com/) are good resources as well. [Here is his support page](http://pages.stern.nyu.edu/~adamodar/New_Home_Page/Inv3ed.htm) for his Investment Valuation text. It includes chapter summaries, slides, ect. If you're interested in buying the text you can get an idea of what's in it by checking that site out.", "title": "" }, { "docid": "b731769f380d1dbc187594d1070e9701", "text": "I was thinking that the value of the stock is the value of the stock...the actual number of shares really doesn't matter, but I'm not sure. You're correct. Share price is meaningless. Google is $700 per share, Apple is $100 per share, that doesn't say anything about either company and/or whether or not one is a better investment over the other. You should not evaluate an investment decision on price of a share. Look at the books decide if the company is worth owning, then decide if it's worth owning at it's current price.", "title": "" }, { "docid": "76e622fc225406dbd70fb144752364dc", "text": "\"You could use any of various financial APIs (e.g., Yahoo finance) to get prices of some reference stock and bond index funds. That would be a reasonable approximation to market performance over a given time span. As for inflation data, just googling \"\"monthly inflation data\"\" gave me two pages with numbers that seem to agree and go back to 1914. If you want to double-check their numbers you could go to the source at the BLS. As for whether any existing analysis exists, I'm not sure exactly what you mean. I don't think you need to do much analysis to show that stock returns are different over different time periods.\"", "title": "" }, { "docid": "a1c8b750f6c21453c59ba60da65eed80", "text": "\"Step 2 is wrong. Leverage is NOT necessary. It increases possible gain, but increases risk of loss by essentially the same amount. Those two numbers are pretty tightly linked by market forces. See many, many other answers here showing that one can earn \"\"market rate\"\" -- 8% or so -- with far less risk and effort, if one is patient, and some evidence that one can do better with more effort and not too much more risk. And yes, investing for a longer time horizon is also safer.\"", "title": "" } ]
fiqa
2d9924fa1ca804e07679e745e37877bc
What are the reasons to get more than one credit card?
[ { "docid": "d41d8cd98f00b204e9800998ecf8427e", "text": "", "title": "" }, { "docid": "d8adc7d4160959f688ae4e377b73b715", "text": "In the case of reward cards, different cards may offer different rewards for different kind of purchases. For example, in the UK, one of the Amex cards offers 1.25% cashback on all purchases, whereas one of the Santander cards offers 3% on fuel, 2% or 1% on certain other transactions, and nothing on others. Of course, you then have to remember to use the right card! Another reason is that a person may use a card for a while, build up a good credit limit, and then move to a different card (perhaps because it has better rewards, or a lower interest rate, etc) without cancelling the first. If it costs nothing to keep the first card, then it can be useful to have it as a spare.", "title": "" }, { "docid": "3d546b6e4bd4a4a825ca9009cdc7b12a", "text": "Another reason is that the amount of unused credit you have is a positive factor on your credit score. It's generally easier to open several different accounts for $X dollars each with different banks than to get your current bank to raise your limit severalfold in a single go. Your current bank has to worry about why you suddenly are asking for a large additional amount of credit; while other banks will be willing to offer you smaller amounts of credit in the hope that you transfer your business from your current bank to them.", "title": "" }, { "docid": "4e18a3c6cbff373b8ab0f583250150a6", "text": "A friend of mine has two credit cards. He has specifically arranged with the card issuers so that the billing cycles are 15 days out of sync. He uses whichever card has more recently ended its billing cycle, which gives him the longest possible time between purchase and the due date to avoid interest.", "title": "" }, { "docid": "39f6c48c7af1810a0a19a134191176db", "text": "I have a fair number of cards floating around some reasons I have opened multiple accounts. I am not saying that it is for everyone but there are valid scenarios where multiple credit cards can make sense.", "title": "" }, { "docid": "ba1e15889ae2cea42d3c1ef7f74f9ef1", "text": "Many reasons mentioned already. The reason why I have multiple is missing: I have a personal card for my private use and a company card for company use.", "title": "" }, { "docid": "b9b63ee6b91966273d3a16a44f838842", "text": "Another good reason: if you have to replace a card due to damage, loss, or identity theft it's nice to have a backup you can use until the new card for your primary account arrives. I know folks who use a secondary card for online purchases specifically so they can kill it if necessary without impacting their other uses, online arguably being at more risk. If there's no yearly fee, and if you're already paying the bill in full every month, a second card/account is mostly harmless. If you have trouble restraining yourself with one card, a second could be dangerous.", "title": "" }, { "docid": "d41d8cd98f00b204e9800998ecf8427e", "text": "", "title": "" }, { "docid": "1cea1ffc018113668b1aa2a79dde9f86", "text": "\"3 reasons I can think of: I once worked for a bank and when credit scoring for loans, if you had been approved by different institutions, you were given a better score. So if you held a Visa and Mastercard (as opposed to two Visa cards) your credit score would go higher. More than 6 cards though looked suspicious and your score would take a big hit. Having more than card has helped me when getting special offers multiple times from some websites where it was limited to \"\"one per customer\"\" though most just used your address or email account. If you owed $1000 in total which you can't pay off in one go, it is better to have that split across two cards. You would be paying interest on $500 on each card but when you have one card paid off, the interest you would be paying on the other would be based on the original debt to that one card of $500 (not $1000). I hope that makes sense.\"", "title": "" }, { "docid": "0bfbeea865a7de3a370c39b733d0c35e", "text": "1- To max out rewards. I have 5 different credit cards, one gives me 5% back on gas, another on groceries, another on Amazon, another at restaurants and another 2% on everything else. If I had only one card, I would be missing out on a lot of rewards. Of course, you have to remember to use the right card for the right purchase. 2- To increase your credit limit. One card can give you a credit limit of $5,000, but if you have 4 of them with the same limits, you have increased your purchasing power to $20,000. This helps improve your credit score. Of course, it's never a good idea to owe $20,000 in credit card debt.", "title": "" }, { "docid": "8cf1cad1101d3b58fb25117237555f98", "text": "I keep one card just for monthly bills (power company,car loan, etc.). This one is unlikely to get hacked so I won't have to go change the credit card information on my monthly bills. I pay the credit card from my bank account. I just don't want a lot of businesses with direct access to my bank account.", "title": "" }, { "docid": "29fd9a7b163c501ded970e454c7f5aed", "text": "Someone mentioned sign up bonuses but only mentioned dollar values. You might get points, sweet, sweet airline points :) which some might find compelling enough to churn cards so they always have a few open.", "title": "" }, { "docid": "278dfae26b43adafbd6cf6655c324295", "text": "I got a Capital One credit card because they don't charge a fee for transactions in foreign currencies. So I only use it when I travel abroad. At home, I use 3 different credit cards, each offering different types of rewards (cash back on gas, movies, restaurants, online shopping etc).", "title": "" }, { "docid": "248a67266daf806c6b4ac027188129d7", "text": "There is almost no reason to get a second credit card - this is a very good arrangement for your creditor but not for you. Credit cards have high rates of interest which you have to pay unless you pay the credit off every month. Therefore, increasing your total credit capacity should not be your concern. Since internet technology lets you pay off your balance in minutes online, there is no reason to have multiple cards in order to avoid running out of a balance. If, on the other hand, you do not pay your existing card off every month, than getting another card can be even more dangerous, since you're increasing the amount of debt you take on. I'd say at most it would make sense for you to grab a basic VISA, since most places do not accept AMEX. I would also considering cancelling the AMEX if you get the VISA, for reasons above.", "title": "" } ]
[ { "docid": "ec99e72389a56d364362c3107958891b", "text": "My recommendation is to not ask for a credit increase, but just increase the utilization of one card if you have multiple cards, and decrease the utilization of the others, and continue paying off all cards in full each month. In a few months, you will likely be offered a credit increase by the card that is getting increased use. The card company that is getting the extra business knows that you are paying off big bills each month and keeping your account in good standing, and they will likely offer you a credit increase all by themselves because they want to keep your business. If no offer is forthcoming, you can call the card company and ask for a credit increase. If they refuse, tell them that you will be charging very little on the card in the future (or even canceling your card, though that will cause a hit on your credit score) because of their refusal, and switch your high volume to a different card.", "title": "" }, { "docid": "5fc083d123368ec99df5ecda0132fdf5", "text": "If you are planning to get new cards, it is probably best to open the accounts as soon as possible to start establishing a history of good credit use. You might also wish to open multiple accounts so that future lines will have less of an impact on your average age of open credit lines. Since you will probably have higher interest rates it is also advisable never to carry a balance on any of your newly acquired cards. This will prevent a recurrence of the problems you are now trying to recover from.", "title": "" }, { "docid": "87d965cd8c97f1faa8784ca29206e209", "text": "Because even if you won the lottery, without at least some credit history you will have trouble renting cars and hotel rooms. I learned about the importance, and limitations of credit history when, in the 90's, I switched from using credit cards to doing everything with a debit card and checks purely for convenience. Eventually, my unused credit cards were not renewed. At that point in my life I had saved a lot and had high liquidity. I even bought new autos every 5 years with cash. Then, last decade, I found it increasingly hard to rent cars and sometimes even a hotel rooms with a debit card even though I would say they could precharge whatever they thought necessary to cover any expenses I might run. I started investigating why and found out that hotels and car rentals saw having a credit card as a proxy for low risk that you would damage the car or hotel room and not pay. So then I researched credit cards, credit reports, and how they worked. They have nothing about any savings, investments, or bank accounts you have. I had no idea this was the case. And, since I hadn't had cards or bought anything on credit in over 10 years there were no records in my credit files. Old, closed accounts had fallen off after 10 years. So, I opened a couple of secured credit cards with the highest security deposit allowed. They unsecured after a year or so. Then, I added several rewards cards. I use them instead of a debit card and always pay in full and they provide some cash back so I save money compared to just using a debit card. After 4 years my credit score has gone to 800+ even though I have never carried any debt and use the cards as if they were debit cards. I was very foolish to have stopped using credit cards 20 years ago but just had no idea of the importance of an established credit history. And note that establishing a great credit history does not require that you borrow money or take out loans for anything. just get credit cards and pay them in full each month.", "title": "" }, { "docid": "87f7466bc890563ee9345c8834bfb181", "text": "Also, unless I missed it and someone already mentioned it, do keep in mind the impact of these credit cards balances on your credit score. Over roughly 75% usage on a given credit account reflects badly on your score and has a pretty large impact on how your worthiness is calculated. It gives the impression that you are a person that lives month to month on cards, etc. If you could get both cards down to reasonable balances to where you could begin paying on them regularly and work them down over time, that will not only look incredible for your credit report but also immediately begin making your credit worthiness begin to raise due to the fact that you will not have accounts that (I'm assuming here) are at very high usage (over 75% of your total limit.) If you have to get one card knocked out just to get breathing room, and you're boxed in here -- or honestly even if the mental stress is causing you incredible hardship day to day, then I suppose blow one card out of the water, reassess and start getting to work on that second card. I hope this helped, I'm no expert, but I have had every kind of luck with credit cards and accounts you could think of, so I can only give my experience from the rubber-meets-the-road perspective. Good luck!", "title": "" }, { "docid": "6d1f5c390d2fc95f58a1fcc9cdf0566a", "text": "For those who are looking to improve credit for the sake of being able to obtain future credit on better terms, I think a rewards credit card is the best way to do that. I recommend that you only use as many cards as you need to gain the best rewards. I have one card that gives 6% back on grocery purchases, and I have another card that gives 4% back on [petrol] and 2% back on dining out. Both of those cards give only 1% back on all other purchases, so I use a third card that gives 1.5% back across the board for my other purchases. I pay all of the cards in full each month. If there was a card that didn't give me an advantage in making my purchases, I wouldn't own it. I'm generally frugal, so I know that there is no psychological disadvantage to paying with a card. You have to consider your own spending discipline when deciding whether paying with cards is an advantage for you. In the end, you should only use debt when you can pay low interest rates (or as in the case of the cards above, no interest at all). In the case of the low interest debt, it should be allowing you to make an investment that will pay you more by having it sooner than the cost of interest. You might need a car to get to work, but you probably don't need a new car. Borrow as little as you can and repay your loans as quickly as you can. Debt can be a tool for your advantage, but only if used wisely. Don't be lured in by the temptation of something new and shiny now that you can pay for later.", "title": "" }, { "docid": "cb8152e2f225941fdaf15f1f09e1f37d", "text": "I'm not sure if you are including the use of credit cards in the intent of your quesiton. However, I will give you some good reasons I use them even when I can pay cash: 1) I get an interest free loan for almost 30 days as long as I don't carry balances. 2) I get a statement detailing where I am spending my money that is helpful for budgeting. I'd never keep track to this level of detail if I were using cash. 3) Many cards offer reward programs that can be used for cash back. 4) It helps maintain my credit rating for those times I NEED to buy something and pay it off over time (car, house, etc.) 5) Not so much an issue for me personally, but for people that live paycheck to paycheck, it might help to time your cash outflows to match up with your inflows. For a business, I think it is mostly a cash flow issue. That is, in a lot of B2B type businesses customers can pay very slowly (managing their own cash flows). So your revenue can sometimes lag quite a bit behind the expenses that were associated with them (e.g payroll). A business line of credit can smooth out the cash flow, especially for companies that don't have a lot of cash reserves.", "title": "" }, { "docid": "19db7d1ea4440024576bf59019233a4a", "text": "Debit cards do not earn the bank any interest from you whereas credit cards do, so they want to give incentive to use credit over debit.", "title": "" }, { "docid": "cfdd43e6bb109477b2927f5a78aa9c38", "text": "\"The following is based on my Experian credit scoring feedback and experience here in the UK over many years. (And for further information I currently hold a credit score of 999, the highest possible, with 6 credit cards.) Now I'm assuming that while there may be some differences in particulars in your case due to the difference in locality nevertheless the below should hopefully provide some broad guidelines and reasonable conclusion in your situation: Having a large number of active credit accounts may be seen as a negative. However having a large number of settled accounts should on the contrary have a positive effect on your score. As you keep your accounts mostly settled, I think having another card will not be to your detriment and should in time be beneficial. A large total credit balance outstanding may count against you. (But see the next point.) Having your total outstanding debt on all credit accounts be a smaller proportion of your total available credit, counts in your favour. This means having more cards for the same amount of credit in use, is net-net in your favour. It also has the effect of making even larger outstanding credit balances (as in point 2) to be a lower percentage of your total available credit, and consequently will indicate lower risk to lenders. It appears from my experience the higher the highest credit limit on a single card you are issued (and are managing responsibly e.g. either paid off or used responsibly) the better. Needless to say, any late payments count against you. The best thing to do then is to set up a direct debit for the minimum amount to be paid like clockwork every month. Lenders really like consistent payers. :) New credit accounts initially will count against you for a while. But as the accounts age and are managed responsibly or settled they will eventually count in your favour and increase your score. Making many credit applications in a short space of time may count against you as you may be seen to be credit reliant. Conclusion: On balance I would say get the other card. Your credit score might be slightly lower for a couple of months but eventually it will be to your benefit as per the above. Having another card also means more flexibility and more more options if you do end up with a credit balance that you want to finance and pay off over a period as cheaply as possible. In the UK the credit card companies are falling over themselves trying to offer one \"\"interest free\"\" or 0% \"\"balance transfer\"\" offers. Of course they're not truly 0% since you typically have to pay a \"\"transfer fee\"\" of a couple of percent. Still, this can be quite cheap credit, much much cheaper than the headline APR rates actually associated with the cards. The catch is that any additional spending on such cards are paid off first (and attract interest at the normal rate until paid off). Usually also if you miss a payment the interest rate reverts to the normal rate. But these pitfalls are easily avoided (pay by direct debit and don't use card you've got a special deal on for day to day expenses.) So, having more cards available is then very useful because you then have choice. You can roll expensive debts to the cheapest lender at your disposal for as long as they'll offer, and then simply not use that card for any purchases (while paying off the balance as cheaply as possible), meanwhile using another card for day to day expenses.\"", "title": "" }, { "docid": "4ed05f68ca768bf237e64f58839e2da2", "text": "You have 3 assumptions about the use of credit cards for all your purchases: 1) May be a moot point. At current interest rates that will not make much of a difference. If somebody links their card to a checking account that doesn't pay any interest there will be no additional interest earned. If the rate on their account is <1% they may make a couple of dollars a month. 2) Make sure that the card delivers on the benefits you expect. Don't select a card with an annual fee. Cash is better than miles for most people. Also make sure the best earnings aren't from only shopping at one gas station or one store. You might not make as much as you expect. Especially if the gas station is generally the most expensive in the area. Sometimes the maximum cash back is only for a limited time, or only after you have charged thousands of dollars that year. 3) It can have a positive impact on your credit rating. I have also found that the use of the credit card does minimize the chances of accidentally overdrawing the linked account. There is only one big scheduled withdraw a month, instead of dozens of unscheduled ones. There is some evidence that by disconnecting the drop in balance from the purchase, people spend more. They say I am getting X% back, but then are shocked when they see the monthly bill.", "title": "" }, { "docid": "9e88c6e1c6c8ea228540df3db741c995", "text": "\"You ask about the difference between credit and debit, but that may be because you're missing something important. Regardless of credit/debit, there is value in carrying two different cards associated with two different accounts. The reason is simply that because of loss, fraud, or your own mismanagement, or even the bank's technical error, any card can become unusable for some period of time. Exactly how long depends what happened, but just sending you a new card can easily take more than one business day, which might well be longer than you'd like to go without access to any funds. In that situation you would be glad of a credit card, and you would equally be glad of a second debit card on a separate account. So if your question is \"\"I have one bank account with one debit card, and the only options I'm willing to contemplate are (a) do nothing or (b) take a credit card as well\"\", then the answer is yes, take a credit card as well, regardless of the pros or cons of credit vs debit. Even if you only use the credit card in the event that you drop your debit card down a drain. So what you can now consider is the pros and cons of a credit card vs managing an additional bank account -- unless you seriously hate one or more of the cons of credit cards, the credit card is likely to win. My bank has given me a debit card on a cash savings account, which is a little scary, but would cover most emergencies if I didn't have a credit card too. Of course the interest rate is rubbish and I sometimes empty my savings account into a better investment, so I don't use it as backup, but I could. Your final question \"\"can a merchant know if I give him number of debit or credit card\"\" is already asked: Can merchants tell the difference between a credit card and embossed debit card? Yes they can, and yes there are a few things you can't (or might prefer not to) do with debit. The same could even be said of Visa vs. Mastercard, leading to the conclusion that if you have a Visa debit you should look for a Mastercard credit. But that seems to be less of an issue as time goes on and almost everywhere in Europe apparently takes both or neither. If you travel a lot outside the EU then you might want to be loaded down with every card under the sun, and three different kinds of cash, but you'd already know that without asking ;-)\"", "title": "" }, { "docid": "e68db5c2c9a5586f8320886ebec6055e", "text": "Another thing to factor in are deals provided by banks. In general, banks care about new customers more than their existing customers. Hence they explicitly restrict the best deals on credit cards, savings accounts, etc, to new customers only. (Of course, there are occasionally good deals for existing customers, and some banks choose not to discriminate.) If you have many different bank accounts, you are making yourself unavailable for switching bonuses and introductory rates.", "title": "" }, { "docid": "10fb3876dfd56ac3b8ae39c4aaf46346", "text": "Do you need it? It doesn't sound like it - you seem to be able to manage with just the cards you have. Will it hurt anything? Probably not either, unless it entices you to spend more than you make. Another downside might be that you would spend more than you normally would just to have activity on every card. So all in all, I don't see much upside.", "title": "" }, { "docid": "78ed499616a995e2d3a5153515793822", "text": "pay off one of the cards completely. there are several reasons why:", "title": "" }, { "docid": "c7f69a4ac2f6301ad1db8d23d13323d7", "text": "Deposit it in a business savings account. The following below show you some options you can choose from. Next you can invest it in the market i.e. shares, bonds etc. If you have a more risky side, can go for peer to peer lending. If you are feeling really lucky and want to invest in the long term, then buy a property as a buy-to-let landlord. There are loads of options, you only need to explore.", "title": "" }, { "docid": "7b39d160f01e3caff393cd459215bf0a", "text": "Under what conditions did you move? My favourite method of judging prices objectively comes from concepts written in Your Money or Your Life by Joe Dominguez. Essentially it normalizes money spent by making you figure out how much an item costs with respect to the number of hours you needed to work to afford it. I prefer that method versus comparing with others since it is objective for yourself and looks beyond just the bare prices.", "title": "" } ]
fiqa
de1880a5850661a98d0527077ad872e2
How to share income after marriage and kids?
[ { "docid": "590852108b061575c8815783e9c46e36", "text": "\"My suggestion would be that you're looking at this the wrong way, though for good reasons. Once you are a family, you should - and, in most cases I've seen, will - think of things differently than you do now. Right now, your post above is written from a selfish perspective. Not to be insulting, and not implying selfish is a bad thing - I don't mean it negatively. But it is how you're defining this problem: from a self-interested, selfish point of view. \"\"Fair\"\" and \"\"unfair\"\" only have meaning from this point of view; something can only be unfair to you if you come from a self-centered viewpoint. Try to think of this from a family-centric viewpoint, and from your significant other's point of view. You're absolutely right to want both of you to be independent financially as far as is possible; but think about what that means from all three points of view (your family's, yours, and hers)? Exactly what it means will depend on the two of you separately and together, but I would encourage you to start with a few basics that make it likely you'll find a common ground: First of all, ensure your significant other has a retirement account of her own that is funded as well as yours is. This will both make life easier if you split up, and give her a safety net if something happens to you than if you have all of the retirement savings. I don't know how your country manages pensions or retirement accounts, but figure out how to get her into something that is as close to equal to yours as possible. Make sure both of you have similar quality credit histories. You should both have credit cards in your own names (or be true joint owners of the accounts, not just authorized users, where that is possible), and both be on the mortgage/etc. when possible. This is a common issue for women whose spouse dies young and who have no credit history. (Thanks @KateGregory for reminding me on this one) Beyond that, work out how much your budget allows for in spending money for the two of you, and split that equally. This spending money (i.e., \"\"fun money\"\" or money you can do whatever you like with) is what is fundamentally important in terms of financial independence: if you control most of the extra money, then you're the one who ultimately has control over much (vacations, eating out, etc.) and things will be strained. This money should be equal - whether it is literally apportioned directly (each of you has 200 a month in an account) or simply budgeted for with a common account is up to you, whatever works best for your personal habits; separate accounts works well for many here to keep things honest. When that money is accounted for, whatever it is, split the rest of the bills up so that she pays some of them from her income. If she wants to be independent, some of that is being in the habit of paying bills on time. One of you paying all of the bills is not optimal since it means the other will not build good habits. For example, my wife pays the warehouse club credit card and the cell phone bill, while I pay the gas/electric utilities. Whatever doesn't go to spending money and doesn't go to the bills she's personally responsible for or you're responsible for (from your paycheck) should go to a joint account. That joint account should pay the larger bills - mortgage/rent, in particular - and common household expenses, and both of you should have visibility on it. For example, our mortgage, day-care costs, major credit card (which includes most of our groceries and other household expenses) come from that joint account. This kind of system, where you each have equal money to spend and each have some household responsibilities, seems the most reasonable to me: it incurs the least friction over money, assuming everyone sticks to their budgeted amounts, and prevents one party from being able to hold power over another. It's a system that seems likely to be best for the family as a unit. It's not \"\"fair\"\" from a self-centered point of view, but is quite fair from a family-centered point of view, and that is the right point of view when you are a family, in my opinion. I'll emphasize here also that it is important that no one party hold the power, and this is set up to avoid that, but it's also important that you not use your earning power as a major arguing point in this system. You're not \"\"funding her lifestyle\"\" or anything like that: you're supporting your family, just as she is. If she were earning more than you, would you cut your hours and stay at home? Trick question, as it happens; regardless of your answer to that question, you're still at the same point: both of you are doing the thing you're best suited for (or, the thing you prefer). You're both supporting the family, just in different ways, and suggesting that your contribution is more valuable than hers is a great way to head down the road to divorce: it's also just plain incorrect. My wife and I are in almost the identical situation - 2 kids, she works part time in the biological sciences while spending plenty of time with the kids, I'm a programmer outearning her significantly - and I can tell you that I'd more than happily switch roles if she were the bread earner, and would feel just as satisfied if not more doing so. And, I can imagine myself in that position, so I can also imagine how I'd feel in that position as far as how I value my contribution.\"", "title": "" }, { "docid": "6d2aadc3cf9a6ff75c0c7a52820d5c2c", "text": "You remind me a lot of myself as I was thinking about marriage. Luckily for me, my wife was much smarter about all this than I was. Hopefully, I can pass along some of her wisdom. Both of us feel very strongly about being financially independent and if possible we both don't want to take money from each other. In marriage, there is no more financial independence. Do not think in those terms. Life can throw so many curve balls that you will regret it. Imagine sitting down with your new bride and running through the math. She is to contribute $X to the family each month and you are to contribute $Y. Then next thing you know, 6 months later, she has cancer and has to undergo expensive and debilitating treatment. There is no way she can contribute her $X anymore. You tell her that is okay and that you understand, but the pressure weighs down on her every day because she feels like she is not meeting your expectations. Or alternatively, everything goes great with your $X, $Y plan. A few years down the road your wife is pregnant, so you revisit the plan, readjust, etc. Everything seems great. When your child is born, however, the baby has a severe physical or mental handicap. You and your wife decide that she will quit her job to raise your beautiful child. But, the whole time, in the back of her mind she can't get out of her head that she is no longer financially independent and not living up to your expectations. These stresses are not what you want in your marriage. Here is what we do in my family. Hopefully, some of this will be helpful to you. Every year my wife and I sit down and determine what our financial goals are for the year. How much do we want to be putting in retirement? How much do we want to give to charity? Do we want to take any family vacations? We set goals together on what we want to achieve with our money. There is no my money or her money, just ours. Doesn't matter where it comes from. At the beginning of every month, we create a budget in a spreadsheet. It has categories like (food, mortgage or rent, transportation, clothing, utilities) and we put down how much we expect to spend on each of those. It also has categories for entertainment, retirement, charity, cell phones, internet, and so on. Again, we put down how much we expect to spend on each of those. In the spreadsheet, we also track how much income we expect that month and our totals (income minus expenses). If that value is positive, we determine what to do with the remainder. Maybe we save some for a rainy day or for car repairs. Maybe we treat ourselves to an extra fancy dinner. The point is, every dollar should be accounted for. If she wants to go to dinner with some friends, we put that in the budget. If I want a new video game, we put that in the budget. Once a week, we take all our receipts and tally up where we spent our money. We then see how we are doing on our budget. Maybe we were a little high in one category and lower than expected in another. We adjust. We are flexible. But, we go over our finances often to make sure we are achieving our goals. Some specific goals I'd recommend that the two of you consider in your first such yearly meeting: You get out of life what you put into it, and you will get out of your finances what the two of you put into them. By being on the same page, your marriage will be much happier. Money/finances are one of the top causes of divorce. If you two are working together on this, you are much more likely to succeed.", "title": "" }, { "docid": "dcc20635328d993b4b926dcedd1615d7", "text": "I started out thinking like you but I quickly realised this was a bad approach. You are a team, aren't you? Are you equals or is one of you an inferior of lower value? I think you'll generate more shared happiness by acting as a team of equals. I'd pool your resources and share them as equals. I'd open a joint account and pay both your incomes directly into it. I'd pay all household bills from this. If you feel the need, have separate personal savings accounts paid into (equally) from the joint account. Major assets should be in joint names. This usually means the house. In my experience, it is a good idea to each have a small amount of individual savings that you jointly agree each can spend without consulting the other, even if the other thinks it is a shocking waste of money. However, spending of joint savings should only be by mutual agreement. I would stop worrying about who is bringing in the most income. Are you planning to gestate your children? How much is that worth? - My advice is to put all this aside, stop trying to track who adds what value to the joint venture and make it a partnership of equals where each contributes whatever they can. Suppose you fell ill and were unable to earn. Should you wife then retain all her income and keep you in poverty? I really believe life is simpler and happier without adding complex and stressful financial issues to the relationship. Of course, everyone is different. The main thing is to agree this between the two of you and be open to change and compromise.", "title": "" }, { "docid": "583731e4e2db5633a8cf29dacde300e0", "text": "\"I haven't seen this addressed anywhere else, so I'll make a small answer to add on to the great ones already here. Money isn't the only way a person can contribute to a relationship. Time and effort are valuable contributions. Who runs the household? Who cooks, cleans, does laundry? How will you share these duties? My husband and I have a couple of rules. One of which is that we don't keep count. \"\"I did dishes, so you do laundry\"\". \"\"I made coffee last time, so now it's your turn\"\". \"\"I paid this, so you pay that\"\". That's not allowed. I happen to make ~4x as much as my husband, but I work 4x the hours (he's part time at the moment). So, he does the dishes, he cooks, he does laundry, he runs the household. Do I value him less? No! I value him more, because he is part of the team, and he feeds me coffee while I work (we have our own business). Even though I make so much more than him, we still split everything down the middle. Because his contribution to this relationship, to this household, is so much more than just money. And I value him. I value his contribution. At the end of the day, you are a team - and if you split hairs over finances, you'll find yourself splitting hairs over everything.\"", "title": "" }, { "docid": "beab52bb4c7e60ec7d8ba5666b415278", "text": "Now I have been trying to figure out how to split the money that we both earn. From what I can see there are several concepts but none of them really seems ideal to me. There is nothing fair or unfair in such arrangements. It is what you both agree. You can try and make this as scientific as possible. But then there is no golden rule. For example, your girlfriend makes 2200 now and due to child, she is making 1100. The child is both of your responsibility; so you need to compensate half of her salary loss. 550 and she takes the other half. If you hire a nanny to look after you kinds, it would say cost you 500. But your girlfriend is doing that job, so she should get additional 500 from common pot. Plus due to loss of few years in looking after the children, she has a lost opportunity in career growth. i.e. she may indefinitely make less money than she can... So one gets into all kinds of theories and analysis and any arrangements will have some or the other gaps. So my suggestion, don't get too scientific about it. Just talk it out as to what you both feel how this should be and arrive it. It is something every individual has to agree. It also make sense to have the large assets [or assets that matter], like house, car etc in clear title and who gets what in case you decide to separate. Other should be incidental.", "title": "" }, { "docid": "af738cb9cc41c09d0b1ad2e8d0738a76", "text": "I started this off as a comment to Joe's answer, but it got rather messy in that form so I'll just post it as a separate answer instead. I suggest that you read Joe's answer first. I believe you are overthinking this. First, you really should be discussing the matter with your girlfriend. We can provide suggestions, but only the two of you can decide what feels right for the two of you. Strangers on the Internet can never have as complete a picture of your financial situations, your plans, and your personalities, as the two of you together. That said, here's a starting point that I would use as input to such a discussion: As you can see, a common theme to all of this is transparency and communication. There is a reason for this: a marriage without proper communication can never work out well in the long term. I don't know about Germany specifically, but disagreements about money tends to be a major reason in couples splitting up. By setting your lives up for transparency in money matters from the beginning, you significantly reduce the risk of this happening to you. Scott Hanselman discusses a very similar way of doing things, but phrases it differently, in Relationship Hacks: An Allowance System for Adults.", "title": "" }, { "docid": "0a6ec7acfcc016deaeedb5070d157e0a", "text": "I won't answer in a detailed manner because most people at this site like answers with certain bias' on these questions, like pool resources always relative to which partner is asking. If you follow the above advice, you are hoping things work out. Great! What if they don't? It will be very messy. Unlike most of my peers, I did NOT follow the above advice and had a very clean exit with both of us feeling very good (and no lawyers got involved either; win-win for both of us with all the money we saved). One assumption people make is the person with the lowest income has the strictest limits. This is not always true; I grew up in poverty, but have a very high income and detest financial waste. I can live on about €12,000 a year and even though my partner made a little less, my partner liked to spend. Counter intuitive, right? I was supposed to be the spender because I had a large income, but I wasn't. Also, think about an example with food - sharing expenses. Is it fair for one partner to split whey protein if one partner consumes it, but the other doesn't (answer: in my view, no)? My advice based on your questions: Balance the frugal vs. spendthrift mentality rather than income ratios. If you're both frugal, then focus on income ratios - but one may be more frugal than the other and the thought of spending €300 a month on housing is just insane to a person like me, whereas to most it's too little. Are you both exactly the same with this mentality - and be honest? Common costs that you both agree on can be easily split 50-50 and you can often benefit from economies of scale (like internet, cell phone). Both of us feel very strongly about being financially independent and if possible we both don't want to take money from each other. This is so healthy for a relationship. My partner and I split and we both still really love each other. We're headed in different directions, but we did not want to end bitterly. What you wrote is part of why we ended so well; we both were very independent financially. Kids are going to be a challenge because they come with expenses that partners don't always agree on. What do you and her think of childcare, for instance? You really want to know all this upfront; again a frugal vs. spendthrift mindset could cause some big tensions.", "title": "" }, { "docid": "ae7d658afa170215f375dc479c85bef3", "text": "\"I think you have succumbed to a category error. The rational course forward is to classify all property as either his, hers, or family's. Each contributes a portion of wages to the family. Each logs hours spent performing familial duties and is \"\"paid\"\" in virtual dollars into their family account at market rates for that service. At any point actual plus virtual dollars are summed to assess the value of the family and percentages are allocated to each party on this basis. Put this into a pre-nuptual agreement. At the time of the inevitable divorce you leave with yours, she leaves with hers, family's assets are divided as described, and division of children should be as King Solomon suggested. Or you could do what I did: Put all your property (and debts) into one pot. Make sure each partner can competently manage bookkeeping and investments. Accumulate a family net worth sufficient to divide in two and each have financial independence. (I'm working on this last step.)\"", "title": "" }, { "docid": "cd7b2260cf22b2b28ded192e30046001", "text": "\"I can only share with you my happened with my wife and I. First, and foremost, if you think you need to protect your assets for some reason then do so. Be open and honest about it. If we get a divorce, X stays with me, and Y stays with you. This seems silly, even when your doing it, but it's important. You can speak with a lawyer about this stuff as you need to, but get it in writing. Now I know this seems like planning for failure, but if you feel that foo is important to you, and you want to retain ownership of foo no mater what, then you have to do this step. It also works both ways. You can use, with some limitations, this to insulate your new family unit from your personal risks. For example, my business is mine. If we break up it stays mine. The income is shared, but the business is mine. This creates a barrier that if someone from 10 years ago sues my business, then my wife is protected from that. Keep in mind, different countries different rules. Next, and this is my advise. Give up on \"\"his and hers\"\" everything. It's just \"\"ours\"\". Together you make 5400€ decide how to spend 5400€ together. Pick your goals together. The pot is 5400€. End of line. It doesn't matter how much from one person or how much from another (unless your talking about mitigating losses from sick days or injuries or leave etc.). All that matters is that you make 5400€. Start your budgeting there. Next setup an equal allowance. That is money, set aside for non-sense reasons. I like to buy video games, my wife likes to buy books. This is not for vacation, or stuff together, but just little, tiny stuff you can do for your self, without asking \"\"permission\"\". The number should be small, and equal. Maybe 50€. Finally setup a budget. House Stuff 200€, Car stuff 400€. etc. etc. then it doesn't matter who bought the house stuff. You only have to coordinate so that you don't both buy house stuff. After some time (took us around 6 months) you will find out how this works and you can add on some rules. For example, I don't go to Best Buy alone. I will spend too much on \"\"house stuff\"\". My wife doesn't like to make the budget, so I handle that, then we go over it. Things like that.\"", "title": "" }, { "docid": "6719cd28cc9b851df3d1bdebb5deddb2", "text": "\"My own personal point of view. I earn about twice what my wife to be earns. We are planning on getting married next year. I ultimately do all the finances (basically because she hates that kind of thing) not because I'm in charge or whatever. To work out how we do this I wrote a spreadsheet: At the top it has my monthly pay in one column and her's in another. I add all our bills (against me initally). At the bottom I have a total of both of our \"\"spending money\"\". Spending money is wage - bills - savings I then move money out of my column into her column. My goal is that we pay all the bills and save a decent amount and have roughly the same amount to spend each month. So each persons spending money should be roughly equal. I then fine tune this as things change (if we get a pay rise we alter it, if a bill goes up or down we alter it) To manage this we have 4 accounts, a joint account to pay bills (both give a set amount to each mont), a savings acount (both give a set amount to each month) and our own accounts (where we get paid and where our spending money lives). Like everyone else says, this seems fair to me. I don't earn more, we both earn \"\"an amount\"\" and this should be split equally.\"", "title": "" }, { "docid": "896ecdc76adf361bedab88e8940f59a4", "text": "You currently have 5400€ between you and 2600€ expenses leaving you 2800€. You currently keep 1900€ and she keeps 900€ at the end of each month splitting 68/32. If you marry and have a child, your combined income will go down to 4900€ while your expenses will increase by 300€ to 2900€ leaving 2000€. You could continue to split 68/32 leaving you 1360€ and her 640€. If you use this split you will lose 540€ and she will lose 260€. That's a 28% loss for you and a 28% loss for her from your end of month take home. So far it sounds reasonably fair. What about the future? For each raise, the person getting the raise keeps 66% of their raises. If you get the majority of the raises, you keep the majority of the benefit, but both benefit from the increase. Any future increases in expenses can be split as negotiated based on who benefits from those increases. That's basically what you are doing now considering that adding a child will cost a lot of her time, not just your money.", "title": "" }, { "docid": "d41d8cd98f00b204e9800998ecf8427e", "text": "", "title": "" }, { "docid": "3f2c800c6d662e4c1f9c0dd469ed73e5", "text": "\"Some basic thoughts, mostly on fairness. I guess the answer doesn't really fit this site, it's more about ethics, but this fits the question which isn't really just about money either. So when both work the same amount, it seems appropriate that both get the same mount of money, doesn't it? That is, the scheme of (as already contained in your question and in some other answers) is fair by this logic. Pay attention to hidden money: for example the one who works more for money might automatically get a pension funded this way. This is hidden money which already goes to only one partner, so when dividing equally, you'll need to take that into account (or just include \"\"equal pensions for both\"\" in the family's needs directly).\"", "title": "" }, { "docid": "3230ced50890e9ff193c42bbecc20c96", "text": "This would be my suggestion: I would approach the problem thinking about the loss of monthly income you (as a couple) will be facing due to your wife's change to a part time job and divide that loss between the two of you. This means that if she goes from 2200 to 1100 monthly, you'd be losing 1100 per month. To share this loss, you could repay your wife your part of the loss (550) so both of you are 550 euro down. However, this 550 loss is a bigger burden for your wife than it is for you, so this amount could be adjusted to make up for this inequality. To make calculations simple and avoid developing a complicated model, you could give the 800 euro above your 3k to your wife for as long as she has to work part time.", "title": "" }, { "docid": "0db97a3b2b5ee2916d13af303468b91b", "text": "What equal percentage of both you and your girlfriend's income will cover the essential household expenses? Although we earned different amounts, both of us turned over half our income over to the household. Between us this percentage slice from each of our earnings neatly covered all the essentials. The amounts contributed were different, but the contributions where nonetheless equal. Beyond this the financial relationship was fast and loose.", "title": "" }, { "docid": "3d0b492d17450d5ab481897f478a4633", "text": "The bottom line is choosing the right partner. If your partner works as hard as you do, than everything should be split, irregardless of who makes more. Unfortunately, my bf, now by separated husband, borrowed money from me before we were married. I saw a lack of work ethic in him from the beginning, loved him anyway and married him but decided to keep my money separate as a result. This was a beginning with lack of trust and knowing I would be the higher earner, harder worker, and better provider. Down the road he won a lawsuit and got about $700k. I saw about $25k of this money to pay bills created with the intention of him paying them off when he got the money, and because he pilfered it away, we lost our house and it ended in my leaving.... I'm still doing ok because I work hard for what I have. He is struggling. We were never on the same page, never discussed finances because of his lack of work ethic and my mistrust of how he would decide how the money would be used. Sadly, who you decide to be your partner is the most important decision here...It should be based on mutual respect, both working hard to achieve a common goal, and communicating the budget every year, perhaps even each month.... I'm the terrible example.", "title": "" }, { "docid": "221ff78be259c4c339509545a80f78b4", "text": "\"I think the problem is that you've made a math error. This child would not be costing you 300 per month, it will be costing you 1400 per month. 1100 of this is in a donation of salable hours rather than cash, but helpfully you have a number right there as to how much someone is willing to pay for these hours so the math is still doable. So, if you are indeed splitting your expenses fifty-fifty, you should chip 1100 into the pot to match your wife's contribution. It would make the most sense, I think, to have your part of this contribution cover some of your mutual expenses, and if any is left over, save it up for the day that your child would cost more than that 300 in a month - when you need extra clothes, or have to replace something they destroyed, or want to pay for extra opportunities (camps, educational games, lessons), or a a savings that can be used for major future expenses (higher education, first car, milestone celebrations, safety net when starting out). Of course, if your family is indeed a priority, you might consider making an equal investment in your family - say, half your income (1800) to match half her time going into the building of the family. After all, the decision to start a family should be an investment of time and value, not just a minimum bid for expenses. And again, any extra can be spent on mutual expenses, saved up for future costs, or left as your child's \"\"savings\"\" for major expenses or safety net. I suppose I should mention that you perhaps could get away with covering half her contribution (550 per month, on the face of it), as that should also \"\"balance\"\" out the monthly expenses. Even this much would be enough to put her back into the green on her covering her own costs. Of course, in this case you might want to take into account that while she's working 38,5 hours per week now, running a household is, I've heard, more closely equivalent to a 60-hour week, plus or minus being \"\"on call\"\" for a further 100 hours a week. Trying to calculate the absolute minimum payment on your part to match the investment of hours on hers is likely to be a bit more tricky than just matching the salable hours not worked, if you're set on income ratios and splitting costs \"\"as they are\"\". Also, you might want to rethink your criteria for sharing income completely or what makes certain divisions of costs \"\"unfair\"\". You mention one reason it would be unfair is that you have a \"\"more stressful job\"\" - well, your job may well be more stressful than her job now, but it is likely to be less so than raising a child (her new job). As for investment of time and energy for your education entitling you to a larger amount of pay, again, raising a child is likely to be a larger investment of time, money, and anxiety than your education, but her pay (or even share of the costs) doesn't seem to be balanced in response. I'm not gonna tell you what is fair, that's for you to work out, just suggesting you really think it through before deciding what would be fair or not.\"", "title": "" } ]
[ { "docid": "af0b1df1287ed9403409abff8d5d9e1c", "text": "Wow! First, congratulations! You are both making great money. You should be able to reach your goals. Are we on the right track ? Are we doing any mistakes which we could have avoided ? Please advice if there is something that we should focus more into ! I would prioritize as follows: Get on the same page. My first red flag is that you are listing your assets separately. You and your wife own property together and are raising your daughter together. The first thing is to both be on the same page with your combined income and assets. This is critical. Set specific goals for the future. Dreaming and big-picture life planning will be the foundation for building a detailed plan for reaching your goals. You will see more progress with more sacrifice. If you both are not equally excited about the goals, you will not both be equally willing to sacrifice lifestyle now. You have the income now to be able to set yourselves up to do whatever you want in 10 years, if you can agree on what you want. Hire a financial planner you trust. Interview people, ask someone who is where you want to be in 10 years. You need someone with experience that can guide you through these questions and understands how to manage your income stream. Start saving for retirement in tax-advantaged accounts. This should be as much as 10%-15% of your income combined, so $30k-$45k per year. You need to start diversifying your investments. Real estate is great, but I would never recommend it as this large a percentage of net worth. Start saving for your child's education. Hard to say what you need here, since I don't know your goals. A financial planner should assist you with this. Get rid of your debt. Out of your $2.1M of rental real estate and land, you have $1.4M of debt. It will be difficult to start a business with that much additional debt. It will also put stress on your retirement that you don't need. You are taking on lots of risk here. I would sell all but maybe one of the properties and let it cash flow. This will free up cash to start investing for retirement or future business too. Buy more rental in the future with cash only. You have plenty of income to do it this way, and you will be setting yourself up for a great future. At this point you can continue to pile funds into any/all your investments, with the goal of using the funds to start a business or to live on. If all your investments are tied up in real estate, you wont have anything to draw on if needed for a business opportunity. You need to weigh this out in your goal and planning. What should we do to prepare for a comfortable retirement and safety You cannot plan for or see all scenarios. However, good planning will give you more options and more choices. Investing driven by fear will set you up for failure. Spend less than you make. Be patient. Be generous. Cheers!", "title": "" }, { "docid": "0f4799662e6609d40e0197bf2d5d1714", "text": "Other than the two answers (both of which recommend waiting until marriage to actually combine finances, and which I agree with), there's the general question: how does a couple choose to manage finances? In our marriage, it's me. I'm more numbers-minded than my spousal-unit. I'm also more a sticker for time. I work and spousal-unit does not. We had some good friends -- upon marriage, spouse1 felt like he should take on the role. He went on a several-week trip (leaving spouse2 at home), and upon returning home asked spouse2 about the late fees. Spouse2 was appalled. Spouse2 ended up keeping the job of managing household finances. There's enough pieces to the puzzle that it can be divided any way you choose -- any way that works for you and your spouse/virtual-spouse. One other point: talk about how to manage your money, before you marry. Dave Ramsey recommends a strict monthly budget. I like listening to Dave Ramsey, but we've never had a budget. Instead, we agreed during marriage counseling two things:", "title": "" }, { "docid": "9021ee044ffe953dad127d98ff65fa9e", "text": "\"I don't think it would be counted as income, and if it's a short-term loan it doesn't really matter as the notional interest on the loan would be negligible. But you can avoid any possible complications by just having two accounts in the name of the person trying to get the account benefits, particularly if you're willing to just provide the \"\"seed\"\" money to get the loop started.\"", "title": "" }, { "docid": "e1803daa7f5119c4709425e1429bd533", "text": "\"My wife and I use to file \"\"married file separately\"\". I consulted a tax accountant and it does not matter who's name the accounts are under. The interest from the accounts can be counted as income on either person's tax return regardless of whose name is on the account. You can even split the interest income between the returns if that is advantageous. This is true for any income earned between the two of you. It use to be a big hassle to file this way even using the software programs. The programs would not attempt to allocate the income between the tax returns in order to minimize my tax liability. I had to do this manually. Most of the loopholes have been closed and the last couple of years I've filed \"\"married filed jointly\"\". I'm not sure how your wife's citizenship status affects any of this.\"", "title": "" }, { "docid": "165838891ff5bef8d05ebdadfb44004b", "text": "has very little idea about how much we earn and how high up we are in terms of income percentile. The first part of this sentence is tough to understand. My daughter was 12 when she told us what she estimated our income to be. She looked up the price of our home, worked backwards using conservative numbers, and was pretty close. Here you are saying your wife doesn't know the family income? Percentiles are meaningless. There are $60k couples who donate 10%, and there are $300k earners who are not charitable at all, and don't even save. It's time to have a general budget conversation with her. Perhaps starting with the rate of savings, and show how there's room for charity. If your charitable desire is based on a religious compulsion, share that as well, the 10% is what many feel commanded to share by their maker, and feel that it comes off the top regardless of their income level. In reality, this issue is not financial, it's about open dialog between 2 people. Money is difficult for some to discuss, but you need to start somewhere.", "title": "" }, { "docid": "4a914636434e452ac8d108f7450b5140", "text": "I can't quite follow your question, so I'm proceeding under the following assumptions: - You paid £31,000 - Your partner paid £4,242 - You have at least one mortgage, which you both pay equally. If the relationship terminates, sell the property. You are reimbursed £31,000 and your partner is reimbursed £4,242. Any remaining proceeds from the sale are split 50-50. If the result is a net loss (i.e. you are underwater on your mortgage), you split the debt 50-50. If you are not both paying the same toward the mortgage, I'd split the profit or loss according to how much you each pay toward the mortgage. Of course, this is not the only possible way you can split things up. You can use pretty much any way you both think is fair. For example, maybe you should get more benefits from a profit because you contributed more up-front. The key thing, though, is that you must both agree in writing, in advance. This is reasonable; this is what I did, for example. Note that if the relationship ends, one or the other of you may wish to keep the property. I'd suggest including a clause in your written agreement simply disallowing this; specify criteria to force a sale. But I know lots of people are happy to allow this. They treat that situation as a forced sale from both people to one person. For example, if your partner chooses to stay in the house, he or she must buy the property from you at prevailing market rates.", "title": "" }, { "docid": "305299bd0445f70b928a386809b620c3", "text": "\"(Yes, I know this is a seven year old question.) Does this only apply to debts that were taken on during marriage Yes or to all debts of both partners? No. The important thing to remember is that it's both debts and assets acquired during the marriage which are shared. This comes from the reality that men in the olden times were the ones in business, accumulating wealth, etc while the woman \"\"made the home\"\". The working assumption was that the woman who made the home was an equal partner with the man, since he benefited from a good home, and she benefited from his income. The fact that pre-marriage debts and assets were not community property also protected the woman, because she was able to then take back her dowry and use that to support herself. (N.B. - I live in a CP state.)\"", "title": "" }, { "docid": "7af6de2300ef6bb4adbd025f53c0dfad", "text": "\"Do you have other income that you are not considering? Interest and dividends would be an example, but there are all sorts of options. Also with your witholding is it set up such that your employers have any idea of your tax bracket ultimately based on your combined incomes? Usually what they do is take out money assuming you will be in the tax bracket of any given paycheck spread out over the course of a year. For example, for federal I had an option to select (in an online form that fills out my W4 for me) \"\"married: withold at higher single rate\"\" and did to try and cover this fact. Eventually I may end up having to calculate my own witholding to fix a too-low problem like yours.\"", "title": "" }, { "docid": "5c7179b41c1d08a2b507c2bc0e6835a8", "text": "\"If my wife and I tried this, we'd call it grounds for divorce. However, I think most long term couples actually do this, and it is just a budget. It is common practice for two spouses to deposit money into a single checking account. All of the household expenses are then paid from that single account. Same as you describe: if I spend money from the joint checking that is less money available to my wife. Based on your dollar amount, I'd have to say great work on thinking about saving early on in life. I think though, if you are actually starting out, getting into the habit of saving a \"\"dime of every dollar\"\" would be more beneficial. At some point your income will increase, and when it does so should your savings. By \"\"paying yourself first\"\" your savings will keep pace with your spending and you will be a happier person when you income starts to fall again.\"", "title": "" }, { "docid": "9d39c6456e750dfb85f62ca446ac5b05", "text": "\"If you have a huge disparity in incomes, \"\"maybe\"\". If you make roughly in the same ballpark, **Noooooo!** The ability to file separately and have one partner (the higher earner) itemize and claim all the home-related deductions while the other takes the standard deduction is one of the greatest (middle-class) loopholes in modern tax law. When married, even if filing separately, you have to both itemize or both take the standard deduction. You just need to take care that the person itemizing has provably contributed *at least* the amount they claim toward the house. So have one of you write the checks for the mortgage and property tax, and the other pay for everything else, and it'll probably come out roughly even over time. Going back to my first line, the US tax code seems to be designed around the stereotypical Donna Reed 1950s household, with a single earner. The closer you are to equal, the bigger the marriage tax **penalty** gets.\"", "title": "" }, { "docid": "588e4dad1483f699baa40a4ac1131474", "text": "It depends on where you live and how you can think out of the box on earning little extra income on the side. If you live in North America and based on the needs in your city, you can try out these ideas. Here is what one of my friend has done, The family has two kids and the wife started a home day care as she was already taking care of two kids anyways. Of course, she had to be qualified and she took the relevant child care classes and got certified, which took six months. And she is managing 4 kids in addition to her two kids bringing in at least 2000$ per month in addition. And my friend started a part time property management business on the side, with one client. For example there is always work on real estate whether its going up or going down. You have to be involved locally to increase your knowledge on real estate. You can be a property manager for local real estate investors. If its going down, you can get involved in helping people sell and buy real estate. Be a connector, bring the buyers and sellers together.", "title": "" }, { "docid": "5d5e4e1d4f9c4dd063b662a9cce9501c", "text": "\"If you ask ten different couples what they do, depending on a variety of factors, you'll get anywhere between two and ten different answers. One personal finance blogger that I read swears by the fact that he and his wife keep their finances totally separate. His wife has her own retirement account, he has his. His wife has her own checking and savings, he has his. They pay fifty-fifty for expenses and each buy their own \"\"toys\"\" from their own accounts. He views this as valuable for allowing them to have their own personal finance styles, as his wife is a very conservative investor and he is more generous. My spouse and I have mostly combined finances, and view all of our money as joint (even though there are a smattering of accounts between us with just one name on them as holdovers from before we were married). Almost all of our purchasing decisions except regular groceries are joint. I couldn't imagine it any other way. It leaves us both comfortable with our financial situation and forces us to be on the same page with regards to our lifestyle decisions. There's also the ideological view that since we believe marriage united us, we try to live that out. That's just us, though. We don't want to force it on others. Some couples find a balance between joint accounts and his and her fun money stashes. You might find yet another arrangement that works for you, such as the one you already described. What's going to be important is that you realize that all couples have the same six basic arguments, finances being one of them. The trick is in how you disagree. If you can respectfully and thoughtfully discuss your finances together to find the way that has the least friction for you, you're doing well. Some amount of friction is not just normal, it's almost guaranteed.\"", "title": "" }, { "docid": "4a478fa0ea54f8f2d9ad677ee7525e5a", "text": "hmmm. I think it's because in both cases, you must pay for it up front, before the positions are closed out. You own nothing except the right to buy the stock re: the call, and the obligation to buy the stock re: the short. You buy a call, but must borrow the stock, for which you must put some margin collateral and there is a cost to borrow. You pay for that, of course. I wouldn't call it lending though.", "title": "" }, { "docid": "022e5bdbc1a6959fb1bafc31923db57d", "text": "If they're making 100k a month in sales, why do they need your 92k so badly that they're willing to pay 200% annual interest? Going to a loanshark or the mob would be cheaper, to say nothing of all the legal options available to them. Or they could just wait three weeks for revenue to cover it. Nothing about this adds up to anything other than a scam. Your friend might be well-meaning, but someone along the line is looking for a sucker.", "title": "" } ]
fiqa
e0fdb4576340c61fd2243222450ca300
Opening American credit cards while residing in the UK
[ { "docid": "5f538cd43a7ff14b53efc78cd59ccfcd", "text": "To build a US credit record, you need a Social Security Number (SSN), which is now not available for most non-residents. An alternative is an ITIN number, which is now available to non-residents only if they have US income giving a reason to file a US tax return (do you really want to get into all that...). Assuming you did have a reason to get a ITIN (one reason would be if you sold some ebooks via Amazon US, and need a withholding refund under the tax treaty), then recent reports on Flyertalk give mixed results on whether it's possible to get a credit card with an ITIN, and whether that would build a credit record. It does sound possible in some cases. A credit record in any other country would not help. You would certainly need a US address, and banks are increasingly asking for a physical address, rather than just a mailbox. Regardless, building this history would be of limited benefit to you if you later became a US resident, at that point you would be eligible for a new SSN (different from the ITIN) and have to largely start again. If getting a card is the aim, rather than the credit record, you may find some banks that will offer a secured card (or a debit card), to non-residents, especially in areas with lots of Canadian visitors (border, Florida, Arizona). You'd find it a lot easier with a US address though, and you'd need to shop around a lot of banks in person until you find one with the right rules. Most will simply avoid anyone without an SSN.", "title": "" }, { "docid": "1bbc34e4d32a5731d1a209476eba084e", "text": "Go to the states on vacation. Get a virtual (or friend's) address. Get an ITIN from the IRS. Open a bank account. Get a secured credit card on your next trip from Capital One – add as much money as you can afford. One year later, you should have a decent credit score.", "title": "" }, { "docid": "d41d8cd98f00b204e9800998ecf8427e", "text": "", "title": "" } ]
[ { "docid": "a4b393fda55da0832a9f58305f6f2f14", "text": "A more updated answer: USAA is an American bank offering chip and pin credit cards to US customers. USAA membership is restricted to military service members and their relatives, but according to this Los Angeles Times article, you do not need to be a USAA member to get a USAA chip and pin credit card. I'm a USAA member and can testify that my USAA chip and pin MasterCard worked in Europe, so assuming nonmembers get the same kind of card, it will work. However, it's worth noting that for it to work, the place still has to accept MasterCard, which seems somewhat less common in Europe than in the USA. (In Germany in particular, I was rather baffled to find that many places only accept some other European bank cards but not MasterCard/VISA.)", "title": "" }, { "docid": "1c4fbe995683ced388b654d3665d4314", "text": "Yes you can. I'm a foreigner who uses a tourist visa to enter America and Bank of America opened a checking account for me. I had to go into the branch with my passport and a driving license and it was opened with $100. You do need to give a US address so statements can be sent out but that's about it.", "title": "" }, { "docid": "b2806f52999b4b105d7c10eb3835b65e", "text": "The original poster indicates that he lives in the UK, but there are likely strong similarities with the US banking system that I am more familiar with: The result is that you are likely going to be unable to be approved for 10 checking accounts opened in rapid succession, at least in the US. Finally, in the US, there is no need to have checking accounts with a bank in order to open a credit card with them (although sometimes it can help if you have a low credit score).", "title": "" }, { "docid": "a7b363cdad4a083eaa1df0cc545c2294", "text": "While in London for a month about a year ago, I had similar issues. I ended up getting a prepaid chip-and-pin card that was filled with cash. I don't remember the retailer that sold me this, but I figure it'll give you something to start your search.", "title": "" }, { "docid": "ff658878eb559cffbb618b78cfe1ff60", "text": "http://www.andrewsfcu.org/ is one of the only US financial institutions to issue a low or no annual fee chip and pin visa or mastercard.. Andrews is primarily for civilian employees of the Andrews Air Force Base but is available to members of the American Consumer Council, which offers free membership, see http://www.andrewsfcu.org/page.php?page=330 . The chip and pin card is a visa with $0 annual fee and charges a 1% foreign transaction fee. Getting one is modestly difficult because you have to first join the credit union then apply for the card, then go through underwriting as if it were a personal loan rather than a revolving credit account. Still, for travelers, it is probably worth it.", "title": "" }, { "docid": "791b9c92810949d5143fb8de3b0426a3", "text": "I am a US citizen by birth only. I left the US aged 6 weeks old and have never lived there. I am also a UK citizen but TD Waterhouse have just followed their policy and asked me to close my account under FATCA. It is a complete nightmare for dual nationals who have little or no US connection. IG.com seem to allow me to transfer my holdings so long as I steer clear of US investments. Furious with the US and would love to renounce citizenship but will have to pay $2500 or thereabouts to follow the US process. So much for Land of the Free!", "title": "" }, { "docid": "cfdd43e6bb109477b2927f5a78aa9c38", "text": "\"The following is based on my Experian credit scoring feedback and experience here in the UK over many years. (And for further information I currently hold a credit score of 999, the highest possible, with 6 credit cards.) Now I'm assuming that while there may be some differences in particulars in your case due to the difference in locality nevertheless the below should hopefully provide some broad guidelines and reasonable conclusion in your situation: Having a large number of active credit accounts may be seen as a negative. However having a large number of settled accounts should on the contrary have a positive effect on your score. As you keep your accounts mostly settled, I think having another card will not be to your detriment and should in time be beneficial. A large total credit balance outstanding may count against you. (But see the next point.) Having your total outstanding debt on all credit accounts be a smaller proportion of your total available credit, counts in your favour. This means having more cards for the same amount of credit in use, is net-net in your favour. It also has the effect of making even larger outstanding credit balances (as in point 2) to be a lower percentage of your total available credit, and consequently will indicate lower risk to lenders. It appears from my experience the higher the highest credit limit on a single card you are issued (and are managing responsibly e.g. either paid off or used responsibly) the better. Needless to say, any late payments count against you. The best thing to do then is to set up a direct debit for the minimum amount to be paid like clockwork every month. Lenders really like consistent payers. :) New credit accounts initially will count against you for a while. But as the accounts age and are managed responsibly or settled they will eventually count in your favour and increase your score. Making many credit applications in a short space of time may count against you as you may be seen to be credit reliant. Conclusion: On balance I would say get the other card. Your credit score might be slightly lower for a couple of months but eventually it will be to your benefit as per the above. Having another card also means more flexibility and more more options if you do end up with a credit balance that you want to finance and pay off over a period as cheaply as possible. In the UK the credit card companies are falling over themselves trying to offer one \"\"interest free\"\" or 0% \"\"balance transfer\"\" offers. Of course they're not truly 0% since you typically have to pay a \"\"transfer fee\"\" of a couple of percent. Still, this can be quite cheap credit, much much cheaper than the headline APR rates actually associated with the cards. The catch is that any additional spending on such cards are paid off first (and attract interest at the normal rate until paid off). Usually also if you miss a payment the interest rate reverts to the normal rate. But these pitfalls are easily avoided (pay by direct debit and don't use card you've got a special deal on for day to day expenses.) So, having more cards available is then very useful because you then have choice. You can roll expensive debts to the cheapest lender at your disposal for as long as they'll offer, and then simply not use that card for any purchases (while paying off the balance as cheaply as possible), meanwhile using another card for day to day expenses.\"", "title": "" }, { "docid": "0383a3d4efc2433af856ac82cdaa3e04", "text": "\"Do you guys know any options that are accessible to any global citizen? Prepaid and stored value cards are anonymous. For an arbitrary reason, the really anonymous ones only allow you to load $500 but there is no regulation that dictates this amount. In the USA, these cards are exempt from being declared at border crossings. Not because they look like credit cards, but because they are exempt by the US Treasury and Customs. The cons is that there are generally fees to use them. US DOJ has done research showing that some groups take advantage of the exemption moving upwards of $50,000 a day between borders, but Congress is fine with this exemption and the burden is always on the government to determine \"\"illicit origin\"\". Stigmatizing how money is moved is only a 30 year old phenomenon, but many free nations do not really have capital controls, they only care that you pay taxes and that the integrity of their stock markets are upheld. Aside from that there are no qualms about anonymity, except from your neighbors but they dont matter for a global citizen. In theory, the UK should have more flexibility in anonymity options, such as stored value cards with higher limits.\"", "title": "" }, { "docid": "a86781b481e27f434338b7e0bd423ee6", "text": "Update, 2013: this product is no longer available. As of December 1, 2010, Travelex announced a product, the Travelex Cash Passport, which is chip-and-pin protected. You can buy it in the US and then load it up with either Euros or British Pounds. There are a few things to know about this: Right now, it is not available online at the Travelex website. You must purchase it in person at participating Travelex retail locations. I bought mine right downstairs from the Stack Overflow world headquarters! The fees that Travelex charges for foreign currency transactions will take your breath away. I purchased a £300 card for $547.15, which comes out to a 15% service charge. Travelex will give you better rates if you purchase larger amounts. There is a further 3% fee if you use a credit card (I used a debit card to avoid this). Think long and hard about whether to load it with Pounds or Euros. They charged me 5.5% above the interbank exchange rate to spend my Pound card in Euros. You get two cards, which is very convenient. You can refill the card on the web. Due to the high fees, the Chip and PIN Cash Passport is not a good idea for everyday transactions, for getting cash from an ATM, and certainly not for paying for big-ticket items like hotels. You're going to want to reserve it for purchasing things from those automated kiosks in Europe (especially gas stations, ticket machines in train stations, and toll booths) that will not work with a standard magnetic stripe card. The card worked perfectly buying tickets on the tube in London. I haven't had a chance to check it out in other countries.", "title": "" }, { "docid": "e651432466f0d37eb0787dcba0048ec2", "text": "There is (at least) one service that allows you to convert USD, GBP and EUR at the interbank spot rate, and make purchases using a prepaid MasterCard in many more currencies (also at the interbank rate). They currently don't charge any fees (as of September 2015). You could use your US prepaid card to fund your account with Revolut and then spend them in your local currency (HRK?) without fees (you can check the current USD/HRK rate with their currency calculator); you can also withdraw to non-EUR SEPA-enabled bank accounts, but then your bank would charge you for the necessary currency conversion (both by fees and their exchange rate). If you have a bank account in EUR, you could alternatively convert your USD balance to EUR and then withdraw that to your EUR bank account. If your US prepaid card has a corresponding bank account which can be used for ACH direct debit or domestic wire transfers (ask the issuer if you are unsure), TransferWise or a similar service might also be an option; they allow you to fund a transaction using one of those methods and then credit an account in", "title": "" }, { "docid": "ee44afaaeb77f2fed647ae241e8bd562", "text": "I suggest opening a Credit Card that doesn't charge Foreign currency conversion fees. Here is the list of cards without such a fee, Bankrate's Foreign transaction fee credit card chart", "title": "" }, { "docid": "2722f69315341259b6dfc8053db89d61", "text": "Normal high street accounts certainly are available to non-residents. I have several, and I haven't been resident in the UK for fourteen years. However you do need to open them before you leave. They need identification. Once you have one open, the same bank should be able to open other accounts by mail. The disadvantage of course is that you will pay tax on your earnings, and while you can claim it back that's an unnecessary piece of work if you don't have other UK earnings. I would take the risk of an offshore account, assuming it's with a big reputable bank - the kind that are going to be bailed out if there is another collapse. An alternative might be a fixed term deposit. You lock up your money for three years, and you get it back plus a single interest payment at the end of three years. You would pay nothing in tax while you were gone, but the whole interest amount would be taxable when you got back.", "title": "" }, { "docid": "39fff282d8a6b1147373b7cb8be6d103", "text": "MoneysavingExpert has a regularly updated page about the best cards to use outside the UK. At the moment Halifax has a good credit card but you will pay interest on the cash withdrawal. I have a FairFX pre-paid card but that requires a UK address for the card delivery (at least) and can be topped up online from a UK bank account.", "title": "" }, { "docid": "a96857cf8f4229f9687b18538caa3dcc", "text": "\"Are most big US based financial institutions and banks in such a close relationship with USCIS (United States Citizenship And Immigration Services) so they can easily request the information about market traders? Yes. They must be in order to enforce the laws required by the sanctions. What online broker would you suggest that probably won't focus on that dual citizenship matter? \"\"Dual\"\" citizenship isn't actually relevant here. Nearly anyone in the world can invest in US banks except for those few countries that the US has imposed sanctions against. Since you are a citizen of one of those countries, you are ineligible to participate. The fact that you are also a US citizen isn't relevant in this case. I believe the reasoning behind this is that the US doesn't encourage dual citizenship: The U.S. Government does not encourage dual nationality. While recognizing the existence of dual nationality and permitting Americans to have other nationalities, the U.S. Government also recognizes the problems which it may cause. Claims of other countries upon U.S. dual-nationals often place them in situations where their obligations to one country are in conflict with the laws of the other. In addition, their dual nationality may hamper efforts of the U.S. Government to provide consular protection to them when they are abroad, especially when they are in the country of their second nationality. If I had to guess, I'd say the thinking there is that if you (and enough other people that are citizens of that country) want to participate in something in the US that sanctions forbid, you (collectively) could try to persuade that country's government to change its actions so that the sanctions are lifted. Alternatively, you could renounce your citizenship in the other country. Either of those actions would help further the cause that the US perceives to be correct. What it basically boils down to is that even though you are a US citizen, your rights can be limited due to having another citizenship in a country that is not favorable in the current political climate. Thus there are pros and cons to having dual citizenship.\"", "title": "" }, { "docid": "cb85de0b7686d07f00729fa1f49c9002", "text": "The U.S. bankruptcy laws no longer make it simple to discharge credit card debt, so you can't simply run up a massive tab on credit cards and then just walk away from them anymore. That used to be the case, but that particular loophole no longer exists the way it once did. Further, you could face fraud charges if it can be proven you acted deliberately with the intent to commit fraud. Finally, you won't be able to rack up a ton of new cards as quickly as you might think, so your ability to amass enough to make your plan worth the risk is not as great as you seem to believe. As a closing note, don't do it. All you do is make it more expensive for the rest of us to carry credit cards. After all, the banks aren't going to eat the losses. They'll just pass them along in the form of higher fees and rates to the rest of us.", "title": "" } ]
fiqa
e7da2b96de09da3760a72df8e3b3e62b
What should I be aware of as a young investor?
[ { "docid": "74d7ad4cb9f02118401ae5f419d3de31", "text": "\"I'm 39 and have been investing since my very early 20's, and the advice I'd like to go back and give myself is the following: 1) Time is your friend. Compounding interest is a powerful force and is probably the most important factor to how much money you are going to wind up with in the end. Save as much as you possibly can as early as you can. You have to run twice as hard to catch up if you start late, and you will still probably wind up with less in the end for the extra effort. 2) Don't invest 100% of your investment money It always bugged me to let my cash sit idle in an investment account because the niggling notion of inflation eating up my money and I felt I was wasting opportunity cost by not being fully invested in something. However, not having enough investable cash around to buy into the fire-sale dips in the market made me miss out on opportunities. 3) Diversify The dot.com bubble taught me this in a big, hairy painful way. I had this idea that as a technologist I really understood the tech bubble and fearlessly over-invested in Tech stocks. I just knew that I was on top of things as an \"\"industry insider\"\" and would know when to jump. Yeah. That didn't work out so well. I lost more than 6 figures, at least on paper. Diversification will attenuate the ups and downs somewhat and make the market a lot less scary in the long run. 4) Mind your expenses It took me years of paying huge full-service broker fees to realize that those clowns don't seem to do any better than anyone else at picking stocks. Even when they do, the transaction costs are a lead weight on your returns. The same holds true for mutual funds/ETFs. Shop for low expense ratios aggressively. It is really hard for a fund manager to consistently beat the indexes especially when you burden the returns with expense ratios that skim an extra 1% or so off the top. The expense ratio/broker fees are among the very few things that you can predict reliably when it comes to investments, take advantage of this knowledge. 5) Have an exit strategy for every investment People are emotional creatures. It is hard to be logical when you have skin in the game and most people aren't disciplined enough to just admit when they have a loser and bail out while they are in the red or conversely admit when they have a winner and take profits before the party is over. It helps to counteract this instinct to have an exit strategy for each investment you buy. That is, you will get out if it drops by x% or grows by y%. In fact, it is probably a good idea to just enter those sell limit orders right after you buy the investment so you don't have to convince yourself to press the eject button in the heat of a big move in the price of that investment. Don't try to predict tops or bottoms. They are extremely hard to guess and things often turn so fast that you can't act on them in time anyway. Get out of an investment when it has met your goal or is going to far in the wrong direction. If you find yourself saying \"\"It has to come back eventually\"\", slap yourself. When you are trying to decide whether to stay in the investment or bail, the most important question is \"\"If I had the current cash value of the stock instead of shares, would I buy it today?\"\" because essentially that is what you are doing when you stick with an investment. 6) Don't invest in fads When you are investing you become acutely sensitive to everyone's opinions on what investment is hot and what is not. If everyone is talking about a particular investment, avoid it. The more enthusiastic people are about it (even experts) the MORE you should avoid it. When everyone starts forming investment clubs at work and the stock market seems to be the preferred topic of conversation at every party you go to. Get out! I'm a big fan of contrarian investing. Take profits when it feels like all the momentum is going into the market, and buy in when everyone seems to be running for the doors.\"", "title": "" }, { "docid": "c9f41d52e6980a7520c2282902d04056", "text": "Disclaimer - I am 51. Not sure how that happened, because I remember being in my late teens like it was yesterday. I've learned that picking individual stocks is tough. Very tough. For every Apple, there are dozens that go sideways for years or go under. You don't mention how much you have to invest, but I suggest (A) if you have any income at all, open a Roth IRA. You are probably in the zero or 10% bracket, and now is the time to do this. Then, invest in ETFs or Index Mutual Funds. If one can get S&P minus .05% over their investing life, they will beat most investors.", "title": "" }, { "docid": "167e7ba61ac8b036dc0a477a9e81d0df", "text": "Don't start by investing in a few individual companies. This is risky. Want an example? I'm thinking of a big company, say $120 billion or so, a household name, and good consistent dividends to boot. They were doing fairly well, and were generally busy trying to convince people that they were looking to the future with new environmentally friendly technologies. Then... they went and spilled a bunch of oil into the Gulf of Mexico. Yes, it wasn't a pretty picture if BP was one of five companies in your portfolio that day. Things would look a lot better if they were one of 500 or 5000 companies, though. So. First, aim for diversification via mutual funds or ETFs. (I personally think you should probably start with the mutual funds: you avoid trading fees, for one thing. It's also easier to fit medium-sized dollar amounts into funds than into ETFs, even if you do get fee-free ETF trading. ETFs can get you better expense ratios, but the less money you have invested the less important that is.) Once you have a decent-sized portfolio - tens of thousands of dollars or so - then you can begin to consider holding stocks of individual companies. Take note of fees, including trading fees / commissions. If you buy $2000 worth of stock and pay a $20 commission you're already down 1%. If you're holding a mutual fund or ETF, look at the expense ratio. The annualized real return on the stock market is about 4%. (A real return is after adjusting for inflation.) If your fee is 1%, that's about a quarter of your earnings, which is huge. And while it's easy for a mutual fund to outperform the market by 1% from time to time, it's really really hard to do it consistently. Once you're looking at individual companies, you should do a lot of obnoxious boring stupid research and don't just buy the stock on the strength of its brand name. You'll be interested in a couple of metrics. The main one is probably the P/E ratio (price/earnings). If you take the inverse of this, you'll get the rate at which your investment is making you money (e.g. a P/E of 20 is 5%, a P/E of 10 is 10%). All else being equal, a lower P/E is a good thing: it means that you're buying the company's income really cheap. However, all else is seldom equal: if a stock is going for really cheap, it's usually because investors don't think that it's got much of a future. Earnings are not always consistent. There are a lot of other measures, like beta (correlation to the market overall: riskier volatile stocks have higher numbers), gross margins, price to unleveraged free cash flow, and stuff like that. Again, do the boring research, otherwise you're just playing games with your money.", "title": "" }, { "docid": "3baa242993cb5b6cc6ab13e6fa977495", "text": "Consistently beating the market by picking stocks is hard. Professional fund managers can't really do it -- and they get paid big bucks to try! You can spend a lot of time researching and picking stocks, and you may find that you do a decent job. I found that, given the amount of money I had invested, even if I beat the market by a couple of points, I could earn more money by picking up some moonlighting gigs instead of spending all that time researching stocks. And I knew the odds were against me beating the market very often. Different people will tell you that they have a sure-fire strategy that gets returns. The thing I wonder is: why are you selling the information to me rather than simply making money by executing on your strategy? If they're promising to beat the market by selling you their strategy, they've probably figured out that they're better off selling subscriptions than putting their own capital on the line. I've found that it is easier to follow an asset allocation strategy. I have a target allocation that gives me fairly broad diversification. Nearly all of it is in ETFs. I rebalance a couple times a year if something is too far off the target. I check my portfolio when I get my quarterly statements. Lastly, I have to echo JohnFx's statement about keeping some of your portfolio in cash. I was almost fully invested going into early 2001 and wished I had more cash to invest when everything tanked -- lesson learned. In early 2003 when the DJIA dropped to around 8000 and everybody I talked to was saying how they had sold off chunks of their 401k in a panic and were staying out of stocks, I was able to push some of my uninvested cash into the market and gained ~25% in about a year. I try to avoid market timing, but when there's obvious panic or euphoria I might under- or over-allocate my cash position, respectively.", "title": "" }, { "docid": "03bd51af0037dd95496e5d212684437d", "text": "\"You are your own worst enemy when it comes to investing. You might think that you can handle a lot of risk but when the market plummets you don't know exactly how you'll react. Many people panic and sell at the worst possible time, and that kills their returns. Will that be you? It's impossible to tell until it happens. Don't just invest in stocks. Put some of your money in bonds. For example TIPS, which are inflation adjusted treasury bonds (very safe, and the return is tied to the rate of inflation). That way, when the stock market falls, you'll have a back-stop and you'll be less likely to sell at the wrong time. A 50/50 stock/bond mix is probably reasonable. Some recommend your age in bonds, which for you means 20% or so. Personally I think 50/50 is better even at your young age. Invest in broad market indexes, such as the S&P 500. Steer clear of individual stocks except for maybe 5-10% of your total. Individual stocks carry the risk of going out of business, such as Enron. Follow Warren Buffet's two rules of investing: a) Don't lose money b) See rule a). Ignore the \"\"investment porn\"\" that is all around you in the form of TV shows and ads. Don't chase hot companies, sectors or countries. Try to estimate what you'll need for retirement (if that's what your investing for) and don't take more risk than you need to. Try to maintain a very simple portfolio that you'll be able to sleep well with. For example, check into the coffeehouse investor Pay a visit to the Bogleheads Forum - you can ask for advice there and the advice will be excellent. Avoid investments with high fees. Get advice from a good fee-only investment advisor if needed. Don't forget to enjoy some of your money now as well. You might not make it to retirement. Read, read, read about investing and retirement. There are many excellent books out there, many of which you can pick up used (cheap) through amazon.com.\"", "title": "" }, { "docid": "6eab5dab50c4fbee754a48168b36c1c9", "text": "If you're tending toward stocks because you have a long time horizon, you're looking at them for the right reasons. I'm twice your age. I have a mortgage -- two of them, actually! -- a wife, and a six-year-old. I can't really justify being terribly risky with my money because I have others depending on my income. You're nineteen. Unless you've gotten a really early start on life and already have a family, you can take on a lot more risk than stocks. You have time to try things (income things) that I wish I would have tried at that age, like starting a business. The only thing that would push me to do that now would be losing my job, and that wouldn't be the rush I'd like. That's not to say that you can't make a lot of money with stocks, but if that's what you're looking to do, really dig in and research them. You have the time. Whether the tide makes all boats rise or sink is a matter of timing the economy, but some of the companies will ride the waves. It takes time to find those more often than not. Which blue chips are likely to ride the waves? I have no clue. But I'm not invested in them at the moment, so it doesn't matter. :)", "title": "" }, { "docid": "d41d8cd98f00b204e9800998ecf8427e", "text": "", "title": "" }, { "docid": "4cd26d742c20c768e4ca24448d556523", "text": "If you are going to the frenzy of individual stock picking, like almost everyone initially, I suggest you to write your plan to paper. Like, I want an orthogonal set of assets and limit single investments to 10%. If with such limitations the percentage of brokerage fees rise to unbearable large, you should not invest that way in the first hand. You may find better to invest in already diversified fund, to skip stupid fees. There are screeners like in morningstar that allow you to see overlapping items in funds but in stocks it becomes trickier and much errorsome. I know you are going to the stock market frenzy, even if you are saying to want to be long-term or contrarian investor, most investors are convex, i.e. they follow their peers, despite it would better to be a concave investor (but as we know it can be hard). If the last part confused you, fire up a spreadsheet and do a balance. It is a very motivating activity, really. You will immediately notice things important to you, not just to providers such as morningstar, but alert it may take some time. And Bogleheads become to your rescue, ready spreadsheets here.", "title": "" }, { "docid": "ca345ea66f077eab164938dda4afdc2e", "text": "\"You can't get much better advice for a young investor than from Warren Buffet. And his advice for investors young and old, is \"\"Put 10% of the cash in short‑term government bonds, and 90% in a very low‑cost S&P 500 index fund.\"\" Or as he said at a different time, \"\"Most investors, both institutional and individual, will find that the best way to own common stocks is through an index fund that charges minimal fees\"\". You are not going to beat the market. So just save as much money as you can, and invest it in something like a Vanguard no-load, low-cost mutual fund. Picking individual stocks is fun, but treat it as fun. Never put in more money than you would waste on fun. Then any upside is pure gravy.\"", "title": "" }, { "docid": "ad95ac2efa8c6f348e8f9de9c1bdc83f", "text": "Risk and return always go hand by hand.* Risk is a measure of expected return volatility. The best investment at this stage is a good, easy to understand but thorough book on finance. *Applies to efficient markets only.", "title": "" }, { "docid": "9c21384b5cd3743e8d722e643855aee6", "text": "Just don't buy any kind of paper and you will be fine :-) And don't forget most of these 'blue-chip companies' sell marketing garbage which have no real market. Finally, make all decissions slooooowly and after extensive research.", "title": "" }, { "docid": "c6a9e919222d50155f265ee9a1dfe37c", "text": "As a young investor, you should know that the big secret is that profitable long term investing is boring. It is is not buying one day and selling the next and keeping very close tabs on your investments and jumping on the computer and going 'Buy!' , 'Sell'. That makes brokers rich, but not you. So look at investments but not everyday and find something else that's exciting, whether it's dirt biking or WOW or competitive python coding. As a 19 year old, you have a ton of time and you don't need to swing for the fences and make 50% or 30% or even 20% returns every year to do well. And you don't have to pick the best performing stocks, and if you do, you don;t have to buy them at their lowest or sell them at their highest. Go read A Random Walk's guide to Investing by Burton Malkiel and The only Investment Guide you'll ever need by Andrew Tobias. Buy them at used bookstores because it's cheaper that way. And if you want more excitement read You Can Be a Stock Market Genius by Joel GreenBlatt, One up On Wall Street By Peter Lynch, something by Warren Buffet and if you want to be really whacked, read Fooled By Randomness by Nassim Nicholas Talib, But never forget about Tobias and Malkiel, invest a regular amount of money every month from 19 to 65 according to what they write and you'll be a wealthy guy by 65.", "title": "" } ]
[ { "docid": "5103c63d89644a428f070da7464eb105", "text": "\"Ah ok, I can appreciate that. I'm fluent in English and Mr. Graham's command of English can be intimidating (even for me). The edition I have has commentary by Mr. Jason Zweig who effectively rewrites the chapters into simpler English and updates the data (some of the firms listed by Mr. Graham don't exist either due to bankruptcy or due to consolidation). But I digress. Let's start with the topics you took; they're all very relevant, you'd be surprised, the firm I work for require marketing for certain functions. But not being good at Marketing doesn't block you from a career in Finance. Let's look at the other subjects. You took high level Maths, as such I think a read through Harry Markowitz's \"\"Portfolio Selection\"\" would be beneficial, here's a link to the paper: https://www.math.ust.hk/~maykwok/courses/ma362/07F/markowitz_JF.pdf Investopedia also has a good summary: http://www.investopedia.com/walkthrough/fund-guide/introduction/1/modern-portfolio-theory-mpt.aspx This is Mr. Markowitz's seminal work; while it's logical to diversify your portfolio (remember the saying \"\"don't put all your eggs in one basket\"\"), Mr. Markwotiz presented the relationship of return, risk and the effects of diversification via mathematical representation. The concepts presented in this paper are taught at every introductory Finance course at University. Again a run through the actual paper might be intimidating (Lord knows I never read the paper from start to finish, but rather read text books which explained the concepts instead), so if you can find another source which explains the concepts in a way you understand, go for it. I consider this paper to be a foundation for other papers. Business economics is very important and while it may seem like it has a weak link to Finance at this stage; you have to grasp the concepts. Mr. Michael Porter's \"\"Five Forces\"\" is an excellent link between industry structure (introduced in Microeconomics) and profit potential (I work in Private Equity, and you'd be surprised how much I use this framework): https://hbr.org/2008/01/the-five-competitive-forces-that-shape-strategy There's another text I used in University which links the economic concept of utility and investment decision making; unfortunately I can't seem to remember the title. I'm asking my ex-classmates so if they respond I'll directly send you the author/title. To finish I want to give you some advice; a lot of subjects are intimidating at first, and you might feel like you're not good enough but keep at it. You're not dumber than the next guy, but nothing will come for free. I wasn't good at accounting, I risked failing my first year of University because of it, I ended up passing that year with distinction because I focused (my second highest grade was Accounting). I wasn't good in economics in High School, but it was my best grades in University. I wasn't good in financial mathematics in University but I aced it in the CFA. English is your second language, but you have to remember a lot of your peers (regardless of their command of the language) are being introduced to the new concepts just as you are. Buckle down and you'll find that none of it is impossible.\"", "title": "" }, { "docid": "01635b6951f65cf58c7a8e5248d06fbc", "text": "Keep up with market news. Macroeconomics, policies, interest rates, major movements, etc. If there's anything you don't know you'll learn on the job, they wouldn't hire you if they expected you to know stuff you didn't. Not sure what you're worried about. If you're an analyst you'll have several months of training anyway.", "title": "" }, { "docid": "4ca0852fdce161b965d5715975eb9a33", "text": "\"As foundational material, read \"\"The Intelligent Investor\"\" by Benjamin Graham. It will help prepare you to digest and critically evaluate other investing advice as you form your strategy.\"", "title": "" }, { "docid": "e0a96be69a097f0ddb3916ff126d5baa", "text": "The reason that you are advised to take more risk while you are young is because the risk is often correlated to a short investment horizon. Young people have 40-50 years to let their savings grow if they get started early enough. If you need the money in 5-15 years (near the end of your earning years), there is much more risk of a dip that will not correct itself before you need the money than if you don't need the money for 25-40 years (someone whose career is on the rise). The main focus for the young should be growth. Hedging your investments with gold might be a good strategy for someone who is worried about the volatility of other investments, but I would imagine that gold will only reduce your returns compared to small-cap stocks, for example. If you are looking for more risk, you can leverage some of your money and buy call options to increase the gains with upward market moves.", "title": "" }, { "docid": "fa0b060c38ae220ba77f07ca36750b24", "text": "I like Keshlam's answer and would like to add a few notes: While your enthusiasm to invest is admirable learning patience is a key aspect of wealth building and keeping.", "title": "" }, { "docid": "83266596284f73cb8a10197cbc46f3f0", "text": "Fantastic question to be asking at the age of 22! A very wise man suggested to me the following with regard to your net income I've purposely not included saving a sum of money for a house deposit, as this is very much cultural and lots of EU countries have a low rate of home ownership. On the education versus entrepreneur question. I don't think these are mutually exclusive. I am a big advocate of education (I have a B.Eng) but have following working in the real world for a number of years have started an IT business in data analytics. My business partner and I saw a gap in the market and have exploited it. I continue to educate myself now in short courses on running business, data analytics and investment. My business partner did things the otherway around, starting the company first, then getting an M.Sc. Other posters have suggested that investing your money personally is a bad idea. I think it is a very good idea to take control of your own destiny and choose how you will invest your money. I would say similarly that giving your money to someone else who will sometimes lose you money and will charge you for the privilege is a bad idea. Also putting your money in a box under your bed or in the bank and receive interest that is less than inflation are bad ideas. You need to choose where to invest your money otherwise you will gain no advantage from the savings and inflation will erode your buying power. I would suggest that you educate yourself in the investment options that are available to you and those that suit you personality and life circumstances. Here are some notes on learning about stock market trading/investing if you choose to take that direction along with some books for self learning.", "title": "" }, { "docid": "19a399279fa3d682c76b0f1cb8422a2e", "text": "IMO almost any sensible decision is better than parking money in a retirement account, when you are young. Some better choices: 1) Invest in yourself, your skills, your education. Grad school is one option within that. 2) Start a small business, build a customer base. 3) Travel, adventure, see the world. Meet and talk to lots of different people. Note that all my advice revolves around investing in YOURSELF, growing your skills and/or your experiences. This is worth FAR more to you than a few percent a year. Take big risks when you are young. You will need maybe $1m+ (valued at today's money) to retire comfortably. How will you get there? Most people can only achieve that by taking bigger risks, and investing in themselves.", "title": "" }, { "docid": "6e581c27f5031f5164a7926715fae4f3", "text": "Whey protein, coffee, skills, skills, skills did I mention skills? Learn useful things and no debt. As for actual investment vehicles.. I have bad views of what is going to happen of the next 10 years.. I doubt you'll be allowed to own anything you invested in....", "title": "" }, { "docid": "ab52113ec7e01f75d7dbf10acd3beb4c", "text": "\"I'm searching for a master's thesis topic in equity investment or portfolio management and I'd be grateful if someone could tell me what are the hot \"\"trends\"\" going on right now on the market? Any new phenomenons (like the rise of blockchain, etf... but more relate to the equity side) or debates ( the use of the traditional techniques such as Beta to calculate WACC for example ...) ?\"", "title": "" }, { "docid": "1e68081d995d6fa8dd10e008a6eb53ce", "text": "Some backstory before my questions. I am a First year student in the UK (course: Finance and Investment). In the future I would like to get into IB or PE. I already have CISI and CFA exams on my radar. My questions are: 1) With the recent boom in cryptocurrencies should I start researching how they work and what are the future prospects of investing in them? Do you think it will become mandatory by 2020? Are GS employees currently working their butts off to learn as much as possible about it and how to profit? 2) What is the best way to network? Should I focus only on insight days,applying for shadowing/internships etc. Is cold-calling worth it? 3) Do actual people work in Clearing Houses? If so, what are the career prospects there? 4) Can someone give me a real life example (in the form of eli5) about how financial institutions use swaps and futures? 5) I recently picked up “Lords of Finance” as a book for my spare time. I am genuinely intrigued but I was told that I am wasting my time and in the future it wont do me any good because no one will know I read it? I am well aware most of these questions are basic but It will be very helpful if I even get one question answered. If some of these questions have already been answered please give me a link. Thank you in advance", "title": "" }, { "docid": "48a6bf9cf171d813361886f74c92a6f9", "text": "I think you're on the right track. Keep it up. You are still relatively young, and it wont have an impact. You have experience and you have a lot of education, both will be assets. I can't comment on the region question because I have only ever worked in one region. Are you asking from a purely economics/getting paid perspective? One approach you can take is making a little spreadsheet with average trader salary divided by cost of living in that region. The issue is that trader salaries and bonuses vary SO MUCH in every region, that you can't make any generalizations.", "title": "" }, { "docid": "319ecafcdb8a3aec5bded1d3b26698c9", "text": "First, welcome to Money.SE. If you are interested in saving and investing, this is a great site to visit. Please take the tour and just start to read the questions you find interesting. 1 - even though this is hypothetical, it scales down to an average investor. If I own 1000 shares of the 1 billion, am I liable if the company goes under? No. Stocks don't work that way. If all I have is shares, not a short position, not options, I can only see my investment go to zero. 2 - Here, I'd ask that you edit your country in the tags. I can tell you that my newborn (who is soon turning 17) had a stock account in her name when she was a few months old. It's still a custodian account, meaning an adult has to manage it, and depending on the state within the US, the age that it's hers with no adult, is either 18 or 21. Your country may have similar regional rules. Also - each country has accounts specifically geared toward retirement, with different favorable rules regarding taxation. In the US, we have accounts that can be funded at any age, so long as there's earned income. My daughter started one of these accounts when she started baby sitting at age 12. She will have more in her account by the time she graduates college than the average retiree does. It's good for her, and awful for the general population that this is the case.", "title": "" }, { "docid": "72837c1163d48aa638ea1885c20b77ce", "text": "Reading this made me think of [this](https://www.youtube.com/watch?v=-s1s5K52zEQ). I wish you luck if you consider yourself an authority on a subject you have practically no exposure to, but hey, what does a hiring manager know? I mean, you're about to start an internship, so obviously everyone should want to know your opinion on the future of the market.", "title": "" }, { "docid": "1aa5f1b430093745597a20ae6f4fba86", "text": "Don't ever, ever, ever let someone else handle your money, unless you want somebody else have your money. Nobody can guarantee a return on stocks. That's utter bullshit. Stock go up and down according to market emotions. How can your guru predict the market's future emotions? Keep your head cool with stocks. Only buy when you are 'sure' you are not going to need the money in the next 10 years. Buy obligations before stocks, invest in 'defensive' stocks before investing in 'aggressive' stocks. Keep more money in obligations and defensive stock than in aggressive stocks. See how you can do by yourself. Before buying (or selling) anything, think about the risks, the market, the expert's opinion about this investment, etc. Set a target for selling (and adjust the target according to the performance of the stock). Before investing, try to learn about investing, really. I've made my mistakes, you'll make yours, let's hope they're not the same :)", "title": "" }, { "docid": "89d0451472da336c5b36dca90f59adb4", "text": "Many good sources on YouTube that you can find easily once you know what to look for. Start following the stock market, present value / future value, annuities &amp; perpetuities, bonds, financial ratios, balance sheets and P&amp;L statements, ROI, ROA, ROE, cash flows, net present value and IRR, forecasting, Monte Carlo simulation (heavy on stats but useful in finance), the list goes on. If you can find a cheap textbook, it'll help with the concepts. Investopedia is sometimes useful in learning concepts but not really on application. Khan Academy is a good YouTube channel. The Intelligent Investor is a good foundational book for investing. There are several good case studies on Harvard Business Review to practice with. I've found that case studies are most helpful in learning how to apply concept and think outside the box. Discover how you can apply it to aspects of your everyday life. Finance is a great profession to pursue. Good luck on your studies!", "title": "" } ]
fiqa
cb3f24852c5c7dc5c83ae3cfa2822b14
Is there any instrument with real-estate-like returns?
[ { "docid": "bbb9c1dab71e1a4e1576c568d093714b", "text": "Similarly to buying property on your own, REITs cannot get to good returns without leveraging. If you buy an investment property 100% cash only - chances are that 10% ROI is a very very optimistic scenario. If you use leveraging (i.e.: take out a mortgage) - you're susceptible to interest rate changes. REITs invest in properties all around all the time. They invest in mortgages themselves as well (In the US, that's the only security REITs can hold without being disqualified). You can't expect all that to be cash-only, there have to be loans and financing involved. When rates go up - financing costs go up. That brings net income down. Simple math. In the US, there's an additional benefit to investing in REIT vs directly holding real estate: taxes. REITs pay dividends, which have preferential (if qualified) taxation. You'll pay capital gains taxes on the dividends if you hold the fund long enough. If you own a rental property directly, your income after all the expenses is taxed at ordinary rates, which would usually be higher. Also, as you mentioned, you can use them as margin, and they're much much more liquid than holding real estate directly. Not to mention you don't need to deal with tenants or periods where you don't have any, or if local real-estate market tanks (while REITs are usually quite diversified in kinds of real estate they hold and areas). On the other hand, if you own real estate, you can leverage it at lower rates than margin (with HELOCs etc), and it provides some safety net in case of a stock market crash (which REITs are somewhat susceptible to). You can also live in your property, if needed, which is something that's hard to do with REITs....", "title": "" }, { "docid": "d41d8cd98f00b204e9800998ecf8427e", "text": "", "title": "" } ]
[ { "docid": "8e0cd198acc054563b2aec379fdbc074", "text": "If you are tired of acting as the bank after selling your Real Estate and owner-financing the loan with a promissory note, we can offer a sound and painless exit strategy today. We can fund the purchase in as little as 15 business days. We at Cash Note USA buy Real Estate Promissory Notes Nationwide. We Purchase Owner Financed Mortgage, Land Contract, Contract For Deed, Deed Of Trust, Private Mortgages, Secured Notes, Business Notes, Commercial Notes and Partial Notes and many kinds of seller carry back mortgage notes. Convert Real Estate Note To Cash Now.Sell Your Mortgage Note Fast &amp; get More Cash For Your Note. You will get a Fair Offer Within 24 Hours.Get your Note cashed today! Cash Note USA is a note buyer all over the nation. Convert your mortgage payments into cash. Simple closing process. We buy Promissory Notes, Real Estate Trust Deeds, Seller Carry Back Notes, Land Contract, Contract for Deed, Privately Help Notes, Commercial Mortgage Notes &amp; Business Promissory Notes. Contact Us: Cash Note USA 1307 W.6th St.Suite 219N, Corona, CA 92882 888-297-4099 cashnoteusa@gmail.com http://cashnoteusa.com/", "title": "" }, { "docid": "f2957071718c3125aae989498d051224", "text": "I was emailing back and forth with a manager in a different department on how real returns are being calculated, and he said that the industry standard is 1 + real returns*(1+inflation) - fees, and to not use my formula because it can double count inflation, making fees lower. However, real returns are not observable in the future, and I do not why he uses that formula. The returns were used in an Excel spreadsheet. What are your thoughts about this?", "title": "" }, { "docid": "31c5ac8c41c0019f73a79c19208dd61e", "text": "Have you considered a self-directed IRA to invest, rather than the stock market or publicly traded assets? Your IRA can actually own direct title to real estate, loan money via secured or unsecured promissory notes much like a hard money loan or invest into shares of an entity that invests in real estate. The only nuance is that the IRA holder is responsible for finding and deciding upon the investment vehicle. Just an option outside of the normal parameters, if you have an existing IRA or old 401(k) or other qualified plan, this might be an option for you.", "title": "" }, { "docid": "5a121c4f397ec5791d0fcf6b3cbdeb2e", "text": "\"One way to \"\"get into the real estate market\"\" is to invest your money in a fund which has its value tied to real estate. For example, a Real Estate Investment Trust. This fund would fluctuate largely inline with the property values in the area(s) where the fund puts its money. This would have a few (significant) changes from 'traditional' real estate investing, including:\"", "title": "" }, { "docid": "3bd43884a9d185524af6a2230f569e8c", "text": "Your question may have another clue. You are bullish regarding the real estate market. Is that for your city, your state, your nation or for the whole world? Unless you can identify particular properties or neighborhoods that are expected to be better than the average return for your expected bull market in real estate, you will be taking a huge risk. It would be the same as believing that stocks are about to enter a bull market, but then wanting to put 50% of your wealth on one stock. The YTD for the DOW is ~+7%, yet 13 of the 30 have not reached the average increase including 4 that are down more than 7%. Being bullish about the real estate segment still gives you plenty of opportunities to invest. You can invest directly in the REIT or you can invest in the companies that will grow because of the bullish conditions. If your opinion changes in a few years it is hard to short a single property.", "title": "" }, { "docid": "fac469245c0605d033cba9fca4684cc3", "text": "Reasons for no: In your first sentence you say something interesting: rates low - prices high. Actually those 2 are reversely correlated, imagine if rates would be 5% higher-very few people could buy at current prices so prices would drop. Also you need to keep in mind the rate of inflation that was much higher during some periods in the US history(for example over 10% in the 1980) so you can not make comparisons just based on the nominal interest rate. Putting all your eggs in one basket. If you think real estate is a good investment buy some REITs for 10k, do not spend 20% of your future income for 20 years. Maintenance - people who rent usually underestimate this or do not even count it when making rent vs mortgage comparisons. Reasons for yes: Lifestyle decision - you don't want to be kicked out of your house, you want to remodel... Speculation - I would recommend against this strongly, but housing prices go up and down, if they will go up you can make a lot of money. To answer one of questions directly: 1. My guess is that FED will try to keep rates well bellow 10% (even much lower, since government can not service debts if interest rates go much higher), but nobody can say if they will succeed.", "title": "" }, { "docid": "74b1000ebe616ec1d7efb65f43d157f6", "text": "Apples and oranges. The stock market requires a tiny bit of your time. Perhaps a lot if you are interested in individual stocks, and pouring through company annual reports, but close to none if you have a mix of super low cost ETFs or index fund. The real estate investing you propose is, at some point, a serious time commitment. Unless you use a management company to handle incoming calls and to dispatch repair people. But that's a cost that will eat into your potential profits. If you plan to do this 'for real,' I suggest using the 401(k), but then having the option to take loans from it. The ability to write a check for $50K is pretty valuable when buying real estate. When you run the numbers, this will benefit you long term. Edit - on re-reading your question Rental Property: What is considered decent cash flow? (with example), I withdraw my answer above. You overestimated the return you will get, the actual return will likely be negative. It doesn't take too many years of your one per year strategy to wipe you out. Per your comment below, if bought right, rentals can be a great long term investment. Glad you didn't buy the loser.", "title": "" }, { "docid": "a0ed194077d49ea34d04257f3a56dc3d", "text": "Realistically, it is CDs with longer terms or are callable. You pretty much have to accept more risk if you want higher returns. If you are willing to accept that risk by losing the FDIC protections the next level up is probably high rated Government bonds.", "title": "" }, { "docid": "ef20c2eeb309e86103342ac03ce8e921", "text": "You could look into an index fund or ETF that invests primarily in Real Estate Investment Trusts (REIT's). An REIT is any corporation, trust or association that acts as an investment agent specializing in real estate and real estate mortgages Many investment firms offer an index fund or ETF like this. For example, Vanguard and Fidelity have funds that invest primarily in real estate markets. You could also invest in a home construction ETF, like iShares' ITB, which invests in companies related to home construction. This ETF includes more companies than just REITs, so for example, Home Depot is included.", "title": "" }, { "docid": "d16189759e51343e7ecb4ac89cf8ce81", "text": "would buying the stock of a REIT qualify as a 'Like-Kind' exchange? Short answer, no. Long answer, a 1031 (Starker) exchange only applies to real estate. From the Wikipedia page on the topic: To qualify for Section 1031 of the Internal Revenue Code, the properties exchanged must be held for productive use in a trade or business, or for investment. Stocks, bonds, and other properties are listed as expressly excluded by Section 1031 of the Internal Revenue Code, although securitized properties are not excluded. A REIT, being stock in a real estate company, is excluded from Section 1031.", "title": "" }, { "docid": "8920dfc811304724fd604a06d0c91b13", "text": "Ok, have your father 'sell' you the house with a RECORDED land contract for x dollars and a gift of equity(GOE) of y. He writes of the max he can each year for the GOE (ask a tax attorney on this one), and your cousin lends him the money for his FL prop. Consult a tax attorney on the capital gains, but you can write off the actualized gains at sale if you LIVED in the prop for 2 of the last 5 or 7 years (I can't remember) and were on title. Years later, you use the recorded land contract, with the verifiable on time payments you've been making, to a conforming lender and do a R&T refi.", "title": "" }, { "docid": "98863528ca9a2014fa3bc34c6c060f5a", "text": "yes, i am incorporating monte carlo return scenarios for both equity and real estate. yeah there is a lot to consider in the case of the property being a condo where you have to account for property taxes as well as condo fees. the two projects have entirely different considerations and it's not like the money that is injected to one is similar to the other (very different) which is why i figured there should be differing discount rates. in any case, thanks for the discussion and suggestions.", "title": "" }, { "docid": "9e2514f7b41ead8b0f37d702fcf7fbd2", "text": "well yes but you should also begin to understand the sectoral component of real estate as a market too in that there can be commercial property; industrial property and retail property; each of which is capable of having slightly (tho usually similar of course) different returns, yields, and risks. Whereas you are saving to buy and enter into the residential property market which is different again and valuation principles are often out of kilter here because Buying a home although exposing your asset base to real estate risk isnt usually considered an investment as it is often made on emotional grounds not strict investment criteria.", "title": "" }, { "docid": "89cc2b6694f315a40c76c1cee002a052", "text": "\"The iShares Barclays Aggregate Bond - ticker AGG, is a ETF that may fit the bill for you. It's an intermediate term fund with annual expenses of .20%. It \"\"seeks investment results that correspond generally to the price and yield performance, before fees and expenses, of the Barclays Capital U.S. Aggregate Bond Index\"\"\"", "title": "" }, { "docid": "e0fd5f580d29bb7dc0d3a235d31ffdf2", "text": "\"All of these frameworks, Markowitz, Mean/CVaR, CARA, etc sit inside a more general framework which is that \"\"returns are good\"\" and \"\"risk/lack of certainty in the returns is bad\"\", and there's a tradeoff between the two encoded as some kind of risk aversion number. You can measure \"\"lack of certainty in returns\"\" by vol, CVaR, weighted sum of higher moments, but even sector/region concentration. Similarly do I want more \"\"returns\"\" or \"\"log returns\"\" or \"\"sqrt returns\"\" in the context of this tradeoff? You don't need any formal notion of utility at that point - and I don't know what formal ideas of utility beyond \"\"I want more returns and less risk\"\" really buys you. The Sharpe ratio only really gets its meaning because you've got some formal asset-pricing notion of utility. In my view the moment that you're putting constraints on the portfolio (e.g. long only, max weights, don't deviate too much from the benchmark ...) - really you're operating in this more general framework anyway and you're not in \"\"utility-land\"\" anymore.\"", "title": "" } ]
fiqa
74bb2737662e15dde78f220ac2fc7050
How do I calculate two standard deviations away from the stock price?
[ { "docid": "755b34d8f032598883b8606ca388a09a", "text": "\"The formula for standard deviation is fairly simple in both the discrete and continuous cases. It's mostly safe to use the discrete case when working with adjusted closing prices. Once you've calculated the standard deviation for a given time period, the next task (in the simplest case) is to calculate the mean of that same period. This allows you to roughly approximate the distribution, which can give you all sorts of testable hypotheses. Two standard deviations (σ) away from the mean (μ) is given by: It doesn't make any sense to talk about \"\"two standard deviations away from the price\"\" unless that price is the mean or some other statistic for a given time period. Normally you would look at how far the price is from the mean, e.g. does the price fall two or three standard deviations away from the mean or some other technical indicator like the Average True Range (an exponential moving average of the True Range), some support level, another security, etc. For most of this answer, I'll assume we're using the mean for the chosen time period as a base. However, the answer is still more complicated than many people realize. As I said before, to calculate the standard deviation, you need to decide on a time period. For example, you could use S&P 500 data from Yahoo Finance and calculate the standard deviation for all adjusted closing prices since January 3, 1950. Downloading the data into Stata and applying the summarize command gives me: As you can probably see, however, these numbers don't make much sense. Looking at the data, we can see that the S&P 500 hasn't traded close to 424.4896 since November 1992. Clearly, we can't assume that this mean and standard deviation as representative of current market conditions. Furthermore, these numbers would imply that the S&P 500 is currently trading at almost three standard deviations away from its mean, which for many distribution is a highly improbable event. The Great Recession, quantitative easing, etc. may have changed the market significantly, but not to such a great extent. The problem arises from the fact that security prices are usually non-stationary.. This means that the underlying distribution from which security prices are \"\"drawn\"\" shifts through time and space. For example, prices could be normally distributed in the 50's, then gamma distributed in the 60's because of a shock, then normally distributed again in the 70's. This implies that calculating summary statistics, e.g. mean, standard deviation, etc. are essentially meaningless for time periods in which prices could follow multiple distributions. For this and other reasons, it's standard practice to look at the standard deviation of returns or differences instead of prices. I covered in detail the reasons for this and various procedures to use in another answer. In short, you can calculate the first difference for each period, which is merely the difference between the closing price of that period and the closing price of the previous period. This will usually give you a stationary process, from which you can obtain more meaningful values of the standard deviation, mean, etc. Let's use the S&P500 as an example again. This time, however, I'm only using data from 1990 onwards, for the sake of simplicity (and to make the graphs a bit more manageable). The summary statistics look like this: and the graph looks like this; the mean is the central horizontal red line, and the top and bottom lines indicate one standard deviation above and below the mean, respectively. As you can see, the graph seems to indicate that there were long periods in which the index was priced well outside this range. Although this could be the case, the graph definitely exhibits a trend, along with some seemingly exogenous shocks (see my linked answer). Taking the first difference, however, yields these summary statistics: with a graph like this: This looks a lot more reasonable. In periods of recession, the price appears much more volatile, and it breaches the +/- one standard deviation lines indicated on the graph. This is only a simple summary, but using first differencing as part of the wider process of detrending/decomposing a time series is a good first step. For some technical indicators, however, stationary isn't as relevant. This is the case for some types of moving averages and their associated indicators. Take Bollinger bands for instance. These are technical indicators that show a number of standard deviations above and below a moving average. Like any calculation of standard deviation, moving average, statistic, etc. they require data over a specified time period. The analyst chooses a certain number of historical periods, e.g. 20, and calculates the moving average for that many previous periods and the moving/rolling standard deviation for those same periods as well. The Bollinger bands represent the values a certain number of standard deviations away from the moving average at a given point in time. At this given point, you can calculate the value two standard deviations \"\"away from the value,\"\" but doing so still requires the historical stock price (or at least the historical moving average). If you're only given the price in isolation, you're out of luck. Moving averages can indirectly sidestep some of the issues of stationarity I described above because it's straightforward to estimate a time series with a process built from a moving average (specifically, an auto-regressive moving average process) but the econometrics of time series is a topic for another day. The Stata code I used to generate the graphs and summary statistics:\"", "title": "" }, { "docid": "02e53f65bdc00d5aaf49dc4a4750e4d2", "text": "Standard Deviation is a mathematical term that is useful in many areas. It can be considered a measure of how tight the data points are to the average. If there is consistency in the measurement system, then a point that is two standard from the average can be considered an outlier. It doesn't even need to be time based. We can say that a child born weighing less than X pounds is more than 2 standard deviations below the average. Using it to look at a price or an index value doesn't make a lot of sense because many expect there to be long term growth. For example you would never say that you will buy a new jacket for your child when they are two standard deviations above their average height. You can say you will buy or sell a financial instrument when the P/E ratio is 2 standard deviations from some average. It could be the average of the long term history, or the index, or the sector. You could do the same thing for earnings per share or many other business of financial statistics. A standard deviation calculated from a time series assumes that the measurement will normally stay withing some bounds. And that straying from those bounds is a sign of the right time to buy or sell.", "title": "" } ]
[ { "docid": "d6bf11b0627d73cbea9659cfedae9210", "text": "\"The calculation and theory are explained in the other answers, but it should be pointed out that the video is the equivalent of watching a magic trick. The secret is: \"\"Stock A and B are perfectly negatively correlated.\"\" The video glasses over that fact that without that fact the risk doesn't drop to zero. The rule is that true diversification does decrease risk. That is why you are advised to spread year investments across small-cap, large-cap, bonds, international, commodities, real estate. Getting two S&P 500 indexes isn't diversification. Your mix of investments will still have risk, because return and risk are backward calculations, not a guarantee of future performance. Changes that were not anticipated will change future performance. What kind of changes: technology, outsourcing, currency, political, scandal.\"", "title": "" }, { "docid": "e74ea038c1bca2f3ddaca4d7d7d23a6f", "text": "\"Finding the \"\"optimal\"\" solution (and even defining what optimal is) would probably take a lot of searching of all the possible combinations of stocks you could buy, given that you can't buy fractional shares. But I'd guess that a simple \"\"greedy\"\" algorithm should get you close enough. For any given portfolio state, look at which stock is furthest below the target size - e.g. in your example, S3 is 3.5% away whereas S1 is only 3.1% away and S2 is over-sized. Then decided to buy one stock of S3, recalculate the current proportions, and repeat until you can't buy more stocks because you've invested all the money. If you have to pay a transaction fee for each kind of stock you purchase you might want to calculate this in larger lot sizes or just avoid making really small purchases.\"", "title": "" }, { "docid": "1fe2c6cb65515b9032aed7caae98453f", "text": "\"This is the same answer as for your other question, but you can easily do this yourself: ( initial adjusted close / final adjusted close ) ^ ( 1 / ( # of years sampled) ) Note: \"\"# of years sampled\"\" can be a fraction, so the one week # of years sampled would be 1/52. Crazy to say, but yahoo finance is better at quick, easy, and free data. Just pick a security, go to historical prices, and use the \"\"adjusted close\"\". money.msn's best at presenting finances quick, easy, and cheap.\"", "title": "" }, { "docid": "50872addba7d930b69e09495f5192a4c", "text": "Calculation. To calculate the DJIA, the sum of the prices of all 30 stocks is divided by a divisor, the Dow Divisor. The divisor is adjusted in case of stock splits, spinoffs or similar structural changes, to ensure that such events do not in themselves alter the numerical value of the DJIA.", "title": "" }, { "docid": "49c7ca8ddf2d9862e4ba39a7514faf02", "text": "This paper makes the rounds every so often and I HATE IT VERY MUCH. No one has EVER EVER EVER estimated standard deviation by taking an average of abs deviations, because that would be stupid, further, realized vol is a very different beast than implied vol. AND FURTHER, the models are fitted to the data, rather than fighting the tape and fitting the data to the models. Most people working with these instruments are trying to figure out the prices of unknown derivatives based on known derivatives - the models just help interpret findings and estimate what's necessary to hedge a position.", "title": "" }, { "docid": "ca41d7db1b793e37d2a3a3973139132e", "text": "\"Wow, this analysis really surprised me. Very complete and useful, but i think my teacher request was easier. He just said: \"\"Try to build a diversified portfolio. Then try to add a commodity (like silver or gold) and understand how the risk vary introducing an asset like this.\"\" So, i'm basically making a stocks portfolio and i'm calculating its expected return and risk. (for example 40%FB, 10%JNJ, 20%GS, 10%F and 20%MCD) then i'm adding GLD (so now i have something like 20%FB, 10%JNJ, 10%GS, 10%F and 20%MCD 30%GLD) and i'm actually making an excel spreadsheet where i calculate all the: -Expected returns -St Deviation -Covariance At the end i compare the returns and the risks on the 2 different portfolios.\"", "title": "" }, { "docid": "a346ee2542db4507de800e5de36fc933", "text": "\"So, there is no truly \"\"correct\"\" way to calculate return. Professionals will often calculate many different rates of return depending on what they wish to understand about their portfolio. However, the two most common ways of calculating multi-period return though are time-weighted return and money-weighted return. I'll leave the details to this good Investopeadia article, but the big picture is time-weighted returns help you understand how the stock performed during the period in question independent of how you invested it it. Whereas money-weighted return helps you understand how you performed investing in the stock in question. From your question, it appears both methods would be useful in combination to help you evaluate your portfolio. Both methods should be fairly easy to calculate yourself in a spread sheet, but if you are interested there are plenty of examples of both in google docs on the web.\"", "title": "" }, { "docid": "ef18299621646b2cd361cf1313bf5a04", "text": "&gt; A short position also loses money if the stock just appreciates more slowly than the broader market, which is one way an overvaluation can correct itself. Is there a derivative based on the literal second derivative (acceleration) of the stock price? If so, you'd be able to short those, yes?", "title": "" }, { "docid": "5f2843f0727becf25573f503842927fc", "text": "On expiry, with the underlying share price at $46, we have : You ask : How come they substract 600-100. Why ? Because you have sold the $45 call to open you position, you must now buy it back to close your position. This will cost you $100, so you are debited for $100 and this debit is being represented as a negative (subtracted); i.e., -$100 Because you have purchased the $40 call to open your position, you must now sell it to close your position. Upon selling this option you will receive $600, so you are credited with $600 and this credit is represented as a positive (added) ; i.e., +$600. Therefore, upon settlement, closing your position will get you $600-$100 = $500. This is the first point you are questioning. (However, you should also note that this is the value of the spread at settlement and it does not include the costs of opening the spread position, which are given as $200, so you net profit is $500-$200 = $300.) You then comment : I know I am selling 45 Call that means : As a writer: I want stock price to go down or stay at strike. As a buyer: I want stock price to go up. Here, note that for every penny that the underlying share price rises above $45, the money you will pay to buy back your short $45 call option will be offset by the money you will receive by selling the long $40 call option. Your $40 call option is covering the losses on your short $45 call option. No matter how high the underlying price settles above $45, you will receive the same $500 net credit on settlement. For example, if the underlying price settles at $50, then you will receive a credit of $1000 for selling your $40 call, but you will incur a debit of $500 against for buying back your short $45 call. The net being $500 = $1000-$500. This point is made in response to your comments posted under Dr. Jones answer.", "title": "" }, { "docid": "eaf8fbb6297344fa58d97ad8831b11ca", "text": "Having all of the numbers you posted is a start. It's what you need to perform the calculation. The final word, however, comes from the company itself, who are required to issue a determination on how the spin-off is valued. Say a company is split into two. Instead of some number of shares of each new company, imagine for this example it's one for one. i.e. One share of company A becomes a share each in company B and company C. This tell us nothing about relative valuation, right? Was B worth 1/2 of the original company A, or some other fraction? Say it is exactly a 50/50 split. Company A releases a statement that B and C each should have 1/2 the cost basis of your original A shares. Now, B and C may very well trade ahead of the stock splitting, as 'when issued' shares. At no point in time will B and C necessarily trade at exactly the same price, and the day that B and C are officially trading, with no more A shares, they may have already diverged in price. That is, there's nothing you can pull from the trading data to identify that the basis should have been assigned as 50% to each new share. This is my very long-winded was of explaining that the company must issue a notice through your broker, and on their investor section of their web site, to spell out the way you should assign your basis to each new stock.", "title": "" }, { "docid": "7ab1a33618eb34680f2d6c4335cdccbc", "text": "Here's another attempt at explanation: it's basically because parabolas are flat at the bottom. Let me explain. As you might know, the variance of the log stock price in Black Scholes is vol^2 * T, in other words, variance of the log stock price is linear in time to expiry. Now, that means that the standard deviation of your log stock price is square root in time. This is consequential. For normally distributed random variables, in 68% of cases we end up within one standard deviation. So, basically, we expect our log stock price to be within something something times square root of T. So, if your stock has a vol of 16%, it'll be plus/minus 32% in 4 years, plus/minus 16% for one year, plus/minus 8% for 3m, plus/minus 4% for 3-ish weeks, and plus/minus 1% for a business day. As you see, the decay is slow at first, but much more rapid as we get closer. How does the square root function look? It's a sideways parabola. As we come closer to zero, the slope of the square root function goes to infinity. (That is related to the fact that Brownian motion is almost surely no-where differentiable - it just shoots off with infinite slope, returning immediately, of course :-) Another way of looking at it is the old traders rule of thumb that an at-the-money option is worth approximately S * 0.4 * vol * sqrt(T). (Just do a Taylor expansion of Black Scholes). Again, you have the square root of time to expiry in there, and as outlined above, as we get closer to zero, the square root drops slowly at first, and then precipitously.", "title": "" }, { "docid": "3a43fd02236810d0cff0fa9231398b1d", "text": "Let's suppose your friend gave your $100 and you invested all of it (plus your own money, $500) into one stock. Therefore, the total investment becomes $100 + $500 = $600. After few months, when you want to sell the stock or give back the money to your friend, check the percentage of profit/loss. So, let's assume you get 10% return on total investment of $600. Now, you have two choices. Either you exit the stock entirely, OR you just sell his portion. If you want to exit, sell everything and go home with $600 + 10% of 600 = $660. Out of $660, give you friend his initial capital + 10% of initial capital. Therefore, your friend will get $100 + 10% of $100 = $110. If you choose the later, to sell his portion, then you'll need to work everything opposite. Take his initial capital and add 10% of initial capital to it; which is $100 + 10% of $100 = $110. Sell the stocks that would be worth equivalent to that money and that's it. Similarly, you can apply the same logic if you broke his $100 into parts. Do the maths.", "title": "" }, { "docid": "1fec42beb84e2821dd90cd035446ea8d", "text": "Something like cost = a × avg_spreadb + c × volatilityd × (order_size/avg_volume)e. Different brokers have different formulas, and different trading patterns will have different coefficients.", "title": "" }, { "docid": "e6f8c74a0902a1fa88280961a409867b", "text": "This link does it ok: http://investexcel.net/1979/calculate-historical-volatility-excel/ Basically, you calculate percentage return by doing stock price now / stock price before. You're not calculating the rate of return hence no subtraction of 100%. The standard is to do this on a daily basis: stock price today / stock price yesterday. The most important and most misunderstood part is that you now have to analyze the data geometrically not arithmetically. To easily do this, convert all percentage returns with the natural log, ln(). Next, you take the standard deviation of all of those results, and apply exp(). This answers the title of your question. For convenience's sake, it's best to annualize since volatility (implied or statistical) is now almost always quoted annualized. There are ~240 trading days each year. You multiply your stdev() result by (240 / # of trading days per return) ^ 0.5, so if you're doing this for daily returns, multiply the stdev() result by 240^0.5; if you were doing it weekly, you'd want to multiply by (240 / ~5)^0.5; etc. This is your number for sigma. This answers the intent of your question. For black-scholes, you do not convert anything back with exp(); BS is already set up for geometric analysis, so you need to stay there. The reason why analysis is done geometrically is because the distribution of stock returns is assumed to be lognormal (even though it's really more like logLaplace).", "title": "" }, { "docid": "e4b0148f3cdecb6df7692dbccf3fa8ad", "text": "An expiration 2 years out will have Sqr(2) (yes the square root of 2!) times the premium of the 1 year expiration. So if the option a year out sell for $1.00, two is only $1.41. And if the stock trades for $10, but the strike is $12, why aren't you just waiting for expiration to write the next one?", "title": "" } ]
fiqa
9f6190852b8de187e4277368b5f141ea
Why are credit cards preferred in the US?
[ { "docid": "7832dedd1fee46484365b4dc17bf4aa4", "text": "There are several reasons why credit cards are popular in the US: On the other hand, debit cards do not have any of these going for them. A debit card doesn't make much money for the bank unless you overdraw or something, so banks don't have incentive to push you to use them as much. As a result they don't offer rewards other benefits. Some people say the ability to spend more than you have is a downside of a credit card. But it's really an upside. The behavior of doing that when it isn't needed is bad, but that's not the card's fault, it's the users'. You can get a credit card with a very small limit if this is an issue for you. The question I find interesting is why debit cards are more popular in your home country. I can't think of any advantage they offer besides free cash back. But most people in the US don't use cash much either. I have to think in your home country the banks have a different revenue model or perhaps your country isn't as eager to offer tons of easy credit to everyone as the US is.", "title": "" }, { "docid": "a9190beab9ebe5a6f2c8fb4667cf8972", "text": "For me, it is mostly for the fraud protection. If I have a debit card and someone makes a fraudulent charge the money is removed from my bank account. From my understanding, I can then file a fraud complaint with the bank to recover my money. However, for some period of time, the money is missing from my bank account. I've heard conflicting stories of money being returned quickly while the complaint is undergoing investigation as well as money being tied up for several days/weeks. It may depend on the bank. With a credit card, it is the banks money that is tied up.", "title": "" }, { "docid": "790bd1aa9a78f54d3bd90c4c236277fd", "text": "\"There are two things I can think of that might be different in other countries: Until 2013, American Express, Visa and MasterCard prevented businesses from charging extra for credit card usage, and credit card surcharges still illegal in several states. Since credit card companies add a surcharge to credit card purchases, and merchants can't pass that onto credit card users, they just make everyone pay extra instead. Since everyone gets charged the credit card surcharge, you might as well use a credit card and recoup some of that via \"\"rewards\"\" points. Almost all credit cards here have grace periods, where you won't be charged interest if you pay back your loans in full within some period of time (at least 21 days). This makes credit cards attractive to people who don't need a loan, but like the convenience that credit cards provide (not carrying cash, extra insurance, better fraud protection). Apparently grace periods aren't required by law here, so this might be common in other countries as well.\"", "title": "" }, { "docid": "0f2840a9a87b9e94321c55c5533ece66", "text": "Your question is based on a false premise. Debit cards are more popular in the US than credit cards are. Indeed it seems to be the non-US part of the world that is big in credit cards. See here for example", "title": "" }, { "docid": "ee7f43ee585e6ce72415a9fbc96d715f", "text": "\"Personally, I use my credit cards for everything because I get reward points (or, cash back, depending on the card), and I build credit history. I've had credit cards since I was 18 (now 22), and my credit score is in the higher end 700s which I'm told is pretty good for my age. Additionally, since I put my rent and large purchases on my credit card, I have a lot of reward points. I use these to buy things I wouldn't normally buy to try them out and see if they bring any value into my life. If not, I didn't really lose anything, but I have found value in some of those things. I realize most of this is gamification and consumerism at play, but getting that extra little thing once in a while for \"\"free\"\" which is pretty nice.\"", "title": "" }, { "docid": "d41d8cd98f00b204e9800998ecf8427e", "text": "", "title": "" }, { "docid": "593a607429bbea53a8c549008657a60f", "text": "\"The real reason credit cards are so popular in the US is that Americans are lazy and broke, and the credit card companies know how to market to that. Have you ever heard of the $30k millionaires? These were individuals that purchased as if they were some of the wealthy elite, but had no real money to back it up. American society has pushed the idea of \"\"living on credit\"\" for quite some time now. An idea that is even furthered by watching the US government operate solely on credit. (Raise the debt ceiling much?) Live in America for more than six months and you will be bombarded with \"\"Pre-Approved Deals\"\" with low introductory rates that are designed to sucker the average consumer into opening multiple accounts that they don't need. Then, they try and get you to carry a balance by allowing low minimum payments that could take in the neighborhood of 20 years to pay off, depending on carried balance. This in turn pads the credit companies' pockets with all of the interest you now pay on the account. The few truly wealthy Americans do not purchase on credit.\"", "title": "" }, { "docid": "f4f5ccd002c0ea3835d23221194ca816", "text": "Credit card fraud protection (by law), credit card cash back programs (provided by most CC issuers), and debit card fees (commonly imposed by the merchant). The crux is that with CC transactions, a small percentage is remitted to the issuing bank. Since the banks are already making money hand over fist on CC's, they incentivize people to use them. CC security is also lax because the merchant is responsible for fraudulent charges instead of the bank. If the merchant fails to check a signature, they are held liable for all charges if the card holder reports a fraudulent transaction.", "title": "" } ]
[ { "docid": "74a87d751a1ab73ea40a716c13379be4", "text": "People have credit cards for various reasons depending upon their personal situation and uses You don't need to have a Credit Card if you don't have a reason to. But most people do.", "title": "" }, { "docid": "2786cbf4423fa30dc7a0d1cbed87a1a5", "text": "If you are in the U.S., without credit cards, you probably don't have a credit history. Without a credit history, you won't be able to get a loan/mortgage, and even if you do, you'll get it on very unfavorable terms. Depending on where you live you might even have great difficulty renting an apartment. So, the most important reason to have credit cards is to have a good credit score. People have already listed other advantages of having credit cards, but another thing that wasn't mentioned is fraud protection. Credit cards are better protected against fraud than debit cards. You probably shouldn't use debit cards online unless you must. Also, without a credit card or credit history, some simple and important liberties like renting a car while you are travelling might be denied to you. So, in conclusion, it's bizarre, but in modern America you need credit cards, and you need them bad.", "title": "" }, { "docid": "50b54ee0f2d50fba4547d1c2c497b452", "text": "A debit card takes the funds right from your account. There's no 'credit' issued along the way. The credit card facilitates a short term loan. If you are a pay-in-full customer, as I am, there's a cost to lend the money, but we're not paying it. It's part of the fee charged to the merchant. Thus the higher transaction cost.", "title": "" }, { "docid": "201215f5a28ef482514c43dc2665a62c", "text": "Early on, one might not be able to get credit for their business. For convenience, and the card perks, it makes sense to use the personal card. But for sake of a clean paper trail, I'd choose 1 card and use it exclusively, 100% for the business. Not one card here, one card there.", "title": "" }, { "docid": "2d2f8e0cbddaab8964e4cd5e7221ccf6", "text": "You must understand that not everyone has or can get credit cards. Consider that those who are in the the lowest 20-30% of income tend to have fewer credit cards (or none), and lower credit debt, although some have quite high credit card debt relative to their income. So you really aren't comparing the same demographics (the population of all income earners, used to calculate average income, and the population of all credit card debt holders, are not the same groups of people). Once you remove those folks from consideration, then credit card usage may still average higher, but accept that it is unusual for people making less than $20K-30K/year to have much credit card debt. You must understand that wealth and income are two very different (although related) concepts. One must note that there are millions of people in the U.S. who have wealth; they have net assets of over $1M (excluding their homes). Many of those folks have assets greatly exceeding $1M. And although it might seem foolish to carry a large balance on their credit cards, they may have quite low interest rates, and simply find it simpler and more convenient to use credit cards in lieu of personal loans. Suppose you have $2M in net assets, and want to buy a classic car or a diamond necklace. Charging $30K and carrying the balance until a dividend check arrives may make sense. Understand also that not everyone makes the same choices, or good choices. Carrying a credit card balance may appear like a poor choice, especially when you are not wealthy, or have lower income. But suppose you have a high credit limit across several cards, and you need to handle a short-term financial challenge (car repair, layoff, medical bills, etc). You might use the credit card to pay for that purchase, essentially financing an extraordinary event over a longer period of time. And although having a balance of more than 5-10% of your monthly income may seem foolish to some, it may make sense to others. And some people choose to carry balances of 50% to 100% of their credit limit. Others realize that keeping their credit utilization below 30%, 20%, or 10% of the credit limit is a better plan (both interest rate and risk wise).", "title": "" }, { "docid": "fd1e20b22fa6c68b8901990ba6ef6ff1", "text": "One thing that has not been pointed out as a disadvantage of using Credit Cards: people tend to spend more. You can see This Study, and this one, plus about 500 others. On average people tend to spend about 17% more with credit cards then with cash. This amount dwarphs any perks one gets by having a credit card. The safest way to use one is to only use them for purchases where you cannot make a decision to spend more. One example would be for utility bills (that don't charge a fee) or at the gas pump. Using them at Amazon might have you upgrade your purchase or add some extra items. Using them at restaurants might encourage you to order an extra drink or two. Using them at the coffee shop might have you super size your coffee or add a pastry. Of course this extra spending could lead you into a debt cycle exacerbating the financial hit many struggle with. Please tread carefully if you decide to use them.", "title": "" }, { "docid": "1c2e7a012cf98e72641115df9ad2d8bf", "text": "A few reasons make sense: They have a defined process for rentals, risk assessment, and customer credit. Especially for a large corporation, making changes to that process is not trivial, adds risk/uncertainty, and will be costly. Such changes for a relatively small customer base might not makes sense. Many rental companies DO allow you to rent with a debit card. Why do some businesses take cash only? With a debit card, there is no third party guarantee. With a credit card, the cash is coming from a well-established third party who will pay (assuming no disputes) and has a well-established history of paying. Even if the merchant holds your account, it is still your cash under the control of you and your bank until the deposit clears the merchants bank. It is not surprising they view that as more risk and potentially not worth hassling with debit.", "title": "" }, { "docid": "8b7deb81ad4a582eb5faa70ec1ea7087", "text": "\"I don't know, but I can guess. You'll notice the Elite card has higher rewards. A card might want to convince merchants that they represent high end buyers, and use that to negotiate higher merchant discounts. Issuing bank: \"\"Our 10 million card holders are sophisticated and have lots of discretionary income. If you don't agree to this rate, we'll terminate the contract and they will take their business elsewhere.\"\" Merchant: \"\"But it's twice the rate of everyone else! I'm sure these customers have other means of payment, and besides, how many of those card holders are actually using it?\"\" Issuing bank: \"\"Our cardholders signal their interest in the benefits of cardholding by paying us an annual fee. If they didn't want one, they'd stop paying right? They clearly know they have one and our records indicate they use them regularly. We're pretty sure if you don't wise up they'll shop at your biggest competitor, another client of ours. pause Frankly, they already do.\"\"\"", "title": "" }, { "docid": "2c2fadd0a3d14a203908b8eeb433eb2c", "text": "My view is from the Netherlands, a EU country. Con: Credit cards are more risky. If someone finds your card, they can use it for online purchases without knowing any PIN, just by entering the card number, expiration date, and security code on the back. Worse, sometimes that information is stored in databases, and those get stolen by hackers! Also, you can have agreed to do periodic payments on some website and forgot about them, stopped using the service, and be surprised about the charge later. Debit cards usually need some kind of device that requires your PIN to do online payments (the ones I have in the Netherlands do, anyway), and automated periodic payments are authorized at your bank where you can get an overview of the currently active ones. Con: Banks get a percentage of each credit card payment. Unlike debit cards where companies usually pay a tiny fixed fee for each transaction (of, say, half a cent), credit card payments usually cost them a percentage and it comes to much more, a significant part of the profit margin. I feel this is just wrong. Con: automatic monthly payment can come at an unexpected moment With debit cards, the amount is withdrawn immediately and if the money isn't there, you get an error message allowing you to pay some other way (credit card after all, other bank account, cash, etc). When a recent monthly payment from my credit card was due to be charged from my bank account recently, someone else had been paid from it earlier that day and the money wasn't there. So I had to pay interest, on something I bought weeks ago... Pro: Credit cards apparently have some kind of insurance. I've never used this and don't know how it works, but apparently you can get your money back easily after fraudulent charges. Pro: Credit cards can be more easily used internationally for online purchases I don't know how it is with Visa or MC-issued debit cards, but many US sites accept only cards that have number/expiration date/security code and thus my normal bank account debit card isn't useable. Conclusion: definitely have one, but only use it when absolutely necessary.", "title": "" }, { "docid": "4571505cd5e76a598b1090e109add091", "text": "\"A lot of credit card companies these days uses what they call \"\"daily interest\"\" where they charge the interest rate for the number of days till you pay off what you spent. This allows them to make more money than the \"\"period billing\"\". The idea of credit, theoretically, is that there isn't really a day when you can borrow without paying interest - in theory\"", "title": "" }, { "docid": "1eb37df8d834d9a541269b26ec8971da", "text": "\"Some features to be aware of are: How you prioritize these features will depend on your specific circumstances. For instance, if your credit score is poor, you may have to choose among cards you can get with that score, and not have much choice on other dimensions. If you frequently travel abroad, a low or zero foreign transaction fee may be important; if you never do, it probably doesn't matter. If you always pay the balance in full, interest rate is less important than it is if you carry a balance. If you frequently travel by air, an airline card may be useful to you; if you don't, you may prefer some other kind of rewards, or cash back. Cards differ along numerous dimensions, especially in the \"\"extra benefits\"\" area, which is often the most difficult area to assess, because in many cases you can't get a full description of these extra benefits until after you get the card. A lot of the choice depends on your personal preferences (e.g., whether you want airline miles, rewards points of some sort, or cash back). Lower fees and interest rates are always better, but it's up to you to decide if a higher fee of some sort outweighs the accompanying benefits (e.g., a better rewards rate). A useful site for finding good offers is NerdWallet.\"", "title": "" }, { "docid": "e784704c3b25e8a50f9d966eca4af8fc", "text": "The dollar is the reserve currency of choice because the full faith and credit of the US is big, liquid, and stable compared to any currently-available alternative. The Euro and Yuan are big enough to displace the dollar (and maybe the Yen), but any fears about the dollar being subject to fickle whims of politics and policy are significantly worse with those options.", "title": "" }, { "docid": "1a6eca859a7f7153d84029bc32cdfaff", "text": "There are numerous reasons that go beyond the immediate requirement for access to credit. Many people just plain don't like carrying cash. Before electronic debit cards became mainstream about the only way to pay for online services was with a credit card. This has now changed just about everywhere except a large number of airlines which still only sell online tickets via a credit card payment. And then there are all those countries where governments (and some banks) have decided to charge merchants more when customers use debit cards. If you don't like carrying cash then you may find that the only card you can use is a credit card. These concerns are gradually disappearing and at some stage someone is likely to offer a combined debit-credit card. At which point you'll probably get credit whether you like it or not.", "title": "" }, { "docid": "d905851f6af654a18f454d523e3f11ce", "text": "If we're including psychological considerations, then the question becomes much more complicated: will having a higher available credit increase the temptation to spend? Will eliminating 100% of a small debt provide more positive reinforcement than paying off 15% of a larger debt? Etc. If we're looking at the pure financial impact, the question is simpler. The only advantage I see to prioritizing the lower interest card is the float: when you buy something on a credit card, interest is often calculated for that purchase starting at the beginning of the next billing cycle, rather than immediately from the purchase date. I'm not clear on what policies credit card companies have on giving float for credit cards with a carried balance, so you should look into what your card's policy is. Other than than, paying off the higher interest rate card is better than paying off the lower interest rate. On top of that, you should look into whether you qualify for any of the following options (presented from best to worst):", "title": "" }, { "docid": "777609ebf107f439f7d88abfd8f47406", "text": "\"In the end, all these fees hurt the average consumer, since the merchant ultimately passes cost to consumer. Savvy consumers can stay at par or get ahead, if they put in the effort. It's a pain, but I rotate between 4 cards depending on time of year and type of purchase, to optimize cash back. My cards are: 1. 5% rewards card on certain categories, rotates each quarter 2. 2% travel/dining card (fee card, but I travel a bunch so it's worth it, no foreign transaction fees) 3. 1.5% rewards card for everything else 4. Debit card (swiped as a CC) for small purchases (i.e. lunches) at credit union for \"\"enhanced\"\" high interest checking account, requiring certain # swipes/month. This alone returns to me ~$800/yr.\"", "title": "" } ]
fiqa
b37f9dc5c1fed79c792009c54e8eb3a9
Confused about employee stock options: How do I afford these?
[ { "docid": "90512f4200d2dbfe7388c6c55dcfd14a", "text": "ISOs (incentive stock options) can be closed out in a cashless transaction. Say the first round vests, 25,000 shares. The stock is worth $7 but your option is to buy at $5 as you say. The broker executes and sells, you get $50,000, with no up front money. Edit based on comment below - you know they vest over 4 years, but how long before they expire? It stands to reason the longer you are able to hold them, the better a chance the company succeeds, and the price rises. The article Understanding employer-granted stock options (PDF) offers a nice discussion of different scenarios supporting my answer.", "title": "" }, { "docid": "fa4a0c6adca42d26c09ea9e94ba3ad8f", "text": "I've been offered a package that includes 100k stock options at 5 dollars a share. They vest over 4 years at 25% a year. Does this mean that at the end of the first year, I'm supposed to pay for 25,000 shares? Wouldn't this cost me 125,000 dollars? I don't have this kind of money. At the end of the first year, you will generally have the option to pay for the shares. Yes, this means you have to use your own money. You generally dont have to buy ANY until the whole option vests, after 4 years in your case, at which point you either buy, or you are considered 'vested' (you have equity in the company without buying) or the option expires worthless, with you losing your window to buy into the company. This gives you plenty of opportunity to evaluate the company's growth prospects and viability over this time. Regarding options expiration the contract can have an arbitrarily long expiration date, like 17 years. You not having the money or not isn't a consideration in this matter. Negotiate a higher salary instead. I've told several companies that I don't want their equity despite my interest in their business model and product. YMMV. Also, options can come with tax consequences, or none at all. its not a raw deal but you need to be able to look at it objectively.", "title": "" }, { "docid": "d41d8cd98f00b204e9800998ecf8427e", "text": "", "title": "" }, { "docid": "d7b4e34b04275f2d36fcb863c7e5b369", "text": "Stock options represent an option to buy a share at a given price. What you have been offered is the option to buy the company share at a given price ($5) starting a given date (your golden handcuffs aka vesting schedule). If the company's value doubles in 1 year and the shares are liquid (i.e. you can sell them) then you've just made $125k of profit. If the company's value has gone to zero in 1 year then you've lost nothing other than your hopes of getting rich. As others have mentioned, the mechanics of exercising the option and selling the shares can typically be accomplished without any cash involved. The broker will do both in a single transaction and use the proceeds of the sale to pay the cost of buying the shares. You should always at least cover the taxable portion of the transaction and typically the broker will withhold that tax anyways. Otherwise you could find yourself in a position where you have actually lost money due to tax being owed while the shares decline in value below that tax. You don't have to worry about that right now. Again as people have mentioned options will typically expire 10 years from vesting or 90 days from leaving your employment with the company. I'm sure there are some variations on the theme. Make sure you ask and all this should be part of some written contract. I'm sure you can ask to see it if you wish. Also typical is that stock option grants have to be approved by the board which is normally a technicality. Some general advice:", "title": "" }, { "docid": "b0359df06ef90d420150cbeabc9b9573", "text": "the short answer is: No. you do not HAVE to pay $125,000.00 at the end of your first year. that is only the amount IF you decide to exercise. *fine print: But if you leave or get let go (which happens quite frequently at top tier Silicon Valley firms), you lose anything that you don't exercise. you're basically chained by a pair of golden handcuffs. in other words, you're stuck with the company until a liquidation event such as IPO or secondary market selling (you can expect to spend a few years before getting anything out of your stocks) Now, it's hard to say whether or not to exercise at that time, especially given we don't know the details of the company. you only should exercise if you foresee your quitting, anticipate getting fired, AND you strongly feel that stock price will keep going up. if you're in SF bay, i believe you have 10 years until your options expire (at which point they are gone forever, but that's 10 years and usually companies IPO well within 7 years). i would recommend you get a very good tax advisor (someone that understands AMT and stock options tax loopholes/rules like the back of their hand). I'm going to take a long shot and assume that you got an amazing offer and that you got a massive amount of ISOs from them. so i'll give this as an advice - first, congrats on owning a lot on paper today if you're still there. you chose to be an early employee at a good tech company. However, you should be more worried about AMT (alternative min tax). you will get enslaved by the IRS if you exercise your shares and can't pay the AMT. suppose, in your fictional scenario, your stock options increase 2x, on paper. you now own $1 Mil in options. but you would be paying $280000 in taxes if you chose to exercise them right now. Now, unless you can sell that IMMEDIATELY on the secondary market, i would highly advise you not to exercise right now. only exercise your ISOs when you can turn around and sell them (either waiting for IPO, or if company offers secondary market approved trading).", "title": "" } ]
[ { "docid": "e9619275e16102219ffacde6ce2da256", "text": "Par value SHOULD mean that they are offering you the options with a strike price (exercise price) that is equivalent to the current valuation of the company. Note I said SHOULD. As long as you can confirm with HR (or if you're small enough, just ask the CEO) that your grant price is the same as the current valuation of the company's shares, then things are straight. And while it's very unlikely that someone is doing Something Sneaky, it's always possible. As a reference, my recent grant letter said: [Company] (the “Company”) hereby grants you the following Option to purchase shares of its common stock (“Shares”). The terms and conditions of this Option are set forth in the Stock Option Agreement and the [Company] 2013 Stock Incentive Plan (the “Plan”), both of which are attached to and made a part of this document.", "title": "" }, { "docid": "76ba232784fe8f7278b91b3212d6596d", "text": "You didn't give enough information. What is your goal? What is your financial situation? A discount to buy company stock can seem very tempting. I was tempted by it myself, gee, almost 20 years ago. I still own some of the stock. But I held mutual funds first. There are two disadvantages that have disuaded me from partaking in the ESPP of my subsequent employers (one of which was a spin-out company of the stock-issuing company, the other having bought the spin-out). First, putting a bunch of money in a single stock is rather risky. single stocks will drop dramatically due to market conditions. Generally market conditions don't act so dramatically on all stock. Second, is it wise to put not only your salary but also your saved wealth all in one basket? It worked out reasonably well for me. The stock doubled right before my division was spun out -- I sold half of my position. And the resulting stock has continued to provide opportunities to diversify. However, it could have just as easily dropped in half instead of doubled. What is your timeline for holding the stock -- for realizing any gain? Can you afford patience if the stock value should drop in half? I have co-workers who continue to invest through our new company's ESPP. At least one co-worker has the stated goal to sell after every purchase -- he holds the stock long enough to make a long-term gain instead of short term, but he sells after every purchase. And it seems to him that the stock always drops right when he wants to sell.", "title": "" }, { "docid": "a67a6ab7b645e0b531b9bf3203845161", "text": "\"You might consider working on getting your new employer to sponsor a 401k, there may be options where you can invest and they aren't required to add anything as a match (which gives you higher limits). If they don't match, they may just be liable for some administration fees. If you have any side business that you do, you might also be eligible for other \"\"self-employed\"\" options that have higher limits (SEP, Simple - I think they may go up to $15k) although, I'm not sure the nitty gritties of them.\"", "title": "" }, { "docid": "59124ea66bbedf0f81f3198152140671", "text": "I don't know what restrictions are put on the average employee at your company. In my case, we were told we were not permitted to either short the stock, or to trade in it options. That said, I was successful shorting the exact number of shares I'd be buying at the 6 month close, the same day the purchase price would be set. I then requested transfer of the stock purchase to my broker where the long and short netted to zero. The return isn't 15%, it's 100/85 or 17.6% for an average 3 months they have your money. So do the math on APR. (Higher if the stock has risen over 6 months and you get the lower price from 6 months prior.) My method was riskless, as far as I am concerned. I did this a dozen times. The stock itself was +/- 4% by the time the shares hit, so in the end it was an effort, mostly to sleep better. I agree with posts suggesting the non-zero risk of a 20% 4 day drop.", "title": "" }, { "docid": "58fee466a1611be7e3a36f466ff3a5b7", "text": "\"Equity could mean stock options. If that's the case if the company makes it big, you'll have the option to buy stocks cheap (which can then be sold at a huge profit) How are you going to buy those without income? 5% equity is laughable. I'd be looking for 30-40% if not better without salary. Or even better, a salary. To elaborate, 5% is fine, and even normal for an early employee taking a mild pay cut in exchange for a chance at return. That chance of any return on the equity is only about 1/20 (94% of startups fail) There is no reason for an employee to work for no pay. An argument could be made for a cofounder, with direct control and influence in the company to work for equity only, but it would be a /lot/ more (that 30-40%), or an advisory role (5% is reasonable) I also just noticed you mentioned \"\"investing\"\" in the startup with cash. As an angel investor, I'd still expect far more than 5%, and preferred shares at that. More like 16-20%. Read this for more info on how equity is usually split.\"", "title": "" }, { "docid": "e03ee94d9b1ed2237199cb7764bd1908", "text": "Does this technically mean that she has to pay AMT on $400,000? Yes. Well, not exactly 400,000. She paid $1 per share, so 390,000. And if so, is %28 the AMT for this sum? (0.28 * $400,000 = $112,000)? Or does she have to include her salary on top of that before calculating AMT? (Suppose in the fake example that her salary is $100,000 after 401k). All her income is included in calculating the AMT, minus the AMT exemption amount. The difference between the regular calculated tax and the calculated AMT is then added to the regular tax. Note that some deductions allowed for the regular calculation are not allowed for the AMT calculation. How does California state tax come into play for this? California has its own AMT rules, and in California any stock option exercise is subject to AMT, unless you sell the stock in the same year. Here's a nice and easy to understand write up on the issue from the FTB. When would she have to pay the taxes for this huge AMT? Tax is due when income is received (i.e.: when you exercise the options). However, most people don't actually pay the tax then, but rather discover the huge tax liability when they prepare to submit their tax return on April 15th. To avoid that, I'd suggest trying to estimate the tax and adjust your withholding using form W4 so that by the end of the year you have enough withheld. Suppose in the worst case, the company goes completely under. Does she get her massive amounts of tax back? Or if it's tax credit, where can I find more info on this? That would be capital loss, and only up to $3K a year of capital loss can be deducted from the general income. So it will continue offsetting other capital gains or being deducted $3K a year until it all clears out. Is there any way to avoid this tax? (Can she file an 83b election?) You asked and answered. Yes, filing 83(b) election is the way to go to avoid this situation. This should be done within 30 days of the grant, and submitted to the IRS, and a copy attached to the tax return of the grant year. However, if you're considering exercise - that ship has likely sailed a long time ago. Any advice for Little Susie on how she can even afford to pay that much tax on something she can't even sell anytime soon? Don't exercise the options? Should she take out a loan? (e.g. I've heard that in the extreme case, you can find angel investors who are willing to pay all your taxes/strike price, but want 50% of your equity? I've also heard that you can sell your illiquid shares on SecondMarket?) Is she likely to get audited by IRS for pulling something like this? You can take a loan secured by shares you own, there's nothing illegal in it. If you transfer your shares - the IRS only cares about the taxes being paid, however that may be illegal depending on the terms and the conditions of the grant. You'll need to talk to a lawyer about your situation. I suggest talking to a licensed tax adviser (EA/CPA licensed in your State) about the specifics concerning your situation.", "title": "" }, { "docid": "43f5f0ff7d12fa5c9f382dac08ecce0f", "text": "The broker that is issuing the moneys after vesting is more than likely deducting a notional amount of tax and NI based on UK income tax laws. If you are not a UK resident, then you should pay income tax on those stock options based on your own tax residency. Best thing to do is speak directly with the broker to explain the situation, ask them to not deduct anything from your stock options - but keep in mind that you will need to declare these earnings yourself and pay the correct rate of tax. From my own personal experience, the UK employer more than likely receives the net value (after the notional tax and NI have been deducted) and in usual circumstances create a tax liability on your payslip (if you were working and had earnings). If of course this deduction is being made by the employer, then you can simply ask them to correct this (most UK payroll software will automatically deduct tax and NI for payments after leaving unless manually intervened, so they probably aren't aware if it is them doing so).", "title": "" }, { "docid": "c356e65fae1f20d399d29664a93e6301", "text": "Here's the best explanation I found relating to why your T4 box 39 might not have an amount filled in, even when box 38 has one: Department of Finance – Explanatory Notes Relating to the Income Tax Act [...]. It's a long document, but here's the part I believe relevant, with my emphasis: Employee Stock Options ITA 110(1) [...] Paragraph 110(1)(d) is amended to include a requirement that the employee [...] exercise the employee’s rights under the stock option agreement and acquire the securities underlying the agreement in order for the deduction in computing taxable income to be available [...] ensures that only one deduction is available in respect of an employment benefit. In other words, if employee stock option rights are surrendered to an employer for cash or an in-kind payment, then (subject to new subsections 110(1.1) and (1.2)) the employer may deduct the payment but the employee cannot claim the stock option deduction. Conversely, where an employer issues securities pursuant to an employee’s exercise of stock options, the employer can not deduct an amount in respect of the issuance, but the employee may be eligible to claim a deduction under paragraph 110(1)(d). Did you receive real shares based on your participation in the ESPP, or did you get a cash payment for the net value of shares you would have been issued under the plan? From what I can tell, if you opted for a cash payment (or if your plan only allows for such), then the part I emphasized comes into play. Essentially, if conditions were such that your employer could claim a deduction on their corporate income tax return for the compensation paid to you as part of the plan, then you are not also able to claim a similar deduction on your personal income tax return. The money received in that manner is effectively taxed in your hands the same as any bonus employment income would be; i.e. it isn't afforded tax treatment equivalent to capital gains income. Your employer and/or ESPP administrator are best able to confirm the conditions which led to no amount in your box 39, but at least based on above you can see there are legitimate cases where box 38 would have an amount while box 39 doesn't.", "title": "" }, { "docid": "e5596aaa914b3cd07b025cc9086d4f7a", "text": "\"An option is a financial instrument instrument that gives you the right, but not the obligation, to do some transaction in the future at a given price. An employee stock option is a kind of \"\"call option\"\" -- it gives you the right, but not the obligation, to buy the stock at a certain price (the \"\"exercise price\"\", usually set as the price of the stock when the option was granted). The idea is that you would \"\"exercise\"\" the option (buy the stock at the given price as provided by the option), if the value of the stock is higher than the exercise price, and not if it is lower. The option is gifted to you. But that does not mean you get any stock. If and when you choose to exercise the option, you would buy the stock with your own money. At what time you can exercise the option (and how many shares you can exercise at a given time) will be specified in the agreement. Usually, you can only exercise a particular share after it has \"\"vested\"\" (according to some vesting schedule), and you lose the ability to exercise after you no longer work for the company (plus perhaps a grace period), or after the option expires.\"", "title": "" }, { "docid": "a9a386b0ff469670b9d2e0c2463f5e34", "text": "You probably will not find to many places if any that give you live quotes on options because for the general public there is not that high of a demand. Most people do not even know what stock options are. You can get update on some sites like CNBC, but you will have refresh constantly to get the latest option prices. You can also try an online broker, most of whom will let you have access to their tools and quotes if you sign up for an account. Some require a deposit before you can access those tools and some don't. Personally, I use TD Ameritrade and I do not believe they require a deposit to use their tools, but don't quote me on that.", "title": "" }, { "docid": "9a9d932f7e317e965f944a41ec48a41d", "text": "I can make that election to pay taxes now (even though they aren't vested) based on the dollar value at the time they are granted? That is correct. You must file the election with the IRS within 30 days after the grant (and then attach a copy to that year's tax return). would I not pay any taxes on the gains because I already claimed them as income? No, you claim income based on the grant value, the gains after that are your taxable capital gains. The difference is that if you don't use 83(b) election - that would not be capital gains, but rather ordinary salary income. what happens if I quit / get terminated after paying taxes on un-vested shares? Do I lose those taxes, or do I get it back in a refund next year? Or would it be a deduction next year? You lose these taxes. That's the risk you're taking. Generally 83(b) election is not very useful for RSUs of established public companies. You take a large risk of forfeited taxes to save the difference between capital gains and ordinary gains, which is not all that much. It is very useful when you're in a startup with valuations growing rapidly but stocks not yet publicly trading, which means that if you pay tax on vest you'll pay much more and won't have stocks to sell to cover for that, while the amounts you put at risk are relatively small.", "title": "" }, { "docid": "727f9d5e9d8d2eeb662eb94345ef72a2", "text": "It would depend on the health insurance that was being offered, and if it covers your family or just you. We pay around $500-600 for individual health insurance for our employees (families cost north of 1500 a month). It's extremely expensive. Provide more details on the stock purchase plan as well (it sounds to me like in that case you'd only be getting for free what it would cost to purchase the stock... but that's only $10-15, so negligible in this case.)", "title": "" }, { "docid": "d566ddfa53fc8dedee7b7add94e91ae5", "text": "I'm guessing you're talking about options given to employees. The company can issue stock options at whatever strike price it wants. The difference between the strike price and the actual market value is considered income to the employee. You can get the options at $0 strike just as well (although companies generally just give RSUs instead in this case).", "title": "" }, { "docid": "8dd55b46d9c07218fb9f8baf97aa6c57", "text": "There is Free employer money on both sides of the tax fence for some employees. On the pretax side, your employer may provide you a match. If so, invest the maximum to get 100% of the match. On the after tax side, many companies offers a 15% discount on ESPP plans and a one year hold. My wife has such an employer. The one year hold is fine because it allows us to be taxed at Long Term Capital gains if the stock goes up which is lower than our current income bracket. After creating a seasoned pool of stocks that we could sell after the one year hold, we are then able to sell the same number of stocks purchased each month. This provides a 17.6% guaranteed gain on a monthly basis. How much would you purchase if you had a guaranteed 17.6% return. Our answer is 15% (our maximum allowed). The other trick is that while the employer is collecting the money, you will purchase the stock at the lowest day of the period. You will usually sell for even more than the purchase price unless the day purchased was the lowest day of month. The trick is to reinvest the money in tax free investments to balance out the pretax investing. Never leave the money in the plan. That is too much risk.", "title": "" }, { "docid": "e0cf8987983f00b374283d45b82fb262", "text": "You're right about FICA (I forgot it is calculated on gross income and not Adjusted Gross Income). State tax rate in that bracket still should be nominal or zero depending on the state. Sales tax... things cost what they cost. &gt; Regardless, 70% of minimum wage isn't enough to cover a car, a child, a good vacation, a serious health care problem, an aging parent, or a modest retirement. Social safety nets are impossible to address via a minimum wage. You could make the minimum wage $30/hr and some people will still become bankrupt by our ridiculous healthcare system. Why not lobby for single-payer healthcare and a universal basic income like $1000/mo/adult and $500/mo/child?", "title": "" } ]
fiqa
29a8004cda07f265c3fbb072e6501c70
In debts now, help please
[ { "docid": "d41d8cd98f00b204e9800998ecf8427e", "text": "", "title": "" } ]
[ { "docid": "f2915cb9b142bf04bbcd136953fe594a", "text": "Sounds like you are stuck. These are your options: increase limit Not going to happen. You said you don't qualify. You also won't convince them to let you access more borrowing power by arguing that you can't pay now. No responsible lender would take that bet. negotiate balance Unlikely. This sounds like mostly real debt, not fees. They generally won't write off real debt except if you are in default. They will only negotiate if they think you can't pay. Note that this will probably hurt your credit, as they will report that you didn't pay your debt. pay down balance This is your best and only real option. If you can't afford to pay down the balance you can't afford to borrow more. I am sorry for your situation; it is frustrating. I know how that feels. It is a textbook example of the risk associated with debt. Even if you plan to pay the balance every month, when the unexpected happens, you pay the price.", "title": "" }, { "docid": "a4e009c73344d99ad5fc4c8dfe63a334", "text": "\"I would start with actually talking to the collection agency. Say what you are saying here, namely: \"\"I'm willing to pay the debt if the creditor can prove to me that I owe them\"\". You can also talk to the health facility, ask them for information or records. You can start there and see what happens. Once you are ready to pay the debt you can negotiate to have the negative mark removed from your report. It really depends on the collection agency. They could be reasonable, or the could be total scum.\"", "title": "" }, { "docid": "72e2e3bd0a931dda40a1442c0e0377b4", "text": "This is a junk article with a junk assumption. We have higher levels of debts today, but we have low rates of defaults. We don't have NINJA loans coming to an end in 6 months where the default rate suddenly doubles and triples. We don't have massive amounts of swaps against mortgages or even other forms of private debt skyrocketing. Moody's and S&amp;P review process was totally revamped. If this article could get beyond basic theory and talk about specifics, it might be able to make a point, but instead it lost me after 2 paragraphs.", "title": "" }, { "docid": "4864753b99d7a96b7700b749d5cb8693", "text": "The solution to this problem is somewhat like grading on a curve. Use the consumption ratio multiplied by the attendance (which is also a ratio, out of 100 days) to calculate how much each person owes. This will leave you short. Then add together all of the shares in a category, determine the % increase required to get to the actual cost of that category, and increase all the shares by that %.", "title": "" }, { "docid": "a4d4d17abf7f4bb3f36468d46080dd2e", "text": "You should check out Dave Ramsey's Baby Steps. He has an great and well organized plan for getting out of debt and building wealth. My wife and I have followed the plan and will be paying off our home this year :) His advice on debt payments is to pay off the smallest balance first. This helps motivate you and your husband to push harder on your debts. Once the first pay is paid the money that would have gone to that debt is applied to the next smallest debt and so on. This is called a 'debt snowball' since by the end you will have plenty of money to pay that last few debts. While working on the smallest debt, making minimum payments on the others. Stop using the credit cards entirely! Don't use gimmicks to avoid facing the reality of the debt. Close your accounts and commit to never borrowing money again. This is a huge physiological shift. I used credit cards all the time for decades, that is a thing of the past for us, we pay cash or don't buy it. In your case, paying the 80% interest loan off is likely to be priority. I didn't even realize that was legal. Hopefully that is also the smallest balance. Start making a monthly budget and sticking to it. Check out Dave's 'irregular income' budget form, it is meant for couples in your situation. The first steps will be to pay food, rent, utilities and transportation. After that, list your debts in priority order and pay them as your husbands income comes in during the month. Don't despair, you two can get your financial life cleaned up! You just need a good plan and a lot of focus.", "title": "" }, { "docid": "1be62a1bbc7695255cb471e43e3333d2", "text": "\"Congratulations on earning a great income. However, you have a lot of debt and very high living expenses. This will eat all of your income if you don't get a hold of it now. I have a few recommendations for you. At the beginning of each month, write down your income, and write down all your expenses for the month. Include everything: rent, food, utilities, entertainment, transportation, loan payments, etc. After you've made this plan for the month, don't spend any money that's not in the plan. You are allowed to change the plan, but you can't spend more than your income. Budgeting software, such as YNAB, will make this easier. You are $51,000 in debt. That is a lot. A large portion of your monthly budget is loan payments. I recommend that you knock those out as fast as possible. The interest on these loans makes the debt continue to grow the longer you hold them, which means that if you take your time paying these off, you'll be spending much more than $51k on your debt. Minimize that number and get rid of them as fast as possible. Because you want to get rid of the debt emergency as fast as possible, you should reduce your spending as much as you can and pay as much as you can toward the debt. Pay off that furniture first (the interest rate on that \"\"free money\"\" is going to skyrocket the first time you are late with a payment), then attack the student loans. Stay home and cook your own meals as much as possible. You may want to consider moving someplace cheaper. The rent you are paying is not out of line with your income, but New York is a very expensive place to live in general. Moving might help you reduce your expenses. I hope you realize at this point that it was pretty silly of you to borrow $4k for a new bedroom set while you were $47k in debt. You referred to your low-interest loans as \"\"free money,\"\" but they really aren't. They all need to be paid back. Ask yourself: If you had forced yourself to save up $4k before buying the furniture, would you still have purchased the furniture, or would you have instead bought a used set on Craigslist for $200? This is the reason that furniture stores offer 0% interest loans. They got you to buy something that you couldn't afford. Don't take the bait again. You didn't mention credit cards, so I hope that means that you don't owe any money on credit cards. If you do, then you need to start thinking of that as debt, and add that to your debt emergency. If you do use a credit card, commit to only charging what you already have in the bank and paying off the card in full every month. YNAB can make this easier. $50/hr and $90k per year are fairly close to each other when you factor in vacation and holidays. That is not including other benefits, so any other benefits put the salaried position ahead. You said that you have a few more years on your parents' health coverage, but there is no need to wait until the last minute to get your own coverage. Health insurance is a huge benefit. Also, in general, I would say that salaried positions have better job security. (This is no guarantee, of course. Anyone can get laid off. But, as a contractor, they could tell you not to come in tomorrow, and you'd be done. Salaried employees are usually given notice, severance pay, etc.) if I were you, I would take the salaried position. Investing is important, but so is eliminating this debt emergency. If you take the salaried position, one of your new benefits will be a retirement program. You can take advantage of that, especially if the company is kicking in some money. (This actually is \"\"free money.\"\") But in my opinion, if you treat the debt as an emergency and commit to eliminating it as fast as possible, you should minimize your investing at this point, if it helps you get out of debt faster. After you get out of debt, investing should be one of your major goals. Now, while you are young and have few commitments, is the best time to learn to live on a budget and eliminate your debt. This will set you up for success in the future.\"", "title": "" }, { "docid": "28c6cc9a74f97a27a5f7817684f46d7b", "text": "Hi everyone, i am Chloe Raymond am so glade coming back to this great forum to testify about the help i received from Chester Brian. I was in desperate need of a loan in other to be free from debt and financial bondage that was place on me by my ex husband. It was really bad that i have to seek for help from Friends,family and even my bank but on one could assist me because my credit score was really bad. So i was browsing with my computer and saw some testimonies from people Chester Brian assisted with a loan, then i decided to contact him on his email brianloancompany@yahoo.com, then i received a mail from them and i did all that was asked from me. To my greatest surprise they transferred to my account the loan i requested and now i am so happy clearing my debt and have also started a business with the remaining amount to take care of myself and family. If you need a loan do contact the best loan lender of all time Chester Brian on his email: BRIANLOANCOMPANY@YAHOO.COM or Call/Text +1(803) 373-2162", "title": "" }, { "docid": "a748c72319b11d29b9f2511b98c9240c", "text": "If you want to work within that constraint, then I sincerely suggest you find a credit councilor. It may take you a while to dig out of debt, but with a little help from someone that knows the ropes, you can do it! Remember, even though you want to pay back those debts, many times the sky-rocketing interest rates work against you. Most of the good councilors know how to work the system to get these rates reduced, and sometimes even get the interest you've already accumulated reduced.", "title": "" }, { "docid": "7e0a8b11e1ce78276cfa13263148684d", "text": "Keep in mind collectors are trying to get you to react emotionally, which is having some effect as you are considering bankruptcy. ...threatening me with judgments... Did they threaten to take away your first born son too? Many of their threats are empty. Even if you do have a judgement, you may be able to negotiate with the lawyer that is handling the judgement. Once you don't pay them anything for a few years, they are more likely to negotiate. It is good that you recognize that it was your dumb decisions that got you into this mess. Once on the other side of all this cleaning up that you have to do what will you change so this does not happen again? What raises a red flag for me is that you are worried about your credit score. Trying to have a good credit score is what got you into this mess in the first place. Stop borrowing.", "title": "" }, { "docid": "c76c537c10d05e90300318e418723b26", "text": "Pay down cc debt asap, take your time on your student debt, it's low and you can write the interest off related to it. If your a teacher maybe you can get it forgiven. But you borrowed from your future self when you younger so ya you gotta start living reasonable.", "title": "" }, { "docid": "3d4199c0128572c50ece971a7a9078e1", "text": "\"If you're looking for an analogy or exercise, I saw a personal finance show that had people climb stairs, with the debt as weight. Every flight of stairs more \"\"interest\"\" and loans to cover income gaps have to be added to the total debt they carry up the stairs. Can't find the video online though. But I think you need to ask your brother what he thinks his problem is, that will be solved with more loans. It's likely that your brother's problem can't be solved with advice. Since he's not spending rationally, rational arguments have no sway. I suspect he'll tell you his problem is one or two angry creditors, perhaps even ones you don't know about, rather than a fundamental imbalance between income and expenses. Robbing Peter to pay Paul, or moving weights from one backpack compartment to another, doesn't solve the underlying problems. Whatever you do, another loan from you should be off the table. He's an adult now, with problems the size of which you can't help with. We both know how his story ends: all creditors cut him off, and he's in court over garnished wages and creditors fighting over his assets. Reality is the only argument that will have any sway. He's far too personally invested in his scheme to admit defeat, which is why neither words not images nor moving pictures will help him with this learning disability.\"", "title": "" }, { "docid": "162ef645bed4bd15997a86978699716f", "text": "I would sit down with the creditors and negotiate smallest amount you can get before agreeing with whatever you have to pay. Think that, for them, it's much more convenient to get way less than $36K than to see you in collections. Needless to say, don't tell them you have to money to cancel off :-)", "title": "" }, { "docid": "3a63d03786cd064808fb119a8a7f559e", "text": "\"You should hire a lawyer. The fact that they told you your personal information shows that they actually had it, and are not imposters, which is a good thing. The fact that they mislead you means that their intentions are not pure (which is not surprising coming from a collection agency of course). When dealing with collections (or any matter of significance for that matter), don't rely on their recording of the call, because they can always conveniently lose it. Make sure to write down every single detail discussed, including the date and time of the call, and the ID/name of the person on the other side. If possible - make your own recording (notifying them of it of course). It's too late to record the calls now, but do try to reconstruct as much information as possible to provide to your lawyer to deal with it. In the end of the day they will either provide you with the recording (and then you might be surprised to hear that what they said was not in fact what you thought they said, and it was just your wishful thinking, it is very possible to be indeed the case), or claim \"\"we lost it\"\" and then it will be a problem to either of you to prove who said what, but they'll have the better hand (having better lawyers) in convincing the court that you're the one trying to avoid paying your debts. That is why proper representation at all stages is important. As to the bankruptcy - it won't help for student loans, student loans is one of the very few types of debts you can't really run away from. You have to solve this, the sooner the better. Get a professional advice. For the future (and for the other readers) - you should have gotten the professional advice before defaulting on these loans, and certainly after the first call.\"", "title": "" }, { "docid": "952ca1d90bac05577db80d5258d82c06", "text": "\"Never forget that student lenders and their collection agencies are dangerous and clever predators, and you, the student borrower, are their legal prey. They look at you and think, \"\"food.\"\" My friend said she never pays her student loans and nothing has happened. She's wrong. Something has happened. She just doesn't know about it yet. Each unpaid bill, with penalties, has been added to the balance of her loan. Now she owes that money also. And she owes interest on it. That balance is probably building up very fast indeed. She's playing right into the hands of her student lender. They are smiling about this. When the balance gets large enough to make it worthwhile, her student lender will retain an aggressive collection agency to recover the entire balance. The agency will come after her in court, and they are likely to win. If your friend lives in the US, she'll discover that she can't declare bankruptcy to escape this. She has the bankruptcy \"\"reform\"\" act of 2006, passed during the Bush 43 regime, to thank for this. A court judgement against her will make it harder for her to find a job and even a spouse. I'm not saying this is right or just. I believe it is wrong and unjust to make university graduates into debt slaves. But it is true. As for being paid under the table, I hope your friend intends on dying rather than retiring when she no longer can work due to age. If she's paid under the table she will not be eligible for social security payments. You need sixteen calendar quarters of social security credit to be eligible for payments. I know somebody like this. It's a hell of a way to live, especially on weekends when the local church feeding programs don't operate. Paying people under the table ought to be a felony for the business owner.\"", "title": "" }, { "docid": "77309dc2d98d3e74a6560ec7f0ea4887", "text": "\"I don't understand what are the apples and the oranges in them equation above. Also, how do we \"\"assign more money into the system to represent added value in the system?\"\". This is the crux of the matter. Currently, it's gov't debt, as far as I can see. I'm really interested in where else it might come from, and would love to hear your answer.\"", "title": "" } ]
fiqa
7834e537b15beaac34913803b5283afb
Buying my first car out of college
[ { "docid": "09c321175805a970c8bb8b63efec14cf", "text": "You're looking at a used car, which is good, but I think you can still be much wiser with the type of car you're looking to purchase. Maybe I'm such a fuddy-duddy because I didn't own a car until I was 25, but let's break this down with a small comparison: If you drive 1,000 miles per month with gas at $4/gallon -- which is absurdly conservative, I think -- for five years, then you're looking at an extra $60/month for just gas, and probably twice the payment, compared with a perfectly reliable but more fuel-efficient car from the same year. (Disclosure: I own a 2004 Corolla and love it. I got mine in 2007 for under $10k, and I paid cash.) $300/month or so is a good chunk of change, no? I'd do even more, and pay that loan off (which will almost certainly be less than $500/month) faster by throwing $500/month at it. You'll save hundreds of dollars in interest. Edit based on your additions: There's one thing that you don't see yet that I have. It's only because you're in your early 20s and I'm pushing 40. It is far easier to sock money away when you're single and don't have a family to take care of. (I'm assuming you're not married yet and that you don't have kids. Hopefully it's not a poor assumption.) I would be saving like crazy now if I were in your position. You have a great job for fresh out of college. My first job started ten years ago after grad school at the same salary you're making. Man, it was so easy to save money back then. Now that I'm married with a daughter, a lot of that cushion goes away. I wouldn't trade it for the world, but that's the price of being head of household. If you have any intentions of not being a hermit for the rest of your life (and I hope you do) then you'd be wise to save as much as you can now.", "title": "" }, { "docid": "5edb07a608b5d2a227f966321bf0d408", "text": "Generally speaking, buying a fancy new car out of college is dumb. Buying a 3 year old flashy car with a 60 month loan is going to eat up your income, and when the thing starts breaking down, you'll get sick of buying $900 mufflers and $1,000 taillights pretty quickly. Buy a car that nobody wants for cheap and save up some money. Then buy yourself your dream car. Edit based on question update. You're posting to a Q&A site about money, and you're asking if spending over $30k (don't forget taxes) on a luxury car when you're making $60k is a good idea. You have car fever, and you're trying to sell this transaction as a good deal from a financial POV. At the end of the day, there is no scenario where buying an expensive car is a good financial transaction. For example, since you're planning on driving too many miles for a lease to make sense, the certified pre-owned warranty is a non-factor, because you'll have no warranty when the car breaks down in 4 years. The only reason CPO programs exist is to boost residual values to make leases more attractive -- luxury car makers are in the car leasing (as opposed to selling) business.", "title": "" }, { "docid": "18043ee5cf930795164a895c41105ba0", "text": "I've seen this approach to buying/funding cars described in a couple of different ways over the years. Random thoughts:", "title": "" }, { "docid": "4e8d9fb6ce0fc7139a73e1ff8f7a3d83", "text": "\"DO NOT buy this car. First, I want to say I love BMW's. There's a reason why they call them \"\"ultimate driving machine\"\" and why other car manufacturers compare their new models to BMWs. I own 330i and I absolutely love it. Every time you get into the car, it just begs you to push and abuse it. Everything from steering response to throttle to engine sound. Awesome car. However... 1) BMW is not known for their reliability. I've had to do numerous things to this car and if I didn't do the work myself (i like tinkering with cars), it would be a pretty big money pit (and actually still is). German parts are more expensive then regular cars. Labor will run you if you take it for service. Right now my car is on jack stands while I'm fixing an oil leak, replacing cooling system components which are known to fail and doing work with the cam timing system which uses bad seals. 2) If you buy a used car which is 3 years old, just remember all the wearable items and everything that wants to break, will break 3 years sooner on you. Someone else already pre-enjoyed your car's maintenance-free days. At 60k-80k things will start to go. Ask me how I know. So you'll start paying for maintenance way before your 5-year loan expires. Compare this 330i to the Acura Integra I used to have. Acura (aka Honda) had 194k miles when I sold it and I NEVER ONCE got stranded with the Acura. 3) Fuel economy is not that good and btw you have to use the most expensive gas. 4) If you are really set on buying a BMW because you enjoy driving and won't drive like an old lady (my apologies to those old ladies that drive at least the speed limit, but you are not the majority), then still do not by this one and check out auctions. I bought my 2003 330i in 2005 for 21k when it cost over 40k new. You could probably find one with less than 20k miles on it. My final advice is either a) learn to at least do basic maintenance or b) stick to always buying new cars which don't have any issues in first 4-7 years, then move on before you have to schedule your life around your cars. on the bright side I doubt you'll have to ever replace the exhaust and you can buy tail lights on e-bay for roughly $60 :)\"", "title": "" }, { "docid": "5df9cb5094317ea60680919f6138a859", "text": "\"Read \"\"Stop Acting Rich\"\" by Dr Thomas Stanley. I'm concerned that even before you've earned your first paycheck you want a flashy car. $4800/yr on $63K/yr income is just about half what I'd recommend to someone who starts working. 10% is the minimum, if and only if, the employer matches 5, for a total 15% saved. Do it in a pretax account and when you go back to grad school convert to Roth.\"", "title": "" }, { "docid": "f53e7860ba48e7461c301a161d1047e8", "text": "\"You have a job \"\"lined up\"\". What if it falls through? Then you have to sell your fancy car, and you are back to scare, apart from the dough you owe your dad. For consumption items, live within your means. A cheap first car is just fine. Spend cash where it brings you more cash.\"", "title": "" }, { "docid": "d41d8cd98f00b204e9800998ecf8427e", "text": "", "title": "" }, { "docid": "e7764d09011276e2aa91d47d534938a2", "text": "I agree with the consensus as far as getting a cheaper car, paying with cash, getting a more fuel efficient car, etc. But I'd like to point out, you should make sure you really need a car at all. I ride a bike to work! If I need a car, I can use Zipcar or City Car Share or borrow a friend's car, rent a car, take the train, ride a bus, walk. But mostly, ride my bike. Burn fat not gasoline! ;)", "title": "" }, { "docid": "fb616d5c5f1c022f015021145bd3b002", "text": "Think about it. IF you save $15K by buying a Honda or a Mazda, you can invest those money at modest 5% average, you'll have over 60K before you retire, which allows you to retire at least a year earlier.... So it is worth working an extra year in your life to have a fancier car? And that's a conservative investment.", "title": "" }, { "docid": "c8a13d1d2f77b5cb831f069092c0915a", "text": "\"I support the strategy to buy a less expensive car at the outset and then save for that more expensive car. You mentioned that you would be able to save $9000 by the time you had to start making payments. That sounds like a great budget for car shopping. For $9k you can get a dependable used car. If you find the right high-yield savings account you can get around 2% on your $500/month direct deposit. That's a difference of about 5% when you add in the 2.9% interest that you would have been paying on the loan. (You can't find such a low risk investment that would yield 5% these days.) Also, at that rate (2%) you would have $27k saved up in less than 52 months, or over $31k in 60 months. Then you could buy a BMW with cash! And I'm sure they would give you a cash discount. Alternatively you could be just finishing paying off the loan and might already be looking at the next car you'll take a loan out for. The point is not that you have to completely deprive yourself for the rest of your life. But by not taking out a loan you were certainly come out ahead in 5-10 years time. Also, one common mistake that new grads make is thinking that they are rich right out of college. Yes, you definitely have a nice salary and \"\"could afford it\"\" by most people's standards. I have a coworker that graduated and started work a year ago. He first bought a brand new Subaru. Why Subaru I do not know, but that is what he thought he wanted. After driving the car for a few months he decided for a few reasons that it was not what he wanted. So he sold the car (for a loss) and bought a slightly used Nissan Z. He has since decided that he needs a more practical car for day to day driving to minimize the abuse that his Z takes. So he has bought another car. This time a low budget Honda. Had he started with a low budget car he could be driving the same car to work right now, but have a good chunk of savings for a new car instead of a loan and a car that he drives only occasionally.\"", "title": "" }, { "docid": "f028b282c4a97df20f910fc24ba2eed1", "text": "Buy the BMW and enjoy it. An MBA? Now that is a true waste of money.", "title": "" }, { "docid": "723f729b69d1b839944c1ff85d2811f6", "text": "\"I realize I'm drudging up a somewhat old post here (apologies), but I've found myself in a similar situation recently and thought I would chime in. I was considering buying a car where the loan amount would be right around 25k. I tried justifying this by saying it's ridiculously fast (I'm young and stupid, this is appealing), has AWD (nice for Colorado), and a hatchback with plenty of room for snowboards and whatnot in back. This is in comparison to my Civic which has high mileage, can hardly make it up hills due to the high altitude, sucks in snow, and has little room for anything. You have your reasons, I have mine. The thing is, our reasons are just us trying to rationalize an unwise purchase - just admit it, you know it's true. Just so you can see I'm in a similar financial situation, I'm 22, just graduated, and started a job making well over 80k with salary and signing bonus, plus 20k in RSUs on the side. After budgeting I can still put away over 2k/month after I've factored in a car payment, insurance, rent, etc etc. Yes, I could \"\"afford\"\" this car... it's just dumb though dude. Don't do it. There are better things we can do with our money. And guess what, I've been drooling over this car since middle school too.\"", "title": "" }, { "docid": "ac870f795fa816cd1f34ff8b7abe5c10", "text": "Buying this car would be a good idea because you will quickly learn why you feel you need a BMW (that you cannot afford). This is not an investment, but a financing decision, beyond your means of living. As a future MBA you will regret not investing this money now.", "title": "" }, { "docid": "e73a585167b2f95fb523a92f4e3a6e52", "text": "I know I came a little late to this discussion but let me give you my opinion. I think that purchasing the BMW is a terrible investment for obvious reasons. Once you drive the car off the dealer's lot the car loses anywhere from 5-10k in value immediately. Its a terrible investment and something that you will regret in the future. However, whether you buy it now or you hold off we all know you are eventually still going to get it. I graduated college and was in a similar situation as the one you are now. I started making 60k after college and leased a brand new BMW. Like I said it was a terrible investment, but I do not regret it for one day. Ive had so much fun in that car that I can't even begin to explain. We only live once and you don't want to be one of those guys that looks back and says I should've this I should've that, JUST DO IT. We all know it won't be possible when you have a wife and kids so just splurge now and be responsible later LOL.", "title": "" } ]
[ { "docid": "f3f2aad762151eb6ec61c7d1dc1e7383", "text": "If it costs more to fix the car than the car is worth, then those repairs are not worth it. Hit craigslist and look for another junker that runs, but is in your cash price range. Pay to get it looked at by a mechanic as a condition of sale. Use consumer reports to try and find a good model. Somebody in your position does not need a $15K car. You need a series of $2K or $4K cars that you will replace more often, but pay cash for. Car buying, especially from a dealer financed, place isn't how I would recommend building your credit back up. EDIT in response to your updates: Build your credit the smart way, by not paying interest charges. Use your lower limit card, and annually apply for more credit, which you use and pay off each and every month. Borrowing is not going to help you. Just because you can afford to make payments, doesn't automatically make payments a wise decision. You have to examine the value of the loan, not what the payments are. Shop for a good price, shop for a good rate, then purchase. The amount you can pay every month should only be a factor than can kill the deal, not allow it. Pay cash for your vehicle until you can qualify for a low cost loan from a credit union or a bank. It is a waste of money and time to pay a penalty interest rate because you want to build your credit. Time is what will heal your credit score. If you really must borrow for the purchase, you must secure a loan prior to shopping for a car. Visit a few credit unions and get pre-qualified. Once you have a pre-approved loan in place, you can let the deal try and beat your loan for a better deal. Don't make the mistake of letting the dealer do all the financing first.", "title": "" }, { "docid": "4ab468d6c909b04f3f51271c324bf202", "text": "The buying service your credit union uses is similar to the one my credit union uses. I have used their service several times. There is no direct cost to use the service, though the credit union as a whole might have a fee to join the service. I have used it 4 times over the decades. If you know what make and model you want to purchase, or at least have it narrowed down to just a few choices, you can get an exact price for that make, model, and options. You do this before negotiating a price. You are then issued a certificate. You have to go to a specific salesman at a specific dealership, but near a large city there will be several dealers to pick from. There is no negotiating at the dealership. You still have to deal with a trade in, and the financing option: dealer, credit union, or cash. But it is nice to not have to negotiate on the price. Of course there is nobody to stop you from using the price from the buying service as a goal when visiting a more conveniently located dealership, that is what I did last time. The first couple of times I used the standard credit union financing, and the last time I didn't need a loan. Even if you don't use the buying service, one way to pay for the car is to get the loan from the credit union, but get the rebate from the dealer. Many times if you get the low dealer financing you can't get the rebate. Doing it this way actually saves money. Speaking of rebates see how the buying service addresses them. The big national rebates were still honored during at least one of my purchases. So it turned out to be the buying service price minus $1,000. If your service worked like my experience, the cost to you was a little time to get the price, and a little time in a different dealer to verify that the price was good.", "title": "" }, { "docid": "d2aa9ba776cab68fb9f0bd1333bbea3b", "text": "\"You can find out the most money they will loan you for a car loan when you approach your current bank/credit union. They should be willing to layout options based on your income, and credit history. You then have to decide if those terms work for you. There are several dangers with getting loan estimates, they may be willing to lend you more than you can actually handle. They think you can afford it, but maybe you can't. They may also have a loan with a longer term, which does bring the monthly cost down, but exposes you to being upside down on the loan. You then use this a a data point when looking at other lenders. The last place you look is the auto dealer. They will be trying to pressure you on both the loan and the price, that is not the time to do doing complex mental calculations. The Suntrust web page was interesting, it included the quote: The lowest rate in each range is for LightStream's unsecured auto loan product and requires that you have an excellent credit profile. It also induced the example the rate of 2.19% - 4.24% for a 24 to 36 month loan of $10,000 to $24,999 for a used car purchased from a dealer. Also note that my local credit union has a new/used loan at 1.49%, but you have to be a member. Sunstrust seems to be in the minority. In general a loan for X$ and y months will have a lower rate if it is secured with collateral. But Suntrust is offering unsecured loans (i.e. no collateral) at a low rate. The big benefit for their product is that you get the cash today. You can get the cash before you know what you want to buy. You get the cash before you have negotiated with the dealer. That makes that step easier. Now will they in the near future ask for proof you bought a car with the money? no idea. If you went to the same web page and wanted a debt consolidation loan the rate for the same $ range and the same months is: 5.49% - 11.24% the quote now changes to: The lowest rate in each range requires that you have an excellent credit profile. I have no idea what rate they will actually approve you for. It is possible that if you don't have excellent credit the rate rises quickly, but 4.24% for the worst auto loan is better than 5.49% for the best debt consolidation. Excellent Credit Given the unique nature of each individual’s credit situation, LightStream believes there is no single definition for \"\"excellent credit\"\". However, we find individuals with excellent credit usually share the following characteristics: Finally, it should be noted again that each individual situation is different and that we make our credit judgment based on the specific facts of that situation. Ultimately our determination of excellent credit is based on whether we conclude that there is a very high likelihood that our loan will be repaid in a full and timely manner. All the rates mentioned in this answer are from 15 July 2017.\"", "title": "" }, { "docid": "a4ba5e51fd8922bc9ec409eb2d8bcf44", "text": "Depends on how you value your time. These programs do not say they will get you the lowest basement price; they say you get a reasonable price without negotiation. This is true. Use a service. Pick out the car you want and spend less than an afternoon picking up your vehicle. You don't have to fret or do all of the price research or comparison shopping because that is what the service does for you. Since you have to pick a make and model before you begin AND because you need to arrange your financing at a credit union before you being (regardless of a buying service) I don't think they actually work out financially for most folks. My anecdote: Because we were buying an already inexpensive new car, the Costco pre-negotiated discount was just a few hundred bucks. The discount is different for each car (naturally). Our base model was terrific in consumer reports, but the sticker price doesn't leave dealerships a lot of room for profit to start with. We ended up saving a couple thousand dollars by skipping the Costco program and following these tips from JohnFX: What are some tips for getting the upper hand in car price negotiations? But we did it all over email. We emailed any dealership we could find online that was in driving distance. (There were literally dozens of dealerships to choose from.) We made a new, throw away email address and starting to ask for a lower price. Whenever we got a lower price, we simply asked the others to beat it. All over email. It only took a few days, we know we got a low price and the stress really wasn't a factor. (A couple of the salespeople got a little rude, but it was over the email so we didn't care or fret.) I had time to kill, and the extra hassle and effort saved me much more money.", "title": "" }, { "docid": "18eb4f81e1dbd0e3f013cffe592b5586", "text": "You are planning on buying a car that is 50% of your salary. Add your student debt to that and your total debt is >50% of your salary. I would suggest getting a few credit cards to build up credit, but can you manage that? Buying a 25k car with 55k salary is overspending. Get a second-hand car for 7k or so. Plus, buying a new car is not smart either, from a pricing standpoint, if you really want a new car, buy one that is 1 to 2 years old.", "title": "" }, { "docid": "ee60151939fc8a15f134d44755e021c1", "text": "$27,000 for a car?! Please, don't do that to yourself! That sounds like a new-car price. If it is, you can kiss $4k-$5k of that price goodbye the moment you drive it off the lot. You'll pay the worst part of the depreciation on that vehicle. You can get a 4-5 year old Corolla (or similar import) for less than half that price, and if you take care of it, you can get easily another 100k miles out of it. Check out Dave Ramsey's video. (It's funny that the car payment he chooses as his example is the same one as yours: $475! ;) ) I don't buy his take on the 12% return on the stock market (which is fantasy in my book) but buying cars outright instead of borrowing or (gasp) leasing, and working your way up the food chain a bit with the bells/whistles/newness of your cars, is the way to go.", "title": "" }, { "docid": "60107ac23bd15c65c2221bab687a1a2b", "text": "What are your goals in life? If one of them is to appear wealthy then buying a high price import is a great place to start. You certainly have the salary for it (congratulations BTW). If one of your goals is to build wealth, then why not buy a ~5000 to ~6000 car and have a goal to zero out that student loan by the end of the year? You can still contribute to your 401k, and have a nice life style living on ~60K (sending 30 to the student loan). Edit: I graduated with a CS degree in '96 and have been working in the industry since '93. When I started, demand was like it is now, rather insane. It probably won't always be like that and I would prepare for some ups and downs in the industry. One of the things that encouraged me to lead a debt free lifestyle happened in 2008. My employer cut salaries by 5%...no big deal they said. Except they also cut support pay, bonuses, and 401K matching. When the dust cleared my salary was cut 22%, and I was lucky as others were laid off. If you are in debt a 22% pay cut hurts bad.", "title": "" }, { "docid": "e136cafcae837d65d87c1e9fd27b5988", "text": "You can negotiate a no penalty for early payment loan with dealerships sometimes. Dealerships will often give you a better price on the car when you finance through them vs paying cash, so you negotiate in a 48 month finance, after you've settled on the price THEN you negotiate the no penalty for early payment point. They'll be less likely to try to raise the price after you've already come to an agreement. My dad has SAID he does this when buying cars, but that could just be hearsay and bravado. Has said he will negotiate on the basis of a long term lease, nail down a price then throw that clause in, then pay the car off in the first payment. Disclaimer: it's...um not a great way to do business though if you plan to purchase a new car every 2-3 years from the same dealer. Do it once and you'll have a note in their CRM not to either a) offer price reductions for financing or b) offer no penalty early payment financing.", "title": "" }, { "docid": "0f8d360bbfa515fcd8bcf8cda182b071", "text": "As a recent college grad who switched to his own car insurance, many of the things I did myself are reflected here. The #1 thing I did was find out what coverages I had, what coverages some friends of mine had (car enthusiasts mostly - they're the most informed on this stuff), and then figured out what kind of coverages I wanted. From there, I went around getting quotes from anyone and everyone and eventually built out a sizeable spreadsheet that made it obvious which company was going to offer me the best rate at a given coverage level. Something else to remember - not all insurance companies look at past accidents and violations (speeding, etc) the same. In my search, I found some have a 3-year scope on accidents and violations, while others were as much as 5 years. So, if your driving record isn't a shining example (mine isn't perfect), you could potentially save money by considering insurance through a company that will see fewer violations/incidents than another because of the size of their scope. I ended up saving $25/mo by choosing a company that had a 3-year scope, which was on the cusp of when my last violation/incident occurred. Insurance companies will also give out discounts for younger drivers based on GPA average. If you have kids and they maintain a high GPA, you might be able to get a discount there. Not all companies offer it, so if they do it's worth finding out how much it is", "title": "" }, { "docid": "3f033ab4c1714f26c112ed3af1388189", "text": "I am new to the site and hope I can help! We just purchased a used car a few weeks ago and used dealer's finance again so that's not the issue here. I want to focus on what you can do to resolve your issue and not focus on the mistakes that were made. 1 - DO NOT PURCHASE A NEW CAR! Toyota Camrys are great cars that will last forever. I live in Rochester, NY and all you need is snow tires for the winter as ChrisInEdmonton suggested. This will make a world of difference. Also, when you get a car wash get an under-spray treatment for salt and rust (warm climate cars don't usually come with this treatment). 2 - Focus on paying this loan off. Pay extra to the monthly note, put any bonuses you get to the note. Take lunches to work to save money so you can pay extra. I'm not sure if you put any money down but your monthly note should be around $300? I would try putting $400+ down each month until it is paid off. Anything you can do. But, do not buy a new car until this one is fully paid off! Let me know if this helps! Thanks!", "title": "" }, { "docid": "15c15857ff5c581f243a3b1e99ffd3f1", "text": "If you have no credit score it is generally far easier and more affordable to establish credit the cheapest way possible, which is usually in the form of a small credit card (student card if you are a student, low credit line unsecured, or even secured if you need). Your local bank/credit union will usually be keen to offer you something to start out, but you can also apply online to some of the major credit card vendors. As always, look out for annual fees, etc. In general, trying to get a larger loan to establish credit will cost you a lot as you will not qualify for any legitimate 0% or ultra-low APR car loans - those are reserved for people with established and generally pretty good credit. I expect you'll find a car loan that will have a lower APR than you could get investing your money otherwise - especially if you do not have established excellent credit - to simply be a phantom (you won't find it), and even if you could it is more risky than it is worth. Furthermore, if establishing credit is important to you (such as for buying a house down the road), you can build an excellent credit score without ever having a car loan. So you don't have to buy a car on borrowed money just to hope to get approved for a house some day - it's just not a requirement. Finally, I urge you to make a decision on the best car for you in your situation, ignoring the credit score - especially if you are more than 3-5+ years away from buying a house. Everything else about buying a car is more important - the actual cost of the car, year, mileage, suitability for your needs, gas mileage, maintenance and insurance costs, etc. Then, at the very end of your decision making process, ensure that buying the car would not put you dangerously low on savings by squeezing your emergency fund. Decide if you really need a loan or as expensive of a car, considering the costs over the expected life of you owning the car (or at least the next 2-5 years). Never get trapped into just thinking about monthly payments, which hide the true cost of loans and buying beyond what you can afford to purchase today.", "title": "" }, { "docid": "1966d29814aa567791229faee1924b69", "text": "\"First and foremost, being \"\"cool\"\" stops being a thing you have to worry about once you graduate from secondary school. Nobody's really going to care what car you drive; the ones that do care aren't worth maintaining personal friendships or relationships with. The notable exception would be a sales job, requiring you to look successful to be successful, and in that case you'll need to either have a nice-looking car or buy one very quickly. Also, consider what you're buying. An E46 (which for the U.S. crowd was the previous generation of 3-series coupes and sedans) will be, at best, a 6-year-old car, and they made these as long ago as '98 which would make it 15 years old. The standard in the U.S. is to put about 10k miles (which would be about 17k km) per year on it, so you would expect even the newest E46s to have at least 100 000 km on them. At this point, even the best cars start needing increasing amounts of maintenance, and on a BMW that maintenance doesn't come cheap. Consider why a BMW would be sold. It sounds cliche, but in the U.S. at least there are three \"\"tiers\"\" of used car in the luxury class; there are the one- and two-year-olds, used by the dealer as a loaner or owned by the type of guy who buys a new car every year; they're practically new, for 30-50% off sticker, and a great deal when you find them. There are the 15-year-old (or older) cars which were used up and traded in; the majority of these end up auctioned off and cannibalized for parts with the remaining hulk sold for salvage. Then there are the in-betweens; between three and ten years old, you get a wide variety. This car could have been garaged all its life and driven to and from work and around town before its owner got a raise and decided to splurge, or its previous owner could have driven the wheels off all over the continent for work or travel. It could have a major problem that developed or was discovered after the warranty expired (and there isn't an E46 on the road that's still under warranty) which caused the owner to sell. Overall, I would wait until you have your first real job to spend real money on a car like this; the one that will actually pay the bills with enough left over for fun. When you're making 35k a year with only your own personal expenses, as long as you manage your debt well and don't get in trouble with credit, you should have no trouble buying a car like this (or even a newer one). If you are going to buy used even then, I recommend you do your homework on required maintenance for the brand and in general, what each milestone will cost you, and (based on mileage) how soon, and I would find a reputable used car dealer (which is stereotypically a contradiction in terms, but there are guys out there who aren't out to completely screw you over).\"", "title": "" }, { "docid": "46f295dd712175146f902bb3afbad09b", "text": "\"You are still paying a heavy price for the 'instant gratification' of driving (renting) a brand-new car that you will not own at the end of the terms. It is not a good idea in your case, since this luxury expense sounds like a large amount of money for you. Edited to better answer question The most cost effective solution: Purchase a $2000 car now. Place the $300/mo payment aside for 3 years. Then, go buy a similar car that is 3 years old. You will have almost $10k in cash and probably will need minimal, if any, financing. Same as this answer from Pete: https://money.stackexchange.com/a/63079/40014 Does this plan seem like a reasonable way to proceed, or a big mistake? \"\"Reasonable\"\" is what you must decide. As the first paragraph states, you are paying a large expense to operate the vehicle. Whether you lease or buy, you are still paying this expense, especially from the depreciation on a new vehicle. It does not seem reasonable to pay for this luxury if the cost is significant to you. That said, it will probably not be a 'big mistake' that will destroy your finances, just not the best way to set yourself up for long-term success.\"", "title": "" }, { "docid": "d0799afaa568cc72d82700621535e102", "text": "Indeed - the math. I bought my car 6 years ago. It was an ex showroom model (not demo) so came fully kitted and with a decent discount. I had the cash, but the salesman wanted me to take financing on half of the price *and gave me a discount* so that I would. It was a 3 year loan at a very low rate and was therefore lower than the cash price I had gotten. So I took the deal. I can only assume he was getting better commission rates for financing than he was selling cars. Either way, worked out for me.", "title": "" }, { "docid": "d177e5bd6dc03b1ea4340348efe98d92", "text": "\"As a car guy, I wouldn't spend 27 large on anything that wasn't \"\"special\"\" - you'll be looking at for at least the duration of the loan and for me it'll better be very special lest I get bored with it during that time. But that's just me. If you want a transport appliance - spend around $5k-$7k on a decent used vehicle, pay it off within a couple of years or less and keep throwing money at your downpayment. Now if you have any student loan debt, buy a $3k car, learn how to fix it if necessary and pay off the millstone, err, student loan ASAP.\"", "title": "" } ]
fiqa
f4c6c82dd854053318fe471f8b64357d
Why are estimated taxes due “early” for the 2nd and 3rd quarters only?
[ { "docid": "04468a78b190230604ded783ba3cbc6c", "text": "There are too many nuances to the question asked to explore fully but here are a few points to keep in mind. If you are a cash-basis taxpayer (most individuals are), then you are not required to pay taxes on the money that has been billed but not received as yet. If you operate on an accrual basis, then the income accrues to you the day you perform the service and not on the day you bill the client. You can make four equal payments of estimated tax on the due dates, and if these (together with any income tax withholding from wage-paying jobs) are at least 90% of your tax liability for that year, then you owe no penalties for underpayment of tax regardless of how your income varied over the year. If your income does vary considerably over the year (even for people who only have wages but who invest in mutual funds, the income can vary quite a bit since mutual funds typically declare dividends and capital gains in December), then you can pay different amounts in each quarterly installment of estimated tax. This is called the annualization method (a part of Form 2210 that is best avoided unless you really need to use it). Your annualized income for the payment due on June 15 is 2.4 = 12/5 times your taxable income through May 31. Thus, on Form 2210, you are allowed to assume that your average monthly taxable income through May 31 will continue for the rest of the year. You then compute the tax due on that annualized income and you are supposed to have paid at least 45% of that amount by June 15. Similarly for September 15 for which you look at income through August 31, you use a multiplier of 1.5 = 12/8 and need to pay 67.5% of the tax on the annualized income, and so on. If you miscalculate these numbers and pay too little tax in any installment, then you owe penalties for that quarter. Most people find that guesstimating the tax due for the entire year and paying it in equal installments is simpler than keeping track of nuances of the annualized method. Even simpler is to pay 100% of last year's tax in four equal installments (110% for high earners) and then no penalty is due at all. If your business is really taking off and your income is going to be substantially higher in one year, then this 100%/110% of last year's tax deal could allow you to postpone a significant chunk of your tax bill till April 15.", "title": "" }, { "docid": "f417854873f63cf92c832db578efa054", "text": "Here's an answer copied from https://www.quora.com/Why-is-the-second-quarter-of-estimated-quarterly-taxes-only-two-months Estimated taxes used to be paid based on a calendar quarter, but in the 60's the Oct due date was moved back to Sept to pull the third quarter cash receipts into the previous federal budget year which begins on Oct 1 every year, allowing the federal government to begin the year with a current influx of cash. That left an extra month that had to be accounted for in the schedule somewhere. Since individuals and most businesses report taxes on a calendar year, the fourth quarter needed to continue to end on Dec 31 which meant the Jan 15 due date could not be changed, that left April and July 15 dues dates that could change. April 15 was already widely known as the tax deadline, so the logical choice was the second quarter which had its due date changed from July 15 to June 15.", "title": "" }, { "docid": "7ffef3f15795d301785bb58e85f6fa15", "text": "I suspect that the payments were originally due near the end of each quarter (March 15, June 15, September 15, and December 15) but then the December payment was extended to January 15 to allow for end-of-year totals to be calculated, and then the March payment was extended to April 15 to coincide with Income Tax Return filing.", "title": "" }, { "docid": "d41d8cd98f00b204e9800998ecf8427e", "text": "", "title": "" } ]
[ { "docid": "4f99997d3bcbab87ed77d11efcbb9b49", "text": "Estimated tax payments should be a reasonable estimate of what you owe for that time period. If it seems reasonable to you, it is probably reasonable. Sure, you can adjust for varying-length periods. As long as, in the end, you can and do pay what you owe, and don't underpay the estimated/withholding by enough that you owe a penalty, the IRS isn't all that picky about how the money is actually distributed through the year.", "title": "" }, { "docid": "7dcc82bbb9e4ab6690ff1f44442fe6d8", "text": "\"The forms get updated every year, and the software providers need to get approved by the IRS every year. \"\"Form is not yet finalized\"\" means that this year form hasn't been approved yet. IRS starts accepting returns on January 31st anyway, nothing to be worried about. Why are you nearing a deadline? The deadline for 1120 (corporate tax return) is 2 and 1/2 months after your corp year end, which if you're a calendar year corp is March 15th. If your year end is in November/December - you can use the prior year forms, those are finalized.\"", "title": "" }, { "docid": "e5ce258c252eb127e48a7a588eb6ee11", "text": "You must pay your taxes at the quarterly intervals. For most people the withholding done by their employer satisfies this requirement. However, if your income does not have any withholding (or sufficient), then you must file quarterly estimated tax payments. Note that if you have a second job that does withhold, then you can adjust your W4 to request further withholding there and possibly reduce the need for estimated payments. Estimated tax payments also come into play with large investment earnings. The amount that you need to prepay the IRS is impacted by the safe harbor rule, which I am sure others will provide the exact details on.", "title": "" }, { "docid": "dbc2900dd925281d60d1f846130c6e5f", "text": "\"Everything is fine. If line 77 from last year is empty, you should leave this question blank. You made estimated tax payments in 2015. But line 77 relates to a different way to pay the IRS. When you filed your 2014 taxes, if you were owed a refund, and you expected to owe the IRS money for 2015, line 77 lets you say \"\"Hey IRS, instead of sending me a refund for 2014, just keep the money and apply it to my 2015 taxes.\"\" You can also ask them to keep a specified amount and refund the rest. Either way this is completely optional. It sounds like you didn't do that, so you don't fill in anything here. The software should ask you in a different question about your estimated tax payments.\"", "title": "" }, { "docid": "118c268c5016743d186602b1f6febbb0", "text": "They are four quarterly estimated tax payments. The IRS requires that you pay your taxes throughout the year (withholding in a W-2 job). You'll need to estimate how much taxes you think you might be owing and then pay roughly 1/4 at each of the 4 deadlines. From the IRS: How To Figure Estimated Tax To figure your estimated tax, you must figure your expected AGI, taxable income, taxes, deductions, and credits for the year. When figuring your 2011 estimated tax, it may be helpful to use your income, deductions, and credits for 2010 as a starting point. Use your 2010 federal tax return as a guide. You can use Form 1040-ES to figure your estimated tax. Nonresident aliens use Form 1040-ES (NR) to figure estimated tax. You must make adjustments both for changes in your own situation and for recent changes in the tax law. For 2011, there are several changes in the law. Some of these changes are discussed under What's New for 2011 beginning on page 2. For information about these and other changes in the law, visit the IRS website at IRS.gov. The instructions for Form 1040-ES include a worksheet to help you figure your estimated tax. Keep the worksheet for your records. You may find some value from hiring a CPA to help you setup your estimated tax payments and amounts.", "title": "" }, { "docid": "b6302253c06243087d1f4e543d757815", "text": "Ultimately, you are the one that is responsible for your tax filings and your payments (It's all linked to your SSN, after all). If this fee/interest is the result of a filing error, and you went through a preparing company which assumes liability for their own errors, then you should speak to them. They will likely correct this and pay the fees. On the other hand, if this is the result of not making quarterly payments, then you are responsible for it. (Source: Comptroller of Maryland Site) If you [...] do not have Maryland income taxes withheld by an employer, you can make quarterly estimated tax payments as part of a pay-as-you-go plan. If your employer does withhold Maryland taxes from your pay, you may still be required to make quarterly estimated income tax payments if you develop a tax liability that exceeds the amount withheld by your employer by more than $500. From this watered-down public-facing resource, it seems like you'll get hit with fees for not making quarterly payments if your tax liability exceeds $500 beyond what is withheld (currently: $0).", "title": "" }, { "docid": "348fe523b39695c11e4bb9e24392e524", "text": "If you're getting the same total amount of money every year, then the main issue is psychological. I mean, you may find it easier to manage your money if you get it on one schedule rather than another. It's generally better to get money sooner rather than later. If you can deposit it into an account that pays interest or invest it between now and when you need it, then you'll come out ahead. But realistically, if we're talking about getting money a few days or a week or two sooner, that's not going to make much difference. If you get a paycheck just before the end of the year versus just after the end of the year, there will be tax implications. If the paycheck is delayed until January, then you don't have to pay taxes on it this year. Of course you'll have to pay the taxes next year, so that could be another case of sooner vs later. But it can also change your total taxes, because, in the US and I think many other countries, taxes are not a flat percentage, but the more you make, the higher the tax rate. So if you can move income to a year when you have less total income, that can lower your total taxes. But really, the main issue would be how it affects your budgeting. Others have discussed this so I won't repeat.", "title": "" }, { "docid": "c03a09f06650bf57d78ea96446ea5f09", "text": "Usually you want two consecutive quarters before declaring a recession. This blog doesn't reference any seasonal adjustment; a one or two month decline may be to any number of reasons. E.g. labor numbers dropped this month largely attributed to weather. I only see screen shots of excel sheets, I'm not willing to invest any time into parsing that out :(", "title": "" }, { "docid": "fd07b9332ec0af4e8cddc1f4c558f5dc", "text": "\"From the IRS page on Estimated Taxes (emphasis added): Taxes must be paid as you earn or receive income during the year, either through withholding or estimated tax payments. If the amount of income tax withheld from your salary or pension is not enough, or if you receive income such as interest, dividends, alimony, self-employment income, capital gains, prizes and awards, you may have to make estimated tax payments. If you are in business for yourself, you generally need to make estimated tax payments. Estimated tax is used to pay not only income tax, but other taxes such as self-employment tax and alternative minimum tax. I think that is crystal clear that you're paying income tax as well as self-employment tax. To expand a bit, you seem to be confusing self-employment tax and estimated tax, which are not only two different things, but two different kinds of things. One is a tax, and the other is just a means of paying your taxes. \"\"Self-employment tax\"\" refers to the Social Security and Medicare taxes that you must pay on your self-employment income. This is an actual tax that you owe. If you receive a W-2, half of it is \"\"invisibly\"\" paid by your employer, and half of it is paid by you in the form of visible deductions on your pay stub. If you're self-employed, you have to pay all of it explicitly. \"\"Estimated tax\"\" does not refer to any actual tax levied on anyone. A more pedantically correct phrasing would be \"\"estimated tax payment\"\". Estimated taxes are just payments that you make to the IRS to pay tax you expect to owe. Whether you have to make such payments depends on how much tax you owe and whether you've paid it by other means. You may need to pay estimated tax even if you're not self-employed, although this would be unusual. (It could happen, for instance, if you realized large capital gains over the year.) You also may be self-employed but not need to pay estimated tax (if, for instance, you also have a W-2 job and you reduce your withholding allowances to have extra tax withheld). That said, if you earn significant income from self-employment, you'll likely have to make estimated tax payments. These are prepayments of the income tax and Social Security/Medicare taxes you accrue based on your self-employment income. As Pete B. mentioned in his answer, a possible reason that your estiamtes are low is because some taxes have already been withheld from the paychecks you received so far during the year (while you were an employee). These represent tax payments you've already made; you don't need to pay that money a second time, but you may need to make estimated tax payments for your income going forward.\"", "title": "" }, { "docid": "38372658a2b0cb9eaee21ed8679d07cc", "text": "\"You don't actually have to make four equal payments on US federal taxes; you can pay different amounts each quarter. To avoid penalties, you must have paid \"\"enough\"\" at the end of each quarter. If you pay too much in an early quarter, the surplus counts towards the amount due in later quarters. If you have paid too little as of the end of a quarter, that deficit counts against you for interest and penalties until it is made up in later quarters (or at year-end settlement). How much is \"\"enough\"\"? There are a number of ways of figuring it. You can see the list of exceptions to the penalty in the IRS documentation. Using unequal payments may require more complicated calculation methods to avoid or reduce penalties at year-end. If you have the stomach for it, you may want to study the Annualized Income Installment Method to see how uneven income might affect the penalty.\"", "title": "" }, { "docid": "4cc980dd84c99df9e3ac48558af4987c", "text": "Either make your best guess, or set it low and then file quarterly Estimated Tax payments to fill in what's missing, or set it high and plan on getting a refund, or adjust it repeatedly through the year, or...", "title": "" }, { "docid": "0230fdf2990f65c209c70bf3251d2bbb", "text": "\"The short answer is - \"\"Your employer should typically deduct enough every paycheck so you don't owe anything on April 15th, and no more.\"\" The long answer is \"\"Your employer may make an error in how much to deduct, particularly if you have more than 1 job, or have any special deductions/income. Calculate your estimated total taxes for the year by estimating all your income and deductions on a paper copy of a tax return [I say paper copy so that you become familiar with what the income and deductions actually are, whereas plugging into an online spreadsheet makes you blind to what's actually going on]. Compare that with what your employer deducts every paycheck, * the number of paychecks in the year. This tells you how much extra you will pay / be refunded on April 15th, as accurately as you can estimate your income and deductions.\"\"\"", "title": "" }, { "docid": "e39a1801cbfa777e2fda516c1822da31", "text": "\"It's not quite as bad as the comments indicate. Form 1040ES has been available since January (and IME has been similarly for all past years). It mostly uses the prior year (currently 2016) as the basis, but it does have the updated (2017) figures for items that are automatically adjusted for inflation: bracket points (and thus filing threshhold), standard deductions, Social Security cap, and maybe another one or two I missed. The forms making up the actual return cannot be prepared very far in advance because, as commented, Congress frequently makes changes to tax law well after the year begins, and in some cases right up to Dec. 31. The IRS must start preparing forms and pubs -- and equally important, setting the specifications for software providers like Intuit (TurboTax) and H&RBlock -- several months ahead in order to not seriously delay filing season, and with it refunds, which nearly everyone in the country considers (at least publicly) to be worse than World War Three and the destruction of the Earth by rogue asteroids. I have 1040 series from the last 4 years still on my computer, and the download dates mostly range from late September to mid January. Although one outlier shows the range of possibility: 2013 form 1040 and Schedule A were tweaked in April 2014 because Congress passed a law allowing charitable contributions for Typhoon Haiyan to be deducted in the prior year. Substantive, but relatively minor, changes happen every year, including many that keep recurring like the special (pre-AGI) teacher supplies deduction (\"\"will they or won't they?\"\"), section 179 expensing (changes slightly almost every year), and formerly the IRA-direct-to-charity option (finally made permanent last year). As commented, the current Congress and President were elected on a platform with tax reform as an important element, and they are talking even more intensely than before about doing it, although whether they will actually do anything this year is still uncertain. However, if major reform is done it will almost certainly apply to future years only, and likely only start after a lag of some months to a year. They know it causes chaos for businesses and households alike to upend without advance warning the assumptions built in to current budgets and plans -- and IME as a political matter something that is enacted now and effective fairly soon but not now is just as good (but I think that part is offtopic).\"", "title": "" }, { "docid": "cf9d3194a23f0e9f668052dac979fcc2", "text": "If you have non-salary income, you might be required to file 1040ES estimated tax for the next year on a quarterly basis. You can instead pay some or all in advance from your previous year's refund. In theory, you lose the interest you might have made by holding that money for a few months. In practice it might be worth it to avoid needing to send forms and checks every quarter. For instance if you had a $1000 estimated tax requirement and the alternative was to get 1% taxable savings account interest for six months, you'd make about $3 from holding it for the year. I would choose to just pay in advance. If you had a very large estimation, or you could pay off a high-rate debt and get a different effective rate of return, the tradeoff may be different.", "title": "" }, { "docid": "669955e5acafee701a6cc0e6b6ab3e34", "text": "There actually are legitimate reasons, but they don't apply to most people. Here are a few that I know of: You're self-employed and have to pay quarterly estimated taxes. Rather than wait for the refund when you already have to pay 1/4 of next year's taxes at the same time, you just have the IRS apply to refund forward. (so you're not out the money you owe while waiting for your refund). You're filing an amended or late return, and so you're already into the next year, and have a similar situation as #1, where your next year's taxes have already come due. You're planning on declaring bankruptcy, and you're under the Tenth Circuit, those credits might be safe from creditors For almost any other situation, you're better off taking the money, and using it to pay down debt, or put it somewhere to make interest (although, at the current rates, that might not be very much).", "title": "" } ]
fiqa
e3f463c2be19d7e0274f19bc74958c4a
What do Earnings Per Share tell potential shareholders?
[ { "docid": "d41d8cd98f00b204e9800998ecf8427e", "text": "", "title": "" }, { "docid": "c9a63c807518f8264be60f9212f0462c", "text": "Earnings per share is the company profit (or loss), divided by the number of outstanding shares. The number should always be compared to the share price, so for instance if the EPS is $1 and the share price is $10, the EPS is 10% of the share price. This means that if the company keeps up this earning you should expect to make 10% yearly on your investment, long term. The stock price may fluctuate, but if the company keeps on making money you will eventually do so too as investor. If the EPS is low it means that the market expects the earnings to rise in the future, either because the company has a low profit margin that can be vastly improved, or because the business is expected to grow. Especially the last case may be a risky investment as you will lose money if the company doesn't grow fast enough, even if it does make a healthy profit. Note that the listed EPS, like most key figures, is based on the last financial statement. Recent developments could mean that better or worse is generally expected. Also note that the earnings of some companies will fluctuate wildly, for instance companies that produce movies or video games will tend to have a huge income for a quarter or two following a new release, but may be in the negative in some periods. This is fine as long as they turn a profit long term, but you will have to look at data for a longer period in order to determine this.", "title": "" } ]
[ { "docid": "0dcf27f71de383975b0639ac33ada7d5", "text": "the implications are that the company's earnings per share may seem greater, (after the company buys them there will be less shares outstanding), giving wall street the impression that there is more growth potential than there really is. its an accounting gimmick that can work for a few quarters while the company evaluates how else to impress wall street", "title": "" }, { "docid": "0c6d9c87fc60a8c5f72ee0140b593d35", "text": "\"A stock, at its most basic, is worth exactly what someone else will pay to buy it right now (or in the near future), just like anything else of value. However, what someone's willing to pay for it is typically based on what the person can get from it. There are a couple of ways to value a stock. The first way is on expected earnings per share, most of would normally (but not always) be paid in dividends. This is a metric that can be calculated based on the most recently reported earnings, and can be estimated based on news about the company or the industry its in (or those of suppliers, likely buyers, etc) to predict future earnings. Let's say the stock price is exactly $100 right now, and you buy one share. In one quarter, the company is expected to pay out $2 per share in dividends. That is a 2% ROI realized in 3 months. If you took that $2 and blew it on... coffee, maybe, or you stuffed it in your mattress, you'd realize a total gain of $8 in one year, or in ROI terms an annual rate of 8%. However, if you reinvested the money, you'd be making money on that money, and would have a little more. You can calculate the exact percentage using the \"\"future value\"\" formula. Conversely, if you wanted to know what you should pay, given this level of earnings per share, to realize a given rate of return, you can use the \"\"present value\"\" formula. If you wanted a 9% return on your money, you'd pay less for the stock than its current value, all other things being equal. Vice-versa if you were happy with a lesser rate of return. The current rate of return based on stock price and current earnings is what the market as a whole is willing to tolerate. This is how bonds are valued, based on a desired rate of return by the market, and it also works for stocks, with the caveat that the dividends, and what you'll get back at the \"\"end\"\", are no longer constant as they are with a bond. Now, in your case, the company doesn't pay dividends. Ever. It simply retains all the earnings it's ever made, reinvesting them into doing new things or more things. By the above method, the rate of return from dividends alone is zero, and so the future value of your investment is whatever you paid for it. People don't like it when the best case for their money is that it just sits there. However, there's another way to think of the stock's value, which is it's more core definition; a share of the company itself. If the company is profitable, and keeps all this profit, then a share of the company equals, in part, a share of that retained earnings. This is very simplistic, but if the company's assets are worth 1 billion dollars, and it has one hundred million shares of stock, each share of stock is worth $10, because that's the value of that fraction of the company as divided up among all outstanding shares. If the company then reports earnings of $100 million, the value of the company is now 1.1 billion, and its stock should go up to $11 per share, because that's the new value of one ten-millionth of the company's value. Your ROI on this stock is $1, in whatever time period the reporting happens (typically quarterly, giving this stock a roughly 4% APY). This is a totally valid way to value stocks and to shop for them; it's very similar to how commodities, for instance gold, are bought and sold. Gold never pays you dividends. Doesn't give you voting rights either. Its value at any given time is solely what someone else will pay to have it. That's just fine with a lot of people right now; gold's currently trading at around $1,700 an ounce, and it's been the biggest moneymaker in our economy since the bottom fell out of the housing market (if you'd bought gold in 2008, you would have more than doubled your money in 4 years; I challenge you to find anything else that's done nearly as well over the same time). In reality, a combination of both of these valuation methods are used to value stocks. If a stock pays dividends, then each person gets money now, but because there's less retained earnings and thus less change in the total asset value of the company, the actual share price doesn't move (much). If a stock doesn't pay dividends, then people only get money when they cash out the actual stock, but if the company is profitable (Apple, BH, etc) then one share should grow in value as the value of that small fraction of the company continues to grow. Both of these are sources of ROI, and both are seen in a company that will both retain some earnings and pay out dividends on the rest.\"", "title": "" }, { "docid": "6ccdf4de95322365d42b60b0d8817169", "text": "\"The following is only an overview and does not contain all of the in-depth reasons why you should look more deeply. When you look at a stock's financials in depth you are looking for warning signs. These may warn of many things but one important thing to look for is ratio and growth rate manipulation. Using several different accounting methods it is possible to make a final report reflect a PE ratio (or any other ratio) that is inconsistent with the realities of the company's position. Earnings manipulation (in the way that Enron in particular manipulated them) is more widespread than you might think as \"\"earnings smoothing\"\" is a common way of keeping earnings in line (or smooth) in a recession or a boom. The reason that PE ratio looks so good could well be because professional investors have avoided the stock as there appear to be \"\"interesting\"\" (but legal) accounting decisions that are of concern. Another issue that you don't consider is growth. earnings may look good in the current reporting period but may have been stagnant or falling when considered over multiple periods. The low price may indicate falling revenues, earnings and market share that you would not be aware of when taking only your criteria into account. Understanding a firm will also give you an insight into how future news might affect the company. If the company has a lot of debt and market interest rates rise or fall how will that effect their debt, if another company brings out a competing product next week how will it effect the company? How will it effect their bottom line? How much do they rely on a single product line? How likely is it that their flagship product will become obsolete? How would that effect the company? Looking deeply into a company's financial statements will allow you to see any issues in their accounting practices and give you a feel for how they are preforming over time, it will also let you look into their cost of capital and investment decisions. Looking deeply into their products, company structure and how news will effect them will give you an understanding of potential issues that could threaten your investment before they occur. When looking for value you shouldn't just look at part of the value of the company; you wouldn't just look at sales of a single T-shirt range at Wallmart when deciding whether to invest in them. It is exactly the same argument for why you should look at the whole of the company's state when choosing to invest rather than a few small metrics.\"", "title": "" }, { "docid": "715832a0ce5dd6bfc23d850927768807", "text": "One of my university professors suggested doing this systematically to get access to shareholder meetings where there is typically a nice dinner involved. As long as the stock price + commission is less than the price of a nice restaurant it's actually not a bad idea.", "title": "" }, { "docid": "67678b24e00d599afb2ad4f0fb52c905", "text": "\"First, note that a share represents a % of ownership of a company. In addition to the right to vote in the management of the company [by voting on the board of directors, who hires the CEO, who hires the VPs, etc...], this gives you the right to all future value of the company after paying off expenses and debts. You will receive this money in two forms: dividends approved by the board of directors, and the final liquidation value if the company closes shop. There are many ways to attempt to determine the value of a company, but the basic theory is that the company is worth a cashflow stream equal to all future dividends + the liquidation value. So, the market's \"\"goal\"\" is to attempt to determine what that future cash flow stream is, and what the risk related to it is. Depending on who you talk to, a typical stock market has some degree of 'market efficiency'. Market efficiency is basically a comment about how quickly the market reacts to news. In a regulated marketplace with a high degree of information available, market efficiency should be quite high. This basically means that stock markets in developed countries have enough traders and enough news reporting that as soon as something public is known about a company, there are many, many people who take that information and attempt to predict the impact on future earnings of the company. For example, if Starbucks announces earnings that were 10% less than estimated previously, the market will quickly respond with people buying Starbucks shares lowering their price on the assumption that the total value of the Starbucks company has decreased. Most of this trading analysis is done by institutional investors. It isn't simply office workers selling shares on their break in the coffee room, it's mostly people in the finance industry who specialize in various areas for their firms, and work to quickly react to news like this. Is the market perfectly efficient? No. The psychology of trading [ie: people panicking, or reacting based on emotion instead of logic], as well as any inadequacy of information, means that not all news is perfectly acted upon immediately. However, my personal opinion is that for large markets, the market is roughly efficient enough that you can assume that you won't be able to read the newspaper and analyze stock news in a way better than the institutional investors. If a market is generally efficient, then it would be very difficult for a group of people to manipulate it, because someone else would quickly take advantage of that. For example, you suggest that some people might collectively 'short AMZN' [a company worth half a trillion dollars, so your nefarious group would need to have $5 Billion of capital just to trade 1% of the company]. If someone did that, the rest of the market would happily buy up AMZN at reduced prices, and the people who shorted it would be left holding the bag. However, when you deal with smaller items, some more likely market manipulation can occur. For example, when trading penny stocks, there are people who attempt to manipulate the stock price and then make a profitable trade afterwards. This takes advantage of the low amount of information available for tiny companies, as well as the limited number of institutional investors who pay attention to them. Effectively it attempts to manipulate people who are not very sophisticated. So, some manipulation can occur in markets with limited information, but for the most part prices are determined by the 'market consensus' on what the future profits of a company will be. Additional example of what a share really is: Imagine your neighbor has a treasure chest on his driveway: He gathers the neighborhood together, and asks if anyone wants to buy a % of the value he will get from opening the treasure chest. Perhaps it's a glass treasure chest, and you can mostly see inside it. You see that it is mostly gold and silver, and you weigh the chest and can see that it's about 100 lbs all together. So in your head, you take the price of gold and silver, and estimate how much gold is in the chest, and how much silver is there. You estimate that the chest has roughly $1,000,000 of value inside. So, you offer to buy 10% of the chest, for $90k [you don't want to pay exactly 10% of the value of the company, because you aren't completely sure of the value; you are taking on some risk, so you want to be compensated for that risk]. Now assume all your neighbors value the chest themselves, and they come up with the same approximate value as you. So your neighbor hands out little certificates to 10 of you, and they each say \"\"this person has a right to 10% of the value of the treasure chest\"\". He then calls for a vote from all the new 'shareholders', and asks if you want to get the money back as soon as he sells the chest, or if you want him to buy a ship and try and find more chests. It seems you're all impatient, because you all vote to fully pay out the money as soon as he has it. So your neighbor collects his $900k [$90k for each 10% share, * 10], and heads to the goldsmith to sell the chest. But before he gets there, a news report comes out that the price of gold has gone up. Because you own a share of something based on the price of gold, you know that your 10% treasure chest investment has increased in value. You now believe that your 10% is worth $105k. You put a flyer up around the neighborhood, saying you will sell your share for $105k. Because other flyers are going up to sell for about $103-$106k, it seems your valuation was mostly consistent with the market. Eventually someone driving by sees your flyer, and offers you $104k for your shares. You agree, because you want the cash now and don't want to wait for the treasure chest to be sold. Now, when the treasure chest gets sold to the goldsmith, assume it sells for $1,060,000 [turns out you underestimated the value of the company]. The person who bought your 10% share will get $106k [he gained $2k]. Your neighbor who found the chest got $900k [because he sold the shares earlier, when the value of the chest was less clear], and you got $104k, which for you was a gain of $14k above what you paid for it. This is basically what happens with shares. Buy owning a portion of the company, you have a right to get a dividend of future earnings. But, it could take a long time for you to get those earnings, and they might not be exactly what you expect. So some people do buy and sell shares to try and earn money, but the reason they are able to do that is because the shares are inherently worth something - they are worth a small % of the company and its earnings.\"", "title": "" }, { "docid": "74f5180f25f128a9c22aaf7654f0730f", "text": "Essentially, yes, Peter Lynch is talking about the PEG Ratio. The Price/Earnings to Growth (PEG) Ratio is where you take the p/e ratio and then divide that by the growth rate (which should include any dividends). A lower number indicates that the stock is undervalued, and could be a good buy. Lynch's metric is the inverse of that: Growth rate divided by the p/e ratio. It is the same idea, but in this case, a higher number indicates a good value for buying. In either case, the idea behind this ratio is that a fairly priced stock will have the p/e ratio equal the growth rate. When your growth rate is larger than your p/e ratio, you are theoretically looking at an undervalued stock.", "title": "" }, { "docid": "bd59a0d6be04b9e7ff8cc04436d98108", "text": "\"What does it mean in terms of share price? Should the share price increase by 15 cents? No, but you're on the right track. In theory, the price of a share reflects it's \"\"share\"\" of time discounted future earnings. To put it concretely, imagine a company consistently earning 15 cents a share every year and paying it all out as dividends. If you only paid 25 cents for it, you could earn five cents a share by just holding it for two years. If you imagine that stocks are priced assuming a holding period of 20 years or so, so we'd expect the stock to cost less than 3 dollars. More accurately, the share price reflects expected future earnings. If everyone is assuming this company is growing earnings every quarter, an announcement will only confirm information people have already been trading based on. So if this 15 cents announcement is a surprise, then we'd expect the stock price to rise as a function of both the \"\"surprise\"\" in earnings, and how long we expect them to stay at this new profitability level before competition claws their earnings away. Concretely, if 5 cents a share of that announcement were \"\"earnings surprise,\"\" you'd expect it to rise somewhere around a dollar.\"", "title": "" }, { "docid": "bb34d6f5694c9ab4813a79be7e88e943", "text": "\"Not sure I fully understand your question but my take on it is this: There a lot of people out there that admire companies and own the stock just because they like the company. For example, I know some kids who own Disney stock. They only have a share or two but they keep it because they want to say \"\"I own a part of Disney.\"\" Realistically speaking, if they hold or sell the stock it is so minuscule to have any realizable affect on the overall value of the stock which does not really make the company look better from an investor perspective. However, if a company has people that just want to own the stock just like your uncle are indeed \"\"better\"\" because they must have provided a product or service that is valued intrinsically.\"", "title": "" }, { "docid": "48102e46d91b862d85bd720bac8e465f", "text": "Include warnings that these numbers are estimates and are not adjusted for the market impact and tax impact of selling these shares. They need to stop pondering to the followers of the Prosperity Theology and get their analysis changed. Going to the shareholders page and just adding up their shares in comparison to the current price is lazy and not a good indicator.", "title": "" }, { "docid": "a025d389c97e33531f1be1392b2444c3", "text": "\"When you buy a stock, you're really paying for a STREAM of earnings, from now till whenever. The job of an investor is to figure out how large that stream will be in the future. But if the stock price were the same as \"\"earnings\"\" (for one year), it would mean that you would get all future earnings for \"\"free.\"\" That's not likely to happen unless 1) the company is in liquidation,\"\" meaning \"\"no future\"\" and 2) it earned ALL of the money it ever earned in the past year, meaning \"\"no past.\"\" If there are likely to be any earnings in the future, you will have to pay for those future earnings, over and above what was earned in the most recent year.\"", "title": "" }, { "docid": "1eebb6fe1711a3950d7b67ffa1a5a0a6", "text": "Well, if one share cost $100 and the company needs to raise $10000, then the company will issue 100 shares for that price. Right? However, say there's 100 shares out there now, then each share holder owns 1/100th of the company. Now the company will remain the same, but it's shared between 200 shareholders after the issuing of new shares. That means each share holder now owns 1/200th of the company. And hence only gets 1/200th of their earnings etc.", "title": "" }, { "docid": "0f18b39a5ed782d8589c444b89855fab", "text": "SE:Personal Finance user Ray K says in a comment on this question that his or her broker said: a company cannot release any significant news in a share-holder meeting that is not publicly accessible / open, similar to how earnings releases are available to the entire public at the same time, not just to a few attending a meeting.", "title": "" }, { "docid": "0d133fdf8af7ed7e81a929aefa9fb736", "text": "The company gets it worth from how well it performs. For example if you buy company A for $50 a share and it beats its expected earnings, its price will raise and lets say after a year or two it can be worth around $70 or maybe more.This is where you can sell it and make more money than dividends.", "title": "" }, { "docid": "1ca3c5ec07188a8c92c46fb578d192c7", "text": "Converting the comment from @MD-Tech into answer How or where could I find info about publicly traded companies about how stock owner friendly their compensation schemes are for their board and officers? This should be available in the annual report, probably in a directors' remunerations section for most companies", "title": "" }, { "docid": "dbc54297aa25d0a851d8421cd7854b7c", "text": "\"In the Income Statement that you've linked to, look for the line labeled \"\"Net Income\"\". That's followed by a line labeled \"\"Preferred Dividends\"\", which is followed by \"\"Income Available to Common Excl. Extra Items\"\" and \"\"Income Available to Common Incl. Extra Items\"\". Those last two are the ones to look at. The key is that these lines reflect income minus dividends paid to preferred stockholders (of which there are none here), and that's income that's available to ordinary shareholders, i.e., \"\"earnings for the common stock\"\".\"", "title": "" } ]
fiqa
358ccd45afeaf1f9bb8bc4789b143543
Insurance company sent me huge check instead of pharmacy. Now what?
[ { "docid": "af1106a29d58d5538e4e2baea1dc30ea", "text": "The insurance company issued the check. I'd contact the insurance company to have the current check voided and a new one issued to the pharmacy.", "title": "" }, { "docid": "2dbf908577422d9e9844958a62782629", "text": "Checks are awesome things in that, even if it gets lost the money doesn't change hands until the check is cashed. I would highly recommend NOT signing a check over and putting it in the mail though. Essentially putting your signature on it is saying yes, pay to whomever. Theoretically acceptable, rarely a good idea. Call the insurance company and have them cancel current check to reissue to the correct people. Don't forget to write VOID (in huge letters) on the check before throwing away and/or tearing it up.", "title": "" }, { "docid": "c472e28a902255d7f3e8918550a37e7f", "text": "Option 4: Go talk with someone in person at an office of the Insurance company. They have helped me several times with things like this. They can get everyone involved on a conference call and make something happen. But you have to go in. Calling is a good way to waste time and get nowhere, they will throw the issue back and forth. Find an office and go. This is the most effective solution.", "title": "" }, { "docid": "608ef839a75b4a9d959fb21bd1c79110", "text": "So: What you do:", "title": "" }, { "docid": "ec5f508e7f500cdad2d26fd1adf49a37", "text": "Deposit check and send a personal check (resulting in tax and IRS reporting issues) That's a bad idea, unless maybe the check you're receiving is a certified bank draft. Suppose the insurance company are crooks and the check is fraudulent. It could take weeks or months for some investigation to catch up to that, long after your own personal check was cashed by the pharmacy. The bank will then put you on hook for the 20 grand by reversing the check, even though the funds had been deposited into your account. Do not put yourself into the position of a money handler; you don't have the cash base, insurance, government protection and whatever else that a bank has. And, of course, you're being a free money handler if you do that. (You're not even compensated for postage, time and whatnot). If you're handling money between two parties, you should collect a percentage, or else refuse. That percentage has to be in proportion to the risk, since cashing a check for someone carries a risk similar to (and is effectively a form of) making a loan.", "title": "" }, { "docid": "857974453afa724ad8ac67c7e3956c66", "text": "In one of your comments you say: Even if the pharmacy is not in the insurance provider network? This is why you got the check instead of your insurance company. I have Blue Cross/Blue Shield, and recently my wife underwent a procedure in the hospital, where one of the physicians involved was not in my providers network. I got a letter from the physicians office stating that since they are out of network, the standard practice was for BCBS to issue the check to me, rather than to the provider. I received the check and made the payment. The main contention is the difference in price, and that is what you need to discuss with both the pharmacy (actual billing) and your insurance company (paid benefits).", "title": "" }, { "docid": "2765e690af1f88102daa11d29be4a1f0", "text": "You mentioned depositing the check and then sending a personal check. Be sure to account for time, since any deposit over $10,000 the money will be made available in increments, so it may take 10-14 days to get the full amount in your account before you could send a personal check. I would not recommend this option regardless, but if you do, just a heads up.", "title": "" }, { "docid": "d41d8cd98f00b204e9800998ecf8427e", "text": "", "title": "" }, { "docid": "1d260f2a8ecc297314ac859d57166400", "text": "\"This is not a mistake. This is done for \"\"Out of Network\"\" providers, and mainly when the patient is an Anthem member, be it Blue Shield or Blue Cross. Even though an \"\"Assignment of Benefits\"\" is completed by the patient, and all fields on the claim from (CMS1500 or UB04) are completed assigning the benefits to the provider, Anthem has placed in their policy that the Assignment of Benefits the patient signs is null and void. No other carrier that I have come across conducts business in this manner. Is it smart? Absolutely not! They have now consumed their member's time in trying to figure out which provider the check is actually for, the member now is responsible for forwarding the payment, or the patient spends the check thinking Anthem made a mistake on their monthly premium at some point (odds are slim) and is now in debt thousands of dollars because they don't check with Anthem. It creates a huge mess for providers, not only have we chased Anthem for payment, but now we have to chase the patient and 50% of the time, never see the payment in our office. It creates more phone calls to Anthem, but what do they care, they are paying pennies on the dollar for their representatives in the Philippines to read from a script. Anthem is the second largest insurance carrier in the US. Their profit was over 800 million dollars within 3 months. The way they see it, we issued payment, so stop calling us. It's amazing how they can accept a CMS1500, but not follow the guidelines associated with it. Your best bet, and what we suggest to patients, either deposit the check and write your a personal check or endorse and forward. I personally would deposit the check and write a personal check for tracking purposes; however, keep in mind that in the future, you may depend on your bank statements for proof of income (e.g. Social Security) and imagine the work having to explain, and prove, a $20,000 deposit and withdraw within the same month.\"", "title": "" } ]
[ { "docid": "9b677bf9fd32eb6bc39174c40ce70a5b", "text": "If the hospital is run like hospitals in the US it can take a long time just to determine the bill. The hospital, Emergency room, ER doctors, surgeons, anesthesiologists, X-Ray department, pharmacy and laboratory are considered separate billing centers. It can take a while to determine the charges for each section. Is there an insurance company involved? When there is one involved it can take weeks or months before the hospital determines what the individual owes. The co-pays, coverages, and limits can be very confusing. In my experience it can take a few months before the final amount is known. You may want to call the hospital to determine the status of the bills.", "title": "" }, { "docid": "1203172087dc797dbf83340a004bf503", "text": "\"check the DATE OF SERVICE on all your invoices carefully. It's possible you actually DID pay already. Sometimes when a medical provider gets \"\"mostly\"\" paid by a third party insurer, they just drop the (small) remainder, as it's more cost than it's worth if it is a trivial amount. Alternatively, they wait until you show up for another office visit, and \"\"ding\"\" you then!\"", "title": "" }, { "docid": "ed29c570eae7fb018586b19dfcde1b80", "text": "\"This is really unfortunate. In general you can't back date individual policies. You could have (if it was available to you) elected to extend your employer's coverage via COBRA for the month of May, and possibly June depending on when your application was submitted, then let the individual coverage take over when it became effective. Groups have some latitude to retroactively cover and terminate employees but that's not an option in the world of individual coverage, the carriers are very strict about submission deadlines for specific effective dates. This is one of the very few ways that carriers are able to say \"\"no\"\" within the bounds of the ACA. You submit an application, you are assigned an effective date based on the date your application was received and subsequently approved. It has nothing to do with how much money you send them or whether or not you told them to back date your application. If someone at the New York exchange told you you could have a retroactive effective date they shouldn't have. Many providers have financial hardship programs. You should talk to the ER hospital and see what might be available to you. The insurer is likely out of the equation though if the dates of service occurred before your policy was effective. Regarding your 6th paragraph regarding having paid the premium. In this day and age carriers can only say \"\"no\"\" via administrative means. They set extremely rigid effective dates based on your application date. They will absolutely cancel you if you miss a payment. If you get money to them but it was after the grace period date (even by one minute) they will not reinstate you. If you're cancelled you must submit a new application which will create a new coverage gap. You pay a few hundred dollars each month to insure infinity risk, you absolutely have to cover your administrative bases because it's the only way a carrier can say \"\"no\"\" anymore so they cling to it.\"", "title": "" }, { "docid": "fcc99ce53784564e60c8529112455a1e", "text": "You seem overly fixated on dead tree documentation of purchases. They are deducting this from your account monthly - the mere fact that the money was taken is enough to prove in court that they have you on their books and to hold them to paying out said insurance. The email copies is actually a better way to organize receipts in most cases (can't be destroyed as easily, etc.) You can cancel the insurance - but don't just stop paying (you'd owe them money then). I foresee increasing difficulty navigating the 21st century for you unless you can get past this concern about physical receipts. I doubt other companies would do much better. FWIW, I live in the continental US. I don't know how different the Philippines is with regard to moving everything to digital", "title": "" }, { "docid": "bbbeb5a0fef77fa10d779f442ce583e1", "text": "You didn't buy it. Your mother did. You can try to cancel it if it was purchased in your name; if your mother purchased it she would have to cancel it. Either way, the company has done it's part by carrying you until that cancellation and you have no grounds for demanding a refund for time already covered. If your mother was spending your money, that is something you need to take up with her unless you want to bring charges against her for theft/fraud. If she was spending her own money, then you may want to talk to a lawyer about getting her declared incompetent so someone else can control her spending. But the money paid is probably gone. It isn't the insurance company's fault that you didn't want it doesn't, and if you don't bring charges you can't complain about their having accepted stolen money. Even if you do bring charges and win, it isn't clear you can get a refund. If you really want to pursue any of this, your next step is to talk to a lawyer.", "title": "" }, { "docid": "8db1c181bc68dc201970efb4f4b3abab", "text": "\"There's nothing you can do. If he has indeed deposited the check, it would appear on your account fairly quickly - I've never seen it taking more than 2-3 business days. However, a check is a debt instrument, and you cannot close the account until it clears, or until the \"\"unclaimed property\"\" laws of your state kick in. If he claims that he deposited the check, ask it in writing and have your bank (or the bank where it was deposited) investigate why it takes so long to clear. If he's not willing to give it to you in writing - he's likely not deposited it. Whatever the reason may be, even just to cause you nuisance. Lesson learned. Next time - cashier's check with a signed receipt. Re closing the LLC: if you're the only two partners - you can just withdraw yourself from the LLC, take out your share, and drop it on him leaving him the only partner. Check with your local attorney for details.\"", "title": "" }, { "docid": "0d300a37caab11c1aad8bb3eaca7d4f2", "text": "It's an over crowded boat I'm sure. She hasn't had insurance all year either. She switched departments at the end of last year and they said she had to wait for open enrollment to come around again. So it wasn't by choice that she's been uninsured. It really baffles me that her company, a healthcare provider, would let their employees go through this.", "title": "" }, { "docid": "c4158d595a69b938712cdfcd60768492", "text": "No you do not insure the cheque. A cheque is just standardized form that instructs a bank to transfer money. It is no more important than an ordinary letter. A cheque carries no commercial value, especially when it has a designated recipient. No mail insurance will cover the financial loss as a result of bank fraud. It is a kind of indirect loss. Just tell her to write your account number at the back of the paper, walk into your bank's branch and tell the teller to deposit it. There is no need of mailing.", "title": "" }, { "docid": "28fbd6147331296e24091a48b5f615a7", "text": "It is important to understand that when or before you received services from your medical provider(s), you almost certainly signed a document stating that you understand that you are fully responsible for the entire bill, even though the provider may be willing to bill the insurer on your behalf as a service. In almost all cases, this is the arrangement, so it is very unlikely that you will be able to dispute the validity of the bill, since you did receive the service and almost certainly agreed to be fully responsible for the payments. With regard to the discounts, your medical provides have likely contracted with your insurer to provide services at a certain price or discount level, so I would base all of your negotiations with the providers and/or the collectors on those amounts. They can't legitimately bill you for the full amount since you are insured by a company they have a contract with, and you are not self-pay/uninsured, and the fact that they haven't been paid by your insurer doesn't change that, because the discount likely depends on the contact they have with your insurer and not whether or not they are billed/paid by your insurer. Please note - this is a common arrangement, but I'd recommend that you verify this with your insurer. Unfortunately, payment in 90+ days is often typical by insurance standards, so it's not yet clear to me whether or not your insurer has broken any laws such as a Prompt Pay law, or violated the terms of your policy with them (read it!). However, you need to find out which claims rep/adjuster is handling your claims and follow up with them until the payments are made. It's not personal, so make this person's life miserable until it is done and call them so often that they know it's you by the caller ID. I would also recommend contacting the collector(s), and letting them know that you don't have the money and so will not be able to pay, provide them with copies of the EOBs that state that the insurance company plans to pay the providers, and then ignore their calls/letters until the payments are made. When they call, simply reiterate that you don't have the money and that your insurance company is in the process of paying the bills. You have to expect that you will be dealing with a low-paid employee that is following a script. You are just the next person on their robo-call list, and they are not going to understand that you don't have a pile of money laying around with which to pay them, even if you tell them repeatedly. Make sure that you at no point give them access to any of your financial accounts, such as a checking or savings account, or a debit card - they will access it and clean you out. It is likely that your insurance provider will pay the providers directly since they were likely billed by the providers originally. If the providers have sold the debt to the collectors (and are not just employing a collector for debt they still own), you may have to follow up with the providers as well and make sure that the collection activity stops, since the providers may also need to forward the payments to the collectors once they are paid by the insurance company. Of course, if the insurer refuses to pay the claims, at that point I would recommend meeting with a lawyer to seek to force them to pay.", "title": "" }, { "docid": "c2b853fe46b7cbb9694b08f72eb9668b", "text": "What would happen if you was to cash a check, didn’t realize it was to you and your finance company, take it to a local business that has a money center, they cash the check without even having you sign let alone having the finance companies endorsement on it . The money cleared my account like a couple months ago and it was just brought up now .. ? The reason why the check was made out the owner and the lender is to make sure the repairs were done on the car. The lender wants to make sure that their investment is protected. For example: you get a six year loan on a new car. In the second year you get hit by another driver. The damage estimate is $1,000, and you decide it doesn't look that bad, so you decide to skip the repair and spend the money on paying off debts. What you don't know is that if they had done the repair they would have found hidden damage and the repair would have cost $3,000 and would have been covered by the other persons insurance. Jump ahead 2 years, the rust from the skipped repair causes other issues. Now it will cost $5,000 to fix. The insurance won't cover it, and now a car with an outstanding loan balance of $4,000 and a value of $10,000 if the damage didn't exist needs $5,000 to fix. The lender wants the repairs done. They would have not signed the check before seeing the proof the repairs were done to their satisfaction. But because the check was cashed without their involvement they will be looking for a detailed receipt showing that all the work was done. They may require that the repair be done at a certified repair shop with manufacturer parts. If you don't have a detailed bill ask the repair shop for a copy of the original one.", "title": "" }, { "docid": "cbd9dfe952f74b25dbcfbe52b673e532", "text": "\"A day or so later I get an email from the mattress company where the rep informs me that they will need to issue me a paper check for the full amount and that I would have to contact Affirm to stop charging me. To which I rapidly answered \"\"Please confirm that with Affirm prior to mailing anything out. On my end the loan was cancelled.\"\" To which the rep replied \"\"confirmed. It has been cancelled.\"\" I think your communication could have been more explicit mentioning that not only was the loan cancelled, you got your initial payments. You have not paid for the mattress. The refund if any should go to Affirm. The Rep has only confirmed that loan has been cancelled. at what point, if any, am i free to use this money? I was planning to just let it sit there until the shoe drops and just returning. But for how long is too long? Sooner or later the error would get realized and you would have to pay this back.\"", "title": "" }, { "docid": "1d2fefa7b803c708ff1d023b7780e877", "text": "\"•Have you had any problems with bills not being paid? NO •If you had issues, were they addressed satisfactorily? Answer: A big issue that blindsided me: With my bank, the funds come out of my account right away, but the actual payment is done through a third-party service. On my bank's online site it appears that the payment has been made, but that does not necessarily mean that the intended recipient has cashed it. Looking online at my credit union's site is useless, because all I can tell is that the payment has been sent. The only way to verify payment is to contact the intended recipient. Or I may telephone the online bill pay representative at my bank/credit union, who has access to the third party service. If I do nothing, after 90 days, the check is void, at which time the third party service notifies the bank/credit union and the funds will eventually end up back in my account. I learned this today, after a third-party paper check to a health care provider was returned to me via mail by the recipient (because insurance had already paid and I did not owe them anything). The money was in the hands of the third-party service, not in my account, nor that of my credit union nor the recipient. At first my credit union told me that I would have to contact the third-party service myself and work it out. I said \"\"NO WAY\"\" and the credit union did get the money back into account the same day. This is a sweet deal for the third party, who has my money interest-free anywhere from a few days to three months. And risk-free as well, because the money goes directly from my account to the third party service.\"", "title": "" }, { "docid": "cc7a6be9b8252d019482eb7a6c261482", "text": "Look up escheatment. Companies that have unclaimed property are supposed to send it to your State government. They should have a unclaimed property department of some sort. In short, the company is going to have to pay either you, or your State (In Your Name) so they have to pay it either way. It would be easier for them to just give you new check. Expect them to give you some grief in verifying it has not been cashed and such... but if you have the original, in hand, it shouldn't be too bad. A 'Lost' check may be harder to get replaced. Not a lawyer, don't want to be.", "title": "" }, { "docid": "b285e55976bdcb3fcc8739e2e1f1296e", "text": "Long story short, 8% turned out to be the tipping point because it was the average subordination level of the A rated tranches of the subprime MBS bonds. The reason this was the magic number is because of the way bonds were placed during the period. Basically no end user wanted to take on the risk of buying below A-rated paper, so instead of being sold directly, these BBB rated and below bonds were re-packaged into CDOs and tranched off. Again, the higher rated paper was sold off to whomever, while the BBB and below stuff got reshuffled and repackaged into other CDOs or CDO^2 , further levering up the initial subprime bonds. Now, back to the magic 8% number. Remember how I said that 8% was the subordination level for the A rated subprime paper? The other way of saying that is once defaults reached 8%, the BBB and below tranches of the the MBS were completely wiped out. Since the CDOs were largely made up of these BBB and below MBS, once they started getting written down so did the CDOs. When the lower rated CDO tranches started to go, because they were also repackaged in the same way, it just continued the negative feedback loop and before long even the AA and AAA rated paper was seeing massive losses. As more and more supposedly safe paper started to get wiped out, highly leveraged CDS contracts started coming due, causing AIG (which had written contracts on over $500 billion in assets) to get downgraded by the rating agencies, putting it on the brink of going under. Because basically every major bank had exposure to AIG, had they gone under, the other banks would have all had to write down those contracts at the same time, essentially causing the entire financial system to collapse.", "title": "" }, { "docid": "983d2b5de6ce0fa254f27f73d368e1d6", "text": "No, I felt that's what aweraw was trying to say, but they were not doing a good job of it so I took a crack at it from my point of view. I see where you are coming from too. Really, I suspect if we all sat down and had to write a unified view of the role luck plays in our lives we would be surprised how much we agree. :)", "title": "" } ]
fiqa
823c51c60c3a0c7907cf102fd4993d78
Why is economic growth so important?
[ { "docid": "98f54d88a85a868307f65e8850755114", "text": "\"One of the best answers to this question that I've ever read is in a paper published by Robert Lucas in the Journal of Economic Perspectives. That journal is meant to a be a place for experts to write about their area of expertise (in economics) for a general but still technically-minded audience. They recently opened up the journal as free to the public, which is a fantastic resource -- you no longer need a subscription to JSTOR (or whatever) to read it. You can read the abstract to the paper, and find a link to it, here. One of the things that I like a lot about this paper is that it strips out absolutely everything even slightly unnecessary to thinking about a macroeconomy, and just discusses what one can arrive at with a very very simple model. Of course, with great simplicity come sacrifice about details. However, it does a great job of answering your question, \"\"why do people care about growth?\"\" A quick note: the key to understanding the answer to your question is to think about things in terms of \"\"the long term\"\" -- not even looking forward to the future, because we'll be dead by then, but looking back to the past. The key to the importance of growth is that, for the last ~200 years, the US has, on average, had maybe 2-3% \"\"real growth\"\" per year (I'm pulling these numbers out of my head; I think much better numbers are in that paper somewhere). On average, over that period of time, this growth has meant that the quality of life that one has, if one lives in a country experiencing this growth, is enormous compared to countries that do not experience this average growth over that period. Statistically speaking, growth is also somewhat auto-correlated. Roughly speaking, if it was low the last few periods, you can expect it to be low the next period. Same thing if it's high. Then, the reason we care about growth right now: if you have too many periods of low growth, pretty soon the average \"\"over the long term\"\" growth will be pulled down -- and then quality of life can't be higher in the future (which quickly becomes someone's \"\"present\"\"). The paper above makes this point with a very simple model. Of course, none of this touches on distributional issues, which are another issue entirely. With respect to, \"\"The economy needs to grow to just keep up with its debt repayments,\"\" I think the answer is along the lines of, \"\"sometimes countries get into debt expecting that growth will increase their resources in the future, and thus they can pay back their debt.\"\" That strategy is, of course, the strategy that anyone borrowing (\"\"taking out a loan\"\") should be employing -- you should expect that your future income will be enough to pay back your interest+principle on a loan you took. Otherwise you're irresponsible. At the aggregate level, production is the nation's \"\"income\"\" -- it is what you have, all that you have (as a nation) to pay back any debt you've incurred at the national level.\"", "title": "" }, { "docid": "e1e60f940729d54ff30ec905c0b827c0", "text": "If you have an increasing population but a steady supply of wealth then there will be a perceived effect of decline. As the average person can afford less and less. If inflation is factored in this effect is accelerated as the value of money is reduced but the availability of that money is as well. In this model those who have tend to accumulate as they produce. And those who do not have tend to lose wealth as they consume to fill basic needs, at ever increasing prices, with a declining source of income, exacerbating the effect. If you control your population, prevent inflation and deflation, and maintain a constant production/consumption cycle that is perfectly in balance then you could have that utopian society. But in practice there is waste. That waste makes maintaining that balance impractical at best. People have different desires and motivations. So while that utopian society that you propose seems possible at the theoretical level when solely looking at the mechanics and economics, in practice it becomes more about managing the people. Which makes the task virtually impossible. As for the debt issue that is the strategy of many of the western nations. Most of them experienced growth over the last 50 years that was unprecedented in history. Many of them simply assumed it would continue indefinitely and failed to plan for a downturn. In addition they planned for the growth and borrowed based on the assumptions. When the growth slowed several continued to use the same projections for their budgeting, with the effect of spending money they would not take in. So in a way, yes the growth is needed to service the continued growth of debt, unless the government issuing that debt is willing to reduce its expenses.", "title": "" }, { "docid": "801125f5adf1109ba87736274e2082da", "text": "\"Wealth is not distributed equally in any economy. And, even if it were, differentiation between people would lead to different interests being expressed in different ways. As people either attempt to earn more (to improve their situation) or different people express those interests in different ways (saving money to go on a skiing holiday, or to put a downpayment on a house) people invite new products and services to be created to satisfy those demands. In addition, there is the problem of uncertainty. People save money today to cope with uncertainty tomorrow (healthcare, pensions, education, etc.). Those savings don't remain idle, but are lent to others who believe that they can make a return through investing in new businesses or ideas. The point being that any dynamic economy will experience change in the amount of goods available to the people within that economy. From an economic perspective \"\"growth\"\" is just another permutation. From a political perspective, \"\"growth\"\" implies that people are getting wealthier. If that growth is asymmetrically distributed (e.g. the poor don't experience it and the middle classes don't feel they get enough of it) then that is a problem for politicians. The emerging markets of the world are trying to raise millions of people out of poverty. Growth is a way of measuring how quickly they are achieving that end. Growth, in and of itself, is meaningless. There are some people who believe that \"\"we\"\" (as some proxy of society) have enough stuff and growth is unnecessary but that implies that everyone is satisfied. For as long as some people wish to have more wealth/stuff, and have the means to achieve this, there will be growth. And for as long as there is uncertainty growth will vary.\"", "title": "" }, { "docid": "5ae49d98c90ce4a6e696625fb9652c41", "text": "\"There is an economic principle called \"\"non-satiation,\"\" which translated into plain English means \"\"people always want more.\"\" (This was best illustrated in the movie, Oliver Twist, \"\"Please sir, can I have MORE?\"\") Over time, most people won't be satisfied with \"\"things as they are.\"\" Which is why growth is so important. Many behavioral economists would argue that it is not the LEVEL of utility, but rather the utility CHANGES (in calculus, \"\"deltas\"\" or \"\"derivatives\"\") that make people happy. Or not.\"", "title": "" }, { "docid": "d41d8cd98f00b204e9800998ecf8427e", "text": "", "title": "" } ]
[ { "docid": "75a613f300d608dc836212f6ab7e764b", "text": "The way the world gained all its wealth is by innovation driven by the pursuit of profit/higher standard of living. If you remove that incentive then we will no longer keep progressing. That's why socialism always fails - you eventually run out of other people's money and innovation halts.", "title": "" }, { "docid": "8f2bef14f660f139c46d5101f2705180", "text": "Manufacturing *employment*. Manufacturing *output* has increased. The people who used to be employed in manufacturing are slowly being shuffled to places where they can be more productive rather than taking up space in jobs where they have become extraneous due to productivity gains. This means a lot of retraining is necessary but there's really little alternative. This has nothing whatsoever with the growth potential of the economy, so I'm not sure why you brought it up.", "title": "" }, { "docid": "3ad3d880e9d7646869f8714ddd5dd6f0", "text": "The problem here is that the metrics that are used to track the economy are looking for things like growth and change. In a perfect world, everyone would have exactly what they need and there would no need for economists because the economy would be static.", "title": "" }, { "docid": "49a4e089e1558189fc81624d3f4d8ebc", "text": "I think the straight productivity curve is supposed to represent the idea that the economy is always growing as opposed to shrinking overall, like you said. I beleive the video leaves out the idea of innovation to keep it simpler and cut down on length(Of an already half hour video). Thanks for the connection between innovation and productivity. Im new to this stuff and it hadn't occured to me.", "title": "" }, { "docid": "17361070131059b6ba867cba09f1d51b", "text": "The President, Democrat or Republican, has very little effect on the growth or performance of an economy. The Federal Reserve has the largest impact, followed by Congress. Interestingly, if US government spending was not frozen in 2010, the US would have grown closer to the historical average of 3%. Government spending, which is controlled by Congress, brought down GDP growth.", "title": "" }, { "docid": "4648dfc15b0c956e6a3a09c8f7728c39", "text": "Anything related to the central bank will have a large impact, as they are the ones who determine interest rates, and interest rates have a big effect on currency flows. GDP is also important, as when there is an economic slowdown it may result in the central bank reducing rates to boost economic activity. The opposite is also true, large increases in GDP may mean that an interest rate hike might be needed. Inflation data is also very important. Again, large changes in inflation either way may push the central bank towards changing rates. This data typically is in the form of CPI Note that each central bank is different. They all have specific mandates and specific pieces of economic data that they place emphasis on. The Federal Reserve as of late has closely been watching inflation data, especially wage inflation data, and employment. Significant deviations in these data points from whats expected by investors can greatly move the market. However, these specific factors are a little less important for, say, Mexico, which is mostly concerned with headline inflation. Read the statements issued by the central banks to find out whats important to them. Central banks also issue expectations for things like growth, CPI, etc. If these expectations are not met, it may result in a policy change, or at least talk of a policy change, at the next meeting of the central bank. Anticipating these policy changes and trading accordingly is one strategy to be a profitable forex trader Also, there are several forex news calendars online that indicate what is likely to be high impact news. These can be helpful starting out.", "title": "" }, { "docid": "a3d4e2f50066dd7f36ddafc743b62f23", "text": "Don't try because it's a moving target. A thriving economy on paper can be entirely valuation based. It tells you nothing about distribution of wealth in the economy. The majority would be destitute and we could still be talking of booming times if speculative markets can find creative ways of growing valuations of existing assets with credi growth. All that is needed is for two people to bid a painting to 100 million for the painting to have contributed positively to a growth in the value of goods and services in the economy. The same is done with intellectual property and corporate valuations. Good times are times when capital gains can be seized on account of expansionin of credit or government spending. Recessions are closer when governments try and pull in more than they spend and when lending can't expand. Government spending is increaasing these days despite talk of the contrary.", "title": "" }, { "docid": "c5400b79beb6a45b0d3b754088bd5599", "text": "The few short years of economic pain from the devaluation will produce a better and growing economy over the long run. My thought with their devaluing of the currency is that more foreign capital would flow in and be used for investment which would lead to economic growth.", "title": "" }, { "docid": "1bf91e63d694815d6891b3f80d18ba29", "text": "What I think Warren means is that people like him are really good at making money and setting things up to continue being rich. In Warren's case he's very good at evaluating businesses and if they would be good investments. In the micro this isn't really a problem. Instead the problem is on the macro-level. When enough potential market participants (i.e. people / businesses) aren't enabled to participate in the economy in the same way. This feeds into a growing wealth inequality. The people who have the resources to continue playing the game can also continue with more chances. It's a Pareto Principle situation. No opportunity to play, little to improve, and a continually disadvantaged population. Add time into the soup. Rich get richer, the poor poorer, the gap widens more. Add inflationary mechanics, and the fact that being poor is more expensive. Add debt and an inability to purchase for long term solutions. You get a situation where 99% of the money is cycling around in the top 1% of players. The other 99% of potential market participants are poorly utilized up to the point where their wealth is something they have trouble spending for things like...healthcare. The idea of poorly utilized market participants is key. A growing economy wants more bandwidth. It wants more agents or market participants contributing to the flow. Get rich enough and you'll find you can't spend more than the interest on investments. On the contrary if you don't have very much money, it's easy as hell to spend it quickly! It's straightforward to say that if more of the global population weren't in debt, if they weren't in a state where they can't participate in economic growth, then maybe the economic growth of human society wouldn't be so bottle-necked.", "title": "" }, { "docid": "fd5b4a324c5974866517d822c8a855a4", "text": "I mostly agree with everything you said except the part regarding debt. The whole point was that continued growth would pay off debt, not that individuals would go into more debt than they can pay off. The second idea would be illogical as debt holders want to get payed back.", "title": "" }, { "docid": "dd627ec2164df6539634b7486e7d0ba3", "text": "That's like saying corporations ruin the economy because they employ people that could otherwise start their own successful business. Why didn't those people start a successful business? Why do people work for corporations? Building infrastructure in poor countries adds to the resources that these people can tap into and also adds value to their community.", "title": "" }, { "docid": "c453261c2cf0ac5964870d3679062958", "text": "Some innovations increase productivity quite a bit. So in the long run, innovations is a main driver or economical growth. And innovation is fueled by, indeed, debt. The straight curve in the video, the economical growth, should not be a straight line, but a upwardly curved one. It cannot go down because innovations in productivity are not lost (I challenge you for an example contradicting this. Normally, every upward cycle should create an extra increase in productivity. The government also plays a role in stimulating innovation. I loved this video btw.", "title": "" }, { "docid": "fea4987a372acd24b105dcf1e353b304", "text": "Hurricanes are not good for the economy. They might be good for GDP, but GDP is not a good measure of the economy in cases of natural disasters. [The increase in GDP is due to rebuilding and replacing things that existing prior to the disaster](http://www.marketwatch.com/story/no-hurricanes-are-not-good-for-the-economy-2017-08-28). There is no increase in the size of the economy or improvements in living standards. Also see: [the parable of the broken window](http://www.investopedia.com/ask/answers/08/broken-window-fallacy.asp) for why disasters are not good for the economy.", "title": "" }, { "docid": "7e39b94e58872fe0eeae94b3879bbb6b", "text": "\"Economics is built on the assumption that people make rational decisions based on the desire to increase their economic well-being. While economists have long known that isn't strictly true, Thaler was a pioneer in studying why people sometimes make irrational decisions, and how they can be encouraged to make smarter ones. He's made economics more human,\"\" said Peter Gärdenfors, a member of the commitee that awarded the prize.\"\" So how come the business world still ignores him? And treat humans like machines?\"", "title": "" }, { "docid": "460d85a7c8ff70a578985dbad0479ede", "text": "A growing economy should become more efficient because of increased opportunity for division of labor: specialization. External regulation or monetary policy external to the free market can cause parts of the economy to grow in response to said regulations. This creates inefficiencies that are wrung out of the economy after the policies reverse. A couple of examples: Tinkering with the economy causes the inefficiencies.", "title": "" } ]
fiqa
4fe80fe0cb5a39251b0d07439349ad32
What economic growth rate is required to halve U.S. unemployment?
[ { "docid": "09abde76b0f63757066f6a37f5f67cd1", "text": "Two points.", "title": "" }, { "docid": "27ab72e4247af818501bd40cd4198cbd", "text": "I believe the Bureau of Labor Statistics has published some numbers in this area... I cannot find them at the moment though. I think you need to take these numbers with a grain of salt, though, because they cannot account for productivity and automation improvements that are being aggressively implemented. Companies aren't just bloodletting -- they are refactoring business processes and automating thousands of jobs away.", "title": "" }, { "docid": "a6504e1691c18af10f0d1f8d1458d257", "text": "I'm reminded of Say's Law (developed by Jean-Baptiste Say) which can best be reduced to: The market clears (i.e. there is always some price at which an item will sell in a market). Full employment can always be obtained in any free market economy. People may not be pleased, however, with their wage rate. There are, however, many deterrents to employment (at least in the US): These are just some I can think of off the top of my head. I'm sure there are many others.", "title": "" } ]
[ { "docid": "43e9018edef4ae4b03bfac584b53b347", "text": "Schiff is a goon. Most growth has come from the private sector over the last two years and GDP growth has actually been reduced due to cutbacks at the state &amp; local government levels. So, Schiff, who is always and forever claiming the sky is falling, failed to realize the largest burden on GDP growth in recent times has been the public sector.", "title": "" }, { "docid": "8f2bef14f660f139c46d5101f2705180", "text": "Manufacturing *employment*. Manufacturing *output* has increased. The people who used to be employed in manufacturing are slowly being shuffled to places where they can be more productive rather than taking up space in jobs where they have become extraneous due to productivity gains. This means a lot of retraining is necessary but there's really little alternative. This has nothing whatsoever with the growth potential of the economy, so I'm not sure why you brought it up.", "title": "" }, { "docid": "77cc6e71d0cf55fe78f17a2a2f23fc6d", "text": "\"This is the best tl;dr I could make, [original](http://reason.com/archives/2017/07/11/the-myth-of-technological-unem) reduced by 90%. (I'm a bot) ***** &gt; Isn&amp;#039;t technological unemployment a real and serious problem? Non-economists of a quantitative bent fret about what we&amp;#039;re going to do when all the jobs go away-when, say, autonomous vehicles replace America&amp;#039;s 3.5 million truck drivers. &gt; The gross figure of 1 percent of jobs lost per month is the relevant one for worries about technological unemployment. &gt; One in which all jobs are protected, bureaucrats decide who gets subsidies and who doesn&amp;#039;t, and the economy slides, as France has, into stagnation and high levels of youth unemployment? Or one in which labor laws are flexible, individual workers decide their own futures, and the economy lifts up the poorest among us? ***** [**Extended Summary**](http://np.reddit.com/r/autotldr/comments/6mupwx/the_myth_of_technological_unemployment/) | [FAQ](http://np.reddit.com/r/autotldr/comments/31b9fm/faq_autotldr_bot/ \"\"Version 1.65, ~165476 tl;drs so far.\"\") | [Feedback](http://np.reddit.com/message/compose?to=%23autotldr \"\"PM's and comments are monitored, constructive feedback is welcome.\"\") | *Top* *keywords*: **job**^#1 **worked**^#2 **know**^#3 **percent**^#4 **unemployment**^#5\"", "title": "" }, { "docid": "c8d8c6e506c44613c598e5852db46dec", "text": "I am - The economy is influenced by the debt and government manipulation in the short term, which is going to drive employment (or lack thereof). In the slightly longer term, a financial collapse followed by an economic collapse and depression are going to mean very high unemployment for a very long time. What we've got now is only bad compared to what we've been used to for the last few decades. In a depression where government aid is unavailable because the government is the cause of it, things will be considerably worse.", "title": "" }, { "docid": "bc2cbe853f9e8eef26e8761b1910f98f", "text": "\"Who's economy? Just because unemployment is high doesn't mean there aren't quite a few people prospering. If you want to work in a factory, chances are you're not feeling too good about the next 10 years, because you know your job is going somewhere where someone is willing to work for $2 per day. If you work in health care, or IT, or engineering, or any number of other highly skilled fields, then chances are your outlook is nowhere near as bleak. Most companies are making tons of money, the stock market is doing well, sales number in retail last weekend were great, etc. When it comes to jobs and the economy there really are two Americas right now. The real problem is the number of people have joined the \"\"screwed-up-the-ass\"\" half and have no way of making it out.\"", "title": "" }, { "docid": "40f561f8209ce879f10e0cef32723d1f", "text": "Whatever the supply of labor and demand for labor set. If tomorrow suddenly the American economy took off, unemployment dropped to almost 0, Walmart would have to start raising wages in order to fill cashier slots. Does this mean that suddenly Walmart employees are giving more to Walmart? No, of course not, it just means the supply and demand of labor had radically changed.", "title": "" }, { "docid": "902b8789b49cb810183b36bad2bd2155", "text": "The thing is that employment is a part of a loop, not an end in and of itself. You work to make money. You make money to spend it. Other people work to give you what you spend money on so they can get that money etc. If your problem is that there isn't enough production to meet demand then employment will rise and people will meet that demand. On the other hand if something external disrupts the cycle and you get mass unemployment for some reason that will depress demand since all those people don't have money to spend anymore. Thus there is lower demand for services since there is less money to pay for those services. This is the downward spiral of a Depression. My worry is that if we keep supplanting all the manual labor jobs (eventually including most retail in this) then who's going to be buying those services?", "title": "" }, { "docid": "51df52968a465322c736696c73075357", "text": "Increasing demand, the price people are willing to pay, will also increase profits, leading to the virtuous cycle you describe. The government spending tax dollars, also leads to growth. The 2 sides balance out. The difference between CEO pay and employee pay is that employees spend their money, while CEOs save money. So by taxing profits, money is put back into the economy.", "title": "" }, { "docid": "0e48cf12e034a20234b2c780e0bcb904", "text": "Agreed. The number of capable people who are either unemployed and/or willing to work for less in the world is a few multiples of the entire USA population. The USA really doesn't need more workers because they cannot compete with the rest of the world. Unfettered world wide trade might be good for the world, but it is not so good for the bottom 50%-30% of the USA. Something about concentrated costs and diffuse benefits.", "title": "" }, { "docid": "8f8ab36f5b3b68d464b63f65b7b51414", "text": "You're only thinking very short term. Less people means less construction is needed since there's less demand. Less demand for goods means less goods are sold. So smaller profits in the longer term. Why do you think there are more jobs and opportunity in New York than a place like Kansas?", "title": "" }, { "docid": "67ba1ec928c501aec8dd8807b3c6e914", "text": "Yeah exactly. The problem is that metrics like unemployment rate are just really poor metrics the way they're measured. And to make matters worse we double down and use those same poor metrics to create derivative measurements like the Phillips curve. The result is models that model nothing, but still manage to be the basis of policy decisions.", "title": "" }, { "docid": "7e1b72a5a28d65b5d87e882185f51eca", "text": "The solution is spending restraint during the growth periods and prudent application of counter-cyclical fiscal policy, especially during the slow periods. The USA embarked on a strange experiment lead be Greenspan of excessively low interest rates for a prolonged period of time. Periods of strong economic growth should feature high interest rates, periods of reduced economic growth can then be countered somewhat through monetary policy. The government should also endeavour to run surplus budgets during the good times and not be afraid of turning those into deficit budgets in the downturns. If you run a deficit budget during a period of strong economic growth, together with low cash rates you have nowhere to move when the cycle reverses. The solution now? That is difficult. I would say that the solution now would be to raise revenues through corporate taxes and similarly increase government spending on investments aimed at stimulating the economy. Use this time to invest in the much needed infrastructure maintenance and upgrades that the USA needs. These need to be fast-tracked into action and I would therefore consider fixing infrastructure as more important than installing new infrastructure. There are probably long-term structural adjustments that need to be looked at too, but I am not intimately familiar with the USA as I am Australian. It is clear however that Austerity during economic downturns does not help end the recession (or benign growth). It is clear to me as an observer however that employment appears to be the big issue in the USA right now, so cutting jobs is not a smart move. Edit: I'll point out that my opinion comes from the Australian experience, our government ran surplus budgets during our period of recent growth and our reserve bank kept interest rates high. When the GFC hit us in 2008 the government almost instantly reversed its fiscal policy, going so far as mailing $900 cheques to every Australian just to get cash flowing in the economy, they then embarked upon infrastructure spending programs. Similarly the reserve bank were able to quickly and dramatically reduce interest rates. The result was that we saw 1 quarter of mildly negative growth, and positive growth ever since (hence no recession). We ran a textbook example of counter-cyclical fiscal and monetary policy which is today lauded by economists over. We now have 5% unemployment, low government debt (relative to the OECD) and high economic growth (relative to the OECD).", "title": "" }, { "docid": "b94ea38c7ef068cfe5dfe53472c9809d", "text": "\"But you are oversimplifying economics. 1) Not everyone can be a geneticist, but most people are capable of being manufacturers, carpenters, electricians, etc. with the proper technical training. America is failing on this in two fronts: (a) we are not making it worth it for companies to keep manufacturing here in the States and (b) we are not giving our workforce the technical skills necessary. So many manufacturers are asking the question \"\"who is going to take over our retiring workforce of skilled blue collar jobs?\"\". 2) Even if we can get 40% of our work force into skilled blue collar, white collar, or professional jobs that means the other 60% are easily employable in what's called the non-basic sector, basically jobs like retail, services, residential real estate, etc, etc. The more we focus on how America can generate many higher tech jobs to compete globally (green technology anyone?) the higher the standard of living, the more luxuries we can afford that generate more jobs. Nobody has to be dead weight except: (a) people who choose not to work, in which case they have no business receiving anything but basic food and shelter from society, (b) people who have disabilities, for which we should have programs in place. We had full employment for many years even as our population grew. The only reason unemployment is so bad today is because America is losing many jobs to technology and globalization and not finding ways to compete and our work force can't handle many of the new jobs anyways.\"", "title": "" }, { "docid": "b7089553b51cc256baf371ae747cacfe", "text": "The long-run goal is to eliminate poverty through wealth creation. If that makes for some weird new social interactions, I'd say that's a reasonable cost. I mention comparing to earlier periods simply as a measure of progress to determine whether or not there is a problem that needs correction, such as a specific group in society experiencing real wage stagnation, or truly anemic growth rates relative to earlier periods. It's the slope of the trend line for each group that I'd be worried about, where linear or exponential is good, and logarithmic should indicate a potential crisis. Ultimately, I believe that it's not a persons absolute circumstances that matter, but the rate at which those circumstances are improving throughout their lives that most strongly affects their subjective well-being (but that's just my theory). As for real estate costs, you're absolutely correct that this is a problem, but it's as easily explainable problem. Supply is artificially constrained in most of the US due to the need for explicit government permission (in the form of building permits and zoning laws) in order to build new units. Basic economics says that when supply is artificially restricted, prices will rise. In areas where government is restrictive, such as San Francisco, prices rise sharply. In places where government is more permissive, like Houston, prices remain much more reasonable.", "title": "" }, { "docid": "a3ff25108a43891b3e41794e3f1a7703", "text": "\"Do you expect governments to completely cut spending? Are you a utopian libertarian? I'm struggling to see how I'm \"\"crossing factoids.\"\" I was making the point that the private sector has been growing at a faster pace than GDP as a whole over the past two years due to the public sector's shrinking. So, that proves Schiff's \"\"theory\"\" incorrect.\"", "title": "" } ]
fiqa
abf65a5ba89b87c14127877c7438cad1
The U.S. National Debt: What is it, where did it come from, and how does it work?
[ { "docid": "d41d8cd98f00b204e9800998ecf8427e", "text": "", "title": "" }, { "docid": "edf7c1457d24618f33e20f3583190f90", "text": "\"It is measured in US dollars. The US cannot just print the money because that would cause inflation. Remember that money is really just a convenient placeholder for the barter system. Creating more money regardless of whether there is more value in the economy (work, resources, etc.) is a very bad idea, and doing so has collapsed the economies of many countries. Debt increasing means that the US owes other countries more money. So yes, they are receiving more money from other countries, but the US has to pay it all back with interest eventually. The US government spends more money than it receives in taxes. To decrease the debt, spending needs to decrease and/or taxes need to increase. Many countries lend to the US. One of the biggest is China. These countries do so because of interest -- the US pays back more money than it gets lent, so the lending countries make a profit. If China suddenly called in all its debt to the US, this would severely damage the world economy. China's biggest trading partner is the US, so it has no interest in harming the US this way; it would harm itself. Additionally, the US would probably refuse to pay it (not to mention that it can't), and then China would lose all the money it \"\"invested\"\" in the US. It would benefit no one.\"", "title": "" }, { "docid": "da65d37e11ced3265657280ccf9478aa", "text": "\"For political reasons, almost all governments (including the US) spend more money than they get from taxes etc. There are a number of things a government can do to cover the difference: Most governments opt for selling bonds. The \"\"National Debt\"\" of a country can be thought of as being the sum of all the \"\"Bonds\"\" that are still paying interest, and that the Government hasn't Redeemed. It can all go horribly wrong. If the Government gets into a situation where it cannot pay the interest, or it cannot Redeem the Bonds it has promised to, then it may have to break its promise (\"\"Default\"\" on its payments). This makes the owners of the Bonds unhappy and means potential buyers of future Bond sales are less likely to want to buy the Governments new Bonds - effectively meaning the Government has to promise to pay more interest in the future. Recent examples of this include Argentina; and may include Greece soon. The US is in the fortunate position that not many people believe it will Default. Therefore the new Bonds it sells (which it does on a regular basis) are still in demand, even though its interest payments, and promises to Redeem Bonds are huge.\"", "title": "" } ]
[ { "docid": "51ae70970f131c5d6c844b349c70a334", "text": "\"Well, the one variable you're forgetting is that we didn't have as much debt hanging over our heads as we do now. As I understand it, maintaining that conflict cost so much money, we're still paying for it today, the better part of a century later. Are you sure that the Federal government should undertake that level of spending again as the Fed is poised to raise rates, reversing a decades long trend of cheap borrowing? Edit: typo, added \"\"sure\"\"\"", "title": "" }, { "docid": "edfaea8b74131376f39df1847e966ad5", "text": "It's misleading news. Comparing debt levels in nominal terms is completely pointless over a period of more than a few months. The article you responded to quite literally quoted extracts from the article you subsequently posted and explained why they were misleading or incorrect.", "title": "" }, { "docid": "86624c3d1509fa6dba40561c99974129", "text": "\"What a great explanation! I was familiar with many of the concepts, but I've learnt quite a lot. Do you happen to know any sources for further reading that are just as understandable to a non-economist? And/Or would you mind continuing / expanding this into whichever direction you find worth exploring? I would love to see this explanation \"\"connected\"\" to the debt crisis and how/why the US and europe seem to be in different situations there. Maybe that would be too complex to explain in more detail using your model, but maybe it is possible..?\"", "title": "" }, { "docid": "e0e5d944dbede9d873ca89e5d76e8c6a", "text": "Every year stories like this come out. Every year the US does not default on its debt. We all should know by now that the US, as a financially sovereign nation that issues its own currency, cannot default on its debt. This fearmongering is just a click-baity waste of time, and yes, a waste of money.", "title": "" }, { "docid": "c4256692af1f36bc4422ea1aa0c48647", "text": "So much spin with you. Kenyes wrote explicitly about deficit spending, and the repayment of those deficits. The denomination of the currency, floating or otherwise, is besides the point. Again, you just want to model away the burden and risk of debt. It's never worked, and it never will.", "title": "" }, { "docid": "da30a3dcb2f76975f39adac551027576", "text": "\"I'm surprised people don't bring this up more often....if you add together, not just our sovereign debt, but public and private debt, plus our contingent liabilities, meaning FHA, student loans, fannie mae, freddie mac, AIG, etc. that totals over $100 TRILLION dollars, more than we could ever pay back, meaning literally there is no amount of growth and taxes that could ever pay this money back. (cite my sources do a google search of James Rickards Hopkins lecture it's in the first few minutes) The reason you need to add all that together is because the economy can't grow if nobody has any money for investment, etc. (there isn't much home equity left after the housing crisis, retirement plans aren't holding as much, etc.) there wouldn't be an easy way to grow this economy, that's why we have \"\"currency wars\"\" competitive devaluations....to me we're already over the cliff I don't see us heading back, but I'm not saying that means we're going to collapse, just we'll need to go back to some sort of standard where our currency is backed by something (i.e. commodities or gold or something) and there are going to be A LOT of losses in the near term....meaning I want OUT of dollars.... combined with our lazy/entitled generation (don't tell me creating some website where you can order artistic candy on a stick is going to save our economy...we need to produce and innovate again to lower our trade deficit and so people actually bring their capital here), and dwindling resources I'd say it's already game over, the pieces just need to move into place\"", "title": "" }, { "docid": "b12b0aabd80cb5c2609e5f39ae7a7ad3", "text": "The debt is absolutely real. China loans money to US via buying the US treasury bonds. The bond is essentially a promise to pay back the money with interest, just like a loan. As you point out, the US can print money. If this were to happen, then the USD that the owner of a treasury bond receives when the bond matures are worth less that than the USD used to purchase the bonds. There are lots of reasons why the US doesn't want to print lots of money, so the purchaser of the bond is probably confident it won't happen. If for some reason they think it is possible, then they will want to cover that risk by only purchasing bonds that have a higher interest rate. The higher interest offsets the risk of the USD being worth less. Of course, there are lots more details, e.g., the bonds themselves are bought and sold before maturity, but this is the basic idea.", "title": "" }, { "docid": "53205f3ae9cc5c0fa3b952d110994482", "text": "\"I think a big part of the issue is ignorance. For instance, the US govt cannot default on its loans, yet you keep hearing people speak as if it could. The US govt also does not have to borrow to pay for anything, it creates its own money whenever it wants. These 2 facts often evade many people, and they feel the US govt should act like a household, business, or a state govt. This disconnect leads to a lot of confusion, and things like \"\"fiscal crisis\"\". Just remember Rahm Emanuel - don't let a crisis go to waste. Disclaimer: this is not to say the US should create money whenever it wants without thought. However, the simple fact is it can. For those interested in more, check out Modern Monetary Theory (MMT). Its economic study in a world not based on gold standard, or convertible currency (fiat currency).\"", "title": "" }, { "docid": "571398a48e3c53d7bc290a6bf8d61fda", "text": "It's a persistent myth that the US has any trouble whatsoever selling its debt. No country with it's own fiat currency has trouble selling debt. Of course there is a limit to it and that limit comes in the form of inflation via currency weakness. The dollar is, in fact, still near historic highs even though it has come down some recently. I would not be the slightest bit concerned until the DXY is down in the 70s.", "title": "" }, { "docid": "5dcc89257e63613f61bf2a73177ea86d", "text": "\"&gt; but the other countries are just decline stage. I think you have a typo. Could you please explain what you mean? If I understand correctly, you are saying that the US produces \"\"value\"\" and other countries do not. As the US has tended to run a high deficit since the Reagan era (i.e. it increases its debt every year) this seems a contentious statement.\"", "title": "" }, { "docid": "aa54fda0a92cf027e4c6bb162493e245", "text": "The higher the debt, the higher inflation needs to be to wash the debt away. This is why the debt and US equities move upward hand in hand. The same goes for US housing. Just as homeowners borrow money through mortgages so that house prices rise, the banks borrow the money for mortgages through the central banks. Thus, the cycle circulates. The more debt, the higher the prices! Everybody makes money from debt. That is why the US has the highest external debt on the globe, yet they are considered one of the wealthiest countries in the world.", "title": "" }, { "docid": "02a356426e29ae90e2620cb53aff3028", "text": "I still don't fully understand how gold is debt. I get that you made the connection that gold is money, and previously explained how money is debt. But that doesn't make gold debt. Gold is a commodity just as oil, apples, deer, shoes, etc. It might not provide any utility, but is still something people have come to value in and of itself.", "title": "" }, { "docid": "f4d5041c8853eb7d34b9ce9103b06f26", "text": "&gt; Your question is expressed as a run-on sentence, which I'm having trouble parsing. Maybe you could restate. The one in the title? If yes, here it is restated: *As I currently understand, we owe much of our national debt to ourselves. The reason for this is that people are being charged interest that does not exist in the system. Therefore, if we tried to pay the debt (like some conservative politicians are fighting for) it would be a massive transfer of wealth from the 99% to the 1%, since most of the debt is owed to the 1% (banks).* So I was wondering if this conclusion/summary/understanding is flawed in some way.", "title": "" }, { "docid": "315b96980ba53cf27c60c176d224e58b", "text": "&gt;The US government debt is how much USD the government has paid the US non-government in excess of what it's taxed them. Correct? Incorrect. The US debt/savings is the balance of credit the US government maintains with US banks, and foreign sovereigns/banks. Why do you need to say it another way? WTF is 'non-government' savings? Other than an academically retarded way of saying 'debt' of course? Its not a bad thing... unless interest rates rise. But this time is different, so that'll never happen. I'm sticking to my initial assessment. Fairyland.", "title": "" }, { "docid": "7d87c699d1503768a304fa752a29f7e3", "text": "Your score is real-time, updating every time new data hits the reporting agencies. Dilip is correct, go over 20%, and it will hit the report, but then the score returns to normal after the next bill shows a sub-20% utilization. Say your average spending is $1000, but your limit is $5000. There's no harm in asking for a small increase in the limit, or simply pay a bit toward the bill before the statement is cut. The bill and reported balance will be lower and your score, unaffected.", "title": "" } ]
fiqa
9fe328d07b58b4bf61a44fa3bbc5ec4a
Stocks vs. High-yield Bonds: Risk-Reward, Taxes?
[ { "docid": "d41d8cd98f00b204e9800998ecf8427e", "text": "", "title": "" }, { "docid": "a49db2e2d205b37bb8e4240e6f249904", "text": "When credit locks up, junk bond prices fall rapidly, and you see more defaults. The opportunity to make money with junk is to buy a diversified collection of them when the market declines. Look at the charts from some of the mutual funds or ETFs like PIMCO High Yield Instl (PHIYX), or Northeast Investors (NTHEX). Very volatile stuff. Keep in mind that junk bonds are not representative of the economy as a whole -- they cluster in certain industries. Retail and financials are big industry segments for junk. Also keep in mind that the market for these things is not as liquid as the stock market. If your investment choice is really a sector investment, you might be better served by investing in sector funds with stocks that trade every day versus bonds whose market price may be difficult to determine.", "title": "" } ]
[ { "docid": "564005dc162c72c98e107c637b036256", "text": "For bonds bought at par (the face value of the bond, like buying a CD for $1000) the payment it makes is the same as yield. You pay $1000 and get say, $40 per year or 4%. If you buy it for more or less than that $1000, say $900, there's some math (not for me, I use a finance calculator) to tell you your return taking the growth to maturity into account, i.e. the extra $100 you get when you get the full $1000 back. Obviously, for bonds, you care about whether the comp[any or municipality will pay you back at all, and then you care about how much you'll make when then do. In that order. For stocks, the picture is abit different as some companies give no dividend but reinvest all profits, think Berkshire Hathaway. On the other hand, many people believe that the dividend is important, and choose to buy stocks that start with a nice yield, a $30 stock with a $1/yr dividend is 3.3% yield. Sounds like not much, but over time you expect the company to grow, increase in value and increase its dividend. 10 years hence you may have a $40 stock and the dividend has risen to $1.33. Now it's 4.4% of the original investment, and you sit on that gain as well.", "title": "" }, { "docid": "f6ac2bcc59fee8f3220b9dbae3fc484a", "text": "\"A few points that I would note: Call options - Could the bond be called away by the issuer? This is something to note as some bonds may end up not being as good as one thought because of this option that gets used. Tax considerations - Are you going for corporate, Treasury, or municipals? Different ones may have different tax consequences to note if you aren't holding the bond in a tax-advantaged account,e.g. Roth IRA, IRA or 401k. Convertible or not? - Some bonds are known as \"\"convertibles\"\" since the bond comes with an option on the stock that can be worth considering for some kinds of bonds. Inflation protection - Some bonds like TIPS or series I savings bonds can have inflation protection built into them that can also be worth understanding. In the case of TIPS, there are principal adjustments while the savings bond will have a change in its interest rate. Default risk - Some of the higher yield bonds may have an issuer go under which is another way one may end up with equity in a company rather than getting their money back. On the other side, for some municipals one could have the risk of the bond not quite being as good as one thought like some Detroit bonds that may end up in a different result given their bankruptcy but there are also revenue bonds that may not meet their target for another situation that may arise. Some bonds may be insured though this requires a bit more research to know the credit rating of the insurer. As for the latter question, what if interest rates rise and your bond's value drops considerably? Do you hold it until maturity or do you try to sell it and get something that has a higher yield based on face value?\"", "title": "" }, { "docid": "9ed4fcf38b6b750eddd20aed017cac45", "text": "\"The two are not incompatible. This is particularly true of Glaxo and Pfizer, two drug companies operating in roughly the same markets with similar products. Many \"\"good\"\" companies offer a combination of decent yields and growth. Glaxo and Pfizer are both among them. There is often (not always), a trade-off between high yield and high growth. All other things being equal, a company that pays out a larger percentage of its profits as dividends will exhibit lower growth. But a company may have a high yield because of a depressed price due to short term problems. When those problems are fixed, the company and stock grows again, giving you the best (or at least the better) of both worlds.\"", "title": "" }, { "docid": "07840ca3531beffb6cc1cd5266218a0c", "text": "\"In the US, dividends are presently taxed at the same rates as capital gains, however selling stock could lead to less tax owed for the same amount of cash raised, because you are getting a return of basis or can elect to engage in a \"\"loss harvesting\"\" strategy. So to reply to the title question specifically, there are more tax \"\"benefits\"\" to selling stock to raise income versus receiving dividends. You have precise control of the realization of gains. However, the reason dividends (or dividend funds) are used for retirement income is for matching cash flow to expenses and preventing a liquidity crunch. One feature of retirement is that you're not working to earn a salary, yet you still have daily living expenses. Dividends are stable and more predictable than capital gains, and generate cash generally quarterly. While companies can reduce or suspend their dividend, you can generally budget for your portfolio to put a reliable amount of cash in your pocket on schedule. If you rely on selling shares quarterly for retirement living expenses, what would you have done (or how much of the total position would you have needed to sell) in order to eat during a decline in the market such as in 2007-2008?\"", "title": "" }, { "docid": "d6a0cddee37083f56a9630e1a143bc67", "text": "This is subject to some amount of opinion, but I think that Treasury Inflation Protected Securities (TIPS) are closest to what you describe. These are issued by the US Treasury like a treasury bond, but the rate is adjusted for inflation. https://www.treasurydirect.gov/indiv/products/prod_tips_glance.htm I see your comment about taxes. TIPS are exempt from state and local taxes, but they are subject to federal tax on the income and on the growth of the principal.", "title": "" }, { "docid": "67a8f8a83db55a5a110890deeebbdcf3", "text": "\"You have a high risk tolerance? Then learn about exchange traded options, and futures. Or the variety of markets that governments have decided that people without high income are too stupid to invest in, not even kidding. It appears that a lot of this discussion about your risk profile and investing has centered around \"\"stocks\"\" and \"\"bonds\"\". The similarities being that they are assets issued by collections of humans (corporations), with risk profiles based on the collective decisions of those humans. That doesn't even scratch the surface of the different kinds of asset classes to invest in. Bonds? boring. Bond futures? craziness happening over there :) Also, there are potentially very favorable tax treatments for other asset classes. For instance, you mentioned your desire to hold an investment for over a year for tax reasons... well EVERY FUTURES TRADE gets that kind of tax treatment (partially), whether you hold it for one day or more, see the 60/40 rule. A rebuttal being that some of these asset classes should be left to professionals. Stocks are no different in that regards. Either educate yourself or stick with the managed 401k funds.\"", "title": "" }, { "docid": "69d52c5b1de2ac2f383d5cc2b8f189c9", "text": "Because stock markets don't always go up, sometimes they go down. Sometimes they go way down. Between 2007 and 2009 the S&P 500 lost over half its value. So if in 2007 you thought you had just enough to retire on, in 2009 you'd suddenly find you had only half of what you needed! Of course over the next few years, many of the stocks recovered value, but if you had retired in 2008 and depended on a 401k that consisted entirely of stocks, you'd have been forced to sell a bunch of stocks near the bottom of the market to cover your retirement living expenses. Bonds go up and down too, but usually not to the same extent as stocks, and ideally you aren't selling the bonds for your living expenses, just collecting the interest that's due you for the year. Of course, some companies and cities went bankrupt in the 2008 crisis too, and they stopped making interest payments. Another risk is that you may be forced to retire before you were actually planning to. As you age you are at increasing risk for medical problems that may force an early retirement. Many businesses coped with the 2008 recession by laying off their older workers who were earning higher salaries. It wasn't an easy environment for older workers to find jobs in, so many folks were forced into early retirement. Nothing is risk free, so you need to make an effort to understand what the risks are, and decide which ones you are comfortable with.", "title": "" }, { "docid": "ac97477afe8baf421d2bcf1b23bf05dd", "text": "You have a misunderstanding about what it is. Absent differential tax treatment buybacks and dividens are the exact same. period. You're saying it yourself, not buying back stock so they can pay out dividends. What the impetus might be is irrelevant. Dividends are a use of funds competing equally with investments or higher salary.", "title": "" }, { "docid": "1de019cd6cceea000d667a6014036f01", "text": "Series I Savings Bonds would be another option that have part of their return indexed to inflation though currently they are yielding 1.64% through April 30, 2016 though some may question how well is that 3% you quote as an inflation rate. From the first link: Series I savings bonds are a low-risk savings product. While you own them they earn interest and protect you from inflation. You may purchase electronic I bonds via TreasuryDirect or paper I bonds with your IRS tax refund. As a TreasuryDirect account holder, you can purchase, manage, and redeem I bonds directly from your web browser. TIPS vs I Bonds if you want to compare these products that are rather safe in terms of avoiding a nominal loss. This would be where a portion of the funds could go, not all of them at once.", "title": "" }, { "docid": "cb1442dc3f4f3e60bf8c5d6bcbaed8b8", "text": "\"My gut is to say that any time there seems to be easy money to be made, the opportunity would fade as everyone jumped on it. Let me ask you - why do you think these stocks are priced to yield 7-9%? The DVY yields 3.41% as of Aug 30,'12. The high yielding stocks you discovered may very well be hidden gems. Or they may need to reduce their dividends and subsequently drop in price. No, it's not 'safe.' If the stocks you choose drop by 20%, you'd lose 40% of your money, if you made the purchase on 50% margin. There's risk with any stock purchase, one can claim no stock is safe. Either way, your proposal juices the effect to creating twice the risk. Edit - After the conversation with Victor, let me add these thoughts. The \"\"Risk-Free\"\" rate is generally defined to be the 1yr tbill (and of course the risk of Gov default is not zero). There's the S&P 500 index which has a beta of 1 and is generally viewed as a decent index for comparison. You propose to use margin, so your risk, if done with an S&P index is twice that of the 1X S&P investor. However, you won't buy S&P but stocks with such a high yield I question their safety. You don't mention the stocks, so I can't quantify my answer, but it's tbill, S&P, 2X S&P, then you.\"", "title": "" }, { "docid": "bffcf4ef1809546937edf2f201fc6711", "text": "Distributions of interest from bonds are taxable as income by the Federal, state and municipal (if applicable) government. End of year fund distributions are subject to capital gains taxes as well. You can minimize taxation by: Note that the only bonds that are guaranteed safe are US Government obligations, as the US government has unlimited taxation powers and the ability to print money. Municipal obligations are generally safe, but there is a risk that municipal governments will default. You can also avoid taxation by not realizing gains. If you buy individual stocks or tax-efficient mutual funds, you will have minimal tax liability until you sell. Also, just wanted to point out that bonds do not equal safety and money markets do not pay sufficient interest to offset inflation, you need a diversified portfolio. Five year treasury notes are only paying 1.3% now, and bond prices drop when interest rates go up. Given the level of Federal spending and the wind-down of the war, its likely that rates will rise.", "title": "" }, { "docid": "59e762b8f5ee752485d2454dd9fec47d", "text": "You can buy and sell stocks, if you like. You'll have to pay taxes on any profits. And short-term is speculating, not investing, and has high risk", "title": "" }, { "docid": "a634c15180a16af1d8b1f91c2d4ef48e", "text": "Not sure how this has got this far with no obvious discussion about the huge tax advantages of share buy backs vs dividend paying. Companies face a very simple choice with excess capital - pay to shareholders in the form of a taxable dividend, invest in future growth where they expect to make more than $1 for every $1 invested, or buy back the equivalent amount of stock on the market, thus concentrating the value of each share the equivalent amount with no tax issues. Of these, dividends are often by far the worst choice. Virtually all sane shareholders would just rather the company put the capital to work or concentrate the value of their shares by taking many off the market rather than paying a taxable dividend.", "title": "" }, { "docid": "c9a3c0c2284554ce69d0c8db28dcfdcc", "text": "\"Remember that risk should correlate with returns, in an investment. This means that the more risk you take on, the more return you should be receiving, in an efficient marketplace. That's why putting your money in a savings account might earn you <1% interest right now, but putting money in the stock market averages ~7% returns over time. You should be very careful not to use the word 'interest' when you mean 'returns'. In your post, you are calling capital gains (the increase in value of owned property) 'interest'. This may be understating in your head the level of risk associated with property ownership. In the case of the bank, they are not in the business of home construction. Rather than take that risk themselves, they would rather finance many projects being done by construction companies that know the business. The bank has a high degree of certainty of getting its money back, because its mortgages are protected by the value of the property. Part of the benefit of an efficient marketplace is that risk gets 'bought' by individuals who want it. This means that people with a low-risk tolerance (such as banks, people on fixed incomes, seniors, etc.) can avoid risk, and people with a high risk tolerance (stock investors, young people with high income, etc.) can take on that risk for higher average returns. The bank's reasoning should remind you of the risk associated with property ownership: increases in value are not a sure thing. If you do not understand the risk of your investment, you cannot be certain that you are being well compensated for that risk. Note also that most countries place regulations on their banks that limit the amount of their funds that can be placed in 'higher risk' asset classes. Typically, this something along the lines of \"\"If someone places a deposit with your bank, you can only invest that deposit in a low-risk debt-based asset [ie: you can take money deposited by customer A and use it to finance a mortgage for customer B]\"\". This is done in an attempt to prevent collapse of the financial sector, if risky investments start failing.\"", "title": "" }, { "docid": "a67e97c315357cc1ac6335a6f29b8e79", "text": "\"There are tax free bonds in the United States. They are for things like public housing and other urban projects. They are tax free for everyone but only rich people buy them. Why? The issue is that the tax free nature of the bond is included in its yield. So rather than yielding say a 5% return, they figure that the owner is getting 20% off due to not paying taxes. As a result, they only give a 4% return but are as risky as a 5% return investment. Net result, only rich people invest in tax free bonds. \"\"Rich\"\" is defined here to mean people paying a 20% tax on long term investment returns. Or take the State and Local Tax (SALT) deduction, which has been in the news recently. Again, it is technically open to everyone. But there is also a standard deduction that is open to everyone. For the typical family, state and local taxes might be 5% of income. So for a family making $100k a year, that's $5k. The same family can take a $13k or so standard deduction instead of itemizing. So why would they take the smaller deduction? As a practical matter, two groups take the SALT deduction. People rich enough to pay more than $13k in state and local taxes and people who also take the mortgage interest deduction. So it helps a lot of people who are rich quite a bit. And it helps a few middle class people some. But if you are lower middle class with a $30k mortgage on a tiny house and paying 4% interest, then that's only $1200 a year. Add in property taxes of $3000 and SALT of $2.8k and that's only $7k. Even if the person gives $3k to charity, the $13k deduction is a lot better and requires less paperwork. Contrast that with someone who has $500k mortgage at 3.6% interest. That's $18k in interest alone. Add in a SALT of $7k and property taxes of $50k, and there's $75k of itemized deductions, much better than $13k. Now a $7k donation to charity is entirely deductible. And even after the mortgage interest deduction goes away, the other $64k remains.\"", "title": "" } ]
fiqa
9189ffa2a5ebdc6a35c73a681a6234e0
How Should I Start my Finance Life and Invest?
[ { "docid": "a15d9b3e75f2df1225a2d4ab3dd55f90", "text": "The best way to start out is to know that even the experts typically under-perform the market, so you have no chance. Your best bet is to invest in diversified funds, either through something like Betterment or something like Vanguard's ETFs that track the markets. Buying individual stocks isn't typically a winning strategy.", "title": "" }, { "docid": "d41d8cd98f00b204e9800998ecf8427e", "text": "", "title": "" }, { "docid": "46d7b4eb501583133d585dab4a756353", "text": "I'd suggest looking at something like the Dummies series of books for this. Something like: Sometimes the books are combined into one big book. This would be the best bet. It's were I started. Every time I wondered something I just looked it up and learned. They are perfectly fine for the novice. Hope this helps.", "title": "" } ]
[ { "docid": "a12a08c1ab1f090461328b8bd919817b", "text": "\"Your questions seek answers to specifics, but I feel that you may need more general help. There are two things, I feel, that you need to learn about in the general category of personal finance. Your asking questions about investing, but it is not as important, IMHO, as how you manage your day-to-day operations. For example, you should first learn to budget. In personal finance often times \"\"living on a budget\"\" equates to poor, or low income. That is hardly the case. A budget is a plan on how to spend money. It should be refreshed each and every month and your income should equal your expenses. You might have in your budget a $1200 trip into the city to see a concert, hardly what a low income person should have in theirs. Secondly you need to be deliberate about debt management. For some, they feel that having a car payment and having student loans are a necessary part of life and argue that paying them off is foolish as you can earn more from investments. Others argue for zero debt. I fall in the later. Using and carrying a balance on high interest CCs and having high leases or car payments are just dumb. They are also easy to wander into unless you are deliberate. Third you need to prepare for emergencies. Engineers still get laid off and hurt where they are unable to work. They get sued. Having the proper insurance and sufficient reserves in the bank help prevent debt. Now you can start looking into investments. Start off slow and deliberate with investing. Put some in your company 401K or open some mutual funds on the side. You can read about them and talk with advisers, for free, at Fidelity and Vanguard. Read books from the library. Most of all don't get caught up in too much hype. Things like Forex, options, life insurance, gold/silver, are not investments. They are tools for sales people to make fat commissions off the ignorant. You are fortunate in that Engineers are very likely to retire wealthy. They are part of the second largest demographic of first generation rich. The first is small business owners. To start out I would read Millionaire Next Door and Stop Acting Rich. For a debt free approach to life, check out Financial Peace University (FPU) by Dave Ramsey (video course). His lesson on insurance is excellent. I am an engineer, and my wife a project manager we found FPU life changing and regretted not getting on board sooner. Along these lines we have had some turmoil, recently, that became little more than an inconvenience because we were prepared.\"", "title": "" }, { "docid": "732b1d87850d18987f69ce516b933752", "text": "\"This Stack Exchange site is a nice place to find answers and ask questions. Good start! Moving away from the recursive answer... Simply distilling personal finance down to \"\"I have money, I'll need money in the future, what do I do\"\", an easily digestible book with how-to, multi-step guidelines is \"\"I Will Teach You To Be Rich\"\". The author talks about setting up the accounts you should have, making sure all your bills are paid automatically, saving on the big things and tips to increase your take home pay. That link goes to a compilation page on the blog with many of the most fundamental articles. However, \"\"The World’s Easiest Guide To Understanding Retirement Accounts\"\" is a particularly key article. While all the information is on the free blog, the book is well organized and concise. The Simple Dollar is a nice blog with frugal living tips, lifestyle assessments, financial thoughts and reader questions. The author also reviews about a book a week. Investing - hoping to get better returns than savings can provide while minimizing risk. This thread is an excellent list of books to learn about investing. I highly recommend \"\"The Bogleheads' Guide to Investing\"\" and \"\"The Only Investment Guide You'll Ever Need\"\". The world of investment vehicles is huge but it doesn't have to be complicated once you ignore all the fads and risky stuff. Index mutual funds are the place to start (and maybe end). Asset allocation and diversification are themes to guide you. The books on that list will teach you.\"", "title": "" }, { "docid": "ddcd57afd6bc86c1fa0c5230b92e65dc", "text": "The simplest way is to invest in a few ETFs, depending on your tolerance for risk; assuming you're very short-term risk tolerant you can invest almost all in a stock ETF like VOO or VTI. Stock market ETFs return close to 10% (unadjusted) over long periods of time, which will out-earn almost any other option and are very easy for a non-finance person to invest in (You don't trade actively - you leave the money there for years). If you want to hedge some of your risk, you can also invest in Bond funds, which tend to move up in stock market downturns - but if you're looking for the long term, you don't need to put much there. Otherwise, try to make sure you take advantage of tax breaks when you can - IRAs, 401Ks, etc.; most of those will have ETFs (whether Vanguard or similar) available to invest in. Look for funds that have low expense ratios and are fairly diversified (ie, don't just invest in one small sector of the economy); as long as the economy continues to grow, the ETFs will grow.", "title": "" }, { "docid": "d12a01b8f903137662fada452e2939e5", "text": "\"Congratulations. The first savings goal should be an emergency fund. Think of this not as an investment, but as insurance against life's woes. They happen and having this kind of money earmarked allows one to invest without needing to withdraw at an inopportune time. This should go into a \"\"high interest\"\" savings account or money market account. Figure three to six months of expenses. The next goal should be retirement savings. In the US this is typically done through 401K or if your company does not offer one, either a ROTH IRA or Traditional IRA. The goal should be about 15% of your income. You should favor a 401k match over just about anything else, and then a ROTH over that. The key to transforming from a broke college student into a person with a real job, and disposable income, is a budget. Otherwise you might just end up as a broke person with a real job (not fun). Part of your budget should include savings, spending, and giving. All three areas are the key to building wealth. Once you have all of those taking care of the real fun begins. That is you have an emergency fund, you are putting 15% to retirement, you are spending some on yourself, and giving to a charity of your choice. Then you can dream some with any money left over (after expenses of course). Do you want to retire early? Invest more for retirement. Looking to buy a home or own a bunch of rental property? Start educating yourself and invest for that. Are you passionate about a certain charity? Give more and save some money to take time off in order to volunteer for that charity. All that and more can be yours. Budgeting is a key concept, and the younger you start the easier it gets. While the financiers will disagree with me, you cannot really invest if you are borrowing money. Keep debt to zero or just on a primary residence. I can tell you from personal experience that I did not started building wealth until I made a firm commitment to being out of debt. Buy cars for cash and never pay credit card interest. Pay off student loans as soon as possible. For some reason the idea of giving to charity invokes rancor. A cursory study of millionaires will indicate some surprising facts: most of them are self made, most of them behave differently than pop culture, and among other things most of them are generous givers. Building wealth is about behavior. Giving to charity is part of that behavior. Its my own theory that giving does almost no good for the recipient, but a great amount of good for the giver. This may seem difficult to believe, but I ask that you try it.\"", "title": "" }, { "docid": "391d43d1cf4f10b5872dc46e5f2045f0", "text": "Alright so you have $12,000 and you want to know what to do with it. The main thing here is, you're new to investments. I suggest you don't do anything quick and start learning about the different kinds of investment options that can be available to you with returns you might appreciate. The most important questions to ask yourself is what are your life goals? What kind of financial freedom do you want, and how important is this $12,000 dollars to you in achieving your life goals. My best advice to you and to anyone else who is looking for a place to put their money in big or small amounts when they have earned this money not from an investment but hard work is to find a talented and professional financial advisor. You need to be educated on the options you have, and keep them in lines of what risks you are willing to take and how important that principal investment is to you. Investing your money is not easy at all, and novices tend to lose their money a lot. The same way you would ask a lawyer for law advice, its best to consult a financial planner for advice, or so they can invest that money for you.", "title": "" }, { "docid": "c141d68ca0b0fec7fc97ce49d4665f8c", "text": "Congratulations on getting started in life! John Malloy's (American) research suggests that you should take some time to get used to living on your own, make some friends, and settle into your community. During this time, you can build up an emergency fund. If/when the stock markets do not seem to be in a bear market, you can follow user3771352's advice to buy stock ETFs. Do you hope to get married and have children in the next few years? If so, you should budget time and money for activities where you make new friends (both men and women). Malloy points out that many Americans meet their spouses through women's networks of friends.", "title": "" }, { "docid": "29a40af24f93fca95608892442b874f3", "text": "There are all sorts of topics in finance that take a lot of time to learn. You have valuation (time value of money, capital asset pricing model, dividend discount model, etc.), financial statement analysis (ratio analysis, free cash flow &amp; discounted cash flow, etc.) , capital structure analysis(Modgliani &amp; Miller theories of capital structure, weighted average cost of capital, more CAPM, the likes), and portfolio management (asset allocation, security selection, integrates financial statement analysis + other fields like derivatives, fixed income, forex, and commodity markets) and all sorts. My opinion of Investopedia is that there is a lot of wheat with the chaff. I think articles/entries are just user-submitted and there are good gems in Investopedia but a lot of it only covers very basic concepts. And you often don't know what you don't know, so you might come out with a weak understanding of something. To begin, you need to understand TVM and why it works. Time value of money is a critical concept of finance that I feel many people don't truly grasp and just understand you need some 'rate' to use for this formula. Also, as a prereq, you should understand basics of accrual accounting (debits &amp; credits) and how the accounting system works. Don't need to know things like asset retirement obligations, or anything fancy, just how accounting works and how things affect certain financial statements. After that, I'd jump into CAPM and cost of capital. Cost of capital is also a very misunderstood concept since schools often just give students the 'cost of capital' for math problems when in reality, it's not just an explicit number but more of a 'general feeling' in the environment. Calculating cost of capital is actually often very tricky (market risk premium) and subjective, sometimes it's not (LIBOR based). After that, you can build up on those basic concepts and start to do things like dividend discount models (basic theory underlying asset pricing models) and capital asset pricing models, which builds on the idea of cost of capital. Then go into valuation. Learn how to price equities, bonds, derivatives, etc. For example, you have the dividend discount model with typical equities and perpetuities. Fixed income has things like duration &amp; convexity to measure risk and analyze yield curves. Derivatives, you have the Black-Scholes model and other 'derivatives' (heh) of that formula for calculating prices of options, futures, CDOs, etc. Valuation is essentially taking the idea of TVM to the next logical step. Then you can start delving into financial modelling. Free cash flows, discounted cash flows, ratio analysis, pro forma projections. Start small, use a structured problem that gives you some inputs and just do calculations. Bonuses* would be ideas of capital structure (really not necessary for entry level positions) like the M&amp;M theorems on capital structure (debt vs equity), portfolio management (risk management, asset allocation, hedging, investment strategies like straddles, inverse floaters, etc), and knowledge of financial institutions and banking regulations (Basel accords, depository regulations, the Fed, etc.). Once you gain an understanding of how this works, pick something out there and do a report on it. Then you'll be left with a single 'word problem' that gives you nothing except a problem and tells you to find an answer. You'll have to find all the inputs and give reasons why these inputs are sound and reasonable inputs for this analysis. A big part that people don't understand about projections and analysis is that **inputs don't exist in plain sight**. You have to make a lot of judgment calls when making these assumptions and it takes a lot of technical understanding to make a reasonable assumption--of which the results of your report highly depend on. As a finance student, you get a taste for all of this. I'm gonna say it's going to be hard to learn a lot of substantial info in 2 months, but I'm not exactly sure what big business expects out of their grunts. You'll mostly be doing practical work like desk jockey business, data entry, and other labor-based jobs. If you know what you're talking about, you can probably work up to something more specialized like underwriting or risk management or something else. Source: Finance degree but currently working towards starting a (finance related) company to draw on my programming background as well.", "title": "" }, { "docid": "b272698e1679609d91d03ae6740f5359", "text": "I started my career over 10 years ago and I work in the financial sector. As a young person from a working class family with no rich uncles, I would prioritize my investments like this: It seems to be pretty popular on here to recommend trading individual stocks, granted you've read a book on it. I would thoroughly recommend against this, for a number of reasons. Odds are you will underestimate the risks you're taking, waste time at your job, stress yourself out, and fail to beat a passive index fund. It's seriously not worth it. Some additional out-of-the box ideas for building wealth: Self-serving bias is pervasive in the financial world so be careful about what others tell you about what they know (including me). Good luck.", "title": "" }, { "docid": "95441942b8b50cf2a06698c919810714", "text": "Borrow money and start a business. Follow your business plan and invest in yourself and your entrepreneurship. If you mean invest in the market, do not borrow money. In your plan, you are willing to make payments right? There are lots of things you can do better, but borrowing money to invest in the market for a couple of years is not one of them. Investing is boring, saving is boring, and planning your financial future is boring. It takes a consistent effort and you aren't going to get rich quick.", "title": "" }, { "docid": "259db994dcd2e808930fe40d0f155490", "text": "\"The best advice I can give you is that you need to start on math *now*. I made the same mistake as OP and didn't realize that going up in finance would require as much math as it does. Granted, I was undergrad finance not marketing like him, so maybe it was a little better for me, but if you really want to do upper level finance do NOT skimp on math. It's easy to fall into the trap doing cal 2 your sophomore year and thinking \"\"I won't really need this\"\" and just doing the minimum to get through it. For undergrad, that's true. For Master's you'll need it. This happened to me, and I suffered a LOT because of it. Your professors in the master's program will likely give you a crash course in what you need to know, but you won't have a real understanding of it unless you took (and did really well in) those math classes beforehand. To answer your question, 1. Maybe. You should definitely take cal 1 early. Depending on how you can hold on to the information, cal 2 can wait a bit, so it's fresher when you start doing upper level finance your second half of junior year/senior year. 2. Upper level finance is a whole different beast from lower level finance. Same with economics. If you're not good at math, if you don't enjoy math, it might not be the best choice. I'm not good at math, and the undergrad finance wasn't too bad. However, the master's program was very very not fun. EDIT: YMMV, but I don't recommend going straight into the master's program straight out of undergrad. Work (in industry!) for a bit first. The jobs you need to a master's for won't hire you straight out of undergrad, so it'll be dead weight. Experience is what you need.\"", "title": "" }, { "docid": "32e71fb321d39a1fceb84c0481f32a5c", "text": "Put £50 away as often as possible, and once it's built up to £500, invest in a stockmarket ETF. Repeat until you retire.", "title": "" }, { "docid": "63edf1941f8f892ba7c319e07a6d3327", "text": "\"There are many questions and good answers here regarding investment choices. The first decision you need to make is how involved do you intend to be in investment activity. If you plan to be actively investing by yourself, you should look for questions here about making investment choices. If you intend to be a more passive investor, look for posts by \"\"Bogleheads\"\", who focus on broad-focused, low cost investments. This is the optimal choice for many people. If you are not comfortable managing investments at all, you need to figure out how to find a competent and reasonably priced financial advisor to meet with and guide your investment strategy. This advice generally costs about 1-2% of your total managed assets annually.\"", "title": "" }, { "docid": "89d0451472da336c5b36dca90f59adb4", "text": "Many good sources on YouTube that you can find easily once you know what to look for. Start following the stock market, present value / future value, annuities &amp; perpetuities, bonds, financial ratios, balance sheets and P&amp;L statements, ROI, ROA, ROE, cash flows, net present value and IRR, forecasting, Monte Carlo simulation (heavy on stats but useful in finance), the list goes on. If you can find a cheap textbook, it'll help with the concepts. Investopedia is sometimes useful in learning concepts but not really on application. Khan Academy is a good YouTube channel. The Intelligent Investor is a good foundational book for investing. There are several good case studies on Harvard Business Review to practice with. I've found that case studies are most helpful in learning how to apply concept and think outside the box. Discover how you can apply it to aspects of your everyday life. Finance is a great profession to pursue. Good luck on your studies!", "title": "" }, { "docid": "4cd9c2b35628903a560ac635280aedbe", "text": "It depends on whether you want a career as a fund manager/ analyst or if you want to be an investor/ trader. A fund manager will have many constraints that a private investor doesn’t have, as they are managing other people’s money. If they do invest their own money as well they usually would invest it differently from how they invest the fund's money. Many would just get someone else to invest their money for them, just as a surgeon would get another surgeon to operate on a family member. My suggestion to you is to find a job you like doing and build up your savings. Whilst you are building up your savings read some books. You said you don’t know much about the financial markets, then learn about them. Get yourself a working knowledge about both fundamental and technical analysis. Work out which method of analysis (if not both) suits you best and you would like to know more about. As you read you will get a better idea if you prefer to be a long term investor or a short term trader or somewhere in-between or a combination of various methods. Now you will start to get an idea of what type of books and areas of analysis you would like to concentrate on. Once you have a better idea of what you would like to do and have gained some knowledge, then you can develop your investment/trading plan and start paper trading. Once you are happy with you plan and your paper trading you can start trading with a small account balance (not more than $10,000 and preferably under $5,000). No matter how well you did with paper trading you will always do worse with real money at first due to your emotions being in it now. So always start off small. If you want to become good at something it takes time and a lot of hard work. You can’t go from knowing nothing to making a million dollars per year without putting in the hard yards first.", "title": "" }, { "docid": "416ef7846826a6105c8771f921f2ad33", "text": "\"You don't state a long term goal for your finances in your message, but I'm going to assume you want to retire early, and retire well. :-) any other ideas I'm missing out on? A fairly common way to reach financial independence is to build one or more passive income streams. The money returned by stock investing (capital gains and dividends) is just one such type of stream. Some others include owning rental properties, being a passive owner of a business, and producing goods that earn long-term royalties instead of just an immediate exchange of time & effort for cash. Of these, rental property is probably one of the most well-known and easiest to learn about, so I'd suggest you start with that as a second type of investment if you feel you need to diversify from stock ownership. Especially given your association with the military, it is likely there is a nearby supply of private housing that isn't too expensive (so easier to get started with) and has a high rental demand (so less risk in many ways.) Also, with our continued current low rate environment, now is the time to lock-in long term mortgage rates. Doing so will reap huge benefits as rates and rents will presumably rise from here (though that isn't guaranteed.) Regarding the idea of being a passive business owner, keep in mind that this doesn't necessarily mean starting a business yourself. Instead, you might look to become a partner by investing money with an existing or startup business, or even buying an existing business or franchise. Sometimes, perfectly good business can be transferred for surprisingly little down with the right deal structure. If you're creative in any way, producing goods to earn long-term royalties might be a useful path to go down. Writing books, articles, etc. is just one example of this. There are other opportunities depending on your interests and skill, but remember, the focus ought to be on passive royalties rather than trading time and effort for immediate money. You only have so many hours in a year. Would you rather spend 100 hours to earn $100 every year for 20 years, or have to spend 100 hours per year for 20 years to earn that same $100 every year? .... All that being said, while you're way ahead of the game for the average person of your age ($30k cash, $20k stocks, unknown TSP balance, low expenses,) I'm not sure I'd recommend trying to diversify quite yet. For one thing, I think you need to keep some amount of your $30k as cash to cover emergency situations. Typically people would say 6 months living expenses for covering employment gaps, but as you are in the military I don't think it's as likely you'll lose your job! So instead, I'd approach it as \"\"How much of this cash do I need over the next 5 years?\"\" That is, sum up $X for the car, $Y for fun & travel, $Z for emergencies, etc. Keep that amount as cash for now. Beyond that, I'd put the balance in your brokerage and get it working hard for you now. (I don't think an average of a 3% div yield is too hard to achieve even when picking a safe, conservative portfolio. Though you do run the risk of capital losses if invested.) Once your total portfolio (TSP + brokerage) is $100k* or more, then consider pulling the trigger on a second passive income stream by splitting off some of your brokerage balance. Until then, keep learning what you can about stock investing and also start the learning process on additional streams. Always keep an eye out for any opportunistic ways to kick additional streams off early if you can find a low cost entry. (*) The $100k number is admittedly a rough guess pulled from the air. I just think splitting your efforts and money prior to this will limit your opportunities to get a good start on any additional streams. Yes, you could do it earlier, but probably only with increased risk (lower capital means less opportunities to pick from, lower knowledge levels -- both stock investing and property rental) also increase risk of making bad choices.\"", "title": "" } ]
fiqa
8cb10ac12343b96afb4b04138c5bc2f5
Good habits pertaining to personal finance for someone just getting started?
[ { "docid": "d41d8cd98f00b204e9800998ecf8427e", "text": "", "title": "" }, { "docid": "b2f72335a2099fa10aab8121f5678e90", "text": "If you are not working, I believe you would be getting some money from your family to meet your expenses. In such a case, I would start with maintaining a Cash A/c which would list your monthly expenses and the money you received, which is what I used to do at your age. You can maintain it in a notebook with pen/pencil or using online tools such as Google Sheets. Enter each expense entries each day as debits and entries towards any money you receive as credits. At the end of the month, tally them and see how much you have left. Also, this gives you a clear picture of where your expenses are what is that you can avoid. On longer term, this can help you form an annual budget for your personal finances.", "title": "" } ]
[ { "docid": "0f7e29383446f4f67dd080e3f8938a28", "text": "\"As others have said, doing a monthly budget is a great idea. I tried the tracking expenses method for years and it got me nowhere, I think for these reasons: If budgeting isn't your cup of tea, try the \"\"pay yourself first\"\" method. Here, as soon as you get a paycheck take some substantial portion immediately and use it to pay down debt, or put it in savings (if you have no debt). Doing this will force you to spend less money on impulse items, and force you to really watch your spending. If you take this option, be absolutely sure you don't have any open credit accounts, or you'll just use them to make up the difference when you find yourself broke in the middle of the month. The overall key here is to get yourself into a long term mind set. Always ask yourself things like \"\"Am I going to care that I didn't have this in 10 years? 5 years? 2 months? 2 days even? And ask yourself things like \"\"Would I perfer this now, or this later plus being 100% debt free, and not having to worry if I have a steady paycheck\"\". I think what finally kicked my butt and made me realize I needed a long term mind set was reading The Millionaire Next Door by Tom Stanley. It made me realize that the rich get rich by constantly thinking in the long term, and therefore being more frugal, not by \"\"leveraging\"\" debt on real estate or something like 90% of the other books out there tell you.\"", "title": "" }, { "docid": "89d0451472da336c5b36dca90f59adb4", "text": "Many good sources on YouTube that you can find easily once you know what to look for. Start following the stock market, present value / future value, annuities &amp; perpetuities, bonds, financial ratios, balance sheets and P&amp;L statements, ROI, ROA, ROE, cash flows, net present value and IRR, forecasting, Monte Carlo simulation (heavy on stats but useful in finance), the list goes on. If you can find a cheap textbook, it'll help with the concepts. Investopedia is sometimes useful in learning concepts but not really on application. Khan Academy is a good YouTube channel. The Intelligent Investor is a good foundational book for investing. There are several good case studies on Harvard Business Review to practice with. I've found that case studies are most helpful in learning how to apply concept and think outside the box. Discover how you can apply it to aspects of your everyday life. Finance is a great profession to pursue. Good luck on your studies!", "title": "" }, { "docid": "3efd6b04f4c411da91108e1ba6a83ead", "text": "\"Debt cripples you, it weighs you down and keeps you from living your life the way you want. Debt prevents you from accomplishing your goals, limits your ability to \"\"Do\"\" what you want, \"\"Have\"\" what you want, and \"\"Be\"\" who you want to be, it constricts your opportunities, and constrains your charity. As you said, Graduated in May from school. Student loans are coming due here in January. Bought a new car recently. The added monthly expenses have me concerned that I am budgeting my money correctly. Awesome! Congratulations. You need to develop a plan to repay the student loans. Buying a (new) car before you have planned you budget may have been premature. I currently am spending around 45-50% of my monthly (net)income to cover all my expenses and living. The left over is pretty discretionary, but things like eating dinner outside the house and expenses that are abnormal would come out of this. My question is what percentage is a safe amount to be committing to expenses on a monthly basis? Great! Plan 40-50% for essentials, and decide to spend under 20-30% for lifestyle. Be frugal here and you could allocate 30-40% for financial priorities. Budget - create a budget divided into three broad categories, control your spending and your life. Goals - a Goal is a dream with a plan. Organize your goals into specific items with timelines, and steps to progress to your goals. You should have three classes of goals, what you want to \"\"Have\"\", what you want to \"\"Do\"\", and who you want to \"\"Be\"\"; Ask yourself, what is important to you. Then establish a timeline to achieve each goal. You should place specific goals or steps into three time blocks, Near (under 3-6 months), medium (under 12 months), and Long (under 24 months). It is ok to have longer term plans, but establish steps to get to those goals, and place those steps under one of these three timeframes. Example, Good advice I have heard includes keeping housing costs under 25%, keeping vehicle costs under 10%, and paying off debt quickly. Some advise 10-20% for financial priorities, but I prefer 30-40%. If you put 10% toward retirement (for now), save 10-20%, and pay 10-20% toward debt, you should make good progress on your student loans.\"", "title": "" }, { "docid": "6435f24f13a0fde33b0d612aa3ee4b3d", "text": "Firstly, make sure annual income exceeds annual expenses. The difference is what you have available for saving. Secondly, you should have tiers of savings. From most to least liquid (and least to most rewarding): The core of personal finance is managing the flow of money between these tiers to balance maximizing return on savings with budget constraints. For example, insurance effectively allows society to move money from savings to stocks and bonds. And a savings account lets the bank loan out a bit of your money to people buying assets like homes. Note that the above set of accounts is just a template from which you should customize. You might want to add in an FSA or HSA, extra loan payments, or taxable brokerage accounts, depending on your cash flow, debt, and tax situation.", "title": "" }, { "docid": "6d56f8bf83590a9ac0d1ef077142de80", "text": "\"practice using excel more read more books on investing, practice making investing thesis, practice remaining \"\"nice\"\" while getting good and bad critique, expand your knowledge (it is impossible to be the best at everything in investing due to the multiple forms of investing that have contradicting principles), and think economics. Finance will be useless if you have a very limited understanding of \"\"scarcity\"\"\"", "title": "" }, { "docid": "732b1d87850d18987f69ce516b933752", "text": "\"This Stack Exchange site is a nice place to find answers and ask questions. Good start! Moving away from the recursive answer... Simply distilling personal finance down to \"\"I have money, I'll need money in the future, what do I do\"\", an easily digestible book with how-to, multi-step guidelines is \"\"I Will Teach You To Be Rich\"\". The author talks about setting up the accounts you should have, making sure all your bills are paid automatically, saving on the big things and tips to increase your take home pay. That link goes to a compilation page on the blog with many of the most fundamental articles. However, \"\"The World’s Easiest Guide To Understanding Retirement Accounts\"\" is a particularly key article. While all the information is on the free blog, the book is well organized and concise. The Simple Dollar is a nice blog with frugal living tips, lifestyle assessments, financial thoughts and reader questions. The author also reviews about a book a week. Investing - hoping to get better returns than savings can provide while minimizing risk. This thread is an excellent list of books to learn about investing. I highly recommend \"\"The Bogleheads' Guide to Investing\"\" and \"\"The Only Investment Guide You'll Ever Need\"\". The world of investment vehicles is huge but it doesn't have to be complicated once you ignore all the fads and risky stuff. Index mutual funds are the place to start (and maybe end). Asset allocation and diversification are themes to guide you. The books on that list will teach you.\"", "title": "" }, { "docid": "798575a817d64f67b98a243772f5378a", "text": "First of all, make sure you have all your credit cards paid in full -the compounding interests on those can zero out returns on any of your private investments. Fundamentally, there are 2 major parts of personal finance: optimizing the savings output (see frugal blogs for getting costs down, and entrepreneur sites for upping revenues), and matching investment vehicles to your particular taste of risk/reward. For the later, Fool's 13 steps to invest provides a sound foundation, by explaining the basics of stocks, indexes, long-holding strategy, etc. A full list Financial instruments can be found on Wikipedia; however, you will find most of these to be irrelevant to your goals listed above. For a more detailed guide to long-term strategies on portfolio composition, I'd recommend A Random Walk Down Wall Street: The Time-tested Strategy for Successful Investing. One of the most handy charts can be found in the second half of this book, which basically outlines for a given age a recommended asset allocation for wealth creation. Good luck!", "title": "" }, { "docid": "32a550a02ef92da8db1535bbecc751df", "text": "The best way is to not participate in the expensive habits at all. Try to direct your friends to cheaper venues. It's important to note that some hobbies are a large investment. Shooting sports, model airplanes, and customizing vehicles are all examples of hobbies you might want to avoid when you're on a budget.", "title": "" }, { "docid": "3d05671fdb3c36883abcde29fd83fabc", "text": "I make it a habit at the end of every day to think about how much money I spent in total that day, being mindful of what was essential and wasn't. I know that I might have spent $20 on a haircut (essential), $40 on groceries (essential) and $30 on eating out (not essential). Then I realize that I could have just spent $60 instead of $90. This habit, combined with the general attitude that it's better to have not spent some mone than to have spent some money, has been pretty effective for me to bring down my monthly spending. I guess this requires more motivation than the other more-involved techniques given here. You have to really want to reduce your spending. I found motivation easy to come by because I was spending a lot and I'm still looking for a job, so I have no sources of income. But it's worked really well so far.", "title": "" }, { "docid": "5c44b08854a031354dbe1f6080139836", "text": "A Budget is different for every person. There are families making $40K/yr who will budget to spend it all. But a family making $100K of course will have a different set of spending limits for most items. My own approach is to start by tracking every cent. Keep a notebook for a time, 3 months minimum. Note, for homeowners, a full year is what it takes to capture the seasonal expenses. This approach with help you see where the money is going, and adjust accordingly. The typical goal is to spend less than you make, saving X% for retirement, etc. The most important aspect is to analyze how much money is getting spent on wasteful items. The $5 coffee, the $10 lunch, the $5-$7 magazines, etc. One can decide the $5 coffee is a social event done with a friend, and that's fine, so long as it's a mindful decision. I've watched the person in front of me at the supermarket put 4 magazines down on the counter. If she has $20 to burn, that's her choice. See Where can I find an example of a really basic family budget? for other responses.", "title": "" }, { "docid": "2aee2f45e6e92de4cf4cfe1c7c1d28f3", "text": "\"There are many tactics you can use. If your biggest problem is regretting your larger purchases, I'd suggest giving yourself rules before making any purchases over a certain minimum dollar amount that you set for yourself. For example, if that amount is $50 for an item, then any item starting at an average price of $51 would be subject to these rules. One of your long-term goals ought to be to become the kind of person who finds joy in saving money rather than spending it. Make friends with frugal people - look for those who prefer games nights and potlucks to nights out at the club buying expensive drinks and dinners at the newest steak joint in town. Learn the thrill of a deal, but even more learn the thrill of your savings growing. You don't want to enjoy money in the bank for the purposes of becoming a miser. Instead you want to realize that money in the bank helps you achieve your goals — buying the house you want, donating a significant amount of money to a cause you ardently support, allowing you to take a dream vacation, letting you buy with cash the car you always wanted, the possibilities are endless. As Dave Ramsey says, \"\"Live like no one else, so you can live like no one else.\"\"\"", "title": "" }, { "docid": "5fac573afe5b5ce258d69594d7a172a9", "text": "My reading list for someone just getting into personal finance would include the following I know it's a bunch but I'm trying to cover a few specific things. Yeah it's a bit of reading, but lets face it, nobody is going to care as much about your money as YOU do, and at the very least this kind of knowledge can help fend off a 'shark attack' by someone trying to sell you something not because it's best for you, but because it earns them a fat commission check. Once you've covered those, you have a good foundation, and oh lord there's so many other good books that you could read to help understand more about money, markets etc.. Personally I'd say hit this list, and just about anything on it, is worth your time to read. I've used publishers websites where I could find them, and Amazon otherwise.", "title": "" }, { "docid": "2c356e8420a2c5d92c5e00162076e09d", "text": "\"It doesn't really make sense to worry about the details of \"\"what counts as saving\"\" unless you also move beyond a simplistic rule of thumb like \"\"save 10% of your income\"\". That said, most of the sources I see pushing rules of thumb like that are talking about saving for retirement. That is, you need to sock that money away so you will be able to spend it after you retire. (This CNN page is one example.) On that theory, it only \"\"counts\"\" if you put it away and don't touch it until you retire, so things like car and computer funds would not count as saving. Another thing you'll see some people say (e.g., this Nerdwallet article) is to use 20% of your income for \"\"financial priorities\"\". This would include retirement saving, but also things like paying off debt and saving for a down payment on a house. Saving for a small purchase in the near future would not usually be considered \"\"saving\"\" at all, since you're not going to keep the money. If you put $5 in your wallet tonight so you can buy a hamburger for lunch tomorrow, you wouldn't call that saving; likewise setting aside a few hundred dollars for a new computer wouldn't \"\"count\"\" as saving under most definitions. (Some people might \"\"count\"\" saving for something like a house, since that is a long-term plan and the house, unlike a computer, may rise in value after you buy it. But you wouldn't want to fully count the house as part of your retirement savings unless you're willing to sell it and live off the proceeds.) However, none of these rules will help that much if your goal is, as you say at the end of your question, to \"\"know if I need to save more than what I actually am saving currently\"\". Saving 10% of your income won't magically ensure that you're saving \"\"enough\"\". To assess whether you personally are saving \"\"enough\"\", you need to actually start running some numbers on how much money you personally will need in retirement. This will depend on any number of factors, including where you live, what sources of retirement income you might have besides savings (e.g., pensions), etc. In short, to know if you're saving enough, you can't listen to the generic stuff that \"\"everyone says\"\"; you need to consider your own situation in a deliberate, focused way.\"", "title": "" }, { "docid": "d12a01b8f903137662fada452e2939e5", "text": "\"Congratulations. The first savings goal should be an emergency fund. Think of this not as an investment, but as insurance against life's woes. They happen and having this kind of money earmarked allows one to invest without needing to withdraw at an inopportune time. This should go into a \"\"high interest\"\" savings account or money market account. Figure three to six months of expenses. The next goal should be retirement savings. In the US this is typically done through 401K or if your company does not offer one, either a ROTH IRA or Traditional IRA. The goal should be about 15% of your income. You should favor a 401k match over just about anything else, and then a ROTH over that. The key to transforming from a broke college student into a person with a real job, and disposable income, is a budget. Otherwise you might just end up as a broke person with a real job (not fun). Part of your budget should include savings, spending, and giving. All three areas are the key to building wealth. Once you have all of those taking care of the real fun begins. That is you have an emergency fund, you are putting 15% to retirement, you are spending some on yourself, and giving to a charity of your choice. Then you can dream some with any money left over (after expenses of course). Do you want to retire early? Invest more for retirement. Looking to buy a home or own a bunch of rental property? Start educating yourself and invest for that. Are you passionate about a certain charity? Give more and save some money to take time off in order to volunteer for that charity. All that and more can be yours. Budgeting is a key concept, and the younger you start the easier it gets. While the financiers will disagree with me, you cannot really invest if you are borrowing money. Keep debt to zero or just on a primary residence. I can tell you from personal experience that I did not started building wealth until I made a firm commitment to being out of debt. Buy cars for cash and never pay credit card interest. Pay off student loans as soon as possible. For some reason the idea of giving to charity invokes rancor. A cursory study of millionaires will indicate some surprising facts: most of them are self made, most of them behave differently than pop culture, and among other things most of them are generous givers. Building wealth is about behavior. Giving to charity is part of that behavior. Its my own theory that giving does almost no good for the recipient, but a great amount of good for the giver. This may seem difficult to believe, but I ask that you try it.\"", "title": "" }, { "docid": "41bf5cbee4234ed07d164d694903290a", "text": "\"My basic rule I tell everyone who will listen is to always live like you're a college student - if you could make it on $20k a year, when you get your first \"\"real\"\" job at $40k (eg), put all the rest into savings to start (401(k), IRA, etc). Gradually increase your lifestyle expenses after you hit major savings goals (3+ month emergency fund, house down payment, etc). Any time you get a raise, start by socking it all into your employer's 401(k) or similar. And repeat the above advice.\"", "title": "" } ]
fiqa
58063e03ed1644618fcbe75d66af59cf
I thought student loans didn't have interest, or at least very low interest? [UK]
[ { "docid": "18ee590fcebd7e5ad0f366d50040e2e9", "text": "From the description, you have a post-1998 income contingent loan. The interest rate on those is currently 1.5% but it has varied quite a bit in the last few years due to the formula used to calculate it, which is either the inflation rate (RPI), or 1% + the highest base rate across a group of banks - whichever is smaller. This is indeed really cheap credit compared to any commercial loan you could get, though whether you should indeed just repay the minimum depends on making a proper comparison with the return on any spare money you could get after tax elsewhere. There is a table of previous interest rates. From your description I think you've had the loan for about 4 years - your final year of uni, one year of working without repayments and then two years of repayments. A very rough estimate is that you would have been charged about £300 of interest over that period. So there's still an apparent mismatch, though since both you and I made rough calculations it may be that a more precise check resolves it. But the other thing is that you should check what the date on the statement is. Once you start repaying, statements are sent for a period ending 5th April of each year. So you may well not be seeing the effect of several months of repayments since April on the statement. Finally, there's apparently an online facility you can use to get an up to date balance, though the administration of the loans repaid via PAYE is notoriously inefficient so there may well be a significant lag between a payment being made and it being reflected in your balance, though the effect should still be backdated to when you actually made it.", "title": "" }, { "docid": "d41d8cd98f00b204e9800998ecf8427e", "text": "", "title": "" }, { "docid": "b3acc09fce33e69930d2bf14ced64bb7", "text": "If I recall correctly, the pay schedule is such that you initially pay mostly interest. As James Roth suggests, look at the terms of the loan, specifically the payment schedule. It should detail how much is being applied to interest and how much to the actual balance.", "title": "" } ]
[ { "docid": "508ba9807775aa566286ecb749ae099a", "text": "No offense to any bankers who are reading, but i find it remarkable that they can confuse what I'd expect to be an otherwise simple explanation. If at the end of each day the interest is added, you go to sleep with a new balance. At the moment it's added, you have no interest due, just a higher principal amount than when you went to sleep last night. When I view my loan, I know how much interest added to principal since the last payment. Any amount I pay over that has to go to principal. Forgive me, but the rest sounds like nonsense.", "title": "" }, { "docid": "8143e59701da827051bb11538170aa2e", "text": "Hi guys, have a question from my uni finance course but I’m unsure how to treat the initial loan (as a bond, or a bill or other, and what the face value of the loan is). I’ll post the question below, any help is appreciated. “Hi guys, I have a difficult university finance question that’s really been stressing me out.... “The amount borrowed is $300 million and the term of the debt credit facility is six years from today The facility requires minimum loan repayments of $9 million in each financial year except for the first year. The nominal rate for this form of debt is 5%. This intestest rate is compounded monthly and is fixed from the date the facility was initiated. Assume that a debt repayment of $10 million is payed on 31 August 2018 and $9million on April 30 2019. Following on monthly repayments of $9 million at the end of each month from May 31 2019 to June 30 2021. Given this information determine the outstanding value of the debt credit facility on the maturity date.” Can anyone help me out with the answer? I’ve been wracking my brain trying to decide if I treat it as a bond or a bill.” Thanks in advance,", "title": "" }, { "docid": "c08db17711eb452e35317801bdf55f13", "text": "There is one massive catch in this which I found out when I went to Nationwide to ask for a loan. I've got a credit card which they kept increasing my credit limit, it's now at something ridiculous - nearly £10,000 but they keep increasing it. I never use that card, when I went to Nationwide though they said they couldn't give me a loan because I had £10,000 credit already and if I reduced this credit this would affect my credit rating and they could potentially give me a loan. I then realised what MBNA had craftily done. I have two cards with this bank, one with really low interest and the other with really high interest (and a high credit limit) - even though the other card has a zero balance loan companies still see it as money I could potentially go and spend, it doesn't matter to them that I've not spent any money on that card in about 12 months, to them it's the fact that they could give me a loan and then I could go and spend another £10,000 on that card (as you can see extremely risky). Of course this means that what MBNA are craftily doing is giving me such a high credit, knowing full well that I'm not going to use it, but it also prevents their competitors from offering me a loan, even at a lower rate, because I've already got too much credit available. So yes there is a catch to giving you a high credit limit on your cards and it's to prevent you from either leaving that bank or getting a lower interest rate loan out to clear the debt.", "title": "" }, { "docid": "0e5a6965c3da5746f8f137eb64d7f318", "text": "\"Perhaps people in student loan debt aren't the source of the assessment. There have been multiple warnings from Nobel economists on the potential for student loans to do what the housing market did in 2008. If we suddenly find out a large fraction of the educations loaned weren't worth enough to pay back, many positives on company balance sheets would suddenly appear as negatives. When negatives are realized, it triggers what some economists have termed a \"\"balance-sheet recession\"\": the great depression and 2008 recession both had this mechanism at their heart. They're a special type of recession that are not temporary and take on the order of a decade to crawl out of.\"", "title": "" }, { "docid": "9e480d3236692273886be154a8499ced", "text": "\"I read up on it and saw that the IRS can \"\"charge\"\" the loan provider on interest even if the loan provider doesn't charge interest, but this is normally mitigated by the 0% interest being considered a gift and as long as it's below X amount your fine. Yes, this sums it up. X is the amount of the gift exemption, the $14K. However, you must differ between loan with no interest and loan with no paying back. With loan with no interest you're still giving a statutory gift of the IRS mandated minimum interest. However, the principal is expected to be repaid to you and you must show that this expectation is reasonably fulfilled. If you cannot (i.e.: you gave a \"\"loan\"\" with no intention of it being paid back), then the IRS will recharacterize the whole amount as the gift, and you'll be on the hook for gift tax for the amounts above the exemption. What defines a loan vs a gift in terms of the IRS, is it simply that the loan will be paid back, or is it only considered a loan if a promisary note is made? As I said - you must be able to show that the loan is indeed a loan, even if it is with no interest. I.e.: it is being repaid, it is treated as a loan by all parties, and is not an attempt to evade gift tax. Promissory note is not a must, but will definitely be helpful in showing that. But without the de-facto repayment of the loan, it will be hard to argue that it is not a gift, even if you have a promissory note. That means, you should make a loan in such a way that the borrower will (begin) repaying it reasonably soon, so that you can show payment schedule being followed and money moving back to you. Reasonably soon is not of course defined in a statute, so do consult with a EA/CPA licensed in your state on how to structure the loan so that it will not appear as an attempt to evade the gift tax. Are there any limits on how big a loan can be? No, but keep in mind that even with statutory interest charges (published by the IRS monthly, see the link), with large enough loan you can exceed the gift tax exemption. Also, keep in mind that interest is taxable income to you. Even if you gift it back (i.e.: the statutory interest).\"", "title": "" }, { "docid": "1f69b9b3b61d001e92118515fb873e53", "text": "gnasher729's answer is fundamentally correct and deserves the checkmark, but I'd like to give an economic explanation for how this economically functions. The key point from gnasher729's answer's that the interest rate is 49.9% for one company. While this may be much higher than the equilibrium rate, the true market interest rate, it is not completely unreasonable because of the risk. For credit to be continually produced, default risk must be compensated because this is a cost to the lender. Most are not in business to lose money, so making loans to borrowers that default 40% of the time would make this interest rate reasonable. For UK citizens, this would not be such a problem because the lender can usually pursue the borrower for the balance, but if the borrower can disavow the loan and leave the legal reach of the UK creditors, the collection rate is 0%. The guarantee by the foreign persons not present in the UK is incidental and probably more of a regulatory requirement since the inability to collect from them is just as unlikely. One should always look for the lowest price with at least minimum quality when shopping for anything, but you are right to be apprehensive legally. Read every line and be sure that you yourself understand every clause before signing. If alternative cheaper financing is available, it is probably superior.", "title": "" }, { "docid": "b2ca60e1f757516b41e9fd67b5707998", "text": "At time = 0, no interest has accrued. That's normal. And the first payment is due after a month, when there's a month's interest and a bit of principal due. Note - I missed weekly payments. You'd have to account for this manually, add a month's interest, then calculate based on weekly payments.", "title": "" }, { "docid": "78b8209c5b2239617da310d8d7a2e25a", "text": "\"Most likely that's the amount of interest that accrued on the loan while you were in school. If you had paid that amount before 6/21, you would have just paid off accrued interest and your loan balance would have stayed the same. Since you did not pay the interest, it will be added to your loan balance and you will just pay it off as part of the loan (plus compounded interest). If you pay off your loan at 5% over 30 years (hopefully you won't, but that's what they're amortized for), that $350 will compound and become $1,563. Essentially you're \"\"borrowing\"\" $350 at 5% interest for 30 years. Hopefully that motivates you to pay it off sooner that that...\"", "title": "" }, { "docid": "8543575f0e85210dc6f13f0e98bd79e0", "text": "Paying off the student loans slower and investing the rest has some advantages - the interest is tax deductible (essentially lowering that 7% number), and it helps allow you to build up a liquid emergency fund which is more important to financial security than returns.", "title": "" }, { "docid": "3cafe9fcecfcd58776eaa19019664cb6", "text": "I don't have numbers on that, but I imagine the average student loan is much higher. Stilll, student loans, due to their default-less nature, are a bit of a different beast IMO. I think student loans will put a prolonged drag on the economy, but I really don't see where the catalyst for a crisis would be.", "title": "" }, { "docid": "f92d195707bc8910972f6def5a6b7f6d", "text": "It's important because you may be able to reduce the total amount of interest paid (by paying the loan faster); but you can do nothing to reduce the total of your principal repayments. The distinction can also affect the amount of tax you have to pay. Some kinds of interest payments can be counted as business expenses, which means that they reduce the amount of income you have to pay tax on. But this is not generally the case for money used to repay the loan principal.", "title": "" }, { "docid": "af4c4656175187a75c39d3eddf6c605b", "text": "I also had a student loan and glad you are taking a good look on interest rate as it really makes a huge difference. One of the strategies I followed was since my credit improved as I stepped out of school. I took advantage of a good 0 percent credit card. I applied for discover and got a decent credit limit. There are 2 particular things you are looking for in a credit card in this situation Usually the initial $0 transaction charge is only for a couple of months so ensure you take advantage of that. What is the benefit: Imagine being able to pay off that higher interest rate balance with 0% and not have to worry about it immediately. That way you save on the interest you would be paying and stress as well Watch out for: Although you have to ensure that you do payoff the money you paid through the 0 percent credit card ( which may have been put off for a year or even 15 months or so) other wise you may have to pay it all at once as the offer is expiring. Note: for credit cards ensure to note when the 0% is expiring as that is usually not mentioned on the statement and you may have to call the customer service. I was in a similar situation and was able to pay it all off fairly quickly. I am sure you will as well.", "title": "" }, { "docid": "20dea3b2e4cbbd789235606ea60ee020", "text": "At your age, the only place you are going to get a loan is from relatives. If you can't... Go to next year's conference. Missing it this year might feel like a disaster, but it really, really isn't.", "title": "" }, { "docid": "7b000a97892cc975d572e05f9af9505f", "text": "This is very much possible and happens quite a lot. In the US, for example, promotional offers by credit card companies where you pay no interest on the balance for a certain period are a very common thing. The lender gains a new customer on such a loan, and usually earns money from the spending via the merchant fees (specifically for credit cards, at least). The pro is obviously free money. The con is that this is usually for a short period of time (longest I've seen was 15 months) after which if you're not careful, high interest rates will be charged. In some cases, interest will be charged retroactively for the whole period if you don't pay off the balance or miss the minimum payment due.", "title": "" }, { "docid": "0bcbb94c232d3c08232b50344bfc12be", "text": "The £500 are an expense associated with the loan, just like interest. You should have an expense account where you can put such financing expenses (or should create a new one). Again, treat it the same way you'll treat interest charges in future statements.", "title": "" } ]
fiqa
1a2697b78ff2a6d7cc0ab8d40f9a38f5
How to start investing/thinking about money as a young person?
[ { "docid": "198bb468a2b916a466c48eaab959c272", "text": "\"There are books like, \"\"The Millionaire Mind\"\" that could be of interest when it comes to basics like living below your means, investing what you save, etc. that while it is common sense, it is uncommonly done in the world. Something to consider is how actively do you want your money management to be? Is it something to spend hours on each week or a few hours a year tops? You have lots of choices and decisions to make. I would suggest keeping part of your savings as an emergency fund just in case something happens. As for another part, this is where you could invest in a few different options and see what happens. There would be a couple of different methods I could see for breaking into finance that I'd imagine: IT of a finance company - In this case you'd likely be working on customizations for what the bank, insurance or other kind of financial firm requires. This could be somewhat boring as you are basically a part of the backbone that keeps the company going but not really able to take much of the glory when the company makes a lot of money. Brains of a hedge fund - In this case, you may have to know some trading algorithms and handle updating the code so that the trading activities can be done by a computer with lightning speed. Harder to crack into since these would be the secretive people to find and join in a way.\"", "title": "" }, { "docid": "d41d8cd98f00b204e9800998ecf8427e", "text": "", "title": "" }, { "docid": "7a20f3ccb8348112ffffc201f808ff68", "text": "\"I think \"\"Rich Dad Poor Dad\"\" is a good read for understanding the basics of personal finance in a non-technical format before actually starting investing.\"", "title": "" } ]
[ { "docid": "1328d512f1bbce05712bbb70484c3909", "text": "The standard advice is to have 3-6 months worth of expenses saved up in a highly liquid savings or money market account. After you have that saved you could look to start investing. I would recommend reading the bogleheads investment wiki (https://www.bogleheads.org/wiki/Getting_started). Even if you aren't planning on following the bogle head's way of passive investing it will give you a lot of good info on options available to you to start investing.", "title": "" }, { "docid": "7375b487322935638688af71c2a9a918", "text": "\"The statement \"\"Finance is something all adults need to deal with but almost nobody learns in school.\"\" hurts me. However I have to disagree, as a finance student, I feel like everyone around me is sound in finance and competition in the finance market is so stiff that I have a hard time even finding a paid internship right now. I think its all about perspective from your circumstances, but back to the question. Personally, I feel that there is no one-size-fits-all financial planning rules. It is very subjective and is absolutely up to an individual regarding his financial goals. The number 1 rule I have of my own is - Do not ever spend what I do not have. Your reflected point is \"\"Always pay off your credit card at the end of each month.\"\", to which I ask, why not spend out of your savings? plan your grocery monies, necessary monthly expenditures, before spending on your \"\"wants\"\" should you have any leftovers. That way, you would not even have to pay credit every month because you don't owe any. Secondly, when you can get the above in check, then you start thinking about saving for the rainy days (i.e. Emergency fund). This is absolutely according to each individual's circumstance and could be regarded as say - 6 months * monthly income. Start saving a portion of your monthly income until you have set up a strong emergency fund you think you will require. After you have done than, and only after, should you start thinking about investments. Personally, health > wealth any time you ask. I always advise my friends/family to secure a minimum health insurance before venturing into investments for returns. You can choose not to and start investing straight away, but should any adverse health conditions hit you, all your returns would be wiped out into paying for treatments unless you are earning disgusting amounts in investment returns. This risk increases when you are handling the bills of your family. When you stick your money into an index ETF, the most powerful tool as a retail investor would be dollar-cost-averaging and I strongly recommend you read up on it. Also, because I am not from the western part of the world, I do not have the cultural mindset that I have to move out and get into a world of debt to live on my own when I reached 18. I have to say I could not be more glad that the culture does not exist in Asian countries. I find that there is absolutely nothing wrong with living with your parents and I still am at age 24. The pressure that culture puts on teenagers is uncalled for and there are no obvious benefits to it, only unmanageable mortgage/rent payments arise from it with the entry level pay that a normal 18 year old could get.\"", "title": "" }, { "docid": "4acb25e5b3c6f679fac607e6eabfdf5e", "text": "\"Before anything else, read up on the basics of economics. After that, there a few things you need to ask yourself before you even think about investing in anything: If you have an answer to those questions: Once you answered those questions I could make a simple first suggestion: Confident in handling it yourself and low maintenance with uncertain horizon: look up an online bank that offers ETFs such as IWDA (accumulation (dividend is not payed but reinvested) or income(dividend is payed out)) and maybe a few more specific ones then buy and hold for at least 5 years. Confident and high maintenance with long horizon: maybe stock picking but you'll probably never be able to beat the market unless you invest 10's of hours in research per week. However this will also cost a bit and given your initial amount not advisable to do. Be sure that you also have a VERY close look at the prospectus of an investment (especially if you go with a (retail) bank and they \"\"recommend\"\" you certain actively traded funds). They tend to charge you quite a bit (yearly management fees of 2-3% (which is A LOT if you are eying maybe 7%-8% yearly) aren't unheard of). ETF's such IWDA only have for example a yearly cost of 0.20%. Personally I have one portfolio (of many) only consisting of that ETF (so IWDA) and one global small cap. It's one of the best and most consistant ones to date. In the end, the amount you start with doesn't really matter so much as long as it's enough to buy at least a few shares of what you have in mind. If you can then increase your portfolio over time and keep the expenses in check, compounding interest should do the rest.\"", "title": "" }, { "docid": "19a399279fa3d682c76b0f1cb8422a2e", "text": "IMO almost any sensible decision is better than parking money in a retirement account, when you are young. Some better choices: 1) Invest in yourself, your skills, your education. Grad school is one option within that. 2) Start a small business, build a customer base. 3) Travel, adventure, see the world. Meet and talk to lots of different people. Note that all my advice revolves around investing in YOURSELF, growing your skills and/or your experiences. This is worth FAR more to you than a few percent a year. Take big risks when you are young. You will need maybe $1m+ (valued at today's money) to retire comfortably. How will you get there? Most people can only achieve that by taking bigger risks, and investing in themselves.", "title": "" }, { "docid": "1c5bd2ce8b907fb18c884646da71f621", "text": "sell drugs? (joking) In all seriousness though, your options to legally invest this money are limited, which leaves you to extra-legal options..... which many young people engage, different kind of candy I guess. Ok so you cannot invest into stocks, to day trade. Because you're not an adult. You can put the money in a bank, but the interest rate on that amount of money is in the realm of ~0.1%. You can use the money to seed another legal business venture, say another kind of better candy. My advice is to get a parental unit to put the cash into a mutual fund, in your name... then hand that over to you when you turn 18.", "title": "" }, { "docid": "57fce3ae5e1905a229985d4408016bf3", "text": "\"It includes whatever you want to do with your investment. At least initially, it's not so much a matter of calculating numbers as of introspective soul-searching. Identifying your investment objectives means asking yourself, \"\"Why do I want to invest?\"\" Then you gradually ask yourself more and more specific questions to narrow down your goals. (For instance, if your answer is something very general like \"\"To make money\"\", then you may start to ask yourself, \"\"How much money do I want?\"\", \"\"What will I want to use that money for?\"\", \"\"When will I want to use that money?\"\", etc.) Of course, not all objectives are realistic, so identifying objectives can also involve whittling down plans that are too grandiose. One thing that can be helpful is to first identify your financial objectives: that is, money you want to be able to have, and things you want to do with that money. Investment (in the sense of purchasing investment vehicles likes stocks or bonds) is only one way of achieving financial goals; other ways include working for a paycheck, starting your own business, etc. Once you identify your financial goals, you have a number of options for how to get that money, and you should consider how well suited each strategy is for each goal. For instance, for a financial goal like paying relatively small short-term expenses (e.g., your electric bill), investing would probably not be the first choice for how to do that, because: a) there may be easier ways to achieve that goal (e.g., ask for a raise, eat out less); and b) the kinds of investment that could achieve that goal may not be the best use of your money (e.g., because they have lower returns).\"", "title": "" }, { "docid": "41bf5cbee4234ed07d164d694903290a", "text": "\"My basic rule I tell everyone who will listen is to always live like you're a college student - if you could make it on $20k a year, when you get your first \"\"real\"\" job at $40k (eg), put all the rest into savings to start (401(k), IRA, etc). Gradually increase your lifestyle expenses after you hit major savings goals (3+ month emergency fund, house down payment, etc). Any time you get a raise, start by socking it all into your employer's 401(k) or similar. And repeat the above advice.\"", "title": "" }, { "docid": "10ac79d2ac6be5c20574e7d20547be22", "text": "\"You have a few correlated questions here: Yes you can. There are only a few investment strategies that require a minimum contribution and those aren't ones that would get a blanket recommendation anyway. Investing in bonds or stocks is perfectly possible with limited funds. You're never too young to start. The power of interest means that the more time you give your money to grow, the larger your eventual gains will be (provided your investment is beating inflation). If your financial situation allows it, it makes sense to invest money you don't need immediately, which brings us to: This is the one you have to look at most. You're young but have a nice chunk of cash in a savings account. That money won't grow much and you could be losing purchasing power to inflation but on the other hand that money also isn't at risk. While there are dozens of investment options1 the two main ones to look at are: bonds: these are fixed income, which means they're fairly safe, but the downside is that you need to lock up your money for a long time to get a better interest rate than a savings account index funds that track the market: these are basically another form of stock where each share represents fractions of shares of other companies that are tracked on an index such as the S&P 500 or Nasdaq. These are much riskier and more volatile, which is why you should look at this as a long-term investment as well because given enough time these are expected to trend upwards. Look into index funds further to understand why. But this isn't so much about what you should invest in, but more about the fact that an investment, almost by definition, means putting money away for a long period of time. So the real question remains: how much can you afford to put away? For that you need to look at your individual situation and your plans for the future. Do you need that money to pay for expenses in the coming years? Do you want to save it up for college? Do you want to invest and leave it untouched to inspire you to keep saving? Do you want to save for retirement? (I'm not sure if you can start saving via IRAs and the like at your age but it's worth looking into.) Or do you want to spend it on a dream holiday or a car? There are arguments to be made for every one of those. Most people will tell you to keep such a \"\"low\"\" sum in a savings account as an emergency fund but that also depends on whether you have a safety net (i.e. parents) and how reliable they are. Most people will also tell you that your long-term money should be in the stock market in the form of a balanced portfolio of index funds. But I won't tell you what to do since you need to look at your own options and decide for yourself what makes sense for you. You're off to a great start if you're thinking about this at your age and I'd encourage you to take that interest further and look into educating yourself on the investments options and funds that are available to you and decide on a financial plan. Involving your parents in that is sensible, not in the least because your post-high school plans will be the most important variable in said plan. To recap my first point and answer your main question, if you've decided that you want to invest and you've established a specific budget, the size of that investment budget should not factor into what you invest it in. 1 - For the record: penny stocks are not an investment. They're an expensive form of gambling.\"", "title": "" }, { "docid": "8e1d0b430b37edba8ebb7bd4beea39ae", "text": "First of all I recommend reading this short e-book that is aimed at young investors. The book is written for American investors but they same rules apply with different terms (e.g. the equivalent tax-free savings wrappers are called ISAs in the UK). If you don't anticipate needing the money any time soon then your best bet is likely a stocks and share ISA in an aggressive portfolio of assets. You are probably better off with an even more aggressive asset allocation than the one in the book, e.g. 0-15% bond funds 85-100% equity funds. In the long term, this will generate the most income. For an up-to-date table of brokers I recommend Monevator. If you are planning to use the money as a deposit on a mortgage then your best bet might be a Help to Buy ISA, you'll have to shop around for the best deals. If you would rather have something more liquid that you can draw into to cover expenses while at school, you can either go for a more conservative ISA (100% bond funds or even a cash ISA) or try to find a savings account with a comparable interest rate.", "title": "" }, { "docid": "4ca0852fdce161b965d5715975eb9a33", "text": "\"As foundational material, read \"\"The Intelligent Investor\"\" by Benjamin Graham. It will help prepare you to digest and critically evaluate other investing advice as you form your strategy.\"", "title": "" }, { "docid": "7366cb823333bf38dfaed036b84e535e", "text": "Great question and great of you to be paying attention to this. Right now having the ability to save $2K per year might seem very out of reach. However with the right career path and by paying attention to personal finance saving 2K per month will become possible sooner than you may think. As a student you are already investing in your future, by building your greatest wealth building tool: your income. Right now concentrate on that. If you have extra money throw it in a boring old savings account and don't touch it other than emergencies. An emergency is defined as something that will preclude you from completing your education. It is not paying for the latest xbox game/skateboard/once in a lifetime trip. An important precursor to investing is having an emergency fund that sits in a boring old savings account earning almost nothing. Think of it as an insurance policy that prevents you from liquidating your investments in case of and emergency. Emergencies often come during economic downturns. If you have to liquidate your investment to cover these times then you will lock in negative returns. Once you are done with school, moved into a place of your own, and have your first job you will have a nice start on your emergency fund. Then you can start investing. Doing it in the right order you will be amazed how quickly your savings can accumulate. I'd be shooting for that 2 million by the time you are 40, not 65.", "title": "" }, { "docid": "b272698e1679609d91d03ae6740f5359", "text": "I started my career over 10 years ago and I work in the financial sector. As a young person from a working class family with no rich uncles, I would prioritize my investments like this: It seems to be pretty popular on here to recommend trading individual stocks, granted you've read a book on it. I would thoroughly recommend against this, for a number of reasons. Odds are you will underestimate the risks you're taking, waste time at your job, stress yourself out, and fail to beat a passive index fund. It's seriously not worth it. Some additional out-of-the box ideas for building wealth: Self-serving bias is pervasive in the financial world so be careful about what others tell you about what they know (including me). Good luck.", "title": "" }, { "docid": "e67ccb30c3a5db2fe0d4415199808c70", "text": "You should invest in that with the best possible outcome. Right now that is in yourself. Your greatest wealth building tool, at this point, is your future income. As such anything you can do to increase your earnings potential. For some that might mean getting an engineering degree, for others it might mean starting a small business. For some it is both obtaining a college degree and learning about business. A secondary thing to learn about would be personal finance. I would hold off on stocks, at this time, until you get your first real job and you have an emergency fund in place. Penny stocks are worthless, forget about them. Bonds have their place, but not at this point in your life. Saving up for college and obtaining a quality education, debt free, should be your top priority. Saving up for emergencies is a secondary priority, but only after you have more than enough money to fund your college education. You can start thinking about retirement, but you need a career to help fund your savings plan. Put that off until you have such a career. Investing in stocks, at this juncture, is a bit foolish. Start a career first. Any job you take now should be seen as a step towards a larger goal and should not define who you are.", "title": "" }, { "docid": "a8fa04eaae270a59d75c5b36c12e036b", "text": "\"Between \"\"fresh out of college\"\" and \"\"I have no debts, and a support system in place which because of which I can take higher risks.\"\" I would put every penny I could afford in the riskiest investment platform I was willing to. Holding onto money in a bank account is likely to cost you %1-%2 a year depending on what interest rates are and what inflation looks like. Money invested in a market could loose it all for you or you could become an overnight millionaire. Loosing it all would suck but you are young you will bounce back. Losing it slowly to inflation is just silly when you are young. If there is something you know you have to do in the next few years start to save for it but otherwise use the fact that you are young and have a safety net to try to make money.\"", "title": "" }, { "docid": "1805ce71824f0d9e5274a06566cfe5f8", "text": "\"I don't think you should mix the two notions. Not starting out with at least. It takes so much money, time and expertise to invest for income that, starting out at least, you should view it as a goal, not a starting point. Save your money in the lowest cost investments you can find. If you are like me, you can't pick a stock from a bond, so put your money into a target retirement fund. Let the experts manage the risk and portfolio. Start early and save often! At only 35 you have lots of time. Perhaps you are really into finance, in which case you might somebody manage your own portfolio. Great, but for now, let an expert do the heavy lifting. You are an app developer. Your best bet to increase your income stream with via your knowledge and expertise. While you are still so young, you should use labor to make money, and then save that money for retirement. I am going to make an assumption that where you are will software development means you can become a great developer long before you can become a great financier. Play to your strengths. I am also afraid you are over estimating how comfortable you are with risk. Any \"\"investment\"\" that has the kinds of returns you are looking for is going to be wildly risky. I would say those types of opportunities are more \"\"speculation\"\" rather than \"\"investments.\"\" There isn't necessarily anything wrong with speculations, but know the difference in risk. Are you really willing to gamble your retirement?\"", "title": "" } ]
fiqa
1f24c06b30ebf391f6f565f02cd4f3c3
What is the best use of “spare” money?
[ { "docid": "d41d8cd98f00b204e9800998ecf8427e", "text": "", "title": "" }, { "docid": "d636f7f7ecf7b891f7c3dac59f4a737c", "text": "Congratulations! You're making enough money to invest. There are two easy places to start: I recommend against savings accounts because they will quite safely lose your money: the inflation rate is usually higher than the interest rate on a savings account. You may have twice as much money after 50 years, but if everything costs four times as much, then you've lost buying power. If, in the course of learning about investing, you'd like to try buying individual stocks, do it only with money you wouldn't mind losing. Index funds will go down slightly if one of the companies in that index fails entirely, but the stock of a failed company is worthless.", "title": "" }, { "docid": "bd46514c70ab8b5eb92be9dea2566c09", "text": "\"With 40% of your take-home available, you have a golden opportunity here. Actually two, and the second builds out easily from the first. Golden Opportunity # 1: Layoff Immunity Ok, not really immunity. Most people don't think of themselves getting laid off, and don't prepare. Of course it may not happen to you, but it can. It's happened to me twice. The layoff itself is an emotional burden (getting rejected is hard), but then you're suddenly faced with a gut-wrenching, \"\"how am I gonna pay the rent????\"\" If you have no savings, it's terrifying. Put yourself in that spot. Imagine that tomorrow, you're out of a job. For how many months could you pay your expenses with the money you have? Three months? One? Not even that? How about shooting for 12 months? It's really, really comforting to be able to say: \"\"I don't have to worry about it for a year\"\". 12 months saved up gives you emotional and financial stability, and it gives you options -- you don't have to take the first job that comes along. Now, saving 12 months of expenses is huge. But, you're in the wonderful spot where you can save 40% of your income. It would only take 2.5 years to save up a year's worth of income! But, actually, it's better than that. Because your 12-month Layoff Immunity fund doesn't have to include the amount for retirement, or taxes, or that 40% we're talking about. Your expenses are less than 60% of take-home -- you'd only need 12 months of that. So, you could have a fully funded 12-Month Layoff Immunity Fund only in a year and a half! Golden Opportunity #2: Freedom Fund Do you like your Job? Would you still do it, if you didn't need the money? If so, great. But if not, why not get yourself into a position where you don't need it? That is, build up enough money from saving and investing to where you can pay your expenses - forever - from your investments. The number to keep in mind is 25. Figure out your annual expenses, and multiply it by 25. That's the amount you'd need to never need a job again. (That works out to a 4% withdrawal rate, adjusting for inflation every year, with a low risk of running out of money. It's a rule of thumb, but smart people doing a lot of math worked it out.) Here you keep saving and investing that 40% in solid mutual funds in a regular, taxable account. Between your savings and the compounding returns off the investments, you could easily have a fully funded \"\"Freedom Fund\"\" by the time you're 50. In fact, by 45 isn't unreasonable. It could be even better. If you live in that high-rent area because of the job, and wouldn't mind living were the rents are lower once you quit, your target amount would be lower. Between that, working dedicatedly toward this goal, and maybe a little luck, you might even be able to do this by age 40. Final Thoughts There are other things you could put that money toward, like a house, of course. The key take-away here, is to save it, and invest it. You're in a unique position of being able to do that with 40% of your income. That's fabulous! But don't think it's the norm. Most people can't save that much, and, once you lose the ability to save that much, it's very difficult to get it back. Expenses creep in, lifestyle \"\"wants\"\" become \"\"needs\"\", and so on. If you get into the habit of spending it, it's very difficult to shrink your lifestyle back down - down to what right now you're perfectly comfortable with. So, spend some time figuring out what you want out of life -- and in the mean time, sock that 40% away.\"", "title": "" }, { "docid": "7e33d6cc87fcb2c47d6eb1a0b9675d66", "text": "You may also want to consider short term, low risk investments. Rolling Certificate of Deposits can be good for this. They don't grow like an Index Fund but there's 0 risk and they will grow faster than your bank. For my bank as an example today's rates on my Money Market is 0.10% APY while the lowest CD (90 days) is 0.20% APY with a 5 year going up to 0.90% APY. It's not substantial by any stretch but its secure and the money would just be sitting in my bank otherwise. For more information look at: What is CD laddering and what are its pros and cons?", "title": "" }, { "docid": "b1c24e36f701c54d0d64e560d2838b03", "text": "\"There's a hellova lot to be said for investing in real estate (simple residential real estate), even though it's grandma's advice. The two critical elements are 1) it's the only realistic way for a civilian to get leverage. this is why it almost always blows away \"\"tinkering in the stock markets\"\" in the 10-year frame. 2) but perhaps more importantly - it's a really \"\"enforced\"\" saving plan. you just have to pay it off every month. There are other huge advantages like, it's the best possible equity for a civilian, so you can get loans in the future to start your dotcom, etc. Try to buy yourself a very modest little flat (perhaps to rent out?) or even something like a garage or storeroom. Real estate can crash, but it's very unlikely; it only happens in end of the world situations where it won't matter anyway. When real estate drops say 30% everyone yells about that being a \"\"crash\"\" - I've never, ever owned a stock that hasn't had 30% down times. Food for thought!\"", "title": "" }, { "docid": "1d6f220dd1677d35b3bed386d664808f", "text": "Investing in mutual funds, ETF, etc. won't build a large pool of money. Be an active investor if your nature aligns. For e.g. Invest in buying out a commercial space (on bank finance) like a office space and then rent it out. That would give you better return than a savings account. In few years time, you may be able to pay back your financing and then the total return is your net return. Look for options like this for a multiple growth in your worth.", "title": "" } ]
[ { "docid": "435c3470e17746d6233f856852a9e7d9", "text": "After retirement nobody want to get low on cash. So, the best way to stay safe is to make some investments. Compare the saving with regular expenses and invest the rest. You can put some money in short-term reserves such as bank accounts, market funds, and deposit certificates. You will not be able to make much money on it but, it will ensure the financing of at least two to three years. There’s no need to take the money out from stocks but, if the stocks are doing good and there is a possibility that there will be no further profits then you can think of taking them out otherwise leave it alone.", "title": "" }, { "docid": "bb592fe2d1053d02c5d2d66161179cb3", "text": "\"US currency, today, can be used for useful things like selling a car, but there's nothing stopping you for trading it for something else. On edit; I've been thinking about this, and I think that the problem is that currency exists as a. edium to pay taxes. The usefulness of it for non-governmental transactions is a secondary benefit. However, without them full faith and credit ofma government somewhere the currency would be worthless. For example, see Zimbbwean currency or any non-convertible currency. *extra edit--altogether too many \"\"m's.\"\"\"", "title": "" }, { "docid": "ffdf27fb9f7077c4a6d7ea0ba512f87f", "text": "Three ideas: PayPal is probably the best/cheapest way to transfer small/medium amounts of money overseas.", "title": "" }, { "docid": "46ef1c349a7e585f5f3bd1e59c73d059", "text": "Here's how I think about money. There are only 3 categories / contexts (buckets) that my earned money falls into. Savings is my emergency fund. I keep 6 months of total expenses (expenses are anything in the consumption bucket). You can be as detailed as you want with this area but I tend to leave a fudge factor. In other words, if I estimate that I spend approximately $3,000 a month in consumption dollars then I'll save $3,500 times 6 in the bank. This money needs to be liquid. Some people use a HELOC, other people use their ROTH contributions. In any case, you need to put this money some place you can get access to it in case you go from accumulation (income exceed expenses) to decumulation mode (expenses exceed income). This money is distinct from consumption which I will cover in paragraph three. Investments are stocks, bonds, income producing real estate, small businesses, etc. These dollars require a strategy. The strategy can include some form of asset allocation but more importantly a timeline. These are the dollars that are working for you. Each dollar placed here will multiply over time. Once you put a dollar here it shouldn't be taken out unless there is some sort of catastrophe that your savings can't handle or your timeline has been achieved. Notice that rental real estate is included so liquidating stocks to purchase rental real estate is NOT considered removing investment dollars. Just reallocating based on your asset allocation. This bucket includes 401k's, IRAs, all tax-sheltered accounts, non-sheltered brokerage accounts, and rental real estate. In general your primary residence is not included in this bucket. Some people include the equity of their primary residence in the investment column but it can complicate the equation and I prefer to leave it out. The consumption bucket is the most important bucket and the one you spend the most time with. It requires a budget. This includes your $5 magazine and your $200 bottle of wine. Anything in this bucket is gone. You can recover a portion of it by selling it on ebay for $3 (these are earned dollars) but the original $5 is still considered spent. The reason your thought process in this area is distinct from the other two, the decisions made in this area will have the biggest impact on your personal finances. Warren Buffett was famous for skimping on haircuts because they are worth thousands of dollars down the road if they are invested instead. Remember this is a zero-sum game so every $1 not consumed is placed in one of the other buckets. Once your savings bucket is full every dollar not consumed is sent to investments. Remember to include everything that does not fit in the other two buckets. Most people forget their car insurance, life insurance, tax bill at the end of the year, accountant bill, etc. In conclusion, there are three buckets. Savings, which serve as your emergency bucket. This money should not be touched unless you switch from accumulation to decumulation. Investments, which are your dollars that are working for you over time. They require a strategy and a timeline. Consumption, which are your monthly expenses. These dollars keep you alive and contribute to your enjoyment. This is a short explanation of my use of money. It can get as complicated and detailed as you want it to be but as long as you tag your dollars correctly you'll be okay IMHO. HTH.", "title": "" }, { "docid": "26939aa6eeca2b834916babe29f760bf", "text": "At this stage of the game your best investment is yourself. Rather than putting it in stocks, use any spare money you have to get yourself the best education you can. See if you can drop that part-time job and give yourself more time to study. Or maybe you can go to a better, more expensive college. Or maybe college will give you some opportunity to travel and learn more that way. You don't want to exclude yourself from those opportunities by not having enough spare cash. So in short, spend what you need to get yourself the best education you can, and keep any spare money you have somewhere you can use it to take advantage of any opportunities that come your way.", "title": "" }, { "docid": "ca6173c58c16201cc1774fe3a875ea43", "text": "\"I have been trying to find information about how banks \"\"create\"\" money by giving out loans while only having a portion of the money to lend. And any broader implications this may have (ie, all new money is debt?). And the implications of the the government increasing or decreasing the required reserve amount. I hope I explained that in a coherent way. BTW, I love the investopedia videos. If you can in any way emulate that technique, it should be a hit. good luck.\"", "title": "" }, { "docid": "e155a7538f8822b59bcea7d7e2f5090d", "text": "In addition to what others have said, I think it is important to consider that government retirement assistance (whatever it is called in each instance) is basically a promise that can be revoked. I talked to a retired friend of mine just yesterday and we got onto that subject; she mentioned that when she was young, the promise was for 90% of one's pay, paid by the government after retiring. It is very different today. Yes, you can gamble that you won't need the saved money, and thus decide not to save anything. What then if you do end up needing the money you did not set aside, but rather spent? You are just now graduating college, and assuming of course that you get a decently-paying job, are likely going to have loads more money than you are used to. If you make an agreement with yourself to set aside even just 10-15% of the difference in income right from the start, that is going to grow into a pretty sizable nest egg by the time you approach retirement age. Then, you will have the option of continuing to work (maybe part-time) or quitting in a way you would not have had otherwise. Now I'm going to pull numbers out of thin air, but suppose that you currently have $1000/month net, before expenses, and can get a job that pays $1800/month net starting out. 10-15% of the difference means you'll be saving around $100/month for retirement. In 35 years, assuming no return on investment (pessimistic, but works if returns match inflation) and no pay rises, that will still be over $40K. That's somewhere on the order of $150/month added to your retirement income for 25 years. Multiply with whatever inflation rate you think is likely if you prefer nominal values. It becomes even more noticable if you save a significant fraction of the additional pay; if you save 1/3 of the additional money (note that you still effectively get a 50% raise compared to what you have been living on before), that gives you a net income of $1500/month instead of $1800 ($500/month more rather than $800/month more) which grows into about $110K in 35 years assuming no return on investment. Nearly $400 per month for 25 years. $100 per week is hardly chump change in retirement, and it is still quite realistic for most people to save 30% of the money they did not have before.", "title": "" }, { "docid": "eb6cf381a81bcc5bf1f0ada803b42b6f", "text": "Gold and silver are for after the crisis, not during. Gold and silver are far more likely to be able to be exchanged for things you need, since they are rare, easily divided, etc. Getting land away from where the crap is happening is also good, but it's more than that. Say you have land somewhere. How will the locals view you if you move there to hunker down only when things go bad? They won't really trust you, and you'll inherit a new set of problems. Building relationships in an off-the-beaten-path area requires a time investment. Investing in lifestyle in general is good. Lifestyle isn't just toys, but it's privacy, peace of mind, relationships with people with whom you can barter skills, as well as the skills you might think you'd need to do more than just get by in whatever scenario you envision. For the immediate crisis, you'd better have the things you'll need for a few months. Stores probably won't be supplied on any regular basis, and the shelves will be bare. Trying to use gold or silver during the crisis just makes you a target for theft. With regard to food, it's best to get acclimated to a diet of what you'd have on hand. If you get freeze-dried food, eat it now, so that it's not a shock to your system when you have to eat it. (Can you tell I've been thinking about this? :) )", "title": "" }, { "docid": "8cc00e61174d102fff008e8fa1aad7fa", "text": "\"For a two year time frame, a good insured savings account or a low-cost short-term government bond fund is most likely the way I would go. Depending on the specific amount, it may also be reasonable to look into directly buying government bonds. The reason for this is simply that in such a short time period, the stock market can be extremely volatile. Imagine if you had gone all in with the money on the stock market in, say, 2007, intending to withdraw the money after two years. Take a broad stock market index of your choice and see how much you'd have got back, and consider if you'd have felt comfortable sticking to your plan for the duration. Since you would likely be focused more on preservation of capital than returns during such a relatively short period, the risk of the stock market making a major (or even relatively minor) downturn in the interim would (should) be a bigger consideration than the possibility of a higher return. The \"\"return of capital, not return on capital\"\" rule. If the stock market falls by 10%, it must go up by 11% to break even. If it falls by 25%, it must go up by 33% to break even. If you are looking at a slightly longer time period, such as the example five years, then you might want to add some stocks to the mix for the possibility of a higher return. Still, however, since you have a specific goal in mind that is still reasonably close in time, I would likely keep a large fraction of the money in interest-bearing holdings (bank account, bonds, bond funds) rather than in the stock market. A good compromise may be medium-to-high-yield corporate bonds. It shouldn't be too difficult to find such bond funds that can return a few percentage points above risk-free interest, if you can live with the price volatility. Over time and as you get closer to actually needing the money, shift the holdings to lower-risk holdings to secure the capital amount. Yes, short-term government bonds tend to have dismal returns, particularly currently. (It's pretty much either that, or the country is just about bankrupt already, which means that the risk of default is quite high which is reflected in the interest premiums demanded by investors.) But the risk in most countries' short-term government bonds is also very much limited. And generally, when you are looking at using the money for a specific purpose within a defined (and relatively short) time frame, you want to reduce risk, even if that comes with the price tag of a slightly lower return. And, as always, never put all your eggs in one basket. A combination of government bonds from various countries may be appropriate, just as you should diversify between different stocks in a well-balanced portfolio. Make sure to check the limits on how much money is insured in a single account, for a single individual, in a single institution and for a household - you don't want to chase high interest bank accounts only to be burned by something like that if the institution goes bankrupt. Generally, the sooner you expect to need the money, the less risk you should take, even if that means a lower return on capital. And the risk progression (ignoring currency effects, which affects all of these equally) is roughly short-term government bonds, long-term government bonds or regular corporate bonds, high-yield corporate bonds, stock market large cap, stock market mid and low cap. Yes, there are exceptions, but that's a resonable rule of thumb.\"", "title": "" }, { "docid": "90a3c2df6bd596f6abcd66c5ada17777", "text": "I'd put as much of it as possible into an ISA that pays a decent amount of interest so you get the benefit of the money accruing interest tax free. For the rest, I'd shop around for notice accounts, but would also keep an eye out for no-notice accounts. The latter might be beneficial if you expect interest rates to rise and are willing to shop around and move the money into accounts paying better interest every few months. Just make sure you're also factoring in the loss of interest when moving the money. You could look into fixed term savings bonds but I don't think they currently pay enough to make it worthwhile locking away your money.", "title": "" }, { "docid": "19db6fb40b0e627a0ddfc56aeb1268a1", "text": "\"I would be more than happy to find a good use for your money. ;-) Well, you have a bunch of money far in excess of your regular expenses. The standard things are usually: If you are very confused, it's probably worth spending some of your windfall to hire professional help. It beats you groping in the dark and possibly doing something stupid. But as you've seen, not all \"\"professionals\"\" are equal, and finding a good one is another can of worms. If you can find a good one, it's probably worth it. Even better would be for you to take the time and thoroughly educate yourself about investment (by reading books), and then make a knowledgeable decision. Being a casual investor (ie. not full time trader) you will likely arrive, like many do, at a portfolio that is mostly a mix of S&P ETFs and high grade (eg. govt and AAA corporate) bonds, with a small part (5% or so) in individual stock and other more complicated securities. A good financial advisor will likely recommend something similar (I've had good luck with the one at my credit union), and can guide you through the details and technicalities of it all. A word of caution: Since you remark about your car and house, be careful about upgrading your lifestyle. Business is good now and you can afford nicer things, but maybe next year it's not so good. What if you are by then too used to the high life to give it up, and end up under mountains of debt? Humans are naturally optimistic, but be wary of this tendency when making assumptions about what you will be able to afford in the future. That said, if you really have no idea, hey, take a nice vacation, get an art tutor for the kids, spend it (well, ideally not all of it) on something you won't regret. Investments are fickle, any asset can crash tomorrow and ruin your day. But often experiences are easier to judge, and less likely to lose value over time.\"", "title": "" }, { "docid": "4c372ebe4d33144e8b380f5ce9052c02", "text": "My approach won't work for everyone, but I keep a longer list of things I want in my head, preferably including higher value items. I then look at the cost of an item vs the amount of benefit it gets me (either enjoyment or ability to make more money or both). If I only had a few things I wanted, it would be easy to buy them even if the payback wasn't that great, but because I have a large list of things I'd like to be able to do, it's easier to play the comparison game in my head. Do I want this $50 thing now that will only give me a little bit of enjoyment and no income, or would I rather be able to get that $3000 digital cinema camera that I would enjoy having and could work on projects with and actually make money off of? (This is a RL example that I actually just bought last week after making sure I had solid leads on enough projects to pay myself back over time.) For me, it is much easier to compare with an alternative thing I'd enjoy, particularly since I enjoy hobbies that can pay for themselves, which is really the situation this strategy works best in. It might not work for everyone, but hobbies that pay for themselves can take many different forms. Mine tends to be very direct (get A/V tool, do projects that pay money), but it can also be indirect (get sports stuff, save on gym membership over time). If you can get things onto your list that can save you money in the long run, then this strategy can work pretty well, if not, you'll still have the overall saving problem, just with a longer wish list. That said, if you are good about saving already and simply want to make better use of your disposable income, then having a longer list may also work to let you seek out better deals for you. If you have funds that you know you can healthily spend on enjoyment, it is going to be difficult to choose nothing over something that gives enjoyment, even if it isn't a great return on the money. If you have alternatives that would give you better value, then it's easier to avoid the low value option.", "title": "" }, { "docid": "4ce65f07e88658faf0065537c90bf6ae", "text": "Here are some options: Park your money in a bank that works best for you.", "title": "" }, { "docid": "d810d2b0597dfe42dca0e0ea09f600cb", "text": "\"Aside from the calculations of \"\"how much you save through reducing interest\"\", you have two different types of loan here. The house that is mortgaged is not a wasting asset. You can reasonably expect that in 2045 it will have retained its worth measured in \"\"houses\"\", against the other houses in the same neighbourhood. In money terms, it is likely to be worth more than its current value, if only because of inflation. To judge the real cost or benefit of the mortgage, you need to consider those factors. You didn't say whether the 3.625% is a fixed or variable rate, but you also need to consider how the rate might compare with inflation in the long term. If you have a fixed rate mortgage and inflation rises above 3.625% in future, you are making money from the loan in the long term, not losing what you pay in interest. On the other hand, your car is a wasting asset, and your car loans are just a way of \"\"paying by installments\"\" over the life of the car. If there are no penalties for early repayment, the obvious choice there is to pay off the highest interest rates first. You might also want to consider what happens if you need to \"\"get the $11,000 back\"\" to use for some other (unplanned, or emergency) purpose. If you pay it into your mortgage now, there is no easy way to get it back before 2045. On the other hand, if you pay down your car loans, most likely you now have a car that is worth more than the loans on it. In an emergency, you could sell the car and recover at least some of the $11,000. Of course you should keep enough cash available to cover \"\"normal emergencies\"\" without having to take this sort of action, but \"\"abnormal emergencies\"\" do sometimes happen!\"", "title": "" }, { "docid": "fbc902b2e8751c0e08faf3c047029915", "text": "\"As the others said, you're doing everything right. So, at this it's not a matter of what you should do, it's a matter of what do you want to do? What would make you the happiest? So, what would you like to do most with that extra money? The point is, since you're already doing everything right with the rest of your money, there's really nothing you can do that's wrong with this money. Except using it on something that increases your monthly expenses, like a down payment on a car. In fact, there's no reason you have to do anything \"\"sensible\"\" with this money at all. You could blow it at nightclubs if you wanted to, and that would be perfectly ok. In fact, since you've got everything else covered, why not \"\"invest\"\" it in making some memories? How about vacations to exotic and rugged places, while you're still young enough to enjoy them?\"", "title": "" } ]
fiqa
81fe2d6171af6be5bb5db6c1d47261de
I'm 23 and was given $50k. What should I do?
[ { "docid": "7976ebac42b29cd1cffa0d98f24be429", "text": "Here are some possibilities: avoid buying a car for as long as you can; if forced to own one, buy a used dependable car like a Toyota Corolla- 4 cyl and don't abuse it. open a Roth IRA, depositing max possible, the plan on doing so until you've investing the remaining balance. A Roth IRA, while not tax deductible now (you're in a low tax bracket now) will provide for tax-free distributions when you are both older and not in a low bracket. of course, invest in low cost equity funds. Come back for more ideas once the dust settles, you've got money left over and some of the above accomplished. You've got one asset many of us don't have: time.", "title": "" }, { "docid": "605842993bf7c451b0f12c45806e8a78", "text": "First, I would point you to this question: Oversimplify it for me: the correct order of investing With the $50k that you have inherited, you have enough money to pay off all your debt ($40k), purchase a functional used car ($5k), and get a great start on an emergency fund with the rest. There are many who would tell you to wait as long as possible to pay off your student loans and invest the money instead. However, I would pay off the loans right away if I were you. Even if it is low interest right now, it is still a debt that needs to be paid back. Pay it off, and you won't have this debt hanging over your head anymore. Your grandmother has given you an incredible gift. This money can make you completely debt free and put you on a path for success. However, if you aren't careful, you could end up back in debt quickly. Learn how to make a budget, and commit to never spending money that you don't have again.", "title": "" }, { "docid": "5b740b898731a15a46298c807c24c05d", "text": "\"I'll add 2 observations regarding current answers. Jack nailed it - a 401(k) match beats all. But choose the right flavor account. You are currently in the 15% bracket (i.e. your marginal tax rate, the rate paid on the last taxed $100, and next taxed $100.) You should focus on Roth. Roth 401(k) (and if any company match, that goes into a traditional pretax 401(k). But if they permit conversions to the Roth side, do it) You have a long time before retirement to earn your way into the next tax bracket, 25%. As your income rises, use the deductible IRA/ 401(k) to take out money pretax that would otherwise be taxed at 25%. One day, you'll be so far into the 25% bracket, you'll benefit by 100% traditional. But why waste the opportunity to deposit to Roth money that's taxed at just 15%? To clarify the above, this is the single rate table for 2015: For this discussion, I am talking taxable income, the line on the tax return designating this number. If that line is $37,450 or less, you are in the 15% bracket and I recommend Roth. Say it's $40,000. In hindsight on should put $2,550 in a pretax account (Traditional 401(k) or IRA) to bring it down to the $37,450. In other words, try to keep the 15% bracket full, but not push into 25%. Last, after enough raises, say you at $60,000 taxable. That, to me is \"\"far into the 25% bracket.\"\" $20,000 or 1/3 of income into the 401(k) and IRA and you're still in the 25% bracket. One can plan to a point, and then use the IRA flavors to get it dead on in April of the following year. To Ben's point regarding paying off the Student Loan faster - A $33K income for a single person, about to have the new expense of rent, is not a huge income. I'll concede that there's a sleep factor, the long tern benefit of being debt free, and won't argue the long term market return vs the rate on the loan. But here we have the probability that OP is not investing at all. It may take $2000/yr to his 401(k) capture the match (my 401 had a dollar for dollar match up to first 6% of income). This $45K, after killing the card, may be his only source for the extra money to replace what he deposits to his 401(k). And also serve as his emergency fund along the way.\"", "title": "" }, { "docid": "e20bda2b9348c44c284bb75dc8e4a975", "text": "If your employer is matching 50 cents on the dollar then your 401(k) is a better place to put your money than paying off credit cards This. Assuming you can also get the credit cards paid off reasonably soon too (say, by next year). Otherwise, you have to look at how long before you can withdraw that money, to see if the compounded credit card debt isn't growing faster than your retirement. But a guaranteed 50% gain, your first year is a pretty hard deal to beat. And if you currently have no savings, unless all of your surplus income has been reducing your debt, you're living beyond your means. You should be earning more than you're (going to be) spending, when you start paying rent/car bills. If you don't know what this is going to be, you need to be budgeting. Get this under control, by any means necessary. New job/career? Change priorities/expectations? Cut expenses? Live to your budget? Whatever it takes. I don't think you should be in any investment that includes bonds until you're 40, and maybe not even then - equities and cash-equivalents all the way (cash is for emergency funds, and for waiting for buying opportunities). Otherwise Michael has some good ideas. I would caveat that I think you should not buy any investments in one chunk, but dollar average it over some period of time, in case the market is unnaturally high right when you decide to invest. You should also gauge possible returns and potential tax liabilities. Debt is good to get rid of, unless it is good debt (very low interest rates - ie: lower than you could borrow the money for). Good debt should still get paid off - who knows how long your job could last for - but maybe not dump all of your $50K on it. Roth is amazing. You should be maxing that contribution out every year.", "title": "" }, { "docid": "ac87ed2ce4077b4e61e5806d7671fd6f", "text": "To add to @michael's solid answer, I would suggest sitting down and analyzing what your priorities are about paying off the student loan debt versus investing that money immediately. (Regardless, the first thing you should do is, as michael suggested, pay off the credit card debt) Since it looks like you will be having some new expenses coming up soon (rent, possibly a new car), as part of that prioritization you should calculate what your rent (and associated bills) will cost you on a monthly basis (including saving a bit each month!) and see if you can afford to pay everything without incurring new debt. I'd recommend trying to come up with several scenarios to see how cheaply you can live (roommates, maybe you can figure out a way to go without a car, etc). If, for whatever reason, you find you can't afford everything, then I would suggest taking a portion of your inheritance to at least pay off enough of your student loans so that you can afford all of your costs per month, and then save or invest the rest. (You can invest all you like, but if you don't live within your means, it won't do you any good.) Finally -- be aware that you may have other factors that come into play that may override financial considerations. I found myself in a situation similar to yours, and in my case, I chose to pay off my debts, not because it necessarily made the best financial sense, but that because of those other considerations, paying off that debt meant I had a significant level of stress removed from my life, and a lot more peace of mind.", "title": "" }, { "docid": "d41d8cd98f00b204e9800998ecf8427e", "text": "", "title": "" }, { "docid": "db8106cfd7ef5fa80480e89e21f6f2c1", "text": "The best option for maximizing your money long-term is to contribute to the 401(k) offered by your employer. If you park your inheritance in a savings account you can draw on it to augment your income while you max out your contributions to the 401(k). You will get whatever the employer matches right off the bat and your gains are tax deferred. In essence you will be putting your inheritance into the 401(k) and forcing your employer to match at whatever rate they do. So if your employer matches at 50 cents on the dollar you will turn your 50 thousand into 75 thousand.", "title": "" }, { "docid": "4a911181137582e6d96fe11409fd5e1b", "text": "First of all, I am sorry for your loss. At this time, worrying about money is probably the least of your concerns. It might be tempting to try to pay off all your debts at once, and while that would be satisfying, it would be a poor investment of your inheritance. When you have debt, you have to think about how much that debt is costing you to keep open. Since you have 0%APR on your student loan, it does not make sense to pay any more than the minimum payments. You may want to look into getting a personal loan to pay off your other personal debts. The interest rates for a loan will probably be much less than what you are paying currently. This will allow you to put a payment plan together that is affordable. You can also use your inheritance as collateral for the loan. Getting a loan will most likely give you a better credit rating as well. You may also be tempted to get a brand new sports car, but that would also not be a good idea at all. You should shop for a vehicle based on your current income, and not your savings. I believe you can get the same rates for an auto loan for a car up to 3 years old as a brand new car. It would be worth your while to shop for a quality used car from a reputable dealer. If it is a certified used car, you can usually carry the rest of the new car warranty. The biggest return on investment you have now is your employer sponsored 401(k) account. Find out how long it takes for you to become fully vested. Being vested means that you can leave your job and keep all of your employer contributions. If possible, max out, or at least contribute as much as you can afford to that fund to get employee matching. You should also stick with your job until you become fully vested. The money you have in retirement accounts does you no good when you are young. There is a significant penalty for early withdrawal, and that age is currently 59 1/2. Doing the math, it would be around 2052 when you would be able to have access to that money. You should hold onto a certain amount of your money and keep it in a higher interest rate savings account, or a money market account. You say that your living situation will change in the next year as well. Take full advantage of living as cheaply as you can. Don't make any unnecessary purchases, try to brown bag it to lunch instead of eating out, etc. Save as much as you can and put it into a savings account. You can use that money to put a down payment on a house, or for the security and first month's rent. Try not to spend any money from your savings, and try to support yourself as best as you can from your income. Make a budget for yourself and figure out how much you can spend every month. Don't factor in your savings into it. Your savings should be treated as an emergency fund. Since you have just completed school, and this is your first big job out of college, your income will most likely improve with time. It might make sense to job hop a few times to find the right position. You are much more likely to get a higher salary by changing jobs and employers than you are staying in the same one for your entire career. This generally is true, even if you are promoted at the by the same employer. If you do leave your current job, you would lose what your employer contributed if you are not vested. Even if that happened, you would still keep the portion that you contributed.", "title": "" }, { "docid": "080056d630bff8fef41c2b47594e2d9a", "text": "I'd be tempted to pay off the 35k in student loans immediately, but if you have to owe money, it's hard to beat zero percent. So I don't think I would pay it all off. Maybe cut it in half to make it a more comfortable payment. Currently, you are looking at $6K a year to pay them off, which is about 20% of your income. Cut that in half and you will sleep better! Definitely pay off the medical and credit cards. You're probably paying 20% on that. Clean it up. If you need a car, buy yourself a car. You have no savings, so I would put the rest in some kind of money market savings account. You are at an age where many people go through frequent changes. Maybe you get your own place, and you'll need to furnish it. Maybe you go back to school. Maybe you get married or have kids. Maybe you take a year off and backpack through Europe or Asia. You have a nice little windfall that puts you in a nice position to enjoy being young, so I would not lock it up into a 401k or other long term situation.", "title": "" }, { "docid": "3fcd316ac05b8ae0bdeabc00453d5ab6", "text": "Wow, hard to believe not a single answer mentioned investing in one of the best asset classes for tax purposes...real estate. Now, I'm not advising you to rush out and buy an investment property. But rather than just dumping your money into mutual funds...over which you have almost 0 control...buy some books on real estate investing. There are plenty of areas to get into, rehabs, single family housing rentals, multifamily, apartments, mobile home parks...and even some of those can have their own specialties. Learn now! And yes, you do have some control over real estate...you control where you buy, so you pick your local market...you can always force appreciation by rehabbing...if you rent, you approve your renters. Compared to a mutual fund run by someone you'll never meet, buying stocks in companies you've likely never even heard of...you have far more control. No matter what area of investing you decide to go into, there is a learning curve...or you will pay a penalty. Go slow, but move forward. Also, all the advice on using your employer's matching (if available) for 401k should be the easiest first step. How do you turn down free money? Besides, the bottom line on your paycheck may not change as much as you think it might...and when weighed against what you get in return...well worth the time to get it setup and active.", "title": "" }, { "docid": "316db4223ba9dcc3fba8f86d17dd2faa", "text": "Here's what I'd do: Pay off the cards and medical. Deposit 35k in the best interest bearing accounts you can find (maybe some sort of ladder). Link your student loans payments to this account. This frees up $486 a month in income, and generates a small amount of interest at the same time. Now, set up some sort of retirement account. Put $400 a month in it. This leaves you with $86 a month to use as you please. You still have $10 000 cash, out of which you could buy an inexpensive used car, and bank some as emergency funds.", "title": "" }, { "docid": "cd09e8a1db0d28c7d37ad2059e0bdf28", "text": "\"I would advise against \"\"wasting\"\" this rare opportunity on mundane things, like by paying off debts or buying toys - You can always pay those from your wages. Plus, you'll inevitably accumulate new debts over time, so debt repayment is an ongoing concern. This large pile of cash allows you to do things you can't ordinarily do, so use the opportunity to invest. Buy a house, then rent it out. Rent an apartment for yourself. The house rent will pay most (maybe all) of the mortgage, plus the mortgage interest is tax-deductible, so you get a lower tax bill. And houses appreciate over time, so that's an added bonus. When you get married, and start a family, you'll have a house ready for you, partially paid off with other people's money.\"", "title": "" }, { "docid": "23d0cbff2e9a46f0f939a6905e11e253", "text": "I would be realistic and recognize that however you invest this money, it is unlikely to be a life-changing sum. It is not going to provide an income which significantly affects your monthly budget, nor is it going to grow to some large amount which will allow you to live rent-free or similar. Therefore my advice is quite different to every other answer so far. If I was you, I would: I reckon this might get you through half the money. Take the other $25,000 and go travelling. Plan a trip to Europe, South America, Asia or Australia. Ask your job for 3 or 6 months off, and quit it they won't give it you. Find a few places which you would really like to visit, and schedule around them a lot of time to go where you want. Book your flights in advance, or book one way, and put aside enough money for the return when you know where you'll be coming back from. Stay in hostels, a tent or cheap AirBnB. Make sure you have a chance to meet other people, especially other people who are travelling around. Figure out in advance how much it will cost you a day to live basically, and budget for a few beers/restaurants/cinema/concert tickets/drugs/whatever you do to have fun. It's really easy nowadays to go all sorts of places, and be very spontaneous about what you want to do next. You will find that everywhere in the world is different, all people have something unusual about them, and everywhere is interesting. You will meet some great people and probably become both more independent and better at making friends with strangers. Your friends in other countries could stay friends for life. The first time you see Rome, the Great Barrier Reef, the Panama canal or the Tokyo fish market will be with you forever. You have plenty of years to fill up your 401K. You won't have the energy, fearlessness and openmindedness of a 23 year old forever. Go for it.", "title": "" } ]
[ { "docid": "19a399279fa3d682c76b0f1cb8422a2e", "text": "IMO almost any sensible decision is better than parking money in a retirement account, when you are young. Some better choices: 1) Invest in yourself, your skills, your education. Grad school is one option within that. 2) Start a small business, build a customer base. 3) Travel, adventure, see the world. Meet and talk to lots of different people. Note that all my advice revolves around investing in YOURSELF, growing your skills and/or your experiences. This is worth FAR more to you than a few percent a year. Take big risks when you are young. You will need maybe $1m+ (valued at today's money) to retire comfortably. How will you get there? Most people can only achieve that by taking bigger risks, and investing in themselves.", "title": "" }, { "docid": "d530f2b6588cb43271a67fa236e2bc7c", "text": "You can put them in a 5 years CD and getting a maximum of %2.5 APY if you're lucky. If you put 15k now, in 5 years you'll have $1.971. If it sounds good then take a look at the current inflation rate (i'm in usa)... If you want to think about retirement then you should open a Roth IRA. But you won't be able to touch the money without penalties (10% of earnings) before you get 59 1/2 years old. Another option would be to open a regular investment account with an online discounted broker. Which one? Well, this should be a totally separate question... If you decide to invest (Roth IRA or regular account) and you're young and inexperienced then go for a balanced mutual fund. Still do a lot of research to determine your portfolio allocation or which fund is best suited for you. Betterment (i never used it) is a no brainer investment broker. Please don't leave them in a generic checking or low interest savings account because you'll save nothing (see inflation again)...", "title": "" }, { "docid": "ed5fb75f53cbfb9ec38c820ec74761d4", "text": "I'd suggest waiting until a bit after you are married. To Eagle1's point, even $23,000 is not a huge sum of money. You didn't make any mention of a desire to buy a home, but if that becomes part of the plan, I'd want every cent of liquidity I can get. I wrote Student Loans and Your First Mortgage to explain why your buying power for the house is lowered by paying that loan. In your case, $5000 is 20% of $25000. For a good 20% down purchase, I'd want those funds available. You also don't mention retirement accounts. Depending on the home purchase timing, I'd start to think about putting aside at least the $5500 per year IRA/Roth IRA maximum.", "title": "" }, { "docid": "cae10da6b845a9f5199d74784818981b", "text": "You probably have a UMTA/UGMA account. While the money in that account belongs to you, as long as you're a minor (which is until the age of 18, in California) - you cannot directly access it. Instead, your parent(s) or guardian(s) or any other trustee manages that account for you, with your best interests in mind. While you may want to spend that money or give it away to your boyfriend or whoever else, it is very likely not in your best interest to do that. That is why your dad refuses. He has a legal responsibility, which is called fiduciary duty, to ensure the money is spent in a way that is best for you. If the fiduciary just lets you spend the money away - you could later, when you're no longer a minor, sue that person for the breach of trust. When you're older and a bit more mature you'll be able to make your own decisions and do whatever you want with that money. But as long as your parents have the responsibility to act in your best interests, it is likely that your boyfriend will stay in Pennsylvania for a while.", "title": "" }, { "docid": "85a5d77aeba67dafed30a54c183028fe", "text": "Why not just hold that cash until you graduate from college? Why? Because it's a safety net - make sure you don't have any sudden expenses (medical, school bills, car bills, etc). Then after school you're going to need some cash for job moving, relocation, clothes, downpayment on apartment, utilities, etc. If all that cash is tied up into a 401 or IRA then you can't touch it and if something happens you'll be tempted to take a loan out. Ack! You'll have plenty of time since you're just starting to save for retirement. Keep this cash as a beginning emergency fund and hang on cause as soon as you get out of school things really move fast. :)", "title": "" }, { "docid": "ba4c40ef92b1b89622a3207dc14fd562", "text": "My god man, where do you live that is too expensive to live on your own and 7K isn't enough for emergency cash? Anyway, with your age and income I would be more worried about a long-term sustainable lifestyle. In other words, a job that nets you more than $26K/year. Someday you may want to have a wife and kids and that income sure as hell wont pay for their college. That was life advice, now for financial: I've always been a believer that if someone is not a savvy investor, their priorities before investments should be paying off debt. If you had a lot of capital or knew your way around investment vehicles and applicable returns then I would be telling you something different. But in your case, pay off that car first giving yourself more money to invest in the long-run.", "title": "" }, { "docid": "9b3bd63f5d55ca2eb550414c3182b710", "text": "Setting aside for the moment the very relevant issue of whether you need the full amount quickly, I'll just tackle comparing which option gives you to maximum amount of money (in terms of real dollars). The trick is, unless you think inflation will suddenly reverse itself or stop entirely (not likely), $50K today is worth a LOT more than $50K in 20 years. If you don't believe me, consider that just 30 years ago the average price for a mid-level new car was around $3k. When you grandfather says he got a burger for a nickel, he isn't talking about 2010 dollars. So, how do you account for this? Well, the way financial people and project managers do it to estimate how much to pay today for $1 at some point in the future is through a net present value (NPV) calculation. You can find a calculator here. In your question, you gave some numbers for the payout, but not the lump sum prize amount. Going solely on what you have provided, I calculate that you should take the lump sum if it is greater than $766,189.96 which is the net present value of 20 years of $50K Payments assuming 3% annual inflation, which is fairly a fairly reasonable number given history. However, if you think the out-of-control Gov't spending is going to send inflation through the roof (possible, but not a given), then you almost certainly would want the lump sum. I suppose in that scenario you might want the lump sum anyway because if the Govt starts filching on their obligations, doing it to a small number of lottery winners might be politically more popular than cutting other programs that affect a large number of voters.", "title": "" }, { "docid": "bd3db7ba67b69b0a6bb9b5ed64bdbf5b", "text": "I am sorry for your loss, this person blessed you greatly. For now I would put it in a savings account. I'd use a high yield account like EverBank or Personal Savings from Amex. There are others it is pretty easy to do your own research. Expect to earn around 2200 if you keep it there a year. As you grieve, I'd ask myself what this person would want me to do with the money. I'd arrive at a plan that involved me investing some, giving some, and spending some. I have a feeling, knowing that you have done pretty well for yourself financially, that this person would want you to spend some money on yourself. It is important to honor their memory. Giving is an important part of building wealth, and so is investing. Perhaps you can give/purchase a bench or part of a walkway at one of your favorite locations like a zoo. This will help you remember this person fondly. For the investing part, I would recommend contacting a company like Fidelity or Vanguard. The can guide you into mutual funds that suit your needs and will help you understand the workings of them. As far as Fidelity, they will tend to guide you toward their company funds, but they are no load. Once you learn how to use the website, it is pretty easy to pick your own funds. And always, you can come back here with more questions.", "title": "" }, { "docid": "d636f7f7ecf7b891f7c3dac59f4a737c", "text": "Congratulations! You're making enough money to invest. There are two easy places to start: I recommend against savings accounts because they will quite safely lose your money: the inflation rate is usually higher than the interest rate on a savings account. You may have twice as much money after 50 years, but if everything costs four times as much, then you've lost buying power. If, in the course of learning about investing, you'd like to try buying individual stocks, do it only with money you wouldn't mind losing. Index funds will go down slightly if one of the companies in that index fails entirely, but the stock of a failed company is worthless.", "title": "" }, { "docid": "cc68b250e142e0a89cd68aa80106d854", "text": "If it turns out that you do want to help pay the tax bill (after answering all the questions above), I say cash out those funds. You are apparently very young with a long work life ahead (lucky you). Step aside from the actual money part of it for a moment. What does your Mom want? What do you really want to do about this? Is it from love that you want to help but are afraid it's a bad financial decision? Or is it from a feeling of duty and you deep down don't really want to spend your savings on Mom's tax bill. - If you really do want to help and you have the wherewithall to do so, then do it. Otherwise don't. You can recover financially. - I myself have had my retirement savings go to nearly zero 3 times. The first time I recovered pretty easily. The second time, not so easily. I'm just starting on the recovery path for the 3rd time at age 58 and I highly doubt I ever will recover this time. I didn't cash out on purpose but the stock market was not friendly. - My main point is to figure out truly what you want.", "title": "" }, { "docid": "6b474a0d47dd8050a1213e49e01afbc4", "text": "Thanks for your service. I would avoid personal investment opportunities at this point. Reason being that you can't personally oversee them if you are deployed overseas. This would rule out rentals and small businesses. Revisit those possibilities if you get married or leave the service. If you have a definite time when you would like to purchase a car, you could buy a six or twelve month CD with the funds that you need for that. That will slightly bump up your returns without taking much risk. If you don't really need to buy the car, you could invest that money in stocks. Then if the stock market tanks, you wait until it recovers (note that that can be five to ten years) or until you build up your savings again. That increases your reward at a significant increase in your risk. The risk being that you might not be able to buy a car for several more years. Build an emergency fund. I would recommend six months of income. Reason being that your current circumstances are likely to change in an emergency. If you leave the service, your expenses increase a lot. If nothing else, the army stops providing room for you. That takes your expenses from trivial to a third of your income. So basing your emergency fund on expenses is likely to leave you short of what you need if your emergency leaves you out of the service. Army pay seems like a lot because room (and board when deployed) are provided. Without that, it's actually not that much. It's your low expenses that make you feel flush, not your income. If you made the same pay in civilian life, you'd likely feel rather poor. $30,000 sounds like a lot of money, but it really isn't. The median household income is a little over $50,000, so the median emergency fund should be something like $25,000 on the income standard. On the expenses standard, the emergency fund should be at least $15,000. The $15,000 remainder would buy a cheap new car or a good used car. The $5000 remainder from the income standard would give you a decent used car. I wouldn't recommend taking out a loan because you don't want to get stuck paying a loan on a car you can't drive because you deployed. Note that if you are out of contact, in the hospital, or captured, you may not be able to respond if there is a problem with the car or the loan. If you pay cash, you can leave the car with family and let them take care of things in case of a deployment. If you invested in a Roth IRA in January of 2016, you could have invested in either 2015 or 2016. If 2015, you can invest again for 2016. If not, you can invest for 2017 in three months. You may already know all that, but it seemed worth making explicit. The Thrift Savings Plan (TSP) allows you to invest up to $18,000 a year. If you're investing less than that, you could simply boost it to the limit. You apparently have an extra $10,000 that you could contribute. A 60% or 70% contribution is quite possible while in the army. If you max out your retirement savings now, it will give you more options when you leave the service. Or even if you just move out of base housing. If your TSP is maxed out, I would suggest automatically investing a portion of your income in a regular taxable mutual fund account. Most other investment opportunities require help to make work automatically. You essentially have to turn the money over to some individual you trust. Securities can be automated so that your investment grows automatically even when you are out of touch.", "title": "" }, { "docid": "0a4ba4f4b5384baaa01d6d1d5113b329", "text": "You're extremely fortunate to have $50k in CDs, no debt, and $3800 disposable after food and rent. Congrats. Here's how I would approach it. If you see yourself getting into a home in the next couple of years, stay safe and liquid. CDs (depending on the duration) fit that description. Because you have disposable income and you're young, you should be contributing to a Roth IRA. This will build in value and compound over your lifetime, so that when you're in your 70s you'll actually have a retirement. Financial planners love life insurance because that's how they make all their money. I have whole life insurance because its cash value will be part of my retirement. It may also cover my wife if I ever decide to get married. It may or may not make sense for you now depending on how soon you want to buy a home and home expensive they are in your zip code. Higher risk, higher reward- you can count on that. Keep the funds in the United States and don't try to get into any slick financial moves. If you have a school in town, see if you can take an Intro to Financial Planning class. It's extremely helpful for anyone with these kinds of questions.", "title": "" }, { "docid": "f28372124749da6c9627223ed8e9e488", "text": "You need to find a fiduciary advisor pronto. Yes, you are getting a large amount of money, but you'll probably have to deal with higher than average health expenses and lower earning potential for years to come. You need to make sure the $1.2 million lasts you, and for that you need professional advice, not something you read on the Internet. Finding a knowledgeable advisor who has your interests at heart at a reasonable rate is the key here. These articles are a good start on what to look for: http://www.investopedia.com/articles/financialcareers/08/fiduciary-planner.asp https://www.forbes.com/sites/janetnovack/2013/09/20/6-pointed-questions-to-ask-before-hiring-a-financial-advisor/#2e2b91c489fe http://www.investopedia.com/articles/professionaleducation/11/suitability-fiduciary-standards.asp You should also consider what your earning potential is. You rule out college but at 26, you can have a long productive career and earn way more money than the $1.2 million you are going to get.", "title": "" }, { "docid": "965faa14f779d2158cfbb2260982ea77", "text": "\"At 50 years old, and a dozen years or so from retirement, I am close to 100% in equities in my retirement accounts. Most financial planners would say this is way too risky, which sort of addresses your question. I seek high return rather than protection of principal. If I was you at 22, I would mainly look at high returns rather than protection of principal. The short answer is, that even if your investments drop by half, you have plenty of time to recover. But onto the long answer. You sort of have to imagine yourself close to retirement age, and what that would look like. If you are contributing at 22, I would say that it is likely that you end up with 3 million (in today's dollars). Will you have low or high monthly expenses? Will you have other sources of income such as rental properties? Let's say you rental income that comes close to covering your monthly expenses, but is short about 12K per year. You have a couple of options: So in the end let's say you are ready to retire with about 60K in cash above your emergency fund. You have the ability to live off that cash for 5 years. You can replenish that fund from equity investments at opportune times. Its also likely you equity investments will grow a lot more than your expenses and any emergencies. There really is no need to have a significant amount out of equities. In the case cited, real estate serves as your cash investment. Now one can fret and say \"\"how will I know I have all of that when I am ready to retire\"\"? The answer is simple: structure your life now so it looks that way in the future. You are off to a good start. Right now your job is to build your investments in your 401K (which you are doing) and get good at budgeting. The rest will follow. After that your next step is to buy your first home. Good work on looking to plan for your future.\"", "title": "" }, { "docid": "f90edbfca0952db93bd3675d5978d7c4", "text": "Why should the rich who buy more expensive homes be subisdized by those who pay less, or from those who rent? A person who buys a 500k home in a high property tax area wins twice. Once but having more tax breaks by being able to deduct more than your average working class person who buys a house at 250k and the second time when they get nicer schools, public services etc at other people's dime. SF home prices are a combination or speculation investment and poor government control. SF prices are at Tokyo levels when the population density is at 1/10. That is a failure of local government policy to build more homes, not from lack of tax breaks. If your community wants to pay higher taxes for more local services, power to you and I encourage it, but you shouldn't be subsidized by those who dont. Imo, people shouldn't be punished for not owning property or living in a state where they think sales tax is better than income or property.", "title": "" } ]
fiqa
96ea433a4f62b90fe9ee388f58234fc7
How do brokers make money from margin accounts?
[ { "docid": "f5135a272a85115fd8dc1016cd7fe317", "text": "They will make money from brokerage as usual and also from the interest they charge you for lending you the money for you to buy your shares on margin. In other words you will be paying interest on the $30,000 you borrowed from your broker. Also, as per Chris's comment, if you are shorting securities through your margin account, your broker would charge you a fee for lending you the securities to short.", "title": "" }, { "docid": "e09675eb1b11e2d356c5e98f69dfd519", "text": "\"Your broker will charge you commissions and debit interest on your \"\"overdraft\"\" of $30,000. However it is very likely that your contract with the broker also contains a rehypothecation clause which allows your broker to use your assets. Typically, with a debt of $30,000, they would probably be entitled to use $45-60,000 of your stocks. In short, that means that they would be allowed to \"\"borrow\"\" the stocks you just bought from your account and either lend them to other clients or pledge them as collateral with a bank and receive interest. In both cases they will make money with your stocks. See for example clause #14 of this typical broker's client agreement. Applied to your example: In other words they will make $60 + $450 + $1,800 = $2,310 the first year. If the stock is expensive to borrow and they manage to lend it, they will make a lot more. There are by the way a few important consequences:\"", "title": "" }, { "docid": "d41d8cd98f00b204e9800998ecf8427e", "text": "", "title": "" } ]
[ { "docid": "150b659334d280ebad2c703db5e3618f", "text": "At this point the cost of borrowing money is very low. For the sake of argument, say it is 1% per year for a large institution. I can either go out and find a client to invest 100,000$ and split profit and loss with them. Or, I could borrow 50,000$, pay 500$/year in interest, and get the same return and loss, while moving the market half as much (which would let me double my position!) In both cases the company is responsible for covering all fixed costs, like paying for traders, trades, office space, branding, management, regulatory compliance, etc. For your system to work, the cost to gather clients and interact with them has to be significantly less than 1% of the capital they provide you per year. At the 50% level, that might actually be worth it for the company in question. Except at the 50% level you'd have really horrible returns even when the market went up. So suppose a more reasonable level is the client keeps 75% of the returns (which compares to existing companies which offer larger investors an 80% cut on profits, but no coverage on losses). Now the cost to gather and interact with clients has to be lower than 2500$ per million dollars provided to beat out a simple loan arrangement. A single sales employee with 100% overhead (office, all marketing, support, benefits) earning 40,000$/year has to bring in 32 million dollar-years worth of investment every year to break even. Cash is cheap. Investment houses sell cash management, and charge for it. They don't sell shared investment risk (at least not to retail investors), because it would take a lot of cash for it to be worth their bother. More explicitly, for this to be viable, they'd basically have to constantly arrange large hedges against the market going down to cover any losses. That is the kind of thing that some margin loans may require. That would all by itself lower their profits significantly, and they would be exposed to counter-party risk on top of that. It is much harder to come up with a pile of cash when the markets go down significantly. If you are large enough to be worthwhile, finding a safe counterparty may be nearly impossible.", "title": "" }, { "docid": "ccda9ff7d29469ea162262ae51d604a9", "text": "A CFD broker will let you open a trade on margin as long as your account balance is more than the margin required on all your open trades. If the required margin increases within a certain percentage of your account balance, you will get a margin call. If you then don't deposit more funds or close losing trades out, the broker will close all your trades. Note: Your account balance is the remaining funds you have left to open new trades with. I always use stop loss orders with all my open trades, and because of this my broker reduces the amount of margin required on each trade. This allows me to have more open trades at the one time without increasing my funds. Effects of a Losing Trade on Margin Say I have an account balance of $2,000 and open a long trade in a share CFD of 1,000 CFDs with a share price of $10 and margin of 10%. The face value of the shares would be $10,000, but my initial margin would be $1,000 (10% of $10,000). If I don't place a stop loss and the price falls to $9, I would have lost $1,000 and my remaining margin would now be $900 (10% of $9,000). So I would have $100 balance remaining in my account. I would probably receive a margin call to deposit more funds in or close out my trade. If I don't respond the broker will close out my position before my balance gets to $0. If instead I placed a stop loss at say $9.50, my initial margin might be reduced to $500. As the price drops to $9.60 I would have lost $400 and my remaining margin would now only be $100, with my account balance at $1,500. When the price drops to $9.50 I will get stopped out, my trade will be closed and I would have lost $500, with my account balance still at $1,500. Effects of a Winning Trade on Margin Say I have the same account balance as before and open the same trade but this time the price moves up. If I don't place a stop loss and the price goes up to $11, I would have made a $1,000 profit and my remaining margin will now be $1,100 (10% of $11,000). So my account balance would now be $2,000 + $1,000 - $1,100 = $1,900. If I had placed a stop loss at say $9.50 again and the price moves up to $10.50, I would have made a profit of $500 and my margin would now be $1,000. My account balance would be $2,000 + $500 - $1,000 = $1,500. However, if after the price went up to $10.50 I also moved my stop loss up to $10, then I would have $500 profit and only $500 margin. So my balance in this case would be $2,000 + $500 - $500 = $2,000. So by using stop losses as part of your risk management you can reduce the margin used from your balance which will allow you to open more trades without any extra funds deposited into your account.", "title": "" }, { "docid": "651f98220897b2a34830fade5ce229dc", "text": "\"Probably the most significant difference is the Damocles Sword hanging over your head, the Margin Call. In a nutshell, the lender (your broker) is going to require you to have a certain amount of assets in your account relative to your outstanding loan balance. The minimum ratio of liquid funds in the account to the loan is regulated in the US at 50% for the initial margin and 25% for maintenance margins. So here's where it gets sticky. If this ratio gets on the wrong side of the limits, the broker will force you to either add more assets/cash to your account t or immediately liquidate some of your holdings to remedy the situation. Assuming you don't have any/enough cash to fix the problem it can effectively force you to sell while your investments are in the tank and lock in a big loss. In fact, most margin agreements give the brokerage the right to sell your investments without your express consent in these situations. In this situation you might not even have the chance to pick which stock they sell. Source: Investopedia article, \"\"The Dreaded Margin Call\"\" Here's an example from the article: Let's say you purchase $20,000 worth of securities by borrowing $10,000 from your brokerage and paying $10,000 yourself. If the market value of the securities drops to $15,000, the equity in your account falls to $5,000 ($15,000 - $10,000 = $5,000). Assuming a maintenance requirement of 25%, you must have $3,750 in equity in your account (25% of $15,000 = $3,750). Thus, you're fine in this situation as the $5,000 worth of equity in your account is greater than the maintenance margin of $3,750. But let's assume the maintenance requirement of your brokerage is 40% instead of 25%. In this case, your equity of $5,000 is less than the maintenance margin of $6,000 (40% of $15,000 = $6,000). As a result, the brokerage may issue you a margin call. Read more: http://www.investopedia.com/university/margin/margin2.asp#ixzz1RUitwcYg\"", "title": "" }, { "docid": "8e59a5631dd56e3ef6ee6e5ed64fb044", "text": "There are several ways that the issuers profit from CFDs. If the broker has trades on both sides (buy and sell) they can net the volumes off against each other and profit off the spread whilst using the posted margins to cover p&l from both sides. Because settlement for most securities is not on the same day that the order is placed they can also buy the security with no intention of taking delivery and simply sell it off at the end of day to pass delivery on to someone else. Here again they profit from the spread and that their volumes give them really low commissions so their costs are much lower than the value of the spread. If they have to do this rather than netting the position out the spreads will be wider. Sometimes that may be forced to buy the security outright but that is rare and the spreads will be even wider so that they can make a decent profit.", "title": "" }, { "docid": "1e9cebde4465fbb20cb434e8b71958d4", "text": "First, a margin account is required to trade options. If you buy a put, you have the right to deliver 100 shares at a fixed price, 50 can be yours, 50, you'll buy at the market. If you sell a put, you are obligated to buy the shares if put to you. All options are for 100 shares, I am unaware of any partial contract for fewer shares. Not sure what you mean by leveraging the position, can you spell it out more clearly?", "title": "" }, { "docid": "37af8230459f9fd082a3253c53f9a72d", "text": "To calculate any daily return, all one need do is divide the final value by the initial value, subtract 1, and multiply by 100%: This can be applied to either the futures alone, the investments used as margin collateral alone, or all together. Margin collateral as a factor of a derivative's return Collateral can take many forms. Many suggest that cost and revenue for a derivative trade should also take into account margin requirements. This can become problematic. If a futures position moved against the trader, yet the margin was secured with equities at the maximum, and the equities moved with the trader, the futures trade could be interpreted as less of a loss because the collateral, which is probably totally disassociated with the futures position, increased in value. Then again, if a futures position moved with the trader, yet the margin collateral moved against the trader then taken together, the futures trade would look less profitable. Furthermore, most likely the result of a futures position and its collateral would never produce the same result, so extrapolation would become ever more difficult. For ease of analysis, a position's cost and revenue should be segmented from another unless if those positions are meant to hedge each other. Margin is not a cost, but it is a liability, so margin will affect the balance sheet of a futures trade but not its income statement, again unless if the collateral is also used to hedge such futures position.", "title": "" }, { "docid": "f1001e5e487558fbab42ce5422ceda4a", "text": "Assuming a USA taxable account: Withdrawing funds from a brokerage account has nothing to do with taxes. Taxes are owed on the profit when you sell a stock, no matter what you do with the funds. Taxes are owed on any dividends the stock produces, no matter what you do with the dividend. The brokerage sends you a form 1099 each year that shows the amounts of dividends and profits. You have to figure out the taxes from that.", "title": "" }, { "docid": "eeb25ea7287379faa5d9910b4341b927", "text": "The Margin Account holds the funds that are MUST for any margin trades. Any funds excess of the MUST for margin trades are kept in the SMA account. These funds can be used for further Margin trades in new securities [funds get transfered into the Margin Account]. They cannot be used to met the Shortfall due to margin calls on existing trades. New funds need to be arranged. More at http://en.wikipedia.org/wiki/Special_memorandum_account", "title": "" }, { "docid": "dc7555754acdc44099d4e3b5c47bde52", "text": "\"All discount brokers offer a commission structure that is based on the average kind of order that their target audience will make. Different brokers advertise to different target audiences. They could all have a lot lower commissions than they do. The maximum commission price for the order ticket is set at $99 by the industry securities regulators. When discount brokers came along and started offering $2 - $9.99 trades, it was simply because these new companies could be competitive in a place where incumbents were overcharging. The same exists with Robinhood. The market landscape and costs have changed over the last decade with regulation NMS, and other brokerage firms never needed to update drastically because they could continue making a lot on commissions with nobody questioning it. The conclusion being that other brokers can also charge a lot less, despite their other overhead costs. Robinhood, like other brokerage firms (and anyone else trading directly with the exchanges), are paid by the exchanges for adding liquidity. Not only are many trades placed with no commission for the broker, they actually earn money for placing the trade. If Robinhood was doing you any favors, they would be paying you. But nobody questions free commissions so they don't. Robinhood, like other brokerage firms, sells your trading data to the highest bidder. This is called \"\"payment for order flow\"\", these subscribers see your order on the internet in route to the exhange, and before your order gets to the exchange, the subscriber sends a different order to the exchange so they either get filled before you do (analogous to front running, but different enough to not be illegal) or they alter the price of the thing you wanted to buy or sell so that you have to get a worse price. These subscribers have faster computers and faster internet access than other market participants, so are able to do this so quickly. They are also burning a lot of venture capital like all startups. You shouldn't place too much faith in the idea they are making [enough] money. They also have plans to earn interest off of balances in a variety of ways and offer more options at a price (like margin accounts).\"", "title": "" }, { "docid": "f4b63602a7e10e49bc26cd8007252f9f", "text": "\"Margin trades let you post a margin of a certain proportion of the value of the trade as collateral against the price of a trade and pay off the difference between the current price and the price that you bought at. Any losses incurred are taken from the margin so the margin has to be maintained as prices change. In practice this means that when the price moves significantly from the buying price a \"\"margin call\"\" is triggered and the buyer has to increase their posted margin. The vast majority of the foreign exchange trades done every day are margin trades as (effectively) are all spread bets. Margins get reset overnight whether or not a call has occurred.\"", "title": "" }, { "docid": "f48f2f7e7684e11a35af00f9f7ed2509", "text": "\"Lending of shares happens in the background. Those who have lent them out are not aware that they have been lent out, nor when they are returned. The borrowers have to pay any dividends to the lenders and in the end the borrowers get their stock back. If you read the fine print on the account agreement for a margin account, you will see that you have given the brokerage the permission to silently loan your stocks out. Since the lending has no financial impact on your portfolio, there's no particular reason to know and no particular protection required. Actually, brokers typically don't bother going through the work of finding an actual stock to borrow. As long as lots of their customers have stocks to lend and not that many people have sold short, they just assume there is no problem and keep track of how many are long and short without designating which stocks are borrowed from whom. When a stock becomes hard to borrow because of liquidity issues or because many people are shorting it, the brokerage will actually start locating individual shares to borrow, which is a more time-consuming and costly procedure. Usually this involves the short seller actually talking to the broker on the phone rather than just clicking \"\"sell.\"\"\"", "title": "" }, { "docid": "ef05b1d48b952443d224558d3703b678", "text": "If you enter a futures contract, it costs nothing. So every time prices move against you, there is a margin call and you must put up some new money. Inverse ETF's use a variety of similar strategies to get their returns. Many of these strategies may indeed require a margin call to the ETF issuer if prices move against you. But remember the ETF did not cost nothing. Investors contributed money in order to purchase each share of the ETF. Therefore the ETF issuer has a big pot of money available for use as margin. That's why the margin call never comes through to you. In a sense, you posted a ton of margin up front, so you won't have to make any additional margin contributions. The money that will be used for margin calls is being kept in treasuries and money market securities by the ETF issuer until it's needed. If prices move against you badly enough that it looks like the ETF is at risk to not be able to post margin, the ETF would liquidate and you'd get whatever pittance was left after they exit all those positions.", "title": "" }, { "docid": "ec7d2ef1dff37af96aaffcddc92c658b", "text": "They make money off you by increasing the spread you buy and sell your stocks through them. So for example, if the normal spread for a stock was $10.00 for a buy and $10.02 for a sell, they might have a spread of $9.98 for the buy and $10.02 for the sell. So for an order of 1000 shares (approx. $10000) they would make $0.02 per share which would equal $20.00.", "title": "" }, { "docid": "a2d9898b05ac15bce7d63602f87d62aa", "text": "What I did not understand when I first called is that margin able account means the ability to borrow margin, but not the necessity of borrowing. Like I was saying, it is something I am going to do a lot of due diligence on before I plunge in. I have a general vague idea of futures, and thus why I was asking for info on the matter.", "title": "" }, { "docid": "de1c3721708671a47ab4ef8409f51c16", "text": "If the underlying is currently moving as aggressively as stated, the broker would immediately forcibly close positions to maintain margin. What securities are in fact closed depends upon the internal algorithms. If the equity in the account remains negative after closing all positions if necessary, the owner of the account shall owe the broker the balance. The broker will close the account and commence collections if the owner of the account does not pay the balance quickly. Sometimes, brokers will impose higher margin requirements than mandated to prevent the above eventuality. Brokers frequently close positions that violate internal or external margin requirements as soon as they are breached.", "title": "" } ]
fiqa
f8c467343596c165ceefbb936f6b5c7f
Difference between GOOGL and GOOG
[ { "docid": "f31bbdd1b3e85bccd652680e16935819", "text": "Source", "title": "" }, { "docid": "6812554ac6a6fe2c714ab6e6f19a657c", "text": "\"Note that these used to be a single \"\"common\"\" share that has \"\"split\"\" (actually a \"\"special dividend\"\" but effectively a split). If you owned one share of Google before the split, you had one share giving you X worth of equity in the company and 1 vote. After the split you have two shares giving you the same X worth of equity and 1 vote. In other words, zero change. Buy or sell either depending on how much you value the vote and how much you think others will pay (or not) for that vote in the future. As Google issues new shares, it'll likely issue more of the new non-voting shares meaning dilution of equity but not dilution of voting power. For most of us, our few votes count for nothing so evaluate this as you will. Google's founders believe they can do a better job running the company long-term when there are fewer pressures from outside holders who may have only short-term interests in mind. If you disagree, or if you are only interested in the short-term, you probably shouldn't be an owner of Google. As always, evaluate the facts for yourself, your situation, and your beliefs.\"", "title": "" } ]
[ { "docid": "152fce244abd89f2dcc01c6bee38b7e4", "text": "Not a whole lot of people. Google thinks that by acquiring Meebo and dozens of other companies in the social space, it is bound to eventually succeed in social. Like, maybe my melding meebo with google analytics with gchat they'll come up with something. This kind of thinking is very typical of internet companies. Instead of going strong in a single direction the company hedges its bets by going down 50 different strategy paths, because hey, coding is cheap. The problem arises when this attitude becomes ingrained in the company's culture and nobody is left to take bold steps in a single direction. Apple is different, it takes bold steps time and time again.", "title": "" }, { "docid": "368790e5eacbd6516fd0071c53808ddd", "text": "Google will be issuing Class C shares (under the ticker symbol GOOCV) to current GOOG holders in the beginning of April. The Class C shares and Class A shares will then change symbols, with the Class C shares trading under GOOG. This was announced on January 30th. Details are in this benzinga article: Projected Trading Timeline March 27 - April 2 Record Date - Payment Date Class C shares commence trading on March 27 as GOOCV on a when issued basis Class A shares continue to trade as GOOG, with entitlement to Class C shares Class A shares will also trade on an ex-distribution basis, without entitlement to the Class C shares, as GOOAV April 3 EX Date The ticker for the Class A shares will change from GOOG to GOOGL The ticker for the Class C shares will change from GOOCV to GOOG and commence regular way trading The ticker for the Class A shares that traded on an ex-distribution basis - GOOAV - will be suspended", "title": "" }, { "docid": "3a08bb56370e585519e8d9129bd431e3", "text": "\"The 3-letter tickers are from a different era.... Nowadays the usage of tickers is more of a \"\"legacy\"\" tradition rather than a current necessity. As such they're no longer limited to 3 characters. And the characters don't have to be related to the actual name. For example a company named Alphabet is trading on NASDAQ under the ticker \"\"GOOGL\"\". It has 5 characters, not 3, and (almost) none of them appear in the name of the company (used to, but not anymore).\"", "title": "" }, { "docid": "cf0c53ecb77b5733dd567e72ab185bf9", "text": "SECTION | CONTENT :--|:-- Title | Inside Gwyneth Paltrow’s GOOP Wellness Summit (HBO) Description | For years, Gwyneth Paltrow was the all-American movie star who everyone loved. Then she became the lifestyle maven who everyone loved to hate. In 2008, Paltrow founded Goop, a wellness empire that centers around beauty tips, being your best self, and having lots of disposable income. It’s not everyone’s cup of anti-oxidant tea. But there are now enough die-hard Goopers to fill the brand’s first-ever Wellness Summit. It sold out in weeks. And VICE News got a ticket. Subscribe to VICE News her... Length | 0:04:22 **** ^(I am a bot, this is an auto-generated reply | )^[Info](https://www.reddit.com/u/video_descriptionbot) ^| ^[Feedback](https://www.reddit.com/message/compose/?to=video_descriptionbot&amp;subject=Feedback) ^| ^(Reply STOP to opt out permanently)", "title": "" }, { "docid": "35124c3aee792df13fe3a69a181155f4", "text": "\"Here is where I am confused. On the income statement I am looking at it has a line item in cogs that is \"\"change in jobs in progress\"\". Change in JIP = (Starting raw materials, wip, and finished goods) - (Ending raw materials, wip, and finished goods) for the accounting period. From what I researched cost of goods manufactured is added to cogs: \"\"The formula for the cost of goods manufactured is the costs of: direct materials used + direct labor used + manufacturing overhead assigned = the manufacturing costs incurred in the current accounting period + beginning work-in-process inventory - ending work-in-process inventory. A manufacturer's cost of goods sold is computed by adding the finished goods inventory at the beginning of the period to the cost of goods manufactured and then subtracting the finished goods inventory at the end of the period.\"\" So it isnt wip that is in the income statement it is change in inventory. Why do they include the \"\"change of inventory\"\" in cogs? Wont this just be material and labor that should be in for the next accounting period cog calculation?\"", "title": "" }, { "docid": "e606f789dca0425270c4351a21c6ce39", "text": "you: &gt;Pleading ignorance, what is the difference between revenue and sales? me: &gt;[ignorance doesn't cut it in your case](http://lmgtfy.com/?q=sales+vs+revenue) Or does your ignorance include ignorance of hyperlinks too? Hint: click the link and use this problem solving approach in the future when you again encounter something you don't understand.", "title": "" }, { "docid": "766f0b7bc75111f5420516191bdb1f3a", "text": "\"&gt;The lawsuit was brought by a man named Chris Gillespie who had registered 763 domain names that included the word \"\"google.\"\" In response, Google claimed trademark infringement, and Gillespie was ultimately ordered to forfeit the domains. Gillespie then sued in a bid to invalidate the trademark. Wonder if their original aim was to cybersquat and/or hope Google would buy him out like [sometimes happens with domains](https://marketingland.com/google-apple-facebook-microsoft-among-major-brands-buying-sucks-domains-124248)\"", "title": "" }, { "docid": "fb60f1c81d5d9f3a858a3dbb56eb72af", "text": "Alphabet has about 40% on shore or 60%. I know it is 60/40 but forget which way. So way, way more than they really need. What Apple does is borrow against the offshore money when needed, Apple now has over $90b in debt and Google less than $4b. So Google would not have any problem.", "title": "" }, { "docid": "3cde1111cf12137e9c7dceb8a35a1032", "text": "They are intertwined, that recommendation part is huge for both Google and Amazon when it comes to shopping. I bet Amazon took a lot of money from by having this smart recommendation system, no need to google it. Before you had to search for each company to order their product. Amazon means less search for them. They might be in different business but it doesn't mean one isn't shadowing the other.", "title": "" }, { "docid": "fa970a01d8fcfeb7b9715f9c8918061d", "text": "Two big differences from the Digg days: 1) apps exist, meaning a large percentage of users will not even notice the redesign if they don't use the website. 2) Digg changed both functionality and design, but I believe reddit is only proposing to change design (so far).", "title": "" }, { "docid": "f0c3de5770d5b18630e0252630045f06", "text": "\"The difference it that the headline I suggested removes the editorialization of the news. It is one thing to not have space for all the info. It is another to edit your headline to alter the meaning of your point. Someone dismissing a headline because it lacks a source is one thing (and with the words \"\"survey\"\" you at least expect to find the source in the article). Someone walking away from a headline wrongly assuming that ALL of the CEO's in the US got at least a 27% raise last year is another. I mean, this is the HuffPo. They ALL CAPS at least one word in every headline that is an action as a not so subtle demand on what you should do.\"", "title": "" }, { "docid": "aef2f28047642a8139930f59019ac3a8", "text": "BlackHatGold is a forum for most webmasters and internet marketing experts know and follow all the latest Search Engine Optimization (SEO) techniques on the internet at BHG. Some of the topics discussed on BHG include but are not restricted to: If you want to know about black hat SEO, visit the blackhatseo forum.", "title": "" }, { "docid": "d9f08fc15393c1e8664baf7badbf7311", "text": "It looks like GOOG did not have a pre-market trade until 7:14 am ET, so Google Finance was still reporting the last trade it had, which was in the after-hours session yesterday. FB, on the other hand, was trading like crazy after-hours yesterday and pre-market today as it had an earnings report yesterday.", "title": "" }, { "docid": "85a55252527d24816a047802af3cb00c", "text": "Heard Teams was actually pretty good. I've used Slack and HipChat and both seemed fine for what they were. Random photos in HipChat were the best though not so productive (add on with keywords triggering Google Images I think?).", "title": "" }, { "docid": "3bf4513d6e76ed2e63e58c4b9760adbe", "text": "On NASDAQ the ^ is used to denote other securities and / to denote warrents for the underlying company. Yahoo maybe using some other designators for same.", "title": "" } ]
fiqa
9333a3bd8dac32bb3cab06159a37f2c5
Static and Dynamic, Major/Minor Support and Resistance in Stock Trading/Investing
[ { "docid": "c493fb91c3fe96b8b88a01980a0fe6df", "text": "Simply static support or resistance levels are ones that do not change with time. Two examples include horizontal lines and trend lines. Dynamic support or resistance levels are ones that change with time. A common example of a dynamic support/resistance are Moving Averages.", "title": "" } ]
[ { "docid": "1ba5771b421dece4053d420d9a0ce97a", "text": "A moving average will act as support or resistance to a stock only when the stock is trending. The way it acts as support for instance is similar to a trend-line. Take the daily chart of CBA over the last 6 months: The first chart shows CBA with an uptrend support line. The second chart shows CBA during the same period with 50 day EMA as a support. Both can be used as support for the uptrend. Generally you can used these types of support (or resistance in a downtrend) to determine when to buy a stock and when to sell a stock. If I was looking to buy CBA whilst it was uptrending, one strategy I could use was to wait until it hit or got very close to the support trend-line and then buy as it re-bounces back up. If I already held the stock I could use a break down below the uptrend support line as a stop to exit out of the stock.", "title": "" }, { "docid": "5551e1d6c53d78ac4f021ce3d5c4c4b4", "text": "I traded futures for a brief period in school using the BrokersXpress platform (now part of OptionsXpress, which is in turn now part of Charles Schwab). They had a virtual trading platform, and apparently still do, and it was excellent. Since my main account was enabled for futures, this carried over to the virtual account, so I could trade a whole range of futures, options, stocks, etc. I spoke with OptionsXpress, and you don't need to fund your acount to use the virtual trading platform. However, they will cancel your account after an arbitrary period of time if you don't log in every few days. According to their customer service, there is no inactivity fee on your main account if you don't fund it and make no trades. I also used Stock-Trak for a class and despite finding the occasional bug or website performance issue, it provided a good experience. I received a discount because I used it through an educational institution, and customer service was quite good (probably for the same reason), but I don't know if those same benefits would apply to an individual signing up for it. I signed up for top10traders about seven years ago when I was in secondary school, and it's completely free. Unfortunately, you get what you pay for, and the interface was poorly designed and slow. Furthermore, at that time, there were no restrictions that limited the number of shares you could buy to the number of outstanding shares, so you could buy as many as you could afford, even if you exceeded the number that physically existed. While this isn't an issue for large companies, it meant you could earn a killing trading highly illiquid pink sheet stocks because you could purchase billions of shares of companies with only a few thousand shares actually outstanding. I don't know if these issues have been corrected or not, but at the time, I and several other users took advantage of these oversights to rack up hundreds of trillions of dollars in a matter of days, so if you want a realistic simulation, this isn't it. Investopedia also has a stock simulator that I've heard positive things about, although I haven't used it personally.", "title": "" }, { "docid": "0da566a2cdaad2c8b83676062a6e257f", "text": "\"Can you give me a rundown of what I'm seeing? Is this basically a super zoomed in tracker of a current stock or something? Where a stock fluctuates a few cents up/down on the day, and you just trade before it goes down, then trade as it goes up or what? EDIT: Is this really live? Can you say, \"\"Yes this is live narwalls\"\"\"", "title": "" }, { "docid": "0c48d049ed845f825d8950f5148cdde8", "text": "It's a drive by swipe at technicals, which is fine and all, but I always thought technicals effectively provide odds of an event happening. For example, $XYZ price is a support level, therefore there are increased odds it will bounce higher from these levels, rather than an implied *guarantee* the support will hold.", "title": "" }, { "docid": "5c291b45326bdd1bed1fdb57f3537c81", "text": "\"Stock support and resistance levels mean that historically, there was \"\"heavy\"\" buying/selling at those levels. This suggests, but does not guarantee, that \"\"someone\"\" will buy at \"\"support\"\" levels, and \"\"someone\"\" will sell at \"\"resistance levels. Any \"\"history\"\" is meaningful, but most analysts will say that after six months to a year, the impact of events declines the further back in time you go. They can be meaningful for periods as short as days.\"", "title": "" }, { "docid": "34496eab57952e94977ad49daae7fb34", "text": "I doubt that this exists, but it could theoretically. After all, a share is kind of an option to a company's future success, and so a call is already a second level on indirection. The better approach would be to 'create your own Put-Puts', by investing less money (A) in the Put you wanted to invest into, and put the smaller rest (B) in the share itself or a Call. That way, if the original Put is successful, at max (B) is lost, and if it is unsuccessful, the loss on (A) is covered by a gain on (B). Potentially, if you do the math, you can reach a mathematical equivalent situation to a Put-Put by buying the right amount and kind of Calls. However, we know already that buying a Put and a Call is a poor strategy, so that would mean a Put-Put would also be a poor strategy.", "title": "" }, { "docid": "c28eb69add00010b45511f54bf8ebe0e", "text": "\"Maria, there are a few questions I think you must consider when considering this problem. Do fundamental or technical strategies provide meaningful information? Are the signals they produce actionable? In my experience, and many quantitative traders will probably say similar things, technical analysis is unlikely to provide anything meaningful. Of course you may find phenomena when looking back on data and a particular indicator, but this is often after the fact. One cannot action-ably trade these observations. On the other hand, it does seem that fundamentals can play a crucial role in the overall (typically long run) dynamics of stock movement. Here are two examples, Technical: suppose we follow stock X and buy every time the price crosses above the 30 day moving average. There is one obvious issue with this strategy - why does this signal have significance? If the method is designed arbitrarily then the answer is that it does not have significance. Moreover, much of the research supports that stocks move close to a geometric brownian motion with jumps. This supports the implication that the system is meaningless - if the probability of up or down is always close to 50/50 then why would an average based on the price be predictive? Fundamental: Suppose we buy stocks with the best P/E ratios (defined by some cutoff). This makes sense from a logical perspective and may have some long run merit. However, there is always a chance that an internal blowup or some macro event creates a large loss. A blended approach: for sake of balance perhaps we consider fundamentals as a good long-term indication of growth (what quants might call drift). We then restrict ourselves to equities in a particular index - say the S&P500. We compare the growth of these stocks vs. their P/E ratios and possibly do some regression. A natural strategy would be to sell those which have exceeded the expected return given the P/E ratio and buy those which have underperformed. Since all equities we are considering are in the same index, they are most likely somewhat correlated (especially when traded in baskets). If we sell 10 equities that are deemed \"\"too high\"\" and buy 10 which are \"\"too low\"\" we will be taking a neutral position and betting on convergence of the spread to the market average growth. We have this constructed a hedged position using a fundamental metric (and some helpful statistics). This method can be categorized as a type of index arbitrage and is done (roughly) in a similar fashion. If you dig through some data (yahoo finance is great) over the past 5 years on just the S&P500 I'm sure you'll find plenty of signals (and perhaps profitable if you calibrate with specific numbers). Sorry for the long and rambling style but I wanted to hit a few key points and show a clever methods of using fundamentals.\"", "title": "" }, { "docid": "0f9967fe9ae5e3501cb548dd4fa739dd", "text": "What does it mean when some one says that today there was a lot of net selling or buying in a stock. What does it mean because for every selling there is also a buying going on then how can you determine a selling or buying ? Generally if the price of stock has gone down compared to previous day, the trend is of selling. As the price can be volatile, there maybe few trades that are above close price of previous day, or below close price of previous day. How can you calculate average trade price for a stock It is simple {sum of all [price*quantity]}/quantity. Related question Equity market inflow meaning", "title": "" }, { "docid": "57cc72325f692606cefed8455ea59b62", "text": "You will lose out on your spread, you always pay a spread. Also, if you are looking at a strategy for using stop losses, try taking into account the support lines if you are going long. So, if the stock is on an upward trend but is dropping back from profit taking, your best best is to take a position closest to the next support line. You place your stop just below the support. this will give you the best chance of a winning position as most technical analysts will have looking towards the support as a buy back area. Obviously, in a bear market the opposite is true. If you have taken your position and the market move past the first resistance line, then bring your stop to just below that line as once resistance is broken, it then becomes support. You then have a profitable position with profit locked in. Leave the position to break the next resistance and repeat.", "title": "" }, { "docid": "d7818ae9d9068f5953344459e340be74", "text": "\"In a way yes but I doubt you'd want that. A \"\"Stop-Limit\"\" order has both stop and limit components to it but I doubt this gives you what you want. In your example, if the stock falls to $1/share then the limit order of $3/share would be triggered but this isn't quite what I'd think you'd want to see. I'd suggest considering having 2 orders: A stop order to limit losses and a limit order to sell that are separate rather than fusing them together that likely isn't going to work.\"", "title": "" }, { "docid": "6a54e644b5544df0d9b26eb811dd81af", "text": "You can't tell for sure. If there was such a technique then everyone would use it and the price would instantly change to reflect the future price value. However, trade volume does say something. If you have a lemonade stand and offer a large glass of ice cold lemonade for 1c on a hot summer day I'm pretty sure you'll have high trading volume. If you offer it for $5000 the trading volume is going to be around zero. Since the supply of lemonade is presumably limited at some point dropping the price further isn't going to increase the number of transactions. Trade volumes reflect to some degree the difference of valuations between buyers and sellers and the supply and demand. It's another piece of information that you can try looking at and interpreting. If you can be more successful at this than the majority of others on the market (not very likely) you may get a small edge. I'm willing to bet that high frequency trading algorithms factor volume into their trading decisions among multiple other factors.", "title": "" }, { "docid": "64b54d4e4ecc2bbf9acb2240ed62c300", "text": "Large volume just means a lot of market participants believe they know where the stock price will be (after some amount of time). The fact that the price is not moving just means that about 50% of those really confident traders think the stock will be moving up, and about 50% of those really confident traders think the stock will be moving down.", "title": "" }, { "docid": "557de771f5d36064911e7a767f197b57", "text": "\"In US public stock markets there is no difference between the actions individual retail traders are \"\"permitted\"\" to take and the actions institutional/corporate traders are \"\"permitted\"\" to take. The only difference is the cost of those actions. For example, if you become a Registered Market Maker on, say, the BATS stock exchange, you'll get some amazing rebates and reduced transaction prices; however, in order to qualify for Registered Market Maker status you have to maintain constant orders in the book for hundreds of equities at significant volumes. An individual retail trader is certainly permitted to do that, but it's probably too expensive. Algorithmic trading is not the same as automated trading (algorithmic trading can be non-automated, and automated trading can be non-algorithmic), and both can be anywhere from low- to high-frequency. A low-frequency automated strategy is essentially indistinguishable from a person clicking their mouse several times per day, so: no, from a legal or regulatory perspective there is no special procedure an individual retail trader has to follow before s/he can automate a trading strategy. (Your broker, on the other hand, may have all sorts of hoops for you to jump through in order to use their automation platform.) Last (but certainly not least) you will almost certainly lose money hand over fist attempting bid-ask scalping as an individual retail trader, whether your approach is algorithmic or not, automated or not. Why? Because the only way to succeed at bid-ask scalping is to (a) always be at/near the front of the queue when a price change occurs in your favor, and (b) always cancel your resting orders before they are executed when a price change occurs against you. Unless your algorithms are smarter than every other algorithm in the industry, an individual retail trader operating through a broker's trading platform cannot react quickly enough to succeed at either of those. You would have to eschew the broker and buy direct market access to even have a chance, and that's the point at which you're no longer a retail trader. Good luck!\"", "title": "" }, { "docid": "7bbfa7d7bbe88354359e0a432ac667b2", "text": "Trading is NOT zero-sum game, it is negative sum actually. In fact all people's money is getting swept by commissions and fees. If you don't have The Plan (which includes minimizing commission losses), you win some (not a lot), then you get big positions, then market crashes, then all your money is gone. You will start noticing that commissions are real, only when you get market crash. Prey that you get heavy losses (-10% of portfolio) before some (giant) market crash. Getting good lesson by small price is better then high price (-30..50%). Piece of advice. There is small exchanges that do NOT charge you for operations, taking only market spread ($0.01) as commission. They do so because they do not have big population and they trade mostly by using automatic market-makers (which means there is no way to buy 10% of Apple there).", "title": "" }, { "docid": "efd524a48659c49c9949fa0c942f32ad", "text": "My interpretation of that sentence is that you can't do the buying/selling of shares outright (sans margin) because of the massive quantity of shares he's talking about. So you have to use margin to buy the stocks. However, because in order to make significant money with this sort of strategy you probably need to be working dozens of stocks at the same time, you need to be familiar with portfolio margin. Since your broker does not calculate margin calls based on individual stocks, but rather on the value of your whole portfolio, you should have experience handling margin not just on individual stock movements but also on overall portfolio movements. For example, if 10% (by value) of the stocks you're targeting tend to have a correlation of -0.8 with the price of oil you should probably target another 10% (by value) in stocks that tend to have a correlation of +0.8 with the price of oil. And so on and so forth. That way your portfolio can weather big (or even small) changes in market conditions that would cause a margin call on a novice investor's portfolio.", "title": "" } ]
fiqa
e0c44929518f26d36657d0212eb2c7ae
What's best investment option? Mutual fund or Property [duplicate]
[ { "docid": "d41d8cd98f00b204e9800998ecf8427e", "text": "", "title": "" } ]
[ { "docid": "3fcd316ac05b8ae0bdeabc00453d5ab6", "text": "Wow, hard to believe not a single answer mentioned investing in one of the best asset classes for tax purposes...real estate. Now, I'm not advising you to rush out and buy an investment property. But rather than just dumping your money into mutual funds...over which you have almost 0 control...buy some books on real estate investing. There are plenty of areas to get into, rehabs, single family housing rentals, multifamily, apartments, mobile home parks...and even some of those can have their own specialties. Learn now! And yes, you do have some control over real estate...you control where you buy, so you pick your local market...you can always force appreciation by rehabbing...if you rent, you approve your renters. Compared to a mutual fund run by someone you'll never meet, buying stocks in companies you've likely never even heard of...you have far more control. No matter what area of investing you decide to go into, there is a learning curve...or you will pay a penalty. Go slow, but move forward. Also, all the advice on using your employer's matching (if available) for 401k should be the easiest first step. How do you turn down free money? Besides, the bottom line on your paycheck may not change as much as you think it might...and when weighed against what you get in return...well worth the time to get it setup and active.", "title": "" }, { "docid": "c8f2662558e3f11e38774e226cba0f1b", "text": "If you are looking to invest for 1-2 years I would suggest you not invest in mutual funds at all. Your time horizon is too short for it to be smart to invest in the stock market. I'd suggest a high-yield savings account or CD. I know they both have crappy returns, but the stock market can swing wildly with no notice. If you are ready to buy your house and the market is down 50% (it has happened multiple times in history) are you going to have to put off buying your home for an indefinite amount of time waiting to them to recover? If you are absolutely committed to investing in a mutual fund anyway against my advise I'd suggest an indexed fund that contains mostly blue chip stocks (indexed against the DOW).", "title": "" }, { "docid": "dc7aaf97583f7dde2cd3cbf4ba990d91", "text": "I'd suggest taking all the money you have saved up and putting in a mutual fund and hold off on buying a rental property until you can buy it outright. I know it seems like this will take forever, but it has a HUGE advantage: I know it seems like it will take forever to save up the money to buy a property for cash, but in the long run, its the best option by far.", "title": "" }, { "docid": "a0e05e8086085091d8d3e5c8e254edcf", "text": "As stated in the comments, Index Funds are the way to go. Stocks have the best return on investment, if you can stomach the volatility, and the diversification index funds bring you is unbeatable, while keeping costs low. You don't need an Individual Savings Account (UK), 401(k) (US) or similar, though they would be helpful to boost investment performance. These are tax advantaged accounts; without them you will have to pay taxes on your investment gains. However, there's still a lot to gain from investing, specially if the alternative is to place them in the vault or similar. Bear in mind that inflation makes your money shrink in real terms. Even a small interest is better than no interest. By best I mean that is safe (regulated by the financial authorities, so your money is safe and insured up to a certain amount) and has reasonable fees (keeping costs low is a must in any scenario). The two main concerns when designing your portfolio are diversification and low TER (Total Expense Ratio). As when we chose broker, our concern is to be as safe as we possibly can (diversification helps with this) and to keep costs at the bare minimum. Some issues might restrict your election or make others seem better. Depending on the country you live and the one of the fund, you might have to pay more taxes on gains/dividends. e.g. The US keeps some of them if your country doesn't have a special treaty with them. Look for W-8Ben and tax withholding for more information. Vanguard and Blackrock offer nice index funds. Morningstar might be a good place for gathering information. Don't trust blindly the 'rating'. Some values are 'not rated' and kick ass the 4 star ones. Again: seek low TER. Not a big fan of this point, but I'm bound to mention it. It can be actually helpful for sorting out tax related issues, which might decide the kind of index fund you pick, and if you find this topic somewhat daunting. You start with a good chunk of money, so it might make even more sense in your scenario to hire someone knowledgeable and trustworthy. I hope this helps to get you started. Best of luck.", "title": "" }, { "docid": "a13a5183fa18ad97d0487ffeb6827fd9", "text": "\"is it worth it? You state the average yield on a stock as 2-3%, but seem to have come up with this by looking at the yield of an S&P500 index. Not every stock in that index is paying a dividend and many of them that are paying have such a low yield that a dividend investor would not even consider them. Unless you plan to buy the index itself, you are distorting the possible income by averaging in all these \"\"duds\"\". You are also assuming your income is directly proportional to the amount of yield you could buy right now. But that's a false measure because you are talking about building up your investment by contributing $2k-$3k/month. No matter what asset you choose to invest in, it's going to take some time to build up to asset(s) producing $20k/year income at that rate. Investments today will have time in market to grow in multiple ways. Given you have some time, immediate yield is not what you should be measuring dividends, or other investments, on in my opinion. Income investors usually focus on YOC (Yield On Cost), a measure of income to be received this year based on the purchase price of the asset producing that income. If you do go with dividend investing AND your investments grow the dividends themselves on a regular basis, it's not unheard of for YOC to be north of 6% in 10 years. The same can be true of rental property given that rents can rise. Achieving that with dividends has alot to do with picking the right companies, but you've said you are not opposed to working hard to invest correctly, so I assume researching and teaching yourself how to lower the risk of picking the wrong companies isn't something you'd be opposed to. I know more about dividend growth investing than I do property investing, so I can only provide an example of a dividend growth entry strategy: Many dividend growth investors have goals of not entering a new position unless the current yield is over 3%, and only then when the company has a long, consistent, track record of growing EPS and dividends at a good rate, a low debt/cashflow ratio to reduce risk of dividend cuts, and a good moat to preserve competitiveness of the company relative to its peers. (Amongst many other possible measures.) They then buy only on dips, or downtrends, where the price causes a higher yield and lower than normal P/E at the same time that they have faith that they've valued the company correctly for a 3+ year, or longer, hold time. There are those who self-report that they've managed to build up a $20k+ dividend payment portfolio in less than 10 years. Check out Dividend Growth Investor's blog for an example. There's a whole world of Dividend Growth Investing strategies and writings out there and the commenters on his blog will lead to links for many of them. I want to point out that income is not just for those who are old. Some people planned, and have achieved, the ability to retire young purely because they've built up an income portfolio that covers their expenses. Assuming you want that, the question is whether stock assets that pay dividends is the type of investment process that resonates with you, or if something else fits you better. I believe the OP says they'd prefer long hold times, with few activities once the investment decisions are made, and isn't dissuaded by significant work to identify his investments. Both real estate and stocks fit the latter, but the subtypes of dividend growth stocks and hands-off property investing (which I assume means paying for a property manager) are a better fit for the former. In my opinion, the biggest additional factor differentiating these two is liquidity concerns. Post-tax stock accounts are going to be much easier to turn into emergency cash than a real estate portfolio. Whether that's an important factor depends on personal situation though.\"", "title": "" }, { "docid": "2092de231921b7cbdaa3f22aa65f657c", "text": "My equities portfolio breaks down like this: (I'm 26 years old, so it is quite aggressive) Additionally, I have a portfolio of direct real estate investments I have made over the past 4 years. I invested very aggressively into real estate due to the financial crisis. As a result of my aggressive investing & strong growth in real estate, my overall asset breakdown is quite out of balance. (~80% Real Estate, ~20% Equities) I will be bringing this into a more sensible balance over the next few years as I unwind some of my real estate investments & reinvest the proceeds into other asset classes. As for the alternative asset groups you mentioned, I looked quite seriously at Peer to Peer lending a few years back. (Lending Club) However, interest rates were quite low & I felt that Real Estate was a better asset class to be in at the time. Furthermore, I was borrowing heavily to fund real estate purchases at the time, and I felt it didn't make much sense to be lending cash & borrowing at the same time. I needed every dime I could get a hold of. :) I will give it another look once rates come back up. I've shied away from investing in things like actively managed mutual funds, hedge funds, etc ... not because I don't think good managers can get superior returns ... rather, in my humble opinion, if they DO get above average returns then they simply charge higher management fees to reflect their good performance. Hope this helps!", "title": "" }, { "docid": "a0cd7730d095a4ebac6e95aabb354f31", "text": "Buying a property and renting it out can be a good investment if it matches your long term goals. Buying an investment property is a long term investment. A large chunk of your money will be tied up with the property and difficult to access. If you put your money into dividend producing stocks you can always sell the stock and have your money back in a matter of days this is not so with a property. (But you can always do a Home equity line of credit (HELOC)) I would also like to point out landlording is not a passive endeavor as JohnFx stated dealing with a tenant can be a lot of work. This is not work you necessarily have to deal with, it is possible to contract with a property management company that would place tenants and take care of those late night calls. Property management companies often charge 10% of your monthly rent and will eat a large portion of your profits. It could be worth the time and headache of tenant relations. You should build property management into you expenses anyway in case you decide to go that route in the future. There are good things about owning an investment property. It can produce returns in a couple of ways. If you choose this route it can be lucrative but be sure to do your homework. You must know the area you are investing very well. Know the rent, and vacancy rates for Single family homes, look at multifamily homes as a way of mitigating risk(if one unit is vacant the others are still paying).", "title": "" }, { "docid": "667f5ee83a6fccf6901ac2c01fee122a", "text": "I see a couple of reasons why you could consider choosing a mutual fund over an ETF In some cases index mutual funds can be a cheaper alternative to ETFs. In the UK where I am based, Fidelity is offering a management fee of 0.07% on its FTSE All shares tracker. Last time I checked, no ETF was beating that There are quite a few cost you have to foot when dealing ETFs In some cases, when dealing for relatively small amounts (e.g. a monthly investment plan) you can get a better deal, if your broker has negotiated discounts for you with a fund provider. My broker asks £12.5 when dealing in shares (£1.5 for the regular investment plan) whereas he asks £0 when dealing in funds and I get a 100% discount on the initial charge of the fund. As a conclusion, I would suggest you look at the all-in costs over total investment period you are considering for the exact amount you are planning to invest. Despite all the hype, ETFs are not always the cheapest alternative.", "title": "" }, { "docid": "a58fc7dbe14f82ac3d2856a08f1a856f", "text": "\"Forget, for the moment, which will pay off most over the long term. Consider risk exposure. You've said that you (hypothetically) have \"\"little or no money\"\": that's the deal-breaker. From a risk-management perspective, your investment portfolio would be better off diversified than with 90% of your assets in a house. Consider also the nature of the risk which owning a house exposes you to: Housing prices are generally tied to the state of the economy. If the local economy crashes, not only could you lose your job, but you could lose a good part of the value of your house... and still owe a lot on your loan. (You also might not be able to move as easily if you found a new job somewhere else.) You should almost certainly rent until you're more financially stable and could afford to pay the new mortgage for a year (or more) if you suddenly lost your job. Then you can worry more about maximizing your investments' rate of return.\"", "title": "" }, { "docid": "3bcc297d2ceaa81a2066b4adbf028eab", "text": "\"Other individuals answered how owning an REIT compares to an individual real estate investment, but did not answer your second question as readily, \"\"are REITs a good option to generate passive income for awhile?\"\". The \"\"awhile\"\" part is quite important in answering this question. If your intentions are to invest for a relatively short time period (say, 7 years or less), it may be especially advantageous to invest in a REIT. The foremost advantage comes from significantly lower transaction fees (stock/ETF trades are practically/potentially free today) compared to purchasing real estate, which involves inspection+titling fees/taxes/broker fees, which in a round-trip transaction (purchase and sale) would come to ~10%. The secondary advantage to owning a REIT is they are much more liquid than a property. If you wanted to sell your investment at a given point in time, you can easily log into your brokerage and execute your transaction, while liquidating an investment property will take time on market/potentially tossing tenants/fixing up place, etc. On the other hand, illiquid investments have generally yielded higher historical returns according to past research.\"", "title": "" }, { "docid": "f9e8f42cad8fe877bf8d85961940ffd8", "text": "The big question is whether you will be flexible about when you'll get that house. The overall best investment (in terms of yielding a good risk/return ratio and requiring little effort) is a broad index fund (mutual or ETF), especially if you're contributing continuously and thereby take advantage of cost averaging. But the downside is that you have some volatility: during an economic downturn, your investment may be worth only half of what it's worth when the economy is booming. And of course it's very bad to have that happening just when you want to get your house. Then again, chances are that house prices will also go down in such times. If you want to avoid ever having to see the value of your investment go down, then you're pretty much stuck with things like your high-interest savings account (which sounds like a very good fit for your requirements.", "title": "" }, { "docid": "b906cdacb29255d729eb9ce051426cc4", "text": "\"Consider property taxes (school, municipal, county, etc.) summing to 10% of the property value. So each year, another .02N is removed. Assume the property value rises with inflation. Allow for a 5% after inflation return on a 70/30 stock bond mix for N. After inflation return. Let's assume a 20% rate. And let's bump the .05N after inflation to .07N before inflation. Inflation is still taxable. Result Drop in value of investment funds due to purchase. Return after inflation. After-inflation return minus property taxes. Taxes are on the return including inflation, so we'll assume .06N and a 20% rate (may be lower than that, but better safe than sorry). Amount left. If no property, you would have .036N to live on after taxes. But with the property, that drops to .008N. Given the constraints of the problem, .008N could be anywhere from $8k to $80k. So if we ignore housing, can you live on $8k a year? If so, then no problem. If not, then you need to constrain N more or make do with less house. On the bright side, you don't have to pay rent out of the .008N. You still need housing out of the .036N without the house. These formulas should be considered examples. I don't know how much your property taxes might be. Nor do I know how much you'll pay in taxes. Heck, I don't know that you'll average a 5% return after inflation. You may have to put some of the money into cash equivalents with negligible return. But this should allow you to research more what your situation really is. If we set returns to 3.5% after inflation and 2.4% after inflation and taxes, that changes the numbers slightly but importantly. The \"\"no house\"\" number becomes .024N. The \"\"with house\"\" number becomes So that's $24,000 (which needs to include rent) versus -$800 (no rent needed). There is not enough money in that plan to have any remainder to live on in the \"\"with house\"\" option. Given the constraints for N and these assumptions about returns, you would be $800 to $8000 short every year. This continues to assume that property taxes are 10% of the property value annually. Lower property taxes would of course make this better. Higher property taxes would be even less feasible. When comparing to people with homes, remember the option of selling the home. If you sell your .2N home for .2N and buy a .08N condo instead, that's not just .12N more that is invested. You'll also have less tied up with property taxes. It's a lot easier to live on $20k than $8k. Or do a reverse mortgage where the lender pays the property taxes. You'll get some more savings up front, have a place to live while you're alive, and save money annually. There are options with a house that you don't have without one.\"", "title": "" }, { "docid": "7bd8572aed467d1f9e285837d5171f92", "text": "You could use a stock-only ISA and invest in Exchange Traded Funds (ETFs). ETFs are managed mutual funds that trade on open exchanges in the same manner as stocks. This changes the specific fund options you have open to you, but there are so many ETFs at this point that any sector you want to invest in is almost certainly represented.", "title": "" }, { "docid": "de2f8020f2afe5a02fa537ebb9f85250", "text": "\"To be completely honest, I think that a target of 10-15% is very high and if there were an easy way to attain it, everyone would do it. If you want to have such a high return, you'll always have the risk of losing the same amount of money. Option 1 I personally think that you can make the highest return if you invest in real estate, and actively manage your property(s). If you do this well with short term rental and/or Airbnb I think you can make healthy returns BUT it will cost a lot of time and effort which may diminish its appeal. Think about talking to your estate agent to find renters, or always ensuring your AirBnB place is in good nick so you get a high rating and keep getting good customers. If you're looking for \"\"passive\"\" income, I don't think this is a good choice. Also make sure you take note of karancan's point of costs. No matter what you plan for, your costs will always be higher than you think. Think about water damage, a tenant that breaks things/doesn't take care of stuff etc. Option 2 I think taking a loan is unnecessarily risky if you're in good financial shape (as it seems), unless you're gonna buy a house with a mortgage and live in it. Option 3 I think your best option is to buy bonds and shares. You can follow karancan's 100 minus your age rule, which seems very reasonable (personally I invest all my money in shares because that's how my father brought me up, but it's really a matter of taste. Both can be risky though bonds are usually safer). I think I should note that you cannot expect a return of 10% or more because, as everyone always says, if there were a way to guarantee it, everyone would do it. You say you don't have any idea how this works so I'd go to my bank and ask them. You probably have access to private banking so that should mean someone will be able to sit you down and talk you through. Also look at other banks that have better rates and/or pretend you're leaving your bank to negotiate a better deal. If I were you I'd invest in blue chips (big international companies listed on the main indeces (DAX, FTSE 100, Dow Jones)), or (passively managed) mutual funds/ETFs that track these indeces. Just remember to diversify by country and industry a bit. Note: i would not buy the vehicles/plans that my bank (no matter what they promise, and they promise a lot) suggest because if you do that then the bank always takes a cut off your money. TlDr, dont expect to make 10-15% on a passive investment and do what a lot of others do: shares and bonds. Also make sure you get a lot of peoples opinions :)\"", "title": "" }, { "docid": "b2c9d55800920d12987fec8518dbba0a", "text": "\"That depends, really. Generally speaking, though - Roth IRAs are THE PLACE for Stock-Market/Mutual-Fund investing. All the off the wall (or, not so off the wall) things like Real Estate investments, or buying up gold, or whatever other ideas you hear from people - they may be good or bad or whatnot. But your Roth IRA is maybe not the best place for that sort of thing. The whole philosophy behind IRAs is to deliberately set aside money for the future. Anything reasonable will work for this. Explore interesting investment ideas with today's money, not tomorrow's money. That being said - at your age I would go for the riskier options within what's available. If I were in your situation (and I have been, recently), I would lean toward low-fee mutual funds classified as \"\"Growth\"\" funds. My own personal opinion (THIS IS NOT ADVICE) is that Small Cap International funds are the place to be for young folks. That's a generalized opinion based on my feel for the world, but I don't think I'm personally competent to start making specific stock picks. So, mutual funds makes sense to me in that I can select the fund that generally aligns with my sense of things, and assume that their managers will make reasonably sound decisions within that framework. Of course that assumption has to be backed up with reputation of the specific MF company and the comparative performance of the fund relative to other funds in the same sector. As to the generalized question (how else can you work toward financial stability and independence), outside of your Roth IRA: find ways to boost your earning potential over time, and buy a house before the next bubble (within the next 18 months, I'm GUESSING).\"", "title": "" } ]
fiqa
c7dfae4d0383f10744d0834c25f4cd20
Are there any caveats to withdrawing funds from brokerage?
[ { "docid": "f1001e5e487558fbab42ce5422ceda4a", "text": "Assuming a USA taxable account: Withdrawing funds from a brokerage account has nothing to do with taxes. Taxes are owed on the profit when you sell a stock, no matter what you do with the funds. Taxes are owed on any dividends the stock produces, no matter what you do with the dividend. The brokerage sends you a form 1099 each year that shows the amounts of dividends and profits. You have to figure out the taxes from that.", "title": "" }, { "docid": "d41d8cd98f00b204e9800998ecf8427e", "text": "", "title": "" } ]
[ { "docid": "daccd8ca0d17624588d8df91bea8c332", "text": "One advantage not pointed out yet is that closed-end funds typically trade on stock exchanges, whereas mutual funds do not. This makes closed-end funds more accessible to some investors. I'm a Canadian, and this particular distinction matters to me. With my regular brokerage account, I can buy U.S. closed-end funds that trade on a stock exchange, but I cannot buy U.S. mutual funds, at least not without the added difficulty of somehow opening a brokerage account outside of my country.", "title": "" }, { "docid": "620dadd69f63a02ed5ff14e985f37356", "text": "There is little difference between buying shares in your broker's index fund and shares of their corresponding ETF. In many cases the money invested in an ETF gets essentially stuffed right into the index fund (I believe Vanguard does this, for example). In either case you will be paying a little bit of tax. In the ETF case it will be on the dividends that are paid out. In the index fund case it will additionally be on the capital gains that have been realized within the fund, which are very few for an index fund. Not a ton in either case. The more important tax consideration is between purchase and sale, which is the same in either case. I'd say stick it wherever the lowest fees are.", "title": "" }, { "docid": "eee85617d9f7703bd2ff2ab36fa2e38a", "text": "Unless you are a client with boatloads of money, I don't think service like you are asking about is very common. And I kind of assume that if you did have the boatloads of money, you would already have had such a relationship with a brokerage or accountant or similar financial professional. When I have taken money from brokerage accounts, I have had to call them to ask for it or requested it online. For both, the only option was to receive a check in the mail made out to the account holder (me). This usually takes about a week, although that does include waiting for the funds to settle after a stock sale which itself is about 3 business days. I know a lot of brokerages do have banks affiliated with them and one of the benefits of having a bank account with that affiliated bank is quicker transfers in and out of your bank account. But if you aren't willing to do that, I don't think you have many other choices other than receive a check in the mail.", "title": "" }, { "docid": "b8fded8029447d6371ae0dc5bccd7432", "text": "Withdrawals from a traditional 401(k) plan are always treated as cash income and the taxable portion is taxed at ordinary income tax rates, even if the money was held in stocks within the 401(k) plan and the amount withdrawn is equal to whatever capital gains you made by selling the stock within the 401(k) plan. If your plan permits you to take the distribution as stock shares (transferred to your taxable brokerage account), then, for tax purposes, it is treated as if you took a distribution of cash equal to the market price of the shares as of the day of the distribution and promptly bought the same number of shares in your brokerage account. And yes, if the 401(k) plan assets in your ex-employer's plan consists solely of pretax contributions and the earnings thereon, then the entire distribution is ordinary taxable income regardless of whether you sold the stock within the 401(k) plan or took a distribution of stock from the plan and promptly (or after a few days) sold it. The capital gains or losses (if any) from such a sale are, of course, outside the 401(k) plan and taxable accordingly. Finally, the 10% penalty for premature withdrawal from a traditional 401(k) will also apply if you are not 59.5 years of age or older (or maybe 55 since you are separated from service), and it will be computed on the entire distribution.", "title": "" }, { "docid": "beed71391be81e99b6336575872a510f", "text": "Magazines like SmartMoney often have an annual issue that reviews brokers. One broker may have a wider variety of no-fee mutual funds, and if that's your priority, then the stock commissions may be a moot issue for you. In general, you can't go wrong with a Fidelity or Schwab, and to choose investments within the accounts with an eye toward low expenses.", "title": "" }, { "docid": "5551e1d6c53d78ac4f021ce3d5c4c4b4", "text": "I traded futures for a brief period in school using the BrokersXpress platform (now part of OptionsXpress, which is in turn now part of Charles Schwab). They had a virtual trading platform, and apparently still do, and it was excellent. Since my main account was enabled for futures, this carried over to the virtual account, so I could trade a whole range of futures, options, stocks, etc. I spoke with OptionsXpress, and you don't need to fund your acount to use the virtual trading platform. However, they will cancel your account after an arbitrary period of time if you don't log in every few days. According to their customer service, there is no inactivity fee on your main account if you don't fund it and make no trades. I also used Stock-Trak for a class and despite finding the occasional bug or website performance issue, it provided a good experience. I received a discount because I used it through an educational institution, and customer service was quite good (probably for the same reason), but I don't know if those same benefits would apply to an individual signing up for it. I signed up for top10traders about seven years ago when I was in secondary school, and it's completely free. Unfortunately, you get what you pay for, and the interface was poorly designed and slow. Furthermore, at that time, there were no restrictions that limited the number of shares you could buy to the number of outstanding shares, so you could buy as many as you could afford, even if you exceeded the number that physically existed. While this isn't an issue for large companies, it meant you could earn a killing trading highly illiquid pink sheet stocks because you could purchase billions of shares of companies with only a few thousand shares actually outstanding. I don't know if these issues have been corrected or not, but at the time, I and several other users took advantage of these oversights to rack up hundreds of trillions of dollars in a matter of days, so if you want a realistic simulation, this isn't it. Investopedia also has a stock simulator that I've heard positive things about, although I haven't used it personally.", "title": "" }, { "docid": "666debe67dd0fd4ebc35e1abff7339dd", "text": "One way a lot of people bypass the pattern trading equity requirement is to open multiple brokerage accounts. You have $10k, put $5k in one and $5k in another. Although I don't recommend it!", "title": "" }, { "docid": "fe88f147ee1185df8e18652d0ffef41a", "text": "You'll have to take cash from your Credit Card account and use that to trade. I doubt any brokerage house will take credit cards as it's trading without any collateral (since credit cards are an unsecured credit)", "title": "" }, { "docid": "c75297b62f73553ec352cda7a9fff1b6", "text": "\"I've done exactly what you say at one of my brokers. With the restriction that I have to deposit the money in the \"\"right\"\" way, and I don't do it too often. The broker is meant to be a trading firm and not a currency exchange house after all. I usually do the exchange the opposite of you, so I do USD -> GBP, but that shouldn't make any difference. I put \"\"right\"\" in quotes not to indicate there is anything illegal going on, but to indicate the broker does put restrictions on transferring out for some forms of deposits. So the key is to not ACH the money in, nor send a check, nor bill pay it, but rather to wire it in. A wire deposit with them has no holds and no time limits on withdrawal locations. My US bank originates a wire, I trade at spot in the opposite direction of you (USD -> GBP), wait 2 days for the trade to settle, then wire the money out to my UK bank. Commissions and fees for this process are low. All told, I pay about $20 USD per xfer and get spot rates, though it does take approx 3 trading days for the whole process (assuming you don't try to wait for a target rate but rather take market rate.)\"", "title": "" }, { "docid": "f66dac921d49ae7641e9457d63076bf0", "text": "Unless your investments are held within a special tax-free account, then every sale transaction is a taxable event, meaning a gain or loss (capital gain/loss or income gain/loss, depending on various circumstances) is calculated at that moment in time. Gains may also accrue on unrealized amounts at year-end, for specific items [in general in the US, gains do not accrue at year-end for most things]. Moving cash that you have received from selling investments, from your brokerage account to your checking account, has no impact from a tax perspective.", "title": "" }, { "docid": "747cc718e1016927fc48bf0216b35c05", "text": "As others have said, it depends on the brokerage firm. My broker is Scottrade. With Scottrade the commission is assessed and applied the moment the order is filled. If I buy 100 shares of XYZ at $10 a share then Scottrade will immediately deduct $1007.02 out of my account. They add the commission and fees to the buy transaction. On a sale transaction they subtract the commission and fees from the resulting money. So if I sell 100 shares of XYZ at $11 a share I will get 1,092.98 put into my account, which I can use three business days later.", "title": "" }, { "docid": "2617ec8c8bfb74e2a51084110c5c8bd6", "text": "@JoeTaxpayer gave a great response to your first question. Here are some thoughts on the other two... 2) Transaction fees for mutual funds are tied to the class of shares you're buying and will be the same no matter where you buy them. A-shares have a front-end 'load' (the fee charged), and the lowest expenses, and can be liquidated without any fees. B-shares have no up-front load, but come with a 4-7 year period where they will charge you a fee to liquidate (technically called Contingent Deferred Sales Charge, CDSC), and slightly higher management fees, after which they often will convert to A-shares. C-shares have the highest management fees, and usually a 12- to 18-month period where they will charge a small percentage fee if you liquidate. There are lots of other share classes available, but they are tied to special accounts such as managed accounts and 401-K plans. Not all companies offer all share classes. C-shares are intended for shorter timeframes, eg 2-5 years. A and B shares work best for longer times. Use a B share if you're sure you won't need to take the money out until after the fee period ends. Most fund companies will allow you to exchange funds within the same fund family without charging the CDSC. EDIT: No-load funds don't charge a fee in or out (usually). They are a great option if they are available to you. Most self-service brokerages offer them. Few full-service brokerages offer them. The advantage of a brokerage versus personal accounts at each fund is the brokerage gives you a single view of things and a single statement, and buying and selling is easy and convenient. 3) High turnover rates in bond funds... depending on how actively the portfolio is managed, the fund company may deliver returns as a mix of both interest and capital gains, and the management expenses may be high with a lot of churn in the underlying portfolio. Bond values fall as interest rates rise, so (at least in the USA) be prepared to see the share values of the fund fall in the next few years. The biggest risk of a bond fund is that there is no maturity date, so there is no point in time that you have an assurance that your original investment will be returned to you.", "title": "" }, { "docid": "e1869cf15c6b9a97003f6139f6dfb8f0", "text": "No, you cannot withdraw the money until settlement day. Some brokers will allow you to trade with unsettled funds, but you cannot withdraw it until it is settled. Think about it, when you buy stock you have to pay for them by T+3, so if you sell you actually don't receive the funds until T+3.", "title": "" }, { "docid": "62805ccdb9c6fbf48715ce3709ffaa39", "text": "I think the main question is whether the 1.5% quarterly fee is so bad that it warrants losing $60,000 immediately. Suppose they pull it out now, so they have 220000 - 60000 = $160,000. They then invest this in a low-cost index fund, earning say 6% per year on average over 10 years. The result: Alternatively, they leave the $220,000 in but tell the manager to invest it in the same index fund now. They earn nothing because the manager's rapacious fees eat up all the gains (4*1.5% = 6%, not perfectly accurate due to compounding but close enough since 6% is only an estimate anyway). The result: the same $220,000 they started with. This back-of-the-envelope calculation suggests they will actually come out ahead by biting the bullet and taking the money out. However, I would definitely not advise them to take this major step just based on this simple calculation. Many other factors are relevant (e.g., taxes when selling the existing investment to buy the index fund, how much of their savings was this $300,000). Also, I don't know anything about how investment works in Hong Kong, so there could be some wrinkles that modify or invalidate this simple calculation. But it is a starting point. Based on what you say here, I'd say they should take the earliest opportunity to tell everyone they know never to work with this investment manager. I would go so far as to say they should look at his credentials (e.g., see what kind of financial advisor certification he has, if any), look up the ethical standards of their issuers, and consider filing a complaint. This is not because of the performance of the investments -- losing 25% of your money due to market swings is a risk you have to accept -- but because of the exorbitant fees. Unless Hong Kong has got some crazy kind of investment management market, charging 1.5% quarterly is highway robbery; charging a 25%+ for withdrawal is pillage. Personally, I would seriously consider withdrawing the money even if the manager's investments had outperformed the market.", "title": "" }, { "docid": "1d78a5b716489ff3fa60038e90e411c1", "text": "\"Don't put money in things that you don't understand. ETFs won't kill you, ignorance will. The leveraged ultra long/short ETFs hold swaps that are essentially bets on the daily performance of the market. There is no guarantee that they will perform as designed at all, and they frequently do not. IIRC, in most cases, you shouldn't even be holding these things overnight. There aren't any hidden fees, but derivative risk can wipe out portions of the portfolio, and since the main \"\"asset\"\" in an ultra long/short ETF are swaps, you're also subject to counterparty risk -- if the investment bank the fund made its bet with cannot meet it's obligation, you're may lost alot of money. You need to read the prospectus carefully. The propectus re: strategy. The Fund seeks daily investment results, before fees and expenses, that correspond to twice the inverse (-2x) of the daily performance of the Index. The Fund does not seek to achieve its stated investment objective over a period of time greater than a single day. The prospectus re: risk. Because of daily rebalancing and the compounding of each day’s return over time, the return of the Fund for periods longer than a single day will be the result of each day’s returns compounded over the period, which will very likely differ from twice the inverse (-2x) of the return of the Index over the same period. A Fund will lose money if the Index performance is flat over time, and it is possible that the Fund will lose money over time even if the Index’s performance decreases, as a result of daily rebalancing, the Index’s volatility and the effects of compounding. See “Principal Risks” If you want to hedge your investments over a longer period of time, you should look at more traditional strategies, like options. If you don't have the money to make an option strategy work, you probably can't afford to speculate with leveraged ETFs either.\"", "title": "" } ]
fiqa
4d1d8f92fc7dad7acc94d7e2efdb037e
Where can you find historical PEs of US indices?
[ { "docid": "3c9ed0056ff789546cac2040d1a25920", "text": "Internet sites Books Academic", "title": "" } ]
[ { "docid": "bc9c402008b52c0eafe34f56502c5e48", "text": "\"Some years ago, two \"\"academics,\"\" Ibbotson and Sinquefield did these calculations. (Roger) Ibbotson, is still around. So Google Roger Ibbotson, or Ibbotson Associates. There are a number of entries so I won't provide all the links.\"", "title": "" }, { "docid": "1f71f77fc4742183d16a0d2f92ce5423", "text": "Yes, the choice of some of the base stats to use is pretty interesting. I'm not an expert in using FRED, but I think there are better numbers for a lot of those. Mostly it's about things like the origin of the graph though - look how many of the graphs on that page start in the mid fifties, not zero, thus magnifying things drastically. Also graphing numbers that aren't calculated the same way on the same graph - FRED does not fix your poor assumptions.", "title": "" }, { "docid": "fb67ec3740545851f323621075d7a83c", "text": "There are about 250 trading days in a year. There are also about 1,900 stocks listed on the NYSE. What you're asking for would require about 6.2M rows of data. Depending on the number of attributes you're likely looking at a couple GB of data. You're only getting that much information through an API or an FTP.", "title": "" }, { "docid": "432563b151d2e6afcfa8c7f9f577f54b", "text": "I use and recommend barchart.com. Again you have to register but it's free. Although it's a US system it has a full listing of UK stocks and ETFs under International > London. The big advantage of barchart.com is that you can do advanced technical screening with Stochastics and RS, new highs and lows, moving averages etc. You're not stuck with just fundamentals, which in my opinion belong to a previous era. Even if you don't share that opinion you'd still find barchart.com useful for UK stocks.", "title": "" }, { "docid": "67fe7636e0ee67c732c363fae29c6bef", "text": "That is true. You will not be able to reconstruct the value of the index from the data returned with this script. I initially wrote this script because I wanted data for a lot of stocks and I wanted to perform PCA on the stocks currently included in the index.", "title": "" }, { "docid": "684939ebba51de25344e1ff641d21134", "text": "\"Try the general stock exchange web page. http://www.aex.nl I did a quick trial myself and was able to download historical data for the AEX index for the last few years. To get to the data, I went to the menu point \"\"Koersen\"\" on the main page and chose \"\"Indices\"\". I then entered into the sub page for the AEX index. There is a price chart window in which you have to choose the tab \"\"view data\"\". Now you can choose the date range you need and then download in a table format such as excel or csv. This should be easy to import into any software. This is the direct link to the sub page: http://www.aex.nl/nl/products/indices/NL0000000107-XAMS/quotes\"", "title": "" }, { "docid": "90f3ac4042a941d61e7a35f1938326dc", "text": "\"The Securities Industry and Financial Markets Association (SIFMA) publishes these and other relevant data on their Statistics page, in the \"\"Treasury & Agency\"\" section. The volume spreadsheet contains annual and monthly data with bins for varying maturities. These data only go back as far as January 2001 (in most cases). SIFMA also publishes treasury issuances with monthly data for bills, notes, bonds, etc. going back as far as January 1980. Most of this information comes from the Daily Treasury Statements, so that's another source of specific information that you could aggregate yourself. Somewhere I have a parser for the historical data (since the Treasury doesn't provide it directly; it's only available as daily text files). I'll post it if I can find it. It's buried somewhere at home, I think.\"", "title": "" }, { "docid": "63351b4cb549ad41b342e0dbf094f410", "text": "The Federal Reserve Bank publishes exchange rate data in their H.10 release. It is daily, not minute by minute. The Fed says this about their data: About the Release The H.10 weekly release contains daily rates of exchange of major currencies against the U.S. dollar. The data are noon buying rates in New York for cable transfers payable in the listed currencies. The rates have been certified by the Federal Reserve Bank of New York for customs purposes as required by section 522 of the amended Tariff Act of 1930. The historical EURUSD rates for the value of 1 EURO in US$ are at: http://www.federalreserve.gov/releases/h10/hist/dat00_eu.htm If you need to know USDEUR the value of 1 US$ in EUROS use division 1.0/EURUSD.", "title": "" }, { "docid": "f78c7392739b1b493469ea702c6e2a40", "text": "As BrenBarn points out in his comment, the real values are inflation adjusted values using the consumer price index (CPI) included in the spreadsheet. The nominal value adjusted by the CPI gives the real value in terms of today's dollars. For example, the CPI for the first month (Jan 1871) is given as 12.46 while the most recent month (Aug 2016) has a reported CPI of 240.45. Thus, the real price (in today's dollars) for the 4.44 S&P index level at Jan 1871 is calculated as 4.44 x 240.45 / 12.46 = 85.68 (actually reported as 85.65 due to rounding of the reported CPIs). And similarly for the other real values reported.", "title": "" }, { "docid": "9ce676212f9a76f4a1caaaed0e929408", "text": "\"ycharts.com has \"\"Weighted Average PE Ratio\"\" and a bunch of other metrics that are meant to correspond to well known stock metrics. Other websites will have similar ratios.\"", "title": "" }, { "docid": "105d56c81f6e2fbc365e6571b8b8d301", "text": "you could try [FRED](http://research.stlouisfed.org/fred2/graph/?g=HO7), or maybe try the CME and ICE's websites for some decent data.. haven't looked just suggestions - pretty sure the symbol for the Libor futures is EM, you could approximate from that so long as it's not a doctoral thesis", "title": "" }, { "docid": "7d9fd9278d1df7eff6f2b32d543ed49d", "text": "I've had luck finding old stock information in the Google scanned newspaper archives. Unfortunately there does not appear to be a way to search exactly by date, but a little browsing /experimenting should get what you want. For instance, here's a source which shows the price to be 36 3/4 (as far as I can read anyway) on that date.", "title": "" }, { "docid": "e50fbda863f078d02e1be7577f198d04", "text": "http://www.euroinvestor.com/exchanges/nasdaq/macromedia-inc/41408/history will work as DumbCoder states, but didn't contain LEHMQ (Lehman Brother's holding company). You can use Yahoo for companies that have declared bankruptcy, such as Lehman Brothers: http://finance.yahoo.com/q/hp?s=LEHMQ&a=08&b=01&c=2008&d=08&e=30&f=2008&g=d but you have to know the symbol of the holding company.", "title": "" }, { "docid": "57165bce8395c150584db3d30c37a8d3", "text": "Well, you can't really have it both ways. You said that they were both using the same method, but, in fact, they aren't. You can call the weighting biased, but in fact if appears that BPP is doing little or minimal weighting, and yet still is showing that prices, in general, are mapping similarly to the BLS published CPI. Unless you're arguing an MIT 'academic conspiracy' (and even if you are), I think you've failed to make your case. BPP is independant, it uses a different methodology, and yet the results confirm those of the BLS.", "title": "" }, { "docid": "791a284b641dc2d848f1556503700ffe", "text": "I don't know of any books, but there are a lot of good white papers on the subject if you take the time to look for them. For example, Moody's has a white paper on their LGD model (LossCalc) that explains their calibration methodology. Searching for academic papers on the subject is really the only way to go, because credit risk is a field that really is just being explored. Really only since 2006 have banks started to actively try to use a risk rating model that incorporates PD and LGD. This is because of data insufficiency - banks just didn't keep active and centralized loan level data that is required to calibrate the models. tl;dr: Use the internet - it is your friend.", "title": "" } ]
fiqa
f66cce047d2fd7b9e303b1cdb1e08994
What is the process of getting your first share?
[ { "docid": "92174efaea066aa7b16d666a6d03c5b8", "text": "\"I think I understand what you're trying to achieve. You just want to see how it \"\"feels\"\" to own a share, right? To go through the process of buying and holding, and eventually selling, be it at a loss or at a gain. Frankly, my primary advice is: Just do it on paper! Just decide, for whatever reason, which stocks to buy, in what amount, subtract 1% for commissions (I'm intentionally staying on the higher side here), and keep track of the price changes daily. Instead of doing it on mere paper, some brokers offer you a demo account where you can practice your paper trading in the same way you would use a live account. As far as I know, Interactive Brokers and Saxo Bank offer such demo accounts, go look around on their web pages. The problem about doing it for real is that many of the better brokers, such as the two I mentioned, have relatively high minimum funding limits. You need to send a few thousand pounds to your brokerage account before you can even use it. Of course, you don't need to invest it all, but still, the cash has to be there. Especially for some younger and inexperienced investors, this can seduce them to gambling most of their money away. Which is why I would not advise you to actually invest in this way. It will be expensive but if it's just for trying it on one share, use your local principal bank for the trade. Hope this gets you started!\"", "title": "" }, { "docid": "2a2880cc32f51a709d7cc91acef8eb9e", "text": "\"Let's handle this as a \"\"proof of concept\"\" (POC); OP wants to buy 1 share of anything just to prove that they can do it before doing the months of painstaking analysis that is required before buying shares as an investment. I will also assume that the risks and costs of ownership and taxes would be included in OP's future analyses. To trade a stock you need a financed broker account and a way to place orders. Open a dealing account, NOT an options or CFD etc. account, with a broker. I chose a broker who I was confident that I could trust, others will tell you to look for brokers based on cost or other metrics. In the end you need to be happy that you can get what you want out of your broker, that is likely to include some modicum of trust since you will be keeping money with them. When you create this account they will ask for your bank account details (plus a few other details to prevent fraud, insider trading, money laundering etc.) and may also ask for a minimum deposit. Either deposit enough to cover the price of your share plus taxes and the broker's commission, plus a little extra to be on the safe side as prices move for every trade, including yours, or the minimum if it is higher. Once you have an account the broker will provide an interface through which to buy the share. This will usually either be a web interface, a phone number, or a fax number. They will also provide you with details of how their orders are structured. The simplest type of order is a \"\"market order\"\". This tells the broker that you want to buy your shares at the market price rather than specifying only to buy at a given price. After you have sent that order the broker will buy the share from the market, deduct the price plus tax and her commission from your account and credit your account with your share.\"", "title": "" }, { "docid": "d41d8cd98f00b204e9800998ecf8427e", "text": "", "title": "" }, { "docid": "a11b5b0f914084e7fe0ca39051dd3794", "text": "Here's a different take: Look through the lists of companies that offer shareholder perks. Here's one from Hargreaves Lansdown. See if you can find one that you already spend money with with a low required shareholding where the perks would actually be usable. Note that in your case, being curious about the whole thing and based in London, you don't have to rule out the AGM-based perks, unlike me. My reason for this is simple: with 3 out of 4 of the companies we bought shares in directly (all for the perks), we've made several times the dividend in savings on money we would have spent anyway (either with the company in which we bought shares or a direct competitor). This means that you can actually make back the purchase price plus dealing fee quite quickly (probably in 2/4 in our case), and you still have the shares. We've found that pub/restaurant/hotel brands work well if you use them or their equivalents anyway. Caveats: It's more enjoyable than holding a handful of shares in a company you don't care about, and if you want to read the annual reports you can relate this to your own experience, which might interest you given your obvious curiosity.", "title": "" }, { "docid": "07f9cbe3b50a9686f25b461e586e1a98", "text": "I actually use a service called etorro, there are social trading and normal trading. It allows me to put money into the service, follow other people or just pick my own shares to buy and sell with a load other features. It does cost a small amount to extract money but the app is really good, the website is well designed and I've made a bit of money being 23, and in the It industry with no financial training ever it seems like a good way to start.", "title": "" }, { "docid": "0c40af79b92f101324e2a6cc2b8e1f3d", "text": "\"You could also look up stock trading games. Basically, you get x amount of \"\"money\"\" and \"\"invest\"\" it in stocks, trying to get the highest return of the group in y amount of time. They are a decent way to get used to how different types of trades work without having to risk any real money, while having enough \"\"money\"\" to invest that you can try different things. Of course, as others have mentioned they may or may not include all the nuances, like minimum investments and brokerage fees, but at least you can learn and see how the different buying and selling options work.\"", "title": "" } ]
[ { "docid": "36a6544c4345364ddb1d7b14c70312f3", "text": "A company is basically divided into shit the company owns (assets) and shit the company owes to people (liabilities). So what about ownership? Ownership is called equity and on a simplistic level equity = asset - liabilities. But a better view of that should be asset = liabilities + equity. Which means a company's assets is separated into things owned by debtors (e.g. Banks) and things owned by owners(founders and you). So when you are offered one percent, you are basically owning one percent of the company. Not the best explanation, but should be a simplified one. Here's where the options come in. When you are offered options. That means you have the option of redeeming the shares at a lower price than market. However these options are not usually immediately redeemable, there's usually a minimum amount of time you have to work at a company to be able to use these options. This period is called the vesting period.", "title": "" }, { "docid": "3ec032150533346d0abdca0583130571", "text": "Let me answer with an extreme example - I own the one single share of a company, and it's worth $1M. I issue 9 more shares, and find 9 people willing to pay $1M for each share. I know find my ownership dropped by 90%, and I am now a 10% owner of a business that was valued at $1M but with an additional $9M in the bank for expansion. (Total value now $10M) Obviously, this is a simplistic view, but no simpler than the suggestion that your company would dilute its shares 90% in one transaction.", "title": "" }, { "docid": "29d55ab26f576d446bf5ddcd88929106", "text": "Congratulations! You own a (very small) slice of Apple. As a stockholder, you have a vote on important decisions that the company makes. Each year Apple has a stockholder meeting in Cupertino that you are invited to. If you are unable to attend and vote, you can vote by proxy, which simply means that you register your vote before the meeting. You just missed this year's meeting, which was held on February 26, 2016. They elected people to the board of directors, chose an accounting firm, and voted on some other proposals. Votes are based on the number of shares you own; since you only own one share, your vote is very small compared to some of the other stockholders. Besides voting, you are entitled to receive profit from the company, if the company chooses to pay this out in the form of dividends. Apple's dividend for the last several quarters has been $0.52 per share, which means that you will likely receive 4 small checks from Apple each year. The value of the share of stock that you have changes daily. Today, it is worth about $100. You can sell this stock whenever you like; however, since you have a paper certificate, in order to sell this stock on the stock market, you would need to give your certificate to a stock broker before they can sell it for you. The broker will charge a fee to sell it for you. Apple has a website for stockholders at investor.apple.com with some more information about owning Apple stock. One of the things you'll find here is information on how to update your contact information, which you will want to do if you move, so that Apple can continue to send you your proxy materials and dividend checks.", "title": "" }, { "docid": "6a7ad0dfe6e58a699a893680ecdf1566", "text": "\"They may be confused. The combination of \"\"my wife received stock when younger\"\" and \"\"her father just died\"\" leaves questions. A completed gift, when she was a kid, means she has a basis (cost) same as the original owner of that stock. This may need to be researched. The other choice is that she gets a price based on the date of dad's death, a stepped up basis, if it was his, but she got it when he passed. No offense to them, but brokers are not always qualified to offer tax advice. How/when exactly did she get to own the stock. Upon second reading it appears I answered this from a tax perspective. You seem to have issues of ownership. What exactly does the broker tell you? In whose name is the statement for the account holding these shares? Scott, saw your update. For the accounts I have for my 13 year old, I am custodian, but the tax ID is her social security number. When 21, she doesn't need my permission to sell anything, just valid ID. What exactly does the broker tell her?\"", "title": "" }, { "docid": "8592a563001667b5d7ee8dc2edd53b11", "text": "If Jack owns all of the one million founding shares (which I assume you meant), and wants to transfer 250,000 shares to Venturo, then he is just personally selling shares to Venturo and the corporation gains nothing. If Jack does not own all of the founding shares, and the corporation had retained some, then the corporate shares could be sold to raise cash for the corporation. Usually in situations like this, the corporation will create more shares, diluting existing shareholders, and then sell the new shares on the open market to raise cash.", "title": "" }, { "docid": "cdd44d5b6e1759db55533d8b1ae1ed7f", "text": "You can become an activist share holder with as little as one share depending on your strategy an example of this was Hugh Fearnley-Whittingstall (excellent name) vs Tesco (a huge supermarket, think walmart). He purchased one share which gave him the right to table a resolution at the AGM, then used the media to beat Tesco into submission over his particular issue however very few of the institution share holders (think large banks, pension funds, insurance companies) voted in favor so he failed miserably, but Tesco later caved slightly through fear of bad press. Also Carl Icahn is pretty well noted for doing things like this. Regarding the amount of money, you would need to raise a hell of a lot to buy enough shares to have anything like enough of a block to influence the company directly, but to attend the AGM, ask questions and generally be a pain in the ass you only need modest amount of shares, in some cases just one share.", "title": "" }, { "docid": "bffdd2b0003ce358a8fc2bc569131763", "text": "\"Price is decided by what shares are offered at what prices and who blinks first. The buyer and seller are both trying to find the best offer, for their definition of best, within the constraints then have set on their bid or ask. The seller will sell to the highest bid they can get that they consider acceptable. The buyer will buy from the lowest offer they can get that they consider acceptable. The price -- and whether a sale/purchase happens at all -- depends on what other trades are still available and how long you're willing to wait for one you're happy with, and may be different on one share than another \"\"at the same time\"\" if the purchase couldn't be completed with the single best offer and had to buy from multiple offers. This may have been easier to understand in the days of open outcry pit trading, when you could see just how chaotic the process is... but it all boils down to a high-speed version of seeking the best deal in an old-fashioned marketplace where no prices are fixed and every sale requires (or at least offers the opportunity for) negotiation. \"\"Fred sells it five cents cheaper!\"\" \"\"Then why aren't you buying from him?\"\" \"\"He's out of stock.\"\" \"\"Well, when I don't have any, my price is ten cents cheaper.\"\" \"\"Maybe I won't buy today, or I'll buy elsewhere. \"\"Maybe I won't sell today. Or maybe someone else will pay my price. Sam looks interested...\"\" \"\"Ok, ok. I can offer two cents more.\"\" \"\"Three. Sam looks really interested.\"\" \"\"Two and a half, and throw in an apple for Susie.\"\" \"\"Done.\"\" And the next buyer or seller starts the whole process over again. Open outcry really is just a way of trying to shop around very, very, very fast, and electronic reconciliation speeds it up even more, but it's conceptually the same process -- either seller gets what they're asking, or they adjust and/or the buyer adjusts until they meet, or everyone agrees that there's no agreement and goes home.\"", "title": "" }, { "docid": "76320099a37d8f9f9b4281d18080ef8b", "text": "Simple: Do a stock split. Each 1 Ordinary share now = 100 Ordinary shares (or 100,000 or whatever you choose). Then sell 20 (or 20,000) of them to your third party. (Stock splits are fairly routine occurrence. Apple for example has done several, most recently in 2014 when 1 share = 7 shares). Alternatively you could go the route of creating a new share class with different rights, preferences etc. But this is more complicated.", "title": "" }, { "docid": "1f993f0cda37e0b1db3d20ec22f0ad75", "text": "\"There is no unique identifier that exists to identify specific shares of a stock. Just like money in the bank, there is no real reason to identify which exact dollar bills belong to me or you, so long as there is a record that I own X bills and I can access them when I want. (Of course, unlike banks, there is still a 1:1 relationship between the amount I should own and the amount they actually hold). If I may reach a bit, the question that I assume you are asking is how are shared actually tracked, transferred, and recorded so that I know for certain that I traded you 20 Microsoft shares yesterday and they are now officially yours, given that it's all digital. While you can technically try and request a physical share certificate, it's very cumbersome to handle and transfer in that form. Ownership of shares themselves are tracked for brokerage firms (in the case of retail trading, which I assume is the context of this question as we're discussion personal finance). Your broker has a record of how many shares of X, Y, and Z you own, when you bought each share and for how much, and while you are the beneficial owner of record (you get dividends, voting rights, etc.) your brokerage is the one who is \"\"holding\"\" the shares. When you buy or sell a stock and you are matched with a counterparty (the process of which is beyond the scope of this question) then a process of settlement comes into play. In the US, settlement takes 3 working days to process, and technically ownership does not transfer until the 3rd day after the trade is made, though things like margin accounts will allow you to effectively act as if you own the shares immediately after a buy/sell order is filled. Settlement in the US is done by a sole source, the Depository Trust & Clearing Corporation (DTCC). This is where retail and institutional trade all go to be sorted, checked and confirmed, and ultimately returned to the safekeeping of their new owners' representatives (your brokerage). Interestingly, the DTCC is also the central custodian for shares both physical and virtual, and that is where the shares of stock ultimately reside.\"", "title": "" }, { "docid": "67678b24e00d599afb2ad4f0fb52c905", "text": "\"First, note that a share represents a % of ownership of a company. In addition to the right to vote in the management of the company [by voting on the board of directors, who hires the CEO, who hires the VPs, etc...], this gives you the right to all future value of the company after paying off expenses and debts. You will receive this money in two forms: dividends approved by the board of directors, and the final liquidation value if the company closes shop. There are many ways to attempt to determine the value of a company, but the basic theory is that the company is worth a cashflow stream equal to all future dividends + the liquidation value. So, the market's \"\"goal\"\" is to attempt to determine what that future cash flow stream is, and what the risk related to it is. Depending on who you talk to, a typical stock market has some degree of 'market efficiency'. Market efficiency is basically a comment about how quickly the market reacts to news. In a regulated marketplace with a high degree of information available, market efficiency should be quite high. This basically means that stock markets in developed countries have enough traders and enough news reporting that as soon as something public is known about a company, there are many, many people who take that information and attempt to predict the impact on future earnings of the company. For example, if Starbucks announces earnings that were 10% less than estimated previously, the market will quickly respond with people buying Starbucks shares lowering their price on the assumption that the total value of the Starbucks company has decreased. Most of this trading analysis is done by institutional investors. It isn't simply office workers selling shares on their break in the coffee room, it's mostly people in the finance industry who specialize in various areas for their firms, and work to quickly react to news like this. Is the market perfectly efficient? No. The psychology of trading [ie: people panicking, or reacting based on emotion instead of logic], as well as any inadequacy of information, means that not all news is perfectly acted upon immediately. However, my personal opinion is that for large markets, the market is roughly efficient enough that you can assume that you won't be able to read the newspaper and analyze stock news in a way better than the institutional investors. If a market is generally efficient, then it would be very difficult for a group of people to manipulate it, because someone else would quickly take advantage of that. For example, you suggest that some people might collectively 'short AMZN' [a company worth half a trillion dollars, so your nefarious group would need to have $5 Billion of capital just to trade 1% of the company]. If someone did that, the rest of the market would happily buy up AMZN at reduced prices, and the people who shorted it would be left holding the bag. However, when you deal with smaller items, some more likely market manipulation can occur. For example, when trading penny stocks, there are people who attempt to manipulate the stock price and then make a profitable trade afterwards. This takes advantage of the low amount of information available for tiny companies, as well as the limited number of institutional investors who pay attention to them. Effectively it attempts to manipulate people who are not very sophisticated. So, some manipulation can occur in markets with limited information, but for the most part prices are determined by the 'market consensus' on what the future profits of a company will be. Additional example of what a share really is: Imagine your neighbor has a treasure chest on his driveway: He gathers the neighborhood together, and asks if anyone wants to buy a % of the value he will get from opening the treasure chest. Perhaps it's a glass treasure chest, and you can mostly see inside it. You see that it is mostly gold and silver, and you weigh the chest and can see that it's about 100 lbs all together. So in your head, you take the price of gold and silver, and estimate how much gold is in the chest, and how much silver is there. You estimate that the chest has roughly $1,000,000 of value inside. So, you offer to buy 10% of the chest, for $90k [you don't want to pay exactly 10% of the value of the company, because you aren't completely sure of the value; you are taking on some risk, so you want to be compensated for that risk]. Now assume all your neighbors value the chest themselves, and they come up with the same approximate value as you. So your neighbor hands out little certificates to 10 of you, and they each say \"\"this person has a right to 10% of the value of the treasure chest\"\". He then calls for a vote from all the new 'shareholders', and asks if you want to get the money back as soon as he sells the chest, or if you want him to buy a ship and try and find more chests. It seems you're all impatient, because you all vote to fully pay out the money as soon as he has it. So your neighbor collects his $900k [$90k for each 10% share, * 10], and heads to the goldsmith to sell the chest. But before he gets there, a news report comes out that the price of gold has gone up. Because you own a share of something based on the price of gold, you know that your 10% treasure chest investment has increased in value. You now believe that your 10% is worth $105k. You put a flyer up around the neighborhood, saying you will sell your share for $105k. Because other flyers are going up to sell for about $103-$106k, it seems your valuation was mostly consistent with the market. Eventually someone driving by sees your flyer, and offers you $104k for your shares. You agree, because you want the cash now and don't want to wait for the treasure chest to be sold. Now, when the treasure chest gets sold to the goldsmith, assume it sells for $1,060,000 [turns out you underestimated the value of the company]. The person who bought your 10% share will get $106k [he gained $2k]. Your neighbor who found the chest got $900k [because he sold the shares earlier, when the value of the chest was less clear], and you got $104k, which for you was a gain of $14k above what you paid for it. This is basically what happens with shares. Buy owning a portion of the company, you have a right to get a dividend of future earnings. But, it could take a long time for you to get those earnings, and they might not be exactly what you expect. So some people do buy and sell shares to try and earn money, but the reason they are able to do that is because the shares are inherently worth something - they are worth a small % of the company and its earnings.\"", "title": "" }, { "docid": "8b0a6de7bf0ba2094d7070be5d056716", "text": "\"What is a stock? A share of stock represents ownership of a portion of a corporation. In olden times, you would get a physical stock certificate (looking something like this) with your name and the number of shares on it. That certificate was the document demonstrating your ownership. Today, physical stock certificates are quite uncommon (to the point that a number of companies don't issue them anymore). While a one-share certificate can be a neat memento, certificates are a pain for investors, as they have to be stored safely and you'd have to go through a whole annoying process to redeem them when you wanted to sell your investment. Now, you'll usually hold stock through a brokerage account, and your holdings will just be records in a database somewhere. You'll pick a broker (more on that in the next question), instruct them to buy something, and they'll keep track of it in your account. Where do I get a stock? You'll generally choose a broker and open an account. You can read reviews to compare different brokerages in your country, as they'll have different fees and pricing. You can also make sure the brokerage firm you choose is in good standing with the financial regulators in your country, though one from a major national bank won't be unsafe. You will be required to provide personal information, as you are opening a financial account. The information should be similar to that required to open a bank account. You'll also need to get your money in and out of the account, so you'll likely set up a bank transfer. It may be possible to request a paper stock certificate, but don't be surprised if you're told this is unavailable. If you do get a paper certificate, you'll have to deal with considerably more hassle and delay if you want to sell later. Brokers charge a commission, which is a fee per trade. Let's say the commission is $10/trade. If you buy 5 shares of Google at $739/share, you'd pay $739 * 5 + $10 = $3705 and wind up with $3695 worth of stock in your account. You'd pay the same commission when you sell the stock. Can anyone buy/own/use a stock? Pretty much. A brokerage is going to require that you be a legal adult to maintain an account with them. There are generally ways in which a parent can open an account on behalf of an underage child though. There can be different types of restrictions when it comes to investing in companies that are not publicly held, but that's not something you need to worry about. Stocks available on the public stock market are available to, well, the public. How are stocks taxed? Taxes differ from country to country, but as a general rule, you do have to provide the tax authorities with sufficient information to determine what you owe. This means figuring out how much you purchased the stock for and comparing that with how much you sold it for to determine your gain or loss. In the US (and I suspect in many other countries), your brokerage will produce an annual report with at least some of this information and send it to the tax authorities and you. You or someone you hire to do your taxes will use that report to compute the amount of tax owed. Your brokerage will generally keep track of your \"\"cost basis\"\" (how much you bought it for) for you, though it's a good idea to keep records. If you refuse to tell the government your cost basis, they can always assume it's $0, and then you'll pay more tax than you owe. Finding the cost basis for old investments can be difficult many years later if the records are lost. If you can determine when the stock was purchased, even approximately, it's possible to look back at historical price data to determine the cost. If your stock pays a dividend (a certain amount of money per-share that a company may pay out of its profits to its investors), you'll generally need to pay tax on that income. In the US, the tax rate on dividends may be the same or less than the tax rate on normal wage income depending on how long you've held the investment and other rules.\"", "title": "" }, { "docid": "104d9230bb7c2710413f9a8b3498be85", "text": "\"If you participate in an IPO, you specify how many shares you're willing to buy and the maximum price you're willing to pay. All the investors who are actually sold the shares get them at the same price, and the entity managing the IPO will generally try to sell the shares for the highest price they can get. Whether or not you actually get the shares is a function of how many your broker gets and how your broker distributes them - which can be completely arbitrary if your broker feels like it. The price that the market is willing to pay afterward is usually a little higher. To a certain extent, this is by design: a good deal for the shares is an incentive for the big (million/billion-dollar) financiers who will take on a good bit of risk buying very large positions in the company (which they can't flip at the higher price, because they'd flood the market with their shares and send the price down). If the stock soars 100% and sticks around that level, though, the underwriting bank isn't doing its job very well: Investors were willing to give the company a lot more money. It's not \"\"stealing\"\", but it's definitely giving the original owners of the company a raw deal. (Just to be clear: it's the existing company's owners who suffer, not any third party.) Of course, LinkedIn was estimated to IPO at $30 before they hiked it to $45, and plenty of people were skeptical about it pricing so high even then, so it's not like they didn't try. And there's a variety of analysis out there about why it soared so much on the first day - fewer shares offered, wild speculative bubbles, no one could get a hold of it to short-sell, et cetera. They probably could have IPO'd for more, but it's unlikely there was, say, $120/share financing available: just because one sucker will pay the price doesn't mean you can move all 7.84 million IPO shares for it.\"", "title": "" }, { "docid": "94ca522ac3e692fc40a81e334445cace", "text": "\"Many companies (particularly tech companies like Atlassian) grant their employees \"\"share options\"\" as part of their compensation. A share option is the right to buy a share in the company at a \"\"strike price\"\" specified when the option is granted. Typically these \"\"vest\"\" after 1-4 years so long as the employee stays with the company. Once they do vest, the employee can exercise them by paying the strike price - typically they'd do that if the shares are now more valuable. The amount they pay to exercise the option goes to the company and will show up in the $2.3 million quoted in the question.\"", "title": "" }, { "docid": "1eebb6fe1711a3950d7b67ffa1a5a0a6", "text": "Well, if one share cost $100 and the company needs to raise $10000, then the company will issue 100 shares for that price. Right? However, say there's 100 shares out there now, then each share holder owns 1/100th of the company. Now the company will remain the same, but it's shared between 200 shareholders after the issuing of new shares. That means each share holder now owns 1/200th of the company. And hence only gets 1/200th of their earnings etc.", "title": "" }, { "docid": "a78a822b2b626375e6377614588064f4", "text": "\"ETF Creation and Redemption Process notes the process: While ETF trading occurs on an exchange like stocks, the process by which their shares are created is significantly different. Unless a company decides to issue more shares, the supply of shares of an individual stock trading in the marketplace is finite. When demand increases for shares of an ETF, however, Authorized Participants (APs) have the ability to create additional shares on demand. Through an \"\"in kind\"\" transfer mechanism, APs create ETF units in the primary market by delivering a basket of securities to the fund equal to the current holdings of the ETF. In return, they receive a large block of ETF shares (typically 50,000), which are then available for trading in the secondary market. This ETF creation and redemption process helps keep ETF supply and demand in continual balance and provides a \"\"hidden\"\" layer of liquidity not evident by looking at trading volumes alone. This process also works in reverse. If an investor wants to sell a large block of shares of an ETF, even if there seems to be limited liquidity in the secondary market, APs can readily redeem a block of ETF shares by gathering enough shares of the ETF to form a creation unit and then exchanging the creation unit for the underlying securities. Thus, the in-kind swap to the underlying securities is only done by APs so the outflow would be these individuals taking a large block of the ETF and swapping it for the underlying securities. The APs would be taking advantage of the difference between what the ETF's trading value and the value of the underlying securities.\"", "title": "" } ]
fiqa
c64cb306810d228c12a70b9b116fd10c
How can I find out who the major short sellers are in a stock?
[ { "docid": "d41d8cd98f00b204e9800998ecf8427e", "text": "", "title": "" }, { "docid": "6498dc17cb7cd572ef19866fea19f6d2", "text": "There is no way to know anything about who has shorted stuff or how concentrated the positions are in a few investors. Short positions are not even reported in 13(F) institutional filings. I'll take the bonus points, though, and point you to the US Equity Short Interest data source at quandl.", "title": "" } ]
[ { "docid": "dc096ed29dd62558dd7405e04ae66eb6", "text": "Exact rules may be different depending on the size of the investor, the specific broker, and the country. For both the US and Canada, short sales occur only through one's margin account. And shares that are borrowed for shorting only come from a margin account. Shares held in a cash account are not available for shorting. From Wikipedia Short (finance) - The speculator instructs the broker to sell the shares and the proceeds are credited to his broker's account at the firm upon which the firm can earn interest. Generally, the short seller does not earn interest on the short proceeds and cannot use or encumber the proceeds for another transaction. As with many questions, I'd suggest you contact your broker for the exact details governing your account.", "title": "" }, { "docid": "b1fb0823ce32c596a1f3590d7c2e7c0c", "text": "For Canada No distinction is made in the regulation between “naked” or “covered” short sales. However, the practice of “naked” short selling, while not specifically enumerated or proscribed as such, may violate other provisions of securities legislation or self-regulatory organization rules where the transaction fails to settle. Specifically, section 126.1 of the Securities Act prohibits activities that result or contribute “to a misleading appearance of trading activity in, or an artificial price for, a security or derivative of a security” or that perpetrate a fraud on any person or company. Part 3 of National Instrument 23-101 Trading Rules contains similar prohibitions against manipulation and fraud, although a person or company that complies with similar requirements established by a recognized exchange, quotation and trade reporting system or regulation services provider is exempt from their application. Under section 127(1) of the Securities Act, the OSC also has a “public interest jurisdiction” to make a wide range of orders that, in its opinion, are in the public interest in light of the purposes of the Securities Act (notwithstanding that the subject activity is not specifically proscribed by legislation). The TSX Rule Book also imposes certain obligations on its “participating organizations” in connection with trades that fail to settle (see, for example, Rule 5-301 Buy-Ins). In other words, shares must be located by the broker before they can be sold short. A share may not be locatable because there are none available in the broker's inventory, that it cannot lend more than what it has on the books for trade. A share may not be available because the interest rate that brokers are charging to borrow the share is considered too high by that broker, usually if it doesn't pass on borrowing costs to the customer. There could be other reasons as well. If one broker doesn't have inventory, another might. I recommend checking in on IB's list. If they can't get it, my guess would be that no one can since IB passes on the cost to finance short sales.", "title": "" }, { "docid": "2c0d471b4475311dc5888b973e1ae327", "text": "\"Market makers, traders, and value investors would be who I'd suspect for buying the stock that is declining. Some companies stocks can come down considerably which could make some speculators buy the stock at the lower price thinking it may bounce back soon. \"\"Short sellers\"\" are out to sell borrowed stocks that if the stock is in free fall, unless the person that shorted wants to close the position, they would let it ride. Worthless stocks are a bit of a special case and quite different than the crash of 1929 where various blue chip stocks like those of the Dow Jones Industrials had severe declines. Thus, the companies going down would be like Apple, Coca-Cola and other large companies that people would be shocked to see come down so much yet there are some examples in recent history if one remembers Enron or Worldcom. Stocks getting delisted tend to cause some selling and there are some speculators may buy the stock believing that the shares may be worth something only to lose the money possibly as one could look at the bankrupt cases of airlines and car companies to study some recent cases here. Circuit breakers are worth noting as these are cases when trading may be halted because of a big swing in prices that it is believed stopping the market may cause things to settle down.\"", "title": "" }, { "docid": "d3123290e32d907c6d91f25b639be154", "text": "Brokerage firms are required to report the number of shares being shorted. This information is reported to the exchange (NYSE of NASDAQ) and is made public. Most financial sites indicate the number of shares being shorted for a particular stock. The image below from Yahoo finance shows 3.29 million shares of CMG were being shorted at the close of 9-28-2012. This is over 12% of the total outstanding shares of CMG. For naked short selling additional information is tracked. If the brokerage is unable to borrow shares to deliver before the settlement date of a short sale then the transaction is recorded as fails-to-deliver. No money or shares are exchanged since the brokerage is unable to deliver the shares that were agreed upon. A large amount of fails-to-deliver transactions for a stock usually indicates an excessive amount of naked shorting. When investors and brokerage firms start to aggressively short a stock they will do so without having borrowed the shares to sell. This will result in a large amount of naked short selling. When there are a large number of naked short sellers not all the sellers will be able to borrow the necessary shares before the settlement date and many fails-to-deliver transactions will be recorded. The SEC records the number of fails-to-deliver transactions. The table below summarizes the fails-to-deliver transactions from 1-1-2012 through 9-14-2012 (data obtained from here). The “Ext Amount” column shows the total dollar value of the transactions that failed ( i.e. Fail Qty * Share price ). The “Volume” column is the total number of shares traded in the same time period. The “% Volume” shows the percentage of shares that failed to deliver as a percentage of the total market volume. The table orders the data in descending order by the quantity of shares that were not delivered. Most of the companies at the top of the list no longer exist. For many of these companies, the quantity of shares that failed to deliver where many multiples of the number of shares traded during the same time period. This indicates massive naked short selling as many brokerages where unable to find shares to borrow before the settlement date. More information here.", "title": "" }, { "docid": "a16dce6dfae89c8957a21dedaf4f3116", "text": "\"Q: A: Everyone that is short is paying interest to the owners of the shares that the short seller borrowed. Although this quells your conundrum, this is also unrelated to the term. Interest in this context is just the number. In the options market, each contract also has an open interest, which tells you how many of that contract is being held. For your sake, think of it as \"\"how many are interested\"\", but really its just a completely different context.\"", "title": "" }, { "docid": "f3e8bee63310019eab33d01a57e57cdc", "text": "I agree with Mark. I was quite confuse about the short position at first but then I did a lot of learning and found out that as long as you have enough cash to cover your margin requirement you do not pay any interest since you do not have a debit on your margin balance. This is not true for a long position though, supposed you have 5k cash and 5k margin balance, if you buy 10K worth of stocks then you will need to pay interest on the 5k of the margin balance since it is a debit. Since shorting is done at a credit basis, you actually get interest from the transaction but you still may need to pay the borrowing fees for the stocks so they could simply balance each other out. I have shorted stocks twice through two different companies and neither time I noticed any interest charges. But make sure you have enough cash to cover your margin requirement, because once your margin balance is used to covered your position then interest would accrual. Learn.", "title": "" }, { "docid": "57c412fe4c06eb13496ba96739bf6d9f", "text": "No, there is no such list, as the other answers mention it is practically impossible to compile one. However you can see the institutional investors of a public company. MSN Money has this information available in a fair amount of details. For example see the Institutional Investors of GOOG", "title": "" }, { "docid": "98634ad20792e08f87659493195a9884", "text": "For a company listed on NASDAQ, the numbers are published on NASDAQ's site. The most recent settlement date was 4/30/2013, and you can see that it lists 27.5 million shares as held short. NASDAQ gets these numbers from FINRA member firms, which are required to submit them to the exchange twice a month: Each FINRA member firm is required to report its “total” short interest positions in all customer and proprietary accounts in NASDAQ-listed securities twice a month. These reports are used to calculate short interest in NASDAQ stocks. FINRA member firms are required to report their short positions as of settlement on (1) the 15th of each month, or the preceding business day if the 15th is not a business day, and (2) as of settlement on the last business day of the month.* The reports must be filed by the second business day after the reporting settlement date. FINRA compiles the short interest data and provides it for publication on the 8th business day after the reporting settlement date.", "title": "" }, { "docid": "d80b33775084481e3cce09445f2b3a83", "text": "I don't think that you will be able to find a list of every owner for a given stock. There are probably very few people who would know this. One source would be whoever sends out the shareholder meeting mailers. I suspect that the company itself would know this, the exchange to a lesser extent, and possibly the brokerage houses to a even lesser extent. Consider these resources:", "title": "" }, { "docid": "3c281b87286decfa69e99007af37e74c", "text": "Generally the number of shares of a U.S. exchange-listed stock which have been shorted are tracked by the exchange and reported monthly. This number is usually known as the open short interest. You may also see a short interest ratio, which is the short interest divided by the average daily volume for the stock. The short interest is available on some general stock data sites, such as Yahoo Finance (under Key Statistics) and dailyfinance.com (also on a Key Statistics subpage for the stock).", "title": "" }, { "docid": "04df881344f4003c31ca6fb7b9d516fe", "text": "This is a gross simplification as there are a few different ways to do this. The principle overall is the same though. To short a stock, you borrow X shares from a third party and sell them at the current price. You now owe the lender X shares but have the proceeds from the sale. If the share price falls you can buy back those shares at the new lower price, return them to the lender and pocket the difference. The risk comes when the share price goes the other way, you now owe the lender the new value of the shares, so have to find some way to cover the difference. This happened a while back when Porsche made a fortune buying shares in Volkswagen from short sellers, and the price unexpectedly rose.", "title": "" }, { "docid": "e4cd2570f701bfec4ecfd194f62cc6a1", "text": "\"If you can't find anyone to lend you the shares, then you can't short. You can attempt to raise the interest rate at which you will borrow at, in order to entice others to lend you their shares. In practice, broadcasting this information is pretty convoluted. If there aren't any stocks for you to buy back, then you have to buy back at a higher price. As in, place a limit buy order higher and higher until someone decides to sell to you. This affects your profit. Regarding the public ledger: This functions different in different markets. United States stock markets have an evolving body of regulations to alleviate the exact concerns you detailed, but Canada's or Dubai's stock markets would have different provisions. You make the assumption that it is an efficient process, but it is not and it is indeed ripe for abuse. In US stocks, the public ledger has a 3 business day delay between showing change of ownership. Many times brokers and clearing firms and other market participants allow a customer to go short with fake shares, with the idea that they will find real shares within the 3 business day time period to cover the position. During the time period that there is no real shares hitting the market, this is called a \"\"naked short\"\". The only legal system that attempts to deter this practice is the \"\"fail to deliver\"\" (FTD) list. If someone fails to deliver, that means there is a short position active with fake shares for which no real shares have been borrowed against. Too many FTD's allow for a short selling restriction to be placed, meaning nobody else can be short, and existing short sellers may be forced to cover.\"", "title": "" }, { "docid": "85d58a18e68588f99c66ec5f8a8d3e2f", "text": "Adding to the answers above, there is another source of risk: if one of the companies you are short receives a bid to be purchased by another company, the price will most probably rocket...", "title": "" }, { "docid": "da3bb20b815bd711a1d70bb82fd9fd3f", "text": "In general you cannot. Once the security is no longer listed on the exchange - it doesn't have to provide information to the exchange and regulators (unless it wants to be re-listed). That's one of the reasons companies go private - to keep their (financial and other) information private. If it was listed in 1999, and is no longer listed now - you can dig through SEC archives for the information. You can try and reach out to the company's investors' relations contact and see if they can help you with the specific information you're looking for.", "title": "" }, { "docid": "82299a4415bac48fb7fee972fa61914a", "text": "Well, if the short seller has to pay the dividend out of their pocket, what happens to the dividend the company paid out ?? Sounds like there are 2 divdends floating around, the short's, and the company's, but only 1 share of stock.", "title": "" } ]
fiqa
af0824c33b81adf9c8bed74599c61f31
Bollinger Bands and TRENDING market
[ { "docid": "bb86fdbd4207397614d3cabf39341e3a", "text": "If upper and Bollinger bands either converge ... or diverge ..., does that mean the market is TRENDING? No - Bollinger bands measure volatility, which is an measure of how much variation there is in the price of the instrument. It does not indicate a trend which means that the instrument tends to move in a consistent direction. When Bollinger bands are close together, that means volatility is relatively low, and vice-versa. They can be interpreted as signals that a stock might move in one direction or the other, but they are not a measure of directional movement.", "title": "" }, { "docid": "ae8c27df0a971c09f6cf667764b6654e", "text": "If upper and bollinger bands either converge (both bands are getting more and more close together) or diverge (both bands are getting more and more away from each other), does that mean the market is TRENDING? The answer is no. The divergence or convergence of BB-upper & lower band does not indicate if the market is trending or not. It only indicated if volatility is increasing or decreasing. Or is market trending only in case if both bands, upper and lower, are parallel and at the same time NOT horizontal? The answer is yes. To understand the reason consider that BB is constructed from a central Moving Average along with standard deviation. Upper Band=MA+2*SD, Lower Band=MA-2*SD. A moving average is a trend following indicator and volatility has nothing to do with trend (as SD only measures the price movement around the mean). Which essentially means BB has trend following qualities. The upper and lower bands remain more or less parallel in between band contraction and expansion. Refer below: You shall see distinctly phases when BB bands are not parallel and are parallel and not horizontal. As mentioned above, when BB bands are expanding or contracting they do not give indication of the trend direction. When they are parallel, close or apart and not horizontal, they provide a good directional bias through the general slope. Though a more effective method to determine trend and its direction is the central MA of BB. Again, refer below: Here you can see that some portion of the bands are parallel and more or less horizontal. The price action would tell you that the stock is now range-bound as opposed to trending. The primary use of the BB bands are to gauge volatility as @misantroop stated. The primary trend direction is usually derived from the central MA.", "title": "" }, { "docid": "154e5b97bf17dc53dd0a7284d18974a6", "text": "Bollinger Bands are placed standard deviations away from the moving average. Therefore if the price is volatile, the bands diverge from the mean. During consolidation the bands would converge. They do not provide a clear indication of whether the price is trending or not.", "title": "" } ]
[ { "docid": "aac2caec6fecd0f57171af020c1cdb99", "text": "No, it is just normal sideways action. Think of this week kind of like October 14th - October 20th. It is a day traders week. If you're not day trading then either do after hours trading at the second of the news, or buy/sell on thursday (i'm bullish). This is normal market activity. I wouldn't consider it out of the ordinary. When there is sideways action there is always good times to both buy and sell, if you realize it. For example, today is the perfect day to buy ... maybe when $SPX is 1240-1244.", "title": "" }, { "docid": "5db2500544c713428b4b849702c8e351", "text": "In order to see whether you can buy or sell some given quantity of a stock at the current bid price, you need a counterparty (a buyer) who is willing to buy the number of stocks you are wishing to offload. To see whether such a counterparty exists, you can look at the stock's order book, or level two feed. The order book shows all the people who have placed buy or sell orders, the price they are willing to pay, and the quantity they demand at that price. Here is the order book from earlier this morning for the British pharmaceutical company, GlaxoSmithKline PLC. Let's start by looking at the left-hand blue part of the book, beneath the yellow strip. This is called the Buy side. The book is sorted with the highest price at the top, because this is the best price that a seller can presently obtain. If several buyers bid at the same price, then the oldest entry on the book takes precedence. You can see we have five buyers each willing to pay 1543.0 p (that's 1543 British pence, or £15.43) per share. Therefore the current bid price for this instrument is 1543.0. The first buyer wants 175 shares, the next, 300, and so on. The total volume that is demanded at 1543.0p is 2435 shares. This information is summarized on the yellow strip: 5 buyers, total volume of 2435, at 1543.0. These are all buyers who want to buy right now and the exchange will make the trade happen immediately if you put in a sell order for 1543.0 p or less. If you want to sell 2435 shares or fewer, you are good to go. The important thing to note is that once you sell these bidders a total of 2435 shares, then their orders are fulfilled and they will be removed from the order book. At this point, the next bidder is promoted up the book; but his price is 1542.5, 0.5 p lower than before. Absent any further changes to the order book, the bid price will decrease to 1542.5 p. This makes sense because you are selling a lot of shares so you'd expect the market price to be depressed. This information will be disseminated to the level one feed and the level one graph of the stock price will be updated. Thus if you have more than 2435 shares to sell, you cannot expect to execute your order at the bid price in one go. Of course, the more shares you are trying to get rid of, the further down the buy side you will have to go. In reality for a highly liquid stock as this, the order book receives many amendments per second and it is unlikely that your trade would make much difference. On the right hand side of the display you can see the recent trades: these are the times the trades were done (or notified to the exchange), the price of the trade, the volume and the trade type (AT means automatic trade). GlaxoSmithKline is a highly liquid stock with many willing buyers and sellers. But some stocks are less liquid. In order to enable traders to find a counterparty at short notice, exchanges often require less liquid stocks to have market makers. A market maker places buy and sell orders simultaneously, with a spread between the two prices so that they can profit from each transaction. For instance Diurnal Group PLC has had no trades today and no quotes. It has a more complicated order book, enabling both ordinary buyers and sellers to list if they wish, but market makers are separated out at the top. Here you can see that three market makers are providing liquidity on this stock, Peel Hunt (PEEL), Numis (NUMS) and Winterflood (WINS). They have a very unpalatable spread of over 5% between their bid and offer prices. Further in each case the sum total that they are willing to trade is 3000 shares. If you have more than three thousand Dirunal Group shares to sell, you would have to wait for the market makers to come back with a new quote after you'd sold the first 3000.", "title": "" }, { "docid": "9a75ef672f18664183b4a36f7caf546b", "text": "a) the quick answer to your correlation is quantitative easing. basically the central bank has been devaluing the US dollar, making the prices of all goods increase (including stocks.) the stock market appear to have recovered from 2009 lows but its mainly an illusion. anyway the QE packages are very known when the correlation is not there, that means other meaningful things are happening such as better corporate earnings and real growth. b) the thinkorswim platform has charts for dollar futures, symbol /dx", "title": "" }, { "docid": "6e565dff7908157a23a049aca8e6aa30", "text": "No, and using a 37 year old formula in finance that is as simple as: should make it obvious technical analysis is more of a game for retail traders than investment advice. When it comes to currencies, there are a myriad of macroeconomic occurrences that do not follow a predictable timescale. Using indicators like RSI on any time frame will not magically illuminate broad human psychology and give you an edge. It is theoretically possible for a single public stock's price to be driven by a range of technical traders who all buy at RSI 30 and sell at RSI 70, after becoming a favorite stock on social media, but it is infinitely more likely for all market participants to have completely different goals.", "title": "" }, { "docid": "f1ec0ea7df028b05d375bd3ee26928e6", "text": "Most reflationary policies are talking about stopping, so hopefully in 2018 the CBs will stopping buying so much. BOJ is rethinking their policy of buying treasuries when our US yields start to rise (to shrink them and protect their currency). So hopefully once we get past global QE, things can get back to a more “normal” status. As far as advice on finding value...err...good luck? [Growth of Monetary Base and M2 chart in article](https://www.google.com/amp/s/seekingalpha.com/amp/article/4113280-federal-reserve-never-printed-money-part) Also look at how the money multiplier is shrinking.", "title": "" }, { "docid": "90f3ac4042a941d61e7a35f1938326dc", "text": "\"The Securities Industry and Financial Markets Association (SIFMA) publishes these and other relevant data on their Statistics page, in the \"\"Treasury & Agency\"\" section. The volume spreadsheet contains annual and monthly data with bins for varying maturities. These data only go back as far as January 2001 (in most cases). SIFMA also publishes treasury issuances with monthly data for bills, notes, bonds, etc. going back as far as January 1980. Most of this information comes from the Daily Treasury Statements, so that's another source of specific information that you could aggregate yourself. Somewhere I have a parser for the historical data (since the Treasury doesn't provide it directly; it's only available as daily text files). I'll post it if I can find it. It's buried somewhere at home, I think.\"", "title": "" }, { "docid": "f5e9d8c836e622e966667ee335b6d668", "text": "I don't think retail cares so much about being taken for a few bps here and there, but more so about the insane volatility that is the new normal in markets. This vol., which in many cases can be tracked back to HFT, has had a negative feedback loop that resulted in lower volumes across the board. I don't think retail cares about a few bps here and there, but if the entire system is based on trust in market efficiency, and computers make them less efficient by purposefully manipulating the system, retail might just not chose to play any more. Think of it like baseball vs. football. Football has salary caps, and, as such, all teams have a fair shot at winning every year, baseball doesn't, and a few teams with the biggest budgets consistently win year over year. Yeah, it's great if you're a Yankees, Red Sox, Giants or Phillies fan, but many other cities in the country don't care about baseball much anymore and favor football. Look at viewership stats by market over time. HFT is the same way, it's great if you have the money to compete in that system, but by destroying the integrity of the system itself, many participants just stop caring as much and go elsewhere...", "title": "" }, { "docid": "e4f3aface41cde6730131dcf5e91dbab", "text": "Yes it is possible but with a caveat. It is a pattern that can be observed in many lightly traded stocks that usually have a small market cap. I am talking about a stock that trades less than 2,000 shares per day on average.", "title": "" }, { "docid": "200210b493be3700afa3184f92fdd8aa", "text": "Agree with some of the posts above - Barchart is a good source for finding unusual options activity and also open interest -https://www.barchart.com/options/open-interest-change", "title": "" }, { "docid": "a3c1598e7c8cc2ad85bf254e80449f30", "text": "\"There are stocks that have held 100% of the exact same trend (bull or bear) on a date or date range for years. While history of course doesn't guarantee that the trend will hold for the current year, that fact itself is distinct from the question of whether history is an *indicator* worth building a thesis off of. The problem is if and when someone thinks \"\"indicator\"\" is equivalent to \"\"definitive answer\"\". Answer 2: A dozen big algo traders have disproven this notion. Answer 3: Price is not only price action itself. It's calendar, evens, binaries, cyclical psychology, etc.\"", "title": "" }, { "docid": "1417779afe385704661db0ac0cd35bc2", "text": "\"Since these indices only try to follow VIX and don't have the underlying constituents (as the constituents don't really exist in most meaningful senses) they will always deviate from the exact numbers but should follow the general pattern. You're right, however, in stating that the graphs that you have presented are substantially different and look like the indices other than VIX are always decreasing. The problem with this analysis is that the basis of your graphs is different; they all start at different dates... We can fix this by putting them all on the same graph: this shows that the funds did broadly follow VIX over the period (5 years) and this also encompasses a time when some of the funds started. The funds do decline faster than VIX from the beginning of 2012 onward and I had a theory for why so I grabbed a graph for that period. My theory was that, since volatility had fallen massively after the throes of the financial crisis there was less money to be made from betting on (investing in?) volatility and so the assets invested in the funds had fallen making them smaller in comparison to their 2011-2012 basis. Here we see that the funds are again closely following VIX until the beginning of 2016 where they again diverged lower as volatility fell, probably again as a result of withdrawals of capital as VIX returns fell. A tighter graph may show this again as the gap seems to be narrowing as people look to bet on volatility due to recent events. So... if the funds are basically following VIX, why has VIX been falling consistently over this time? Increased certainty in the markets and a return to growth (or at least lower negative growth) in most economies, particularly western economies where the majority of market investment occurs, and a reduction in the risk of European countries defaulting, particularly Portugal, Ireland, Greece, and Spain; the \"\"PIGS\"\" countries has resulted in lower volatility and a return to normal(ish) market conditions. In summary the funds are basically following VIX but their values are based on their underlying capital. This underlying capital has been falling as returns on volatility have been falling resulting in their diverging from VIX whilst broadly following it on the new basis.\"", "title": "" }, { "docid": "9ffa2801a53684aa4778439927170236", "text": "As others have pointed out, the value of Apple's stock and the NASDAQ are most likely highly correlated for a number of reasons, not least among them the fact that Apple is part of the NASDAQ. However, because numerous factors affect the entire market, or at least a significant subset of it, it makes sense to develop a strategy to remove all of these factors without resorting to use of an index. Using an index to remove the effect of these factors might be a good idea, but you run the risk of potentially introducing other factors that affect the index, but not Apple. I don't know what those would be, but it's a valid theoretical concern. In your question, you said you wanted to subtract them from each other, and only see an Apple curve moving around a horizontal line. The basic strategy I plan to use is similar but even simpler. Instead of graphing Apple's stock price, we can plot the difference between its stock price on business day t and business day t-1, which gives us this graph, which is essentially what you're looking for: While this is only the preliminaries, it should give you a basic idea of one procedure that's used extensively to do just what you're asking. I don't know of a website that will automatically give you such a metric, but you could download the price data and use Excel, Stata, etc. to analyze this. The reasoning behind this methodology builds heavily on time series econometrics, which for the sake of simplicity I won't go into in great detail, but I'll provide a brief explanation to satisfy the curious. In simple econometrics, most time series are approximated by a mathematical process comprised of several components: In the simplest case, the equations for a time series containing one or more of the above components are of the form that taking the first difference (the procedure I used above) will leave only the random component. However, if you want to pursue this rigorously, you would first perform a set of tests to determine if these components exist and if differencing is the best procedure to remove those that are present. Once you've reduced the series to its random component, you can use that component to examine how the process underlying the stock price has changed over the years. In my example, I highlighted Steve Jobs' death on the chart because it's one factor that may have led to the increased standard deviation/volatility of Apple's stock price. Although charts are somewhat subjective, it appears that the volatility was already increasing before his death, which could reflect other factors or the increasing expectation that he wouldn't be running the company in the near future, for whatever reason. My discussion of time series decomposition and the definitions of various components relies heavily on Walter Ender's text Applied Econometric Time Series. If you're interested, simple mathematical representations and a few relevant graphs are found on pages 1-3. Another related procedure would be to take the logarithm of the quotient of the current day's price and the previous day's price. In Apple's case, doing so yields this graph: This reduces the overall magnitude of the values and allows you to see potential outliers more clearly. This produces a similar effect to the difference taken above because the log of a quotient is the same as the difference of the logs The significant drop depicted during the year 2000 occurred between September 28th and September 29th, where the stock price dropped from 26.36 to 12.69. Apart from the general environment of the dot-com bubble bursting, I'm not sure why this occurred. Another excellent resource for time series econometrics is James Hamilton's book, Time Series Analysis. It's considered a classic in the field of econometrics, although similar to Enders' book, it's fairly advanced for most investors. I used Stata to generate the graphs above with data from Yahoo! Finance: There are a couple of nuances in this code related to how I defined the time series and the presence of weekends, but they don't affect the overall concept. For a robust analysis, I would make a few quick tweaks that would make the graphs less appealing without more work, but would allow for more accurate econometrics.", "title": "" }, { "docid": "c3dab5f5b1e022dab0028cec8b0265ad", "text": "That is called a 'volume chart'. There are many interactive charts available for the purpose. Here is clear example. (just for demonstration but this is for India only) 1) Yahoo Finance 2) Google Finance 3) And many more Usually, the stock volume density is presented together (below it) with normal price vs time chart. Note: There is a friendly site about topics like this. Quant.stackexchange.com. Think of checking it out.", "title": "" }, { "docid": "7ef7559df647b9ac76b8ec7d324bbb4e", "text": "NUGT and DUST both track GDX with triple leverage, but in opposite directions. GDX has been rising steadily throughout 2016, and certainly since over the last month. DUST experiences much higher volume when GDX is in a downward trend, as it was from 2013-2016. I think you'll see the same thing with DRIP and GUSH when oil has been moving steadily in one direction or the other. This is really a reflection of the herd mentality to jump in when things look like they're going a particular direction.", "title": "" }, { "docid": "677d029fc911b655f13856941d36ee06", "text": "I use StockCharts for spread charting. To take your question as an example, here is the chart of Apple against Nasdaq.", "title": "" } ]
fiqa
f07a7cf7932ea01bcd9ad43acb4227c2
Using pivot points to trade in the short term
[ { "docid": "ea3648b0db4a1357b82c70a4842fbd43", "text": "Pivots Points are significant levels technical analysts can use to determine directional movement, support and resistance. Pivot Points use the prior period's high, low and close to formulate future support and resistance. In this regard, Pivot Points are predictive or leading indicators. There are at least five different versions of Pivot Points. I will focus on Standard Pivot Points here as they are the simplest. If you are looking to trade off daily charts you would work out your Pivot Points from the prior month's data. For example, Pivot Points for first trading day of February would be based on the high, low and close for January. They remain the same for the entire month of February. New Pivot Points would then be calculated on the first trading day of March using the high, low and close for February. To work out the Standard Pivot Points you use the High, Low and Close from the previous period (i.e. for daily charts it would be from the previous month) in the following formulas: You will now have 5 horizontal lines: P, R1, R2, S1 and S2 which will set the general tone for price action over the next month. A move above the Pivot Point P suggests strength with a target to the first resistance R1. A break above first resistance shows even more strength with a target to the second resistance level R2. The converse is true on the downside. A move below the Pivot Point P suggests weakness with a target to the first support level S1. A break below the first support level shows even more weakness with a target to the second support level S2. The second resistance and support levels (R2 & S2) can also be used to identify potentially overbought and oversold situations. A move above the second resistance level R2 would show strength, but it would also indicate an overbought situation that could give way to a pullback. Similarly, a move below the second support level S2 would show weakness, but would also suggest a short-term oversold condition that could give way to a bounce. This could be used together with a momentum indicator such as RSI or Stochastic to confirm overbought or oversold conditions. Pivot Points offer a methodology to determine price direction and then set support and resistance levels, however, it is important to confirm Pivot Point signals with other technical analysis indicators, such as candle stick reversal patterns, stochastic and general Support and Resistance Levels in the price action. These pivot points can be handy but I actually haven’t used them for trade setups and entries myself. I prefer to use candle sticks together with stochastic to determine potential turning points and then take out trades based on these. You can then use the Pivot Points Resistance and Support levels to help you estimate profit targets or areas to start becoming cautious and start tightening your stops. Say, for example, you have gone long from a signal you got a few days ago, you are now in profit and the price is now approaching R2 whilst the Stochastic is approaching overbought, you might want to start tightening your stop loss as you might expect some weakness in the price in the near future. If prices continue up you keep increasing your profits, if prices do reverse then you keep the majority of your existing profits. This would become part of your trade management. If you are after finding potential market turning points and take out trades based on these, then I would suggest using candlestick charting reversal patterns for your trade setups. The patterns I like to use most in my trading can be described as either the Hammer or One White Soldier for Bullish reversals and Shooting Star or One Black Crow for Bearish reversals. Below are diagrams of where to place your entries and exits on both Bullish and Bearish reversal patterns. Bullish Reversal Pattern So after some period of weakness in the price you would look for a bullish day where the price closes above the previous day’s high, you place your buy order here just before market close and place your initial stop just below the low of the day. You would apply this either for an uptrending stock where the price has retracted from or near the trendline or Moving Average, or a ranging stock where price is bouncing off the support line. The trade is reinforced if the Stochastic is in or near the oversold and crossing back upwards, volume on the up day is higher than volume on the down days, and the market as a whole is moving up as well. The benefit with this entry is that you are in early so you capture any bullish move up at the open of the next day, such as gaps. The drawbacks are that you need to be in front of your screen before market close to get your price close to the market close and you may get whipsawed if prices reverse at the open of the next day, thus being stopped out with a small loss. As the price moves up you would move your stop loss to just below the low of each day. Alternative Bullish Reversal Entry An alternative, entry would be to wait for after market close and then start your analysis (easier to do after market close than whilst the market is open and less emotions involved). Place a stop buy order to buy at the open of next trading day just above the high of the bullish green candle. Your stop is placed exactly the same, just below the low of the green bullish candle. The benefits of this alternative entry include you avoid the trade if the price reverses at the open of next day, thus avoiding a potential small loss (in other words you wait for further confirmation on the next trading day), and you avoid trading during market open hours where your emotions can get the better of you. I prefer to do my trading after market close so prefer this alternative. The drawback with this alternative is that you may miss out on bullish news prior to and at the next open, so miss out on some potential profits if prices do gap up at the open. This may also increase your loss on the trade if the prices gaps up then reverses and hits your stop on the same day. However, if you choose this method, then you will just need to incorporate this into your trading plan as potential slippage. Bearish Reversal Pattern So after some short period of strength in the price you would look for a bearish day where the price closes below the previous day’s low, you place your sell short order here just before market close and place your initial stop just above the high of the day. You would apply this either for an downtrending stock where the price has retracted from or near the trendline or Moving Average, or a ranging stock where price is bouncing off the resistance line. The trade is reinforced if the Stochastic is in or near the overbought and crossing back downwards, volume on the up day is higher than volume on the up days, and the market as a whole is moving down as well. The benefit with this entry is that you are in early so you capture any bearish move down at the open of the next day, such as gaps. The drawbacks are that you need to be in front of your screen before market close to get your price close to the market close and you may get whipsawed if prices reverse at the open of the next day, thus being stopped out with a small loss. As the price moves down you would move your stop loss to just above the high of each day. Alternative Bearish Reversal Entry An alternative, entry would be to wait for after market close and then start your analysis (easier to do after market close than whilst the market is open and less emotions involved). Place a stop sell short order to sell at the open of next trading day just below the low of the bearish red candle. Your stop is placed exactly the same, just above the high of the red bearish candle. The benefits of this alternative entry include you avoid the trade if the price reverses at the open of next day, thus avoiding a potential small loss (in other words you wait for further confirmation on the next trading day), and you avoid trading during market open hours where your emotions can get the better of you. I prefer to do my trading after market close so prefer this alternative. The drawback with this alternative is that you may miss out on bearish news prior to and at the next open, so miss out on some potential profits if prices do gap down at the open. This may also increase your loss on the trade if the prices gaps down then reverses and hits your stop on the same day. However, if you choose this method, then you will just need to incorporate this into your trading plan as potential slippage. You could also trade other candle stick patterns is similar ways. And with the long entries you can also use them to get into the market with longer term trend following strategies, you would usually just use a larger stop for longer term trading. To determine the size of your order you would use the price difference between your entry and your stop. You should not be risking more than 1% of your trading capital on any one trade. So if your trading capital is $20,000 your risk per trade should be $200. If you were looking to place your buy at 5.00 and had your initial stop at $4.60, you would divide $200 by $0.40 to get 500 stocks to buy. Using this form of money management you keep your losses down to a maximum of $200 (some trades may be a bit higher due to some slippage which you should allow for in your trading plan), which becomes your R-multiple. Your aim is to have your average win at 3R or higher (3 x your average loss), which will give you a positive expectancy even with a win ratio under 50%. Once you have written down your trading rules you can search stock charts for potential setups. When you find one you can backtest the chart for similar setup over the past few years. For each setup in the past jot down the prices you would have entered at, where you would have set your stop, work out your R, and go day by day, moving your stop as you go, and see where you would have been stopped out. Work out your profit or loss in terms of R for each setup and then add them up. If you get a positive R multiple, then this may be a good stock to trade on this setup. If you get a negative R multiple, then maybe give this stock a miss and look for the next setup. You can setup watch-lists of stocks that perform well for both long setups and short setups, and then trade these stocks when you get a new signal. It can take some time starting off, but once you have got your watch-lists for a particular setup, you just need to keep monitoring those stocks. You can create other watch-lists for other type of setups you have backtested as well.", "title": "" }, { "docid": "7d4848795afda7c738e5708fbb8937ab", "text": "What are Pivot Points? Pivot Points indicate price levels that are of significance in technical analysis of securities. Pivot Points are used to provide clarity for a trader as they are a predictive indicator of where a security might go. There are at least 6 different types of Pivot Points (Woodie Pivot Point, Fibonacci Pivot, Demark etc..) and they are different based on their formulas but generally serve the same concept. I will be answering your question using the Camarilla Pivot Point formula. Camarilla Pivot Point Formula Generally any Pivot Point formula uses a combination of the Open, High, Low and Close of the previous timeframe. Since you are technically a swing trader indicated by say between a couple of days to a couple of weeks, as I don't want to do day trading you should use a weekly 5 to 30 minute chart but you can also use a daily chart as well. So for example if you use a daily chart, you would use the Open, High, Low and Close of the previous day. Example of fictitious stock: MOSEX (Money Stack Exchange) 01/14/16: Open: 10.25, High: 12.55, Low: 9.65, Close: 11.50 On 01/15/16: R4 Level: 13.10, R3 Level: 12.30, R2 Level: 12.03, R1 Level: 11.77, Pivot Point: 11.23, S1 Level: 11.23, S2 Level: 10.97, S3 Level: 10.70, S4 Level: 9.91 R = Resistance, S = Support How to identify these Pivot Points? Most charting software already have built in overlays that will identify the pivot points for you but you can always find and draw them yourself with an annotation tool. Since we are using the Camarilla Pivot Point formula, the important Pivot Point levels are the R4 which is considered as the Breakout Pivot, the S4 which is considered as the Breakdown Pivot. R3 and S3 are Reversal Pivot Points. Once identify the Pivot Points how should you proceed in a trade? This is the million dollar question and without spoon feeding you requires you to come up with your own strategy. To distinguish yourself from being a novice and pro trader is to have a strategy in a trade. Now I don't really have the time to look for actual charts to provide examples with but generally this is what you should look for to proceed in a trade: Potential Buy/Short Signals: Potential Sell Signals: If a stock moves above the R3 Level but then crosses below it, this would be a sell signal. This is confirmed when their is a lower lower then the candle that first crosses below it. Sell a stock when S4 Level is confirmed. See above for the confirmation. Other Useful Tips: Use the Pivot Point as your support or resistance. The Pivot Point levels can be used for your stop loss. For example, with an S3 reversal buy signal, the S4 should be used as a stop loss. Conversely, the Pivot Point levels can also be used for your target prices. For example, with an S3 reversal buy signal, you should take some profits at R3 level. You should also use a combination of other indicators to give you more information to confirm if a signal is correct. Examples of a good combination is the RSI, MACD and Moving Averages. Read that book in my comment above!!", "title": "" } ]
[ { "docid": "6840ddecbf02e8c564ec38036cce7563", "text": "You can execute block trades on the options market and get exercised for shares to create a very large position in Energy Transfer Partners LP without moving the stock market. You can then place limit sell orders, after selling directly into the market and keep an overhang of low priced shares (the technical analysis traders won't know what you specifically are doing, and will call this 'resistance'). If you hit nice even numbers (multiples of 5, multiples of 10) with your sell orders, you can exacerbate selling as many market participants will have their own stop loss orders at those numbers, causing other people to sell at lower and lower prices automatically, and simultaneously keep your massive ask in effect. If your position is bigger than the demand then you can keep a stock lower. The secondary market doesn't inherently affect a company in any way. But many companies have borrowed against the price of their shares, and if you get the share price low enough they can get suddenly margin called and be unable to service their existing debt. You will also lose a lot of money doing this, so you can also buy puts along the way or attempt to execute a collar to lower your own losses. The collar strategy is nice because it is unlikely that other traders and analysts will notice what you are doing, since there are calls, puts and share orders involved in creating it. One person may notice the block trade for the calls initially, but nobody will notice it is part of a larger strategy with multiple legs. With the share position, you may also be able to vote on some things, but that solely depends on the conditions of the shares.", "title": "" }, { "docid": "b1706d4b8a932bdbaf455068acf63dfa", "text": "I've been a retail trader for close to 7 years and while I have a specialized futures account, I use Interactive Brokers for my other trading. They charge per share or contract rather than per trade (good for smaller accounts or if you want to piece into and out of positions). You can also trade just about anything. Futures, options, options on futures, individual stocks, ETFs, Bonds (futures), currencies. The interface is pretty good as well. I have seperate charts (eSignal) so I'm not sure how good their charting is", "title": "" }, { "docid": "1276e1f81743f47e0912964e2eba3635", "text": "\"Your strategy fails to control risk. Your \"\"inversed crash\"\" is called a rally. And These kind of things often turn into bigger rallies because of short squeezes, when all the people that are shorting a stock are forced to close their stock because of margin calls - its not that shorts \"\"scramble\"\" to close their position, the broker AUTOMATICALLY closes your short positions with market orders and you are stuck with the loss. So no, your \"\"trick\"\" is not enough. There are better ways to profit from a bearish outlook.\"", "title": "" }, { "docid": "36b8b1af37a467e92fa7713c0d929db8", "text": "How so? If i sell short, then i make a profit only if the price goes down so i can buy back at a lower price. Yes, but if the price is going up then you would go long instead. Shorting a stock (or any other asset) allows you to profit when the price is going down. Going long allows you to profit when the price is going up. In the opposite cases, you lose money. In order to make a profit in either of those situations, you have to accurately assess which way the price will trade over the period of time you are dealing with. If you make the wrong judgment, then you lose money because you'll either sell for a lower price than you bought (if you went long), or have to buy back at a higher price than you sold for (if you went short). In either case, unless the trader can live with making a short-term loss and recouperating it later, one needs a good stop-loss strategy.", "title": "" }, { "docid": "20a7eb90fb4fb80f4664b2eeed2ac630", "text": "First, I want to point out that your question contains an assumption. Does anyone make significant money trading low volume stocks? I'm not sure this is the case - I've never heard of a hedge fund trading in the pink sheets, for example. Second, if your assumption is valid, here are a few ideas how it might work: Accumulate slowly, exit slowly. This won't work for short-term swings, but if you feel like a low-volume stock will be a longer-term winner, you can accumulate a sizable portion in small enough chunks not to swing the price (and then slowly unwind your position when the price has increased sufficiently). Create additional buyers/sellers. Your frustration may be one of the reasons low-volume stock is so full of scammers pumping and dumping (read any investing message board to see examples of this). If you can scare holders of the stock into selling, you can buy significant portions without driving the stock price up. Similarly, if you can convince people to buy the stock, you can unload without destroying the price. This is (of course) morally and legally dubious, so I would not recommend this practice.", "title": "" }, { "docid": "44ba2db5b1aef4a7e750473944a5d3ab", "text": "True, but the number of investors who are successful with this strategy is negligible. You are basically just trading return for volatility. A well built portfolio will be better than trying to time the market, at least historically.", "title": "" }, { "docid": "1f96225870d0c006f8484d9d5ae1d38d", "text": "There are options on options. Some derivative instruments assets ARE options (some ETFs), and you are able to buy shares of those ETFs OR options on those ETFs. Secondly, options are just a contract, so you just need to write one up and find someone to buy the contract. The only thing is that the exchange won't facilitate it, so you will have liquidity issues. What you want to do is a diagonal / calendar spread. Buy the back month option, sell the front month option, this isn't a foreign concept and nobody is stopping you. Since you have extra leverage on your LEAPS, then you just need to change the balancing of your short leg to match the amount of leverage the leaps will provide. (so instead of buying,selling 1:1, you need to buy one leap and perhaps sell 5 puts)", "title": "" }, { "docid": "707b7a5a7259093c1d03ce2ee737eda1", "text": "CFDs should not be used as a buy and hold strategy (which is risky enough doing with shares directly). However, with proper money and risk management and the proper use of stop losses, a medium term strategy is very plausible. I was using CFDs in the past over a short time period of usually between a couple of days to a couple is weeks, trying to catch small swings with very tight stops. I kept getting wipsawed due to my stops being too tight so had too many small loses for my few bigger wins. And yes I lost some money, almost $5k in one year. I have recently started a more medium term strategy with wider stops trying to catch trending stocks. I have only recently started this strategy and so far have 2 loses and 3 wins. Just remember that you do get charged a financing fee for holding long position overnight, buy for short position you actually get paid the funding fee for overnight positions. My broker charges the official interest rate + 2.5% for long positions and pays the official rate - 2.5% for short positions. So yes CFDs can be used for the longer term as long as you are implementing proper money and risk management and use stop losses. Just be aware of the implications of using margin and all the costs involved.", "title": "" }, { "docid": "bfb745490ac34704883d49a7836287d0", "text": "News-driven investors tend to be very short-term focussed investors. They often trade by using index futures (on the S&P 500 index for instance).", "title": "" }, { "docid": "53bb45d891a7bec4bad44ba09a8080bb", "text": "\"I'm just trying to visualize the costs of trading. Say I set up an account to trade something (forex, stock, even bitcoin) and I was going to let a random generator determine when I should buy or sell it. If I do this, I would assume I have an equal probability to make a profit or a loss. Your question is what a mathematician would call an \"\"ill-posed problem.\"\" It makes it a challenge to answer. The short answer is \"\"no.\"\" We will have to consider three broad cases for types of assets and two time intervals. Let us start with a very short time interval. The bid-ask spread covers the anticipated cost to the market maker of holding an asset bought in the market equal to the opportunity costs over the half-life of the holding period. A consequence of this is that you are nearly guaranteed to lose money if your time interval between trades is less than the half-life of the actual portfolio of the market maker. To use a dice analogy, imagine having to pay a fee per roll before you can gamble. You can win, but it will be biased toward losing. Now let us go to the extreme opposite time period, which is that you will buy now and sell one minute before you die. For stocks, you would have received the dividends plus any stocks you sold from mergers. Conversely, you would have had to pay the dividends on your short sales and received a gain on every short stock that went bankrupt. Because you have to pay interest on short sales and dividends passed, you will lose money on a net basis to the market maker. Maybe you are seeing a pattern here. The phrase \"\"market maker\"\" will come up a lot. Now let us look at currencies. In the long run, if the current fiat money policy regime holds, you will lose a lot of money. Deflation is not a big deal under a commodity money regime, but it is a problem under fiat money, so central banks avoid it. So your long currency holdings will depreciate. Your short would appreciate, except you have to pay interest on them at a rate greater than the rate of inflation to the market maker. Finally, for commodities, no one will allow perpetual holding of short positions in commodities because people want them delivered. Because insider knowledge is presumed under the commodities trading laws, a random investor would be at a giant disadvantage similar to what a chess player who played randomly would face against a grand master chess player. There is a very strong information asymmetry in commodity contracts. There are people who actually do know how much cotton there is in the world, how much is planted in the ground, and what the demand will be and that knowledge is not shared with the world at large. You would be fleeced. Can I also assume that probabilistically speaking, a trader cannot do worst than random? Say, if I had to guess the roll of a dice, my chance of being correct can't be less than 16.667%. A physicist, a con man, a magician and a statistician would tell you that dice rolls and coin tosses are not random. While we teach \"\"fair\"\" coins and \"\"fair\"\" dice in introductory college classes to simplify many complex ideas, they also do not exist. If you want to see a funny version of the dice roll game, watch the 1962 Japanese movie Zatoichi. It is an action movie, but it begins with a dice game. Consider adopting a Bayesian perspective on probability as it would be a healthier perspective based on how you are thinking about this problem. A \"\"frequency\"\" approach always assumes the null model is true, which is what you are doing. Had you tried this will real money, your model would have been falsified, but you still wouldn't know the true model. Yes, you can do much worse than 1/6th of the time. Even if you are trying to be \"\"fair,\"\" you have not accounted for the variance. Extending that logic, then for an inexperienced trader, is it right to say then that it's equally difficult to purposely make a loss then it is to purposely make a profit? Because if I can purposely make a loss, I would purposely just do the opposite of what I'm doing to make a profit. So in the dice example, if I can somehow lower my chances of winning below 16.6667%, it means I would simply need to bet on the other 5 numbers to give myself a better than 83% chance of winning. If the game were \"\"fair,\"\" but for things like forex the rules of the game are purposefully changed by the market maker to maximize long-run profitability. Under US law, forex is not regulated by anything other than common law. As a result, the market maker can state any price, including prices far from the market, with the intent to make a system used by actors losing systems, such as to trigger margin calls. The prices quoted by forex dealers in the US move loosely with the global rates, but vary enough that only the dealer should make money systematically. A fixed strategy would promote loss. You are assuming that only you know the odds and they would let you profit from your 83.33 percentage chance of winning. So then, is the costs of trading from a purely probabilistic point of view simply the transaction costs? No matter what, my chances cannot be worse than random and if my trading system has an edge that is greater than the percentage of the transaction that is transaction cost, then I am probabilistically likely to make a profit? No, the cost of trading is the opportunity cost of the money. The transaction costs are explicit costs, but you have ignored the implicit costs of foregone interest and foregone happiness using the money for other things. You will want to be careful here in understanding probability because the distribution of returns for all of these assets lack a first moment and so there cannot be a \"\"mean return.\"\" A modal return would be an intellectually more consistent perspective, implying you should use an \"\"all-or-nothing\"\" cost function to evaluate your methodology.\"", "title": "" }, { "docid": "cd0b25899dfe8a0d7965310d6cfc769b", "text": "Playing the markets is simple...always look for the sucker in the room and outsmart him. Of course if you can't tell who that sucker is it's probably you. If the strategy you described could make you rich, cnbc staff would all be billionaires. There are no shortcuts, do your research and decide on a strategy then stick to it in all weather or until you find a better one.", "title": "" }, { "docid": "66f5dd2e8ddbe22d20e0b4d81daef75f", "text": "I don't have a direct short position. It is a structured product linked to the performance of Tesla. I basically get a fixed coupon payment every quater and as long as Tesla doesn't move up more than 50% in the next half year I get my initial investment back plus the coupons. If it should move up more than 50% I lose that percentage of my initial investment", "title": "" }, { "docid": "baeda48ad38b88a95a6cbfd626419096", "text": "I've looked into Thinkorswim; my father uses it. Although better than eTrade, it wasn't quite what I was looking for. Interactive Brokers is a name I had heard a long time ago but forgotten. Thank you for that, it seems to be just what I need.", "title": "" }, { "docid": "9473f1224ae2b9d29972efbb1c722f79", "text": "Since Brad answered with a great reply, I'd like to offer another comment: Be careful with the results. Annualized returns of short term trading can produce some crazy results. For example, a 10% gain in a week isn't unheard of for individual stocks, but (1.1)^52 = 142. or a 14,100% return. This may be obvious, but may help those who aren't so familiar with the numbers to understand that data running less than a year isn't going to provide as much useful conclusion as longer term. Note: Even a year doesn't really reflect success in a given strategy.", "title": "" }, { "docid": "c4146082e5f8044c92c427f46a333df1", "text": "In India, as suggested above, short/long position can be taken either in F&O or Spot market. The F&O segment short/long can be kept open for appx. 3 months by taking position on the far contract. In intra-day/Spot market, usually the position has to be squared at the end of day or the broker will square it during expiry (forcibly). However, having said that, it is a broker specific feature, as per National Stock Exchange (NSE) or Bombay Stock Exchange (BSE) any transaction has to be settled at the end of T+2 days (T being the trade day). Some brokers allow intra-day positions to be open for T+1 or T+2 days as long as the margin is provided. This is a broker specific discretion as the actual settlement is on T+2 (or in some cases as the exchange specifies). So, in general, to short a stock for a longer time, F&O segment should be used.", "title": "" } ]
fiqa
ea67a9fbc6432d2c35dd7ee6034b0961
How can I diversify $7k across ETFs and stocks?
[ { "docid": "bcfdc5548584e2092b703b1b86d553f7", "text": "You don't really have a lot of money, and that isn't a criticism as much as that you are limited to diversification. For example, I would estimate you can only have one or two stocks for a buy-write scheme. Secondly you may be only to buy one fund with a high minimum investment, and a second fund with a smaller minimum investment. Thirdly there is not a whole lot of money to make a large difference. One options might be to look at iShares since your are with Fidelity. Trading those are commission free and the minimum investment is one share. They offer many sector funds. Since you were in a CD ladder you might be looking for stability of principle. If so you can look at USMV and PFF. If you can tolerate a little more volatility DGRO. Having said that you seem interested in doing some buy-writes. Why not mix and match? Pick a stock, like INTC (for example not a recommendation), and buy-write with half the money and some combination of iShares for the rest.", "title": "" }, { "docid": "8b90dc3f316e64f6d93f0fd4e355334d", "text": "An index fund is inherently diversified across its index -- no one stock will either make or break the results. In that case it's a matter of picking the index(es) you want to put the money into. ETFs do permit smaller initial purchases, which would let you do a reasonable mix of sectors. (That seems to be the one advantage of ETFs over traditional funds...?)", "title": "" }, { "docid": "22d57b67ca815daf49301d978bbff5b9", "text": "\"You may want to look into robo-investors like Wealthfront and Betterment. There are many others, just search for \"\"robo investor\"\".\"", "title": "" }, { "docid": "495225d04ffeab031a08f801216b4612", "text": "When you are starting out using a balanced fund can be quite advantageous. A balanced fund is represents a diversified portfolio in single fund. The primary advantage of using a balanced fund is that with it being a single fund it is easier to meet the initial investment minimum. Later once you have enough to transition to a portfolio of diversified funds you would sell the fund and buy the portfolio. With a custom portfolio, you will be better able to target your risk level and you might also be able to use lower cost funds. The other item to check is do any of the funds that you might be interested in for the diversified portfolio have lower initial investment option if you can commit to adding money on a specified basis (assuming that you are able to). Also there might be an ETF version of a mutual fund and for those the initial investment amount is just the share price. The one thing to be aware of is make sure that you can buy enough shares that you can rebalance (holding a single share makes it hard to sell some gain when rebalancing). I would stay away from individual stocks until you have a much larger portfolio, assuming that you want to invest with a diversified portfolio. The reason being that it takes a lot more money to create a diversified portfolio out of individual stocks since you have to buy whole shares. With a mutual fund or ETF, your underlying ownership of can be fractional with no issue as each fund share is going to map into a fraction of the various companies held and with mutual funds you can buy fractional shares of the fund itself.", "title": "" }, { "docid": "d41d8cd98f00b204e9800998ecf8427e", "text": "", "title": "" } ]
[ { "docid": "e3cc2326e8fa93452b5c41bfe54f0584", "text": "Right now, the unrealized appreciation of Vanguard Tax-Managed Small-Cap Fund Admiral Shares is 28.4% of NAV. As long as the fund delivers decent returns over the long term, is there anything stopping this amount from ballooning to, say, 90% fifty years hence? I'd have a heck of a time imagining how this grows to that high a number realistically. The inflows and outflows of the fund are a bigger question along with what kinds of changes are there to capital gains that may make the fund try to hold onto the stocks longer and minimize the tax burden. If this happens, won't new investors be scared away by the prospect of owing taxes on these gains? For example, a financial crisis or a superior new investment technology could lead investors to dump their shares of tax-managed index funds, triggering enormous capital-gains distributions. And if new investors are scared away, won't the fund be forced to sell its assets to cover redemptions (even if there is no disruptive event), leading to larger capital-gains distributions than in the past? Possibly but you have more than a few assumptions in this to my mind that I wonder how well are you estimating the probability of this happening. Finally, do ETFs avoid this problem (assuming it is a problem)? Yes, ETFs have creation and redemption units that allow for in-kind transactions and thus there isn't a selling of the stock. However, if one wants to pull out various unlikely scenarios then there is the potential of the market being shut down for an extended period of time that would prevent one from selling shares of the ETF that may or may not be as applicable as open-end fund shares. I would however suggest researching if there are hybrid funds that mix open-end fund shares with ETF shares which could be an alternative here.", "title": "" }, { "docid": "173ef301437d7f08e22684184e2cd0b5", "text": "\"There's already an excellent answer here from @BenMiller, but I wanted to expand a bit on Types of Investments with some additional actionable information. You can invest in stocks, bonds, mutual funds (which are simply collections of stocks and bonds), bank accounts, precious metals, and many other things. Discussing all of these investments in one answer is too broad, but my recommendation is this: If you are investing for retirement, you should be investing in the stock market. However, picking individual stocks is too risky; you need to be diversified in a lot of stocks. Stock mutual funds are a great way to invest in the stock market. So how does one go about actually investing in the stock market in a diversified way? What if you also want to diversify a bit into bonds? Fortunately, in the last several years, several products have come about that do just these things, and are targeted towards newer investors. These are often labeled \"\"robo-advisors\"\". Most even allow you to adjust your allocation according to your risk preferences. Here's a list of the ones I know about: While these products all purport to achieve similar goals of giving you an easy way to obtain a diversified portfolio according to your risk, they differ in the buckets of stocks and funds they put your money into; the careful investor would be wise to compare which specific ETFs they use (e.g. looking at their expense ratios, capitalization, and spreads).\"", "title": "" }, { "docid": "43efa4f1ce571c7f5ce6531d28dfee39", "text": "\"There are two umbrellas in investing: active management and passive management. Passive management is based on the idea \"\"you can't beat the market.\"\" Passive investors believe in the efficient markets hypothesis: \"\"the market interprets all information about an asset, so price is equal to underlying value\"\". Another idea in this field is that there's a minimum risk associated with any given return. You can't increase your expected return without assuming more risk. To see it graphically: As expected return goes up, so does risk. If we stat with a portfolio of 100 bonds, then remove 30 bonds and add 30 stocks, we'll have a portfolio that's 70% bonds/30% stocks. Turns out that this makes expected return increase and lower risk because of diversification. Markowitz showed that you could reduce the overall portfolio risk by adding a riskier, but uncorrelated, asset! Basically, if your entire portfolio is US stocks, then you'll lose money whenever US stocks fall. But, if you have half US stocks, quarter US bonds, and quarter European stocks, then even if the US market tanks, half your portfolio will be unaffected (theoretically). Adding different types of uncorrelated assets can reduce risk and increase returns. Let's tie this all together. We should get a variety of stocks to reduce our risk, and we can't beat the market by security selection. Ideally, we ought to buy nearly every stock in the market so that So what's our solution? Why, the exchange traded fund (ETF) of course! An ETF is basically a bunch of stocks that trade as a single ticker symbol. For example, consider the SPDR S&P 500 (SPY). You can purchase a unit of \"\"SPY\"\" and it will move up/down proportional to the S&P 500. This gives us diversification among stocks, to prevent any significant downside while limiting our upside. How do we diversify across asset classes? Luckily, we can purchase ETF's for almost anything: Gold ETF's (commodities), US bond ETF's (domestic bonds), International stock ETFs, Intl. bonds ETFs, etc. So, we can buy ETF's to give us exposure to various asset classes, thus diversifying among asset classes and within each asset class. Determining what % of our portfolio to put in any given asset class is known as asset allocation and some people say up to 90% of portfolio returns can be determined by asset allocation. That pretty much sums up passive management. The idea is to buy ETFs across asset classes and just leave them. You can readjust your portfolio holdings periodically, but otherwise there is no rapid trading. Now the other umbrella is active management. The unifying idea is that you can generate superior returns by stock selection. Active investors reject the idea of efficient markets. A classic and time proven strategy is value investing. After the collapse of 07/08, bank stocks greatly fell, but all the other stocks fell with them. Some stocks worth $100 were selling for $50. Value investors quickly snapped up these stocks because they had a margin of safety. Even if the stock didn't go back to 100, it could go up to $80 or $90 eventually, and investors profit. The main ideas in value investing are: have a big margin of safety, look at a company's fundamentals (earnings, book value, etc), and see if it promises adequate return. Coke has tremendous earnings and it's a great company, but it's so large that you're never going to make 20% profits on it annually, because it just can't grow that fast. Another field of active investing is technical analysis. As opposed to the \"\"fundamental analysis\"\" of value investing, technical analysis involves looking at charts for patterns, and looking at stock history to determine future paths. Things like resistance points and trend lines also play a role. Technical analysts believe that stocks are just ticker symbols and that you can use guidelines to predict where they're headed. Another type of active investing is day trading. This basically involves buying and selling stocks every hour or every minute or just at a rapid pace. Day traders don't hold onto investments for very long, and are always trying to predict the market in the short term and take advantage of it. Many individual investors are also day traders. The other question is, how do you choose a strategy? The short answer is: pick whatever works for you. The long answer is: Day trading and technical analysis is a lot of luck. If there are consistent systems for trading , then people are keeping them secret, because there is no book that you can read and become a consistent trader. High frequency trading (HFT) is an area where people basically mint money, but it s more technology and less actual investing, and would not be categorized as day trading. Benjamin Graham once said: In the short run, the market is a voting machine but in the long run it is a weighing machine. Value investing will work because there's evidence for it throughout history, but you need a certain temperament for it and most people don't have that. Furthermore, it takes a lot of time to adequately study stocks, and people with day jobs can't devote that kind of time. So there you have it. This is my opinion and by no means definitive, but I hope you have a starting point to continue your study. I included the theory in the beginning because there are too many monkeys on CNBC and the news who just don't understand fundamental economics and finance, and there's no sense in applying a theory until you can understand why it works and when it doesn't.\"", "title": "" }, { "docid": "d76148a24e5fe75e50c2a979fd8b7cd9", "text": "\"You said your strategy was to put it into a index fund. But then you asked about setting stock limits. I'm confused. Funds usually trade at their price at the end of the day, so you shouldn't try to time this at all. Just place your order. If you are buying ETFs, there is going to be so much volume on the market that your small trade is going to have no impact on the price. You should just place a market order. A market order is an order to buy or sell a stock at the current market price. A limit order is an order to buy or sell a security at a specific price. In the US, when you place a trade with any broker, you can either place a limit order or a market order. A market order just fills your order with the next best sellers in line. If you place an order for 100 shares, the sellers willing to sell 100 shares at the lowest price will be matched with your order (sometimes you may get 50 shares at one price and 50 shares at a slightly different price). If your stock has a lot of volatility and you place a market order for a small amount of shares, you will get the best price. If you place a limit order, you specify the price at which you want to buy shares. Your order will then only be filled with sellers willing to sell at that price or lower (i.e. they must be at least as good as you specified). This means you could place an order at a limit that does not get filled (the stock could move in a direction away from your limit price). If you really want to own the stock, you shouldn't use a limit order. You shouldn't only use a limit order if you want to tell your broker \"\"I will only buy this stock at this price or better.\"\" p.s. Every day that passes is NOT a waste. It's just a day that you've decided investing in cash is safer than investing in the market.\"", "title": "" }, { "docid": "26b9b598edbb51924bfdd3c6021e4650", "text": "\"If you are buying and selling mutual funds in the same family of funds (e.g. Vanguard), then you can set up an on-line account on the Vanguard website (www.vanguard.com) and it is easy: Vanguard offers a \"\"Transaction\"\" service that allows you to sell shares of VFINX, say, and buy shares of VBTLX, say, from the proceeds of the sale all in one swell foop. But, if you are holding the VFINX shares through your on-line account with, say, eTrade, then it depends on what services eTrade provides to you. Will it allow doing all that in one transaction, or will it wait for the cash to come from Vanguard, and then send the money back to Vanguard to invest in VBTLX? In any case, selling VFINX shares and investing the proceeds in PRWCX shares, say, cannot be done on the Vanguard site only; Vanguard will send the proceeds of the sale of the VFINX shares only to your bank account, not anywhere else. You then need to tell T. Rowe Price (where you presumably have an account already) that you want to invest $X in PRWCX shares and to withdraw the cash from your bank account. If you are doing it all through eTrade, then the money from the sale of VFINX goes from Vanguard to eTrade (into something called a sweep account, or maybe your cash account at eTrade) and you invest it in PRWCX after appropriate delays in receiving the money from Vanguard into eTrade, etc. If your cash account (bank or eTrade) has enough of a balance, you could sell VFINX and buy PRWCX on the same day. where the purchase is made from the money in the cash account and replaced a few days later by the proceeds from Vanguard. Bouncing of checks (or inability to act on a hot tip to invest in something) in the interim is your problem; not the bank's or eTrade's.\"", "title": "" }, { "docid": "6ca55b8facce5ce4bdb899ce505e1d9c", "text": "I think you need a diversified portfolio, and index funds can be a part of that. Make sure that you understand the composition of your funds and that they are in fact invested in different investments.", "title": "" }, { "docid": "7f9f73f44252859c960d718bd477fefc", "text": "ETFs offer the flexibility of stocks while retaining many of the benefits of mutual funds. Since an ETF is an actual fund, it has the diversification of its potentially many underlying securities. You can find ETFs with stocks at various market caps and style categories. You can have bond or mixed ETFs. You can even get ETFs with equal or fundamental weighting. In short, all the variety benefits of mutual funds. ETFs are typically much less expensive than mutual funds both in terms of management fees (expense ratio) and taxable gains. Most of them are not actively managed; instead they follow an index and therefore have a low turnover. A mutual fund may actively trade and, if not balanced with a loss, will generate capital gains that you pay taxes on. An ETF will produce gains only when shifting to keep inline with the index or you yourself sell. As a reminder: while expense ratio always matters, capital gains and dividends don't matter if the ETF or mutual fund is in a tax-advantaged account. ETFs have no load fees. Instead, because you trade it like a stock, you will pay a commission. Commissions are straight, up-front and perfectly clear. Much easier to understand than the various ways funds might charge you. There are no account minimums to entry with ETFs, but you will need to buy complete shares. Only a few places allow partial shares. It is generally harder to dollar-cost average into an ETF with regular automated investments. Also, like trading stocks, you can do those fancy things like selling short, buying on margin, options, etc. And you can pay attention to the price fluctuations throughout the day if you really want to. Things to make you pause: if you buy (no-load) mutual funds through the parent company, you'll get them at no commission. Many brokerages have No Transaction Fee (NTF) agreements with companies so that you can buy many funds for free. Still look out for that expense ratio though (which is probably paying for that NTF advantage). As sort of a middle ground: index funds can have very low expense ratios, track the same index as an ETF, can be tax-efficient or tax-managed, free to purchase, easy to dollar-cost average and easier to automate/understand. Further reading:", "title": "" }, { "docid": "f3ea138a007df8c0daf625f11ca5d011", "text": "OK, VERY glad you get that idea! The problem with the ETF is: it's the monkeys-throwing-darts method. If the average (dollar-weighted) member stock in the ETF goes up, you win, but if half of them go under, and half succeed, over some time periods you will lose (and win over others). I guess my POV is: if you can't do serious research into the expected success of an individual company, maybe it's too risky to even try betting on the whole group. YMMV. The problem with your investment plan is: you are depending on luck, and the assumption the group will increase in value over your investment period. I prefer research over hope.", "title": "" }, { "docid": "aee0a5e85294795dadddd5d26a81f36f", "text": "\"If you are making that much, don't waste your time here. Pay a few hundred bucks for a consultation with a fee-only certified financial planner. (Not one of the \"\"free\"\" services, which make their money via commissions on sales and are thus motivated to direct you to whatever gets them the largest commission.) In fact, in your bracket you might want to consider hiring someone to manage your portfolio for you on an ongoing basis. A good one will start by asking what your goals are, over what timeframe, and will help you determine how you feel about risk and volatility. From that information they will be able to suggest a strategic mix of kinds of investments which is balanced for those constraints.\"", "title": "" }, { "docid": "b611ab7be380f386dbf483a0cc9637eb", "text": "I personally invest in 4 different ETFs. I have $1000 to invest every month. To save on transaction costs, I invest that sum in only one ETF each month, the one that is most underweight at the time. For example, I invest in XIC (30%), VTI (30%), VEA (30%), and VWO (10%). One month, I'll buy XIC, next month VTA, next month, VEA, then XIC again. Eventually I'll buy VWO when it's $1000 underweight. If one ETF tanks, I may buy it twice in a row to reach my target allocation, or if it shoots up, I may skip buying it for a while. My actual asset allocation never ends up looking exactly like the target, but it trends towards it. And I only pay one commission a month. If this is in a tax-sheltered account (main TFSA or RRSP), another option is to invest in no-load index mutual funds that match the ETFs each month (assuming there's no commission to buy them). Once they reach a certain amount, sell and buy the equivalent ETFs. This is not a good approach in a non-registered account because you will have to pay tax on any capital gains when selling the mutual funds.", "title": "" }, { "docid": "fed470fd16f9984959a9e9b43592c87d", "text": "\"If the OP is saving 33% if his/her current income, he/she doesn't want or need yet more income from investments right now. The advice on \"\"diversifying\"\" in the other answers is the standard \"\"investment advisor\"\" response to beginner's questions, and has two advantages for the advisor: (1) they won't get sued for giving bad advice and (2) they can make a nice fat commission selling you some very-average-performance products (and note they are selling you \"\"investment industry products,\"\" not necessarily \"\"good investment opportunities\"\" - advisors get paid commission and bonuses for selling more stuff, not for selling good stuff). My advice would be to drip-feed some of your excess income into the emerging market sector (maybe 1/3 or 1/4 of the excess), with the intention of leaving it there untouched for up to 20 or 30 years, if need be. At some unknown future time, it is almost certain there will be another EM \"\"boom,\"\" if only because people have short memories. When that happens, sell up, take your profits, and do something less risky with them. You might consider putting another slice of your excess income into the commodities sector. I don't know when the oil price will be back at $150 or $200 a barrel, but I would be happy to bet it will happen sometime in the OP's lifetime... Since you apparently have plenty of income and are relatively young, that is the ideal time to adopt a risky investment strategy. Even if you lose your entire investment over the next 5 years, you still have another 20 years to recover from that disaster. If you were starting to invest at age 56 rather than 26, the risk/reward situation would be very different, of course.\"", "title": "" }, { "docid": "aac84e8f8334ccd8fda74433b189625a", "text": "It's incredibly difficult to beat the market, especially after you're paying out significant fees for managed funds. The Bogleheads have some good things going for them on their low cost Vanguard style funds. The biggest winners in the financial markets are the people collecting fees from churn or setting up the deals which take advantage of less sophisticated/connected players. Buy, Hold and Forget has been shown as a loser as well in this recession. Diversifying and re-balancing however takes advantage of market swings by cashing out winners and buying beaten down stocks. If you take advantages of general market highs and lows (without worrying about strict timing) every few months to re-balance, you buy some protection from crashes in any given sector. One common guideline is to use your age as the percentage of your holdings that are in cash equivalents, rather than stocks. At age 28, at least 28% of my account should be in bonds, real estate, commodities, etc. This should help guide your allocation and re-balancing strategy. Finally, focusing on Growth and Income funds may give you a better shot at above S&P returns, but it's wise to hold a small percentage in the S&P 500 as well.", "title": "" }, { "docid": "c382ab89f323f5aa80febf3f096bc883", "text": "A DRIP plan with the ETF does just that. It provides cash (the dividends you are paid) back to the fund manager who will accumulate all such reinvested dividends and proportionally buy more shares of stock in the ETF. Most ETFs will not do this without your approval, as the dividends are taxed to you (you must include them as income for that year if this is in a taxable account) and therefore you should have the say on where the dividends go.", "title": "" }, { "docid": "234abc3a41c6ec7418900d2ca1dcfc46", "text": "Split the difference. Max it out, sell half immediately and wait a year or more for the rest. Or keep a third... whatever works for your risk tolerance. A perfectly diversified portfolio with $0 in it is still worth $0.", "title": "" }, { "docid": "5ec6f6d74a9946f9c7b7f8f7132d8642", "text": "I guess I wasn't clear. I want to modestly leverage (3-4x) my portfolio using options. I believe long deep-in-the-money calls would be the best way to do this? (Let me know if not.) It's important to me that the covariance matrix from the equity portfolio scales up but doesn't fundamentally change. (I liken it to systemic change as opposed to idiosyncratic change.) This is what I was thinking: * For the same expiry date, find each positions lowest lambda. * Match all option to the the highest of the lowest lambda. * Adjust number of contracts to compensate for higher leverage. I don't think this will work because if I matched the lowest lambda of options on bond etfs to my equity options they would be out-of-the-money. By the way, thanks for your time.", "title": "" } ]
fiqa
e7cb9eaf8f498e083085b3f427396344
TaoStore: Overcoming Asynchronicity in Oblivious Data Storage
[ { "docid": "a9ac82abcad5d4120a6c4d1ea8dacaee", "text": "The advent of cloud computing has ushered in an era of mass data storage in remote servers. Remote data storage offers reduced data management overhead for data owners in a cost effective manner. Sensitive documents, however, need to be stored in encrypted format due to security concerns. But, encrypted storage makes it difficult to search on the stored documents. Therefore, this poses a major barrier towards selective retrieval of encrypted documents from the remote servers. Various protocols have been proposed for keyword search over encrypted data to address this issue. Most of the available protocols leak data access patterns due to efficiency reasons. Although, oblivious RAM based protocols can be used to hide data access patterns, such protocols are computationally intensive and do not scale well for real world datasets. In this paper, we introduce a novel attack that exploits data access pattern leakage to disclose significant amount of sensitive information using a modicum of prior knowledge. Our empirical analysis with a real world dataset shows that the proposed attack is able to disclose sensitive information with a very high accuracy. Additionally, we propose a simple technique to mitigate the risk against the proposed attack at the expense of a slight increment in computational resources and communication cost. Furthermore, our proposed mitigation technique is generic enough to be used in conjunction with any searchable encryption scheme that reveals data access pattern.", "title": "" } ]
[ { "docid": "6bc2f0ea840e4b14e1340aa0c0bf4f07", "text": "A low-voltage low-power CMOS operational transconductance amplifier (OTA) with near rail-to-rail output swing is presented in this brief. The proposed circuit is based on the current-mirror OTA topology. In addition, several circuit techniques are adopted to enhance the voltage gain. Simulated from a 0.8-V supply voltage, the proposed OTA achieves a 62-dB dc gain and a gain–bandwidth product of 160 MHz while driving a 2-pF load. The OTA is designed in a 0.18m CMOS process. The power consumption is 0.25 mW including the common-mode feedback circuit.", "title": "" }, { "docid": "73252fdecc2a01699bdadb4962b4b376", "text": "Despite significant progress in image-based 3D scene flow estimation, the performance of such approaches has not yet reached the fidelity required by many applications. Simultaneously, these applications are often not restricted to image-based estimation: laser scanners provide a popular alternative to traditional cameras, for example in the context of self-driving cars, as they directly yield a 3D point cloud. In this paper, we propose to estimate 3D motion from such unstructured point clouds using a deep neural network. In a single forward pass, our model jointly predicts 3D scene flow as well as the 3D bounding box and rigid body motion of objects in the scene. While the prospect of estimating 3D scene flow from unstructured point clouds is promising, it is also a challenging task. We show that the traditional global representation of rigid body motion prohibits inference by CNNs, and propose a translation equivariant representation to circumvent this problem. For training our deep network, a large dataset is required. Because of this, we augment real scans from KITTI with virtual objects, realistically modeling occlusions and simulating sensor noise. A thorough comparison with classic and learning-based techniques highlights the robustness of the proposed approach.", "title": "" }, { "docid": "69e98d180d82d559372612013b7bc6a2", "text": "Intelligent fault diagnosis of bearings has been a heated research topic in the prognosis and health management of rotary machinery systems, due to the increasing amount of available data collected by sensors. This has given rise to more and more business desire to apply data-driven methods for health monitoring of machines. In recent years, various deep learning algorithms have been adapted to this field, including multi-layer perceptrons, autoencoders, convolutional neural networks, and so on. Among these methods, autoencoder is of particular interest for us because of its simple structure and its ability to learn useful features from data in an unsupervised fashion. Previous studies have exploited the use of autoencoders, such as denoising autoencoder, sparsity aotoencoder, and so on, either with one layer or with several layers stacked together, and they have achieved success to certain extent. In this paper, a bearing fault diagnosis method based on fully-connected winner-take-all autoencoder is proposed. The model explicitly imposes lifetime sparsity on the encoded features by keeping only $k$ % largest activations of each neuron across all samples in a mini-batch. A soft voting method is implemented to aggregate prediction results of signal segments sliced by a sliding window to increase accuracy and stability. A simulated data set is generated by adding white Gaussian noise to original signals to test the diagnosis performance under noisy environment. To evaluate the performance of the proposed method, we compare our methods with some state-of-the-art bearing fault diagnosis methods. The experiments result show that, with a simple two-layer network, the proposed method is not only capable of diagnosing with high precision under normal conditions, but also has better robustness to noise than some deeper and more complex models.", "title": "" }, { "docid": "b758085688b08f6bab9026867e9e37fe", "text": "A key challenge of facial expression recognition (FER) is to develop effective representations to balance the complex distribution of intra- and inter- class variations. The latest deep convolutional networks proposed for FER are trained by penalizing the misclassification of images via the softmax loss. In this paper, we show that better FER performance can be achieved by combining the deep metric loss and softmax loss in a unified two fully connected layer branches framework via joint optimization. A generalized adaptive (N+M)-tuplet clusters loss function together with the identity-aware hard-negative mining and online positive mining scheme are proposed for identity-invariant FER. It reduces the computational burden of deep metric learning, and alleviates the difficulty of threshold validation and anchor selection. Extensive evaluations demonstrate that our method outperforms many state-of-art approaches on the posed as well as spontaneous facial expression databases.", "title": "" }, { "docid": "28d16f96ee1b7789666352f48876fbc4", "text": "The non-data components of a visualization, such as axes and legends, can often be just as important as the data itself. They provide contextual information essential to interpreting the data. In this paper, we describe an automated system for choosing positions and labels for axis tick marks. Our system extends Wilkinson's optimization-based labeling approach to create a more robust, full-featured axis labeler. We define an expanded space of axis labelings by automatically generating additional nice numbers as needed and by permitting the extreme labels to occur inside the data range. These changes provide flexibility in problematic cases, without degrading quality elsewhere. We also propose an additional optimization criterion, legibility, which allows us to simultaneously optimize over label formatting, font size, and orientation. To solve this revised optimization problem, we describe the optimization function and an efficient search algorithm. Finally, we compare our method to previous work using both quantitative and qualitative metrics. This paper is a good example of how ideas from automated graphic design can be applied to information visualization.", "title": "" }, { "docid": "50e58087f9a02a4a2d828b9434bdea17", "text": "ÐThis paper concerns an efficient algorithm for the solution of the exterior orientation problem. Orthogonal decompositions are used to first isolate the unknown depths of feature points in the camera reference frame, allowing the problem to be reduced to an absolute orientation with scale problem, which is solved using the SVD. The key feature of this approach is the low computational cost compared to existing approaches. Index TermsÐExterior orientation, pose estimation, absolute orientation, efficient linear method.", "title": "" }, { "docid": "cf0c4ebe8e2d3e8b8dcb668418a39374", "text": "Despite the progress in Internet of Things (IoT) research, a general software engineering approach for systematic development of IoT systems and applications is still missing. A synthesis of the state of the art in the area can help frame the key abstractions related to such development. Such a framework could be the basis for guidelines for IoT-oriented software engineering.", "title": "" }, { "docid": "384a0a9d9613750892225562cb5ff113", "text": "Large scale, high concurrency, and vast amount of data are important trends for the new generation of website. Node.js becomes popular and successful to build data-intensive web applications. To study and compare the performance of Node.js, Python-Web and PHP, we used benchmark tests and scenario tests. The experimental results yield some valuable performance data, showing that PHP and Python-Web handle much less requests than that of Node.js in a certain time. In conclusion, our results clearly demonstrate that Node.js is quite lightweight and efficient, which is an idea fit for I/O intensive websites among the three, while PHP is only suitable for small and middle scale applications, and Python-Web is developer friendly and good for large web architectures. To the best of our knowledge, this is the first paper to evaluate these Web programming technologies with both objective systematic tests (benchmark) and realistic user behavior tests (scenario), especially taking Node.js as the main topic to discuss.", "title": "" }, { "docid": "8716f5486949db1007577ca40a91e114", "text": "The aim of this paper is to check the transient stability of IEEE 7 bus system in electric power system. Three generators are modelled in this system with different MW. Furthermore, modelling of all the system equipment is obtained by Power World Simulator Software. The upgrading and designing the electric power system transient stability analysis is necessary and also study of the stability of the system in short term disturbances is also content for study in itself. The transient stability analysis of IEEE 7 bus system in Power World Simulator determining the idea about the power system transient stability analysis is more important factor. The frequency and variation of power angle at bus and generator parameters are studied with 3-phase balanced fault condition. Also impact of disturbance on load in the system can also model.", "title": "" }, { "docid": "dfcc931d9cd7d084bbbcf400f44756a5", "text": "In this paper we address the problem of aligning very long (often more than one hour) audio files to their corresponding textual transcripts in an effective manner. We present an efficient recursive technique to solve this problem that works well even on noisy speech signals. The key idea of this algorithm is to turn the forced alignment problem into a recursive speech recognition problem with a gradually restricting dictionary and language model. The algorithm is tolerant to acoustic noise and errors or gaps in the text transcript or audio tracks. We report experimental results on a 3 hour audio file containing TV and radio broadcasts. We will show accurate alignments on speech under a variety of real acoustic conditions such as speech over music and speech over telephone lines. We also report results when the same audio stream has been corrupted with white additive noise or compressed using a popular web encoding format such as RealAudio. This algorithm has been used in our internal multimedia indexing project. It has processed more than 200 hours of audio from varied sources, such as WGBH NOVA documentaries and NPR web audio files. The system aligns speech media content in about one to five times realtime, depending on the acoustic conditions of the audio signal.", "title": "" }, { "docid": "056c5033e71eecb8a683fded0dd149bb", "text": "There is a severe lack of knowledge regarding the brain regions involved in human sexual performance in general, and female orgasm in particular. We used [15O]-H2O positron emission tomography to measure regional cerebral blood flow (rCBF) in 12 healthy women during a nonsexual resting state, clitorally induced orgasm, sexual clitoral stimulation (sexual arousal control) and imitation of orgasm (motor output control). Extracerebral markers of sexual performance and orgasm were rectal pressure variability (RPstd) and perceived level of sexual arousal (PSA). Sexual stimulation of the clitoris (compared to rest) significantly increased rCBF in the left secondary and right dorsal primary somatosensory cortex, providing the first account of neocortical processing of sexual clitoral information. In contrast, orgasm was mainly associated with profound rCBF decreases in the neocortex when compared with the control conditions (clitoral stimulation and imitation of orgasm), particularly in the left lateral orbitofrontal cortex, inferior temporal gyrus and anterior temporal pole. Significant positive correlations were found between RPstd and rCBF in the left deep cerebellar nuclei, and between PSA and rCBF in the ventral midbrain and right caudate nucleus. We propose that decreased blood flow in the left lateral orbitofrontal cortex signifies behavioural disinhibition during orgasm in women, and that deactivation of the temporal lobe is directly related to high sexual arousal. In addition, the deep cerebellar nuclei may be involved in orgasm-specific muscle contractions while the involvement of the ventral midbrain and right caudate nucleus suggests a role for dopamine in female sexual arousal and orgasm.", "title": "" }, { "docid": "0dfd9fdc0fdaa5ccd2cbdd94833fade3", "text": "There have been serious concerns recently about the security of microchips from hardware trojan horse insertion during manufacturing. This issue has been raised recently due to outsourcing of the chip manufacturing processes to reduce cost. This is an important consideration especially in critical applications such as avionics, communications, military, industrial and so on. A trojan is inserted into a main circuit at manufacturing and is mostly inactive unless it is triggered by a rare value or time event; then it produces a payload error in the circuit, potentially catastrophic. Because of its nature, a trojan may not be easily detected by functional or ATPG testing. The problem of trojan detection has been addressed only recently in very few works. Our work analyzes and formulates the trojan detection problem based on a frequency analysis under rare trigger values and provides procedures to generate input trigger vectors and trojan test vectors to detect trojan effects. We also provide experimental results.", "title": "" }, { "docid": "c9972414881db682c219d69d59efa34a", "text": "“Employee turnover” as a term is widely used in business circles. Although several studies have been conducted on this topic, most of the researchers focus on the causes of employee turnover. This research looked at extent of influence of various factors on employee turnover in urban and semi urban banks. The research was aimed at achieving the following objectives: identify the key factors of employee turnover; determine the extent to which the identified factors are influencing employees’ turnover. The study is based on the responses of the employees of leading banks. A self-developed questionnaire, measured on a Likert Scale was used to collect data from respondents. Quantitative research design was used and this design was chosen because its findings are generaliseable and data objective. The reliability of the data collected is done by split half method.. The collected data were being analyzed using a program called Statistical Package for Social Science (SPSS ver.16.0 For Windows). The data analysis is carried out by calculating mean, standard deviation and linear correlation. The difference between means of variable was estimated by using t-test. The following factors have significantly influenced employee turnover in banking sector: Work Environment, Job Stress, Compensation (Salary), Employee relationship with management, Career Growth.", "title": "" }, { "docid": "10947ff2f981ddf28934df8ac640208d", "text": "The future of tropical forest biodiversity depends more than ever on the effective management of human-modified landscapes, presenting a daunting challenge to conservation practitioners and land use managers. We provide a critical synthesis of the scientific insights that guide our understanding of patterns and processes underpinning forest biodiversity in the human-modified tropics, and present a conceptual framework that integrates a broad range of social and ecological factors that define and contextualize the possible future of tropical forest species. A growing body of research demonstrates that spatial and temporal patterns of biodiversity are the dynamic product of interacting historical and contemporary human and ecological processes. These processes vary radically in their relative importance within and among regions, and have effects that may take years to become fully manifest. Interpreting biodiversity research findings is frequently made difficult by constrained study designs, low congruence in species responses to disturbance, shifting baselines and an over-dependence on comparative inferences from a small number of well studied localities. Spatial and temporal heterogeneity in the potential prospects for biodiversity conservation can be explained by regional differences in biotic vulnerability and anthropogenic legacies, an ever-tighter coupling of human-ecological systems and the influence of global environmental change. These differences provide both challenges and opportunities for biodiversity conservation. Building upon our synthesis we outline a simple adaptive-landscape planning framework that can help guide a new research agenda to enhance biodiversity conservation prospects in the human-modified tropics.", "title": "" }, { "docid": "f56f2119b3e65970db35676fe1cac9ba", "text": "While behavioral and social sciences occupations comprise one of the largest portions of the \"STEM\" workforce, most studies of diversity in STEM overlook this population, focusing instead on fields such as biomedical or physical sciences. This study evaluates major demographic trends and productivity in the behavioral and social sciences research (BSSR) workforce in the United States during the past decade. Our analysis shows that the demographic trends for different BSSR fields vary. In terms of gender balance, there is no single trend across all BSSR fields; rather, the problems are field-specific, and disciplines such as economics and political science continue to have more men than women. We also show that all BSSR fields suffer from a lack of racial and ethnic diversity. The BSSR workforce is, in fact, less representative of racial and ethnic minorities than are biomedical sciences or engineering. Moreover, in many BSSR subfields, minorities are less likely to receive funding. We point to various funding distribution patterns across different demographic groups of BSSR scientists, and discuss several policy implications.", "title": "" }, { "docid": "96339ea3e87a8df2e38c3d06fcfa4f54", "text": "This study examines motives for virtually endorsing others on social media, focusing on the Facebook “like” function. Motives are studied in terms of Uses and Gratifications, Theory of Reasoned Action, and personality and technology factors. Data from an online survey of 213 respondents were examined using factorand hierarchical-regression analyses. Findings showed enjoyment and interpersonal relationship as most salient motives. Two types of user profiles emerged. Those with higher self-esteem, more diligence, more", "title": "" }, { "docid": "a1915a869616b9c8c2547f66ec89de13", "text": "The harvest yield in vineyards can vary significantly from year to year and also spatially within plots due to variations in climate, soil conditions and pests. Fine grained knowledge of crop yields can allow viticulturists to better manage their vineyards. The current industry practice for yield prediction is destructive, expensive and spatially sparse - during the growing season sparse samples are taken and extrapolated to determine overall yield. We present an automated method that uses computer vision to detect and count grape berries. The method could potentially be deployed across large vineyards taking measurements at every vine in a non-destructive manner. Our berry detection uses both shape and visual texture and we can demonstrate detection of green berries against a green leaf background. Berry detections are counted and the eventual harvest yield is predicted. Results are presented for 224 vines (over 450 meters) of two different grape varieties and compared against the actual harvest yield as groundtruth. We calibrate our berry count to yield and find that we can predict yield of individual vineyard rows to within 9.8% of actual crop weight.", "title": "" }, { "docid": "21197ea03a0c9ce6061ea524aca10b52", "text": "Developers of gamified business applications face the challenge of creating motivating gameplay strategies and creative design techniques to deliver subject matter not typically associated with games in a playful way. We currently have limited models that frame what makes gamification effective (i.e., engaging people with a business application). Thus, we propose a design-centric model and analysis tool for gamification: The kaleidoscope of effective gamification. We take a look at current models of game design, self-determination theory and the principles of systems design to deconstruct the gamification layer in the design of these applications. Based on the layers of our model, we provide design guidelines for effective gamification of business applications.", "title": "" }, { "docid": "2a45fb350731967591487e0b6c9a820c", "text": "In this chapter, we report the first experimental explorations of reinforcement learning in Tourette syndrome, realized by our team in the last few years. This report will be preceded by an introduction aimed to provide the reader with the state of the art of the knowledge concerning the neural bases of reinforcement learning at the moment of these studies and the scientific rationale beyond them. In short, reinforcement learning is learning by trial and error to maximize rewards and minimize punishments. This decision-making and learning process implicates the dopaminergic system projecting to the frontal cortex-basal ganglia circuits. A large body of evidence suggests that the dysfunction of the same neural systems is implicated in the pathophysiology of Tourette syndrome. Our results show that Tourette condition, as well as the most common pharmacological treatments (dopamine antagonists), affects reinforcement learning performance in these patients. Specifically, the results suggest a deficit in negative reinforcement learning, possibly underpinned by a functional hyperdopaminergia, which could explain the persistence of tics, despite their evident inadaptive (negative) value. This idea, together with the implications of these results in Tourette therapy and the future perspectives, is discussed in Section 4 of this chapter.", "title": "" } ]
scidocsrr
52bf372f3351af3c09ccd800fb50233c
Adaptive Optical Self-Interference Cancellation Using a Semiconductor Optical Amplifier
[ { "docid": "f84c399ff746a8721640e115fd20745e", "text": "Self-interference cancellation invalidates a long-held fundamental assumption in wireless network design that radios can only operate in half duplex mode on the same channel. Beyond enabling true in-band full duplex, which effectively doubles spectral efficiency, self-interference cancellation tremendously simplifies spectrum management. Not only does it render entire ecosystems like TD-LTE obsolete, it enables future networks to leverage fragmented spectrum, a pressing global issue that will continue to worsen in 5G networks. Self-interference cancellation offers the potential to complement and sustain the evolution of 5G technologies toward denser heterogeneous networks and can be utilized in wireless communication systems in multiple ways, including increased link capacity, spectrum virtualization, any-division duplexing (ADD), novel relay solutions, and enhanced interference coordination. By virtue of its fundamental nature, self-interference cancellation will have a tremendous impact on 5G networks and beyond.", "title": "" } ]
[ { "docid": "ab582b371223c25f43e25058883e92fa", "text": "Internet of Things is an emerging technology having the ability to change the way we live. In IoT vision, each and every 'thing' has the ability of talking to each other that brings the idea of Internet of Everything in reality. Numerous IoT services can make our daily life easier, smarter, and even safer. Using IoT in designing some special services can make a lifesaver system. In this paper, we have presented an IoT enabled approach that can provide emergency communication and location tracking services in a remote car that meets an unfortunate accident or any other emergency situation. Immediately after an accident or an emergency, the system either starts automatically or may be triggered manually. Depending upon type of emergency (police and security, fire and rescue, medical, or civil) it initiates communication and shares critical information e.g. location information, a set of relevant images taken from prefixed angles etc. with appropriate server / authority. Provision of interactive real-time multimedia communication, real-time location tracking etc. have also been integrated to the proposed system to monitor the exact condition in real-time basis. The system prototype has been designed with Raspberry Pi 3 Model B and UMTS-HSDPA communication protocol.", "title": "" }, { "docid": "90414004f8681198328fb48431a34573", "text": "Process models play important role in computer aided process engineering. Although the structure of these models are a priori known, model parameters should be estimated based on experiments. The accuracy of the estimated parameters largely depends on the information content of the experimental data presented to the parameter identification algorithm. Optimal experiment design (OED) can maximize the confidence on the model parameters. The paper proposes a new additive sequential evolutionary experiment design approach to maximize the amount of information content of experiments. The main idea is to use the identified models to design new experiments to gradually improve the model accuracy while keeping the collected information from previous experiments. This scheme requires an effective optimization algorithm, hence the main contribution of the paper is the incorporation of Evolutionary Strategy (ES) into a new iterative scheme of optimal experiment design (AS-OED). This paper illustrates the applicability of AS-OED for the design of feeding profile for a fed-batch biochemical reactor.", "title": "" }, { "docid": "45d496fe8762fa52bbf6430eda2b7cfd", "text": "This paper presents deployment algorithms for multiple mobile robots with line-of-sight sensing and communication capabilities in a simple nonconvex polygonal environment. The objective of the proposed algorithms is to achieve full visibility of the environment. We solve the problem by constructing a novel data structure called the vertex-induced tree and designing schemes to deploy over the nodes of this tree by means of distributed algorithms. The agents are assumed to have access to a local memory and their operation is partially asynchronous", "title": "" }, { "docid": "c64b13db5a4c35861b06ec53c5c73946", "text": "In this paper, we address the problem of searching for semantically similar images from a large database. We present a compact coding approach, supervised quantization. Our approach simultaneously learns feature selection that linearly transforms the database points into a low-dimensional discriminative subspace, and quantizes the data points in the transformed space. The optimization criterion is that the quantized points not only approximate the transformed points accurately, but also are semantically separable: the points belonging to a class lie in a cluster that is not overlapped with other clusters corresponding to other classes, which is formulated as a classification problem. The experiments on several standard datasets show the superiority of our approach over the state-of-the art supervised hashing and unsupervised quantization algorithms.", "title": "" }, { "docid": "4b0b2c7168fa04543d77bee46af14b0a", "text": "Individuals face privacy risks when providing personal location data to potentially untrusted location based services (LBSs). We develop and demonstrate CacheCloak, a system that enables realtime anonymization of location data. In CacheCloak, a trusted anonymizing server generates mobility predictions from historical data and submits intersecting predicted paths simultaneously to the LBS. Each new predicted path is made to intersect with other users' paths, ensuring that no individual user's path can be reliably tracked over time. Mobile users retrieve cached query responses for successive new locations from the trusted server, triggering new prediction only when no cached response is available for their current locations. A simulated hostile LBS with detailed mobility pattern data attempts to track users of CacheCloak, generating a quantitative measure of location privacy over time. GPS data from a GIS-based traffic simulation in an urban environment shows that CacheCloak can achieve realtime location privacy without loss of location accuracy or availability.", "title": "" }, { "docid": "7d23d8d233a3fc7ff75edf361acbe642", "text": "The diagnosis and treatment of chronic patellar instability caused by trochlear dysplasia can be challenging. A dysplastic trochlea leads to biomechanical and kinematic changes that often require surgical correction when symptomatic. In the past, trochlear dysplasia was classified using the 4-part Dejour classification system. More recently, new classification systems have been proposed. Future studies are needed to investigate long-term outcomes after trochleoplasty.", "title": "" }, { "docid": "04b0f8be4eaa99aa6ee5cc6b7c6ad662", "text": "Systems designed with measurement and attestation in mind are often layered, with the lower layers measuring the layers above them. Attestations of such systems, which we call layered attestations, must bundle together the results of a diverse set of application-specific measurements of various parts of the system. Some methods of layered at-testation are more trustworthy than others, so it is important for system designers to understand the trust consequences of different system configurations. This paper presents a formal framework for reasoning about layered attestations, and provides generic reusable principles for achieving trustworthy results.", "title": "" }, { "docid": "8b51bcd5d36d9e15419d09b5fc8995b5", "text": "In this technical report, we study estimator inconsistency in Vision-aided Inertial Navigation Systems (VINS) from a standpoint of system observability. We postulate that a leading cause of inconsistency is the gain of spurious information along unobservable directions, resulting in smaller uncertainties, larger estimation errors, and divergence. We support our claim with an analytical study of the Observability Gramian, along with its right nullspace, which constitutes the basis of the unobservable directions of the system. We develop an Observability-Constrained VINS (OC-VINS), which explicitly enforces the unobservable directions of the system, hence preventing spurious information gain and reducing inconsistency. Our analysis, along with the proposed method for reducing inconsistency, are extensively validated with simulation trials and real-world experimentation.", "title": "" }, { "docid": "265d69d874481270c26eb371ca05ac51", "text": "A compact dual-band dual-polarized antenna is proposed in this paper. The two pair dipoles with strong end coupling are used for the lower frequency band, and cross-placed patch dipoles are used for the upper frequency band. The ends of the dipoles for lower frequency band are bent to increase the coupling between adjacent dipoles, which can benefit the compactness and bandwidth of the antenna. Breaches are introduced at the ends of the dipoles of the upper band, which also benefit the compactness and matching of the antenna. An antenna prototype was fabricated and measured. The measured results show that the antenna can cover from 790 MHz to 960 MHz (19.4%) for lower band and from 1710 MHz to 2170 MHz (23.7%) for upper band with VSWR < 1.5. It is expected to be a good candidate design for base station antennas.", "title": "" }, { "docid": "0a035cbf258996b1c1ae6662c8e2cc69", "text": "This paper analyzes the authentication and key agreement protocol adopted by Universal Mobile Telecommunication System (UMTS), an emerging standard for third-generation (3G) wireless communications. The protocol, known as 3GPP AKA, is based on the security framework in GSM and provides significant enhancement to address and correct real and perceived weaknesses in GSM and other wireless communication systems. In this paper, we first show that the 3GPP AKA protocol is vulnerable to a variant of the so-called false base station attack. The vulnerability allows an adversary to redirect user traffic from one network to another. It also allows an adversary to use authentication vectors corrupted from one network to impersonate all other networks. Moreover, we demonstrate that the use of synchronization between a mobile station and its home network incurs considerable difficulty for the normal operation of 3GPP AKA. To address such security problems in the current 3GPP AKA, we then present a new authentication and key agreement protocol which defeats redirection attack and drastically lowers the impact of network corruption. The protocol, called AP-AKA, also eliminates the need of synchronization between a mobile station and its home network. AP-AKA specifies a sequence of six flows. Dependent on the execution environment, entities in the protocol have the flexibility of adaptively selecting flows for execution, which helps to optimize the efficiency of AP-AKA both in the home network and in foreign networks.", "title": "" }, { "docid": "287b284529dc5d5ac183700917a42755", "text": "Reconfiguration, by exchanging the functional links between the elements of the system, represents one of the most important measures which can improve the operational performance of a distribution system. The authors propose an original method, aiming at achieving such optimization through the reconfiguration of distribution systems taking into account various criteria in a flexible and robust approach. The novelty of the method consists in: the criteria for optimization are evaluated on active power distribution systems (containing distributed generators connected directly to the main distribution system and microgrids operated in grid-connected mode); the original formulation (Pareto optimality) of the optimization problem and an original genetic algorithm (based on NSGA-II) to solve the problem in a non-prohibitive execution time. The comparative tests performed on test systems have demonstrated the accuracy and promptness of the proposed algorithm. OPEN ACCESS Energies 2013, 6 1440", "title": "" }, { "docid": "a31358ffda425f8e3f7fd15646d04417", "text": "We elaborate the design and simulation of a planar antenna that is suitable for CubeSat picosatellites. The antenna operates at 436 MHz and its main features are miniature size and the built-in capability to produce circular polarization. The miniaturization procedure is given in detail, and the electrical performance of this small antenna is documented. Two main miniaturization techniques have been applied, i.e. dielectric loading and distortion of the current path. We have added an extra degree of freedom to the latter. The radiator is integrated with the chassis of the picosatellite and, at the same time, operates at the lower end of the UHF spectrum. In terms of electrical size, the structure presented herein is one of the smallest antennas that have been proposed for small satellites. Despite its small electrical size, the antenna maintains acceptable efficiency and gain performance in the band of interest.", "title": "" }, { "docid": "fb2b4ebce6a31accb3b5407f24ad64ba", "text": "The number of multi-robot systems deployed in field applications has risen dramatically over the years. Nevertheless, supervising and operating multiple robots at once is a difficult task for a single operator to execute. In this paper we propose a novel approach for utilizing advising automated agents when assisting an operator to better manage a team of multiple robots in complex environments. We introduce the Myopic Advice Optimization (MYAO) Problem and exemplify its implementation using an agent for the Search And Rescue (SAR) task. Our intelligent advising agent was evaluated through extensive field trials, with 44 non-expert human operators and 10 low-cost mobile robots, in simulation and physical deployment, and showed a significant improvement in both team performance and the operator’s satisfaction.", "title": "" }, { "docid": "19ab044ed5154b4051cae54387767c9b", "text": "An approach is presented for minimizing power consumption for digital systems implemented in CMOS which involves optimization at all levels of the design. This optimization includes the technology used to implement the digital circuits, the circuit style and topology, the architecture for implementing the circuits and at the highest level the algorithms that are being implemented. The most important technology consideration is the threshold voltage and its control which allows the reduction of supply voltage without signijcant impact on logic speed. Even further supply reductions can be made by the use of an architecture-based voltage scaling strategy, which uses parallelism and pipelining, to tradeoff silicon area and power reduction. Since energy is only consumed when capacitance is being switched, power can be reduced by minimizing this capacitance through operation reduction, choice of number representation, exploitation of signal correlations, resynchronization to minimize glitching, logic design, circuit design, and physical design. The low-power techniques that are presented have been applied to the design of a chipset for a portable multimedia terminal that supports pen input, speech I/O and fullmotion video. The entire chipset that perjorms protocol conversion, synchronization, error correction, packetization, buffering, video decompression and D/A conversion operates from a 1.1 V supply and consumes less than 5 mW.", "title": "" }, { "docid": "42cf4bd800000aed5e0599cba52ba317", "text": "There is a significant amount of controversy related to the optimal amount of dietary carbohydrate. This review summarizes the health-related positives and negatives associated with carbohydrate restriction. On the positive side, there is substantive evidence that for many individuals, low-carbohydrate, high-protein diets can effectively promote weight loss. Low-carbohydrate diets (LCDs) also can lead to favorable changes in blood lipids (i.e., decreased triacylglycerols, increased high-density lipoprotein cholesterol) and decrease the severity of hypertension. These positives should be balanced by consideration of the likelihood that LCDs often lead to decreased intakes of phytochemicals (which could increase predisposition to cardiovascular disease and cancer) and nondigestible carbohydrates (which could increase risk for disorders of the lower gastrointestinal tract). Diets restricted in carbohydrates also are likely to lead to decreased glycogen stores, which could compromise an individual's ability to maintain high levels of physical activity. LCDs that are high in saturated fat appear to raise low-density lipoprotein cholesterol and may exacerbate endothelial dysfunction. However, for the significant percentage of the population with insulin resistance or those classified as having metabolic syndrome or prediabetes, there is much experimental support for consumption of a moderately restricted carbohydrate diet (i.e., one providing approximately 26%-44 % of calories from carbohydrate) that emphasizes high-quality carbohydrate sources. This type of dietary pattern would likely lead to favorable changes in the aforementioned cardiovascular disease risk factors, while minimizing the potential negatives associated with consumption of the more restrictive LCDs.", "title": "" }, { "docid": "f4617250b5654a673219d779952db35f", "text": "Convolutional neural network (CNN) models have achieved tremendous success in many visual detection and recognition tasks. Unfortunately, visual tracking, a fundamental computer vision problem, is not handled well using the existing CNN models, because most object trackers implemented with CNN do not effectively leverage temporal and contextual information among consecutive frames. Recurrent neural network (RNN) models, on the other hand, are often used to process text and voice data due to their ability to learn intrinsic representations of sequential and temporal data. Here, we propose a novel neural network tracking model that is capable of integrating information over time and tracking a selected target in video. It comprises three components: a CNN extracting best tracking features in each video frame, an RNN constructing video memory state, and a reinforcement learning (RL) agent making target location decisions. The tracking problem is formulated as a decision-making process, and our model can be trained with RL algorithms to learn good tracking policies that pay attention to continuous, inter-frame correlation and maximize tracking performance in the long run. We compare our model with an existing neural-network based tracking method and show that the proposed tracking approach works well in various scenarios by performing rigorous validation experiments on artificial video sequences with ground truth. To the best of our knowledge, our tracker is the first neural-network tracker that combines convolutional and recurrent networks with RL algorithms.", "title": "" }, { "docid": "ad9dcb0d49afccecf336621a782bca09", "text": "Online reviews are an important source for consumers to evaluate products/services on the Internet (e.g. Amazon, Yelp, etc.). However, more and more fraudulent reviewers write fake reviews to mislead users. To maximize their impact and share effort, many spam attacks are organized as campaigns, by a group of spammers. In this paper, we propose a new two-step method to discover spammer groups and their targeted products. First, we introduce NFS (Network Footprint Score), a new measure that quantifies the likelihood of products being spam campaign targets. Second, we carefully devise GroupStrainer to cluster spammers on a 2-hop subgraph induced by top ranking products. Our approach has four key advantages: (i) unsupervised detection; both steps require no labeled data, (ii) adversarial robustness; we quantify statistical distortions in the review network, of which spammers have only a partial view, and avoid any side information that spammers can easily evade, (iii) sensemaking; the output facilitates the exploration of the nested hierarchy (i.e., organization) among the spammers, and finally (iv) scalability; both steps have complexity linear in network size, moreover, GroupStrainer operates on a carefully induced subnetwork. We demonstrate the efficiency and effectiveness of our approach on both synthetic and real-world datasets from two different domains with millions of products and reviewers. Moreover, we discover interesting strategies that spammers employ through case studies of our detected groups.", "title": "" }, { "docid": "809508abfa4d7dfad1c43f09c8aa137e", "text": "In this article, an original design of a range illuminator based on a stepped-septum polarizer and a dual-mode horn is discussed. However, the designed polarizer can also be used with other waveguide antennas, such as pyramidal horns and corrugated horns. A simple procedure for determining the initial septum geometry for the subsequent optimization is described, and based on this, a two-step septum polarizer is developed. A carefully designed dual-mode horn antenna with a rectangular aperture is then utilized to increase the illuminator's gain and suppress sidelobe levels. Results of full-wave electromagnetic simulations are presented and compared to experimentally measured data with good agreement.", "title": "" }, { "docid": "62c3c062bbea8151543e0491190cf02d", "text": "In this article, we present a survey of recent advances in passive human behaviour recognition in indoor areas using the channel state information (CSI) of commercial WiFi systems. Movement of human body causes a change in the wireless signal reflections, which results in variations in the CSI. By analyzing the data streams of CSIs for different activities and comparing them against stored models, human behaviour can be recognized. This is done by extracting features from CSI data streams and using machine learning techniques to build models and classifiers. The techniques from the literature that are presented herein have great performances, however, instead of the machine learning techniques employed in these works, we propose to use deep learning techniques such as long-short term memory (LSTM) recurrent neural network (RNN), and show the improved performance. We also discuss about different challenges such as environment change, frame rate selection, and multi-user scenario, and suggest possible directions for future work.", "title": "" } ]
scidocsrr
6eb6a1ce9252ca457bb221dea84d1437
Generalization and equilibrium in generative adversarial nets (GANs) (invited talk)
[ { "docid": "cce513c48e630ab3f072f334d00b67dc", "text": "We consider two algorithms for on-line prediction based on a linear model. The algorithms are the well-known gradient descent (GD) algorithm and a new algorithm, which we call EG. They both maintain a weight vector using simple updates. For the GD algorithm, the update is based on subtracting the gradient of the squared error made on a prediction. The EG algorithm uses the components of the gradient in the exponents of factors that are used in updating the weight vector multiplicatively. We present worst-case loss bounds for EG and compare them to previously known bounds for the GD algorithm. The bounds suggest that the losses of the algorithms are in general incomparable, but EG has a much smaller loss if only few components of the input are relevant for the predictions. We have performed experiments which show that our worst-case upper bounds are quite tight already on simple artificial data. ] 1997 Academic Press", "title": "" }, { "docid": "eea39002b723aaa9617c63c1249ef9a6", "text": "Generative Adversarial Networks (GAN) [1] are an effective method for training generative models of complex data such as natural images. However, they are notoriously hard to train and can suffer from the problem of missing modes where the model is not able to produce examples in certain regions of the space. We propose an iterative procedure, called AdaGAN, where at every step we add a new component into a mixture model by running a GAN algorithm on a reweighted sample. This is inspired by boosting algorithms, where many potentially weak individual predictors are greedily aggregated to form a strong composite predictor. We prove that such an incremental procedure leads to convergence to the true distribution in a finite number of steps if each step is optimal, and convergence at an exponential rate otherwise. We also illustrate experimentally that this procedure addresses the problem of missing modes.", "title": "" } ]
[ { "docid": "757441e95be19ca4569c519fb35adfb7", "text": "Autonomous driving in public roads requires precise localization within the range of few centimeters. Even the best current precise localization system based on the Global Navigation Satellite System (GNSS) can not always reach this level of precision, especially in an urban environment, where the signal is disturbed by surrounding buildings and artifacts. Laser range finder and stereo vision have been successfully used for obstacle detection, mapping and localization to solve the autonomous driving problem. Unfortunately, Light Detection and Ranging (LIDARs) are very expensive sensors and stereo vision requires powerful dedicated hardware to process the cameras information. In this context, this article presents a low-cost architecture of sensors and data fusion algorithm capable of autonomous driving in narrow two-way roads. Our approach exploits a combination of a short-range visual lane marking detector and a dead reckoning system to build a long and precise perception of the lane markings in the vehicle's backwards. This information is used to localize the vehicle in a map, that also contains the reference trajectory for autonomous driving. Experimental results show the successful application of the proposed system on a real autonomous driving situation.", "title": "" }, { "docid": "21cde70c4255e706cb05ff38aec99406", "text": "In this paper, a multiple classifier machine learning (ML) methodology for predictive maintenance (PdM) is presented. PdM is a prominent strategy for dealing with maintenance issues given the increasing need to minimize downtime and associated costs. One of the challenges with PdM is generating the so-called “health factors,” or quantitative indicators, of the status of a system associated with a given maintenance issue, and determining their relationship to operating costs and failure risk. The proposed PdM methodology allows dynamical decision rules to be adopted for maintenance management, and can be used with high-dimensional and censored data problems. This is achieved by training multiple classification modules with different prediction horizons to provide different performance tradeoffs in terms of frequency of unexpected breaks and unexploited lifetime, and then employing this information in an operating cost-based maintenance decision system to minimize expected costs. The effectiveness of the methodology is demonstrated using a simulated example and a benchmark semiconductor manufacturing maintenance problem.", "title": "" }, { "docid": "6e7d5e2548e12d11afd3389b6d677a0f", "text": "Internet marketing is a field that is continuing to grow, and the online auction concept may be defining a totally new and unique distribution alternative. Very few studies have examined auction sellers and their internet marketing strategies. This research examines the internet auction phenomenon as it relates to the marketing mix of online auction sellers. The data in this study indicate that, whilst there is great diversity among businesses that utilise online auctions, distinct cost leadership and differentiation marketing strategies are both evident. These two approaches are further distinguished in terms of the internet usage strategies employed by each group.", "title": "" }, { "docid": "085155ebfd2ac60ed65293129cb0bfee", "text": "Today, Convolution Neural Networks (CNN) is adopted by various application areas such as computer vision, speech recognition, and natural language processing. Due to a massive amount of computing for CNN, CNN running on an embedded platform may not meet the performance requirement. In this paper, we propose a system-on-chip (SoC) CNN architecture synthesized by high level synthesis (HLS). HLS is an effective hardware (HW) synthesis method in terms of both development effort and performance. However, the implementation should be optimized carefully in order to achieve a satisfactory performance. Thus, we apply several optimization techniques to the proposed CNN architecture to satisfy the performance requirement. The proposed CNN architecture implemented on a Xilinx's Zynq platform has achieved 23% faster and 9.05 times better throughput per energy consumption than an implementation on an Intel i7 Core processor.", "title": "" }, { "docid": "3465c3bc8f538246be5d7f8c8d1292c2", "text": "The minimal depth of a maximal subtree is a dimensionless order statistic measuring the predictiveness of a variable in a survival tree. We derive the distribution of the minimal depth and use it for high-dimensional variable selection using random survival forests. In big p and small n problems (where p is the dimension and n is the sample size), the distribution of the minimal depth reveals a “ceiling effect” in which a tree simply cannot be grown deep enough to properly identify predictive variables. Motivated by this limitation, we develop a new regularized algorithm, termed RSF-Variable Hunting. This algorithm exploits maximal subtrees for effective variable selection under such scenarios. Several applications are presented demonstrating the methodology, including the problem of gene selection using microarray data. In this work we focus only on survival settings, although our methodology also applies to other random forests applications, including regression and classification settings. All examples presented here use the R-software package randomSurvivalForest.", "title": "" }, { "docid": "6c9d163a7ad97ebecdfd82275990f315", "text": "We present and evaluate a new deep neural network architecture for automatic thoracic disease detection on chest X-rays. Deep neural networks have shown great success in a plethora of visual recognition tasks such as image classification and object detection by stacking multiple layers of convolutional neural networks (CNN) in a feed-forward manner. However, the performance gain by going deeper has reached bottlenecks as a result of the trade-off between model complexity and discrimination power. We address this problem by utilizing the recently developed routing-by agreement mechanism in our architecture. A novel characteristic of our network structure is that it extends routing to two types of layer connections (1) connection between feature maps in dense layers, (2) connection between primary capsules and prediction capsules in final classification layer. We show that our networks achieve comparable results with much fewer layers in the measurement of AUC score. We further show the combined benefits of model interpretability by generating Gradient-weighted Class Activation Mapping (Grad-CAM) for localization. We demonstrate our results on the NIH chestX-ray14 dataset that consists of 112,120 images on 30,805 unique patients including 14 kinds of lung diseases.", "title": "" }, { "docid": "36f068b9579788741f23c459570694fe", "text": "One of the difficulties in learning Chinese characters is distinguishing similar characters. This can cause misunderstanding and miscommunication in daily life. Thus, it is important for students learning the Chinese language to be able to distinguish similar characters and understand their proper usage. In this paper, the authors propose a game style framework to train students to distinguish similar characters. A major component in this framework is the search for similar Chinese characters in the system. From the authors’ prior work, they find the similar characters by the radical information and stroke correspondence determination. This paper improves the stroke correspondence determination by using the attributed relational graph (ARG) matching algorithm that considers both the stroke and spatial relationship during matching. The experimental results show that the new proposed method is more accurate in finding similar Chinese characters. Additionally, the authors have implemented online educational games to train students to distinguish similar Chinese characters and made use of the improved matching method for creating the game content automatically. DOI: 10.4018/jdet.2010070103 32 International Journal of Distance Education Technologies, 8(3), 31-46, July-September 2010 Copyright © 2010, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited. iNtroDUCtioN The evolution of computer technologies makes a big impact on traditional learning. Shih et al. (2007) and Chen et al. (2005) studied the impact of distant e-learning compared with traditional learning. Distant e-learning has many advantages over traditional learning such as no learning barrier in location, allowing more people to learn and providing an interactive learning environment. There is a great potential in adopting distant e-learning in areas with a sparse population. For example, in China, it is impractical to build schools in every village. As a result, some students have to spend a lot of time for travelling to school that may be quite far away from their home. If computers can be used for e-learning in this location, the students can save a lot of time for other learning activities. Moreover, there is a limit in the number of students whom a school can physically accommodate. Distant e-learning is a solution that gives the chance for more people to learn in their own pace without the physical limitation. In addition, distant e-learning allows certain levels of interactivity. The learners can get the immediate feedback from the e-learning system and enhance the efficiency in their learning. E-learning has been applied in different areas such as engineering by Sziebig (2008), maritime education by Jurian (2006), etc. Some researchers study the e-learning in Chinese handwriting education. Nowadays there exist many e-learning applications to help students learn their native or a foreign language. This paper is focused on the learning of the Chinese language. Some researchers (Tan, 2002; Teo et al., 2002) provide an interactive interface for students to practice Chinese character handwriting. These e-learning methods help students improve their handwriting skill by providing them a framework to repeat some handwriting exercises just like in the traditional learning. However, they have not considered how to maintain students’ motivation to complete the tasks. Green et al. (2007) suggested that game should be introduced for learning because games bring challenges to students, stimulate their curiosity, develop their creativity and let them have fun. One of the common problems in Chinese students’ handwriting is mixing up similar characters in the structure (e.g., 困, 因) or sound (e.g., 木, 目), and misusing them. Chinese characters are logographs and there are about 3000 commonly used characters. Learners have to memorize a lot of writing structures and their related meanings. It is difficult to distinguish similar Chinese characters with similar structure or sound even for people whose native language is Chinese. For training people in distinguishing similar characters, teachers often make some questions by presenting the similar characters and ask the students to find out the correct one under each case. There are some web-based games that aim to help students differentiate similar characters (The Academy of Chinese Studies & Erroneous Character Arena). These games work in a similar fashion in which they show a few choices of similar characters to the players and ask them to pick the correct one that should be used in a phrase. These games suffer from the drawback that the question-answer set is limited thus players feel bored easily and there is little replay value. On the other hand, creating a large set of question-answer pairs is time consuming if it is done manually. It is beneficial to have a system to generate the choices automatically.", "title": "" }, { "docid": "ac37ca6b8bb12305ac6e880e6e7c336a", "text": "In this paper, we are interested in learning the underlying graph structure behind training data. Solving this basic problem is essential to carry out any graph signal processing or machine learning task. To realize this, we assume that the data is smooth with respect to the graph topology, and we parameterize the graph topology using an edge sampling function. That is, the graph Laplacian is expressed in terms of a sparse edge selection vector, which provides an explicit handle to control the sparsity level of the graph. We solve the sparse graph learning problem given some training data in both the noiseless and noisy settings. Given the true smooth data, the posed sparse graph learning problem can be solved optimally and is based on simple rank ordering. Given the noisy data, we show that the joint sparse graph learning and denoising problem can be simplified to designing only the sparse edge selection vector, which can be solved using convex optimization.", "title": "" }, { "docid": "b1488b35284b6610d44d178d56cc89eb", "text": "We introduce an unsupervised discriminative model for the task of retrieving experts in online document collections. We exclusively employ textual evidence and avoid explicit feature engineering by learning distributed word representations in an unsupervised way. We compare our model to state-of-the-art unsupervised statistical vector space and probabilistic generative approaches. Our proposed log-linear model achieves the retrieval performance levels of state-of-the-art document-centric methods with the low inference cost of so-called profile-centric approaches. It yields a statistically significant improved ranking over vector space and generative models in most cases, matching the performance of supervised methods on various benchmarks. That is, by using solely text we can do as well as methods that work with external evidence and/or relevance feedback. A contrastive analysis of rankings produced by discriminative and generative approaches shows that they have complementary strengths due to the ability of the unsupervised discriminative model to perform semantic matching.", "title": "" }, { "docid": "9a2609d1b13e0fb43849d3e4ca8682fe", "text": "This report presents a brief overview of multimedia data mining and the corresponding workshop series at ACM SIGKDD conference series on data mining and knowledge discovery. It summarizes the presentations, conclusions and directions for future work that were discussed during the 3rd edition of the International Workshop on Multimedia Data Mining, conducted in conjunction with KDD-2002 in Edmonton, Alberta, Canada.", "title": "" }, { "docid": "92386ee2988b6d7b6f2f0b3cdcbf44ba", "text": "In the rst part of the paper we consider the problem of dynamically apportioning resources among a set of options in a worst-case on-line framework. The model we study can be interpreted as a broad, abstract extension of the well-studied on-line prediction model to a general decision-theoretic setting. We show that the multiplicative weightupdate rule of Littlestone and Warmuth [20] can be adapted to this model yielding bounds that are slightly weaker in some cases, but applicable to a considerably more general class of learning problems. We show how the resulting learning algorithm can be applied to a variety of problems, including gambling, multiple-outcome prediction, repeated games and prediction of points in R n . In the second part of the paper we apply the multiplicative weight-update technique to derive a new boosting algorithm. This boosting algorithm does not require any prior knowledge about the performance of the weak learning algorithm. We also study generalizations of the new boosting algorithm to the problem of learning functions whose range, rather than being binary, is an arbitrary nite set or a bounded segment of the real line.", "title": "" }, { "docid": "e78d53a2790ac3b6011910f82cefaff9", "text": "A two-dimensional crystal of molybdenum disulfide (MoS2) monolayer is a photoluminescent direct gap semiconductor in striking contrast to its bulk counterpart. Exfoliation of bulk MoS2 via Li intercalation is an attractive route to large-scale synthesis of monolayer crystals. However, this method results in loss of pristine semiconducting properties of MoS2 due to structural changes that occur during Li intercalation. Here, we report structural and electronic properties of chemically exfoliated MoS2. The metastable metallic phase that emerges from Li intercalation was found to dominate the properties of as-exfoliated material, but mild annealing leads to gradual restoration of the semiconducting phase. Above an annealing temperature of 300 °C, chemically exfoliated MoS2 exhibit prominent band gap photoluminescence, similar to mechanically exfoliated monolayers, indicating that their semiconducting properties are largely restored.", "title": "" }, { "docid": "7e682f98ee6323cd257fda07504cba20", "text": "We present a method for automated segmentation of the vasculature in retinal images. The method produces segmentations by classifying each image pixel as vessel or nonvessel, based on the pixel's feature vector. Feature vectors are composed of the pixel's intensity and two-dimensional Gabor wavelet transform responses taken at multiple scales. The Gabor wavelet is capable of tuning to specific frequencies, thus allowing noise filtering and vessel enhancement in a single step. We use a Bayesian classifier with class-conditional probability density functions (likelihoods) described as Gaussian mixtures, yielding a fast classification, while being able to model complex decision surfaces. The probability distributions are estimated based on a training set of labeled pixels obtained from manual segmentations. The method's performance is evaluated on publicly available DRIVE (Staal et al.,2004) and STARE (Hoover et al.,2000) databases of manually labeled images. On the DRIVE database, it achieves an area under the receiver operating characteristic curve of 0.9614, being slightly superior than that presented by state-of-the-art approaches. We are making our implementation available as open source MATLAB scripts for researchers interested in implementation details, evaluation, or development of methods", "title": "" }, { "docid": "5176645b3aca90b9f3e7d9fb8391063d", "text": "The role of dysfunctional attitudes in loneliness among college students was investigated. Subjects were 50 introductory psychology volunteers (20 male, 30 female) who completed measures of loneliness severity, depression, and dysfunctional attitudes. The results showed a strong predictive relationship between dysfunctional attitudes and loneliness even after level of depression was statistically controlled. Lonely college students' thinking is dominated by doubts about ability to find satisfying romantic relationships and fears of being rejected and hurt in an intimate pairing. Lonely individuals also experience much anxiety in interpersonal encounters and regard themselves as undesirable to others. Generally, a negative evaluation of self, especially in the social realm, is present. Implications of the results for treatment planning for lonely clients are discussed.", "title": "" }, { "docid": "3c8cc4192ee6ddd126e53c8ab242f396", "text": "There are several approaches for automated functional web testing and the choice among them depends on a number of factors, including the tools used for web testing and the costs associated with their adoption. In this paper, we present an empirical cost/benefit analysis of two different categories of automated functional web testing approaches: (1) capture-replay web testing (in particular, using Selenium IDE); and, (2) programmable web testing (using Selenium WebDriver). On a set of six web applications, we evaluated the costs of applying these testing approaches both when developing the initial test suites from scratch and when the test suites are maintained, upon the release of a new software version. Results indicate that, on the one hand, the development of the test suites is more expensive in terms of time required (between 32% and 112%) when the programmable web testing approach is adopted, but on the other hand, test suite maintenance is less expensive when this approach is used (with a saving between 16% and 51%). We found that, in the majority of the cases, after a small number of releases (from one to three), the cumulative cost of programmable web testing becomes lower than the cost involved with capture-replay web testing and the cost saving gets amplified over the successive releases.", "title": "" }, { "docid": "934875351d5fa0c9b5c7499ca13727ab", "text": "Computation of the simplicial complexes of a large point cloud often relies on extracting a sample, to reduce the associated computational burden. The study considers sampling critical points of a Morse function associated to a point cloud, to approximate the Vietoris-Rips complex or the witness complex and compute persistence homology. The effectiveness of the novel approach is compared with the farthest point sampling, in a context of classifying human face images into ethnics groups using persistence homology.", "title": "" }, { "docid": "5291162cd0841cc025f2a86b360372e6", "text": "The web contains countless semi-structured websites, which can be a rich source of information for populating knowledge bases. Existing methods for extracting relations from the DOM trees of semi-structured webpages can achieve high precision and recall only when manual annotations for each website are available. Although there have been efforts to learn extractors from automatically generated labels, these methods are not sufficiently robust to succeed in settings with complex schemas and information-rich websites. In this paper we present a new method for automatic extraction from semi-structured websites based on distant supervision. We automatically generate training labels by aligning an existing knowledge base with a website and leveraging the unique structural characteristics of semi-structured websites. We then train a classifier based on the potentially noisy and incomplete labels to predict new relation instances. Our method can compete with annotationbased techniques in the literature in terms of extraction quality. A large-scale experiment on over 400,000 pages from dozens of multi-lingual long-tail websites harvested 1.25 million facts at a precision of 90%. PVLDB Reference Format: Colin Lockard, Xin Luna Dong, Arash Einolghozati, Prashant Shiralkar. CERES: Distantly Supervised Relation Extraction from the Semi-Structured Web. PVLDB, 11(10): 1084-1096, 2018. DOI: https://doi.org/10.14778/3231751.3231758", "title": "" }, { "docid": "46ecd1781e1ab5866fde77b3a24be06a", "text": "Viral products and ideas are intuitively understood to grow through a person-to-person diffusion process analogous to the spread of an infectious disease; however, until recently it has been prohibitively difficult to directly observe purportedly viral events, and thus to rigorously quantify or characterize their structural properties. Here we propose a formal measure of what we label “structural virality” that interpolates between two extremes: content that gains its popularity through a single, large broadcast, and that which grows through multiple generations with any one individual directly responsible for only a fraction of the total adoption. We use this notion of structural virality to analyze a unique dataset of a billion diffusion events on Twitter, including the propagation of news stories, videos, images, and petitions. We find that the very largest observed events nearly always exhibit high structural virality, providing some of the first direct evidence that many of the most popular products and ideas grow through person-to-person diffusion. However, medium-sized events—having thousands of adopters—exhibit surprising structural diversity, and regularly grow via both broadcast and viral mechanisms. We find that these empirical results are largely consistent with a simple contagion model characterized by a low infection rate spreading on a scale-free network, reminiscent of previous work on the long-term persistence of computer viruses.", "title": "" }, { "docid": "41b17931c63d053bd0a339beab1c0cfc", "text": "The investigation and development of new methods from diverse perspectives to shed light on portfolio choice problems has never stagnated in financial research. Recently, multi-armed bandits have drawn intensive attention in various machine learning applications in online settings. The tradeoff between exploration and exploitation to maximize rewards in bandit algorithms naturally establishes a connection to portfolio choice problems. In this paper, we present a bandit algorithm for conducting online portfolio choices by effectually exploiting correlations among multiple arms. Through constructing orthogonal portfolios from multiple assets and integrating with the upper confidence bound bandit framework, we derive the optimal portfolio strategy that represents the combination of passive and active investments according to a risk-adjusted reward function. Compared with oft-quoted trading strategies in finance and machine learning fields across representative real-world market datasets, the proposed algorithm demonstrates superiority in both risk-adjusted return and cumulative wealth.", "title": "" } ]
scidocsrr
cb699c514df989d95ced9cad92499d5b
Temperature Acquisition and Control System based on the Arduino
[ { "docid": "6b2c009eca44ea374bb5f1164311e593", "text": "The ECG signal has been shown to contain relevant information for human identification. Even though results validate the potential of these signals, data acquisition methods and apparatus explored so far compromise user acceptability, requiring the acquisition of ECG at the chest. In this paper, we propose a finger-based ECG biometric system, that uses signals collected at the fingers, through a minimally intrusive 1-lead ECG setup recurring to Ag/AgCl electrodes without gel as interface with the skin. The collected signal is significantly more noisy than the ECG acquired at the chest, motivating the application of feature extraction and signal processing techniques to the problem. Time domain ECG signal processing is performed, which comprises the usual steps of filtering, peak detection, heartbeat waveform segmentation, and amplitude normalization, plus an additional step of time normalization. Through a simple minimum distance criterion between the test patterns and the enrollment database, results have revealed this to be a promising technique for biometric applications.", "title": "" } ]
[ { "docid": "4ad76f2c22a6429b7111349a86746aa0", "text": "A photovoltaic array (PVA) simulation model to be used in Matlab-Simulink GUI environment is developed and presented in this paper. The model is developed using basic circuit equations of the photovoltaic (PV) solar cells including the effects of solar irradiation and temperature changes. The new model was tested using a directly coupled dc load as well as ac load via an inverter. Test and validation studies with proper load matching circuits are simulated and results are presented here.", "title": "" }, { "docid": "d4f6282ba372801f1403541daf97d336", "text": "This study offers an in-depth analysis of four rumors that spread through Twitter after the 2013 Boston Marathon Bombings. Through qualitative and visual analysis, we describe each rumor's origins, changes over time, and relationships between different types of rumoring behavior. We identify several quantitative measures-including temporal progression, domain diversity, lexical diversity and geolocation features-that constitute a multi-dimensional signature for each rumor, and provide evidence supporting the existence of different rumor types. Ultimately these signatures enhance our understanding of how different kinds of rumors propagate online during crisis events. In constructing these signatures, this research demonstrates and documents an emerging method for deeply and recursively integrating qualitative and quantitative methods for analysis of social media trace data.", "title": "" }, { "docid": "e0cbc15328be153dc65e45c2b126df9f", "text": "This paper presents a time-to-digital converter (TDC) architecture capable of reaching high-precision and high-linearity with moderate area occupation per measurement channel. The architecture is based on a coarse counter and a couple of two-stage interpolators that exploit the cyclic sliding scale technique in order to improve the conversion linearity. The interpolators are based on a new coarse-fine synchronization circuit and a new single-stage Vernier delay loop fine interpolation. In a standard cost-effective 0.35 μm CMOS technology the TDC reaches a dynamic range of 160 ns, 17.2 ps precision and differential non-linearity better than 0.9% LSB rms. The TDC building block was designed in order to be easily assembled in a multi-channel monolithic TDC chip. Coupled with a SPAD photodetector it is aimed for TCSPC applications (like FLIM, FCS, FRET) and direct ToF 3-D ranging.", "title": "" }, { "docid": "9a03c5ff214a1a41280e6f4b335c87f1", "text": "In this paper, we present an automatic abstractive summarization system of meeting conversations. Our system extends a novel multi-sentence fusion algorithm in order to generate abstract templates. It also leverages the relationship between summaries and their source meeting transcripts to select the best templates for generating abstractive summaries of meetings. Our manual and automatic evaluation results demonstrate the success of our system in achieving higher scores both in readability and informativeness.", "title": "" }, { "docid": "e2fc186c227910de013a7456bc6d800d", "text": "The study was carried out to investigate the acute and sublethal toxicity of Moringa oleifera seed extract on hematological and biochemical variables of a freshwater fish Cyprinus carpio under laboratory conditions. The 96 h LC50 value of M. oleifera seed extract to the fish C. carpio was estimated by probit analysis method and was found to be 124.0 mg/L (with 95% confidence limits). For sublethal studies a non lethal dose of 1/10th of 96 h LC50 value (12.40 mg/L) was taken. During acute treatment (96 h), hematological variables like red blood cell count (RBC), hemoglobin (Hb), hematocrit (Hct), and mean corpuscular hemoglobin concentration (MCHC) were significantly (P<0.05) decreased in fish exposed to seed extract. However a significant (P<0.05) increase in white blood cell count (WBC), mean corpuscular volume (MCV) and mean corpuscular hemoglobin (MCH) value was observed in the exposed fish during above treatment period when compared to that of the control groups. Biochemical parameters such as plasma protein and glucose levels significantly declined in fish exposed to seed extract while a significant (P<0.05) increase in aspartate aminotransferase (AST), alanine aminotransferase (ALT) and alkaline phosphatase (ALP) activity was observed. During sublethal treatment (12.40 mg/L), WBC count, MCV, MCH, plasma glucose, AST, ALT and ALP activities were gradually elevated (P<0.05) at the end of 7, 14, 21, 28 and 35th days in seed extract exposed fish, whereas plasma protein level declined. However, a biphasic trend was noticed in Hb, Hct, RBC and MCHC levels. This study may provide baseline information about the toxicity of M. oleifera seed extract to C. carpio and to establish safer limit in water purification.", "title": "" }, { "docid": "1fcdfd02a6ecb12dec5799d6580c67d4", "text": "One of the major problems in developing countries is maintenance of roads. Well maintained roads contribute a major portion to the country's economy. Identification of pavement distress such as potholes and humps not only helps drivers to avoid accidents or vehicle damages, but also helps authorities to maintain roads. This paper discusses previous pothole detection methods that have been developed and proposes a cost-effective solution to identify the potholes and humps on roads and provide timely alerts to drivers to avoid accidents or vehicle damages. Ultrasonic sensors are used to identify the potholes and humps and also to measure their depth and height, respectively. The proposed system captures the geographical location coordinates of the potholes and humps using a global positioning system receiver. The sensed-data includes pothole depth, height of hump, and geographic location, which is stored in the database (cloud). This serves as a valuable source of information to the government authorities and vehicle drivers. An android application is used to alert drivers so that precautionary measures can be taken to evade accidents. Alerts are given in the form of a flash messages with an audio beep.", "title": "" }, { "docid": "98f551a5af7efe8537b63d482e26c907", "text": "This research is aimed at identifying the determinants that influence higher educational students’ behavioral intention to utilize elearning systems. The study, therefore, proposed an extension of Unified Theory of Acceptance and use of Technology (UTAUT) model by integrating it with four other variables. Data collected from 264 higher educational students using e-learning systems in Ghana through survey questionnaire were used to test the proposed research model. The study indicated that six variables, Performance expectancy (PE), Effort Expectancy (EE), Social Influence (SI), Facilitating Factor (FF), personal innovativeness (PI) and Study Modes (SM) had significant impact on students’ behavioral intention on e-learning system. The empirical outcome reflects both theoretical and practical consideration in promoting e-learning systems in higher education in Ghana.", "title": "" }, { "docid": "f596a018fd10374df79544063c509b9d", "text": "We contribute a dense SLAM system that takes a live stream of depth images as input and reconstructs nonrigid deforming scenes in real time, without templates or prior models. In contrast to existing approaches, we do not maintain any volumetric data structures, such as truncated signed distance function (TSDF) fields or deformation fields, which are performance and memory intensive. Our system works with a flat point (surfel) based representation of geometry, which can be directly acquired from commodity depth sensors. Standard graphics pipelines and general purpose GPU (GPGPU) computing are leveraged for all central operations: i.e., nearest neighbor maintenance, non-rigid deformation field estimation and fusion of depth measurements. Our pipeline inherently avoids expensive volumetric operations such as marching cubes, volumetric fusion and dense deformation field update, leading to significantly improved performance. Furthermore, the explicit and flexible surfel based geometry representation enables efficient tackling of topology changes and tracking failures, which makes our reconstructions consistent with updated depth observations. Our system allows robots maintain a scene description with nonrigidly deformed objects that potentially enables interactions with dynamic working environments.", "title": "" }, { "docid": "88bb56e36c493ed2ac723acbc6090f2b", "text": "In this paper, we propose a generic point cloud encoder that provides a unified framework for compressing different attributes of point samples corresponding to 3D objects with an arbitrary topology. In the proposed scheme, the coding process is led by an iterative octree cell subdivision of the object space. At each level of subdivision, the positions of point samples are approximated by the geometry centers of all tree-front cells, whereas normals and colors are approximated by their statistical average within each of the tree-front cells. With this framework, we employ attribute-dependent encoding techniques to exploit the different characteristics of various attributes. All of these have led to a significant improvement in the rate-distortion (R-D) performance and a computational advantage over the state of the art. Furthermore, given sufficient levels of octree expansion, normal space partitioning, and resolution of color quantization, the proposed point cloud encoder can be potentially used for lossless coding of 3D point clouds.", "title": "" }, { "docid": "445d57e24150087a866fc34ddb422184", "text": "A survey of the major techniques used in the design of microwave filters is presented in this paper. It is shown that the basis for much fundamental microwave filter theory lies in the realm of lumped-element filters, which indeed are actually used directly for many applications at microwave frequencies as high as 18 GHz. Many types of microwave filters are discussed with the object of pointing out the most useful references, especially for a newcomer to the field.", "title": "" }, { "docid": "6ae33cdc9601c90f9f3c1bda5aa8086f", "text": "A k-uniform hypergraph is hamiltonian if for some cyclic ordering of its vertex set, every k consecutive vertices form an edge. In 1952 Dirac proved that if the minimum degree in an n-vertex graph is at least n/2 then the graph is hamiltonian. We prove an approximate version of an analogous result for uniform hypergraphs: For every k ≥ 3 and γ > 0, and for all n large enough, a sufficient condition for an n-vertex k-uniform hypergraph to be hamiltonian is that each (k − 1)-element set of vertices is contained in at least (1/2 + γ)n edges. Research supported by NSF grant DMS-0300529. Research supported by KBN grant 2 P03A 015 23 and N201036 32/2546. Part of research performed at Emory University, Atlanta. Research supported by NSF grant DMS-0100784", "title": "" }, { "docid": "a500f7d7288aee9aa7006a1d902a3bff", "text": "Today, mobile devices like smartphones and tablets have become an indispensable part of people's lives, posing many new questions e.g., in terms of interaction methods, but also security. In this paper, we conduct a large scale, long term analysis of mobile device usage characteristics like session length, interaction frequency, and daily usage in locked and unlocked state with respect to location context and diurnal pattern. Based on detailed logs from 29,279 mobile phones and tablets representing a total of 5,811 years of usage time, we identify and analyze 52.2 million usage sessions with some participants providing data for more than four years.\n Our results show that context has a highly significant effect on both frequency and extent of mobile device usage, with mobile phones being used twice as much at home compared to in the office. Interestingly, devices are unlocked for only 46 % of the interactions. We found that with an average of 60 interactions per day, smartphones are used almost thrice as often as tablet devices (23), while usage sessions on tablets are three times longer, hence are used almost for an equal amount of time throughout the day. We conclude that usage session characteristics differ considerably between tablets and smartphones. These results inform future approaches to mobile interaction as well as security.", "title": "" }, { "docid": "b0687c84e408f3db46aa9fba6f9eeeb9", "text": "Sex estimation is considered as one of the essential parameters in forensic anthropology casework, and requires foremost consideration in the examination of skeletal remains. Forensic anthropologists frequently employ morphologic and metric methods for sex estimation of human remains. These methods are still very imperative in identification process in spite of the advent and accomplishment of molecular techniques. A constant boost in the use of imaging techniques in forensic anthropology research has facilitated to derive as well as revise the available population data. These methods however, are less reliable owing to high variance and indistinct landmark details. The present review discusses the reliability and reproducibility of various analytical approaches; morphological, metric, molecular and radiographic methods in sex estimation of skeletal remains. Numerous studies have shown a higher reliability and reproducibility of measurements taken directly on the bones and hence, such direct methods of sex estimation are considered to be more reliable than the other methods. Geometric morphometric (GM) method and Diagnose Sexuelle Probabiliste (DSP) method are emerging as valid methods and widely used techniques in forensic anthropology in terms of accuracy and reliability. Besides, the newer 3D methods are shown to exhibit specific sexual dimorphism patterns not readily revealed by traditional methods. Development of newer and better methodologies for sex estimation as well as re-evaluation of the existing ones will continue in the endeavour of forensic researchers for more accurate results.", "title": "" }, { "docid": "f2b4f786ecd63b454437f066deecfe4a", "text": "The causal role of human papillomavirus (HPV) in all cancers of the uterine cervix has been firmly established biologically and epidemiologically. Most cancers of the vagina and anus are likewise caused by HPV, as are a fraction of cancers of the vulva, penis, and oropharynx. HPV-16 and -18 account for about 70% of cancers of the cervix, vagina, and anus and for about 30-40% of cancers of the vulva, penis, and oropharynx. Other cancers causally linked to HPV are non-melanoma skin cancer and cancer of the conjunctiva. Although HPV is a necessary cause of cervical cancer, it is not a sufficient cause. Thus, other cofactors are necessary for progression from cervical HPV infection to cancer. Long-term use of hormonal contraceptives, high parity, tobacco smoking, and co-infection with HIV have been identified as established cofactors; co-infection with Chlamydia trachomatis (CT) and herpes simplex virus type-2 (HSV-2), immunosuppression, and certain dietary deficiencies are other probable cofactors. Genetic and immunological host factors and viral factors other than type, such as variants of type, viral load and viral integration, are likely to be important but have not been clearly identified.", "title": "" }, { "docid": "669e395f80b4cac7b1765be0e8afd2db", "text": "Content Security Policy (CSP) is a browser security mechanism that aims to protect websites from content injection attacks. To adopt CSP, website developers need to manually compile a list of allowed content sources. Nearly all websites require modifications to comply with CSP’s default behavior, which blocks inline scripts and the use of the eval() function. Alternatively, websites could adopt a policy that allows the use of this unsafe functionality, but this opens up potential attack vectors. In this paper, our measurements on a large corpus of web applications provide a key insight on the amount of efforts web developers required to adapt to CSP. Our results also identified errors in CSP policies that are set by website developers on their websites. To address these issues and make adoption of CSP easier and error free, we implemented UserCSP a tool as a Firefox extension. The UserCSP uses dynamic analysis to automatically infer CSP policies, facilitates testing, and gives savvy users the authority to enforce client-side policies on websites.", "title": "" }, { "docid": "61225cc75aac3bd6b61d7a45ad4ceb1f", "text": "We present a pipeline of algorithms that decomposes a given polygon model into parts such that each part can be 3D printed with high (outer) surface quality. For this we exploit the fact that most 3D printing technologies have an anisotropic resolution and hence the surface smoothness varies significantly with the orientation of the surface. Our pipeline starts by segmenting the input surface into patches such that their normals can be aligned perpendicularly to the printing direction. A 3D Voronoi diagram is computed such that the intersections of the Voronoi cells with the surface approximate these surface patches. The intersections of the Voronoi cells with the input model’s volume then provide an initial decomposition. We further present an algorithm to compute an assembly order for the parts and generate connectors between them. A post processing step further optimizes the seams between segments to improve the visual quality. We run our pipeline on a wide range of 3D models and experimentally evaluate the obtained improvements in terms of numerical, visual, and haptic quality.", "title": "" }, { "docid": "9d803b0ce1f1af621466b1d7f97b7edf", "text": "This research paper addresses the methodology and approaches to managing criminal computer forensic investigations in a law enforcement environment with management controls, operational controls, and technical controls. Management controls cover policy and standard operating procedures (SOP's), methodology, and guidance. Operational controls cover SOP requirements, seizing evidence, evidence handling, best practices, and education, training and awareness. Technical controls cover acquisition and analysis procedures, data integrity, rules of evidence, presenting findings, proficiency testing, and data archiving.", "title": "" }, { "docid": "939f05a2265c6ab21b273a8127806279", "text": "Acne is a common inflammatory disease. Scarring is an unwanted end point of acne. Both atrophic and hypertrophic scar types occur. Soft-tissue augmentation aims to improve atrophic scars. In this review, we will focus on the use of dermal fillers for acne scar improvement. Therefore, various filler types are characterized, and available data on their use in acne scar improvement are analyzed.", "title": "" }, { "docid": "d35dc7e653dbe5dca7e1238ea8ced0a5", "text": "Temperature-aware computing is becoming more important in design of computer systems as power densities are increasing and the implications of high operating temperatures result in higher failure rates of components and increased demand for cooling capability. Computer architects and system software designers need to understand the thermal consequences of their proposals, and develop techniques to lower operating temperatures to reduce both transient and permanent component failures. Recognizing the need for thermal modeling tools to support those researches, there has been work on modeling temperatures of processors at the micro-architectural level which can be easily understood and employed by computer architects for processor designs. However, there is a dearth of such tools in the academic/research community for undertaking architectural/systems studies beyond a processor - a server box, rack or even a machine room. In this paper we presents a detailed 3-dimensional computational fluid dynamics based thermal modeling tool, called ThermoStat, for rack-mounted server systems. We conduct several experiments with this tool to show how different load conditions affect the thermal profile, and also illustrate how this tool can help design dynamic thermal management techniques. We propose reactive and proactive thermal management for rack mounted server and isothermal workload distribution for rack.", "title": "" }, { "docid": "ddae1c6469769c2c7e683bfbc223ad1a", "text": "Deep reinforcement learning has achieved many impressive results in recent years. However, tasks with sparse rewards or long horizons continue to pose significant challenges. To tackle these important problems, we propose a general framework that first learns useful skills in a pre-training environment, and then leverages the acquired skills for learning faster in downstream tasks. Our approach brings together some of the strengths of intrinsic motivation and hierarchical methods: the learning of useful skill is guided by a single proxy reward, the design of which requires very minimal domain knowledge about the downstream tasks. Then a high-level policy is trained on top of these skills, providing a significant improvement of the exploration and allowing to tackle sparse rewards in the downstream tasks. To efficiently pre-train a large span of skills, we use Stochastic Neural Networks combined with an information-theoretic regularizer. Our experiments1 show2 that this combination is effective in learning a wide span of interpretable skills in a sample-efficient way, and can significantly boost the learning performance uniformly across a wide range of downstream tasks.", "title": "" } ]
scidocsrr
e3ae094717fa7fe7614cc6f8907d616b
Optical Flow Estimation Using a Spatial Pyramid Network
[ { "docid": "c29349c32074392e83f51b1cd214ec8a", "text": "Recent work has shown that optical flow estimation can be formulated as a supervised learning task and can be successfully solved with convolutional networks. Training of the so-called FlowNet was enabled by a large synthetically generated dataset. The present paper extends the concept of optical flow estimation via convolutional networks to disparity and scene flow estimation. To this end, we propose three synthetic stereo video datasets with sufficient realism, variation, and size to successfully train large networks. Our datasets are the first large-scale datasets to enable training and evaluation of scene flow methods. Besides the datasets, we present a convolutional network for real-time disparity estimation that provides state-of-the-art results. By combining a flow and disparity estimation network and training it jointly, we demonstrate the first scene flow estimation with a convolutional network.", "title": "" } ]
[ { "docid": "0e218dd5654ae9125d40bdd5c0a326d6", "text": "Dynamic data race detection incurs heavy runtime overheads. Recently, many sampling techniques have been proposed to detect data races. However, some sampling techniques (e.g., Pacer) are based on traditional happens-before relation and incur a large basic overhead. Others utilize hardware to reduce their sampling overhead (e.g., DataCollider) and they, however, detect a race only when the race really occurs by delaying program executions. In this paper, we study the limitations of existing techniques and propose a new data race definition, named as Clock Races, for low overhead sampling purpose. The innovation of clock races is that the detection of them does not rely on concrete locks and also avoids heavy basic overhead from tracking happens-before relation. We further propose CRSampler (Clock Race Sampler) to detect clock races via hardware based sampling without directly delaying program executions, to further reduce runtime overhead. We evaluated CRSampler on Dacapo benchmarks. The results show that CRSampler incurred less than 5% overhead on average at 1% sampling rate. Whereas, Pacer and DataCollider incurred larger than 25% and 96% overhead, respectively. Besides, at the same sampling rate, CRSampler detected significantly more data races than that by Pacer and DataCollider.", "title": "" }, { "docid": "37e65ab2fc4d0a9ed5b8802f41a1a2a2", "text": "This paper is based on a panel discussion held at the Artificial Intelligence in Medicine Europe (AIME) conference in Amsterdam, The Netherlands, in July 2007. It had been more than 15 years since Edward Shortliffe gave a talk at AIME in which he characterized artificial intelligence (AI) in medicine as being in its \"adolescence\" (Shortliffe EH. The adolescence of AI in medicine: will the field come of age in the '90s? Artificial Intelligence in Medicine 1993;5:93-106). In this article, the discussants reflect on medical AI research during the subsequent years and characterize the maturity and influence that has been achieved to date. Participants focus on their personal areas of expertise, ranging from clinical decision-making, reasoning under uncertainty, and knowledge representation to systems integration, translational bioinformatics, and cognitive issues in both the modeling of expertise and the creation of acceptable systems.", "title": "" }, { "docid": "9c2debf407dce58d77910ccdfc55a633", "text": "In cybersecurity competitions, participants either create new or protect preconfigured information systems and then defend these systems against attack in a real-world setting. Institutions should consider important structural and resource-related issues before establishing such a competition. Critical infrastructures increasingly rely on information systems and on the Internet to provide connectivity between systems. Maintaining and protecting these systems requires an education in information warfare that doesn't merely theorize and describe such concepts. A hands-on, active learning experience lets students apply theoretical concepts in a physical environment. Craig Kaucher and John Saunders found that even for management-oriented graduate courses in information assurance, such an experience enhances the students' understanding of theoretical concepts. Cybersecurity exercises aim to provide this experience in a challenging and competitive environment. Many educational institutions use and implement these exercises as part of their computer science curriculum, and some are organizing competitions with commercial partners as capstone exercises, ad hoc hack-a-thons, and scenario-driven, multiday, defense-only competitions. Participants have exhibited much enthusiasm for these exercises, from the DEFCON capture-the-flag exercise to the US Military Academy's Cyber Defense Exercise (CDX). In February 2004, the US National Science Foundation sponsored the Cyber Security Exercise Workshop aimed at harnessing this enthusiasm and interest. The educators, students, and government and industry representatives attending the workshop discussed the feasibility and desirability of establishing regular cybersecurity exercises for postsecondary-level students. This article summarizes the workshop report.", "title": "" }, { "docid": "517d9e98352aa626cecae9e17cbbbc97", "text": "The variational encoder-decoder (VED) encodes source information as a set of random variables using a neural network, which in turn is decoded into target data using another neural network. In natural language processing, sequence-to-sequence (Seq2Seq) models typically serve as encoderdecoder networks. When combined with a traditional (deterministic) attention mechanism, the variational latent space may be bypassed by the attention model, and thus becomes ineffective. In this paper, we propose a variational attention mechanism for VED, where the attention vector is also modeled as Gaussian distributed random variables. Results on two experiments show that, without loss of quality, our proposed method alleviates the bypassing phenomenon as it increases the diversity of generated sentences.1", "title": "" }, { "docid": "10f3cafc05b3fb3b235df34aebbe0e23", "text": "To cope with monolithic controller replicas and the current unbalance situation in multiphase converters, a pseudo-ramp current balance technique is proposed to achieve time-multiplexing current balance in voltage-mode multiphase DC-DC buck converter. With only one modulation controller, silicon area and power consumption caused by the replicas of controller can be reduced significantly. Current balance accuracy can be further enhanced since the mismatches between different controllers caused by process, voltage, and temperature variations are removed. Moreover, the offset cancellation control embedded in the current matching unit is used to eliminate intrinsic offset voltage existing at the operational transconductance amplifier for improved current balance. An explicit model, which contains both voltage and current balance loops with non-ideal effects, is derived for analyzing system stability. Experimental results show that current difference between each phase can be decreased by over 83% under both heavy and light load conditions.", "title": "" }, { "docid": "227eafe2c4a014339dcd241e465c2f5c", "text": "Language is a means of expression. We express our feelings, emotions, thoughts, needs, desires etc. in words, symbols and gesture which is considered as language. Language can be defined as verbal, physical, biologically innate, and a basic form of communication. Culture is the characteristics of a particular group of people, defined by everything from language, religion, cuisine, social habits, music and arts. Thus culture finds its expression in language; so, learning a new language without familiarity with its culture remains incomplete. An important question arises here, is it necessary to learn about the culture of the target language to acquire English as a foreign or second language? There are great discussions by many scholars and researchers on this topic for decades. This article aims at defining culture, its relationship with language and what role it plays in teaching and learning English as a foreign or second language. This also shed light on how to teach culture in English language classroom.", "title": "" }, { "docid": "01f9b07bc5c6ca47a6181deb908445e8", "text": "This paper deals with deep neural networks for predicting accurate dense disparity map with Semi-global matching (SGM). SGM is a widely used regularization method for real scenes because of its high accuracy and fast computation speed. Even though SGM can obtain accurate results, tuning of SGMs penalty-parameters, which control a smoothness and discontinuity of a disparity map, is uneasy and empirical methods have been proposed. We propose a learning based penalties estimation method, which we call SGM-Nets that consist of Convolutional Neural Networks. A small image patch and its position are input into SGMNets to predict the penalties for the 3D object structures. In order to train the networks, we introduce a novel loss function which is able to use sparsely annotated disparity maps such as captured by a LiDAR sensor in real environments. Moreover, we propose a novel SGM parameterization, which deploys different penalties depending on either positive or negative disparity changes in order to represent the object structures more discriminatively. Our SGM-Nets outperformed state of the art accuracy on KITTI benchmark datasets.", "title": "" }, { "docid": "4927fee47112be3d859733c498fbf594", "text": "To design effective tools for detecting and recovering from software failures requires a deep understanding of software bug characteristics. We study software bug characteristics by sampling 2,060 real world bugs in three large, representative open-source projects—the Linux kernel, Mozilla, and Apache. We manually study these bugs in three dimensions—root causes, impacts, and components. We further study the correlation between categories in different dimensions, and the trend of different types of bugs. The findings include: (1) semantic bugs are the dominant root cause. As software evolves, semantic bugs increase, while memory-related bugs decrease, calling for more research effort to address semantic bugs; (2) the Linux kernel operating system (OS) has more concurrency bugs than its non-OS counterparts, suggesting more effort into detecting concurrency bugs in operating system code; and (3) reported security bugs are increasing, and the majority of them are caused by semantic bugs, suggesting more support to help developers diagnose and fix security bugs, especially semantic security bugs. In addition, to reduce the manual effort in building bug benchmarks for evaluating bug detection and diagnosis tools, we use machine learning techniques to classify 109,014 bugs automatically.", "title": "" }, { "docid": "14cc42c141a420cb354473a38e755091", "text": "During software evolution, information about changes between different versions of a program is useful for a number of software engineering tasks. For example, configuration-management systems can use change information to assess possible conflicts among updates from different users. For another example, in regression testing, knowledge about which parts of a program are unchanged can help in identifying test cases that need not be rerun. For many of these tasks, a purely syntactic differencing may not provide enough information for the task to be performed effectively. This problem is especially relevant in the case of object-oriented software, for which a syntactic change can have subtle and unforeseen effects. In this paper, we present a technique for comparing object-oriented programs that identifies both differences and correspondences between two versions of a program. The technique is based on a representation that handles object-oriented features and, thus, can capture the behavior of object-oriented programs. We also present JDiff, a tool that implements the technique for Java programs. Finally, we present the results of four empirical studies, performed on many versions of two medium-sized subjects, that show the efficiency and effectiveness of the technique when used on real programs.", "title": "" }, { "docid": "238aac56366875b1714284d3d963fe9b", "text": "We construct a general-purpose multi-input functional encryption scheme in the private-key setting. Namely, we construct a scheme where a functional key corresponding to a function f enables a user holding encryptions of $$x_1, \\ldots , x_t$$ x1,…,xt to compute $$f(x_1, \\ldots , x_t)$$ f(x1,…,xt) but nothing else. This is achieved starting from any general-purpose private-key single-input scheme (without any additional assumptions) and is proven to be adaptively secure for any constant number of inputs t. Moreover, it can be extended to a super-constant number of inputs assuming that the underlying single-input scheme is sub-exponentially secure. Instantiating our construction with existing single-input schemes, we obtain multi-input schemes that are based on a variety of assumptions (such as indistinguishability obfuscation, multilinear maps, learning with errors, and even one-way functions), offering various trade-offs between security assumptions and functionality. Previous and concurrent constructions of multi-input functional encryption schemes either rely on stronger assumptions and provided weaker security guarantees (Goldwasser et al. in Advances in cryptology—EUROCRYPT, 2014; Ananth and Jain in Advances in cryptology—CRYPTO, 2015), or relied on multilinear maps and could be proven secure only in an idealized generic model (Boneh et al. in Advances in cryptology—EUROCRYPT, 2015). In comparison, we present a general transformation that simultaneously relies on weaker assumptions and guarantees stronger security.", "title": "" }, { "docid": "e566bb3425c986c22e76f78183eb2bb7", "text": "A blog site consists of many individual blog postings. Current blog search services focus on retrieving postings but there is also a need to identify relevant blog sites. Blog site search is similar to resource selection in distributed information retrieval, in that the target is to find relevant collections of documents. We introduce resource selection techniques for blog site search and evaluate their performance. Further, we propose a \"diversity factor\" that measures the topic diversity of each blog site. Our results show that the appropriate combination of the resource selection techniques and the diversity factor can achieve significant improvements in retrieval performance compared to baselines. We also report results using these techniques on the TREC blog distillation task.", "title": "" }, { "docid": "432149654abdfdabb9147a830f50196d", "text": "In this paper, an advanced High Voltage (HV) IGBT technology, which is focused on low loss and is the ultimate device concept for HV IGBT, is presented. CSTBTTM technology utilizing “ULSI technology” and “Light Punch-Through (LPT) II technology” (i.e. narrow Wide Cell Pitch LPT(II)-CSTBT(III)) for the first time demonstrates breaking through the limitation of HV IGBT's characteristics with voltage ratings ranging from 2500 V up to 6500 V. The improved significant trade-off characteristic between on-state voltage (VCE(sat)) and turn-off loss (EOFF) is achieved by means of a “narrow Wide Cell Pitch CSTBT(III) cell”. In addition, this device achieves a wide operating junction temperature (@218 ∼ 448K) and excellent short circuit behavior with the new cell and vertical designs. The LPT(II) concept is utilized for ensuring controllable IGBT characteristics and achieving a thin N− drift layer. Our results cover design of the Wide Cell Pitch LPT(II)-CSTBT(III) technology and demonstrate high total performance with a great improvement potential.", "title": "" }, { "docid": "4d1a448569c55f919d9ce4da0928c89a", "text": "The hit, break and cut classes of verbs are grammatically relevant in Kimaragang, as in English. The relevance of such classes for determining how arguments are expressed suggests that the meaning of a verb is composed of (a) systematic components of meaning (the EVENT TEMPLATE); and (b) idiosyncratic properties of the individual root. Assuming this approach to be essentially correct, we compare grammatical phenomena in Kimaragang which are sensitive to verb class membership with phenomena which are not class-sensitive. The tendency that emerges is that class-sensitive alternations do not seem to be affix-dependent, and are quite restricted in their ability to introduce new arguments into the argument structure. 1. Verbs of hitting and breaking in English This paper discusses the relationship between verbal semantics and clause structure in Kimaragang Dusun, an endangered Philippine-type language of northern Borneo. It builds on a classic paper by Charles Fillmore (1970), in which he distinguishes two classes of transitive verbs in English: “surface contact” verbs (e.g., hit, slap, strike, bump, stroke) vs. “change of state” verbs (e.g., break, bend, fold, shatter, crack). Fillmore shows that the members of each class share certain syntactic and semantic properties which distinguish them from members of the other class. He further argues that the correlation between these syntactic and semantic properties supports a view of lexical semantics under which the meaning of a verb is made up of two kinds of elements: (a) systematic components of meaning that are shared by an entire class; and (b) idiosyncratic components that are specific to the individual root. Only the former are assumed to be “grammatically relevant.” This basic insight has been foundational for a large body of subsequent work in the area of lexical semantics. One syntactic test that distinguishes hit verbs from break verbs in English is the “causative alternation”, which is systematically possible with break verbs (John broke the window vs. The 1 I would like to thank Jim Johansson, Farrell Ackerman and John Beavers for helpful discussion of these issues. Thanks also to Jim Johansson for giving me access to his field dictionary (Johansson, n.d.), the source of many of the Kimaragang examples in this paper. Special thanks are due to my primary language consultant, Janama Lantubon. Part of the research for this study was supported by NEH-NSF Documenting Endangered Languages fellowship no. FN-50027-07. The grammar of hitting, breaking and cutting in Kimaragang Dusun 2 window broke) but systematically impossible with hit verbs (John hit the window vs. *The window hit). A second test involves a kind of “possessor ascension”, a paraphrase in which the possessor of a body-part noun can be expressed as direct object. This paraphrase is grammatical with hit verbs (I hit his leg vs. I hit him on the leg) but not with break verbs (I broke his leg vs. *I broke him on the leg). A third diagnostic relates to the potential ambiguity of the passive participle. Participles of both classes take a verbal-eventive reading; but participles of break verbs also allow an adjectival-stative reading (the window is still broken) which is unavailable for participles of hit verbs (*the window is still hit). Semantically, the crucial difference between the two classes is that break verbs entail a result, specifically a “separation in [the] material integrity” of the patient (Hale and Keyser 1987). This entailment cannot be cancelled (e.g., I broke the window with a hammer; #it didn’t faze the window, but the hammer shattered). The hit verbs, in contrast, do not have this entailment (I hit the window with a hammer; it didn’t faze the window, but the hammer shattered). A second difference is that break verbs may impose selectional restrictions based on physical properties of the object (I {folded/?bent/ *broke/*shattered} the blanket) whereas hit verbs do not (I {hit/slapped/struck/beat} the blanket). Selectional restrictions of hit verbs are more likely to be based on physical properties of the instrument. In the years since 1970, these two classes of verbs have continued to be studied and discussed in numerous publications. Additional diagnostics have been identified, including the with/against alternation (examples 1–2; cf. Fillmore 1977:75); the CONATIVE alternation (Mary hit/broke the piñata vs. Mary hit/*broke at the piñata; Guerssel et al. 1985); and the Middle alternation (This glass breaks/*hits easily; Fillmore 1977, Hale and Keyser 1987). These tests and others are summarized in Levin (1993). (1) a. I hit the fence with the stick. b. I hit the stick against the fence. (2) a. I broke the window with the stick. b. #I broke the stick against the window. (not the same meaning!!) Another verb class that has received considerable attention in recent years is the cut class (e.g., Guerssel et al. 1985, Bohnemeyer 2007, Asifa et al. 2007). In this paper I will show that these same three classes (hit, break, cut) are distinguished by a number of grammatical and semantic properties in Kimaragang as well. Section 2 briefly introduces some of the basic assumptions that we will adopt about the structure of verb meanings. Section 3 discusses criteria that distinguish hit verbs from break verbs, and section 4 discusses the properties of the cut verbs. Section 5 introduces another test, which I refer to as the instrumental alternation, which exhibits a different pattern for each of the three classes. Section 6 discusses the tests themselves, trying to identify characteristic properties of the constructions that are sensitive to verb classes, and which distinguish these constructions from those that are not class-sensitive. 2. What do verb classes tell us? Fillmore‟s approach to the study of verb meanings has inspired a large volume of subsequent research; see for example Levin (1993), Levin and Rappaport Hovav (1995, 1998, 2005; henceforth L&RH), and references cited in those works. Much of this research is concerned with exploring the following hypotheses, which were already at least partially articulated in Fillmore (1970): The grammar of hitting, breaking and cutting in Kimaragang Dusun 3 a. Verb meanings are composed of two kinds of information. Some components of meaning are systematic, forming a kind of “event template”, while others are idiosyncratic, specific to that particular root. b. Only systematic components of meaning are “grammatically relevant”, more specifically, relevant to argument realization. c. Grammatically determined verb classes are sets of verbs that share the same template. The systematic aspects of meaning distinguish one class from another, while roots belonging to the same class are distinguished by features of their idiosyncratic meaning. Levin (1993) states: “[T]here is a sense in which the notion of verb class is an artificial construct. Verb classes arise because a set of verbs with one or more shared meaning components show similar behavior... The important theoretical construct is the meaning component, not the verb class...” Identifying semantically determined sets of verbs is thus a first step in understanding what elements of meaning are relevant for determining how arguments will be expressed. Notice that the three prototypical verbs under consideration here (hit, beak, cut) are all transitive verbs, and all three select the same set of semantic roles: agent, patient, plus optional instrument. Thus the event template that defines each class, and allows us to account for the grammatical differences summarized above, must be more than a simple list of semantic roles. In addition to identifying grammatically relevant components of meaning, the study of verb classes is important as a means of addressing the following questions: (a) What is the nature of the “event template”, and how should it be represented? and (b) What morpho-syntactic processes or constructions are valid tests for “grammatical relevance” in the sense intended above? Clearly these three issues are closely inter-related, and cannot be fully addressed in isolation from each other. However, in this paper I will focus primarily on the third question, which I will re-state in the following way: What kinds of grammatical constructions or tests are relevant for identifying semantically-based verb classes? 3. Verbs of hitting and breaking in Kimaragang 3.1 Causative-inchoative alternation Kimaragang is structurally very similar to the languages of the central Philippines. In particular, Kimaragang exhibits the rich Philippine-type voice system in which the semantic role of the subject (i.e., the NP marked for nominative case) is indicated by the voice affixation of the verb. 2 In the Active Voice, an additional “transitivity” prefix occurs on transitive verbs; this prefix is lacking on intransitive verbs. 3 Many verbal roots occur in both transitive and intransitive forms, as illustrated in (3) with the root patay „die; kill‟. In the most productive pattern, and the one of interest to us here, the intransitive form has an inchoative (change of state) meaning while the transitive form has a causative meaning. However, it is important to note that there is no causative morpheme present in these forms (morphological causatives are marked by a different prefix, po-, as discussed in section 6.1). 2 See Kroeger (2005) for a more detailed summary with examples. 3 For details see Kroeger (1996); Kroeger & Johansson (2005). The grammar of hitting, breaking and cutting in Kimaragang Dusun 4 (3) a. Minamatay(<in>m-poN-patay) oku do tasu. 4 <PST>AV-TR-die 1sg.NOM ACC dog „I killed a dog.‟ b. Minatay(<in>m-patay) it tasu. <PST>AV-die NOM dog „The dog died.‟ Virtually all break-type roots allow both the causative and inchoative forms, as illustrated in (6– 7); but hit-type roots generally occur only in the transitive form. Thus just as in English, the causative alternation is highly productive with ", "title": "" }, { "docid": "95513348196c70bb6242137685a6fbe5", "text": "People speak at different levels of specificity in different situations.1 A conversational agent should have this ability and know when to be specific and when to be general. We propose an approach that gives a neural network–based conversational agent this ability. Our approach involves alternating between data distillation and model training : removing training examples that are closest to the responses most commonly produced by the model trained from the last round and then retrain the model on the remaining dataset. Dialogue generation models trained with different degrees of data distillation manifest different levels of specificity. We then train a reinforcement learning system for selecting among this pool of generation models, to choose the best level of specificity for a given input. Compared to the original generative model trained without distillation, the proposed system is capable of generating more interesting and higher-quality responses, in addition to appropriately adjusting specificity depending on the context. Our research constitutes a specific case of a broader approach involving training multiple subsystems from a single dataset distinguished by differences in a specific property one wishes to model. We show that from such a set of subsystems, one can use reinforcement learning to build a system that tailors its output to different input contexts at test time. Depending on their knowledge, interlocutors, mood, etc.", "title": "" }, { "docid": "91c0870355730f553f1dc104318bc55c", "text": "This paper reviews the main psychological phenomena of inductive reasoning, covering 25 years of experimental and model-based research, in particular addressing four questions. First, what makes a case or event generalizable to other cases? Second, what makes a set of cases generalizable? Third, what makes a property or predicate projectable? Fourth, how do psychological models of induction address these results? The key results in inductive reasoning are outlined, and several recent models, including a new Bayesian account, are evaluated with respect to these results. In addition, future directions for experimental and model-based work are proposed.", "title": "" }, { "docid": "6e4798c01a0a241d1f3746cd98ba9421", "text": "BACKGROUND\nLarge blood-based prospective studies can provide reliable assessment of the complex interplay of lifestyle, environmental and genetic factors as determinants of chronic disease.\n\n\nMETHODS\nThe baseline survey of the China Kadoorie Biobank took place during 2004-08 in 10 geographically defined regions, with collection of questionnaire data, physical measurements and blood samples. Subsequently, a re-survey of 25,000 randomly selected participants was done (80% responded) using the same methods as in the baseline. All participants are being followed for cause-specific mortality and morbidity, and for any hospital admission through linkages with registries and health insurance (HI) databases.\n\n\nRESULTS\nOverall, 512,891 adults aged 30-79 years were recruited, including 41% men, 56% from rural areas and mean age was 52 years. The prevalence of ever-regular smoking was 74% in men and 3% in women. The mean blood pressure was 132/79 mmHg in men and 130/77 mmHg in women. The mean body mass index (BMI) was 23.4 kg/m(2) in men and 23.8 kg/m(2) in women, with only 4% being obese (>30 kg/m(2)), and 3.2% being diabetic. Blood collection was successful in 99.98% and the mean delay from sample collection to processing was 10.6 h. For each of the main baseline variables, there is good reproducibility but large heterogeneity by age, sex and study area. By 1 January 2011, over 10,000 deaths had been recorded, with 91% of surviving participants already linked to HI databases.\n\n\nCONCLUSION\nThis established large biobank will be a rich and powerful resource for investigating genetic and non-genetic causes of many common chronic diseases in the Chinese population.", "title": "" }, { "docid": "e483d914e00fa46a6be188fabd396165", "text": "Assessing distance betweeen the true and the sample distribution is a key component of many state of the art generative models, such as Wasserstein Autoencoder (WAE). Inspired by prior work on Sliced-Wasserstein Autoencoders (SWAE) and kernel smoothing we construct a new generative model – Cramer-Wold AutoEncoder (CWAE). CWAE cost function, based on introduced Cramer-Wold distance between samples, has a simple closed-form in the case of normal prior. As a consequence, while simplifying the optimization procedure (no need of sampling necessary to evaluate the distance function in the training loop), CWAE performance matches quantitatively and qualitatively that of WAE-MMD (WAE using maximum mean discrepancy based distance function) and often improves upon SWAE.", "title": "" }, { "docid": "215b02216c68ba6eb2d040e8e01c1ac1", "text": "Numerous companies are expecting their knowledge management (KM) to be performed effectively in order to leverage and transform the knowledge into competitive advantages. However, here raises a critical issue of how companies can better evaluate and select a favorable KM strategy prior to a successful KM implementation. The KM strategy selection is a kind of multiple criteria decision-making (MCDM) problem, which requires considering a large number of complex factors as multiple evaluation criteria. A robust MCDM method should consider the interactions among criteria. The analytic network process (ANP) is a relatively new MCDM method which can deal with all kinds of interactions systematically. Moreover, the Decision Making Trial and Evaluation Laboratory (DEMATEL) not only can convert the relations between cause and effect of criteria into a visual structural model, but also can be used as a way to handle the inner dependences within a set of criteria. Hence, this paper proposes an effective solution based on a combined ANP and DEMATEL approach to help companies that need to evaluate and select KM strategies. Additionally, an empirical study is presented to illustrate the application of the proposed method. 2007 Elsevier Ltd. All rights reserved.", "title": "" }, { "docid": "bde4d0ca50ed483d0df98af7d623e448", "text": "We propose the use of classifiers and machine learning techniques to extract useful information from data sets (e.g., images) to solve important problems in Image Processing and Computer Vision. We are interested in: two and multiclass image categorization, hidden messages detection, discrimination among natural and forged images, authentication, and multi-classification. Keywords-Machine Learning Techniques; Digital Forensics; Steganalysis; Feature Fusion; Classifier Fusion; Multi-class Classification; Image Categorization.", "title": "" } ]
scidocsrr
ca375bbe967f4a346f70e10602ed3a8e
Spatial Predictive Control for Agile Semi-Autonomous Ground Vehicles
[ { "docid": "6cb7cded3c10f00228ac58ff3b82d45e", "text": "This paper presents a hierarchical control framework for the obstacle avoidance of autonomous and semi-autonomous ground vehicles. The high-level planner is based on motion primitives created from a four-wheel nonlinear dynamic model. Parameterized clothoids and drifting maneuvers are used to improve vehicle agility. The low-level tracks the planned trajectory with a nonlinear Model Predictive Controller. The first part of the paper describes the proposed control architecture and methodology. The second part presents simulative and experimental results with an autonomous and semi-autonomous ground vehicle traveling at high speed on an icy surface.", "title": "" } ]
[ { "docid": "543218f4bb3516a1d588715b7ede8730", "text": "In this paper, we present a CMOS digital image stabilization algorithm based on the characteristics of a rolling shutter camera. Due to the rolling shuttering mechanism of a CMOS sensor, a CMOS video frame shows CMOS distortions which are not observed in a CCD video frame, and previous video stabilization techniques cannot handle these distortions properly even though they can make a visually stable CMOS video sequence. In our proposed algorithm, we first suggest a CMOS distortion model. This model is based on a rolling shutter mechanism which provides a solution to solve the CMOS distortion problem. Next, we estimate the global image motion and the CMOS distortion transformation directly from the homography between CMOS frames. Using the two transformations, we remove CMOS distortions as well as jittering motions in a CMOS video. In the experimental results, we demonstrate that our proposed algorithm can handle the CMOS distortion problem more effectively as well as the jittering problem in a CMOS video compared to previous CCD-based digital image stabilization techniques.", "title": "" }, { "docid": "a7ab755978c9309513ac79dbd6b09763", "text": "In this paper, we propose a denoising method motivated by our previous analysis of the performance bounds for image denoising. Insights from that study are used here to derive a high-performance practical denoising algorithm. We propose a patch-based Wiener filter that exploits patch redundancy for image denoising. Our framework uses both geometrically and photometrically similar patches to estimate the different filter parameters. We describe how these parameters can be accurately estimated directly from the input noisy image. Our denoising approach, designed for near-optimal performance (in the mean-squared error sense), has a sound statistical foundation that is analyzed in detail. The performance of our approach is experimentally verified on a variety of images and noise levels. The results presented here demonstrate that our proposed method is on par or exceeding the current state of the art, both visually and quantitatively.", "title": "" }, { "docid": "f3f4cb6e7e33f54fca58c14ce82d6b46", "text": "In this letter, a novel slot array antenna with a substrate-integrated coaxial line (SICL) technique is proposed. The proposed antenna has radiation slots etched homolaterally along the mean line in the top metallic layer of SICL and achieves a compact transverse dimension. A prototype with 5 <inline-formula><tex-math notation=\"LaTeX\">$\\times$ </tex-math></inline-formula> 10 longitudinal slots is designed and fabricated with a multilayer liquid crystal polymer (LCP) process. A maximum gain of 15.0 dBi is measured at 35.25 GHz with sidelobe levels of <inline-formula> <tex-math notation=\"LaTeX\">$-$</tex-math></inline-formula> 28.2 dB (<italic>E</italic>-plane) and <inline-formula> <tex-math notation=\"LaTeX\">$-$</tex-math></inline-formula> 33.1 dB (<italic>H</italic>-plane). The close correspondence between experimental results and designed predictions on radiation patterns has validated the proposed excogitation in the end.", "title": "" }, { "docid": "3df9bacf95281fc609ee7fd2d4724e91", "text": "The deleterious effects of plastic debris on the marine environment were reviewed by bringing together most of the literature published so far on the topic. A large number of marine species is known to be harmed and/or killed by plastic debris, which could jeopardize their survival, especially since many are already endangered by other forms of anthropogenic activities. Marine animals are mostly affected through entanglement in and ingestion of plastic litter. Other less known threats include the use of plastic debris by \"invader\" species and the absorption of polychlorinated biphenyls from ingested plastics. Less conspicuous forms, such as plastic pellets and \"scrubbers\" are also hazardous. To address the problem of plastic debris in the oceans is a difficult task, and a variety of approaches are urgently required. Some of the ways to mitigate the problem are discussed.", "title": "" }, { "docid": "d308f448dc6d951948ccf4319aef359f", "text": "Spondylolysis is an osseous defect of the pars interarticularis, thought to be a developmental or acquired stress fracture secondary to chronic low-grade trauma. It is encountered most frequently in adolescents, most commonly involving the lower lumbar spine, with particularly high prevalence among athletes involved in certain sports or activities. Spondylolysis can be asymptomatic or can be a cause of spine instability, back pain, and radiculopathy. The biomechanics and pathophysiology of spondylolysis are complex and debated. Imaging is utilized to detect spondylolysis, distinguish acute and active lesions from chronic inactive non-union, help establish prognosis, guide treatment, and to assess bony healing. Radiography with satisfactory technical quality can often demonstrate a pars defect. Multislice CT with multiplanar reformats is the most accurate modality for detecting the bony defect and may also be used for assessment of osseous healing; however, as with radiographs, it is not sensitive for detection of the early edematous stress response without a fracture line and exposes the patient to ionizing radiation. Magnetic resonance (MR) imaging should be used as the primary investigation for adolescents with back pain and suspected stress reactions of the lumbar pars interarticularis. Several imaging pitfalls render MR imaging less sensitive than CT for directly visualizing the pars defects (regional degenerative changes and sclerosis). Nevertheless, the presence of bone marrow edema on fluid-sensitive images is an important early finding that may suggest stress response without a visible fracture line. Moreover, MR is the imaging modality of choice for identifying associated nerve root compression. Single-photon emission computed tomography (SPECT) use is limited by a high rate of false-positive and false-negative results and by considerable ionizing radiation exposure. In this article, we provide a review of the current concepts regarding spondylolysis, its epidemiology, pathogenesis, and general treatment guidelines, as well as a detailed review and discussion of the imaging principles for the diagnosis and follow-up of this condition.", "title": "" }, { "docid": "61f9711b65d142b5537b7d3654bbbc3c", "text": "Now-a-days as there is prohibitive demand for agricultural industry, effective growth and improved yield of fruit is necessary and important. For this purpose farmers need manual monitoring of fruits from harvest till its progress period. But manual monitoring will not give satisfactory result all the times and they always need satisfactory advice from expert. So it requires proposing an efficient smart farming technique which will help for better yield and growth with less human efforts. We introduce a technique which will diagnose and classify external disease within fruits. Traditional system uses thousands of words which lead to boundary of language. Whereas system that we have come up with, uses image processing techniques for implementation as image is easy way for conveying. In the proposed work, OpenCV library is applied for implementation. K-means clustering method is applied for image segmentation, the images are catalogue and mapped to their respective disease categories on basis of four feature vectors color, morphology, texture and structure of hole on the fruit. The system uses two image databases, one for implementation of query images and the other for training of already stored disease images. Artificial Neural Network (ANN) concept is used for pattern matching and classification of diseases.", "title": "" }, { "docid": "a411780d406e8b720303d18cd6c9df68", "text": "Functional organization of the lateral temporal cortex in humans is not well understood. We recorded blood oxygenation signals from the temporal lobes of normal volunteers using functional magnetic resonance imaging during stimulation with unstructured noise, frequency-modulated (FM) tones, reversed speech, pseudowords and words. For all conditions, subjects performed a material-nonspecific detection response when a train of stimuli began or ceased. Dorsal areas surrounding Heschl's gyrus bilaterally, particularly the planum temporale and dorsolateral superior temporal gyrus, were more strongly activated by FM tones than by noise, suggesting a role in processing simple temporally encoded auditory information. Distinct from these dorsolateral areas, regions centered in the superior temporal sulcus bilaterally were more activated by speech stimuli than by FM tones. Identical results were obtained in this region using words, pseudowords and reversed speech, suggesting that the speech-tones activation difference is due to acoustic rather than linguistic factors. In contrast, previous comparisons between word and nonword speech sounds showed left-lateralized activation differences in more ventral temporal and temporoparietal regions that are likely involved in processing lexical-semantic or syntactic information associated with words. The results indicate functional subdivision of the human lateral temporal cortex and provide a preliminary framework for understanding the cortical processing of speech sounds.", "title": "" }, { "docid": "9a2d79d9df9e596e26f8481697833041", "text": "Novelty search is a recent artificial evolution technique that challenges traditional evolutionary approaches. In novelty search, solutions are rewarded based on their novelty, rather than their quality with respect to a predefined objective. The lack of a predefined objective precludes premature convergence caused by a deceptive fitness function. In this paper, we apply novelty search combined with NEAT to the evolution of neural controllers for homogeneous swarms of robots. Our empirical study is conducted in simulation, and we use a common swarm robotics task—aggregation, and a more challenging task—sharing of an energy recharging station. Our results show that novelty search is unaffected by deception, is notably effective in bootstrapping evolution, can find solutions with lower complexity than fitness-based evolution, and can find a broad diversity of solutions for the same task. Even in non-deceptive setups, novelty search achieves solution qualities similar to those obtained in traditional fitness-based evolution. Our study also encompasses variants of novelty search that work in concert with fitness-based evolution to combine the exploratory character of novelty search with the exploitatory character of objective-based evolution. We show that these variants can further improve the performance of novelty search. Overall, our study shows that novelty search is a promising alternative for the evolution of controllers for robotic swarms.", "title": "" }, { "docid": "15d70d12d8c410907675c528ae1bafda", "text": "This is an extremely welcome addition to the Information Retrieval (IR) literature. Because of its technical approach it is much different from most of the available books on IR. The book consists of five sections containing eighteen chapters. The chapters are written by different authors.", "title": "" }, { "docid": "100b4df0a86534cba7078f4afc247206", "text": "Presented in this article is a review of manufacturing techniques and introduction of reconfigurable manufacturing systems; a new paradigm in manufacturing which is designed for rapid adjustment of production capacity and functionality, in response to new market conditions. A definition of reconfigurable manufacturing systems is outlined and an overview of available manufacturing techniques, their key drivers and enablers, and their impacts, achievements and limitations is presented. A historical review of manufacturing from the point-of-view of the major developments in the market, technology and sciences issues affecting manufacturing is provided. The new requirements for manufacturing are discussed and characteristics of reconfigurable manufacturing systems and their key role in future manufacturing are explained. The paper is concluded with a brief review of specific technologies and research issues related to RMSs.", "title": "" }, { "docid": "fa55a893ff3c77928644f7bfdac0c643", "text": "Evaluating the maxilla-mandibular vertical dimension is of great importance in constructing successful denture prosthesis, however it is a tedious process which may be misinterpreted leading to false readings. Hence with the aid of cephalometric analysis a cephalogram may present a graphic representation .this study aims to introduce a new mathematical method for of determination the occlusal vertical dimension (O.V.D.). : The first part was conducted to derive a clinical ratio between the O.V.D. and the ear-eye distance, as well as to derive a radiographical ratio between the same distances on a lateral cephalometric view. The second part of this study aimed to evaluate the accuracy of clinical and radiographical application of the ratios that were derived from the first part in estimating the O.V.D from the ear-eye distance measured in dentate subjects.", "title": "" }, { "docid": "9006586ffd85d5c2fb7611b3b0332519", "text": "Systematic compositionality is the ability to recombine meaningful units with regular and predictable outcomes, and it’s seen as key to the human capacity for generalization in language. Recent work (Lake and Baroni, 2018) has studied systematic compositionality in modern seq2seq models using generalization to novel navigation instructions in a grounded environment as a probing tool. Lake and Baroni’s main experiment required the models to quickly bootstrap the meaning of new words. We extend this framework here to settings where the model needs only to recombine well-trained functional words (such as “around” and “right”) in novel contexts. Our findings confirm and strengthen the earlier ones: seq2seq models can be impressively good at generalizing to novel combinations of previously-seen input, but only when they receive extensive training on the specific pattern to be generalized (e.g., generalizing from many examples of “X around right” to “jump around right”), while failing when generalization requires novel application of compositional rules (e.g., inferring the meaning of “around right” from those of “right” and “around”).", "title": "" }, { "docid": "e082b7792f72d54c63ed025ae5c7fa0f", "text": "Cloud computing's pay-per-use model greatly reduces upfront cost and also enables on-demand scalability as service demand grows or shrinks. Hybrid clouds are an attractive option in terms of cost benefit, however, without proper elastic resource management, computational resources could be over-provisioned or under-provisioned, resulting in wasting money or failing to satisfy service demand. In this paper, to accomplish accurate performance prediction and cost-optimal resource management for hybrid clouds, we introduce Workload-tailored Elastic Compute Units (WECU) as a measure of computing resources analogous to Amazon EC2's ECUs, but customized for a specific workload. We present a dynamic programming-based scheduling algorithm to select a combination of private and public resources which satisfy a desired throughput. Using a loosely-coupled benchmark, we confirmed WECUs have 24 (J% better runtime prediction ability than ECUs on average. Moreover, simulation results with a real workload distribution of web service requests show that our WECU-based algorithm reduces costs by 8-31% compared to a fixed provisioning approach.", "title": "" }, { "docid": "c7de7b159579b5c8668f2a072577322c", "text": "This paper presents a method for effectively using unlabeled sequential data in the learning of hidden Markov models (HMMs). With the conventional approach, class labels for unlabeled data are assigned deterministically by HMMs learned from labeled data. Such labeling often becomes unreliable when the number of labeled data is small. We propose an extended Baum-Welch (EBW) algorithm in which the labeling is undertaken probabilistically and iteratively so that the labeled and unlabeled data likelihoods are improved. Unlike the conventional approach, the EBW algorithm guarantees convergence to a local maximum of the likelihood. Experimental results on gesture data and speech data show that when labeled training data are scarce, by using unlabeled data, the EBW algorithm improves the classification performance of HMMs more robustly than the conventional naive labeling (NL) approach. keywords Unlabeled data, sequential data, hidden Markov models, extended Baum-Welch algorithm.", "title": "" }, { "docid": "bf4f90ff70dd8b195983f55bf3752718", "text": "In this paper, we consider cooperative spectrum sensing based on energy detection in cognitive radio networks. Soft combination of the observed energy values from different cognitive radio users is investigated. Maximal ratio combination (MRC) is theoretically proved to be nearly optimal in low signal- to-noise ratio (SNR) region, an usual scenario in the context of cognitive radio. Both MRC and equal gain combination (EGC) exhibit significant performance improvement over conventional hard combination. Encouraged by the performance gain of soft combination, we propose a new softened hard combination scheme with two-bit overhead for each user and achieve a good tradeoff between detection performance and complexity. While traditionally energy detection suffers from an SNR wall caused by noise power uncertainty, it is shown in this paper that an SNR wall reduction can be achieved by employing cooperation among independent cognitive radio users.", "title": "" }, { "docid": "cc04572df87def5dab42962ab42ce1f3", "text": "Increasing the level of transparency in rehabilitation devices has been one of the main goals in robot-aided neurorehabilitation for the past two decades. This issue is particularly important to robotic structures that mimic the human counterpart's morphology and attach directly to the limb. Problems arise for complex joints such as the human wrist, which cannot be accurately matched with a traditional mechanical joint. In such cases, mechanical differences between human and robotic joint cause hyperstaticity (i.e. overconstraint) which, coupled with kinematic misalignments, leads to uncontrolled force/torque at the joint. This paper focuses on the prono-supination (PS) degree of freedom of the forearm. The overall force and torque in the wrist PS rotation is quantified by means of a wrist robot. A practical solution to avoid hyperstaticity and reduce the level of undesired force/torque in the wrist is presented, which is shown to reduce 75% of the force and 68% of the torque.", "title": "" }, { "docid": "c999bd0903b53285c053c76f9fcc668f", "text": "In this paper, a bibliographical review on reconfigurable (active) fault-tolerant control systems (FTCS) is presented. The existing approaches to fault detection and diagnosis (FDD) and fault-tolerant control (FTC) in a general framework of active fault-tolerant control systems (AFTCS) are considered and classified according to different criteria such as design methodologies and applications. A comparison of different approaches is briefly carried out. Focuses in the field on the current research are also addressed with emphasis on the practical application of the techniques. In total, 376 references in the open literature, dating back to 1971, are compiled to provide an overall picture of historical, current, and future developments in this area. # 2008 Elsevier Ltd. All rights reserved.", "title": "" }, { "docid": "3d5165a30aac97d9548d19c907eed466", "text": "A battery management system (BMS) based on the CAN-bus was designed for the Li-ion battery pack which consisted of many series-connected battery cells and was distributed dispersedly on the electric vehicle (EV). The BMS consisted of one master module and several sampling modules. The hardware design of the sampling circuit and the CAN expanding circuit was introduced. The strategies of the battery SOC (state of charge) estimation and the battery safety management were also presented.", "title": "" }, { "docid": "3682143e9cfe7dd139138b3b533c8c25", "text": "In brushless excitation systems, the rotating diodes can experience open- or short-circuits. For a three-phase synchronous generator under no-load, we present theoretical development of effects of diode failures on machine output voltage. Thereby, we expect the spectral response faced with each fault condition, and we propose an original algorithm for state monitoring of rotating diodes. Moreover, given experimental observations of the spectral behavior of stray flux, we propose an alternative technique. Laboratory tests have proven the effectiveness of the proposed methods for detection of fault diodes, even when the generator has been fully loaded. However, their ability to distinguish between cases of diodes interrupted and short-circuited, has been limited to the no-load condition, and certain loads of specific natures.", "title": "" }, { "docid": "4a30caf967a8b8d6b4913043514ad99a", "text": "Massive MIMO involves the use of large scale antenna arrays for high-gain adaptive beamforming and high-order spatial multiplexing. An important design challenge in Massive MIMO systems is the acquisition of channel state information at the transmit array, where accurate channel knowledge is critical for obtaining the best performance with Multi-User MIMO transmission on the downlink. In this paper, we explore the use of a product codebook feedback methodology for two-dimensional antenna arrays where the codebook feedback strategy is decomposed into two separate feedback processes, one for azimuth and one for elevation. We specifically address the case where the transmit array consists of cross-polarized antennas and show how two separate codebook feedback processes can reduce reference signal overhead and simplify the mobile complexity while providing significant gains in performance over existing LTE configurations.", "title": "" } ]
scidocsrr
e52b7f030e81aeb694eb7ea53c4ab32c
Identification of embedded mathematical formulas in PDF documents using SVM
[ { "docid": "c0d4f81bb55e1578f2a11dc712937a80", "text": "Recognizing mathematical expressions in PDF documents is a new and important field in document analysis. It is quite different from extracting mathematical expressions in image-based documents. In this paper, we propose a novel method by combining rule-based and learning-based methods to detect both isolated and embedded mathematical expressions in PDF documents. Moreover, various features of formulas, including geometric layout, character and context content, are used to adapt to a wide range of formula types. Experimental results show satisfactory performance of the proposed method. Furthermore, the method has been successfully incorporated into a commercial software package for large-scale Chinese e-Book production.", "title": "" } ]
[ { "docid": "3e9845c255b5e816741c04c4f7cf5295", "text": "This paper presents the packaging technology and the integrated antenna design for a miniaturized 122-GHz radar sensor. The package layout and the assembly process are shortly explained. Measurements of the antenna including the flip chip interconnect are presented that have been achieved by replacing the IC with a dummy chip that only contains a through-line. Afterwards, radiation pattern measurements are shown that were recorded using the radar sensor as transmitter. Finally, details of the fully integrated radar sensor are given, together with results of the first Doppler measurements.", "title": "" }, { "docid": "7dcd4a4e687975b6b774487303fc1a40", "text": "Analysis of kinship from facial images or videos is an important problem. Prior machine learning and computer vision studies approach kinship analysis as a verification or recognition task. In this paper, first time in the literature, we propose a kinship synthesis framework, which generates smile videos of (probable) children from the smile videos of parents. While the appearance of a child’s smile is learned using a convolutional encoder-decoder network, another neural network models the dynamics of the corresponding smile. The smile video of the estimated child is synthesized by the combined use of appearance and dynamics models. In order to validate our results, we perform kinship verification experiments using videos of real parents and estimated children generated by our framework. The results show that generated videos of children achieve higher correct verification rates than those of real children. Our results also indicate that the use of generated videos together with the real ones in the training of kinship verification models, increases the accuracy, suggesting that such videos can be used as a synthetic dataset.", "title": "" }, { "docid": "bfa178f35027a55e8fd35d1c87789808", "text": "We present a generative model for the unsupervised learning of dependency structures. We also describe the multiplicative combination of this dependency model with a model of linear constituency. The product model outperforms both components on their respective evaluation metrics, giving the best published figures for unsupervised dependency parsing and unsupervised constituency parsing. We also demonstrate that the combined model works and is robust cross-linguistically, being able to exploit either attachment or distributional reg ularities that are salient in the data.", "title": "" }, { "docid": "f9b01c707482eebb9af472fd019f56eb", "text": "In this paper we discuss the task of discovering topical influ ence within the online social network T WITTER. The main goal of this research is to discover who the influenti al users are with respect to a certain given topic. For this research we have sampled a portion of the T WIT ER social graph, from which we have distilled topics and topical activity, and constructed a se t of diverse features which we believe are useful in capturing the concept of topical influence. We will use sev eral correlation and classification techniques to determine which features perform best with respect to the TWITTER network. Our findings support the claim that only looking at simple popularity features such a s the number of followers is not enough to capture the concept of topical influence. It appears that mor e int icate features are required.", "title": "" }, { "docid": "3d7b37c5328e3631bd8442e2de67fb62", "text": "In recent years, deep neural networks have achieved great success in the field of computer vision. However, it is still a big challenge to deploy these deep models on resource-constrained embedded devices such as mobile robots, smart phones and so on. Therefore, network compression for such platforms is a reasonable solution to reduce memory consumption and computation complexity. In this paper, a novel channel pruning method based on genetic algorithm is proposed to compress very deep Convolution Neural Networks (CNNs). Firstly, a pre-trained CNN model is pruned layer by layer according to the sensitivity of each layer. After that, the pruned model is fine-tuned based on knowledge distillation framework. These two improvements significantly decrease the model redundancy with less accuracy drop. Channel selection is a combinatorial optimization problem that has exponential solution space. In order to accelerate the selection process, the proposed method formulates it as a search problem, which can be solved efficiently by genetic algorithm. Meanwhile, a two-step approximation fitness function is designed to further improve the efficiency of genetic process. The proposed method has been verified on three benchmark datasets with two popular CNN models: VGGNet and ResNet. On the CIFAR-100 and ImageNet datasets, our approach outperforms several state-of-the-art methods. On the CIFAR-10 and SVHN datasets, the pruned VGGNet achieves better performance than the original model with 8× parameters compression and 3× FLOPs reduction.", "title": "" }, { "docid": "a1c917d7a685154060ddd67d631ea061", "text": "In this paper, for finding the place of plate, a real time and fast method is expressed. In our suggested method, the image is taken to HSV color space; then, it is broken into blocks in a stable size. In frequent process, each block, in special pattern is probed. With the appearance of pattern, its neighboring blocks according to geometry of plate as a candidate are considered and increase blocks, are omitted. This operation is done for all of the uncontrolled blocks of images. First, all of the probable candidates are exploited; then, the place of plate is obtained among exploited candidates as density and geometry rate. In probing every block, only its lip pixel is studied which consists 23.44% of block area. From the features of suggestive method, we can mention the lack of use of expensive operation in image process and its low dynamic that it increases image process speed. This method is examined on the group of picture in background, distance and point of view. The rate of exploited plate reached at 99.33% and character recognition rate achieved 97%.", "title": "" }, { "docid": "aa9450cdbdb1162015b4d931c32010fb", "text": "The design of a low-cost rectenna for low-power applications is presented. The rectenna is designed with the use of analytical models and closed-form analytical expressions. This allows for a fast design of the rectenna system. To acquire a small-area rectenna, a layered design is proposed. Measurements indicate the validity range of the analytical models.", "title": "" }, { "docid": "6fe413cf75a694217c30a9ef79fab589", "text": "Zusammenfassung) Biometrics have been used for secure identification and authentication for more than two decades since biometric data is unique, non-transferable, unforgettable, and always with us. Recently, biometrics has pervaded other aspects of security applications that can be listed under the topic of “Biometric Cryptosystems”. Although the security of some of these systems is questionable when they are utilized alone, integration with other technologies such as digital signatures or Identity Based Encryption (IBE) schemes results in cryptographically secure applications of biometrics. It is exactly this field of biometric cryptosystems that we focused in this thesis. In particular, our goal is to design cryptographic protocols for biometrics in the framework of a realistic security model with a security reduction. Our protocols are designed for biometric based encryption, signature and remote authentication. We first analyze the recently introduced biometric remote authentication schemes designed according to the security model of Bringer et al.. In this model, we show that one can improve the database storage cost significantly by designing a new architecture, which is a two-factor authentication protocol. This construction is also secure against the new attacks we present, which disprove the claimed security of remote authentication schemes, in particular the ones requiring a secure sketch. Thus, we introduce a new notion called “Weak-identity Privacy” and propose a new construction by combining cancelable biometrics and distributed remote authentication in order to obtain a highly secure biometric authentication system. We continue our research on biometric remote authentication by analyzing the security issues of multi-factor biometric authentication (MFBA). We formally describe the security model for MFBA that captures simultaneous attacks against these systems and define the notion of user privacy, where the goal of the adversary is to impersonate a client to the server. We design a new protocol by combining bipartite biotokens, homomorphic encryption and zero-knowledge proofs and provide a security reduction to achieve user privacy. The main difference of this MFBA protocol is that the server-side computations are performed in the encrypted domain but without requiring a decryption key for the authentication decision of the server. Thus, leakage of the secret key of any system component does not affect the security of the scheme as opposed to the current biometric systems involving crypto-", "title": "" }, { "docid": "7f09bdd6a0bcbed0d9525c5d20cf8cbb", "text": "Distributed are increasing being thought of as a platform for decentralised applications — DApps — and the the focus for many is shifting from Bitcoin to Smart Contracts. It’s thought that encoding contracts and putting them “on the blockchain” will result in a new generation of organisations that are leaner and more efficient than their forebears (“Capps”?”), disrupting these forebears in the process. However, the most interesting aspect of Bitcoin and blockchain is that it involved no new technology, no new math. Their emergence was due to changes in the environment: the priceperformance and penetration of broadband networks reached a point that it was economically viable for a decentralised solution, such as Bitcoin to compete with traditional payment (international remittance) networks. This is combining with another trend — the shift from monolithic firms to multi-sided markets such as AirBnb et al and the rise of “platform businesses” — to enable a new class of solution to emerge. These new solutions enable firms to interact directly, without the need for a facilitator such as a market, exchange, or even a blockchain. In the past these facilitators were firms. More recently they have been “platform businesses.” In the future they may not exist at all. The shift to a distributed environment enables us to reconsider many of the ideas from distributed AI and linked data. Where are the opportunities? How can we avoid the mistakes of the past?", "title": "" }, { "docid": "b82805187bdfd14a4dd5efc6faf70f10", "text": "8 Cloud computing has gained tremendous popularity in recent years. By outsourcing computation and 9 storage requirements to public providers and paying for the services used, customers can relish upon the 10 advantages of this new paradigm. Cloud computing provides with a comparably lower-cost, scalable, a 11 location-independent platform for managing clients’ data. Compared to a traditional model of computing, 12 which uses dedicated in-house infrastructure, cloud computing provides unprecedented benefits regarding 13 cost and reliability. Cloud storage is a new cost-effective paradigm that aims at providing high 14 availability, reliability, massive scalability and data sharing. However, outsourcing data to a cloud service 15 provider introduces new challenges from the perspectives of data correctness and security. Over the years, 16 many data integrity schemes have been proposed for protecting outsourced data. This paper aims to 17 enhance the understanding of security issues associated with cloud storage and highlights the importance 18 of data integrity schemes for outsourced data. In this paper, we have presented a taxonomy of existing 19 data integrity schemes use for cloud storage. A comparative analysis of existing schemes is also provided 20 along with a detailed discussion on possible security attacks and their mitigations. Additionally, we have 21 discussed design challenges such as computational efficiency, storage efficiency, communication 22 efficiency, and reduced I/O in these schemes. Furthermore; we have highlighted future trends and open 23 issues, for future research in cloud storage security. 24", "title": "" }, { "docid": "4e8d7e1fdb48da4198e21ae1ef2cd406", "text": "This paper describes a procedure for the creation of large-scale video datasets for action classification and localization from unconstrained, realistic web data. The scalability of the proposed procedure is demonstrated by building a novel video benchmark, named SLAC (Sparsely Labeled ACtions), consisting of over 520K untrimmed videos and 1.75M clip annotations spanning 200 action categories. Using our proposed framework, annotating a clip takes merely 8.8 seconds on average. This represents a saving in labeling time of over 95% compared to the traditional procedure of manual trimming and localization of actions. Our approach dramatically reduces the amount of human labeling by automatically identifying hard clips, i.e., clips that contain coherent actions but lead to prediction disagreement between action classifiers. A human annotator can disambiguate whether such a clip truly contains the hypothesized action in a handful of seconds, thus generating labels for highly informative samples at little cost. We show that our large-scale dataset can be used to effectively pretrain action recognition models, significantly improving final metrics on smaller-scale benchmarks after fine-tuning. On Kinetics [14], UCF-101 [30] and HMDB-51 [15], models pre-trained on SLAC outperform baselines trained from scratch, by 2.0%, 20.1% and 35.4% in top-1 accuracy, respectively when RGB input is used. Furthermore, we introduce a simple procedure that leverages the sparse labels in SLAC to pre-train action localization models. On THUMOS14 [12] and ActivityNet-v1.3[2], our localization model improves the mAP of baseline model by 8.6% and 2.5%, respectively.", "title": "" }, { "docid": "1db42d9d65737129fa08a6ad4d52d27e", "text": "This study introduces a unique prototype system for structural health monitoring (SHM), SmartSync, which uses the building’s existing Internet backbone as a system of virtual instrumentation cables to permit modular and largely plug-and-play deployments. Within this framework, data streams from distributed heterogeneous sensors are pushed through network interfaces in real time and seamlessly synchronized and aggregated by a centralized server, which performs basic data acquisition, event triggering, and database management while also providing an interface for data visualization and analysis that can be securely accessed. The system enables a scalable approach to monitoring tall and complex structures that can readily interface a variety of sensors and data formats (analog and digital) and can even accommodate variable sampling rates. This study overviews the SmartSync system, its installation/operation in theworld’s tallest building, Burj Khalifa, and proof-of-concept in triggering under dual excitations (wind and earthquake).DOI: 10.1061/(ASCE)ST.1943-541X.0000560. © 2013 American Society of Civil Engineers. CE Database subject headings: High-rise buildings; Structural health monitoring; Wind loads; Earthquakes. Author keywords: Tall buildings; Structural health monitoring; System identification.", "title": "" }, { "docid": "61ffc67f0e242afd8979d944cbe2bff4", "text": "Diprosopus is a rare congenital malformation associated with high mortality. Here, we describe a patient with diprosopus, multiple life-threatening anomalies, and genetic mutations. Prenatal diagnosis and counseling made a beneficial impact on the family and medical providers in the care of this case.", "title": "" }, { "docid": "34bf7fb014f5b511943526c28407cb4b", "text": "Mobile devices can be maliciously exploited to violate the privacy of people. In most attack scenarios, the adversary takes the local or remote control of the mobile device, by leveraging a vulnerability of the system, hence sending back the collected information to some remote web service. In this paper, we consider a different adversary, who does not interact actively with the mobile device, but he is able to eavesdrop the network traffic of the device from the network side (e.g., controlling a Wi-Fi access point). The fact that the network traffic is often encrypted makes the attack even more challenging. In this paper, we investigate to what extent such an external attacker can identify the specific actions that a user is performing on her mobile apps. We design a system that achieves this goal using advanced machine learning techniques. We built a complete implementation of this system, and we also run a thorough set of experiments, which show that our attack can achieve accuracy and precision higher than 95%, for most of the considered actions. We compared our solution with the three state-of-the-art algorithms, and confirming that our system outperforms all these direct competitors.", "title": "" }, { "docid": "0815549f210c57b28a7e2fc87c20f616", "text": "Portable automatic seizure detection system is very convenient for epilepsy patients to carry. In order to make the system on-chip trainable with high efficiency and attain high detection accuracy, this paper presents a very large scale integration (VLSI) design based on the nonlinear support vector machine (SVM). The proposed design mainly consists of a feature extraction (FE) module and an SVM module. The FE module performs the three-level Daubechies discrete wavelet transform to fit the physiological bands of the electroencephalogram (EEG) signal and extracts the time–frequency domain features reflecting the nonstationary signal properties. The SVM module integrates the modified sequential minimal optimization algorithm with the table-driven-based Gaussian kernel to enable efficient on-chip learning. The presented design is verified on an Altera Cyclone II field-programmable gate array and tested using the two publicly available EEG datasets. Experiment results show that the designed VLSI system improves the detection accuracy and training efficiency.", "title": "" }, { "docid": "ef584ca8b3e9a7f8335549927df1dc16", "text": "Rapid evolution in technology and the internet brought us to the era of online services. E-commerce is nothing but trading goods or services online. Many customers share their good or bad opinions about products or services online nowadays. These opinions become a part of the decision-making process of consumer and make an impact on the business model of the provider. Also, understanding and considering reviews will help to gain the trust of the customer which will help to expand the business. Many users give reviews for the single product. Such thousands of review can be analyzed using big data effectively. The results can be presented in a convenient visual form for the non-technical user. Thus, the primary goal of research work is the classification of customer reviews given for the product in the map-reduce framework.", "title": "" }, { "docid": "c2571f794304a6b0efdc4fe22bac89e5", "text": "PURPOSE\nThe aim of this study was to analyse the psychometric properties of the Portuguese version of the body image scale (BIS; Hopwood, P., Fletcher, I., Lee, A., Al Ghazal, S., 2001. A body image scale for use with cancer patients. European Journal of Cancer, 37, 189-197). This is a brief and psychometric robust measure of body image for use with cancer patients, independently of age, cancer type, treatment or stage of the disease and it was developed in collaboration with the European Organization for Research and Treatment of Cancer (EORTC) Quality of Life Study Group.\n\n\nMETHOD\nThe sample is comprised of 173 Portuguese postoperative breast cancer patients that completed a battery of measures that included the BIS and other scales of body image and quality of life, in order to explore its construct validity.\n\n\nRESULTS\nThe Portuguese version of BIS confirmed the original unidimensional structure and demonstrated adequate internal consistency, both in the global sample (alpha=.93) as in surgical subgroups (mastectomy=.92 and breast-conserving surgery=.93). Evidence for the construct validity was provided through moderate to largely sized correlations between the BIS and other related measures. In further support of its discriminant validity, significant differences in BIS scores were found between women who underwent mastectomy and those who underwent breast-conserving surgery, with the former presenting higher scores. Age and time since diagnosis were not associated with BIS scores.\n\n\nCONCLUSIONS\nThe Portuguese BIS proved to be a reliable and valid measure of body image concerns in a sample of breast cancer patients, allowing a brief and comprehensive assessment, both on clinical and research settings.", "title": "" }, { "docid": "ed65e73d6e78f44390d1734bfad77b54", "text": "Frequency overlap across wireless networks with different radio technologies can cause severe interference and reduce communication reliability. The circumstances are particularly unfavorable for ZigBee networks that share the 2.4 GHz ISM band with WiFi senders capable of 10 to 100 times higher transmission power. Our work first examines the interference patterns between ZigBee and WiFi networks at the bit-level granularity. Under certain conditions, ZigBee activities can trigger a nearby WiFi transmitter to back off, in which case the header is often the only part of the Zig-Bee packet being corrupted. We call this the symmetric interference regions, in comparison to the asymmetric regions where the ZigBee signal is too weak to be detected by WiFi senders, but WiFi activity can uniformly corrupt any bit in a ZigBee packet. With these observations, we design BuzzBuzz to mitigate WiFi interference through header and payload redundancy. Multi-Headers provides header redundancy giving ZigBee nodes multiple opportunities to detect incoming packets. Then, TinyRS, a full-featured Reed Solomon library for resource-constrained devices, helps decoding polluted packet payload. On a medium-sized testbed, BuzzBuzz improves the ZigBee network delivery rate by 70%. Furthermore, BuzzBuzz reduces ZigBee retransmissions by a factor of three, which increases the WiFi throughput by 10%.", "title": "" }, { "docid": "db6633228791ca2c725a804f3e58252e", "text": "Developments and new advances in medical technology and the improvement of people’s living standards have helped to make many people healthier. However, there are still large design deficiencies due to the imbalanced distribution of medical resources, especially in developing countries. To address this issue, a video conference-based telemedicine system is deployed to break the limitations of medical resources in terms of time and space. By outsourcing medical resources from big hospitals to rural and remote ones, centralized and high quality medical resources can be shared to achieve a higher salvage rate while improving the utilization of medical resources. Though effective, existing telemedicine systems only treat patients’ physiological diseases, leaving another challenging problem unsolved: How to remotely detect patients’ emotional state to diagnose psychological diseases. In this paper, we propose a novel healthcare system based on a 5G Cognitive System (5G-Csys). The 5G-Csys consists of a resource cognitive engine and a data cognitive engine. Resource cognitive intelligence, based on the learning of network contexts, aims at ultra-low latency and ultra-high reliability for cognitive applications. Data cognitive intelligence, based on the analysis of healthcare big data, is used to handle a patient’s health status physiologically and psychologically. In this paper, the architecture of 5G-Csys is first presented, and then the key technologies and application scenarios are discussed. To verify our proposal, we develop a prototype platform of 5G-Csys, incorporating speech emotion recognition. We present our experimental results to demonstrate the effectiveness of the proposed system. We hope this paper will attract further research in the field of healthcare based on 5G cognitive systems.", "title": "" } ]
scidocsrr
5caa6a99d999642c5c01a4536ae6deb2
Defend Deep Neural Networks Against Adversarial Examples via Fixed andDynamic Quantized Activation Functions
[ { "docid": "b7d13c090e6d61272f45b1e3090f0341", "text": "Deep Neural Networks (DNN) have achieved state-of-the-art results in a wide range of tasks, with the best results obtained with large training sets and large models. In the past, GPUs enabled these breakthroughs because of their greater computational speed. In the future, faster computation at both training and test time is likely to be crucial for further progress and for consumer applications on low-power devices. As a result, there is much interest in research and development of dedicated hardware for Deep Learning (DL). Binary weights, i.e., weights which are constrained to only two possible values (e.g. -1 or 1), would bring great benefits to specialized DL hardware by replacing many multiply-accumulate operations by simple accumulations, as multipliers are the most space and powerhungry components of the digital implementation of neural networks. We introduce BinaryConnect, a method which consists in training a DNN with binary weights during the forward and backward propagations, while retaining precision of the stored weights in which gradients are accumulated. Like other dropout schemes, we show that BinaryConnect acts as regularizer and we obtain near state-of-the-art results with BinaryConnect on the permutation-invariant MNIST, CIFAR-10 and SVHN.", "title": "" }, { "docid": "3a7f3e75a5d534f6475c40204ba2403f", "text": "In recent years, deep neural network approaches have been widely adopted for machine learning tasks, including classification. However, they were shown to be vulnerable to adversarial perturbations: carefully crafted small perturbations can cause misclassification of legitimate images. We propose Defense-GAN, a new framework leveraging the expressive capability of generative models to defend deep neural networks against such attacks. Defense-GAN is trained to model the distribution of unperturbed images and, at inference time, finds a close output to a given image. This output will not contain the adversarial changes and is fed to the classifier. Our proposed method can be used with any classification model and does not modify the classifier structure or training procedure. It can also be used as a defense against any attack as it does not assume knowledge of the process for generating the adversarial examples. We empirically show that Defense-GAN is consistently effective against different attack methods and improves on existing defense strategies.", "title": "" }, { "docid": "d143d9107f41db85902bc709e1c41072", "text": "Crafting adversarial examples has become an important technique to evaluate the robustness of deep neural networks (DNNs). However, most existing works focus on attacking the image classification problem since its input space is continuous and output space is finite. In this paper, we study the much more challenging problem of crafting adversarial examples for sequence-to-sequence (seq2seq) models, whose inputs are discrete text strings and outputs have an almost infinite number of possibilities. To address the challenges caused by the discrete input space, we propose a projected gradient method combined with group lasso and gradient regularization. To handle the almost infinite output space, we design some novel loss functions to conduct non-overlapping attack and targeted keyword attack. We apply our algorithm to machine translation and text summarization tasks, and verify the effectiveness of the proposed algorithm: by changing less than 3 words, we can make seq2seq model to produce desired outputs with high success rates. On the other hand, we recognize that, compared with the well-evaluated CNN-based classifiers, seq2seq models are intrinsically more robust to adversarial attacks.", "title": "" } ]
[ { "docid": "040587526c0fa1fd5ba2a28ee554329f", "text": "Data from 14 nations reveal IQ gains ranging from 5 to 25 points in a single generation. Some of the largest gains occur on culturally reduced tests and tests of fluid intelligence. The Norwegian data show that a nation can make significant gains on a culturally reduced test while suffering losses on other tests. The Dutch data prove the existence of unknown environmental factors so potent that they account for 15 of the 20 points gained. The hypothesis that best fits the results is that IQ tests do not measure intelligence but rather a correlate with a weak causal link to intelligence. This hypothesis can also explain differential trends on various mental tests, such as the combination of IQ gains and Scholastic Aptitude Test losses in the United States.", "title": "" }, { "docid": "4fca6b18317915f725c4606f1c7309db", "text": "The massive amounts of bandwidth available at millimeter-wave frequencies (above 10 GHz) have the potential to greatly increase the capacity of fifth generation cellular wireless systems. However, to overcome the high isotropic propagation loss experienced at these frequencies, highly directional antennas will be required at both the base station and the mobile terminal to achieve sufficient link budget in wide area networks. This reliance on directionality has important implications for control layer procedures. In particular, initial access can be significantly delayed due to the need for the base station and the user to find the proper alignment for directional transmission and reception. This article provides a survey of several recently proposed techniques for this purpose. A coverage and delay analysis is performed to compare various techniques including exhaustive and iterative search, and context-information-based algorithms. We show that the best strategy depends on the target SNR regime, and provide guidelines to characterize the optimal choice as a function of the system parameters.", "title": "" }, { "docid": "bd5d84c9d699080b2d668809626e90fe", "text": "Until now, error type performance for Grammatical Error Correction (GEC) systems could only be measured in terms of recall because system output is not annotated. To overcome this problem, we introduce ERRANT, a grammatical ERRor ANnotation Toolkit designed to automatically extract edits from parallel original and corrected sentences and classify them according to a new, dataset-agnostic, rulebased framework. This not only facilitates error type evaluation at different levels of granularity, but can also be used to reduce annotator workload and standardise existing GEC datasets. Human experts rated the automatic edits as “Good” or “Acceptable” in at least 95% of cases, so we applied ERRANT to the system output of the CoNLL-2014 shared task to carry out a detailed error type analysis for the first time.", "title": "" }, { "docid": "2bbb1b4081d7d55c475b34a092c6de69", "text": "We enrich a curated resource of commonsense knowledge by formulating the problem as one of knowledge base completion (KBC). Most work in KBC focuses on knowledge bases like Freebase that relate entities drawn from a fixed set. However, the tuples in ConceptNet (Speer and Havasi, 2012) define relations between an unbounded set of phrases. We develop neural network models for scoring tuples on arbitrary phrases and evaluate them by their ability to distinguish true held-out tuples from false ones. We find strong performance from a bilinear model using a simple additive architecture to model phrases. We manually evaluate our trained model’s ability to assign quality scores to novel tuples, finding that it can propose tuples at the same quality level as mediumconfidence tuples from ConceptNet.", "title": "" }, { "docid": "f094754a454233cc8992f11e9dcb8bc9", "text": "This paper reports on the 2018 PIRM challenge on perceptual super-resolution (SR), held in conjunction with the Perceptual Image Restoration and Manipulation (PIRM) workshop at ECCV 2018. In contrast to previous SR challenges, our evaluation methodology jointly quantifies accuracy and perceptual quality, therefore enabling perceptualdriven methods to compete alongside algorithms that target PSNR maximization. Twenty-one participating teams introduced algorithms which well-improved upon the existing state-of-the-art methods in perceptual SR, as confirmed by a human opinion study. We also analyze popular image quality measures and draw conclusions regarding which of them correlates best with human opinion scores. We conclude with an analysis of the current trends in perceptual SR, as reflected from the leading submissions.", "title": "" }, { "docid": "d1f3961959f11ce553237ef8941da86a", "text": "Inspired by recent successes of deep learning in computer vision and speech recognition, we propose a novel framework to encode time series data as different types of images, namely, Gramian Angular Fields (GAF) and Markov Transition Fields (MTF). This enables the use of techniques from computer vision for classification. Using a polar coordinate system, GAF images are represented as a Gramian matrix where each element is the trigonometric sum (i.e., superposition of directions) between different time intervals. MTF images represent the first order Markov transition probability along one dimension and temporal dependency along the other. We used Tiled Convolutional Neural Networks (tiled CNNs) on 12 standard datasets to learn high-level features from individual GAF, MTF, and GAF-MTF images that resulted from combining GAF and MTF representations into a single image. The classification results of our approach are competitive with five stateof-the-art approaches. An analysis of the features and weights learned via tiled CNNs explains why the approach works.", "title": "" }, { "docid": "34919dc04bab57299c22d709902aea68", "text": "In the rank join problem, we are given a set of relations and a scoring function, and the goal is to return the join results with the top k scores. It is often the case in practice that the inputs may be accessed in ranked order and the scoring function is monotonic. These conditions allow for efficient algorithms that solve the rank join problem without reading all of the input. In this article, we present a thorough analysis of such rank join algorithms. A strong point of our analysis is that it is based on a more general problem statement than previous work, making it more relevant to the execution model that is employed by database systems. One of our results indicates that the well-known HRJN algorithm has shortcomings, because it does not stop reading its input as soon as possible. We find that it is NP-hard to overcome this weakness in the general case, but cases of limited query complexity are tractable. We prove the latter with an algorithm that infers provably tight bounds on the potential benefit of reading more input in order to stop as soon as possible. As a result, the algorithm achieves a cost that is within a constant factor of optimal.", "title": "" }, { "docid": "b9aea292c231f6bb976ba099dcb57bcc", "text": "A tethered Small Unmanned Aerial System (sUAS) provided structural forensic inspection of the collapsed Berkman Plaza II six-story parking garage. The sUAS, an iSENSYS IP3 miniature helicopter, was tethered to meet US Federal Aviation Administration (FAA) requirements for unregulated flight below 45 m (150 ft). This created new platform control, human-robot interaction, and safety issues in addition to the challenges posed by the active, city environment. A new technique, viewpoint-oriented Cognitive Work Analysis (CWA), was used to generate the 4:1 human-robot crew organization and operational protocol. The sUAS over three flights was able to provide useful imagery to structural engineers that had been difficult to obtain from manned helicopters due to dust obscurants. Based on these flights this work shows that tethered operations decreases team effectiveness, increases overall safety liability, and in general is not a recommended solution for sUAS flight.", "title": "" }, { "docid": "36e15266776cb4b5b1cb14b31482f01e", "text": "Graph embedding is an effective method to represent graph data in a low dimensional space for graph analytics. Most existing embedding algorithms typically focus on preserving the topological structure or minimizing the reconstruction errors of graph data, but they have mostly ignored the data distribution of the latent codes from the graphs, which often results in inferior embedding in realworld graph data. In this paper, we propose a novel adversarial graph embedding framework for graph data. The framework encodes the topological structure and node content in a graph to a compact representation, on which a decoder is trained to reconstruct the graph structure. Furthermore, the latent representation is enforced to match a prior distribution via an adversarial training scheme. To learn a robust embedding, two variants of adversarial approaches, adversarially regularized graph autoencoder (ARGA) and adversarially regularized variational graph autoencoder (ARVGA), are developed. Experimental studies on real-world graphs validate our design and demonstrate that our algorithms outperform baselines by a wide margin in link prediction, graph clustering, and graph visualization tasks.", "title": "" }, { "docid": "27856dcc3b48bb86ca8bd3ca8b046385", "text": "This paper provides evidence of the significant negative health externalities of traffic congestion. We exploit the introduction of electronic toll collection, or E-ZPass, which greatly reduced traffic congestion and emissions from motor vehicles in the vicinity of highway toll plazas. Specifically, we compare infants born to mothers living near toll plazas to infants born to mothers living near busy roadways but away from toll plazas with the idea that mothers living away from toll plazas did not experience significant reductions in local traffic congestion. We also examine differences in the health of infants born to the same mother, but who differ in terms of whether or not they were “exposed” to E-ZPass. We find that reductions in traffic congestion generated by E-ZPass reduced the incidence of prematurity and low birth weight among mothers within 2km of a toll plaza by 6.7-9.1% and 8.5-11.3% respectively, with larger effects for African-Americans, smokers, and those very close to toll plazas. There were no immediate changes in the characteristics of mothers or in housing prices in the vicinity of toll plazas that could explain these changes, and the results are robust to many changes in specification. The results suggest that traffic congestion is a significant contributor to poor health in affected infants. Estimates of the costs of traffic congestion should account for these important health externalities. * We are grateful to the MacArthur foundation for financial support. We thank Katherine Hempstead and Matthew Weinberg of the New Jersey Department of Health, and Craig Edelman of the Pennsylvania Department of Health for facilitating our access to the data. We are grateful to James MacKinnon and seminar participants at Harvard University, the University of Maryland, Queens University, Princeton University, the NBER Summer Institute, the SOLE/EALE 2010 meetings, Tulane University, and Uppsala University for helpful comments. All opinions and any errors are our own. Motor vehicles are a major source of air pollution. Nationally they are responsible for over 50% of carbon monoxide (CO), 34 percent of nitrogen oxide (NO2) and over 29 percent of hydrocarbon emissions in addition to as much as 10 percent of fine particulate matter emissions (Ernst et al., 2003). In urban areas, vehicles are the dominant source of these emissions. Furthermore, between 1980 and 2003 total vehicle miles traveled (VMT) in urban areas in the United States increased by 111% against an increase in urban lane-miles of only 51% (Bureau of Transportation Statistics, 2004). As a result, traffic congestion has steadily increased across the United States, causing 3.7 billion hours of delay by 2003 and wasting 2.3 billion gallons of motor fuel (Schrank and Lomax, 2005). Traditional estimates of the cost of congestion typically include delay costs (Vickrey, 1969), but they rarely address other congestion externalities such as the health effects of congestion. This paper seeks to provide estimates of the health effects of traffic congestion by examining the effect of a policy change that caused a sharp drop in congestion (and therefore in the level of local motor vehicle emissions) within a relatively short time frame at different sites across the northeastern United States. Engineering studies suggest that the introduction of electronic toll collection (ETC) technology, called E-ZPass in the Northeast, sharply reduced delays at toll plazas and pollution caused by idling, decelerating, and accelerating. We study the effect of E-ZPass, and thus the sharp reductions in local traffic congestion, on the health of infants born to mothers living near toll plazas. This question is of interest for three reasons. First, there is increasing evidence of the long-term effects of poor health at birth on future outcomes. For example, low birth weight has been linked to future health problems and lower educational attainment (see Currie (2009) for a summary of this research). The debate over the costs and benefits of emission controls and traffic congestion policies could be significantly impacted by evidence that traffic congestion has a deleterious effect on fetal health. Second, the study of newborns overcomes several difficulties in making the connection between pollution and health because, unlike adult diseases that may reflect pollution exposure that occurred many years ago, the link between cause and effect is immediate. Third, E-ZPass is an interesting policy experiment because, while pollution control was an important consideration for policy makers, the main motive for consumers to sign up for E-ZPass is to reduce travel time. Hence, E-ZPass offers an example of achieving reductions in pollution by bundling emissions reductions with something consumers perhaps value more highly such as reduced travel time. Our analysis improves upon much of the previous research linking air pollution to fetal health as well as on the somewhat smaller literature focusing specifically on the relationship between residential proximity to busy roadways and poor pregnancy outcomes. Since air pollution is not randomly assigned, studies that attempt to compare health outcomes for populations exposed to differing pollution levels may not be adequately controlling for confounding determinants of health. Since air quality is capitalized into housing prices (see Chay and Greenstone, 2003) families with higher incomes or preferences for cleaner air are likely to sort into locations with better air quality, and failure to account for this sorting will lead to overestimates of the effects of pollution. Alternatively, pollution levels are higher in urban areas where there are often more educated individuals with better access to health care, which can cause underestimates of the true effects of pollution on health. In the absence of a randomized trial, we exploit a policy change that created large local and persistent reductions in traffic congestion and traffic related air emissions for certain segments along a highway. We compare the infant health outcomes of those living near an electronic toll plaza before and after implementation of E-ZPass to those living near a major highway but further away from a toll plaza. Specifically, we compare mothers within 2 kilometers of a toll plaza to mothers who are between 2 and 10 km from a toll plaza but still within 3 kilometers of a major highway before and after the adoption of E-ZPass in New Jersey and Pennsylvania. New Jersey and Pennsylvania provide a compelling setting for our particular research design. First, both New Jersey and Pennsylvania are heavily populated, with New Jersey being the most densely populated state in the United States and Pennsylvania being the sixth most populous state in the country. As a result, these two states have some of the busiest interstate systems in the country, systems that also happen to be densely surrounded by residential housing. Furthermore, we know the exact addresses of mothers, in contrast to many observational studies which approximate the individual’s location as the centroid of a geographic area or by computing average pollution levels within the geographic area. This information enables us to improve on the assignment of pollution exposure. Lastly, E-ZPass adoption and take up was extremely quick, and the reductions in congestion spillover to all automobiles, not just those registered with E-ZPass (New Jersey Transit Authority, 2001). Our difference-in-differences research design relies on the assumption that the characteristics of mothers near a toll plaza change over time in a way that is comparable to those of other mothers who live further away from a plaza but still close to a major highway. We test this assumption by examining the way that observable characteristics of the two groups of mothers and housing prices change before and after E-ZPass adoption. We also estimate a range of alternative specifications in an effort to control for unobserved characteristics of mothers and neighborhoods that could confound our estimates. We find significant effects on infant health. The difference-in-difference models suggest that prematurity fell by 6.7-9.16% among mothers within 2km of a toll plaza, while the incidence of low birth weight fell by 8.5-11.3%. We argue that these are large but not implausible effects given previous studies. In contrast, we find that there are no significant effects of E-ZPass adoption on the demographic characteristics of mothers in the vicinity of a toll plaza. We also find no immediate effect on housing prices, suggesting that the composition of women giving birth near toll plazas shows little change in the immediate aftermath of E-ZPass adoption (though of course it might change more over time). The rest of the paper is laid out as follows: Section I provides necessary background. Section II describes our methods, while data are described in Section III. Section IV presents our results. Section VI discusses the magnitude of the effects we find, and Section V details our conclusions. I. Background Many studies suggest an association between air pollution and fetal health. Mattison et al. (2003) and Glinianaia et al. (2004) summarize much of the literature. For more recent papers see for example Currie et al. (2009); Dugandzic et al. (2006); Huynh et al. (2006); Karr et al. (2009); Lee et al. (2008); Leem et al. (2006); Liu et al. (2007); Parker et al. (2005); Salam et al. (2005); Ritz et al. (2006); Wilhelm and Ritz (2005); Woodruff et al. (2008). Since traffic is a major contributor to air pollution, several studies have focused specifically on the effects of exposure to motor vehicle exhaust (see Wilhelm and Ritz (2003); Ponce et al. (2005); Brauer et 1 There is also a large literature linking air pollution and child health, some of it focusing on the effects of traffic on child health. See Schwartz (2004) and Glinianaia et al. (2004b) for reviews. ", "title": "" }, { "docid": "31f1079ac79278eaf5fbcd5ef11482e7", "text": "Data from two studies describe the development of an implicit measure of humility and support the idea that dispositional humility is a positive quality with possible benefits. In Study 1, 135 college students completed Humility and Self-Esteem Implicit Association Tests (IATs) and several self-report measures of personality self-concept. Fifty-four participants also completed the Humility IAT again approximately 2 weeks later and their humility was rated by close acquaintances. The Humility IAT was found to be internally and temporally consistent. Implicit humility correlated with self-reported humility relative to arrogance, implicit self-esteem, and narcissism (inversely). Humility was not associated with self-reported low selfesteem, pessimism, or depression. In fact, self-reported humility relative to arrogance correlated positively with self-reported self-esteem, gratitude, forgiveness, spirituality, and general health. In addition, self-reported humility and acquaintancerated humility correlated positively; however, implicit humility and acquaintance-rated humility were not strongly associated. In Study 2, to examine the idea that humility might be associated with increased academic performance, we examined actual course grades of 55 college students who completed Humility and Self-Esteem IATs. Implicit humility correlated positively with higher actual course grades when narcissism, conscientiousness, and implicit self-esteem were simultaneously controlled. Implications and future research directions are discussed.", "title": "" }, { "docid": "a74b091706f4aeb384d2bf3d477da67d", "text": "Amazon's Echo and its conversational agent Alexa open exciting opportunities for understanding how people perceive and interact with virtual agents. Drawing from user reviews of the Echo posted to Amazon.com, this case study explores the degree to which user reviews indicate personification of the device, sociability level of interactions, factors linked with personification, and influences on user satisfaction. Results indicate marked variance in how people refer to the device, with over half using the personified name Alexa but most referencing the device with object pronouns. Degree of device personification is linked with sociability of interactions: greater personification co-occurs with more social interactions with the Echo. Reviewers mentioning multiple member households are more likely to personify the device than reviewers mentioning living alone. Even after controlling for technical issues, personification predicts user satisfaction with the Echo.", "title": "" }, { "docid": "3bbb7d9e7ec90a4d9ab28dad1727fe70", "text": "Space-frequency (SF) codes that exploit both spatial and frequency diversity can be designed using orthogonal frequency division multiplexing (OFDM). However, OFDM is sensitive to frequency offset (FO), which generates intercarrier interference (ICI) among subcarriers. We investigate the pair-wise error probability (PEP) performance of SF codes over quasistatic, frequency selective Rayleigh fading channels with FO. We prove that the conventional SF code design criteria remain valid. The negligible performance loss for small FOs (less than 1%), however, increases with FO and with signal to noise ratio (SNR). While diversity can be used to mitigate ICI, as FO increases, the PEP does not rapidly decay with SNR. Therefore, we propose a new class of SF codes called ICI self-cancellation SF (ISC-SF) codes to combat ICI effectively even with high FO (10%). ISC-SF codes are constructed from existing full diversity space-time codes. Importantly, our code design provide a satisfactory tradeoff among error correction ability, ICI reduction and spectral efficiency. Furthermore, we demonstrate that ISC-SF codes can also mitigate the ICI caused by phase noise and time varying channels. Simulation results affirm the theoretical analysis.", "title": "" }, { "docid": "aa3abc75e37ed6de703d05c274806220", "text": "We conducted an extensive set of empirical analyses to examine the effect of the number of events per variable (EPV) on the relative performance of three different methods for assessing the predictive accuracy of a logistic regression model: apparent performance in the analysis sample, split-sample validation, and optimism correction using bootstrap methods. Using a single dataset of patients hospitalized with heart failure, we compared the estimates of discriminatory performance from these methods to those for a very large independent validation sample arising from the same population. As anticipated, the apparent performance was optimistically biased, with the degree of optimism diminishing as the number of events per variable increased. Differences between the bootstrap-corrected approach and the use of an independent validation sample were minimal once the number of events per variable was at least 20. Split-sample assessment resulted in too pessimistic and highly uncertain estimates of model performance. Apparent performance estimates had lower mean squared error compared to split-sample estimates, but the lowest mean squared error was obtained by bootstrap-corrected optimism estimates. For bias, variance, and mean squared error of the performance estimates, the penalty incurred by using split-sample validation was equivalent to reducing the sample size by a proportion equivalent to the proportion of the sample that was withheld for model validation. In conclusion, split-sample validation is inefficient and apparent performance is too optimistic for internal validation of regression-based prediction models. Modern validation methods, such as bootstrap-based optimism correction, are preferable. While these findings may be unsurprising to many statisticians, the results of the current study reinforce what should be considered good statistical practice in the development and validation of clinical prediction models.", "title": "" }, { "docid": "f7a2f86526209860d7ea89d3e7f2b576", "text": "Natural Language Processing continues to grow in popularity in a range of research and commercial applications, yet managing the wide array of potential NLP components remains a difficult problem. This paper describes CURATOR, an NLP management framework designed to address some common problems and inefficiencies associated with building NLP process pipelines; and EDISON, an NLP data structure library in Java that provides streamlined interactions with CURATOR and offers a range of useful supporting functionality.", "title": "" }, { "docid": "5aef75aead029333a2e47a5d1ba52f2e", "text": "Although we appreciate Kinney and Atwal’s interest in equitability and maximal information coefficient (MIC), we believe they misrepresent our work. We highlight a few of our main objections below. Regarding our original paper (1), Kinney and Atwal (2) state “MIC is said to satisfy not just the heuristic notion of equitability, but also the mathematical criterion of R equitability,” the latter being their formalization of the heuristic notion that we introduced. This statement is simply false. We were explicit in our paper that our claims regarding MIC’s performance were based on large-scale simulations: “We tested MIC’s equitability through simulations. . ..[These] show that, for a large collection of test functions with varied sample sizes, noise levels, and noise models, MIC roughly equals the coefficient of determination R relative to each respective noiseless function.” Although we mathematically proved several things about MIC, none of our claims imply that it satisfies Kinney and Atwal’s R equitability, which would require that MIC exactly equal R in the infinite data limit. Thus, their proof that no dependence measure can satisfy R equitability, although interesting, does not uncover any error in our work, and their suggestion that it does is a gross misrepresentation. Kinney and Atwal seem ready to toss out equitability as a useful criterion based on their theoretical result. We argue, however, that regardless of whether “perfect” equitability is possible, approximate notions of equitability remain the right goal for many data exploration settings. Just as the theory of NP completeness does not suggest we stop thinking about NP complete problems, but instead that we look for approximations and solutions in restricted cases, an impossibility result about perfect equitability provides focus for further research, but does not mean that useful solutions are unattainable. Similarly, as others have noted (3), Kinney and Atwal’s proof requires a highly permissive noise model, and so the attainability of R equitability under more limited noise models such as those in our work remains an open question. Finally, the authors argue that mutual information is more equitable than MIC. However, they provide as justification only a single noise model, only at limiting sample sizes ðn≥ 5;000Þ. As we’ve shown in followup work (4), which they themselves cite but fail to address, MIC is more equitable than mutual information estimation under many other realistic noise models even at a sample size of 5,000. Kinney and Atwal have stated, “. . .it matters how one defines noise” (5), and a useful statistic must indeed be robust to a wide range of noise models. Equally importantly, we’ve established in both our original and follow-up work that at sample size regimes less than 5,000, MIC is more equitable than mutual information estimates across all noise models tested. MIC’s superior equitability in these settings is not an “artifact” we neglected—as Kinney and Atwal suggest—but rather a weakness of mutual information estimation and an important consideration for practitioners. We expect that the understanding of equitability and MIC will improve over time and that better methods may arise. However, accurate representations of the work thus far will allow researchers in the area to most productively and collectively move forward.", "title": "" }, { "docid": "b181715b75842987e5f30ccd5765e378", "text": "Klondike Solitaire – also known as Patience – is a well-known single player card game. We studied several classes of Klondike Solitaire game configurations. We present a dynamic programming solution for counting the number of “unplayable” games. This method is extended for a subset of games which allow exactly one move. With an algorithm based on the inclusion-exclusion principle, symmetry elimination and a trade-off between lookup tables and dynamic programming we count the number of games that cannot be won due to a specific type of conflict. The size of a larger class of conflicting configurations is approximated with a Monte Carlo simulation. We investigate how much gameplay is limited by the stock. We give a recursion and show that Pfaff-Fuss-Catalan is a lower bound. We consider trivial games and report on two remarkable patterns we discovered.", "title": "" }, { "docid": "e8f1632349bcf571c04395225b90fb91", "text": "This paper studies the effect of school finance reforms on the distribution of school spending across richer and poorer districts, and the consequences of spending equalization for the relative test performance of students from different family backgrounds. We find that states where the school finance system was declared unconstitutional in the 1980s increased the relative funding of low-income districts. Increases in the amount of state aid available to poorer districts led to increases in the spending of these districts, narrowing the spending gap between richer and poorer districts. Using micro samples of SAT scores from this same period, we then test whether changes in spending inequality affect the gap in achievement between different family background groups. We find evidence that equalization of spending leads to a narrowing of test score outcomes across family background groups.  2002 Elsevier Science B.V. All rights reserved.", "title": "" }, { "docid": "e79e94549bca30e3a4483f7fb9992932", "text": "The use of semantic technologies and Semantic Web ontologies in particular have enabled many recent developments in information integration, search engines, and reasoning over formalised knowledge. Ontology Design Patterns have been proposed to be useful in simplifying the development of Semantic Web ontologies by codifying and reusing modelling best practices. This thesis investigates the quality of Ontology Design Patterns. The main contribution of the thesis is a theoretically grounded and partially empirically evaluated quality model for such patterns including a set of quality characteristics, indicators, measurement methods and recommendations. The quality model is based on established theory on information system quality, conceptual model quality, and ontology evaluation. It has been tested in a case study setting and in two experiments. The main findings of this thesis are that the quality of Ontology Design Patterns can be identified, formalised and measured, and furthermore, that these qualities interact in such a way that ontology engineers using patterns need to make tradeoffs regarding which qualities they wish to prioritise. The developed model may aid them in making these choices. This work has been supported by Jönköping University. Department of Computer and Information Science Linköping University SE-581 83 Linköping, Sweden", "title": "" }, { "docid": "a4dea5e491657e1ba042219401ebcf39", "text": "Beam scanning arrays typically suffer from scan loss; an increasing degradation in gain as the beam is scanned from broadside toward the horizon in any given scan plane. Here, a metasurface is presented that reduces the effects of scan loss for a leaky-wave antenna (LWA). The metasurface is simple, being composed of an ultrathin sheet of subwavelength split-ring resonators. The leaky-wave structure is balanced, scanning from the forward region, through broadside, and into the backward region, and designed to scan in the magnetic plane. The metasurface is effectively invisible at broadside, where balanced LWAs are most sensitive to external loading. It is shown that the introduction of the metasurface results in increased directivity, and hence, gain, as the beam is scanned off broadside, having an increasing effect as the beam is scanned to the horizon. Simulations show that the metasurface improves the effective aperture distribution at higher scan angles, resulting in a more directive main beam, while having a negligible impact on cross-polarization gain. Experimental validation results show that the scan range of the antenna is increased from $-39 {^{\\circ }} \\leq \\theta \\leq +32 {^{\\circ }}$ to $-64 {^{\\circ }} \\leq \\theta \\leq +70 {^{\\circ }}$ , when loaded with the metasurface, demonstrating a flattened gain profile over a 135° range centered about broadside. Moreover, this scan range occurs over a frequency band spanning from 9 to 15.5 GHz, demonstrating a relative bandwidth of 53% for the metasurface.", "title": "" } ]
scidocsrr
66f65d037d045dcdfd9347297b45ef8e
Application of knowledge-based approaches in software architecture: A systematic mapping study
[ { "docid": "ca6b556eb4de9a8f66aefd5505c20f3d", "text": "Knowledge is a broad and abstract notion that has defined epistemological debate in western philosophy since the classical Greek era. In the past Richard Watson was the accepting senior editor for this paper. MISQ Review articles survey, conceptualize, and synthesize prior MIS research and set directions for future research. For more details see http://www.misq.org/misreview/announce.html few years, however, there has been a growing interest in treating knowledge as a significant organizational resource. Consistent with the interest in organizational knowledge and knowledge management (KM), IS researchers have begun promoting a class of information systems, referred to as knowledge management systems (KMS). The objective of KMS is to support creation, transfer, and application of knowledge in organizations. Knowledge and knowledge management are complex and multi-faceted concepts. Thus, effective development and implementation of KMS requires a foundation in several rich", "title": "" } ]
[ { "docid": "44b71e1429f731cc2d91f919182f95a4", "text": "Power management of multi-core processors is extremely important because it allows power/energy savings when all cores are not used. OS directed power management according to ACPI (Advanced Power and Configurations Interface) specifications is the common approach that industry has adopted for this purpose. While operating systems are capable of such power management, heuristics for effectively managing the power are still evolving. The granularity at which the cores are slowed down/turned off should be designed considering the phase behavior of the workloads. Using 3-D, video creation, office and e-learning applications from the SYSmark benchmark suite, we study the challenges in power management of a multi-core processor such as the AMD Quad-Core Opteron\" and Phenom\". We unveil effects of the idle core frequency on the performance and power of the active cores. We adjust the idle core frequency to have the least detrimental effect on the active core performance. We present optimized hardware and operating system configurations that reduce average active power by 30% while reducing performance by an average of less than 3%. We also present complete system measurements and power breakdown between the various systems components using the SYSmark and SPEC CPU workloads. It is observed that the processor core and the disk consume the most power, with core having the highest variability.", "title": "" }, { "docid": "073e3296fc2976f0db2f18a06b0cb816", "text": "Nowadays spoofing detection is one of the priority research areas in the field of automatic speaker verification. The success of Automatic Speaker Verification Spoofing and Countermeasures (ASVspoof) Challenge 2015 confirmed the impressive perspective in detection of unforeseen spoofing trials based on speech synthesis and voice conversion techniques. However, there is a small number of researches addressed to replay spoofing attacks which are more likely to be used by non-professional impersonators. This paper describes the Speech Technology Center (STC) anti-spoofing system submitted for ASVspoof 2017 which is focused on replay attacks detection. Here we investigate the efficiency of a deep learning approach for solution of the mentioned-above task. Experimental results obtained on the Challenge corpora demonstrate that the selected approach outperforms current state-of-the-art baseline systems in terms of spoofing detection quality. Our primary system produced an EER of 6.73% on the evaluation part of the corpora which is 72% relative improvement over the ASVspoof 2017 baseline system.", "title": "" }, { "docid": "bfa2f3edf0bd1c27bfe3ab90dde6fd75", "text": "Sophorolipids are biosurfactants belonging to the class of the glycolipid, produced mainly by the osmophilic yeast Candida bombicola. Structurally they are composed by a disaccharide sophorose (2’-O-β-D-glucopyranosyl-β-D-glycopyranose) which is linked β -glycosidically to a long fatty acid chain with generally 16 to 18 atoms of carbon with one or more unsaturation. They are produced as a complex mix containing up to 40 molecules and associated isomers, depending on the species which produces it, the substrate used and the culture conditions. They present properties which are very similar or superior to the synthetic surfactants and other biosurfactants with the advantage of presenting low toxicity, higher biodegradability, better environmental compatibility, high selectivity and specific activity in a broad range of temperature, pH and salinity conditions. Its biological activities are directly related with its chemical structure. Sophorolipids possess a great potential for application in areas such as: food; bioremediation; cosmetics; pharmaceutical; biomedicine; nanotechnology and enhanced oil recovery.", "title": "" }, { "docid": "4f84d3a504cf7b004a414346bb19fa94", "text": "Abstract—The electric power supplied by a photovoltaic power generation systems depends on the solar irradiation and temperature. The PV system can supply the maximum power to the load at a particular operating point which is generally called as maximum power point (MPP), at which the entire PV system operates with maximum efficiency and produces its maximum power. Hence, a Maximum power point tracking (MPPT) methods are used to maximize the PV array output power by tracking continuously the maximum power point. The proposed MPPT controller is designed for 10kW solar PV system installed at Cape Institute of Technology. This paper presents the fuzzy logic based MPPT algorithm. However, instead of one type of membership function, different structures of fuzzy membership functions are used in the FLC design. The proposed controller is combined with the system and the results are obtained for each membership functions in Matlab/Simulink environment. Simulation results are decided that which membership function is more suitable for this system.", "title": "" }, { "docid": "2bbbd2d1accca21cdb614a0324aa1a0d", "text": "We propose a novel direct visual-inertial odometry method for stereo cameras. Camera pose, velocity and IMU biases are simultaneously estimated by minimizing a combined photometric and inertial energy functional. This allows us to exploit the complementary nature of vision and inertial data. At the same time, and in contrast to all existing visual-inertial methods, our approach is fully direct: geometry is estimated in the form of semi-dense depth maps instead of manually designed sparse keypoints. Depth information is obtained both from static stereo - relating the fixed-baseline images of the stereo camera - and temporal stereo - relating images from the same camera, taken at different points in time. We show that our method outperforms not only vision-only or loosely coupled approaches, but also can achieve more accurate results than state-of-the-art keypoint-based methods on different datasets, including rapid motion and significant illumination changes. In addition, our method provides high-fidelity semi-dense, metric reconstructions of the environment, and runs in real-time on a CPU.", "title": "" }, { "docid": "86bdb6616629da9c2574dc722b003ccf", "text": "This paper considers the problem of extending Training an Agent Manually via Evaluative Reinforcement (TAMER) in continuous state and action spaces. Investigative research using the TAMER framework enables a non-technical human to train an agent through a natural form of human feedback (negative or positive). The advantages of TAMER have been shown on tasks of training agents by only human feedback or combining human feedback with environment rewards. However, these methods are originally designed for discrete state-action, or continuous state-discrete action problems. This paper proposes an extension of TAMER to allow both continuous states and actions, called ACTAMER. The new framework utilizes any general function approximation of a human trainer’s feedback signal. Moreover, a combined capability of ACTAMER and reinforcement learning is also investigated and evaluated. The combination of human feedback and reinforcement learning is studied in both settings: sequential and simultaneous. Our experimental results demonstrate the proposed method successfully allowing a human to train an agent in two continuous state-action domains: Mountain Car and Cart-pole (balancing).", "title": "" }, { "docid": "35b64e16a8a86ddbee49177f75a662fd", "text": "Large scale, multidisciplinary, engineering designs are always difficult due to the complexity and dimensionality of these problems. Direct coupling between the analysis codes and the optimization routines can be prohibitively time consuming due to the complexity of the underlying simulation codes. One way of tackling this problem is by constructing computationally cheap(er) approximations of the expensive simulations that mimic the behavior of the simulation model as closely as possible. This paper presents a data driven, surrogate-based optimization algorithm that uses a trust region-based sequential approximate optimization (SAO) framework and a statistical sampling approach based on design of experiment (DOE) arrays. The algorithm is implemented using techniques from two packages—SURFPACK and SHEPPACK that provide a collection of approximation algorithms to build the surrogates and three different DOE techniques—full factorial (FF), Latin hypercube sampling, and central composite design—are used to train the surrogates. The results are compared with the optimization results obtained by directly coupling an optimizer with the simulation code. The biggest concern in using the SAO framework based on statistical sampling is the generation of the required database. As the number of design variables grows, the computational cost of generating the required database grows rapidly. A data driven approach is proposed to tackle this situation, where the trick is to run the expensive simulation if and only if a nearby data point does not exist in the cumulatively growing database. Over time the database matures and is enriched as more and more optimizations are performed. Results show that the proposed methodology dramatically reduces the total number of calls to the expensive simulation runs during the optimization process.", "title": "" }, { "docid": "a61c1e5c1eafd5efd8ee7021613cf90d", "text": "A millimeter-wave (mmW) bandpass filter (BPF) using substrate integrated waveguide (SIW) is proposed in this work. A BPF with three resonators is formed by etching slots on the top metal plane of the single SIW cavity. The filter is investigated with the theory of electric coupling mechanism. The design procedure and design curves of the coupling coefficient (K) and quality factor (Q) are given and discussed here. The extracted K and Q are used to determine the filter circuit dimensions. In order to prove the validity, a SIW BPF operating at 140 GHz is fabricated in a single circuit layer using low temperature co-fired ceramic (LTCC) technology. The measured insertion loss is 1.913 dB at 140 GHz with a fractional bandwidth of 13.03%. The measured results are in good agreement with simulated results in such high frequency.", "title": "" }, { "docid": "a58cbbff744568ae7abd2873d04d48e9", "text": "Training real-world Deep Neural Networks (DNNs) can take an eon (i.e., weeks or months) without leveraging distributed systems. Even distributed training takes inordinate time, of which a large fraction is spent in communicating weights and gradients over the network. State-of-the-art distributed training algorithms use a hierarchy of worker-aggregator nodes. The aggregators repeatedly receive gradient updates from their allocated group of the workers, and send back the updated weights. This paper sets out to reduce this significant communication cost by embedding data compression accelerators in the Network Interface Cards (NICs). To maximize the benefits of in-network acceleration, the proposed solution, named INCEPTIONN (In-Network Computing to Exchange and Process Training Information Of Neural Networks), uniquely combines hardware and algorithmic innovations by exploiting the following three observations. (1) Gradients are significantly more tolerant to precision loss than weights and as such lend themselves better to aggressive compression without the need for the complex mechanisms to avert any loss. (2) The existing training algorithms only communicate gradients in one leg of the communication, which reduces the opportunities for in-network acceleration of compression. (3) The aggregators can become a bottleneck with compression as they need to compress/decompress multiple streams from their allocated worker group. To this end, we first propose a lightweight and hardware-friendly lossy-compression algorithm for floating-point gradients, which exploits their unique value characteristics. This compression not only enables significantly reducing the gradient communication with practically no loss of accuracy, but also comes with low complexity for direct implementation as a hardware block in the NIC. To maximize the opportunities for compression and avoid the bottleneck at aggregators, we also propose an aggregator-free training algorithm that exchanges gradients in both legs of communication in the group, while the workers collectively perform the aggregation in a distributed manner. Without changing the mathematics of training, this algorithm leverages the associative property of the aggregation operator and enables our in-network accelerators to (1) apply compression for all communications, and (2) prevent the aggregator nodes from becoming bottlenecks. Our experiments demonstrate that INCEPTIONN reduces the communication time by 70.9~80.7% and offers 2.2~3.1x speedup over the conventional training system, while achieving the same level of accuracy.", "title": "" }, { "docid": "758eb7a0429ee116f7de7d53e19b3e02", "text": "With the rapid development of the Internet, many types of websites have been developed. This variety of websites makes it necessary to adopt systemized evaluation criteria with a strong theoretical basis. This study proposes a set of evaluation criteria derived from an architectural perspective which has been used for over a 1000 years in the evaluation of buildings. The six evaluation criteria are internal reliability and external security for structural robustness, useful content and usable navigation for functional utility, and system interface and communication interface for aesthetic appeal. The impacts of the six criteria on user satisfaction and loyalty have been investigated through a large-scale survey. The study results indicate that the six criteria have different impacts on user satisfaction for different types of websites, which can be classified along two dimensions: users’ goals and users’ activity levels.", "title": "" }, { "docid": "fdfcf2f910884bf899623d2711386db2", "text": "A number of vehicles may be controlled and supervised by traffic security and its management. The License Plate Recognition is broadly employed in traffic management to recognize a vehicle whose owner has despoiled traffic laws or to find stolen vehicles. Vehicle License Plate Detection and Recognition is a key technique in most of the traffic related applications such as searching of stolen vehicles, road traffic monitoring, airport gate monitoring, speed monitoring and automatic parking lots access control. It is simply the ability of automatically extract and recognition of the vehicle license number plate's character from a captured image. Number Plate Recognition method suffered from problem of feature selection process. The current method of number plate recognition system only focus on local, global and Neural Network process of Feature Extraction and process for detection. The Optimized Feature Selection process improves the detection ratio of number plate recognition. In this paper, it is proposed a new methodology for `License Plate Recognition' based on wavelet transform function. This proposed methodology compare with Correlation based method for detection of number plate. Empirical result shows that better performance in comparison of correlation based technique for number plate recognition. Here, it is modified the Matching Technique for numberplate recognition by using Multi-Class RBF Neural Network Optimization.", "title": "" }, { "docid": "fde0b02f0dbf01cd6a20b02a44cdc6cf", "text": "This paper presents a process for capturing spatially and directionally varying illumination from a real-world scene and using this lighting to illuminate computer-generated objects. We use two devices for capturing such illumination. In the first we photograph an array of mirrored spheres in high dynamic range to capture the spatially varying illumination. In the second, we obtain higher resolution data by capturing images with an high dynamic range omnidirectional camera as it traverses across a plane. For both methods we apply the light field technique to extrapolate the incident illumination to a volume. We render computer-generated objects as illuminated by this captured illumination using a custom shader within an existing global illumination rendering system. To demonstrate our technique we capture several spatially-varying lighting environments with spotlights, shadows, and dappled lighting and use them to illuminate synthetic scenes. We also show comparisons to real objects under the same illumination.", "title": "" }, { "docid": "1ad92c6656e89a40b0a376f8c1693760", "text": "This paper presents an overview of our work towards building socially intelligent, cooperative humanoid robots that can work and learn in partnership with people. People understand each other in social terms, allowing them to engage others in a variety of complex social interactions including communication, social learning, and cooperation. We present our theoretical framework that is a novel combination of Joint Intention Theory and Situated Learning Theory and demonstrate how this framework can be applied to develop our sociable humanoid robot, Leonardo. We demonstrate the robot’s ability to learn quickly and effectively from natural human instruction using gesture and dialog, and then cooperate to perform a learned task jointly with a person. Such issues must be addressed to enable many new and exciting applications for robots that require them to play a long-term role in people’s daily lives.", "title": "" }, { "docid": "5c76caebe05acd7d09e6cace0cac9fe1", "text": "A program that detects people in images has a multitude of potential applications, including tracking for biomedical applications or surveillance, activity recognition for person-device interfaces (device control, video games), organizing personal picture collections, and much more. However, detecting people is difficult, as the appearance of a person can vary enormously because of changes in viewpoint or lighting, clothing style, body pose, individual traits, occlusion, and more. It then makes sense that the first people detectors were really detectors of pedestrians, that is, people walking at a measured pace on a sidewalk, and viewed from a fixed camera. Pedestrians are nearly always upright, their arms are mostly held along the body, and proper camera placement relative to pedestrian traffic can virtually ensure a view from the front or from behind (Figure 1). These factors reduce variation of appearance, although clothing, illumination, background, occlusions, and somewhat limited variations of pose still present very significant challenges.", "title": "" }, { "docid": "b4ae619b0b9cc966622feb2dceda0f2e", "text": "A novel pressure sensing circuit for non-invasive RF/microwave blood glucose sensors is presented in this paper. RF sensors are of interest to researchers for measuring blood glucose levels non-invasively. For the measurements, the finger is a popular site that has a good amount of blood supply. When a finger is placed on top of the RF sensor, the electromagnetic fields radiating from the sensor interact with the blood in the finger and the resulting sensor response depends on the permittivity of the blood. The varying glucose level in the blood results in a permittivity change causing a shift in the sensor's response. Therefore, by observing the sensor's frequency response it may be possible to predict the blood glucose level. However, there are two crucial points in taking and subsequently predicting the blood glucose level. These points are; the position of the finger on the sensor and the pressure applied onto the sensor. A variation in the glucose level causes a very small frequency shift. However, finger positioning and applying inconsistent pressure have more pronounced effect on the sensor response. For this reason, it may not be possible to take a correct reading if these effects are not considered carefully. Two novel pressure sensing circuits are proposed and presented in this paper to accurately monitor the pressure applied.", "title": "" }, { "docid": "855f67a94e8425846584e5c82355fa91", "text": "This paper is the product of a workshop held in Amsterdam during the Software Technology and Practice Conference (STEP 2003). The purpose of the paper is to propose Bloom's taxonomy levels for the Guide to the Software Engineering Body of Knowledge (SWEBOK) topics for three software engineer profiles: a new graduate, a graduate with four years of experience, and an experienced member of a software engineering process group. Bloom's taxonomy levels are proposed for topics of four knowledge areas of the SWEBOK Guide: software maintenance, software engineering management, software engineering process, and software quality. By proposing Bloom's taxonomy in this way, the paper aims to illustrate how such profiles could be used as a tool in defining job descriptions, software engineering role descriptions within a software engineering process definition, professional development paths, and training programs.", "title": "" }, { "docid": "a7c0bdbf05ce5d8da20a80dcc3bfaec0", "text": "Neurosurgery is a medical specialty that relies heavily on imaging. The use of computed tomography and magnetic resonance images during preoperative planning and intraoperative surgical navigation is vital to the success of the surgery and positive patient outcome. Augmented reality application in neurosurgery has the potential to revolutionize and change the way neurosurgeons plan and perform surgical procedures in the future. Augmented reality technology is currently commercially available for neurosurgery for simulation and training. However, the use of augmented reality in the clinical setting is still in its infancy. Researchers are now testing augmented reality system prototypes to determine and address the barriers and limitations of the technology before it can be widely accepted and used in the clinical setting.", "title": "" }, { "docid": "3a2729b235884bddc05dbdcb6a1c8fc9", "text": "The people of Tumaco-La Tolita culture inhabited the borders of present-day Colombia and Ecuador. Already extinct by the time of the Spaniards arrival, they left a huge collection of pottery artifacts depicting everyday life; among these, disease representations were frequently crafted. In this article, we present the results of the personal examination of the largest collections of Tumaco-La Tolita pottery in Colombia and Ecuador; cases of Down syndrome, achondroplasia, mucopolysaccharidosis I H, mucopolysaccharidosis IV, a tumor of the face and a benign tumor in an old woman were found. We believe these to be among the earliest artistic representations of disease.", "title": "" }, { "docid": "28c0ce094c4117157a27f272dbb94b91", "text": "This paper reports the design of a color dynamic and active-pixel vision sensor (C-DAVIS) for robotic vision applications. The C-DAVIS combines monochrome eventgenerating dynamic vision sensor pixels and 5-transistor active pixels sensor (APS) pixels patterned with an RGBW color filter array. The C-DAVIS concurrently outputs rolling or global shutter RGBW coded VGA resolution frames and asynchronous monochrome QVGA resolution temporal contrast events. Hence the C-DAVIS is able to capture spatial details with color and track movements with high temporal resolution while keeping the data output sparse and fast. The C-DAVIS chip is fabricated in TowerJazz 0.18um CMOS image sensor technology. An RGBW 2×2-pixel unit measures 20um × 20um. The chip die measures 8mm × 6.2mm.", "title": "" }, { "docid": "d50d3997572847200f12d69f61224760", "text": "The main function of a network layer is to route packets from the source machine to the destination machine. Algorithms that are used for route selection and data structure are the main parts for the network layer. In this paper we examine the network performance when using three routing protocols, RIP, OSPF and EIGRP. Video, HTTP and Voice application where configured for network transfer. We also examine the behaviour when using link failure/recovery controller between network nodes. The simulation results are analyzed, with a comparison between these protocols on the effectiveness and performance in network implemented.", "title": "" } ]
scidocsrr
5d3aa8179e63cffbfc4583f97535b24c
Minnesota Satisfaction Questionnaire-Psychometric Properties and Validation in a Population of Portuguese Hospital Workers
[ { "docid": "6521ae2b4592fccdb061f1e414774024", "text": "The development of the Job Satisfaction Survey (JSS), a nine-subscale measure of employee job satisfaction applicable specifically to human service, public, and nonprofit sector organizations, is described. The item selection, item analysis, and determination of the final 36-item scale are also described, and data on reliability and validity and the instrument's norms are summarized. Included are a multitrait-multimethod analysis of the JSS and the Job Descriptive Index (JDI), factor analysis of the JSS, and scale intercorrelations. Correlation of JSS scores with criteria of employee perceptions and behaviors for multiple samples were consistent with findings involving other satisfaction scales and with findings from the private sector. The strongest correlations were with perceptions of the job and supervisor, intention of quitting, and organizational commitment. More modest correlations were found with salary, age, level, absenteeism, and turnover.", "title": "" } ]
[ { "docid": "4a89f20c4b892203be71e3534b32449c", "text": "This paper draws together knowledge from a variety of fields to propose that innovation management can be viewed as a form of organisational capability. Excellent companies invest and nurture this capability, from which they execute effective innovation processes, leading to innovations in new product, services and processes, and superior business performance results. An extensive review of the literature on innovation management, along with a case study of Cisco Systems, develops a conceptual model of the firm as an innovation engine. This new operating model sees substantial investment in innovation capability as the primary engine for wealth creation, rather than the possession of physical assets. Building on the dynamic capabilities literature, an “innovation capability” construct is proposed with seven elements. These are vision and strategy, harnessing the competence base, organisational intelligence, creativity and idea management, organisational structures and systems, culture and climate, and management of technology.", "title": "" }, { "docid": "4ae231ad20a99fb0b4c745cdffde456d", "text": "Networks-on-Chip (NoCs) interconnection architectures to be used in future billion-transistor Systems-on-Chip (SoCs) meet the major communication requirements of these systems, offering, at the same time, reusability, scalability and parallelism in communication. Furthermore, they cope with other issues like power constraints and clock distribution. Currently, there is a number of research works which explore different features of NoCs. In this paper, we present SoCIN, a scalable network based on a parametric router architecture to beused in the synthesis of customized low cost NoCs. The architecture of SoCIN and its router are described, and some synthesis results are presented.", "title": "" }, { "docid": "82da6897a36ea57473455d8f4da0a32d", "text": "Traditional learning-based coreference resolvers operate by training amentionpair classifier for determining whether two mentions are coreferent or not. Two independent lines of recent research have attempted to improve these mention-pair classifiers, one by learning amentionranking model to rank preceding mentions for a given anaphor, and the other by training an entity-mention classifier to determine whether a preceding cluster is coreferent with a given mention. We propose a cluster-ranking approach to coreference resolution that combines the strengths of mention rankers and entitymention models. We additionally show how our cluster-ranking framework naturally allows discourse-new entity detection to be learned jointly with coreference resolution. Experimental results on the ACE data sets demonstrate its superior performance to competing approaches.", "title": "" }, { "docid": "3f807cb7e753ebd70558a0ce74b416b7", "text": "In this paper, we study the problem of recovering a tensor with missing data. We propose a new model combining the total variation regularization and low-rank matrix factorization. A block coordinate decent (BCD) algorithm is developed to efficiently solve the proposed optimization model. We theoretically show that under some mild conditions, the algorithm converges to the coordinatewise minimizers. Experimental results are reported to demonstrate the effectiveness of the proposed model and the efficiency of the numerical scheme. © 2015 Elsevier Inc. All rights reserved.", "title": "" }, { "docid": "0bd720d912575c0810c65d04f6b1712b", "text": "Digital painters commonly use a tablet and stylus to drive software like Adobe Photoshop. A high quality stylus with 6 degrees of freedom (DOFs: 2D position, pressure, 2D tilt, and 1D rotation) coupled to a virtual brush simulation engine allows skilled users to produce expressive strokes in their own style. However, such devices are difficult for novices to control, and many people draw with less expensive (lower DOF) input devices. This paper presents a data-driven approach for synthesizing the 6D hand gesture data for users of low-quality input devices. Offline, we collect a library of strokes with 6D data created by trained artists. Online, given a query stroke as a series of 2D positions, we synthesize the 4D hand pose data at each sample based on samples from the library that locally match the query. This framework optionally can also modify the stroke trajectory to match characteristic shapes in the style of the library. Our algorithm outputs a 6D trajectory that can be fed into any virtual brush stroke engine to make expressive strokes for novices or users of limited hardware.", "title": "" }, { "docid": "34e544af5158850b7119ac4f7c0b7b5e", "text": "Over the last decade, the surprising fact has emerged that machines can possess therapeutic power. Due to the many healing qualities of touch, one route to such power is through haptic emotional interaction, which requires sophisticated touch sensing and interpretation. We explore the development of touch recognition technologies in the context of a furry artificial lap-pet, with the ultimate goal of creating therapeutic interactions by sensing human emotion through touch. In this work, we build upon a previous design for a new type of fur-based touch sensor. Here, we integrate our fur sensor with a piezoresistive fabric location/pressure sensor, and adapt the combined design to cover a curved creature-like object. We then use this interface to collect synchronized time-series data from the two sensors, and perform machine learning analysis to recognize 9 key affective touch gestures. In a study of 16 participants, our model averages 94% recognition accuracy when trained on individuals, and 86% when applied to the combined set of all participants. The model can also recognize which participant is touching the prototype with 79% accuracy. These results promise a new generation of emotionally intelligent machines, enabled by affective touch gesture recognition.", "title": "" }, { "docid": "30ff2dfb2864a294d2be5e4a33b88964", "text": "Using blockchain technology, it is possible to create contracts that offer a reward in exchange for a trained machine learning model for a particular data set. This would allow users to train machine learning models for a reward in a trustless manner. The smart contract will use the blockchain to automatically validate the solution, so there would be no debate about whether the solution was correct or not. Users who submit the solutions wont have counterparty risk that they wont get paid for their work. Contracts can be created easily by anyone with a dataset, even programmatically by software agents. This creates a market where parties who are good at solving machine learning problems can directly monetize their skillset, and where any organization or software agent that has a problem to solve with AI can solicit solutions from all over the world. This will incentivize the creation of better machine learning models, and make AI more accessible to companies and software agents. A consequence of creating this market is that there will be a well defined price of GPU training for machine learning models. Crypto-currency mining also uses GPUs in many cases. We can envision a world where at any given moment, miners can choose to direct their hardware to work on whichever workload is more profitable: cryptocurrency mining, or machine learning training. 1. Background 1.1. Bitcoin and cryptocurrencies Bitcoin was first introduced in 2008 to create a decentralized method of storing and transferring funds from one account to another. It enforced ownership using public key cryptography. Funds are stored in various addresses, and anyone with the private key for an address would be able to transfer funds from this account. To create such a system in a decentralized fashion required innovation on how to achieve consensus between participants, which was solved using a blockchain. This created an ecosystem that enabled fast and trusted transactions between untrusted users. Bitcoin implemented a scripting language for simple tasks. This language wasnt designed to be turing complete. Over time, people wanted to implement more complicated programming tasks on blockchains. Ethereum introduced a turing-complete language to support a wider range of applications. This language was designed to utilize the decentralized nature of the blockchain. Essentially its an application layer on top of the ethereum blockchain. By having a more powerful, turing-complete programming language, it became possible to build new types of applications on top of the ethereum blockchain: from escrow systems, minting new coins, decentralized corporations, and more. The Ethereum whitepaper talks about creating decentralized marketplaces, but focuses on things like identities and reputations to facilitate these transactions. (Buterin, 2014) In this marketplace, specifically for machine learning models, trust is a required feature. This approach is distinctly different than the trustless exchange system proposed in this paper. ar X iv :1 80 2. 10 18 5v 1 [ cs .C R ] 2 7 Fe b 20 18 Evaluating and Exchanging Machine Learning Models on the Ethereum Blockchain 1.2. Breakthrough in machine learning In 2012, Alex Krizhevsky, Ilya Sutskever, and Geoff Hinton were able to train a deep neural network for image classification by utilizing GPUs. (Krizhevsky et al., 2012) Their submission for the Large Scale Visual Recognition Challenge (LSVRC) halved the best error rate at the time. GPUs being able to do thousands of matrix operations in parallel was the breakthrough needed to train deep neural networks. With more research, machine learning (ML) systems have been able to surpass humans in many specific problems. These systems are now better at: lip reading (Chung et al., 2016), speech recognition (Xiong et al., 2016), location tagging (Weyand et al., 2016), playing Go (Silver et al., 2016), image classification (He et al., 2015), and more. In ML, a variety of models and approaches are used to attack different types of problems. Such an approach is called a Neural Network (NN). Neural Networks are made out of nodes, biases and weighted edges, and can represent virtually any function. (Hornik, 1991) Figure 1. Neural Network Schema There are two steps in building a new machine learning model. The first step is training, which takes in a dataset as an input, and adjusts the model weights to increase accuracy for the model. The second step is testing, that uses an independent dataset for testing the accuracy of the trained model. This second step is necessary to validate the model and to prevent a problem known as overfitting. An overfitted model is very good at a particular dataset, but is bad at generalizing for the given problem. Once it has been trained, a ML model can be used to perform tasks on new data, such as prediction, classification, and clustering. There is a huge demand for machine learning models, and companies that can get access to good machine learning models stand to profit through improved efficiency and new capabilities. Since there is strong demand for this kind of technology, and limited supply of talent, it makes sense to create a market for machine learning models. Since machine learning is purely software and training it doesnt require interacting with any physical systems, using blockchain for coordination between users, and using cryptocurrency for payment is a natural choice.", "title": "" }, { "docid": "2b743ba2f607f75bb7e1d964c39cbbcf", "text": "The demand and growth of indoor positioning has increased rapidly in the past few years for a diverse range of applications. Various innovative techniques and technologies have been introduced but precise and reliable indoor positioning still remains a challenging task due to dependence on a large number of factors and limitations of the technologies. Positioning technologies based on radio frequency (RF) have many advantages over the technologies utilizing ultrasonic, optical and infrared devices. Both narrowband and wideband RF systems have been implemented for short range indoor positioning/real-time locating systems. Ultra wideband (UWB) technology has emerged as a viable candidate for precise indoor positioning due its unique characteristics. This article presents a comparison of UWB and narrowband RF technologies in terms of modulation, throughput, transmission time, energy efficiency, multipath resolving capability and interference. Secondly, methods for measurement of the positioning parameters are discussed based on a generalized measurement model and, in addition, widely used position estimation algorithms are surveyed. Finally, the article provides practical UWB positioning systems and state-of-the-art implementations. We believe that the review presented in this article provides a structured overview and comparison of the positioning methods, algorithms and implementations in the field of precise UWB indoor positioning, and will be helpful for practitioners as well as for researchers to keep abreast of the recent developments in the field.", "title": "" }, { "docid": "f7808b676e04ae7e80cf06d36edc73e8", "text": "Ontology is the process of growth and elucidation of concepts of an information domain being common for a group of users. Establishing ontology into information retrieval is a normal method to develop searching effects of relevant information users require. Keywords matching process with historical or information domain is significant in recent calculations for assisting the best match for specific input queries. This research presents a better querying mechanism for information retrieval which integrates the ontology queries with keyword search. The ontology-based query is changed into a primary order to predicate logic uncertainty which is used for routing the query to the appropriate servers. Matching algorithms characterize warm area of researches in computer science and artificial intelligence. In text matching, it is more dependable to study semantics model and query for conditions of semantic matching. This research develops the semantic matching results between input queries and information in ontology field. The contributed algorithm is a hybrid method that is based on matching extracted instances from the queries and information field. The queries and information domain is focused on semantic matching, to discover the best match and to progress the executive process. In conclusion, the hybrid ontology in semantic web is sufficient to retrieve the documents when compared to standard ontology.", "title": "" }, { "docid": "ae536a72dfba1e7eff57989c3f94ae3e", "text": "Policymakers are often interested in estimating how policy interventions affect the outcomes of those most in need of help. This concern has motivated the practice of disaggregating experimental results by groups constructed on the basis of an index of baseline characteristics that predicts the values of individual outcomes without the treatment. This paper shows that substantial biases may arise in practice if the index is estimated by regressing the outcome variable on baseline characteristics for the full sample of experimental controls. We propose alternative methods that correct this bias and show that they behave well in realistic scenarios.", "title": "" }, { "docid": "47afea1e95f86bb44a1cf11e020828fc", "text": "Document clustering is generally the first step for topic identification. Since many clustering methods operate on the similarities between documents, it is important to build representations of these documents which keep their semantics as much as possible and are also suitable for efficient similarity calculation. As we describe in Koopman et al. (Proceedings of ISSI 2015 Istanbul: 15th International Society of Scientometrics and Informetrics Conference, Istanbul, Turkey, 29 June to 3 July, 2015. Bogaziçi University Printhouse. http://www.issi2015.org/files/downloads/all-papers/1042.pdf , 2015), the metadata of articles in the Astro dataset contribute to a semantic matrix, which uses a vector space to capture the semantics of entities derived from these articles and consequently supports the contextual exploration of these entities in LittleAriadne. However, this semantic matrix does not allow to calculate similarities between articles directly. In this paper, we will describe in detail how we build a semantic representation for an article from the entities that are associated with it. Base on such semantic representations of articles, we apply two standard clustering methods, K-Means and the Louvain community detection algorithm, which leads to our two clustering solutions labelled as OCLC-31 (standing for K-Means) and OCLC-Louvain (standing for Louvain). In this paper, we will give the implementation details and a basic comparison with other clustering solutions that are reported in this special issue.", "title": "" }, { "docid": "a00ee62d48afbcac22c85d2961c596bc", "text": "Despite oxycodone's (4,5-epoxy-14-hydroxy-3-methoxy-17-methylmorphinan-6-one) history of clinical use and the attention it has received as a drug of abuse, few reports have documented its pharmacology's relevance to its abuse or its mechanism of action. The purposes of the present study were to further characterize the analgesic effects of oxycodone, its mechanism of action, and its effects in terms of its relevance to its abuse liability. The results indicate that oxycodone had potent antinociceptive effects in the mouse paraphenylquinone writhing, hot-plate, and tail-flick assays, in which it appeared to be acting as a mu-opioid receptor agonist. It generalized to the heroin discriminative stimulus and served as a positive reinforcer in rats and completely suppressed withdrawal signs in morphine-dependent rhesus monkeys. These results suggest that the analgesic and abuse liability effects of oxycodone are likely mediated through mu-opioid receptors and provide the first laboratory report of its discriminative stimulus, reinforcing, and morphine cross-dependency effects.", "title": "" }, { "docid": "40939d3a4634498fb50c0cda9e31f476", "text": "Learning analytics is receiving increased attention, in part because it offers to assist educational institutions in increasing student retention, improving student success, and easing the burden of accountability. Although these large-scale issues are worthy of consideration, faculty might also be interested in how they can use learning analytics in their own courses to help their students succeed. In this paper, we define learning analytics, how it has been used in educational institutions, what learning analytics tools are available, and how faculty can make use of data in their courses to monitor and predict student performance. Finally, we discuss several issues and concerns with the use of learning analytics in higher education. Have you ever had the sense at the start of a new course or even weeks into the semester that you could predict which students will drop the course or which students will succeed? Of course, the danger of this realization is that it may create a self-fulfilling prophecy or possibly be considered “profiling”. But it could also be that you have valuable data in your head, collected from semesters of experience, that can help you predict who will succeed and who will not based on certain variables. In short, you likely have hunches based on an accumulation of experience. The question is, what are those variables? What are those data? And how well will they help you predict student performance and retention? More importantly, how will those data help you to help your students succeed in your course? Such is the promise of learning analytics. Learning analytics is defined as “the measurement, collection, analysis, and reporting of data about learners and their contexts, for purposes of understanding and optimizing learning and the environments in which it occurs” (Long & Siemens, 2011, p. 32). Learning analytics offers promise for predicting and improving student success and retention (e.g., Olmos & Corrin, 2012; Smith, Lange, & Huston, 2012) in part because it allows faculty, institutions, and students to make data-driven decisions about student success and retention. Data-driven decision making involves making use of data, such as the sort provided in Learning Management Systems (LMS), to inform educator’s judgments (Jones, 2012; Long & Siemens, 2011; Picciano, 2012). For example, to argue for increased funding to support student preparation for a course or a set of courses, it would be helpful to have data showing that students who have certain skills or abilities or prior coursework perform better in the class or set of classes than those who do not. Journal of Interactive Online Learning Dietz-Uhler & Hurn", "title": "" }, { "docid": "0caa6d4623fb0414facb76ccd8eaa235", "text": "Because of large amounts of unstructured text data generated on the Internet, text mining is believed to have high commercial value. Text mining is the process of extracting previously unknown, understandable, potential and practical patterns or knowledge from the collection of text data. This paper introduces the research status of text mining. Then several general models are described to know text mining in the overall perspective. At last we classify text mining work as text categorization, text clustering, association rule extraction and trend analysis according to applications.", "title": "" }, { "docid": "e41eb91c146b5054b583083b89d0a3fb", "text": "The authors adapt the SERVQUAL scale for medical care services and examine it for reliability, dimensionality, and validity in a primary care clinic setting. In addition, they explore the possibility of a link between perceived service quality--and its various dimensions--and a patient's future intent to complain, compliment, repeat purchase, and switch providers. Findings from 159 matched-pair responses indicate that the SERVQUAL scale can be adapted reliably to a clinic setting and that the dimensions of reliability, dependability, and empathy are most predictive of a patient's intent to complain, compliment, repeat purchase, and switch providers.", "title": "" }, { "docid": "0e3f43a28c477ae0e15a8608d3a1d4a5", "text": "This report provides an overview of the current state of the art deep learning architectures and optimisation techniques, and uses the ADNI hippocampus MRI dataset as an example to compare the effectiveness and efficiency of different convolutional architectures on the task of patch-based 3dimensional hippocampal segmentation, which is important in the diagnosis of Alzheimer’s Disease. We found that a slightly unconventional ”stacked 2D” approach provides much better classification performance than simple 2D patches without requiring significantly more computational power. We also examined the popular ”tri-planar” approach used in some recently published studies, and found that it provides much better results than the 2D approaches, but also with a moderate increase in computational power requirement. Finally, we evaluated a full 3D convolutional architecture, and found that it provides marginally better results than the tri-planar approach, but at the cost of a very significant increase in computational power requirement. ar X iv :1 50 5. 02 00 0v 1 [ cs .L G ] 8 M ay 2 01 5", "title": "" }, { "docid": "34a6fe0c5183f19d4f25a99b3bcd205e", "text": "In this paper, we first offer an overview of advances in the field of distance metric learning. Then, we empirically compare selected methods using a common experimental protocol. The number of distance metric learning algorithms proposed keeps growing due to their effectiveness and wide application. However, existing surveys are either outdated or they focus only on a few methods. As a result, there is an increasing need to summarize the obtained knowledge in a concise, yet informative manner. Moreover, existing surveys do not conduct comprehensive experimental comparisons. On the other hand, individual distance metric learning papers compare the performance of the proposed approach with only a few related methods and under different settings. This highlights the need for an experimental evaluation using a common and challenging protocol. To this end, we conduct face verification experiments, as this task poses significant challenges due to varying conditions during data acquisition. In addition, face verification is a natural application for distance metric learning because the encountered challenge is to define a distance function that: 1) accurately expresses the notion of similarity for verification; 2) is robust to noisy data; 3) generalizes well to unseen subjects; and 4) scales well with the dimensionality and number of training samples. In particular, we utilize well-tested features to assess the performance of selected methods following the experimental protocol of the state-of-the-art database labeled faces in the wild. A summary of the results is presented along with a discussion of the insights obtained and lessons learned by employing the corresponding algorithms.", "title": "" }, { "docid": "bf9e44e81e37b0aefb12250202d59111", "text": "There are many clustering tasks which are closely related in the real world, e.g. clustering the web pages of different universities. However, existing clustering approaches neglect the underlying relation and treat these clustering tasks either individually or simply together. In this paper, we will study a novel clustering paradigm, namely multi-task clustering, which performs multiple related clustering tasks together and utilizes the relation of these tasks to enhance the clustering performance. We aim to learn a subspace shared by all the tasks, through which the knowledge of the tasks can be transferred to each other. The objective of our approach consists of two parts: (1) Within-task clustering: clustering the data of each task in its input space individually; and (2) Cross-task clustering: simultaneous learning the shared subspace and clustering the data of all the tasks together. We will show that it can be solved by alternating minimization, and its convergence is theoretically guaranteed. Furthermore, we will show that given the labels of one task, our multi-task clustering method can be extended to transductive transfer classification (a.k.a. cross-domain classification, domain adaption). Experiments on several cross-domain text data sets demonstrate that the proposed multi-task clustering outperforms traditional single-task clustering methods greatly. And the transductive transfer classification method is comparable to or even better than several existing transductive transfer classification approaches.", "title": "" }, { "docid": "959b487a51ae87b2d993e6f0f6201513", "text": "The two-wheel differential drive mobile robots, are one of the simplest and most used structures in mobile robotics applications, it consists of a chassis with two fixed and in-line with each other electric motors. This paper presents new models for differential drive mobile robots and some considerations regarding design, modeling and control solutions. The presented models are to be used to help in facing the two top challenges in developing mechatronic mobile robots system; early identifying system level problems and ensuring that all design requirements are met, as well as, to simplify and accelerate Mechatronics mobile robots design process, including proper selection, analysis, integration and verification of the overall system and sub-systems performance throughout the development process.", "title": "" } ]
scidocsrr
9ae695d10f01e9cf4ed35160e49fa1ac
Dependency-based Gated Recursive Neural Network for Chinese Word Segmentation
[ { "docid": "1aeace70da31d29cb880e61817432bf7", "text": "This paper investigates improving supervised word segmentation accuracy with unlabeled data. Both large-scale in-domain data and small-scale document text are considered. We present a unified solution to include features derived from unlabeled data to a discriminative learning model. For the large-scale data, we derive string statistics from Gigaword to assist a character-based segmenter. In addition, we introduce the idea about transductive, document-level segmentation, which is designed to improve the system recall for out-ofvocabulary (OOV) words which appear more than once inside a document. Novel features1 result in relative error reductions of 13.8% and 15.4% in terms of F-score and the recall of OOV words respectively.", "title": "" }, { "docid": "1af1ab4da0fe4368b1ad97801c4eb015", "text": "Standard approaches to Chinese word segmentation treat the problem as a tagging task, assigning labels to the characters in the sequence indicating whether the character marks a word boundary. Discriminatively trained models based on local character features are used to make the tagging decisions, with Viterbi decoding finding the highest scoring segmentation. In this paper we propose an alternative, word-based segmentor, which uses features based on complete words and word sequences. The generalized perceptron algorithm is used for discriminative training, and we use a beamsearch decoder. Closed tests on the first and secondSIGHAN bakeoffs show that our system is competitive with the best in the literature, achieving the highest reported F-scores for a number of corpora.", "title": "" }, { "docid": "e9a9938b77b2f739a83b987455bc2ef7", "text": "Recently, neural network models for natural language processing tasks have been increasingly focused on for their ability of alleviating the burden of manual feature engineering. However, the previous neural models cannot extract the complicated feature compositions as the traditional methods with discrete features. In this paper, we propose a gated recursive neural network (GRNN) for Chinese word segmentation, which contains reset and update gates to incorporate the complicated combinations of the context characters. Since GRNN is relative deep, we also use a supervised layer-wise training method to avoid the problem of gradient diffusion. Experiments on the benchmark datasets show that our model outperforms the previous neural network models as well as the state-of-the-art methods.", "title": "" }, { "docid": "a9b20ad74b3a448fbc1555b27c4dcac9", "text": "A new learning algorithm for multilayer feedforward networks, RPROP, is proposed. To overcome the inherent disadvantages of pure gradient-descent, RPROP performs a local adaptation of the weight-updates according to the behaviour of the errorfunction. In substantial difference to other adaptive techniques, the effect of the RPROP adaptation process is not blurred by the unforseeable influence of the size of the derivative but only dependent on the temporal behaviour of its sign. This leads to an efficient and transparent adaptation process. The promising capabilities of RPROP are shown in comparison to other wellknown adaptive techniques.", "title": "" } ]
[ { "docid": "469a764d3c5a7e3048229c6f1ce41bfd", "text": "A central issue for researchers of human spatial knowledge, whether focused on perceptually guided action or cognitive-map acquisition, is knowledge of egocentric directions, directions from the body to objects and places. Several methods exist for measuring this knowledge. We compared two particularly important methods, manual pointing with a dial and whole-body rotation (body heading), under various conditions of sensory or memory access to targets. In two experiments, blindfolded body rotation resulted in the greatest variability of performance (variable error), while the manual dial resulted in greater consistent bias (constant error). The variability of performance with body rotation was no greater than that of the dial when subjects' memory loads for directions to targets was reduced by allowing them to peek at targets in between trials, point to concurrent auditory targets, or point with their eyes open. In both experiments, errors with the manual dial were greater for directions to targets that were further from the closest orthogonal axis (ahead, behind, right, left), while errors with body rotation with restricted perceptual access were greater for directions to targets that were further from an axis straight ahead of subjects. This suggests that the two methods will produce evidence of different organizational frameworks for egocentric spatial knowledge. Implications for the structures and processes that underlie egocentric spatial knowledge, and are involved in estimating directions, are discussed, as is the value of decomposing absolute errors into variable and constant errors.", "title": "" }, { "docid": "d2c8328984a05e56e449d6558b1e73fb", "text": "MOTIVATION\nThe development of chemoinformatics has been hampered by the lack of large, publicly available, comprehensive repositories of molecules, in particular of small molecules. Small molecules play a fundamental role in organic chemistry and biology. They can be used as combinatorial building blocks for chemical synthesis, as molecular probes in chemical genomics and systems biology, and for the screening and discovery of new drugs and other useful compounds.\n\n\nRESULTS\nWe describe ChemDB, a public database of small molecules available on the Web. ChemDB is built using the digital catalogs of over a hundred vendors and other public sources and is annotated with information derived from these sources as well as from computational methods, such as predicted solubility and three-dimensional structure. It supports multiple molecular formats and is periodically updated, automatically whenever possible. The current version of the database contains approximately 4.1 million commercially available compounds and 8.2 million counting isomers. The database includes a user-friendly graphical interface, chemical reactions capabilities, as well as unique search capabilities.\n\n\nAVAILABILITY\nDatabase and datasets are available on http://cdb.ics.uci.edu.", "title": "" }, { "docid": "1a69dddb0b690512d29c7f26d64f4a95", "text": "In the simultaneous message model, two parties holding <i>n</i>-bit integers <i>x,y</i> send messages to a third party, the <i>referee</i>, enabling him to compute a boolean function <i>f(x,y)</i>. Buhrman et al [3] proved the remarkable result that, when <i>f</i> is the equality function, the referee can solve this problem by comparing short \"quantum fingerprints\" sent by the two parties, i.e., there exists a quantum protocol using only <i>O</i>(log <i>n</i>) bits. This is in contrast to the well-known classical case for which Ω(<i>n</i><sup>1/2</sup>) bits are provably necessary for the same problem even with randomization. In this paper we show that short quantum fingerprints can be used to solve the problem for a much larger class of functions. Let <i>R</i><sup><??par line>,<i>pub</i></sup>(<i>f</i>) denote the number of bits needed in the classical case, assuming in addition a common sequence of random bits is known to all parties (the <i>public coin</i> model). We prove that, if <i>R</i><sup><??par line>,<i>pub</i></sup>(<i>f</i>)=<i>O</i>(1), then there exists a quantum protocol for <i>f</i> using only <i>O</i>(log <i>n</i>) bits. As an application we show that <i>O</i>(log <i>n</i>) quantum bits suffice for the bounded Hamming distance function, defined by <i>f(x,y)</i>=1 if and only if <i>x</i> and <i>y</i> have a constant Hamming distance <i>d</i> or less.", "title": "" }, { "docid": "1c075aac5462cf6c6251d6c9c1a679c0", "text": "Why You Can’t Find a Taxi in the Rain and Other Labor Supply Lessons from Cab Drivers In a seminal paper, Camerer, Babcock, Loewenstein, and Thaler (1997) find that the wage elasticity of daily hours of work New York City (NYC) taxi drivers is negative and conclude that their labor supply behavior is consistent with target earning (having reference dependent preferences). I replicate and extend the CBLT analysis using data from all trips taken in all taxi cabs in NYC for the five years from 2009-2013. Using the model of expectations-based reference points of Koszegi and Rabin (2006), I distinguish between anticipated and unanticipated daily wage variation and present evidence that only a small fraction of wage variation (about 1/8) is unanticipated so that reference dependence (which is relevant only in response to unanticipated variation) can, at best, play a limited role in determining labor supply. The overall pattern in my data is clear: drivers tend to respond positively to unanticipated as well as anticipated increases in earnings opportunities. This is consistent with the neoclassical optimizing model of labor supply and does not support the reference dependent preferences model. I explore heterogeneity across drivers in their labor supply elasticities and consider whether new drivers differ from more experienced drivers in their behavior. I find substantial heterogeneity across drivers in their elasticities, but the estimated elasticities are generally positive and only rarely substantially negative. I also find that new drivers with smaller elasticities are more likely to exit the industry while drivers who remain learn quickly to be better optimizers (have positive labor supply elasticities that grow with experience). JEL Classification: J22, D01, D03", "title": "" }, { "docid": "fe955c558353d973b5380acdfb1e4d4d", "text": "Device scaling with manufacturing methods that overcome the inherent limits of optical lithography is a constant focus of the microelectronics industry. The authors of this tutorial article review the state-of-the-art and major challenges of subresolution lithography, and discuss modern double-patterning lithography solutions and supporting EDA tools to surpass them.", "title": "" }, { "docid": "8fb7249b1caefa84ffa13eff7e026e8e", "text": "Investigators across many disciplines and organizations must sift through large collections of text documents to understand and piece together information. Whether they are fighting crime, curing diseases, deciding what car to buy, or researching a new field, inevitably investigators will encounter text documents. Taking a visual analytics approach, we integrate multiple text analysis algorithms with a suite of interactive visualizations to provide a flexible and powerful environment that allows analysts to explore collections of documents while sensemaking. Our particular focus is on the process of integrating automated analyses with interactive visualizations in a smooth and fluid manner. We illustrate this integration through two example scenarios: An academic researcher examining InfoVis and VAST conference papers and a consumer exploring car reviews while pondering a purchase decision. Finally, we provide lessons learned toward the design and implementation of visual analytics systems for document exploration and understanding.", "title": "" }, { "docid": "7d2c39d173744a78e2415e68f075b474", "text": "We address the problem of designing artificial agents capable of reproducing human behavior in a competitive game involving dynamic control. Given data consisting of multiple realizations of inputs generated by pairs of interacting players, we model each agent’s actions as governed by a time-varying latent goal state coupled to a control model. These goals, in turn, are described as stochastic processes evolving according to player-specific value functions depending on the current state of the game. We model these value functions using generative adversarial networks (GANs) and show that our GAN-based approach succeeds in producing sample gameplay that captures the rich dynamics of human agents. The latent goal dynamics inferred and generated by our model has applications to fields like neuroscience and animal behavior, where the underlying value functions themselves are of theoretical interest.", "title": "" }, { "docid": "63e4183beadb30244730de8ac86b20ee", "text": "Softwares use cryptographic algorithms to secure their communications and to protect their internal data. However the algorithm choice, its implementation design and the generation methods of its input parameters may have dramatic consequences on the security of the data it was initially supposed to protect. Therefore to assess the security of a binary program involving cryptography, analysts need to check that none of these points will cause a system vulnerability. It implies, as a first step, to precisely identify and locate the cryptographic code in the binary program. Since binary analysis is a difficult and cumbersome task, it is interesting to devise a method to automatically retrieve cryptographic primitives and their parameters.\n In this paper, we present a novel approach to automatically identify symmetric cryptographic algorithms and their parameters inside binary code. Our approach is static and based on DFG isomorphism. To cope with binary codes produced from different source codes and by different compilers and options, the DFG is normalized using code rewrite mechanisms. Our approach differs from previous works, that either use statistical criteria leading to imprecise results, or rely on heavy dynamic instrumentation. To validate our approach, we present experimental results on a set of synthetic samples including several cryptographic algorithms, binary code of well-known cryptographic libraries and reference source implementation compiled using different compilers and options.", "title": "" }, { "docid": "8de48509fcd087f088b4203b306937b7", "text": "Grid computing proposes a dynamic and earthly distributed organization of resources that harvest ideal CPU cycle to drift advance computing demands and accommodate user's prerequisites. Heterogeneous gridsdemand efficient allocation and scheduling strategies to cope up with the expanding grid automations. In order to obtain optimal scheduling solutions, primary focus of research has shifted towards metaheuristic techniques. The paper uses different parameters to provide analytical study of variants of Ant Colony Optimization for scheduling sequential jobs in grid systems. Based on the literature analysis, one can summarize that ACO is the most convincing technique for schedulingproblems. However, incapacitation of ACO to fix up a systematized startup and poor scattering capability cast down its efficiency. To overpower these constraints researchers have proposed different hybridizations of ACO that manages to sustain more effective results than standalone ACO.", "title": "" }, { "docid": "4b5b8683a2b14e1658cc28e62a5a9379", "text": "Recent research has Indicated (hat (he permanent magnet motor drives, which include the permanent magnet synchronous motor (PMSM) and the brushless dc motor (BDCM) could become serious competitors to the induction motor for servo applications. The PMSM has a sinusoidal back emf and requires sinusoidal stator currents to produce constant torque while the BDCM has a trapezoidal back emf and requires rectangular stator currents to produce constant torque. The PMSM is very similar to the wound rotor synchronous machine except that the PMSM that is used for servo applications tends not to have any damper windings and excitation is provided by a permanent magnet instead of a fi~ld winding. Hence the d, q model of the PMSM can be derived from the well-known model of the synchronous machine with the equations of the damper windings and field current dynamics removed. Because of tbe nonsinusoidal variation of the mutual inductances between the stator and rotor in the BDCM, it is also shown In this paper that no particular advantage exists in transforming the abc equations of the BCDM to the d, q frame. Hence the solution of the original abc equations is proposed for the BDCM.", "title": "" }, { "docid": "97382e18c9ca7c42d8b6c908cde761f2", "text": "In recent years, heatmap regression based models have shown their effectiveness in face alignment and pose estimation. However, Conventional Heatmap Regression (CHR) is not accurate nor stable when dealing with high-resolution facial videos, since it finds the maximum activated location in heatmaps which are generated from rounding coordinates, and thus leads to quantization errors when scaling back to the original high-resolution space. In this paper, we propose a Fractional Heatmap Regression (FHR) for high-resolution video-based face alignment. The proposed FHR can accurately estimate the fractional part according to the 2D Gaussian function by sampling three points in heatmaps. To further stabilize the landmarks among continuous video frames while maintaining the precise at the same time, we propose a novel stabilization loss that contains two terms to address time delay and non-smooth issues, respectively. Experiments on 300W, 300VW and Talking Face datasets clearly demonstrate that the proposed method is more accurate and stable than the state-ofthe-art models. Introduction Face alignment aims to estimate a set of facial landmarks given a face image or video sequence. It is a classic computer vision problem that has attributed to many advanced machine learning algorithms Fan et al. (2018); Bulat and Tzimiropoulos (2017); Trigeorgis et al. (2016); Peng et al. (2015, 2016); Kowalski, Naruniec, and Trzcinski (2017); Chen et al. (2017); Liu et al. (2017); Hu et al. (2018). Nowadays, with the rapid development of consumer hardwares (e.g., mobile phones, digital cameras), High-Resolution (HR) video sequences can be easily collected. Estimating facial landmarks on such highresolution facial data has tremendous applications, e.g., face makeup Chen, Shen, and Jia (2017), editing with special effects Korshunova et al. (2017) in live broadcast videos. However, most existing face alinement methods work on faces with medium image resolutions Chen et al. (2017); Bulat and Tzimiropoulos (2017); Peng et al. (2016); Liu et al. (2017). Therefore, developing face alignment algorithms for high-resolution videos is at the core of this paper. To this end, we propose an accurate and stable algorithm for high-resolution video-based face alignment, named Fractional Heatmap Regression (FHR). It is well known that ∗ indicates equal contributions. Conventional Heatmap Regression (CHR) Loss Fractional Heatmap Regression (FHR) Loss 930 744 411", "title": "" }, { "docid": "88e97dc5105ef142d422bec88e897ddd", "text": "This paper reports on an experiment realized on the IBM 5Q chip which demonstrates strong evidence for the advantage of using error detection and fault-tolerant design of quantum circuits. By showing that fault-tolerant quantum computation is already within our reach, the author hopes to encourage this approach.", "title": "" }, { "docid": "2802c89f5b943ea0bee357b36d072ada", "text": "Motivation: Alzheimer’s disease (AD) is an incurable neurological condition which causes progressive mental deterioration, especially in the elderly. The focus of our work is to improve our understanding about the progression of AD. By finding brain regions which degenerate together in AD we can understand how the disease progresses during the lifespan of an Alzheimer’s patient. Our aim is to work towards not only achieving diagnostic performance but also generate useful clinical information. Objective: The main objective of this study is to find important sub regions of the brain which undergo neuronal degeneration together during AD using deep learning algorithms and other machine learning techniques. Methodology: We extract 3D brain region patches from 100 subject MRI images using a predefined anatomical atlas. We have devised an ensemble of pair predictors which use 3D convolutional neural networks to extract salient features for AD from a pair of regions in the brain. We then train them in a supervised manner and use a boosting algorithm to find the weightage of each pair predictor towards the final classification. We use this weightage as the strength of correlation and saliency between the two input sub regions of the pair predictor. Result: We were able to retrieve sub regional association measures for 100 sub region pairs using the proposed method. Our approach was able to automatically learn sub regional association structure in AD directly from images. Our approach also provides an insight into computational methods for demarcating effects of AD from effects of ageing (and other neurological diseases) on our neuroanatomy. Our meta classifier gave a final accuracy of 81.79% for AD classification relative to healthy subjects using a single imaging modality dataset.", "title": "" }, { "docid": "c17e6363762e0e9683b51c0704d43fa7", "text": "Your use of the JSTOR archive indicates your acceptance of JSTOR's Terms and Conditions of Use, available at http://www.jstor.org/about/terms.html. JSTOR's Terms and Conditions of Use provides, in part, that unless you have obtained prior permission, you may not download an entire issue of a journal or multiple copies of articles, and you may use content in the JSTOR archive only for your personal, non-commercial use.", "title": "" }, { "docid": "08df1d2819d021711ebfc60589d27e90", "text": "Polyp has long been considered as one of the major etiologies to colorectal cancer which is a fatal disease around the world, thus early detection and recognition of polyps plays an crucial role in clinical routines. Accurate diagnoses of polyps through endoscopes operated by physicians becomes a chanllenging task not only due to the varying expertise of physicians, but also the inherent nature of endoscopic inspections. To facilitate this process, computer-aid techniques that emphasize on fully-conventional image processing and novel machine learning enhanced approaches have been dedicatedly designed for polyp detection in endoscopic videos or images. Among all proposed algorithms, deep learning based methods take the lead in terms of multiple metrics in evolutions for algorithmic performance. In this work, a highly effective model, namely the faster region-based convolutional neural network (Faster R-CNN) is implemented for polyp detection. In comparison with the reported results of the state-of-the-art approaches on polyps detection, extensive experiments demonstrate that the Faster R-CNN achieves very competing results, and it is an efficient approach for clinical practice.", "title": "" }, { "docid": "9bb86141611c54978033e2ea40f05b15", "text": "In this work we investigate the problem of road scene semanti c segmentation using Deconvolutional Networks (DNs). Several c onstraints limit the practical performance of DNs in this context: firstly, the pa ucity of existing pixelwise labelled training data, and secondly, the memory const rai ts of embedded hardware, which rule out the practical use of state-of-theart DN architectures such as fully convolutional networks (FCN). To address the fi rst constraint, we introduce a Multi-Domain Road Scene Semantic Segmentation (M DRS3) dataset, aggregating data from six existing densely and sparsely lab elled datasets for training our models, and two existing, separate datasets for test ing their generalisation performance. We show that, while MDRS3 offers a greater volu me and variety of data, end-to-end training of a memory efficient DN does not yield satisfactory performance. We propose a new training strategy to over c me this, based on (i) the creation of a best-possible source network (S-Net ) from the aggregated data, ignoring time and memory constraints; and (ii) the tra nsfer of knowledge from S-Net to the memory-efficient target network (T-Net). W e evaluate different techniques for S-Net creation and T-Net transferral, and de monstrate that training a constrained deconvolutional network in this manner can un lock better performance than existing training approaches. Specifically, we s how that a target network can be trained to achieve improved accuracy versus an FC N despite using less than 1% of the memory. We believe that our approach can be useful beyond automotive scenarios where labelled data is similarly scar ce o fragmented and where practical constraints exist on the desired model size . We make available our network models and aggregated multi-domain dataset for reproducibility.", "title": "" }, { "docid": "f5519eff0c13e0ee42245fdf2627b8ae", "text": "An efficient vehicle tracking system is designed and implemented for tracking the movement of any equipped vehicle from any location at any time. The proposed system made good use of a popular technology that combines a Smartphone application with a microcontroller. This will be easy to make and inexpensive compared to others. The designed in-vehicle device works using Global Positioning System (GPS) and Global system for mobile communication / General Packet Radio Service (GSM/GPRS) technology that is one of the most common ways for vehicle tracking. The device is embedded inside a vehicle whose position is to be determined and tracked in real-time. A microcontroller is used to control the GPS and GSM/GPRS modules. The vehicle tracking system uses the GPS module to get geographic coordinates at regular time intervals. The GSM/GPRS module is used to transmit and update the vehicle location to a database. A Smartphone application is also developed for continuously monitoring the vehicle location. The Google Maps API is used to display the vehicle on the map in the Smartphone application. Thus, users will be able to continuously monitor a moving vehicle on demand using the Smartphone application and determine the estimated distance and time for the vehicle to arrive at a given destination. In order to show the feasibility and effectiveness of the system, this paper presents experimental results of the vehicle tracking system and some experiences on practical implementations.", "title": "" }, { "docid": "eff8079294d89665bbd8835902c4caa3", "text": "Due to the growing developments in advanced metering and digital technologies, smart cities have been equipped with different electronic devices on the basis of Internet of Things (IoT), therefore becoming smarter than before. The aim of this article is that of providing a comprehensive review on the concepts of smart cities and on their motivations and applications. Moreover, this survey describes the IoT technologies for smart cities and the main components and features of a smart city. Furthermore, practical experiences over the world and the main challenges are explained.", "title": "" } ]
scidocsrr
4076916a92949d38f50ddaa1cf48356c
Experiments with Convolutional Neural Network Models for Answer Selection
[ { "docid": "87f0a390580c452d77fcfc7040352832", "text": "• J. Wieting, M. Bansal, K. Gimpel, K. Livescu, and D. Roth. 2015. From paraphrase database to compositional paraphrase model and back. TACL. • K. S. Tai, R. Socher, and C. D. Manning. 2015. Improved semantic representations from treestructured long short-term memory networks. ACL. • W. Yin and H. Schutze. 2015. Convolutional neural network for paraphrase identification. NAACL. The product also streams internet radio and comes with a 30-day free trial for realnetworks' rhapsody music subscription. The device plays internet radio streams and comes with a 30-day trial of realnetworks rhapsody music service. Given two sentences, measure their similarity:", "title": "" }, { "docid": "87e315548e67f8de46ad0cb3db8b7aaa", "text": "We study answer selection for question answering, in which given a question and a set of candidate answer sentences, the goal is to identify the subset that contains the answer. Unlike previous work which treats this task as a straightforward pointwise classification problem, we model this problem as a ranking task and propose a pairwise ranking approach that can directly exploit existing pointwise neural network models as base components. We extend the Noise-Contrastive Estimation approach with a triplet ranking loss function to exploit interactions in triplet inputs over the question paired with positive and negative examples. Experiments on TrecQA and WikiQA datasets show that our approach achieves state-of-the-art effectiveness without the need for external knowledge sources or feature engineering.", "title": "" } ]
[ { "docid": "a8d4d352a8958628ee98ccf950e2ef2d", "text": "This study presents a methodology that will produce a viable fault surrogate. The focus of the effort is on the precise measurement of software development process and product outcomes. Tools and processes for the static measurement of the source code have been installed and made operational in a large embedded software system. Source code measurements have been gathered unobtrusively for each build in the software evolution process. The measurements are synthesized to obtain the fault surrogate. The complexity of sequential builds is compared and a new measure, code churn, is calculated. This paper will demonstrate the effectiveness of code complexity churn by validating it against the testing problem reports.", "title": "" }, { "docid": "9d296a940714bda3ec2731438496f150", "text": "A common approach in positive-unlabeled learning is to train a classification model between labeled and unlabeled data. This strategy is in fact known to give an optimal classifier under mild conditions; however, it results in biased empirical estimates of the classifier performance. In this work, we show that the typically used performance measures such as the receiver operating characteristic curve, or the precisionrecall curve obtained on such data can be corrected with the knowledge of class priors; i.e., the proportions of the positive and negative examples in the unlabeled data. We extend the results to a noisy setting where some of the examples labeled positive are in fact negative and show that the correction also requires the knowledge of the proportion of noisy examples in the labeled positives. Using state-of-the-art algorithms to estimate the positive class prior and the proportion of noise, we experimentally evaluate two correction approaches and demonstrate their efficacy on real-life data. Introduction Performance estimation in binary classification is tightly related to the nature of the classification task. As a result, different performance measures may be directly optimized during training. When (mis)classification costs are available, the classifier is ideally trained and evaluated in a costsensitive mode to minimize the expected cost (Whalen 1971; Elkan 2001). More often, however, classification costs are unknown and the overall performance is assessed by averaging the performance over a range of classification modes. The most extensively studied and widely used performance evaluation in binary classification involves estimating the Receiver Operating Characteristic (ROC) curve that plots the true positive rate of a classifier as a function of its false positive rate (Fawcett 2006). The ROC curve provides insight into trade-offs between the classifier’s accuracies on positive versus negative examples over a range of decision thresholds. Furthermore, the area under the ROC curve (AUC) has a meaningful probabilistic interpretation that correlates with the ability of the classifier to separate classes and is often used to rank classifiers (Hanley and McNeil 1982). Another important performance criterion generally used in information retrieval relies on the precision-recall Copyright c © 2017, Association for the Advancement of Artificial Intelligence (www.aaai.org). All rights reserved. (pr-rc) curve, a plot of precision as a function of recall. The precision-recall evaluation, including summary statistics derived from the pr-rc curve, may be preferred to ROC curves when classes are heavily skewed (Davis and Goadrich 2006). Although model learning and performance evaluation in a supervised setting are well understood (Hastie et al. 2001), the availability of unlabeled data gives additional options and also presents new challenges. A typical semi-supervised scenario involves the availability of positive, negative and (large quantities of) unlabeled data. Here, the unlabeled data can be used to improve training (Blum and Mitchell 1998) or unbias the labeled data (Cortes et al. 2008); e.g., to estimate class proportions that are necessary to calibrate the model and accurately estimate precision when class balances (but not class-conditional distributions) in labeled data are not representative (Saerens et al. 2002). This is often the case when it is more expensive or difficult to label examples of one class than the examples of the other. A special case of the semi-supervised setting arises when the examples of only one class are labeled. It includes open-world domains such as molecular biology where, for example, wet lab experiments determining a protein’s activity are generally conclusive; however, the absence of evidence about a protein’s function cannot be interpreted as the evidence of absence. This is because, even when the labeling is attempted, a functional assay may not lead to the desired activity for a number of experimental reasons. In other domains, such as social networks, only positive examples can be collected (such as ‘liking’ a particular product) because, by design, the negative labeling is not allowed. The development of classification models in this setting is often referred to as positiveunlabeled learning (Denis et al. 2005). State-of-the-art techniques in positive-unlabeled learning tackle this problem by treating the unlabeled sample as negatives and training a classifier to distinguish between labeled (positive) and unlabeled examples. Following Elkan and Noto (2008), we refer to the classifiers trained on a labeled sample from the true distribution of inputs, containing both positive and negative examples, as traditional classifiers. Similarly, we refer to the classifiers trained on the labeled versus unlabeled data as non-traditional classifiers. In theory, the true performance of both traditional and non-traditional classifiers can be evaluated on a labeled sample from the true distribution (traditional evaluation). However, this is infeasible for non-traditional learners because such a sample is not available in positive-unlabeled learning. As a result, the non-traditional classifiers are evaluated by using the unlabeled sample as substitute for labeled negatives (non-traditional evaluation). Surprisingly, for a variety of performance criteria, non-traditional classifiers achieve similar performance under traditional evaluation as optimal traditional classifiers (Blanchard et al. 2010; Menon et al. 2015). The intuition for these results comes from the fact that in many practical situations, the posterior distributions in traditional and non-traditional setting provide the same optimal ranking of data points on a given test sample (Jain et al. 2016; Jain, White, and Radivojac 2016). Furthermore, the widely-accepted evaluation approaches using ROC or pr-rc curves are insensitive to the variation of raw prediction scores unless they affect the ranking. Though the efficacy of non-traditional classifiers has been thoroughly studied (Peng et al. 2003; Elkan and Noto 2008; Ward et al. 2009; Menon et al. 2015), estimating their true performance has been much less explored. Such performance estimation often involves computing the fraction(s) of correctly and incorrectly classified examples from both classes; however, in absence of labeled negatives, the fractions computed under the non-traditional evaluation are incorrect, resulting in biased estimates. Figure 1 illustrates the effect of this bias by showing the traditional and nontraditional ROC curves on a handmade data set. Because some of the unlabeled examples in the training set are in fact positive, the area under the ROC curve estimated when the unlabeled examples were considered negative (nontraditional setting) underestimates the true performance for positive versus negative classification (traditional setting). This paper formalizes and evaluates performance estimation of a non-traditional classifier in the traditional setting when the only available training data are (possibly noisy) positive examples and unlabeled data. We show that the true (traditional) performance of such a classifier can be recovered with the knowledge of class priors and the fraction of mislabeled examples in the positive set. We derive formulas for converting the ROC and pr-rc curves from the nontraditional to the traditional setting. Using these recovery formulas, we present methods to estimate true classification performance. Our experiments provide evidence that the methods for the recovery of a classifier’s performance are sound and effective. Problem formulation Consider a binary classification problem from input x ∈ X to output y ∈ Y = {0, 1} in a positive-unlabeled setting. Let f be the true distribution over the input space X from which the unlabeled sample is drawn and let f1 and f0 be the distributions of the positive and negative examples, respectively. It follows that f can be expressed as a two-component mixture containing f1 and f0 as f(x) = αf1(x) + (1− α)f0(x), for all x ∈ X where α ∈ [0, 1) is the mixing proportion (positive class prior) giving the proportion of positives in f . ́ ́ ° ° AUC = 0.8000 AUC = 0.9375 B. Positive vs. unlabeled A. Data set: prediction scores and class labels C. Positive vs. negative 0.986 yes, as 1 0.943 no 0.863 yes, as 1 0.789 no 0.009 no 0.699 yes, as 1 0.473 no 0.211 no 1 1 1 0 1 0 0 0 Prediction Labeled True class label", "title": "" }, { "docid": "00b2befc6cfa60d0d7799673de232461", "text": "During the last decade, various machine learning and data mining techniques have been applied to Intrusion Detection Systems (IDSs) which have played an important role in defending critical computer systems and networks from cyber attacks. Unsupervised anomaly detection techniques have received a particularly great amount of attention because they enable construction of intrusion detection models without using labeled training data (i.e., with instances preclassified as being or not being an attack) in an automated manner and offer intrinsic ability to detect unknown attacks; i.e., 0-day attacks. Despite the advantages, it is still not easy to deploy them into a real network environment because they require several parameters during their building process, and thus IDS operators and managers suffer from tuning and optimizing the required parameters based on changes of their network characteristics. In this paper, we propose a new anomaly detection method by which we can automatically tune and optimize the values of parameters without predefining them. We evaluated the proposed method over real traffic data obtained from Kyoto University honeypots. The experimental results show that the performance of the proposed method is superior to that of the previous one. 2011 Elsevier Inc. All rights reserved.", "title": "" }, { "docid": "59181c685b748c0c54bb0e255b197a1f", "text": "While social media has become an empowering agent to individual voices and freedom of expression, it also facilitates anti-social behaviors including online harassment, cyberbullying, and hate speech. In this paper, we present the first comparative study of hate speech instigators and target users on Twitter. Through a multi-step classification process, we curate a comprehensive hate speech dataset capturing various types of hate. We study the distinctive characteristics of hate instigators and targets in terms of their profile selfpresentation, activities, and online visibility. We find that hate instigators target more popular and high profile Twitter users, and that participating in hate speech can result in greater online visibility. We conduct a personality analysis of hate instigators and targets and show that both groups have eccentric personality facets that differ from the general Twitter population. Our results advance the state of the art of understanding online hate speech engagement.", "title": "" }, { "docid": "06121230af4767f5bd8baf5fa21e3df4", "text": "A novel triband square-slot antenna with symmetrical L-strips is presented for WLAN and WiMAX applications. The proposed antenna is composed of a square slot, a pair of L-strips, and a monopole radiator. By employing these structures, the antenna can yield three different resonances to cover the desired bands while maintaining small size and simple structure. Based on this concept, a prototype of a triband antenna is designed, fabricated, and tested. The experimental results show the antenna has the impedance bandwidths of 480 MHz (2.34-2.82 GHz), 900 MHz (3.16-4.06 GHz), and 680 MHz (4.69-5.37 GHz), which can cover both WLAN in the 2.4/5.2-GHz bands and WiMAX in the 2.5/3.5-GHz bands.", "title": "" }, { "docid": "31e6da3635ec5f538f15a7b3e2d95e5b", "text": "Smart electricity meters are currently deployed in millions of households to collect detailed individual electricity consumption data. Compared with traditional electricity data based on aggregated consumption, smart meter data are much more volatile and less predictable. There is a need within the energy industry for probabilistic forecasts of household electricity consumption to quantify the uncertainty of future electricity demand in order to undertake appropriate planning of generation and distribution. We propose to estimate an additive quantile regression model for a set of quantiles of the future distribution using a boosting procedure. By doing so, we can benefit from flexible and interpretable models, which include an automatic variable selection. We compare our approach with three benchmark methods on both aggregated and disaggregated scales using a smart meter data set collected from 3639 households in Ireland at 30-min intervals over a period of 1.5 years. The empirical results demonstrate that our approach based on quantile regression provides better forecast accuracy for disaggregated demand, while the traditional approach based on a normality assumption (possibly after an appropriate Box-Cox transformation) is a better approximation for aggregated demand. These results are particularly useful since more energy data will become available at the disaggregated level in the future.", "title": "" }, { "docid": "401cb3ebbc226ae117303f6a6bb6714c", "text": "Brain-related disorders such as epilepsy can be diagnosed by analyzing electroencephalograms (EEG). However, manual analysis of EEG data requires highly trained clinicians, and is a procedure that is known to have relatively low inter-rater agreement (IRA). Moreover, the volume of the data and the rate at which new data becomes available make manual interpretation a time-consuming, resource-hungry, and expensive process. In contrast, automated analysis of EEG data offers the potential to improve the quality of patient care by shortening the time to diagnosis and reducing manual error. In this paper, we focus on one of the first steps in interpreting an EEG session identifying whether the brain activity is abnormal or normal. To address this specific task, we propose a novel recurrent neural network (RNN) architecture termed ChronoNet which is inspired by recent developments from the field of image classification and designed to work efficiently with EEG data. ChronoNet is formed by stacking multiple 1D convolution layers followed by deep gated recurrent unit (GRU) layers where each 1D convolution layer uses multiple filters of exponentially varying lengths and the stacked GRU layers are densely connected in a feed-forward manner. We used the recently released TUH Abnormal EEG Corpus dataset for evaluating the performance of ChronoNet. Unlike previous studies using this dataset, ChronoNet directly takes time-series EEG as input and learns meaningful representations of brain activity patterns. ChronoNet outperforms previously reported results on this dataset thereby setting a new benchmark. Furthermore, we demonstrate the domain-independent nature of ChronoNet by successfully applying it to classify speech commands.", "title": "" }, { "docid": "05a17ff756b7c376a97cd22795e23187", "text": "Detection of brain tumors from MRI is a time consuming and error-prone task. This is due to the diversity in shape, size and appearance of the tumors. In this paper, we propose a clustering algorithm based on Particle Swarm Optimization (PSO). The algorithm finds the centroids of number of clusters, where each cluster groups together brain tumor patterns, obtained from MR Images. The results obtained for three performance measures are compared with those obtained from Support Vector Machine (SVM) and Ada Boost. The performance analysis shows that qualitative results obtained from the proposed model are comparable with those obtained by SVM. However, to obtain better results from the proposed algorithm we need to carefully select the different values of PSO control parameters.", "title": "" }, { "docid": "9e4adad2e248895d80f28cf6134f68c1", "text": "Maltodextrin (MX) is an ingredient in high demand in the food industry, mainly for its useful physical properties which depend on the dextrose equivalent (DE). The DE has however been shown to be an inaccurate parameter for predicting the performance of the MXs in technological applications, hence commercial MXs were characterized by mass spectrometry (MS) to determine their molecular weight distribution (MWD) and degree of polymerization (DP). Samples were subjected to different water activities (aw). Water adsorption was similar at low aw, but radically increased with the DP at higher aw. The decomposition temperature (Td) showed some variations attributed to the thermal hydrolysis induced by the large amount of adsorbed water and the supplied heat. The glass transition temperature (Tg) linearly decreased with both, aw and DP. The microstructural analysis by X-ray diffraction showed that MXs did not crystallize with the adsorption of water, preserving their amorphous structure. The optical micrographs showed radical changes in the overall appearance of the MXs, indicating a transition from a glassy to a rubbery state. Based on these characterizations, different technological applications for the MXs were suggested.", "title": "" }, { "docid": "cbbe1d60d580dccba44c13a7b88630e0", "text": "OF THE DISSERTATION Sampling Algorithms to Handle Nuisances in Large-Scale Recognition", "title": "" }, { "docid": "f568c4987b4c318567aa6b6a757d9510", "text": "Privacy preserving mining of distributed data has numerous applications. Each application poses different constraints: What is meant by privacy, what are the desired results, how is the data distributed, what are the constraints on collaboration and cooperative computing, etc. We suggest that the solution to this is a toolkit of components that can be combined for specific privacy-preserving data mining applications. This paper presents some components of such a toolkit, and shows how they can be used to solve several privacy-preserving data mining problems.", "title": "" }, { "docid": "721093cf84accd3035e23815656b5187", "text": "Twitter popularity has increasingly grown in the last few years making influence on the social, political and business aspects of life. Therefore, sentiment analysis research has put special focus on Twitter. Tweet data have many peculiarities relevant to the use of informal language, slogans, and special characters. Furthermore, training machine learning classifiers from tweets data often faces the data sparsity problem primarily due to the large variety of Tweets expressed in only 140-character. In this work, we evaluate the performance of various classifiers commonly used in sentiment analysis to show their effectiveness in sentiment mining of Twitter data under different experimental setups. For the purpose of the study the Stanford Testing Sentiment dataset STS is used. Results of our analysis show that multinomial Naïve Bayes outperforms other classifiers in Twitter sentiment analysis and is less affected by data sparsity.", "title": "" }, { "docid": "2729af242339c8cbc51f49047ed9d049", "text": "We address the problem of interactive facial feature localization from a single image. Our goal is to obtain an accurate segmentation of facial features on high-resolution images under a variety of pose, expression, and lighting conditions. Although there has been significant work in facial feature localization, we are addressing a new application area, namely to facilitate intelligent high-quality editing of portraits, that brings requirements not met by existing methods. We propose an improvement to the Active Shape Model that allows for greater independence among the facial components and improves on the appearance fitting step by introducing a Viterbi optimization process that operates along the facial contours. Despite the improvements, we do not expect perfect results in all cases. We therefore introduce an interaction model whereby a user can efficiently guide the algorithm towards a precise solution. We introduce the Helen Facial Feature Dataset consisting of annotated portrait images gathered from Flickr that are more diverse and challenging than currently existing datasets. We present experiments that compare our automatic method to published results, and also a quantitative evaluation of the effectiveness of our interactive method.", "title": "" }, { "docid": "55ac688824e9c50f86236a99004ac35a", "text": "This paper examines aspects of design technology required to explore advanced logic-circuit design using carbon nanotube field-effect transistor (CNTFET) devices. An overview of current types of CNTFETs is given and highlights the salient characteristics of each. Compact modeling issues are addressed and new models are proposed implementing: 1) a physics-based calculation of energy conduction sub-band minima to allow a realistic analysis of the impact of CNT helicity and radius on the dc characteristics; 2) descriptions of ambipolar behavior in Schottky-barrier CNTFETs and ambivalence in double-gate CNTFETs (DG-CNTFETs). Using the available models, the influence of the parameters on the device characteristics were simulated and analyzed. The exploitation of properties specific to CNTFETs to build functions inaccessible to MOSFETs is also described, particularly with respect to the use of DG-CNTFETs in fine-grain reconfigurable logic.", "title": "" }, { "docid": "8b5ea4603ac53a837c3e81dfe953a706", "text": "Many teaching practices implicitly assume that conceptual knowledge can be abstracted from the situations in which it is learned and used. This article argues that this assumption inevitably limits the effectiveness of such practices. Drawing on recent research into cognition as it is manifest in everyday activity, the authors argue that knowledge is situated, being in part a product of the activity, context, and culture in which it is developed and used. They discuss how this view of knowledge affects our understanding of learning, and they note that conventional schooling too often ignores the influence of school culture on what is learned in school. As an alternative to conventional practices, they propose cognitive apprenticeship (Collins, Brown, Newman, in press), which honors the situated nature of knowledge. They examine two examples of mathematics instruction that exhibit certain key features of this approach to teaching. The breach between learning and use, which is captured by the folk categories \"know what\" and \"know how,\" may well be a product of the structure and practices of our education system. Many methods of didactic education assume a separation between knowing and doing, treating knowledge as an integral, self-sufficient substance, theoretically independent of the situations in which it is learned and used. The primary concern of schools often seems to be the transfer of this substance, which comprises abstract, decontextualized formal concepts. The activity and context in which learning takes place are thus regarded as merely ancillary to learning---pedagogically useful, of course, but fundamentally distinct and even neutral with respect to what is learned. Recent investigations of learning, however, challenge this separating of what is learned from how it is learned and used. The activity in which knowledge is developed and deployed, it is now argued, is not separable from or ancillary to learning and cognition. Nor is it neutral. Rather, it is an integral part of what is learned. Situations might be said to co-produce knowledge through activity. Learning and cognition, it is now possible to argue, are fundamentally situated. In this paper, we try to explain in a deliberately speculative way, why activity and situations are integral to cognition and learning, and how different ideas of what is appropriate learning activity produce very different results. We suggest that, by ignoring the situated nature of cognition, education defeats its own goal of providing useable, robust knowledge. And conversely, we argue that approaches such as cognitive apprenticeship (Collins, Brown, & Newman, in press) that embed learning in activity and make deliberate use of the social and physical context are more in line with the understanding of learning and cognition that is emerging from research. Situated Knowledge and Learning Miller and Gildea's (1987) work on vocabulary teaching has shown how the assumption that knowing and doing can be separated leads to a teaching method that ignores the way situations structure cognition. Their work has described how children are taught words from dictionary definitions and a few exemplary sentences, and they have compared this method with the way vocabulary is normally learned outside school. People generally learn words in the context of ordinary communication. This process is startlingly fast and successful. Miller and Gildea note that by listening, talking, and reading, the average 17-year-old has learned vocabulary at a rate of 5,000 words per year (13 per day) for over 16 years. By contrast, learning words from abstract definitions and sentences taken out of the context of normal use, the way vocabulary has often been taught, is slow and generally unsuccessful. There is barely enough classroom time to teach more than 100 to 200 words per year. Moreover, much of what is taught turns out to be almost useless in practice. They give the following examples of students' uses of vocabulary acquired this way:definitions and sentences taken out of the context of normal use, the way vocabulary has often been taught, is slow and generally unsuccessful. There is barely enough classroom time to teach more than 100 to 200 words per year. Moreover, much of what is taught turns out to be almost useless in practice. They give the following examples of students' uses of vocabulary acquired this way: \"Me and my parents correlate, because without them I wouldn't be here.\" \"I was meticulous about falling off the cliff.\" \"Mrs. Morrow stimulated the soup.\" Given the method, such mistakes seem unavoidable. Teaching from dictionaries assumes that definitions and exemplary sentences are self-contained \"pieces\" of knowledge. But words and sentences are not islands, entire unto themselves. Language use would involve an unremitting confrontation with ambiguity, polysemy, nuance, metaphor, and so forth were these not resolved with the extralinguistic help that the context of an utterance provides (Nunberg, 1978). Prominent among the intricacies of language that depend on extralinguistic help are indexical words --words like I, here, now, next, tomorrow, afterwards, this. Indexical terms are those that \"index\"or more plainly point to a part of the situation in which communication is being conducted. They are not merely contextsensitive; they are completely context-dependent. Words like I or now, for instance, can only be interpreted in the 'context of their use. Surprisingly, all words can be seen as at least partially indexical (Barwise & Perry, 1983). Experienced readers implicitly understand that words are situated. They, therefore, ask for the rest of the sentence or the context before committing themselves to an interpretation of a word. And they go to dictionaries with situated examples of usage in mind. The situation as well as the dictionary supports the interpretation. But the students who produced the sentences listed had no support from a normal communicative situation. In tasks like theirs, dictionary definitions are assumed to be self-sufficient. The extralinguistic props that would structure, constrain, and ultimately allow interpretation in normal communication are ignored. Learning from dictionaries, like any method that tries to teach abstract concepts independently of authentic situations, overlooks the way understanding is developed through continued, situated use. This development, which involves complex social negotiations, does not crystallize into a categorical definition. Because it is dependent on situations and negotiations, the meaning of a word cannot, in principle, be captured by a definition, even when the definition is supported by a couple of exemplary sentences. All knowledge is, we believe, like language. Its constituent parts index the world and so are inextricably a product of the activity and situations in which they are produced. A concept, for example, will continually evolve with each new occasion of use, because new situations, negotiations, and activities inevitably recast it in a new, more densely textured form. So a concept, like the meaning of a word, is always under construction. This would also appear to be true of apparently well-defined, abstract technical concepts. Even these are not wholly definable and defy categorical description; part of their meaning is always inherited from the context of use. Learning and tools. To explore the idea that concepts are both situated and progressively developed through activity, we should abandon any notion that they are abstract, self-contained entities. Instead, it may be more useful to consider conceptual knowledge as, in some ways, similar to a set of tools. Tools share several significant features with knowledge: They can only be fully understood through use, and using them entails both changing the user's view of the world and adopting the belief system of the culture in which they are used. First, if knowledge is thought of as tools, we can illustrate Whitehead's (1929) distinction between the mere acquisition of inert concepts and the development of useful, robust knowledge. It is quite possible to acquire a tool but to be unable to use it. Similarly, it is common for students to acquire algorithms, routines, and decontextualized definitions that they cannot use and that, therefore, lie inert. Unfortunately, this problem is not always apparent. Old-fashioned pocket knives, for example, have a device for removing stones from horses' hooves. People with this device may know its use and be able to talk wisely about horses, hooves, and stones. But they may never betray --or even recognize --that they would not begin to know how to use this implement on a horse. Similarly, students can often manipulate algorithms, routines, and definitions they have acquired with apparent competence and yet not reveal, to their teachers or themselves, that they would have no idea what to do if they came upon the domain equivalent of a limping horse. People who use tools actively rather than just acquire them, by contrast, build an increasingly rich implicit understanding of the world in which they use the tools and of the tools themselves. The understanding, both of the world and of the tool, continually changes as a result of their interaction. Learning and acting are interestingly indistinct, learning being a continuous, life-long process resulting from acting in situations. Learning how to use a tool involves far more than can be accounted for in any set of explicit rules. The occasions and conditions for use arise directly out of the context of activities of each community that uses the tool, framed by the way members of that community see the world. The community and its viewpoint, quite as much as the tool itself, determine how a tool is used. Thus, carpenters and cabinet makers use chisels differently. Because tools and the way they are used reflect the particular accumulated insights of communities, it is not ", "title": "" }, { "docid": "42a81e39b411ba4613ff22090097548c", "text": "We present a neural network method for review rating prediction in this paper. Existing neural network methods for sentiment prediction typically only capture the semantics of texts, but ignore the user who expresses the sentiment. This is not desirable for review rating prediction as each user has an influence on how to interpret the textual content of a review. For example, the same word (e.g. “good”) might indicate different sentiment strengths when written by different users. We address this issue by developing a new neural network that takes user information into account. The intuition is to factor in user-specific modification to the meaning of a certain word. Specifically, we extend the lexical semantic composition models and introduce a userword composition vector model (UWCVM), which effectively captures how user acts as a function affecting the continuous word representation. We integrate UWCVM into a supervised learning framework for review rating prediction, and conduct experiments on two benchmark review datasets. Experimental results demonstrate the effectiveness of our method. It shows superior performances over several strong baseline methods.", "title": "" }, { "docid": "7f68cbaa4fdc043cddd9fe625657610e", "text": "While clustering is one of the most popular methods for data mining, analysts lack adequate tools for quick, iterative clustering analysis, which is essential for hypothesis generation and data reasoning. We introduce Clustrophile, an interactive tool for iteratively computing discrete and continuous data clusters, rapidly exploring different choices of clustering parameters, and reasoning about clustering instances in relation to data dimensions. Clustrophile combines three basic visualizations – a table of raw datasets, a scatter plot of planar projections, and a matrix diagram (heatmap) of discrete clusterings – through interaction and intermediate visual encoding. Clustrophile also contributes two spatial interaction techniques, forward projection and backward projection, and a visualization method, prolines, for reasoning about two-dimensional projections obtained through dimensionality reductions.", "title": "" }, { "docid": "e2584097dbbe8b1547e816d4e2fa1903", "text": "In order to develop security critical Information Systems, specifying security quality requirements is vitally important, although it is a very difficult task. Fortunately, there are several security standards, like the Common Criteria (ISO/IEC 15408), which help us handle security requirements. This article will present a Common Criteria centred and reuse-based process that deals with security requirements at the early stages of software development in a systematic and intuitive way, by providing a security resources repository as well as integrating the Common Criteria into the software lifecycle, so that it unifies the concepts of requirements engineering and security engineering. © 2006 Elsevier B.V. All rights reserved.", "title": "" }, { "docid": "fba48672e859a7606707406267dd0957", "text": "We suggest a spectral histogram, defined as the marginal distribution of filter responses, as a quantitative definition for a texton pattern. By matching spectral histograms, an arbitrary image can be transformed to an image with similar textons to the observed. We use the chi(2)-statistic to measure the difference between two spectral histograms, which leads to a texture discrimination model. The performance of the model well matches psychophysical results on a systematic set of texture discrimination data and it exhibits the nonlinearity and asymmetry phenomena in human texture discrimination. A quantitative comparison with the Malik-Perona model is given, and a number of issues regarding the model are discussed.", "title": "" }, { "docid": "0d95c132ff0dcdb146ed433987c426cf", "text": "A smart connected car in conjunction with the Internet of Things (IoT) is an emerging topic. The fundamental concept of the smart connected car is connectivity, and such connectivity can be provided by three aspects, such as Vehicle-to-Vehicle (V2V), Vehicle-to-Infrastructure (V2I), and Vehicle-to-Everything (V2X). To meet the aspects of V2V and V2I connectivity, we developed modules in accordance with international standards with respect to On-Board Diagnostics II (OBDII) and 4G Long Term Evolution (4G-LTE) to obtain and transmit vehicle information. We also developed software to visually check information provided by our modules. Information related to a user’s driving, which is transmitted to a cloud-based Distributed File System (DFS), was then analyzed for the purpose of big data analysis to provide information on driving habits to users. Yet, since this work is an ongoing research project, we focus on proposing an idea of system architecture and design in terms of big data analysis. Therefore, our contributions through this work are as follows: (1) Develop modules based on Controller Area Network (CAN) bus, OBDII, and 4G-LTE; (2) Develop software to check vehicle information on a PC; (3) Implement a database related to vehicle diagnostic codes; (4) Propose system architecture and design for big data analysis.", "title": "" } ]
scidocsrr
ac102b72b0c64cf20c1c7a7e26f137a3
Soft-computing techniques and ARMA model for time series prediction
[ { "docid": "784c7c785b2e47fad138bba38b753f31", "text": "A local linear wavelet neural network (LLWNN) is presented in this paper. The difference of the network with conventional wavelet neural network (WNN) is that the connection weights between the hidden layer and output layer of conventional WNN are replaced by a local linear model. A hybrid training algorithm of particle swarm optimization (PSO) with diversity learning and gradient descent method is introduced for training the LLWNN. Simulation results for the prediction of time-series show the feasibility and effectiveness of the proposed method. r 2005 Elsevier B.V. All rights reserved.", "title": "" } ]
[ { "docid": "e2ba4f88f4b1a8afcf51882bc7cfa634", "text": "The embodied and situated approach to artificial intelligence (AI) has matured and become a viable alternative to traditional computationalist approaches with respect to the practical goal of building artificial agents, which can behave in a robust and flexible manner under changing real-world conditions. Nevertheless, some concerns have recently been raised with regard to the sufficiency of current embodied AI for advancing our scientific understanding of intentional agency. While from an engineering or computer science perspective this limitation might not be relevant, it is of course highly relevant for AI researchers striving to build accurate models of natural cognition. We argue that the biological foundations of enactive cognitive science can provide the conceptual tools that are needed to diagnose more clearly the shortcomings of current embodied AI. In particular, taking an enactive perspective points to the need for AI to take seriously the organismic roots of autonomous agency and sense-making. We identify two necessary systemic requirements, namely constitutive autonomy and adaptivity, which lead us to introduce two design principles of enactive AI. It is argued that the development of such enactive AI poses a significant challenge to current methodologies. However, it also provides a promising way of eventually overcoming the current limitations of embodied AI, especially in terms of providing fuller models of natural embodied cognition. Finally, some practical implications and examples of the two design principles of enactive AI are also discussed.", "title": "" }, { "docid": "d848e146b4dbf78a6c629c5963c92f50", "text": "Agile development is getting more and more used, also in the development of safety-critical software. For the sake of certification, it is necessary to comply with relevant standards – in this case IEC 61508 and EN 50128. In this paper we focus on two aspects of the need for configuration management and SafeScrum. First and foremost we need to adapt SafeScrum to the standards’ needs for configuration management. We show that this can be achieved by relative simple amendments to SafeScrum. In addition – in order to keep up with a rapidly changing set of development paradigms it is necessary to move the standards’ requirement in a goal based direction – more focus on what and not so much focus on how.", "title": "" }, { "docid": "7321a25cb98e25f3773447f66f0d176e", "text": "The biolinguistic perspective regards the language faculty as an organ of the body, along with other cognitive systems. Adopting it, we expect to find three factors that interact to determine (I-) languages attained: genetic endowment (the topic of Universal Grammar), experience, and principles that are language- or even organism-independent. Research has naturally focused on I-languages and UG, the problems of descriptive and explanatory adequacy. The Principles-and-Parameters approach opened the possibility for serious investigation of the third factor, and the attempt to account for properties of language in terms of general considerations of computational efficiency, eliminating some of the technology postulated as specific to language and providing more principled explanation of linguistic phenomena", "title": "" }, { "docid": "51e0caf419babd61615e1537545e40e8", "text": "Past research on automatic facial expression analysis has focused mostly on the recognition of prototypic expressions of discrete emotions rather than on the analysis of dynamic changes over time, although the importance of temporal dynamics of facial expressions for interpretation of the observed facial behavior has been acknowledged for over 20 years. For instance, it has been shown that the temporal dynamics of spontaneous and volitional smiles are fundamentally different from each other. In this work, we argue that the same holds for the temporal dynamics of brow actions and show that velocity, duration, and order of occurrence of brow actions are highly relevant parameters for distinguishing posed from spontaneous brow actions. The proposed system for discrimination between volitional and spontaneous brow actions is based on automatic detection of Action Units (AUs) and their temporal segments (onset, apex, offset) produced by movements of the eyebrows. For each temporal segment of an activated AU, we compute a number of mid-level feature parameters including the maximal intensity, duration, and order of occurrence. We use Gentle Boost to select the most important of these parameters. The selected parameters are used further to train Relevance Vector Machines to determine per temporal segment of an activated AU whether the action was displayed spontaneously or volitionally. Finally, a probabilistic decision function determines the class (spontaneous or posed) for the entire brow action. When tested on 189 samples taken from three different sets of spontaneous and volitional facial data, we attain a 90.7% correct recognition rate.", "title": "" }, { "docid": "8471c34489a205dd738dadd2ecf83348", "text": "Recent neuroimaging studies have shown the importance of the prefrontal and anterior cingulate cortices in deception. However, little is known about the role of each of these regions during deception. Using positron emission tomography (PET), we measured brain activation while participants told truths or lies about two types of real-world events: experienced and unexperienced. The imaging data revealed that activity of the dorsolateral, ventrolateral and medial prefrontal cortices was commonly associated with both types of deception (pretending to know and pretending not to know), whereas activity of the anterior cingulate cortex (ACC) was only associated with pretending not to know. Regional cerebral blood flow (rCBF) increase in the ACC was positively correlated with that in the dorsolateral prefrontal cortex only during pretending not to know. These results suggest that the lateral and medial prefrontal cortices have general roles in deception, whereas the ACC contributes specifically to pretending not to know.", "title": "" }, { "docid": "fb581f0d3db5dcd7e2e2b5474c5812f1", "text": "Sequence-to-Sequence (seq2seq) models have become overwhelmingly popular in building end-to-end trainable dialogue systems. Though highly efficient in learning the backbone of human-computer communications, they suffer from the problem of strongly favoring short generic responses. In this paper, we argue that a good response should smoothly connect both the preceding dialogue history and the following conversations. We strengthen this connection through mutual information maximization. To sidestep the nondifferentiability of discrete natural language tokens, we introduce an auxiliary continuous code space and map such code space to a learnable prior distribution for generation purpose. Experiments on two dialogue datasets validate the effectiveness of our model, where the generated responses are closely related to the dialogue context and lead to more interactive conversations.", "title": "" }, { "docid": "90753a8c6ea17cc1a857898050e8ffca", "text": "The panel focuses on blockchain, the technology behind Bitcoin and Ethereum. The topic has drawn much attention recently in both business and academic circles. The blockchain is a distributed, immutable digital record system that is shared among many independent parties and can be updated only by their consensus. If unbiased and incorruptible blockchain-based information systems become prevalent repositories of our records, trusting other humans with constructing and maintaining key records to define the resources at our disposal could become unnecessary. In principle, blockchain could provide a decentralized information infrastructure that no one fully controls, thereby no one has absolute power and no one can distort past or current records. The full potential let alone implications of blockchain is still unknown. The panel explores blockchain challenges and opportunities from the IS research perspective.", "title": "" }, { "docid": "28b15544f3e054ca483382a471c513e5", "text": "In this work, design and control system development of a gas-electric hybrid quad tilt-rotor UAV with morphing wing are presented. The proposed aircraft has an all carbon-composite body, gas-electric hybrid electric generation system for 3 hours hovering or up to 10 hours of horizontal flight, a novel configuration for VTOL and airplane-like flights with minimized aerodynamic costs and mechanical morphing wings for both low speed and high speed horizontal flights. The mechanical design of the vehicle is performed to achieve a strong and light-weight structure, whereas the aerodynamic and propulsion system designs are aimed for accomplishing both fixed wing and rotary wing aircraft flights with maximized flight endurance. A detailed dynamic model of the aerial vehicle is developed including the effects of tilting rotors, variable fuel weight, and morphing wing lift-drag forces and pitching moments. Control system is designed for both flight regimes and flight simulations are carried out to check the performance of the proposed control system.", "title": "" }, { "docid": "1ebf2152d5624261951bebd68c306d5e", "text": "A dual active bridge (DAB) is a zero-voltage switching (ZVS) high-power isolated dc-dc converter. The development of a 15-kV SiC insulated-gate bipolar transistor switching device has enabled a noncascaded medium voltage (MV) isolated dc-dc DAB converter. It offers simple control compared to a cascaded topology. However, a compact-size high frequency (HF) DAB transformer has significant parasitic capacitances for such voltage. Under high voltage and high dV/dT switching, the parasitics cause electromagnetic interference and switching loss. They also pose additional challenges for ZVS. The device capacitance and slowing of dV/dT play a major role in deadtime selection. Both the deadtime and transformer parasitics affect the ZVS operation of the DAB. Thus, for the MV-DAB design, the switching characteristics of the devices and MV HF transformer parasitics have to be closely coupled. For the ZVS mode, the current vector needs to be between converter voltage vectors with a certain phase angle defined by deadtime, parasitics, and desired converter duty ratio. This paper addresses the practical design challenges for an MV-DAB application.", "title": "" }, { "docid": "e4628211d0d2657db387c093228e9b9b", "text": "BACKGROUND\nMindfulness-based stress reduction (MBSR) is a clinically standardized meditation that has shown consistent efficacy for many mental and physical disorders. Less attention has been given to the possible benefits that it may have in healthy subjects. The aim of the present review and meta-analysis is to better investigate current evidence about the efficacy of MBSR in healthy subjects, with a particular focus on its benefits for stress reduction.\n\n\nMATERIALS AND METHODS\nA literature search was conducted using MEDLINE (PubMed), the ISI Web of Knowledge, the Cochrane database, and the references of retrieved articles. The search included articles written in English published prior to September 2008, and identified ten, mainly low-quality, studies. Cohen's d effect size between meditators and controls on stress reduction and spirituality enhancement values were calculated.\n\n\nRESULTS\nMBSR showed a nonspecific effect on stress reduction in comparison to an inactive control, both in reducing stress and in enhancing spirituality values, and a possible specific effect compared to an intervention designed to be structurally equivalent to the meditation program. A direct comparison study between MBSR and standard relaxation training found that both treatments were equally able to reduce stress. Furthermore, MBSR was able to reduce ruminative thinking and trait anxiety, as well as to increase empathy and self-compassion.\n\n\nCONCLUSIONS\nMBSR is able to reduce stress levels in healthy people. However, important limitations of the included studies as well as the paucity of evidence about possible specific effects of MBSR in comparison to other nonspecific treatments underline the necessity of further research.", "title": "" }, { "docid": "6c5cabfa5ee5b9d67ef25658a4b737af", "text": "Sentence compression is the task of producing a summary of a single sentence. The compressed sentence should be shorter, contain the important content from the original, and itself be grammatical. The three papers discussed here take different approaches to identifying important content, determining which sentences are grammatical, and jointly optimizing these objectives. One family of approaches we will discuss is those that are tree-based, which create a compressed sentence by making edits to the syntactic tree of the original sentence. A second type of approach is sentence-based, which generates strings directly. Orthogonal to either of these two approaches is whether sentences are treated in isolation or if the surrounding discourse affects compressions. We compare a tree-based, a sentence-based, and a discourse-based approach and conclude with ideas for future work in this area. Comments University of Pennsylvania Department of Computer and Information Science Technical Report No. MSCIS-10-20. This technical report is available at ScholarlyCommons: http://repository.upenn.edu/cis_reports/929 Methods for Sentence Compression", "title": "" }, { "docid": "d212d81105e3573b5a7a33695fa3a764", "text": "To achieve tasks in unknown environments with high reliability, highly accurate localization during task execution is necessary for humanoid robots. In this paper, we discuss a localization system which can be applied to a humanoid robot when executing tasks in the real world. During such tasks, humanoid robots typically do not possess a referential to a constant horizontal plane which can in turn be used as part of fast and cost efficient localization methods. We solve this problem by first computing an improved odometry estimate through fusing visual odometry, feedforward commands from gait generator and orientation from inertia sensors. This estimate is used to generate a 3D point cloud from the accumulation of successive laser scans and such point cloud is then properly sliced to create a constant height horizontal virtual scan. Finally, this slice is used as an observation base and fed to a 2D SLAM method. The fusion process uses a velocity error model to achieve greater accuracy, which parameters are measured on the real robot. We evaluate our localization system in a real world task execution experiment using the JAXON robot and show how our system can be used as a practical solution for humanoid robots localization during complex tasks execution processes.", "title": "" }, { "docid": "d5d03cdfd3a6d6c2b670794d76e91c8e", "text": "We present RACE, a new dataset for benchmark evaluation of methods in the reading comprehension task. Collected from the English exams for middle and high school Chinese students in the age range between 12 to 18, RACE consists of near 28,000 passages and near 100,000 questions generated by human experts (English instructors), and covers a variety of topics which are carefully designed for evaluating the students’ ability in understanding and reasoning. In particular, the proportion of questions that requires reasoning is much larger in RACE than that in other benchmark datasets for reading comprehension, and there is a significant gap between the performance of the state-of-the-art models (43%) and the ceiling human performance (95%). We hope this new dataset can serve as a valuable resource for research and evaluation in machine comprehension. The dataset is freely available at http://www.cs.cmu.edu/ ̃glai1/data/race/ and the code is available at https://github.com/ cheezer/RACE_AR_baselines.", "title": "" }, { "docid": "ced697994e4e8f8c65b4a06dae42ddeb", "text": "Despite recent advances, the remaining bottlenecks in deep generative models are necessity of extensive training and difficulties with generalization from small number of training examples. Both problems may be addressed by conditional generative models that are trained to adapt the generative distribution to additional input data. So far this idea was explored only under certain limitations such as restricting the input data to be a single object or multiple objects representing the same concept. In this work we develop a new class of deep generative model called generative matching networks which is inspired by the recently proposed matching networks for one-shot learning in discriminative tasks and the ideas from meta-learning. By conditioning on the additional input dataset, generative matching networks may instantly learn new concepts that were not available during the training but conform to a similar generative process, without explicit limitations on the number of additional input objects or the number of concepts they represent. Our experiments on the Omniglot dataset demonstrate that generative matching networks can significantly improve predictive performance on the fly as more additional data is available to the model and also adapt the latent space which is beneficial in the context of feature extraction.", "title": "" }, { "docid": "404bd4b3c7756c87805fa286415aac43", "text": "Although key techniques for next-generation wireless communication have been explored separately, relatively little work has been done to investigate their potential cooperation for performance optimization. To address this problem, we propose a holistic framework for robust 5G communication based on multiple-input-multiple-output (MIMO) orthogonal frequency division multiplexing (OFDM). More specifically, we design a new framework that supports: 1) index modulation based on OFDM (OFDM–M) [1]; 2) sub-band beamforming and channel estimation to achieve massive path gains by exploiting multiple antenna arrays [2]; and 3) sub-band pre-distortion for peak-to-average-power-ratio (PAPR) reduction [3] to significantly decrease the PAPR and communication errors in OFDM-IM by supporting a linear behavior of the power amplifier in the modem. The performance of the proposed framework is evaluated against the state-of-the-art QPSK, OFDM-IM [1] and QPSK-spatiotemporal QPSK-ST [2] schemes. The results show that our framework reduces the bit error rate (BER), mean square error (MSE) and PAPR compared to the baselines by approximately 6–13dB, 8–13dB, and 50%, respectively.", "title": "" }, { "docid": "1503d2a235b2ce75516d18cdea42bbb5", "text": "Phosphatidylinositol-3,4,5-trisphosphate (PtdIns(3,4,5)P3 or PIP3) mediates signalling pathways as a second messenger in response to extracellular signals. Although primordial functions of phospholipids and RNAs have been hypothesized in the ‘RNA world’, physiological RNA–phospholipid interactions and their involvement in essential cellular processes have remained a mystery. We explicate the contribution of lipid-binding long non-coding RNAs (lncRNAs) in cancer cells. Among them, long intergenic non-coding RNA for kinase activation (LINK-A) directly interacts with the AKT pleckstrin homology domain and PIP3 at the single-nucleotide level, facilitating AKT–PIP3 interaction and consequent enzymatic activation. LINK-A-dependent AKT hyperactivation leads to tumorigenesis and resistance to AKT inhibitors. Genomic deletions of the LINK-A PIP3-binding motif dramatically sensitized breast cancer cells to AKT inhibitors. Furthermore, meta-analysis showed the correlation between LINK-A expression and incidence of a single nucleotide polymorphism (rs12095274: A > G), AKT phosphorylation status, and poor outcomes for breast and lung cancer patients. PIP3-binding lncRNA modulates AKT activation with broad clinical implications.", "title": "" }, { "docid": "979112832db3e0ec7c1288ef916d574e", "text": "Recently, deep neural networks have been shown to perform competitively on the task of predicting facial expression from images. Trained by gradient-based methods, these networks are amenable to \"multi-task\" learning via a multiple term objective. In this paper we demonstrate that learning representations to predict the position and shape of facial landmarks can improve expression recognition from images. We show competitive results on two large-scale datasets, the ICML 2013 Facial Expression Recognition challenge, and the Toronto Face Database.", "title": "" }, { "docid": "8a73a42bed30751cbb6798398b81571d", "text": "In this paper, we study the problem of learning image classification models with label noise. Existing approaches depending on human supervision are generally not scalable as manually identifying correct or incorrect labels is time-consuming, whereas approaches not relying on human supervision are scalable but less effective. To reduce the amount of human supervision for label noise cleaning, we introduce CleanNet, a joint neural embedding network, which only requires a fraction of the classes being manually verified to provide the knowledge of label noise that can be transferred to other classes. We further integrate CleanNet and conventional convolutional neural network classifier into one framework for image classification learning. We demonstrate the effectiveness of the proposed algorithm on both of the label noise detection task and the image classification on noisy data task on several large-scale datasets. Experimental results show that CleanNet can reduce label noise detection error rate on held-out classes where no human supervision available by 41.5% compared to current weakly supervised methods. It also achieves 47% of the performance gain of verifying all images with only 3.2% images verified on an image classification task. Source code and dataset will be available at kuanghuei.github.io/CleanNetProject.", "title": "" }, { "docid": "09c5bfd9c7fcd78f15db76e8894751de", "text": "Recently, active suspension is gaining popularity in commercial automobiles. To develop the control methodologies for active suspension control, a quarter-car test bed was built employing a direct-drive tubular linear brushless permanent-magnet motor (LBPMM) as a force-generating component. Two accelerometers and a linear variable differential transformer (LVDT) are used in this quarter-car test bed. Three pulse-width-modulation (PWM) amplifiers supply the currents in three phases. Simulated road disturbance is generated by a rotating cam. Modified lead-lag control, linear-quadratic (LQ) servo control with a Kalman filter, fuzzy control methodologies were implemented for active-suspension control. In the case of fuzzy control, an asymmetric membership function was introduced to eliminate the DC offset in sensor data and to reduce the discrepancy in the models. This controller could attenuate road disturbance by up to 77% in the sprung mass velocity and 69% in acceleration. The velocity and the acceleration data of the sprung mass are presented to compare the controllers' performance in the ride comfort of a vehicle. Both simulation and experimental results are presented to demonstrate the effectiveness of these control methodologies.", "title": "" } ]
scidocsrr
384331d028f4d4a94d4ade1649ce56d9
Image Processing and Particle Analysis for Road Traffic Detection
[ { "docid": "27f3060ef96f1656148acd36d50f02ce", "text": "Video sensors become particularly important in traffic applications mainly due to their fast response, easy installation, operation and maintenance, and their ability to monitor wide areas. Research in several fields of traffic applications has resulted in a wealth of video processing and analysis methods. Two of the most demanding and widely studied applications relate to traffic monitoring and automatic vehicle guidance. In general, systems developed for these areas must integrate, amongst their other tasks, the analysis of their static environment (automatic lane finding) and the detection of static or moving obstacles (object detection) within their space of interest. In this paper we present an overview of image processing and analysis tools used in these applications and we relate these tools with complete systems developed for specific traffic applications. More specifically, we categorize processing methods based on the intrinsic organization of their input data (feature-driven, area-driven, or model-based) and the domain of processing (spatial/frame or temporal/video). Furthermore, we discriminate between the cases of static and mobile camera. Based on this categorization of processing tools, we present representative systems that have been deployed for operation. Thus, the purpose of the paper is threefold. First, to classify image-processing methods used in traffic applications. Second, to provide the advantages and disadvantages of these algorithms. Third, from this integrated consideration, to attempt an evaluation of shortcomings and general needs in this field of active research. q 2003 Elsevier Science B.V. All rights reserved.", "title": "" } ]
[ { "docid": "521fb63129bde3f7448c4b67ead1adae", "text": "The pore-scale numerical works on the effective thermal conductivity and melting process of copper foam filled with paraffin, and a phase-change material (PCM) with low thermal conductivity, were conducted by utilizing the two-dimensional (2D) hexahedron Calmidi-Mahajan (C-M) model and the three-dimensional (3D) dodecahedron Boomsma-Poulikakos (B-P) model. The unidirectional heat transfer experiment was established to investigate the effective thermal conductivity of the composite. The simulation results of the effective thermal conductivity of the composite in 2D C-M model were 6.93, 5.41, 4.22 and 2.75 W/(m·K), for porosity of 93%, 95%, 96% and 98% respectively, while the effective thermal conductivity of the composite in 3D B-P model were 7.07, 5.24, 3.07 and 1.22 W/(m·K). The simulated results were in agreement with the experimental data obtained for the composite. It was found that the copper foam can effectively enhance the thermal conductivity of the paraffin, i.e., the smaller the porosity of copper foam, the higher the effective thermal conductivity of the composite. In addition, the Fluent Solidification/Melting model was applied to numerically investigate the melting process of the paraffin in the pore. Lastly, the solid–liquid interface development, completely melted time and temperature field distribution of paraffin in the pore of copper foam were also discussed.", "title": "" }, { "docid": "4b3e6253a2b9e6aeb8ee0f6c2446510c", "text": "Autonomous wireless sensor nodes need low-power low-speed ADCs to digitize the sensed signal. State-of-art SAR ADCs can accomplish this goal with high power-efficiency (<;10fJ/conversion-step) [1-4]. The reference voltage design is critical for the ADC performance to obtain good PSRR, low line-sensitivity and a stable supply-independent full-scale range. However, solutions for efficient reference voltage generators (RVGs) are typically ignored in low-power ADC publications. In reality, due to the low power supply (usually sub-1 V) and limited available power (nW-range), the RVG is a challenge within the sensor system. In this work, a 2.4fJ/conversion-step SAR ADC with integrated reference is implemented. The 0.62V CMOS RVG consumes 25nW. To further reduce RVG power, it can be duty-cycled down to 10% with no loss in ADC performance. Additionally, the ADC uses a bidirectional dynamic comparator to improve the power efficiency even more.", "title": "" }, { "docid": "66e7979aff5860f713dffd10e98eed3d", "text": "The encoder-decoder dialog model is one of the most prominent methods used to build dialog systems in complex domains. Yet it is limited because it cannot output interpretable actions as in traditional systems, which hinders humans from understanding its generation process. We present an unsupervised discrete sentence representation learning method that can integrate with any existing encoderdecoder dialog models for interpretable response generation. Building upon variational autoencoders (VAEs), we present two novel models, DI-VAE and DI-VST that improve VAEs and can discover interpretable semantics via either auto encoding or context predicting. Our methods have been validated on real-world dialog datasets to discover semantic representations and enhance encoder-decoder models with interpretable generation.1", "title": "" }, { "docid": "426a25d6536a3a388313aadbdb66bbe7", "text": "In this review, we present the recent developments and future prospects of improving nitrogen use efficiency (NUE) in crops using various complementary approaches. These include conventional breeding and molecular genetics, in addition to alternative farming techniques based on no-till continuous cover cropping cultures and/or organic nitrogen (N) nutrition. Whatever the mode of N fertilization, an increased knowledge of the mechanisms controlling plant N economy is essential for improving NUE and for reducing excessive input of fertilizers, while maintaining an acceptable yield and sufficient profit margin for the farmers. Using plants grown under agronomic conditions, with different tillage conditions, in pure or associated cultures, at low and high N mineral fertilizer input, or using organic fertilization, it is now possible to develop further whole plant agronomic and physiological studies. These can be combined with gene, protein and metabolite profiling to build up a comprehensive picture depicting the different steps of N uptake, assimilation and recycling to produce either biomass in vegetative organs or proteins in storage organs. We provide a critical overview as to how our understanding of the agro-ecophysiological, physiological and molecular controls of N assimilation in crops, under varying environmental conditions, has been improved. We OPEN ACCESS Sustainability 2011, 3 1453 have used combined approaches, based on agronomic studies, whole plant physiology, quantitative genetics, forward and reverse genetics and the emerging systems biology. Long-term sustainability may require a gradual transition from synthetic N inputs to legume-based crop rotation, including continuous cover cropping systems, where these may be possible in certain areas of the world, depending on climatic conditions. Current knowledge and prospects for future agronomic development and application for breeding crops adapted to lower mineral fertilizer input and to alternative farming techniques are explored, whilst taking into account the constraints of both the current world economic situation and the environment.", "title": "" }, { "docid": "8c51c464d9137eec4600a5df5c6b451a", "text": "An increasing number of disasters (natural and man-made) with a large number of victims and significant social and economical losses are observed in the past few years. Although particular events can always be attributed to fate, it is improving the disaster management that have to contribute to decreasing damages and ensuring proper care for citizens in affected areas. Some of the lessons learned in the last several years give clear indications that the availability, management and presentation of geo-information play a critical role in disaster management. However, all the management techniques that are being developed are understood by, and confined to the intellectual community and hence lack mass participation. Awareness of the disasters is the only effective way in which one can bring about mass participation. Hence, any disaster management is successful only when the general public has some awareness about the disaster. In the design of such awareness program, intelligent mapping through analysis and data sharing also plays a very vital role. The analytical capabilities of GIS support all aspects of disaster management: planning, response and recovery, and records management. The proposed GIS based awareness program in this paper would improve the currently practiced disaster management programs and if implemented, would result in a proper dosage of awareness and caution to the general public, which in turn would help to cope with the dangerous activities of disasters in future.", "title": "" }, { "docid": "af22932b48a2ea64ecf3e5ba1482564d", "text": "Collaborative embedded systems (CES) heavily rely on information models to understand the contextual situations they are exposed to. These information models serve different purposes. First, during development time it is necessary to model the context for eliciting and documenting the requirements that a CES is supposed to achieve. Second, information models provide information to simulate different contextual situations and CES ́s behavior in these situations. Finally, CESs need information models about their context during runtime in order to react to different contextual situations and exchange context information with other CESs. Heavyweight ontologies, based on Ontology Web Language (OWL), have already proven suitable for representing knowledge about contextual situations during runtime. Furthermore, lightweight ontologies (e.g. class diagrams) have proven their practicality for creating domain specific languages for requirements documentation. However, building an ontology (lightor heavyweight) is a non-trivial task that needs to be integrated into development methods for CESs such that it serves the above stated purposes in a seamless way. This paper introduces the requirements for the building of ontologies and proposes a method that is integrated into the engineering of CESs.", "title": "" }, { "docid": "4b0b2c7168fa04543d77bee46af14b0a", "text": "Individuals face privacy risks when providing personal location data to potentially untrusted location based services (LBSs). We develop and demonstrate CacheCloak, a system that enables realtime anonymization of location data. In CacheCloak, a trusted anonymizing server generates mobility predictions from historical data and submits intersecting predicted paths simultaneously to the LBS. Each new predicted path is made to intersect with other users' paths, ensuring that no individual user's path can be reliably tracked over time. Mobile users retrieve cached query responses for successive new locations from the trusted server, triggering new prediction only when no cached response is available for their current locations. A simulated hostile LBS with detailed mobility pattern data attempts to track users of CacheCloak, generating a quantitative measure of location privacy over time. GPS data from a GIS-based traffic simulation in an urban environment shows that CacheCloak can achieve realtime location privacy without loss of location accuracy or availability.", "title": "" }, { "docid": "acc906c2129e26d169e0cdc5747027ee", "text": "Intermolecular interactions within living organisms have been found to occur not as individual independent events but as a part of a collective array of interconnected events. The problem of the emergence of this collective dynamics and of the correlated biocommunication therefore arises. In the present paper we review the proposals given within the paradigm of modern molecular biology and those given by some holistic approaches to biology. In recent times, the collective behavior of ensembles of microscopic units (atoms/molecules) has been addressed in the conceptual framework of Quantum Field Theory. The possibility of producing physical states where all the components of the ensemble move in unison has been recognized. In such cases, electromagnetic fields trapped within the ensemble appear. In the present paper we present a scheme based on Quantum Field Theory where molecules are able to move in phase-correlated unison among them and with a self-produced electromagnetic field. Experimental corroboration of this scheme is presented. Some consequences for future biological developments are discussed.", "title": "" }, { "docid": "bf0c8b2c6912cb0fb9482090efe6b9ff", "text": "Realistic modeling of reverberant sound in 3D virtual worlds provides users with important cues for localizing sound sources and understanding spatial properties of the environment. Unfortunately, current geometric acoustic modeling systems do not accurately simulate reverberant sound. Instead, they model only direct transmission and specular reflection, while diffraction is either ignored or modeled through statistical approximation. However, diffraction is important for correct interpretation of acoustic environments, especially when the direct path between sound source and receiver is occluded. The Uniform Theory of Diffraction (UTD) extends geometrical acoustics with diffraction phenomena: illuminated edges become secondary sources of diffracted rays that in turn may propagate through the environment. In this paper, we propose an efficient way for computing the acoustical effect of diffraction paths using the UTD for deriving secondary diffracted rays and associated diffraction coefficients. Our main contributions are: 1) a beam tracing method for enumerating sequences of diffracting edges efficiently and without aliasing in densely occluded polyhedral environments; 2) a practical approximation to the simulated sound field in which diffraction is considered only in shadow regions; and 3) a real-time auralization system demonstrating that diffraction dramatically improves the quality of spatialized sound in virtual environments.", "title": "" }, { "docid": "d5002f61112022bf6026ccd01a3fd82f", "text": "Software engineering data (such as code bases, execution traces, historical code changes, mailing lists, and bug databases) contains a wealth of information about a project's status, progress, and evolution. Using well-established data mining techniques, practitioners and researchers have started exploring the potential of this valuable data in order to better manage their projects and to produce higher quality software systems that are delivered on time and within budget.\n This tutorial presents the latest research in mining software engineering data, discusses challenges associated with mining software engineering data, highlights success stories of mining software engineering data, and outlines future research directions. Attendees will acquire the knowledge and skills needed to integrate the mining of software engineering data in their own research or practice. This tutorial builds on several successful offerings at ICSE since 2007.", "title": "" }, { "docid": "6e36dda80f462c23bb7f6224e741e13d", "text": "Usual way of character's animation is the use of motion captured data. Acquired bones' orientations are blended together according to user input in real-time. Although this massively used method gives a nice results, practical experience show how important is to have a system for interactive direct manipulation of character's skeleton in order to satisfy various tasks in Cartesian space. For this purpose, various methods for solving inverse kinematics problem are used. This paper presents three of such methods: Algebraical method based on limbs positioning; iterative optimization method based on Jacobian pseudo-inversion; and heuristic CCD iterative method. The paper describes them all in detail and discusses practical scope of their use in real-time applications.", "title": "" }, { "docid": "e8b5f7f67b5095873419df4984c19333", "text": "A series of fluorescent pH probes based on the spiro-cyclic rhodamine core, aminomethylrhodamines (AMR), was synthesized and the effect of cycloalkane ring size on the acid/base properties of the AMR system was explored. The study involved a series of rhodamine 6G (cAMR6G) and rhodamine B (cAMR) pH probes with cycloalkane ring sizes from C-3 to C-6 on the spiro-cyclic amino group. It is known that the pKa value of cycloalkylamines can be tuned by different ring sizes in accordance with the Baeyer ring strain theory. Smaller ring amines have lower pKa value, i.e., they are less basic, such that the relative order in cycloalkylamine basicity is: cyclohexyl > cyclopentyl > cyclobutyl > cyclopropyl. Herein, it was found that the pKa values of the cAMR and cAMR6G systems can also be predicted by Baeyer ring strain theory. The pKa values for the cAMR6G series were shown to be higher than the cAMR series by a value of approximately 1.", "title": "" }, { "docid": "ad3c96a88a0cda684b466c14a9982d7b", "text": "Gamification has been applied in software engineering contexts, and more recently in requirements engineering with the purpose of improving the motivation and engagement of people performing specific engineering tasks. But often an objective evaluation that the resulting gamified tasks successfully meet the intended goal is missing. On the other hand, current practices in designing gamified processes seem to rest on a try, test and learn approach, rather than on first principles design methods. Thus empirical evaluation should play an even more important role.We combined gamification and automated reasoning techniques to support collaborative requirements prioritization in software evolution. A first prototype has been evaluated in the context of three industrial use cases. To further investigate the impact of specific game elements, namely point-based elements, we performed a quasi-experiment comparing two versions of the tool, with and without pointsification. We present the results from these two empirical evaluations, and discuss lessons learned.", "title": "" }, { "docid": "e6ed36d5d595db6bee2dce0c59f9ffea", "text": "Access to well-labeled recordings of facial expression is critical to progress in automated facial expression recognition. With few exceptions, publicly available databases are limited to posed facial behavior that can differ markedly in conformation, intensity, and timing from what occurs spontaneously. To meet the need for publicly available corpora of well-labeled video, we collected, ground-truthed, and prepared for distribution the Denver intensity of spontaneous facial action database. Twenty-seven young adults were video recorded by a stereo camera while they viewed video clips intended to elicit spontaneous emotion expression. Each video frame was manually coded for presence, absence, and intensity of facial action units according to the facial action unit coding system. Action units are the smallest visibly discriminable changes in facial action; they may occur individually and in combinations to comprise more molar facial expressions. To provide a baseline for use in future research, protocols and benchmarks for automated action unit intensity measurement are reported. Details are given for accessing the database for research in computer vision, machine learning, and affective and behavioral science.", "title": "" }, { "docid": "dc776c4fdf073db69633cc4e2e43de09", "text": "A security API is an Application Program Interface that allows untrusted code to access sensitive resources in a secure way. Examples of security APIs include the interface between the tamper-resistant chip on a smartcard (trusted) and the card reader (untrusted), the interface between a cryptographic Hardware Security Module, or HSM (trusted) and the client machine (untrusted), and the Google maps API (an interface between a server, trusted by Google, and the rest of the Internet). The crucial aspect of a security API is that it is designed to enforce a policy, i.e. no matter what sequence of commands in the interface are called, and no matter what the parameters, certain security properties should continue to hold. This means that if the less trusted code turns out to be malicious (or just faulty), the carefully designed API should prevent compromise of critical data. Designing such an interface is extremely tricky even for experts. A number of security flaws have been found in APIs in use in deployed systems in the last decade. In this tutorial paper, we introduce the subject of security API analysis using formal techniques. This approach has recently proved highly successful both in finding new flaws and verifying security properties of improved designs. We will introduce the main techniques, many of which have been adapted from language-based security and security protocol verification, by means of two case studies: cryptographic key management, and Personal Identification Number (PIN) processing in the cash machine network. We will give plenty of examples of API attacks, and highlight the areas where more research is needed.", "title": "" }, { "docid": "6d285e0e8450791f03f95f58792c8f3c", "text": "Basic psychology research suggests the possibility that confessions-a potent form of incrimination-may taint other evidence, thereby creating an appearance of corroboration. To determine if this laboratory-based phenomenon is supported in the high-stakes world of actual cases, we conducted an archival analysis of DNA exoneration cases from the Innocence Project case files. Results were consistent with the corruption hypothesis: Multiple evidence errors were significantly more likely to exist in false-confession cases than in eyewitness cases; in order of frequency, false confessions were accompanied by invalid or improper forensic science, eyewitness identifications, and snitches and informants; and in cases containing multiple errors, confessions were most likely to have been obtained first. We believe that these findings underestimate the problem and have important implications for the law concerning pretrial corroboration requirements and the principle of \"harmless error\" on appeal.", "title": "" }, { "docid": "37c8fa72d0959a64460dbbe4fdb8c296", "text": "This paper presents a model which generates architectural layout for a single flat having regular shaped spaces; Bedroom, Bathroom, Kitchen, Balcony, Living and Dining Room. Using constraints at two levels; Topological (Adjacency, Compactness, Vaastu, and Open and Closed face constraints) and Dimensional (Length to Width ratio constraint), Genetic Algorithms have been used to generate the topological arrangement of spaces in the layout and further if required, feasibility have been dimensionally analyzed. Further easy evacuation form the selected layout in case of adversity has been proposed using Dijkstra's Algorithm. Later the proposed model has been tested for efficiency using various test cases. This paper also presents a classification and categorization of various problems of space planning.", "title": "" }, { "docid": "4dca240e5073db9f09e6fdc3b022a29a", "text": "We describe an evolutionary approach to the control problem of bipedal walking. Using a full rigid-body simulation of a biped, it was possible to evolve recurrent neural networks that controlled stable straight-line walking on a planar surface. No proprioceptive information was necessary to achieve this task. Furthermore, simple sensory input to locate a sound source was integrated to achieve directional walking. To our knowledge, this is the first work that demonstrates the application of evolutionary optimization to three-dimensional physically simulated biped locomotion.", "title": "" }, { "docid": "1574abcbcff64f1c6fd725e0b5cf3df0", "text": "Model compression is essential for serving large deep neural nets on devices with limited resources or applications that require real-time responses. As a case study, a neural language model usually consists of one or more recurrent layers sandwiched between an embedding layer used for representing input tokens and a softmax layer for generating output tokens. For problems with a very large vocabulary size, the embedding and the softmax matrices can account for more than half of the model size. For instance, the bigLSTM model achieves great performance on the One-Billion-Word (OBW) dataset with around 800k vocabulary, and its word embedding and softmax matrices use more than 6GBytes space, and are responsible for over 90% of the model parameters. In this paper, we propose GroupReduce, a novel compression method for neural language models, based on vocabulary-partition (block) based low-rank matrix approximation and the inherent frequency distribution of tokens (the power-law distribution of words). The experimental results show our method can significantly outperform traditional compression methods such as low-rank approximation and pruning. On the OBW dataset, our method achieved 6.6 times compression rate for the embedding and softmax matrices, and when combined with quantization, our method can achieve 26 times compression rate, which translates to a factor of 12.8 times compression for the entire model with very little degradation in perplexity.", "title": "" }, { "docid": "85a076e58f4d117a37dfe6b3d68f5933", "text": "We propose a new model for active contours to detect objects in a given image, based on techniques of curve evolution, Mumford-Shah (1989) functional for segmentation and level sets. Our model can detect objects whose boundaries are not necessarily defined by the gradient. We minimize an energy which can be seen as a particular case of the minimal partition problem. In the level set formulation, the problem becomes a \"mean-curvature flow\"-like evolving the active contour, which will stop on the desired boundary. However, the stopping term does not depend on the gradient of the image, as in the classical active contour models, but is instead related to a particular segmentation of the image. We give a numerical algorithm using finite differences. Finally, we present various experimental results and in particular some examples for which the classical snakes methods based on the gradient are not applicable. Also, the initial curve can be anywhere in the image, and interior contours are automatically detected.", "title": "" } ]
scidocsrr
caa129e6cd0128cef40ae5345c395cb2
Comparative analysis of piezoelectric power harvesting circuits for rechargeable batteries
[ { "docid": "108058f1814d7520003b44f1ffc99cb5", "text": "The process of acquiring the energy surrounding a system and converting it into usable electrical energy is termed power harvesting. In the last few years, there has been a surge of research in the area of power harvesting. This increase in research has been brought on by the modern advances in wireless technology and low-power electronics such as microelectromechanical systems. The advances have allowed numerous doors to open for power harvesting systems in practical real-world applications. The use of piezoelectric materials to capitalize on the ambient vibrations surrounding a system is one method that has seen a dramatic rise in use for power harvesting. Piezoelectric materials have a crystalline structure that provides them with the ability to transform mechanical strain energy into electrical charge and, vice versa, to convert an applied electrical potential into mechanical strain. This property provides these materials with the ability to absorb mechanical energy from their surroundings, usually ambient vibration, and transform it into electrical energy that can be used to power other devices. While piezoelectric materials are the major method of harvesting energy, other methods do exist; for example, one of the conventional methods is the use of electromagnetic devices. In this paper we discuss the research that has been performed in the area of power harvesting and the future goals that must be achieved for power harvesting systems to find their way into everyday use.", "title": "" }, { "docid": "48036770f56e84df8b05c198e8a89018", "text": "Advances in low power VLSI design, along with the potentially low duty cycle of wireless sensor nodes open up the possibility of powering small wireless computing devices from scavenged ambient power. A broad review of potential power scavenging technologies and conventional energy sources is first presented. Low-level vibrations occurring in common household and office environments as a potential power source are studied in depth. The goal of this paper is not to suggest that the conversion of vibrations is the best or most versatile method to scavenge ambient power, but to study its potential as a viable power source for applications where vibrations are present. Different conversion mechanisms are investigated and evaluated leading to specific optimized designs for both capacitive MicroElectroMechancial Systems (MEMS) and piezoelectric converters. Simulations show that the potential power density from piezoelectric conversion is significantly higher. Experiments using an off-the-shelf PZT piezoelectric bimorph verify the accuracy of the models for piezoelectric converters. A power density of 70 mW/cm has been demonstrated with the PZT bimorph. Simulations show that an optimized design would be capable of 250 mW/cm from a vibration source with an acceleration amplitude of 2.5 m/s at 120 Hz. q 2002 Elsevier Science B.V.. All rights reserved.", "title": "" }, { "docid": "960f5bd8b673236d3b44a77e876e10c4", "text": "This paper describes an approach to harvesting electrical energy from a mechanically excited piezoelectric element. A vibrating piezoelectric device differs from a typical electrical power source in that it has a capacitive rather than inductive source impedance, and may be driven by mechanical vibrations of varying amplitude. An analytical expression for the optimal power flow from a rectified piezoelectric device is derived, and an “energy harvesting” circuit is proposed which can achieve this optimal power flow. The harvesting circuit consists of an ac–dc rectifier with an output capacitor, an electrochemical battery, and a switch-mode dc–dc converter that controls the energy flow into the battery. An adaptive control technique for the dc–dc converter is used to continuously implement the optimal power transfer theory and maximize the power stored by the battery. Experimental results reveal that use of the adaptive dc–dc converter increases power transfer by over 400% as compared to when the dc–dc converter is not used.", "title": "" } ]
[ { "docid": "13ac8eddda312bd4ef3ba194c076a6ea", "text": "With the Yahoo Flickr Creative Commons 100 Million (YFCC100m) dataset, a novel dataset was introduced to the computer vision and multimedia research community. To maximize the benefit for the research community and utilize its potential, this dataset has to be made accessible by tools allowing to search for target concepts within the dataset and mechanism to browse images and videos of the dataset. Following best practice from data collections, such as ImageNet and MS COCO, this paper presents means of accessibility for the YFCC100m dataset. This includes a global analysis of the dataset and an online browser to explore and investigate subsets of the dataset in real-time. Providing statistics of the queried images and videos will enable researchers to refine their query successively, such that the users desired subset of interest can be narrowed down quickly. The final set of image and video can be downloaded as URLs from the browser for further processing.", "title": "" }, { "docid": "21472ce2bf66d84a8fce106832e0fe97", "text": "Every time you go to one of the top 100 book/music e-commerce sites, you will come into contact with personalisation systems that attempt to judge your interests to increase sales. There are 3 methods for making these personalised recommendations: Content-based filtering, Collaborative filtering and a hybrid of the two. Understanding each of these methods will give you insight as to how your personal information is used on the Internet, and remove some of the mystery associated with the systems. This will allow you understand how these systems work and how they could be improved, so as to make an informed decision as to whether this is a good thing.", "title": "" }, { "docid": "b230400ee47b40751623561e11b1944c", "text": "Many mHealth apps have been developed to assist people in self-care management. Most of them aim to engage users and provide motivation to increase adherence. Gamification has been introduced to identify the left and right brain drives in order to engage users and motivate them. We are using Octalysis framework to map how top rated stress management apps address the right brain drives. 12 stress management mHealth are classified based on this framework. In this paper, we explore how Gamification has been used in mHealth apps, the intrinsic motivation using self-determination theory, methodology, and findings. In the discussion, we identify design principles that will better suited to enhance intrinsic motivation for people who seek self-stress management.", "title": "" }, { "docid": "a0a2037d04dd0e2b0defa8fbfd3072a4", "text": "The sequential parameter optimization (spot) package for R (R Development Core Team, 2008) is a toolbox for tuning and understanding simulation and optimization algorithms. Model-based investigations are common approaches in simulation and optimization. Sequential parameter optimization has been developed, because there is a strong need for sound statistical analysis of simulation and optimization algorithms. spot includes methods for tuning based on classical regression and analysis of variance techniques; tree-based models such as CART and random forest; Gaussian process models (Kriging) and combinations of different metamodeling approaches. This article exemplifies how spot can be used for automatic and interactive tuning.", "title": "" }, { "docid": "9d1dc15130b9810f6232b4a3c77e8038", "text": "This paper argues that we should seek the golden middle way between dynamically and statically typed languages.", "title": "" }, { "docid": "8b8be2f7a34f14c24443599cb570343f", "text": "We present Audiopad, an interface for musical performance that aims to combine the modularity of knob based controllers with the expressive character of multidimensional tracking interfaces. The performer's manipulations of physical pucks on a tabletop control a real-time synthesis process. The pucks are embedded with LC tags that the system tracks in two dimensions with a series of specially shaped antennae. The system projects graphical information on and around the pucks to give the performer sophisticated control over the synthesis process. INTRODUCTION The late nineties saw the emergence of a new musical performance paradigm. Sitting behind the glowing LCDs on their laptops, electronic musicians could play their music in front of audiences without bringing a truckload of synthesizers and patch cables. However, the transition to laptop based performance created a rift between the performer and the audience as there was almost no stage presence for an onlooker to latch on to. Furthermore, the performers lost much of the real-time expressive power of traditional analog instruments. Their on-the-fly arrangements relied on inputs from their laptop keyboards and therefore lacked nuance, finesse, and improvisational capabilities.", "title": "" }, { "docid": "920c977ce3ed5f310c97b6fcd0f5bef4", "text": "In this paper, different automatic registration schemes base d on different optimization techniques in conjunction with different similarity measures are compared in term s of accuracy and efficiency. Results from every optimizat ion procedure are quantitatively evaluated with respect to t he manual registration, which is the standard registration method used in clinical practice. The comparison has shown automatic regi st ation schemes based on CD consist of an accurate and reliable method that can be used in clinical ophthalmology, as a satisfactory alternative to the manual method. Key-Words: multimodal image registration, optimization algorithms, sim ilarity metrics, retinal images", "title": "" }, { "docid": "ef068ddc1d7cd8dd26acf4fafc54254d", "text": "In this paper, we study object detection using a large pool of unlabeled images and only a few labeled images per category, named “few-shot object detection”. The key challenge consists in generating trustworthy training samples as many as possible from the pool. Using few training examples as seeds, our method iterates between model training and high-confidence sample selection. In training, easy samples are generated first and, then the poorly initialized model undergoes improvement. As the model becomes more discriminative, challenging but reliable samples are selected. After that, another round of model improvement takes place. To further improve the precision and recall of the generated training samples, we embed multiple detection models in our framework, which has proven to outperform the single model baseline and the model ensemble method. Experiments on PASCAL VOC’07 and ILSVRC’13 indicate that by using as few as three or four samples selected for each category, our method produces very competitive results when compared to the state-of-the-art weakly-supervised approaches using a large number of image-level labels.", "title": "" }, { "docid": "a8553e9f90e8766694f49dcfdeab83b7", "text": "The need for solid-state ac-dc converters to improve power quality in terms of power factor correction, reduced total harmonic distortion at input ac mains, and precisely regulated dc output has motivated the investigation of several topologies based on classical converters such as buck, boost, and buck-boost converters. Boost converters operating in continuous-conduction mode have become particularly popular because reduced electromagnetic interference levels result from their utilization. Within this context, this paper introduces a bridgeless boost converter based on a three-state switching cell (3SSC), whose distinct advantages are reduced conduction losses with the use of magnetic elements with minimized size, weight, and volume. The approach also employs the principle of interleaved converters, as it can be extended to a generic number of legs per winding of the autotransformers and high power levels. A literature review of boost converters based on the 3SSC is initially presented so that key aspects are identified. The theoretical analysis of the proposed converter is then developed, while a comparison with a conventional boost converter is also performed. An experimental prototype rated at 1 kW is implemented to validate the proposal, as relevant issues regarding the novel converter are discussed.", "title": "" }, { "docid": "2e9d6ad38bd51fbd7af165e4b9262244", "text": "BACKGROUND\nThe assessment of blood lipids is very frequent in clinical research as it is assumed to reflect the lipid composition of peripheral tissues. Even well accepted such relationships have never been clearly established. This is particularly true in ophthalmology where the use of blood lipids has become very common following recent data linking lipid intake to ocular health and disease. In the present study, we wanted to determine in humans whether a lipidomic approach based on red blood cells could reveal associations between circulating and tissue lipid profiles. To check if the analytical sensitivity may be of importance in such analyses, we have used a double approach for lipidomics.\n\n\nMETHODOLOGY AND PRINCIPAL FINDINGS\nRed blood cells, retinas and optic nerves were collected from 9 human donors. The lipidomic analyses on tissues consisted in gas chromatography and liquid chromatography coupled to an electrospray ionization source-mass spectrometer (LC-ESI-MS). Gas chromatography did not reveal any relevant association between circulating and ocular fatty acids except for arachidonic acid whose circulating amounts were positively associated with its levels in the retina and in the optic nerve. In contrast, several significant associations emerged from LC-ESI-MS analyses. Particularly, lipid entities in red blood cells were positively or negatively associated with representative pools of retinal docosahexaenoic acid (DHA), retinal very-long chain polyunsaturated fatty acids (VLC-PUFA) or optic nerve plasmalogens.\n\n\nCONCLUSIONS AND SIGNIFICANCE\nLC-ESI-MS is more appropriate than gas chromatography for lipidomics on red blood cells, and further extrapolation to ocular lipids. The several individual lipid species we have identified are good candidates to represent circulating biomarkers of ocular lipids. However, further investigation is needed before considering them as indexes of disease risk and before using them in clinical studies on optic nerve neuropathies or retinal diseases displaying photoreceptors degeneration.", "title": "" }, { "docid": "47d9f0976e6a91a30330beb142ffe84e", "text": "Department of Defense (DoD) systems are required to be trusted and effective in a wide range of operational contexts with the ability to respond to new or changing conditions through modified tactics, appropriate reconfiguration, or replacement. As importantly, these systems are required to exhibit predictable and graceful degradation outside their designed performance envelope. For these systems to be included in the force structure, they need to be manufacturable, readily deployable, sustainable, easily modifiable, and cost-effective. Collectively, these requirements inform the definition of resilient DoD systems. This paper explores the properties and tradeoffs for engineered resilient systems in the military context. It reviews various perspectives on resilience, overlays DoD requirements on these perspectives, and presents DoD challenges in realizing and rapidly fielding resilient systems. This paper also presents promising research themes that need to be pursued by the research community to help the DoD realize the vision of affordable, adaptable, and effective systems. This paper concludes with a discussion of specific DoD systems that can potentially benefit from resilience and stresses the need for sustaining a community of interest in this important area. © 2014 The Authors. Published by Elsevier B.V. Selection and peer-review under responsibility of the University of Southern California.", "title": "" }, { "docid": "9430b0f220538e878d99ef410fdc1ab2", "text": "The prevalence of pregnancy, substance abuse, violence, and delinquency among young people is unacceptably high. Interventions for preventing problems in large numbers of youth require more than individual psychological interventions. Successful interventions include the involvement of prevention practitioners and community residents in community-level interventions. The potential of community-level interventions is illustrated by a number of successful studies. However, more inclusive reviews and multisite comparisons show that although there have been successes, many interventions did not demonstrate results. The road to greater success includes prevention science and newer community-centered models of accountability and technical assistance systems for prevention.", "title": "" }, { "docid": "c0a04710b74f0bb15da13794974d1fec", "text": "In this paper we propose a novel Conditional Random Field (CRF) formulation for the semantic scene labeling problem which is able to enforce temporal consistency between consecutive video frames and take advantage of the 3D scene geometry to improve segmentation quality. The main contribution of this work lies in the novel use of a 3D scene reconstruction as a means to temporally couple the individual image segmentations, allowing information flow from 3D geometry to the 2D image space. As our results show, the proposed framework outperforms state-of-the-art methods and opens a new perspective towards a tighter interplay of 2D and 3D information in the scene understanding problem.", "title": "" }, { "docid": "b20aa2222759644b4b60b5b450424c9e", "text": "Manufacturing has faced significant changes during the last years, namely the move from a local economy towards a global and competitive economy, with markets demanding for highly customized products of high quality at lower costs, and with short life cycles. In this environment, manufacturing enterprises, to remain competitive, must respond closely to customer demands by improving their flexibility and agility, while maintaining their productivity and quality. Dynamic response to emergence is becoming a key issue in manufacturing field because traditional manufacturing control systems are built upon rigid control architectures, which cannot respond efficiently and effectively to dynamic change. In these circumstances, the current challenge is to develop manufacturing control systems that exhibit intelligence, robustness and adaptation to the environment changes and disturbances. The introduction of multi-agent systems and holonic manufacturing systems paradigms addresses these requirements, bringing the advantages of modularity, decentralization, autonomy, scalability and reusability. This paper surveys the literature in manufacturing control systems using distributed artificial intelligence techniques, namely multi-agent systems and holonic manufacturing systems principles. The paper also discusses the reasons for the weak adoption of these approaches by industry and points out the challenges and research opportunities for the future. & 2008 Elsevier Ltd. All rights reserved.", "title": "" }, { "docid": "d45b23d061e4387f45a0dad03f237f5a", "text": "Cultural appropriation is often mentioned but undertheorized in critical rhetorical and media studies. Defined as the use of a culture’s symbols, artifacts, genres, rituals, or technologies by members of another culture, cultural appropriation can be placed into 4 categories: exchange, dominance, exploitation, and transculturation. Although each of these types can be understood as relevant to particular contexts or eras, transculturation questions the bounded and proprietary view of culture embedded in other types of appropriation. Transculturation posits culture as a relational phenomenon constituted by acts of appropriation, not an entity that merely participates in appropriation. Tensions exist between the need to challenge essentialism and the use of essentialist notions such as ownership and degradation to criticize the exploitation of colonized cultures.", "title": "" }, { "docid": "253ed173337319171a0dce877d23b7db", "text": "This paper describes a driving control algorithm for four-wheel-drive (4WD) electric vehicles equipped with two motors at front and rear driving shafts to improve vehicle maneuverability, lateral stability, and rollover prevention. The driving control algorithm consists of the following three parts: 1) a supervisory controller that determines the control mode, the admissible control region, and the desired dynamics, such as the desired speed and yaw rate; 2) an upper level controller that computes the traction force input and the yaw moment input to track the desired dynamics; and 3) a lower level controller that determines actual actuator commands, such as the front/rear driving motor torques and independent brake torques. The supervisory controller computes the admissible control region, namely, the relationship between the vehicle speed and the maximum curvature of the vehicle considering the maximum steering angle, lateral stability, and rollover prevention. In the lower level controller, a wheel slip controller is designed to keep the slip ratio at each wheel below a limit value. In addition, an optimization-based control allocation strategy is used to map the upper level and wheel slip control inputs to actual actuator commands, taking into account the actuator constraints. Numerical simulation studies have been conducted to evaluate the proposed driving control algorithm. It has been shown from simulation studies that vehicle maneuverability, lateral stability, and rollover mitigation performance can be significantly improved by the proposed driving controller.", "title": "" }, { "docid": "780019eebab5504fa0d8bc7c6d3fb0fd", "text": "Sentiment analysis or opinion mining is the computational study of people’s opinions, appraisals, attitudes, and emotions toward entities, individuals, issues, events, topics and their attributes. The task is technically challenging and practically very useful. For example, businesses always want to find public or consumer opinions about their products and services. Potential customers also want to know the opinions of existing users before they use a service or purchase a product. With the explosive growth of social media (i.e., reviews, forum discussions, blogs and social networks) on the Web, individuals and organizations are increasingly using public opinions in these media for their decision making. However, finding and monitoring opinion sites on the Web and distilling the information contained in them remains a formidable task because of the proliferation of diverse sites. Each site typically contains a huge volume of opinionated text that is not always easily deciphered in long forum postings and blogs. The average human reader will have difficulty identifying relevant sites and accurately summarizing the information and opinions contained in them. Moreover, it is also known that human analysis of text information is subject to considerable biases, e.g., people often pay greater attention to opinions that are consistent with their own preferences. People also have difficulty, owing to their mental and physical limitations, producing consistent", "title": "" }, { "docid": "a550969fc708fa6d7898ea29c0cedef8", "text": "This paper describes the findings of a research project whose main objective is to compile a character frequency list based on a very large collection of Chinese texts collected from various online sources. As compared with several previous studies on Chinese character frequencies, this project uses a much larger corpus that not only covers more subject fields but also contains a better proportion of informative versus imaginative Modern Chinese texts. In addition, this project also computes two bigram frequency lists that can be used for compiling a list of most frequently used two-character words in Chinese.", "title": "" }, { "docid": "77a09b094d4622d01d09f042f1ae3045", "text": "Depth maps captured by consumer-level depth cameras such as Kinect are usually degraded by noise, missing values, and quantization. In this paper, we present a data-driven approach for refining degraded RAWdepth maps that are coupled with an RGB image. The key idea of our approach is to take advantage of a training set of high-quality depth data and transfer its information to the RAW depth map through multi-scale dictionary learning. Utilizing a sparse representation, our method learns a dictionary of geometric primitives which captures the correlation between high-quality mesh data, RAW depth maps and RGB images. The dictionary is learned and applied in a manner that accounts for various practical issues that arise in dictionary-based depth refinement. Compared to previous approaches that only utilize the correlation between RAW depth maps and RGB images, our method produces improved depth maps without over-smoothing. Since our approach is data driven, the refinement can be targeted to a specific class of objects by employing a corresponding training set. In our experiments, we show that this leads to additional improvements in recovering depth maps of human faces.", "title": "" }, { "docid": "3fadc0d79b5ab97854f42d53919cf1a1", "text": "The field of biology has been revolutionized by the recent advancement of an adaptive bacterial immune system as a universal genome engineering tool. Bacteria and archaea use repetitive genomic elements termed clustered regularly interspaced short palindromic repeats (CRISPR) in combination with an RNA-guided nuclease (CRISPR-associated nuclease: Cas) to target and destroy invading DNA. By choosing the appropriate sequence of the guide RNA, this two-component system can be used to efficiently modify, target, and edit genomic loci of interest in plants, insects, fungi, mammalian cells, and whole organisms. This has opened up new frontiers in genome engineering, including the potential to treat or cure human genetic disorders. Now the potential risks as well as the ethical, social, and legal implications of this powerful new technique move into the limelight.", "title": "" } ]
scidocsrr
71a165ec484a007adf759bf85cb55490
Multi-domain Dialog State Tracking using Recurrent Neural Networks
[ { "docid": "7f74c519207e469c39f81d52f39438a0", "text": "Automatic sentiment classification has been extensively studied and applied in recent years. However, sentiment is expressed differently in different domains, and annotating corpora for every possible domain of interest is impractical. We investigate domain adaptation for sentiment classifiers, focusing on online reviews for different types of products. First, we extend to sentiment classification the recently-proposed structural correspondence learning (SCL) algorithm, reducing the relative error due to adaptation between domains by an average of 30% over the original SCL algorithm and 46% over a supervised baseline. Second, we identify a measure of domain similarity that correlates well with the potential for adaptation of a classifier from one domain to another. This measure could for instance be used to select a small set of domains to annotate whose trained classifiers would transfer well to many other domains.", "title": "" }, { "docid": "771b1e44b26f749f6ecd9fe515159d9c", "text": "In spoken dialog systems, dialog state tracking refers to the task of correctly inferring the user's goal at a given turn, given all of the dialog history up to that turn. This task is challenging because of speech recognition and language understanding errors, yet good dialog state tracking is crucial to the performance of spoken dialog systems. This paper presents results from the third Dialog State Tracking Challenge, a research community challenge task based on a corpus of annotated logs of human-computer dialogs, with a blind test set evaluation. The main new feature of this challenge is that it studied the ability of trackers to generalize to new entities - i.e. new slots and values not present in the training data. This challenge received 28 entries from 7 research teams. About half the teams substantially exceeded the performance of a competitive rule-based baseline, illustrating not only the merits of statistical methods for dialog state tracking but also the difficulty of the problem.", "title": "" } ]
[ { "docid": "5945081c099c883d238dca2a1dfc821e", "text": "Simulations using IPCC (Intergovernmental Panel on Climate Change)-class climate models are subject to fail or crash for a variety of reasons. Quantitative analysis of the failures can yield useful insights to better understand and improve the models. During the course of uncertainty quantification (UQ) ensemble simulations to assess the effects of ocean model parameter uncertainties on climate simulations, we experienced a series of simulation crashes within the Parallel Ocean Program (POP2) component of the Community Climate System Model (CCSM4). About 8.5 % of our CCSM4 simulations failed for numerical reasons at combinations of POP2 parameter values. We applied support vector machine (SVM) classification from machine learning to quantify and predict the probability of failure as a function of the values of 18 POP2 parameters. A committee of SVM classifiers readily predicted model failures in an independent validation ensemble, as assessed by the area under the receiver operating characteristic (ROC) curve metric (AUC > 0.96). The causes of the simulation failures were determined through a global sensitivity analysis. Combinations of 8 parameters related to ocean mixing and viscosity from three different POP2 parameterizations were the major sources of the failures. This information can be used to improve POP2 and CCSM4 by incorporating correlations across the relevant parameters. Our method can also be used to quantify, predict, and understand simulation crashes in other complex geoscientific models.", "title": "" }, { "docid": "d97be71f6af0cb60a6c732f464e04b99", "text": "The roles of mental health educators and professionals in the diffusion of mental health mobile apps are addressed in this viewpoint article. Mental health mobile apps are emerging technologies that fit under the broad heading of mobile health (mHealth). mHealth, encompassed within electronic health (eHealth), reflects the use of mobile devices for the practice of public health. Well-designed mental health mobile apps that present content in interactive, engaging, and stimulating ways can promote cognitive learning, personal growth, and mental health enhancement. As key influencers in the mental health social system, counselor educators and professional associations may either help or hinder diffusion of beneficial mHealth technologies. As mental health mobile apps move towards ubiquity, research will continue to be conducted. The studies published thus far, combined with the potential of mental health mobile apps for learning and personal growth, offer enough evidence to compel mental health professionals to infuse these technologies into education and practice. Counselor educators and professional associations must use their influential leadership roles to train students and practitioners in how to research, evaluate, and integrate mental health mobile apps into practice. The objectives of this article are to (1) increase awareness of mHealth and mental health mobile apps, (2) demonstrate the potential for continued growth in mental health mobile apps based on technology use and acceptance theory, mHealth organizational initiatives, and evidence about how humans learn, (3) discuss evidence-based benefits of mental health mobile apps, (4) examine the current state of mHealth diffusion in the mental health profession, and (5) offer solutions for impelling innovation diffusion by infusing mental health mobile apps into education, training, and clinical settings. This discussion has implications for counselor educators, mental health practitioners, associations, continuing education providers, and app developers.", "title": "" }, { "docid": "bfdfac980d1629f85f5bd57705b11b19", "text": "Deduplication is an approach of avoiding storing data blocks with identical content, and has been shown to effectively reduce the disk space for storing multi-gigabyte virtual machine (VM) images. However, it remains challenging to deploy deduplication in a real system, such as a cloud platform, where VM images are regularly inserted and retrieved. We propose LiveDFS, a live deduplication file system that enables deduplication storage of VM images in an open-source cloud that is deployed under low-cost commodity hardware settings with limited memory footprints. LiveDFS has several distinct features, including spatial locality, prefetching of metadata, and journaling. LiveDFS is POSIXcompliant and is implemented as a Linux kernel-space file system. We deploy our LiveDFS prototype as a storage layer in a cloud platform based on OpenStack, and conduct extensive experiments. Compared to an ordinary file system without deduplication, we show that LiveDFS can save at least 40% of space for storing VM images, while achieving reasonable performance in importing and retrieving VM images. Our work justifies the feasibility of deploying LiveDFS in an open-source cloud.", "title": "" }, { "docid": "fe5b87cacf87c6eab9c252cef41c24d8", "text": "The Filter Bank Common Spatial Pattern (FBCSP) algorithm employs multiple spatial filters to automatically select key temporal-spatial discriminative EEG characteristics and the Naïve Bayesian Parzen Window (NBPW) classifier using offline learning in EEG-based Brain-Computer Interfaces (BCI). However, it has yet to address the non-stationarity inherent in the EEG between the initial calibration session and subsequent online sessions. This paper presents the FBCSP that employs the NBPW classifier using online adaptive learning that augments the training data with available labeled data during online sessions. However, employing semi-supervised learning that simply augments the training data with available data using predicted labels can be detrimental to the classification accuracy. Hence, this paper presents the FBCSP using online semi-supervised learning that augments the training data with available data that matches the probabilistic model captured by the NBPW classifier using predicted labels. The performances of FBCSP using online adaptive and semi-supervised learning are evaluated on the BCI Competition IV datasets IIa and IIb and compared to the FBCSP using offline learning. The results showed that the FBCSP using online semi-supervised learning yielded relatively better session-to-session classification results compared against the FBCSP using offline learning. The FBCSP using online adaptive learning on true labels yielded the best results in both datasets, but the FBCSP using online semi-supervised learning on predicted labels is more practical in BCI applications where the true labels are not available.", "title": "" }, { "docid": "71553bfb1631b815ea7e4e6fc3035e28", "text": "Semi-supervised learning is a topic of practical importance because of the difficulty of obtaining numerous labeled data. In this paper, we apply an extension of adversarial autoencoder to semi-supervised learning tasks. In attempt to separate style and content, we divide the latent representation of the autoencoder into two parts. We regularize the autoencoder by imposing a prior distribution on both parts to make them independent. As a result, one of the latent representations is associated with content, which is useful to classify the images. We demonstrate that our method disentangles style and content of the input images and achieves less test error rate than vanilla autoencoder on MNIST semi-supervised classification tasks.", "title": "" }, { "docid": "23677c0107696de3cc630f424484284a", "text": "With the development of expressway, the vehicle path recognition based on RFID is designed and an Electronic Toll Collection system of expressway will be implemented. It uses a passive RFID tag as carrier to identify Actual vehicle path in loop road. The ETC system will toll collection without parking, also census traffic flow and audit road maintenance fees. It is necessary to improve expressway management.", "title": "" }, { "docid": "72c0fecdbcc27b6af98373dc3c03333b", "text": "The amino acid sequence of the heavy chain of Bombyx mori silk fibroin was derived from the gene sequence. The 5,263-residue (391-kDa) polypeptide chain comprises 12 low-complexity \"crystalline\" domains made up of Gly-X repeats and covering 94% of the sequence; X is Ala in 65%, Ser in 23%, and Tyr in 9% of the repeats. The remainder includes a nonrepetitive 151-residue header sequence, 11 nearly identical copies of a 43-residue spacer sequence, and a 58-residue C-terminal sequence. The header sequence is homologous to the N-terminal sequence of other fibroins with a completely different crystalline region. In Bombyx mori, each crystalline domain is made up of subdomains of approximately 70 residues, which in most cases begin with repeats of the GAGAGS hexapeptide and terminate with the GAAS tetrapeptide. Within the subdomains, the Gly-X alternance is strict, which strongly supports the classic Pauling-Corey model, in which beta-sheets pack on each other in alternating layers of Gly/Gly and X/X contacts. When fitting the actual sequence to that model, we propose that each subdomain forms a beta-strand and each crystalline domain a two-layered beta-sandwich, and we suggest that the beta-sheets may be parallel, rather than antiparallel, as has been assumed up to now.", "title": "" }, { "docid": "35dc0d377749ebc6a004ce42ee0d55a0", "text": "Two- and four-pole 0.7-1.1-GHz tunable bandpass-to-bandstop filters with bandwidth control are presented. The bandpass-to-bandstop transformation and the bandwidth control are achieved by adjusting the coupling coefficients in an asymmetrically loaded microstrip resonator. The source/load and input/output coupling coefficients are controlled using an RF microelectromechanical systems (RF MEMS) switch and a series coupling varactor, respectively. The two- and four-pole filters are built on a Duroid substrate with ε r=6.15 and h=25 mil. The tuning for the center frequency and the bandwidth is done using silicon varactor diodes, and RF MEMS switches are used for the bandpass-to-bandstop transformation. In the bandpass mode of the two-pole filter, a center frequency tuning of 0.78-1.10 GHz is achieved with a tunable 1-dB bandwidth of 68-120 MHz at 0.95 GHz. The rejection level of the two-pole bandstop mode is higher than 30 dB. The bandpass mode in the four-pole filter has a center frequency tuning of 0.76-1.08 GHz and a tunable 1-dB bandwidth of 64-115 MHz at 0.94 GHz. The rejection level of the four-pole bandstop mode is larger than 40 dB. The application areas are in wideband cognitive radios under high interference environments.", "title": "" }, { "docid": "b32b16971f9dd1375785a85617b3bd2a", "text": "White matter hyperintensities (WMHs) in the brain are the consequence of cerebral small vessel disease, and can easily be detected on MRI. Over the past three decades, research has shown that the presence and extent of white matter hyperintense signals on MRI are important for clinical outcome, in terms of cognitive and functional impairment. Large, longitudinal population-based and hospital-based studies have confirmed a dose-dependent relationship between WMHs and clinical outcome, and have demonstrated a causal link between large confluent WMHs and dementia and disability. Adequate differential diagnostic assessment and management is of the utmost importance in any patient, but most notably those with incipient cognitive impairment. Novel imaging techniques such as diffusion tensor imaging might reveal subtle damage before it is visible on standard MRI. Even in Alzheimer disease, which is thought to be primarily caused by amyloid, vascular pathology, such as small vessel disease, may be of greater importance than amyloid itself in terms of influencing the disease course, especially in older individuals. Modification of risk factors for small vessel disease could be an important therapeutic goal, although evidence for effective interventions is still lacking. Here, we provide a timely Review on WMHs, including their relationship with cognitive decline and dementia.", "title": "" }, { "docid": "2b266ebb64f14c3059938b34d72b8b19", "text": "Preprocessing is an important task and critical step in information retrieval and text mining. The objective of this study is to analyze the effect of preprocessing methods in text classification on Turkish texts. We compiled two large datasets from Turkish newspapers using a crawler. On these compiled data sets and using two additional datasets, we perform a detailed analysis of preprocessing methods such as stemming, stopword filtering and word weighting for Turkish text classification on several different Turkish datasets. We report the results of extensive experiments.", "title": "" }, { "docid": "fdd4c5fc773aa001da927ab3776559ae", "text": "We treated a 65-year-old Japanese man with a giant penile lymphedema due to chronic penile strangulation with a rubber band. He was referred to our hospital with progressive penile swelling that had developed over a period of 2 years from chronic use of a rubber band placed around the penile base for prevention of urinary incontinence. Under a diagnosis of giant penile lymphedema, we performed resection of abnormal penile skin weighing 4.8 kg, followed by a penile plasty procedure. To the best of our knowledge, this is only the seventh report of such a case worldwide, with the present giant penile lymphedema the most reported.", "title": "" }, { "docid": "a2f9c6f2e4833c0d1e8cd231de81740f", "text": "This paper presents a project named \"Vision of Future Energy Networks\", which aims at a greenfield approach for future energy systems. The definition of energy hubs and the conception of combined interconnector devices represent key approaches towards a multicarrier greenfield layout. Models and tools for technical, economical and environmental investigations in multicarrier energy systems have been developed and used in various case studies", "title": "" }, { "docid": "2e7513624eed605a4e0da539162dd715", "text": "In the domain of Internet of Things (IoT), applications are modeled to understand and react based on existing contextual and situational parameters. This work implements a management flow for the abstraction of real world objects and virtual composition of those objects to provide IoT services. We also present a real world knowledge model that aggregates constraints defining a situation, which is then used to detect and anticipate future potential situations. It is implemented based on reasoning and machine learning mechanisms. This work showcases a prototype implementation of the architectural framework in a smart home scenario, targeting two functionalities: actuation and automation based on the imposed constraints and thereby responding to situations and also adapting to the user preferences. It thus provides a productive integration of heterogeneous devices, IoT platforms, and cognitive technologies to improve the services provided to the user.", "title": "" }, { "docid": "5f483cfb3949e8feb109533344aa32be", "text": "Shadows and highlights represent a challenge to the computer vision researchers due to a variance in the brightness on the surfaces of the objects under consideration. This paper presents a new colour detection and segmentation algorithm for road signs in which the effect of shadows and highlights are neglected to get better colour segmentation results. Images are taken by a digital camera mounted in a car. The RGB images are converted into HSV colour space and the shadow-highlight invariant method is applied to extract the colours of the road signs under shadow and highlight conditions. The method is tested on hundreds of outdoor images under such light conditions, and it shows high robustness; more than 95% of correct segmentation is achieved", "title": "" }, { "docid": "8873369cf69e5de3b97875404f6aea64", "text": "BACKGROUND\nTobacco smoke exposure (TSE) is a worldwide health problem and it is considered a risk factor for pregnant women's and children's health, particularly for respiratory morbidity during the first year of life. Few significant birth cohort studies on the effect of prenatal TSE via passive and active maternal smoking on the development of severe bronchiolitis in early childhood have been carried out worldwide.\n\n\nMETHODS\nFrom November 2009 to December 2012, newborns born at ≥ 33 weeks of gestational age (wGA) were recruited in a longitudinal multi-center cohort study in Italy to investigate the effects of prenatal and postnatal TSE, among other risk factors, on bronchiolitis hospitalization and/or death during the first year of life.\n\n\nRESULTS\nTwo thousand two hundred ten newborns enrolled at birth were followed-up during their first year of life. Of these, 120 (5.4%) were hospitalized for bronchiolitis. No enrolled infants died during the study period. Prenatal passive TSE and maternal active smoking of more than 15 cigarettes/daily are associated to a significant increase of the risk of offspring children hospitalization for bronchiolitis, with an adjHR of 3.5 (CI 1.5-8.1) and of 1.7 (CI 1.1-2.6) respectively.\n\n\nCONCLUSIONS\nThese results confirm the detrimental effects of passive TSE and active heavy smoke during pregnancy for infants' respiratory health, since the exposure significantly increases the risk of hospitalization for bronchiolitis in the first year of life.", "title": "" }, { "docid": "2cccf75ea5ceeedf8b723dda71e64f3e", "text": "A memetic algorithm (MA), i.e. an evolutionary algorithm making use of local search, for the quadratic assignment problem is presented. A new recombination operator for realizing the approach is described, and the behavior of the MA is investigated on a set of problem instances containing between 25 and 100 facilities/locations. The results indicate that the proposed MA is able to produce high quality solutions quickly. A comparison of the MA with some of the currently best alternative approaches – reactive tabu search, robust tabu search and the fast ant colony system – demonstrates that the MA outperforms its competitors on all studied problem instances of practical interest.", "title": "" }, { "docid": "083989d115f6942b362c06936b2775ea", "text": "In humans, nearly two meters of genomic material must be folded to fit inside each micrometer-scale cell nucleus while remaining accessible for gene transcription, DNA replication, and DNA repair. This fact highlights the need for mechanisms governing genome organization during any activity and to maintain the physical organization of chromosomes at all times. Insight into the functions and three-dimensional structures of genomes comes mostly from the application of visual techniques such as fluorescence in situ hybridization (FISH) and molecular approaches including chromosome conformation capture (3C) technologies. Recent developments in both types of approaches now offer the possibility of exploring the folded state of an entire genome and maybe even the identification of how complex molecular machines govern its shape. In this review, we present key methodologies used to study genome organization and discuss what they reveal about chromosome conformation as it relates to transcription regulation across genomic scales in mammals.", "title": "" }, { "docid": "eafa6403e38d2ceb63ef7c00f84efe77", "text": "We propose a novel approach to learning distributed representations of variable-length text sequences in multiple languages simultaneously. Unlike previous work which often derive representations of multi-word sequences as weighted sums of individual word vectors, our model learns distributed representations for phrases and sentences as a whole. Our work is similar in spirit to the recent paragraph vector approach but extends to the bilingual context so as to efficiently encode meaning-equivalent text sequences of multiple languages in the same semantic space. Our learned embeddings achieve state-of-theart performance in the often used crosslingual document classification task (CLDC) with an accuracy of 92.7 for English to German and 91.5 for German to English. By learning text sequence representations as a whole, our model performs equally well in both classification directions in the CLDC task in which past work did not achieve.", "title": "" }, { "docid": "be7a33cc59e8fb297c994d046c6874d9", "text": "Purpose: Compressed sensing MRI (CS-MRI) from single and parallel coils is one of the powerful ways to reduce the scan time of MR imaging with performance guarantee. However, the computational costs are usually expensive. This paper aims to propose a computationally fast and accurate deep learning algorithm for the reconstruction of MR images from highly down-sampled k-space data. Theory: Based on the topological analysis, we show that the data manifold of the aliasing artifact is easier to learn from a uniform subsampling pattern with additional low-frequency k-space data. Thus, we develop deep aliasing artifact learning networks for the magnitude and phase images to estimate and remove the aliasing artifacts from highly accelerated MR acquisition. Methods: The aliasing artifacts are directly estimated from the distorted magnitude and phase images reconstructed from subsampled k-space data so that we can get an aliasing-free images by subtracting the estimated aliasing artifact from corrupted inputs. Moreover, to deal with the globally distributed aliasing artifact, we develop a multi-scale deep neural network with a large receptive field. Results: The experimental results confirm that the proposed deep artifact learning network effectively estimates and removes the aliasing artifacts. Compared to existing CS methods from single and multi-coli data, the proposed network shows minimal errors by removing the coherent aliasing artifacts. Furthermore, the computational time is by order of magnitude faster. Conclusion: As the proposed deep artifact learning network immediately generates accurate reconstruction, it has great potential for clinical applications.", "title": "" }, { "docid": "c3a85f2f7e70bc7059604377ac19d994", "text": "Processor concepts, implementation details, and performance analysis are fundamental in computer architecture education, and MIPS (microprocessor without interlocked pipeline stages) processor designs are used by many universities in teaching the subject. In this paper we present a MIPS32 processor simulator, which enriches students’ learning and instructors’ teaching experiences. A family of single-cycle, multi-cycle, and pipeline processor models for the MIPS32 architecture are developed according to the parallel Discrete Event System Specification (DEVS) modeling formalism. A collection of elementary sequential and combinational model components along with the processor models are implemented in DEVS-Suite. The simulator supports multi-level model abstractions, register-transfer level animation, performance data collection, and time-based trajectory observation. These features, which are partially supported by a few existing simulators, enable important structural and behavioral details of computer architectures to be described and understood. The MIPS processor models can be reused and systematically extended for modeling and simulating other MIPS processors.", "title": "" } ]
scidocsrr
ea7495832c065387ef038bcbe46f9e84
Combining Word2Vec with Revised Vector Space Model for Better Code Retrieval
[ { "docid": "ab148ea69cf884b2653823b350ed5cfc", "text": "The application of information retrieval techniques to search tasks in software engineering is made difficult by the lexical gap between search queries, usually expressed in natural language (e.g. English), and retrieved documents, usually expressed in code (e.g. programming languages). This is often the case in bug and feature location, community question answering, or more generally the communication between technical personnel and non-technical stake holders in a software project. In this paper, we propose bridging the lexical gap by projecting natural language statements and code snippets as meaning vectors in a shared representation space. In the proposed architecture, word embeddings are first trained on API documents, tutorials, and reference documents, and then aggregated in order to estimate semantic similarities between documents. Empirical evaluations show that the learned vector space embeddings lead to improvements in a previously explored bug localization task and a newly defined task of linking API documents to computer programming questions.", "title": "" } ]
[ { "docid": "1d7035cc5b85e13be6ff932d39740904", "text": "This paper investigates an application of mobile sensing: detection of potholes on roads. We describe a system and an associated algorithm to monitor the pothole conditions on the road. This system, that we call the Pothole Detection System, uses Accelerometer Sensor of Android smartphone for detection of potholes and GPS for plotting the location of potholes on Google Maps. Using a simple machine-learning approach, we show that we are able to identify the potholes from accelerometer data. The pothole detection algorithm detects the potholes in real-time. A runtime graph has been shown with the help of a charting software library ‘AChartEngine’. Accelerometer data and pothole data can be mailed to any email address in the form of a ‘.csv’ file. While designing the pothole detection algorithm we have assumed some threshold values on x-axis and z-axis. These threshold values are justified using a neural network technique which confirms an accuracy of 90%-95%. The neural network has been implemented using a machine learning framework available for Android called ‘Encog’. We evaluate our system on the outputs obtained using two, three and four wheelers. Keywords— Machine Learning, Context, Android, Neural Networks, Pothole, Sensor", "title": "" }, { "docid": "a3ad2be5b2b44277026ee9f84c0d416b", "text": "In order to attain a useful balanced scorecard (BSC), appropriate performance perspectives and indicators are crucial to reflect all strategies of the organisation. The objectives of this survey were to give an insight regarding the situation of the BSC in the health sector over the past decade, and to afford a generic approach of the BSC development for health settings with specific focus on performance perspectives, performance indicators and BSC generation. After an extensive search based on publication date and research content, 29 articles published since 2002 were identified, categorised and analysed. Four critical attributes of each article were analysed, including BSC generation, performance perspectives, performance indicators and auxiliary tools. The results showed that 'internal business process' was the most notable BSC perspective as it was included in all reviewed articles. After investigating the literature, it was concluded that its comprehensiveness is the reason for the importance and high usage of this perspective. The findings showed that 12 cases out of 29 reviewed articles (41%) exceeded the maximum number of key performance indicators (KPI) suggested in a previous study. It was found that all 12 cases were large organisations with numerous departments (e.g. national health organisations). Such organisations require numerous KPI to cover all of their strategic objectives. It was recommended to utilise the cascaded BSC within such organisations to avoid complexity and difficulty in gathering, analysing and interpreting performance data. Meanwhile it requires more medical staff to contribute in BSC development, which will result in greater reliability of the BSC.", "title": "" }, { "docid": "2445f9a80dc0f31ea39ade0ae8941f26", "text": "Various groups of ascertainable individuals have been granted the status of “persons” under American law, while that status has been denied to other groups This article examines various analogies that might be drawn by courts in deciding whether to extend “person” status to intelligent machines, and the limitations that might be placed upon such recognition As an alternative analysis: this article questions the legal status of various human/machine interfaces, and notes the difficulty in establishing an absolute point beyond which legal recognition will not extend COMPUTERS INCREASINGLY RESEMBLE their human creators More precisely, it is becoming increasingly difficult to distinguish some computer information-processing from that of humans, judging from the final product. Computers have proven capable of far more physical and mental “human” functions than most people believed was possible. The increasing similarity between humans and machines might eventually require legal recognition of computers as “persons.” In the United States, there are two triers t’o such Views expressed here are those of the author @ Llarshal S. Willick 1982 41 rights reserved Editor’s Note: This article is written by an attorney using a common reference style for legal citations The system of citation is more complex than systems ordinarily used in scientific publications since it must provide numerous variations for different sources of evidence and jurisdictions We have decided not to change t.his article’s format for citations. legal recognition. The first tier determines which ascertainable individuals are considered persons (e g., blacks, yes; fetuses, no.) The second tier determines which rights and obligations are vested in the recognized persons, based on their observed or presumed capacities (e.g., the insane are restricted; eighteen-year-olds can vote.) The legal system is more evolutionary than revolutionary, however. Changes in which individuals should be recognized as persons under the law tend to be in response to changing cult,ural and economic realities, rather than the result of advance planning. Similarly, shifts in the allocation of legal rights and obligations are usually the result of societal pressures that do not result from a dispassionate masterplanning of society. Courts attempt to analogize new problems to those previously settled, where possible: the process is necessarily haphazard. As “intelligent” machines appear, t,hey will pervade a society in which computers play an increasingly significant part, but in which they will have no recognized legal personality. The question of what rights they should have will most probably not have been addressed. It is therefore most likely that computers will enter the legal arena through the courts The myriad acts of countless individuals will eventually give rise to a situat,ion in which some judicial decision regarding computer personality is needed in order to determine the rights of the parties to a THE AI MAGAZINE Summer 1983 5 AI Magazine Volume 4 Number 2 (1983) (© AAAI)", "title": "" }, { "docid": "8fc89fce21bd4f8dced2265b9a8cdfe7", "text": "With the rapid development of 3GPP and its related techniques, evaluation of system level performance is in great need. However, LTE system level simulator is secured as commercial secrets in most 3GPP members. In this paper, we introduce our Matlab-based LTE system level simulator according to 3GPP specifications and related proposals. We mainly focus on channel model and physical abstract of transmission. Brief introduction of every part is given and physical concept and analysis are given.", "title": "" }, { "docid": "f3ca98a8e0600f0c80ef539cfc58e77e", "text": "In this paper, we address a real life waste collection vehicle routing problem with time windows (VRPTW) with consideration of multiple disposal trips and drivers’ lunch breaks. Solomon’s well-known insertion algorithm is extended for the problem. While minimizing the number of vehicles and total traveling time is the major objective of vehicle routing problems in the literature, here we also consider the route compactness and workload balancing of a solution since they are very important aspects in practical applications. In order to improve the route compactness and workload balancing, a capacitated clustering-based waste collection VRPTW algorithm is developed. The proposed algorithms have been successfully implemented and deployed for the real life waste collection problems at Waste Management, Inc. A set of waste collection VRPTW benchmark problems is also presented in this paper. Waste collection problems are frequently considered as arc routing problems without time windows. However, that point of view can be applied only to residential waste collection problems. In the waste collection industry, there are three major areas: commercial waste collection, residential waste collection and roll-on-roll-off. In this paper, we mainly focus on the commercial waste collection problem. The problem can be characterized as a variant of VRPTW since commercial waste collection stops may have time windows. The major variation from a standard VRPTW is due to disposal operations and driver’s lunch break. When a vehicle is full, it needs to go to one of the disposal facilities (landfill or transfer station). Each vehicle can, and typically does, make multiple disposal trips per day. The purpose of this paper is to introduce the waste collection VRPTW, benchmark problem sets, and a solution approach for the problem. The proposed algorithms have been successfully implemented and deployed for the real life waste collection problems of Waste Management, the leading provider of comprehensive waste management services in North America with nearly 26,000 collection and transfer vehicles. 2005 Elsevier Ltd. All rights reserved.", "title": "" }, { "docid": "57947e5564eb2ab774677a32731c4bcd", "text": "Efforts to improve online learning have focused primarily on the technology platform for delivering educational content and supporting student discourse. In this paper we describe an alternative approach that invokes two powerful forces behind human learning: narrative and agency. Each of these constructs and their potential impacts on learning is reviewed, and the design of a large-enrollment online undergraduate course that leverages these elements is described. A study of student learning and engagement was conducted using surveys and an analysis of student projects on 96 students enrolled in the new course. Surveys were also administered to 129 students taking a traditional online course in other departments to provide a comparison data set. Results of this study indicated significant benefits of employing narrative and increasing student choice on interest and perceived relevance of the course material, critical thinking, and the acquisition of design skills. We conclude by discussing the implications of these results on the design of online instructional environments generally, and call for the increased adoption of interactive storytelling elements into web-based learning platforms.", "title": "" }, { "docid": "6dd151a412531cfaf043e5cef616769b", "text": "In this paper a pattern classification and object recognition approach based on bio-inspired techniques is presented. It exploits the Hierarchical Temporal Memory (HTM) topology, which imitates human neocortex for recognition and categorization tasks. The HTM comprises a hierarchical tree structure that exploits enhanced spatiotemporal modules to memorize objects appearing in various orientations. In accordance with HTM's biological inspiration, human vision mechanisms can be used to preprocess the input images. Therefore, the input images undergo a saliency computation step, revealing the plausible information of the scene, where a human might fixate. The adoption of the saliency detection module releases the HTM network from memorizing redundant information and augments the classification accuracy. The efficiency of the proposed framework has been experimentally evaluated in the ETH-80 dataset, and the classification accuracy has been found to be greater than other HTM systems.", "title": "" }, { "docid": "bec4932c66f8a8a87c1967ca42ad4315", "text": "Nowadays, the number of layers and of neurons in each layer of a deep network are typically set manually. While very deep and wide networks have proven effective in general, they come at a high memory and computation cost, thus making them impractical for constrained platforms. These networks, however, are known to have many redundant parameters, and could thus, in principle, be replaced by more compact architectures. In this paper, we introduce an approach to automatically determining the number of neurons in each layer of a deep network during learning. To this end, we propose to make use of a group sparsity regularizer on the parameters of the network, where each group is defined to act on a single neuron. Starting from an overcomplete network, we show that our approach can reduce the number of parameters by up to 80% while retaining or even improving the network accuracy.", "title": "" }, { "docid": "b987f831f4174ad5d06882040769b1ac", "text": "Any opinions, findings, and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the National Science Foundation. 1 Summary Application trends, device technologies and the architecture of systems drive progress in information technologies. However,", "title": "" }, { "docid": "620642c5437dc26cac546080c4465707", "text": "One of the most distinctive linguistic characteristics of modern academic writing is its reliance on nominalized structures. These include nouns that have been morphologically derived from verbs (e.g., development, progression) as well as verbs that have been ‘converted’ to nouns (e.g., increase, use). Almost any sentence taken from an academic research article will illustrate the use of such structures. For example, consider the opening sentences from three education research articles; derived nominalizations are underlined and converted nouns given in italics: 1", "title": "" }, { "docid": "ac860d650b5a846cbe4377ee70c0a656", "text": "We explore the capacity for music in terms of five questions: (1) What cognitive structures are invoked by music? (2) What are the principles that create these structures? (3) How do listeners acquire these principles? (4) What pre-existing resources make such acquisition possible? (5) Which aspects of these resources are specific to music, and which are more general? We examine these issues by looking at the major components of musical organization: rhythm (an interaction of grouping and meter), tonal organization (the structure of melody and harmony), and affect (the interaction of music with emotion). Each domain reveals a combination of cognitively general phenomena, such as gestalt grouping principles, harmonic roughness, and stream segregation, with phenomena that appear special to music and language, such as metrical organization. These are subtly interwoven with a residue of components that are devoted specifically to music, such as the structure of tonal systems and the contours of melodic tension and relaxation that depend on tonality. In the domain of affect, these components are especially tangled, involving the interaction of such varied factors as general-purpose aesthetic framing, communication of affect by tone of voice, and the musically specific way that tonal pitch contours evoke patterns of posture and gesture.", "title": "" }, { "docid": "aa6a22096c633072b1e362f20e18a4e4", "text": "In this paper, we propose a new deep framework which predicts facial attributes and leverage it as a soft modality to improve face identification performance. Our model is an end to end framework which consists of a convolutional neural network (CNN) whose output is fanned out into two separate branches; the first branch predicts facial attributes while the second branch identifies face images. Contrary to the existing multi-task methods which only use a shared CNN feature space to train these two tasks jointly, we fuse the predicted attributes with the features from the face modality in order to improve the face identification performance. Experimental results show that our model brings benefits to both face identification as well as facial attribute prediction performance, especially in the case of identity facial attributes such as gender prediction. We tested our model on two standard datasets annotated by identities and face attributes. Experimental results indicate that the proposed model outperforms most of the current existing face identification and attribute prediction methods.", "title": "" }, { "docid": "0c8947cbaa2226a024bf3c93541dcae1", "text": "As storage systems grow in size and complexity, they are increasingly confronted with concurrent disk failures together with multiple unrecoverable sector errors. To ensure high data reliability and availability, erasure codes with high fault tolerance are required. In this article, we present a new family of erasure codes with high fault tolerance, named GRID codes. They are called such because they are a family of strip-based codes whose strips are arranged into multi-dimensional grids. In the construction of GRID codes, we first introduce a concept of matched codes and then discuss how to use matched codes to construct GRID codes. In addition, we propose an iterative reconstruction algorithm for GRID codes. We also discuss some important features of GRID codes. Finally, we compare GRID codes with several categories of existing codes. Our comparisons show that for large-scale storage systems, our GRID codes have attractive advantages over many existing erasure codes: (a) They are completely XOR-based and have very regular structures, ensuring easy implementation; (b) they can provide up to 15 and even higher fault tolerance; and (c) their storage efficiency can reach up to 80% and even higher. All the advantages make GRID codes more suitable for large-scale storage systems.", "title": "" }, { "docid": "e306933b27867c99585d7fc82cc380ff", "text": "We introduce a new OS abstraction—light-weight contexts (lwCs)—that provides independent units of protection, privilege, and execution state within a process. A process may include several lwCs, each with possibly different views of memory, file descriptors, and access capabilities. lwCs can be used to efficiently implement roll-back (process can return to a prior recorded state), isolated address spaces (lwCs within the process may have different views of memory, e.g., isolating sensitive data from network-facing components or isolating different user sessions), and privilege separation (in-process reference monitors can arbitrate and control access). lwCs can be implemented efficiently: the overhead of a lwC is proportional to the amount of memory exclusive to the lwC; switching lwCs is quicker than switching kernel threads within the same process. We describe the lwC abstraction and API, and an implementation of lwCs within the FreeBSD 11.0 kernel. Finally, we present an evaluation of common usage patterns, including fast rollback, session isolation, sensitive data isolation, and inprocess reference monitoring, using Apache, nginx, PHP, and OpenSSL.", "title": "" }, { "docid": "7f146edc6c98638ee48afd938895c1df", "text": "Organizational law empowers firms to hold assets and enter contracts as entities that are legally distinct from their owners and managers. Legal scholars and economists have commented extensively on one form of this partitioning between firms and owners: namely, the rule of limited liability that insulates firm owners from business debts. But a less-noticed form of legal partitioning, which we call \"entity shielding,\" is both economically and historically more significant than limited liability. While limited liability shields owners' personal assets from a firm's creditors, entity shielding protects firm assets from the owners' personal creditors (and from creditors of other business ventures), thus reserving those assets for the firm's creditors. Entity shielding creates important economic benefits, including a lower cost of credit for firm owners, reduced bankruptcy administration costs, enhanced stability, and the possibility of a market in shares. But entity shielding also imposes costs by requiring specialized legal and business institutions and inviting opportunism vis-d-vis both personal and business creditors. The changing balance of these benefits and costs illuminates the evolution of legal entities across time and societies. To both illustrate and test this proposition, we describe the development of entity shielding in four historical epochs: ancient Rome, the Italian Middle Ages, England of the seventeenth to nineteenth centuries, and the United States from the nineteenth century to the present.", "title": "" }, { "docid": "6c64e7ca2e41a6eb70fe39747b706bf8", "text": "Network Functions Virtualization (NFV) has enabled operators to dynamically place and allocate resources for network services to match workload requirements. However, unbounded end-to-end (e2e) latency of Service Function Chains (SFCs) resulting from distributed Virtualized Network Function (VNF) deployments can severely degrade performance. In particular, SFC instantiations with inter-data center links can incur high e2e latencies and Service Level Agreement (SLA) violations. These latencies can trigger timeouts and protocol errors with latency-sensitive operations.\n Traditional solutions to reduce e2e latency involve physical deployment of service elements in close proximity. These solutions are, however, no longer viable in the NFV era. In this paper, we present our solution that bounds the e2e latency in SFCs and inter-VNF control message exchanges by creating micro-service aggregates based on the affinity between VNFs. Our system, Contain-ed, dynamically creates and manages affinity aggregates using light-weight virtualization technologies like containers, allowing them to be placed in close proximity and hence bounding the e2e latency. We have applied Contain-ed to the Clearwater IP Multimedia System and built a proof-of-concept. Our results demonstrate that, by utilizing application and protocol specific knowledge, affinity aggregates can effectively bound SFC delays and significantly reduce protocol errors and service disruptions.", "title": "" }, { "docid": "2e7513624eed605a4e0da539162dd715", "text": "In the domain of Internet of Things (IoT), applications are modeled to understand and react based on existing contextual and situational parameters. This work implements a management flow for the abstraction of real world objects and virtual composition of those objects to provide IoT services. We also present a real world knowledge model that aggregates constraints defining a situation, which is then used to detect and anticipate future potential situations. It is implemented based on reasoning and machine learning mechanisms. This work showcases a prototype implementation of the architectural framework in a smart home scenario, targeting two functionalities: actuation and automation based on the imposed constraints and thereby responding to situations and also adapting to the user preferences. It thus provides a productive integration of heterogeneous devices, IoT platforms, and cognitive technologies to improve the services provided to the user.", "title": "" }, { "docid": "f96098449988c433fe8af20be0c468a5", "text": "Programmatic assessment is an integral approach to the design of an assessment program with the intent to optimise its learning function, its decision-making function and its curriculum quality-assurance function. Individual methods of assessment, purposefully chosen for their alignment with the curriculum outcomes and their information value for the learner, the teacher and the organisation, are seen as individual data points. The information value of these individual data points is maximised by giving feedback to the learner. There is a decoupling of assessment moment and decision moment. Intermediate and high-stakes decisions are based on multiple data points after a meaningful aggregation of information and supported by rigorous organisational procedures to ensure their dependability. Self-regulation of learning, through analysis of the assessment information and the attainment of the ensuing learning goals, is scaffolded by a mentoring system. Programmatic assessment-for-learning can be applied to any part of the training continuum, provided that the underlying learning conception is constructivist. This paper provides concrete recommendations for implementation of programmatic assessment.", "title": "" }, { "docid": "2549ed70fd2e06c749bf00193dad1f4d", "text": "Phenylketonuria (PKU) is an inborn error of metabolism caused by deficiency of the hepatic enzyme phenylalanine hydroxylase (PAH) which leads to high blood phenylalanine (Phe) levels and consequent damage of the developing brain with severe mental retardation if left untreated in early infancy. The current dietary Phe restriction treatment has certain clinical limitations. To explore a long-term nondietary restriction treatment, a somatic gene transfer approach in a PKU mouse model (C57Bl/6-Pahenu2) was employed to examine its preclinical feasibility. A recombinant adeno-associated virus (rAAV) vector containing the murine Pah-cDNA was generated, pseudotyped with capsids from AAV serotype 8, and delivered into the liver of PKU mice via single intraportal or tail vein injections. The blood Phe concentrations decreased to normal levels (⩽100 μM or 1.7 mg/dl) 2 weeks after vector application, independent of the sex of the PKU animals and the route of application. In particular, the therapeutic long-term correction in females was also dramatic, which had previously been shown to be difficult to achieve. Therapeutic ranges of Phe were accompanied by the phenotypic reversion from brown to black hair. In treated mice, PAH enzyme activity in whole liver extracts reversed to normal and neither hepatic toxicity nor immunogenicity was observed. In contrast, a lentiviral vector expressing the murine Pah-cDNA, delivered via intraportal vein injection into PKU mice, did not result in therapeutic levels of blood Phe. This study demonstrates the complete correction of hyperphenylalaninemia in both males and females with a rAAV serotype 8 vector. More importantly, the feasibility of a single intravenous injection may pave the way to develop a clinical gene therapy procedure for PKU patients.", "title": "" }, { "docid": "3b223e17f557e1e1416bea70fe0d7e9b", "text": "Comments left by readers on Web documents contain valuable information that can be utilized in different information retrieval tasks including document search, visualization, and summarization. In this paper, we study the problem of comments-oriented document summarization and aim to summarize a Web document (e.g., a blog post) by considering not only its content, but also the comments left by its readers. We identify three relations (namely, topic, quotation, and mention) by which comments can be linked to one another, and model the relations in three graphs. The importance of each comment is then scored by: (i) graph-based method, where the three graphs are merged into a multi-relation graph; (ii) tensor-based method, where the three graphs are used to construct a 3rd-order tensor. To generate a comments-oriented summary, we extract sentences from the given Web document using either feature-biased approach or uniform-document approach. The former scores sentences to bias keywords derived from comments; while the latter scores sentences uniformly with comments. In our experiments using a set of blog posts with manually labeled sentences, our proposed summarization methods utilizing comments showed significant improvement over those not using comments. The methods using feature-biased sentence extraction approach were observed to outperform that using uniform-document approach.", "title": "" } ]
scidocsrr
ca7f9c13b421775d3be20c6c5650234d
Speech-Based Visual Question Answering
[ { "docid": "4337f8c11a71533d38897095e5e6847a", "text": "A number of recent works have proposed attention models for Visual Question Answering (VQA) that generate spatial maps highlighting image regions relevant to answering the question. In this paper, we argue that in addition to modeling “where to look” or visual attention, it is equally important to model “what words to listen to” or question attention. We present a novel co-attention model for VQA that jointly reasons about image and question attention. In addition, our model reasons about the question (and consequently the image via the co-attention mechanism) in a hierarchical fashion via a novel 1-dimensional convolution neural networks (CNN). Our model improves the state-of-the-art on the VQA dataset from 60.3% to 60.5%, and from 61.6% to 63.3% on the COCO-QA dataset. By using ResNet, the performance is further improved to 62.1% for VQA and 65.4% for COCO-QA.1. 1 Introduction Visual Question Answering (VQA) [2, 7, 16, 17, 29] has emerged as a prominent multi-discipline research problem in both academia and industry. To correctly answer visual questions about an image, the machine needs to understand both the image and question. Recently, visual attention based models [20, 23–25] have been explored for VQA, where the attention mechanism typically produces a spatial map highlighting image regions relevant to answering the question. So far, all attention models for VQA in literature have focused on the problem of identifying “where to look” or visual attention. In this paper, we argue that the problem of identifying “which words to listen to” or question attention is equally important. Consider the questions “how many horses are in this image?” and “how many horses can you see in this image?\". They have the same meaning, essentially captured by the first three words. A machine that attends to the first three words would arguably be more robust to linguistic variations irrelevant to the meaning and answer of the question. Motivated by this observation, in addition to reasoning about visual attention, we also address the problem of question attention. Specifically, we present a novel multi-modal attention model for VQA with the following two unique features: Co-Attention: We propose a novel mechanism that jointly reasons about visual attention and question attention, which we refer to as co-attention. Unlike previous works, which only focus on visual attention, our model has a natural symmetry between the image and question, in the sense that the image representation is used to guide the question attention and the question representation(s) are used to guide image attention. Question Hierarchy: We build a hierarchical architecture that co-attends to the image and question at three levels: (a) word level, (b) phrase level and (c) question level. At the word level, we embed the words to a vector space through an embedding matrix. At the phrase level, 1-dimensional convolution neural networks are used to capture the information contained in unigrams, bigrams and trigrams. The source code can be downloaded from https://github.com/jiasenlu/HieCoAttenVQA 30th Conference on Neural Information Processing Systems (NIPS 2016), Barcelona, Spain. ar X iv :1 60 6. 00 06 1v 3 [ cs .C V ] 2 6 O ct 2 01 6 Ques%on:\t\r What\t\r color\t\r on\t\r the stop\t\r light\t\r is\t\r lit\t\r up\t\r \t\r ? ...\t\r ... color\t\r stop\t\r light\t\r lit co-­‐a7en%on color\t\r ...\t\r stop\t\r \t\r light\t\r \t\r ... What color\t\r ... the stop light light\t\r \t\r ... What color What\t\r color\t\r on\t\r the\t\r stop\t\r light\t\r is\t\r lit\t\r up ...\t\r ... the\t\r stop\t\r light ...\t\r ... stop Image Answer:\t\r green Figure 1: Flowchart of our proposed hierarchical co-attention model. Given a question, we extract its word level, phrase level and question level embeddings. At each level, we apply co-attention on both the image and question. The final answer prediction is based on all the co-attended image and question features. Specifically, we convolve word representations with temporal filters of varying support, and then combine the various n-gram responses by pooling them into a single phrase level representation. At the question level, we use recurrent neural networks to encode the entire question. For each level of the question representation in this hierarchy, we construct joint question and image co-attention maps, which are then combined recursively to ultimately predict a distribution over the answers. Overall, the main contributions of our work are: • We propose a novel co-attention mechanism for VQA that jointly performs question-guided visual attention and image-guided question attention. We explore this mechanism with two strategies, parallel and alternating co-attention, which are described in Sec. 3.3; • We propose a hierarchical architecture to represent the question, and consequently construct image-question co-attention maps at 3 different levels: word level, phrase level and question level. These co-attended features are then recursively combined from word level to question level for the final answer prediction; • At the phrase level, we propose a novel convolution-pooling strategy to adaptively select the phrase sizes whose representations are passed to the question level representation; • Finally, we evaluate our proposed model on two large datasets, VQA [2] and COCO-QA [17]. We also perform ablation studies to quantify the roles of different components in our model.", "title": "" }, { "docid": "41b745c7958ca8576b4cd7394ad47f44", "text": "We learn rich natural sound representations by capitalizing on large amounts of unlabeled sound data collected in the wild. We leverage the natural synchronization between vision and sound to learn an acoustic representation using two-million unlabeled videos. Unlabeled video has the advantage that it can be economically acquired at massive scales, yet contains useful signals about natural sound. We propose a student-teacher training procedure which transfers discriminative visual knowledge from well established visual recognition models into the sound modality using unlabeled video as a bridge. Our sound representation yields significant performance improvements over the state-of-the-art results on standard benchmarks for acoustic scene/object classification. Visualizations suggest some high-level semantics automatically emerge in the sound network, even though it is trained without ground truth labels.", "title": "" } ]
[ { "docid": "7d175a93272a079b9bd2d4a691660a50", "text": "Dermatitis herpetiformis (DH) is a chronic, polymorphic, pruritic skin disease that develops mostly in patients with latent gluten-sensitive enteropathy. DH patients usually present with skin manifestations only and are not aware of the underlying small-bowel problems. Owing to the granular immunoglobulin (Ig) A deposition at the tips of the papillary dermis and to the subepidermal blister formation associated with neutrophilic accumulations underlying the basement membrane, DH is considered to be an autoimmune blistering disease. Contrary to the other bullous disorders, DH patients have no circulating autoantibodies binding to the cutaneous basement membrane components or to other adherent structures of the skin, but they have gluten-induced IgA autoantibodies against transglutaminase (TG) 2 and TG3. The serum IgA against tissue TG2 is a most specific and sensitive serologic marker of gluten-sensitive enteropathy and is equivalent to the perviously described IgA endomysium antibodies. DH could be a cutaneous IgA-epidermal TG3 immunocomplex disease, developing only in a few patients with gluten-sensitive enteropathy as a second gluten-dependent disease. The main treatment of DH today is a strict, life-long gluten-free diet. Untreated DH patients should be regularly monitored for malabsorption and lymphomas. Associated autoimmune diseases are more common among DH patients. Family screening for gluten sensitivity is also strongly suggested.", "title": "" }, { "docid": "af2f9dd69e90ed3c61e09b5b53fa1cdb", "text": "Cellular networks are one of the cornerstones of our information-driven society. However, existing cellular systems have been seriously challenged by the explosion of mobile data traffic, the emergence of machine-type communications, and the flourishing of mobile Internet services. In this article, we propose CONCERT, a converged edge infrastructure for future cellular communications and mobile computing services. The proposed architecture is constructed based on the concept of control/data (C/D) plane decoupling. The data plane includes heterogeneous physical resources such as radio interface equipment, computational resources, and software-defined switches. The control plane jointly coordinates physical resources to present them as virtual resources, over which software-defined services including communications, computing, and management can be deployed in a flexible manner. Moreover, we introduce new designs for physical resources placement and task scheduling so that CONCERT can overcome the drawbacks of the existing baseband-up centralization approach and better facilitate innovations in next-generation cellular networks. These advantages are demonstrated with application examples on radio access networks with C/D decoupled air interface, delaysensitive machine-type communications, and realtime mobile cloud gaming. We also discuss some fundamental research issues arising with the proposed architecture to illuminate future research directions.", "title": "" }, { "docid": "7fbc4db77312a4ee26cf6565b36d9664", "text": "This paper describes a novel system for creating virtual creatures that move and behave in simulated three-dimensional physical worlds. The morphologies of creatures and the neural systems for controlling their muscle forces are both generated automatically using genetic algorithms. Different fitness evaluation functions are used to direct simulated evolutions towards specific behaviors such as swimming, walking, jumping, and following.\nA genetic language is presented that uses nodes and connections as its primitive elements to represent directed graphs, which are used to describe both the morphology and the neural circuitry of these creatures. This genetic language defines a hyperspace containing an indefinite number of possible creatures with behaviors, and when it is searched using optimization techniques, a variety of successful and interesting locomotion strategies emerge, some of which would be difficult to invent or built by design.", "title": "" }, { "docid": "f7fa13048b42a566d8621f267141f80d", "text": "The software underpinning today's IT systems needs to adapt dynamically and predictably to rapid changes in system workload, environment and objectives. We describe a software framework that achieves such adaptiveness for IT systems whose components can be modelled as Markov chains. The framework comprises (i) an autonomic architecture that uses Markov-chain quantitative analysis to dynamically adjust the parameters of an IT system in line with its state, environment and objectives; and (ii) a method for developing instances of this architecture for real-world systems. Two case studies are presented that use the framework successfully for the dynamic power management of disk drives, and for the adaptive management of cluster availability within data centres, respectively.", "title": "" }, { "docid": "3e409a01cfc02c0b89bae310c3f693fe", "text": "The last ten years have seen an increasing interest, within cognitive science, in issues concerning the physical body, the local environment, and the complex interplay between neural systems and the wider world in which they function. Yet many unanswered questions remain, and the shape of a genuinely physically embodied, environmentally embedded science of the mind is still unclear. In this article I will raise a number of critical questions concerning the nature and scope of this approach, drawing a distinction between two kinds of appeal to embodiment: (1) 'Simple' cases, in which bodily and environmental properties merely constrain accounts that retain the focus on inner organization and processing; and (2) More radical appeals, in which attention to bodily and environmental features is meant to transform both the subject matter and the theoretical framework of cognitive science.", "title": "" }, { "docid": "6533c68c486f01df6fbe80993a9902a1", "text": "Frequent pattern mining has been a focused theme in data mining research for over a decade. Abundant literature has been dedicated to this research and tremendous progress has been made, ranging from efficient and scalable algorithms for frequent itemset mining in transaction databases to numerous research frontiers, such as sequential pattern mining, structured pattern mining, correlation mining, associative classification, and frequent pattern-based clustering, as well as their broad applications. In this article, we provide a brief overview of the current status of frequent pattern mining and discuss a few promising research directions. We believe that frequent pattern mining research has substantially broadened the scope of data analysis and will have deep impact on data mining methodologies and applications in the long run. However, there are still some challenging research issues that need to be solved before frequent pattern mining can claim a cornerstone approach in data mining applications.", "title": "" }, { "docid": "f70c07e15c4070edf75e8846b4dff0b3", "text": "Polyphenols, including flavonoids, phenolic acids, proanthocyanidins and resveratrol, are a large and heterogeneous group of phytochemicals in plant-based foods, such as tea, coffee, wine, cocoa, cereal grains, soy, fruits and berries. Growing evidence indicates that various dietary polyphenols may influence carbohydrate metabolism at many levels. In animal models and a limited number of human studies carried out so far, polyphenols and foods or beverages rich in polyphenols have attenuated postprandial glycemic responses and fasting hyperglycemia, and improved acute insulin secretion and insulin sensitivity. The possible mechanisms include inhibition of carbohydrate digestion and glucose absorption in the intestine, stimulation of insulin secretion from the pancreatic beta-cells, modulation of glucose release from the liver, activation of insulin receptors and glucose uptake in the insulin-sensitive tissues, and modulation of intracellular signalling pathways and gene expression. The positive effects of polyphenols on glucose homeostasis observed in a large number of in vitro and animal models are supported by epidemiological evidence on polyphenol-rich diets. To confirm the implications of polyphenol consumption for prevention of insulin resistance, metabolic syndrome and eventually type 2 diabetes, human trials with well-defined diets, controlled study designs and clinically relevant end-points together with holistic approaches e.g., systems biology profiling technologies are needed.", "title": "" }, { "docid": "29ba9c1cccea263a4db25da4352da754", "text": "Distance metric learning is a fundamental problem in data mining and knowledge discovery. Many representative data mining algorithms, such as $$k$$ k -nearest neighbor classifier, hierarchical clustering and spectral clustering, heavily rely on the underlying distance metric for correctly measuring relations among input data. In recent years, many studies have demonstrated, either theoretically or empirically, that learning a good distance metric can greatly improve the performance of classification, clustering and retrieval tasks. In this survey, we overview existing distance metric learning approaches according to a common framework. Specifically, depending on the available supervision information during the distance metric learning process, we categorize each distance metric learning algorithm as supervised, unsupervised or semi-supervised. We compare those different types of metric learning methods, point out their strength and limitations. Finally, we summarize open challenges in distance metric learning and propose future directions for distance metric learning.", "title": "" }, { "docid": "c890c635dd0f2dcb6827f59707b5dcd4", "text": "We presenttwo families of reflective surfacesthat are capableof providing a wide field of view, andyet still approximatea perspecti ve projectionto a high degree.These surfacesarederivedby consideringaplaneperpendicular to theaxisof a surfaceof revolutionandfinding theequations governingthedistortionof theimageof theplanein thissurface. We thenview this relationasa differentialequation and prescribethe distortion term to be linear. By choosing appropriateinitial conditionsfor the differentialequation andsolvingit numerically, wederivethesurfaceshape andobtaina preciseestimateasto what degreethe resulting sensorcanapproximatea perspecti ve projection.Thus thesesurfacesactascomputational sensors, allowing for a wide-angleperspecti ve view of a scenewithout processing the imagein software. The applicationsof sucha sensor shouldbe numerous,including surveillance,roboticsand traditionalphotography . Recently, many researchersin the roboticsand vision communityhave begun to considervisual sensorsthat are ableto obtainwidefieldsof view. Suchdevicesarethenatural solution to variousdifficulties encounteredwith conventionalimagingsystems. Thetwo mostcommonmeansof obtainingwidefieldsof view arefish-eye lensesandreflectivesurfaces,alsoknown ascatoptrics.Whencatoptricsarecombinedwith conventional lenssystems,known asdioptrics,the resultingsensors are known as catadioptrics. The possibleusesof thesesystemsincludeapplicationssuchasrobotcontroland surveillance. In this paperwe will consideronly catadioptric basedsensors.Oftensuchsystemsconsistof a camera pointingataconvex mirror, asin figure(1). How to interpretand make useof the visual information obtainedby suchsystems,e.g. how they shouldbe usedto control robots,is not at all obvious. Thereareinfinitely many differentshapesthat a mirror canhave, and at leasttwo differentcameramodels(perspecti ve and orthographicprojection)with which to combineeachmirror. Convex mirror", "title": "" }, { "docid": "cd33484d27af2b500765af37a6f3aa17", "text": "Tunneling nanotube (TNT)-like structures are intercellular membranous bridges that mediate the transfer of various cellular components including endocytic organelles. To gain further insight into the magnitude and mechanism of organelle transfer, we performed quantitative studies on the exchange of fluorescently labeled endocytic structures between normal rat kidney (NRK) cells. This revealed a linear increase in both the number of cells receiving organelles and the amount of transferred organelles per cell over time. The intercellular transfer of organelles was unidirectional, independent of extracellular diffusion, and sensitive to shearing force. In addition, during a block of endocytosis, a significant amount of transfer sustained. Fluorescence microscopy revealed TNT-like bridges between NRK cells containing F-actin but no microtubules. Depolymerization of F-actin led to the disappearance of TNT and a strong inhibition of organelle exchange. Partial ATP depletion did not affect the number of TNT but strongly reduced organelle transfer. Interestingly, the myosin II specific inhibitor S-(-)-blebbistatin strongly induced both organelle transfer and the number of TNT, while the general myosin inhibitor 2,3-butanedione monoxime induced the number of TNT but significantly inhibited transfer. Taken together, our data indicate a frequent and continuous exchange of endocytic organelles between cells via TNT by an actomyosin-dependent mechanism.", "title": "" }, { "docid": "f26d34a762ce2c8ffd1c92ec0a86d56a", "text": "Despite recent interest in digital fabrication, there are still few algorithms that provide control over how light propagates inside a solid object. Existing methods either work only on the surface or restrict themselves to light diffusion in volumes. We use multi-material 3D printing to fabricate objects with embedded optical fibers, exploiting total internal reflection to guide light inside an object. We introduce automatic fiber design algorithms together with new manufacturing techniques to route light between two arbitrary surfaces. Our implicit algorithm optimizes light transmission by minimizing fiber curvature and maximizing fiber separation while respecting constraints such as fiber arrival angle. We also discuss the influence of different printable materials and fiber geometry on light propagation in the volume and the light angular distribution when exiting the fiber. Our methods enable new applications such as surface displays of arbitrary shape, touch-based painting of surfaces, and sensing a hemispherical light distribution in a single shot.", "title": "" }, { "docid": "ee1e2400ed5c944826747a8e616b18c1", "text": "Metastasis remains the greatest challenge in the clinical management of cancer. Cell motility is a fundamental and ancient cellular behaviour that contributes to metastasis and is conserved in simple organisms. In this Review, we evaluate insights relevant to human cancer that are derived from the study of cell motility in non-mammalian model organisms. Dictyostelium discoideum, Caenorhabditis elegans, Drosophila melanogaster and Danio rerio permit direct observation of cells moving in complex native environments and lend themselves to large-scale genetic and pharmacological screening. We highlight insights derived from each of these organisms, including the detailed signalling network that governs chemotaxis towards chemokines; a novel mechanism of basement membrane invasion; the positive role of E-cadherin in collective direction-sensing; the identification and optimization of kinase inhibitors for metastatic thyroid cancer on the basis of work in flies; and the value of zebrafish for live imaging, especially of vascular remodelling and interactions between tumour cells and host tissues. While the motility of tumour cells and certain host cells promotes metastatic spread, the motility of tumour-reactive T cells likely increases their antitumour effects. Therefore, it is important to elucidate the mechanisms underlying all types of cell motility, with the ultimate goal of identifying combination therapies that will increase the motility of beneficial cells and block the spread of harmful cells.", "title": "" }, { "docid": "ce99ce3fb3860e140164e7971291f0fa", "text": "We describe the development and psychometric characteristics of the Generalized Workplace Harassment Questionnaire (GWHQ), a 29-item instrument developed to assess harassing experiences at work in five conceptual domains: verbal aggression, disrespect, isolation/exclusion, threats/bribes, and physical aggression. Over 1700 current and former university employees completed the GWHQ at three time points. Factor analytic results at each wave of data suggested a five-factor solution that did not correspond to the original five conceptual factors. We suggest a revised scoring scheme for the GWHQ utilizing four of the empirically extracted factors: covert hostility, verbal hostility, manipulation, and physical hostility. Covert hostility was the most frequently experienced type of harassment, followed by verbal hostility, manipulation, and physical hostility. Verbal hostility, covert hostility, and manipulation were found to be significant predictors of psychological distress.", "title": "" }, { "docid": "e1f6e042174d5ca41445711a25903506", "text": "We define and study the link prediction problem in bipartite networks, specializing general link prediction algorithms to the bipartite case. In a graph, a link prediction function of two vertices denotes the similarity or proximity of the vertices. Common link prediction functions for general graphs are defined using paths of length two between two nodes. Since in a bipartite graph adjacency vertices can only be connected by paths of odd lengths, these functions do not apply to bipartite graphs. Instead, a certain class of graph kernels (spectral transformation kernels) can be generalized to bipartite graphs when the positivesemidefinite kernel constraint is relaxed. This generalization is realized by the odd component of the underlying spectral transformation. This construction leads to several new link prediction pseudokernels such as the matrix hyperbolic sine, which we examine for rating graphs, authorship graphs, folksonomies, document–feature networks and other types of bipartite networks.", "title": "" }, { "docid": "0f0799a04328852b8cfa742cbc2396c9", "text": "Bitcoin does not scale, because its synchronization mechanism, the blockchain, limits the maximum rate of transactions the network can process. However, using off-blockchain transactions it is possible to create long-lived channels over which an arbitrary number of transfers can be processed locally between two users, without any burden to the Bitcoin network. These channels may form a network of payment service providers (PSPs). Payments can be routed between any two users in real time, without any confirmation delay. In this work we present a protocol for duplex micropayment channels, which guarantees end-to-end security and allow instant transfers, laying the foundation of the PSP network.", "title": "" }, { "docid": "3cecab28e0cffd99338545dd2b633445", "text": "After two decades of intensive development, 3-D integration has proven invaluable for allowing integrated circuits to adhere to Moore's Law without needing to continuously shrink feature sizes. The 3-D integration is also an enabling technology for hetero-integration of microelectromechanical systems (MEMS)/microsensors with different technologies, such as CMOS and optoelectronics. This 3-D hetero-integration allows for the development of highly integrated multifunctional microsystems with small footprints, low cost, and high performance demanded by emerging applications. This paper reviews the following aspects of the MEMS/microsensor-centered 3-D integration: fabrication technologies and processes, processing considerations and strategies for 3-D integration, integrated device configurations and wafer-level packaging, and applications and commercial MEMS/microsensor products using 3-D integration technologies. Of particular interest throughout this paper is the hetero-integration of the MEMS and CMOS technologies.", "title": "" }, { "docid": "5d8c4cda10b47030e2a892a38abc7a2d", "text": "Visual emotion recognition aims to associate images with appropriate emotions. There are different visual stimuli that can affect human emotion from low-level to high-level, such as color, texture, part, object, etc. However, most existing methods treat different levels of features as independent entity without having effective method for feature fusion. In this paper, we propose a unified CNNRNN model to predict the emotion based on the fused features from different levels by exploiting the dependency among them. Our proposed architecture leverages convolutional neural network (CNN) with multiple layers to extract different levels of features within a multi-task learning framework, in which two related loss functions are introduced to learn the feature representation. Considering the dependencies within the low-level and high-level features, a bidirectional recurrent neural network (RNN) is proposed to integrate the learned features from different layers in the CNN model. Extensive experiments on both Internet images and art photo datasets demonstrate that our method outperforms the state-of-the-art methods with at least 7% performance improvement.", "title": "" }, { "docid": "829fcf6b704c62acb05c7399604faf78", "text": "A method for estimating the range between moving vehicles by using a monocular camera is proposed. Although most conventional methods use vertical triangulation, the proposed method uses both vertical and horizontal triangulation, which reduces errors due to vehicle's own pitching in the far distance. Unknown vehicle width is estimated by measuring three ranging parameters associated with an image captured by the camera, and the following distance is then computed by horizontal triangulation. Both vehicle width and following distance are dynamically updated during the vehicle-tracking process by single filtering. The proposed method runs in real time and can produce highly accurate estimation of following distance. The key contribution of this study is the coupled estimation of unknown vehicle width and following distance by sequential Bayesian estimation.", "title": "" }, { "docid": "f47fcbd6412384b85ef458fd3e6b27f3", "text": "In this paper, we consider positioning with observed-time-difference-of-arrival (OTDOA) for a device deployed in long-term-evolution (LTE) based narrow-band Internet-of-things (NB-IoT) systems. We propose an iterative expectation- maximization based successive interference cancellation (EM-SIC) algorithm to jointly consider estimations of residual frequency- offset (FO), fading-channel taps and time-of- arrival (ToA) of the first arrival-path for each of the detected cells. In order to design a low complexity ToA detector and also due to the limits of low-cost analog circuits, we assume an NB-IoT device working at a low-sampling rate such as 1.92 MHz or lower. The proposed EM-SIC algorithm comprises two stages to detect ToA, based on which OTDOA can be calculated. In a first stage, after running the EM-SIC block a predefined number of iterations, a coarse ToA is estimated for each of the detected cells. Then in a second stage, to improve the ToA resolution, a low-pass filter is utilized to interpolate the correlations of time-domain PRS signal evaluated at a low sampling-rate to a high sampling-rate such as 30.72 MHz. To keep low-complexity, only the correlations inside a small search window centered at the coarse ToA estimates are upsampled. Then, the refined ToAs are estimated based on upsampled correlations. If at least three cells are detected, with OTDOA and the locations of detected cell sites, the position of the NB-IoT device can be estimated. We show through numerical simulations that, the proposed EM-SIC based ToA detector is robust against impairments introduced by inter-cell interference, fading-channel and residual FO. Thus significant signal-to-noise (SNR) gains are obtained over traditional ToA detectors that do not consider these impairments when positioning a device.", "title": "" }, { "docid": "8113dd93f64323c2c02292b7cb28139b", "text": "Current statistical language modeling techniques, including deep-learning based models, have proven to be quite effective for source code. We argue here that the special properties of source code can be exploited for further improvements. In this work, we enhance established language modeling approaches to handle the special challenges of modeling source code, such as: frequent changes, larger, changing vocabularies, deeply nested scopes, etc. We present a fast, nested language modeling toolkit specifically designed for software, with the ability to add & remove text, and mix & swap out many models. Specifically, we improve upon prior cache-modeling work and present a model with a much more expansive, multi-level notion of locality that we show to be well-suited for modeling software. We present results on varying corpora in comparison with traditional N-gram, as well as RNN, and LSTM deep-learning language models, and release all our source code for public use. Our evaluations suggest that carefully adapting N-gram models for source code can yield performance that surpasses even RNN and LSTM based deep-learning models.", "title": "" } ]
scidocsrr
656b9050e1363c9eaaf9703e9b39b5cd
Predicting subscriber dissatisfaction and improving retention in the wireless telecommunications industry
[ { "docid": "00ea9078f610b14ed0ed00ed6d0455a7", "text": "Boosting is a general method for improving the performance of learning algorithms. A recently proposed boosting algorithm, Ada Boost, has been applied with great success to several benchmark machine learning problems using mainly decision trees as base classifiers. In this article we investigate whether Ada Boost also works as well with neural networks, and we discuss the advantages and drawbacks of different versions of the Ada Boost algorithm. In particular, we compare training methods based on sampling the training set and weighting the cost function. The results suggest that random resampling of the training data is not the main explanation of the success of the improvements brought by Ada Boost. This is in contrast to bagging, which directly aims at reducing variance and for which random resampling is essential to obtain the reduction in generalization error. Our system achieves about 1.4 error on a data set of on-line handwritten digits from more than 200 writers. A boosted multilayer network achieved 1.5 error on the UCI letters and 8.1 error on the UCI satellite data set, which is significantly better than boosted decision trees.", "title": "" } ]
[ { "docid": "38c9cee29ef1ba82e45556d87de1ff24", "text": "This paper presents a detailed characterization of the Hokuyo URG-04LX 2D laser range finder. While the sensor specifications only provide a rough estimation of the sensor accuracy, the present work analyzes issues such as time drift effects and dependencies on distance, target properties (color, brightness and material) as well as incidence angle. Since the sensor is intended to be used for measurements of a tubelike environment on an inspection robot, the characterization is extended by investigating the influence of the sensor orientation and dependency on lighting conditions. The sensor characteristics are compared to those of the Sick LMS 200 which is commonly used in robotic applications when size and weight are not critical constraints. The results show that the sensor accuracy is strongly depending on the target properties (color, brightness, material) and that it is consequently difficult to establish a calibration model. The paper also identifies cases for which the sensor returns faulty measurements, mainly when the surface has low reflectivity (dark surfaces, foam) or for high incidence angles on shiny surfaces. On the other hand, the repeatability of the sensor seems to be competitive with the LMS 200.", "title": "" }, { "docid": "a71d0d3748f6be2adbd48ab7671dd9f8", "text": "Considerable overlap has been identified in the risk factors, comorbidities and putative pathophysiological mechanisms of Alzheimer disease and related dementias (ADRDs) and type 2 diabetes mellitus (T2DM), two of the most pressing epidemics of our time. Much is known about the biology of each condition, but whether T2DM and ADRDs are parallel phenomena arising from coincidental roots in ageing or synergistic diseases linked by vicious pathophysiological cycles remains unclear. Insulin resistance is a core feature of T2DM and is emerging as a potentially important feature of ADRDs. Here, we review key observations and experimental data on insulin signalling in the brain, highlighting its actions in neurons and glia. In addition, we define the concept of 'brain insulin resistance' and review the growing, although still inconsistent, literature concerning cognitive impairment and neuropathological abnormalities in T2DM, obesity and insulin resistance. Lastly, we review evidence of intrinsic brain insulin resistance in ADRDs. By expanding our understanding of the overlapping mechanisms of these conditions, we hope to accelerate the rational development of preventive, disease-modifying and symptomatic treatments for cognitive dysfunction in T2DM and ADRDs alike.", "title": "" }, { "docid": "180a271a86f9d9dc71cc140096d08b2f", "text": "This communication demonstrates for the first time the capability to independently control the real and imaginary parts of the complex propagation constant in planar, printed circuit board compatible leaky-wave antennas. The structure is based on a half-mode microstrip line which is loaded with an additional row of periodic metallic posts, resulting in a substrate integrated waveguide SIW with one of its lateral electric walls replaced by a partially reflective wall. The radiation mechanism is similar to the conventional microstrip leaky-wave antenna operating in its first higher-order mode, with the novelty that the leaky-mode leakage rate can be controlled by virtue of a sparse row of metallic vias. For this topology it is demonstrated that it is possible to independently control the antenna pointing angle and main lobe beamwidth while achieving high radiation efficiencies, thus providing low-cost, low-profile, simply fed, and easily integrable leaky-wave solutions for high-gain frequency beam-scanning applications. Several prototypes operating at 15 GHz have been designed, simulated, manufactured and tested, to show the operation principle and design flexibility of this one dimensional leaky-wave antenna.", "title": "" }, { "docid": "9a65a5c09df7e34383056509d96e772d", "text": "With explosive growth of Android malware and due to its damage to smart phone users (e.g., stealing user credentials, resource abuse), Android malware detection is one of the cyber security topics that are of great interests. Currently, the most significant line of defense against Android malware is anti-malware software products, such as Norton, Lookout, and Comodo Mobile Security, which mainly use the signature-based method to recognize threats. However, malware attackers increasingly employ techniques such as repackaging and obfuscation to bypass signatures and defeat attempts to analyze their inner mechanisms. The increasing sophistication of Android malware calls for new defensive techniques that are harder to evade, and are capable of protecting users against novel threats. In this paper, we propose a novel dynamic analysis method named Component Traversal that can automatically execute the code routines of each given Android application (app) as completely as possible. Based on the extracted Linux kernel system calls, we further construct the weighted directed graphs and then apply a deep learning framework resting on the graph based features for newly unknown Android malware detection. A comprehensive experimental study on a real sample collection from Comodo Cloud Security Center is performed to compare various malware detection approaches. Promising experimental results demonstrate that our proposed method outperforms other alternative Android malware detection techniques. Our developed system Deep4MalDroid has also been integrated into a commercial Android anti-malware software.", "title": "" }, { "docid": "9365a612900a8bf0ddef8be6ec17d932", "text": "Stabilization exercise program has become the most popular treatment method in spinal rehabilitation since it has shown its effectiveness in some aspects related to pain and disability. However, some studies have reported that specific exercise program reduces pain and disability in chronic but not in acute low back pain, although it can be helpful in the treatment of acute low back pain by reducing recurrence rate (Ferreira et al., 2006).", "title": "" }, { "docid": "4e2bfd87acf1287f36694634a6111b3f", "text": "This paper presents a model for managing departure aircraft at the spot or gate on the airport surface. The model is applied over two time frames: long term (one hour in future) for collaborative decision making, and short term (immediate) for decisions regarding the release of aircraft. The purpose of the model is to provide the controller a schedule of spot or gate release times optimized for runway utilization. This model was tested in nominal and heavy surface traffic scenarios in a simulated environment, and results indicate average throughput improvement of 10% in high traffic scenarios even with up to two minutes of uncertainty in spot arrival times.", "title": "" }, { "docid": "6e0a19a9bc744aa05a64bd7450cc4c1b", "text": "The success of deep neural networks hinges on our ability to accurately and efficiently optimize high-dimensional, non-convex functions. In this paper, we empirically investigate the loss functions of state-of-the-art networks, and how commonlyused stochastic gradient descent variants optimize these loss functions. To do this, we visualize the loss function by projecting them down to low-dimensional spaces chosen based on the convergence points of different optimization algorithms. Our observations suggest that optimization algorithms encounter and choose different descent directions at many saddle points to find different final weights. Based on consistency we observe across re-runs of the same stochastic optimization algorithm, we hypothesize that each optimization algorithm makes characteristic choices at these saddle points.", "title": "" }, { "docid": "1d5119a4aeb7d678b58fb4e55c43fe94", "text": "This chapter provides a simplified introduction to cloud computing. This chapter starts by introducing the history of cloud computing and moves on to describe the cloud architecture and operation. This chapter also discusses briefly cloud servicemodels: Infrastructure-as-a-Service, Platform-as-a-Service, and Software-as-a-Service. Clouds are also categorized based on their ownership to private and public clouds. This chapter concludes by explaining the reasons for choosing cloud computing over other technologies by exploring the economic and technological benefits of the cloud.", "title": "" }, { "docid": "07175075dad32287a7dabf3d852f729a", "text": "This paper is intended as a tutorial overview of induction motors signature analysis as a medium for fault detection. The purpose is to introduce in a concise manner the fundamental theory, main results, and practical applications of motor signature analysis for the detection and the localization of abnormal electrical and mechanical conditions that indicate, or may lead to, a failure of induction motors. The paper is focused on the so-called motor current signature analysis which utilizes the results of spectral analysis of the stator current. The paper is purposefully written without “state-of-the-art” terminology for the benefit of practicing engineers in facilities today who may not be familiar with signal processing.", "title": "" }, { "docid": "9e7fc71def2afc58025ff5e0198148d0", "text": "BACKGROUD\nWith the advent of modern computing methods, modeling trial-to-trial variability in biophysical recordings including electroencephalography (EEG) has become of increasingly interest. Yet no widely used method exists for comparing variability in ordered collections of single-trial data epochs across conditions and subjects.\n\n\nNEW METHOD\nWe have developed a method based on an ERP-image visualization tool in which potential, spectral power, or some other measure at each time point in a set of event-related single-trial data epochs are represented as color coded horizontal lines that are then stacked to form a 2-D colored image. Moving-window smoothing across trial epochs can make otherwise hidden event-related features in the data more perceptible. Stacking trials in different orders, for example ordered by subject reaction time, by context-related information such as inter-stimulus interval, or some other characteristic of the data (e.g., latency-window mean power or phase of some EEG source) can reveal aspects of the multifold complexities of trial-to-trial EEG data variability.\n\n\nRESULTS\nThis study demonstrates new methods for computing and visualizing 'grand' ERP-image plots across subjects and for performing robust statistical testing on the resulting images. These methods have been implemented and made freely available in the EEGLAB signal-processing environment that we maintain and distribute.", "title": "" }, { "docid": "073cd7c54b038dcf69ae400f97a54337", "text": "Interventions to support children with autism often include the use of visual supports, which are cognitive tools to enable learning and the production of language. Although visual supports are effective in helping to diminish many of the challenges of autism, they are difficult and time-consuming to create, distribute, and use. In this paper, we present the results of a qualitative study focused on uncovering design guidelines for interactive visual supports that would address the many challenges inherent to current tools and practices. We present three prototype systems that address these design challenges with the use of large group displays, mobile personal devices, and personal recording technologies. We also describe the interventions associated with these prototypes along with the results from two focus group discussions around the interventions. We present further design guidance for visual supports and discuss tensions inherent to their design.", "title": "" }, { "docid": "df9acaed8dbcfbd38a30e4e1fa77aa8a", "text": "Recent object detection systems rely on two critical steps: (1) a set of object proposals is predicted as efficiently as possible, and (2) this set of candidate proposals is then passed to an object classifier. Such approaches have been shown they can be fast, while achieving the state of the art in detection performance. In this paper, we propose a new way to generate object proposals, introducing an approach based on a discriminative convolutional network. Our model is trained jointly with two objectives: given an image patch, the first part of the system outputs a class-agnostic segmentation mask, while the second part of the system outputs the likelihood of the patch being centered on a full object. At test time, the model is efficiently applied on the whole test image and generates a set of segmentation masks, each of them being assigned with a corresponding object likelihood score. We show that our model yields significant improvements over state-of-theart object proposal algorithms. In particular, compared to previous approaches, our model obtains substantially higher object recall using fewer proposals. We also show that our model is able to generalize to unseen categories it has not seen during training. Unlike all previous approaches for generating object masks, we do not rely on edges, superpixels, or any other form of low-level segmentation.", "title": "" }, { "docid": "56826bfc5f48105387fd86cc26b402f1", "text": "It is difficult to identify sentence importance from a single point of view. In this paper, we propose a learning-based approach to combine various sentence features. They are categorized as surface, content, relevance and event features. Surface features are related to extrinsic aspects of a sentence. Content features measure a sentence based on contentconveying words. Event features represent sentences by events they contained. Relevance features evaluate a sentence from its relatedness with other sentences. Experiments show that the combined features improved summarization performance significantly. Although the evaluation results are encouraging, supervised learning approach requires much labeled data. Therefore we investigate co-training by combining labeled and unlabeled data. Experiments show that this semisupervised learning approach achieves comparable performance to its supervised counterpart and saves about half of the labeling time cost.", "title": "" }, { "docid": "dd9edd37ff5f4cb332fcb8a0ef86323e", "text": "This paper proposes several nonlinear control strategies for trajectory tracking of a quadcopter system based on the property of differential flatness. Its originality is twofold. Firstly, it provides a flat output for the quadcopter dynamics capable of creating full flat parametrization of the states and inputs. Moreover, B-splines characterizations of the flat output and their properties allow for optimal trajectory generation subject to way-point constraints. Secondly, several control strategies based on computed torque control and feedback linearization are presented and compared. The advantages of flatness within each control strategy are analyzed and detailed through extensive simulation results.", "title": "" }, { "docid": "8e3bf062119c6de9fa5670ce4b00764b", "text": "Heating red phosphorus in sealed ampoules in the presence of a Sn/SnI4 catalyst mixture has provided bulk black phosphorus at much lower pressures than those required for allotropic conversion by anvil cells. Herein we report the growth of ultra-long 1D red phosphorus nanowires (>1 mm) selectively onto a wafer substrate from red phosphorus powder and a thin film of red phosphorus in the present of a Sn/SnI4 catalyst. Raman spectra and X-ray diffraction characterization suggested the formation of crystalline red phosphorus nanowires. FET devices constructed with the red phosphorus nanowires displayed a typical I-V curve similar to that of black phosphorus and a similar mobility reaching 300 cm(2)  V(-1)  s with an Ion /Ioff ratio approaching 10(2) . A significant response to infrared light was observed from the FET device.", "title": "" }, { "docid": "1bf801e8e0348ccd1e981136f604dd18", "text": "Sketch recognition is one of the integral components used by law enforcement agencies in solving crime. In recent past, software generated composite sketches are being preferred as they are more consistent and faster to construct than hand drawn sketches. Matching these composite sketches to face photographs is a complex task because the composite sketches are drawn based on the witness description and lack minute details which are present in photographs. This paper presents a novel algorithm for matching composite sketches with photographs using transfer learning with deep learning representation. In the proposed algorithm, first the deep learning architecture based facial representation is learned using large face database of photos and then the representation is updated using small problem-specific training database. Experiments are performed on the extended PRIP database and it is observed that the proposed algorithm outperforms recently proposed approach and a commercial face recognition system.", "title": "" }, { "docid": "11e666f5b8746ea4b6fc6d4467295e61", "text": "It is shown that by combining the osmotic pressure and rate of diffusion laws an equation can be derived for the kinetics of osmosis. The equation has been found to agree with experiments on the rate of osmosis for egg albumin and gelatin solutions with collodion membranes.", "title": "" }, { "docid": "1d41e6f55521cdba4fc73febd09d2eb4", "text": "1.", "title": "" }, { "docid": "3b4622a4ad745fc0ffb3b6268eb969fa", "text": "Eruptive syringomas: unresponsiveness to oral isotretinoin A 22-year-old man of Egyptian origin was referred to our department due to exacerbation of pruritic pre-existing papular dermatoses. The skin lesions had been present since childhood. The family history was negative for a similar condition. The patient complained of exacerbation of the pruritus during physical activity under a hot climate and had moderate to severe pruritus during his work. Physical examination revealed multiple reddish-brownish smooth-surfaced, symmetrically distributed papules 2–4 mm in diameter on the patient’s trunk, neck, axillae, and limbs (Fig. 1). The rest of the physical examination was unremarkable. The Darier sign was negative. A skin biopsy was obtained from a representative lesion on the trunk. Histopathologic examination revealed a small, wellcircumscribed neoplasm confined to the upper dermis, composed of small solid and ductal structures relatively evenly distributed in a sclerotic collagenous stroma. The solid elements were of various shapes (round, oval, curvilinear, “comma-like,” or “tadpole-like”) (Fig. 2). These microscopic features and the clinical presentation were consistent with the diagnosis of eruptive syringomas. Our patient was treated with a short course of oral antihistamines without any effect and subsequently with low-dose isotretinoin (10 mg/day) for 5 months. No improvement of the skin eruption was observed while cessation of the pruritus was accomplished. Syringoma is a common adnexal tumor with differentiation towards eccrine acrosyringium composed of small solid and ductal elements embedded in a sclerotic stroma and restricted as a rule to the upper to mid dermis, usually presenting clinically as multiple lesions on the lower eyelids and cheeks of adolescent females. A much less common variant is the eruptive or disseminated syringomas, which involve primarily young women. Eruptive syringomas are characterized by rapid development during a short period of time of hundreds of small (1–5 mm), ill-defined, smooth surfaced, skin-colored, pink, yellowish, or brownish papules typically involving the face, trunk, genitalia, pubic area, and extremities but can occur principally in any site where eccrine glands are found. The pathogenesis of eruptive syringoma remains unclear. Some authors have recently challenged the traditional notion that eruptive syringomas are neoplastic lesions. Chandler and Bosenberg presented evidence that eruptive syringomas result from autoimmune destruction of the acrosyringium and proposed the term autoimmune acrosyringitis with ductal cysts. Garrido-Ruiz et al. support the theory that eruptive syringomas may represent a hyperplastic response of the eccrine duct to an inflammatory reaction. In a recent systematic review by Williams and Shinkai the strongest association of syringomas was with Down’s syndrome (183 reported cases, 22.2%). Syringomas are also associated with diabetes mellitus (17 reported cases, 2.1%), Ehlers–Danlos", "title": "" }, { "docid": "161e9a2b7a6783b57ce47bb8e100a80d", "text": "Distributed storage systems provide large-scale data storage services, yet they are confronted with frequent node failures. To ensure data availability, a storage system often introduces data redundancy via replication or erasure coding. As erasure coding incurs significantly less redundancy overhead than replication under the same fault tolerance, it has been increasingly adopted in large-scale storage systems. In erasure-coded storage systems, degraded reads to temporarily unavailable data are very common, and hence boosting the performance of degraded reads becomes important. One challenge is that storage nodes tend to be heterogeneous with different storage capacities and I/O bandwidths. To this end, we propose FastDR, a system that addresses node heterogeneity and exploits I/O parallelism, so as to boost the performance of degraded reads to temporarily unavailable data. FastDR incorporates a greedy algorithm that seeks to reduce the data transfer cost of reading surviving data for degraded reads, while allowing the search of the efficient degraded read solution to be completed in a timely manner. We implement a FastDR prototype, and conduct extensive evaluation through simulation studies as well as testbed experiments on a Hadoop cluster with 10 storage nodes. We demonstrate that our FastDR achieves efficient degraded reads compared to existing approaches.", "title": "" } ]
scidocsrr
bb78bd4ac5f73bbd64ad505fea91284a
Ensuring the Quality of the Findings of Qualitative Research : Looking at Trustworthiness Criteria
[ { "docid": "db5ff75a7966ec6c1503764d7e510108", "text": "Qualitative content analysis as described in published literature shows conflicting opinions and unsolved issues regarding meaning and use of concepts, procedures and interpretation. This paper provides an overview of important concepts (manifest and latent content, unit of analysis, meaning unit, condensation, abstraction, content area, code, category and theme) related to qualitative content analysis; illustrates the use of concepts related to the research procedure; and proposes measures to achieve trustworthiness (credibility, dependability and transferability) throughout the steps of the research procedure. Interpretation in qualitative content analysis is discussed in light of Watzlawick et al.'s [Pragmatics of Human Communication. A Study of Interactional Patterns, Pathologies and Paradoxes. W.W. Norton & Company, New York, London] theory of communication.", "title": "" } ]
[ { "docid": "c197fcf3042099003f3ed682f7b7f19c", "text": "Interaction graphs are ubiquitous in many fields such as bioinformatics, sociology and physical sciences. There have been many studies in the literature targeted at studying and mining these graphs. However, almost all of them have studied these graphs from a static point of view. The study of the evolution of these graphs over time can provide tremendous insight on the behavior of entities, communities and the flow of information among them. In this work, we present an event-based characterization of critical behavioral patterns for temporally varying interaction graphs. We use non-overlapping snapshots of interaction graphs and develop a framework for capturing and identifying interesting events from them. We use these events to characterize complex behavioral patterns of individuals and communities over time. We demonstrate the application of behavioral patterns for the purposes of modeling evolution, link prediction and influence maximization. Finally, we present a diffusion model for evolving networks, based on our framework.", "title": "" }, { "docid": "8733daeee2dd85345ce115cb1366f4b2", "text": "We propose an interactive model, RuleViz, for visualizing the entire process of knowledge discovery and data mining. The model consists of ve components according to the main ingredients of the knowledge discovery process: original data visualization, visual data reduction, visual data preprocess, visual rule discovery, and rule visualization. The RuleViz model for visualizing the process of knowledge discovery is introduced and each component is discussed. Two aspects are emphasized, human-machine interaction and process visualization. The interaction helps the KDD system navigate through the enormous search spaces and recognize the intentions of the user, and the visualization of the KDD process helps users gain better insight into the multidimensional data, understand the intermediate results, and interpret the discovered patterns. According to the RuleViz model, we implement an interactive system, CViz, which exploits \\parallel coordinates\" technique to visualize the process of rule induction. The original data is visualized on the parallel coordinates, and can be interactively reduced both horizontally and vertically. Three approaches for discretizing numerical attributes are provided in the visual data preprocessing. CViz learns classi cation rules on the basis of a rule induction algorithm and presents the result as the algorithm proceeds. The discovered rules are nally visualized on the parallel coordinates with each rule being displayed as a directed \\polygon\", and the rule accuracy and quality are used to render the \\polygons\" and control the choice of rules to be displayed to avoid clutter. The CViz system has been experimented with the UCI data sets and synthesis data sets, and the results demonstrate that the RuleViz model and the implemented visualization system are useful and helpful for understanding the process of knowledge discovery and interpreting the nal results.", "title": "" }, { "docid": "97f058025a32926262b3c141b9b63da1", "text": "In this paper, a Stacked Sparse Autoencoder (SSAE) based framework is presented for nuclei classification on breast cancer histopathology. SSAE works very well in learning useful high-level feature for better representation of input raw data. To show the effectiveness of proposed framework, SSAE+Softmax is compared with conventional Softmax classifier, PCA+Softmax, and single layer Sparse Autoencoder (SAE)+Softmax in classifying the nuclei and non-nuclei patches extracted from breast cancer histopathology. The SSAE+Softmax for nuclei patch classification yields an accuracy of 83.7%, F1 score of 82%, and AUC of 0.8992, which outperform Softmax classifier, PCA+Softmax, and SAE+Softmax.", "title": "" }, { "docid": "033ee0637607fec8ae1b5834efe355dc", "text": "We propose a new task-specification language for Markov decision processes that is designed to be an improvement over reward functions by being environment independent. The language is a variant of Linear Temporal Logic (LTL) that is extended to probabilistic specifications in a way that permits approximations to be learned in finite time. We provide several small environments that demonstrate the advantages of our geometric LTL (GLTL) language and illustrate how it can be used to specify standard reinforcementlearning tasks straightforwardly.", "title": "" }, { "docid": "b4123a29a617b7a531d637f8c988b9a4", "text": "We present a method for contouring an implicit function using a grid topologically dual to structured grids such as octrees. By aligning the vertices of the dual grid with the features of the implicit function, we are able to reproduce thin features of the extracted surface without excessive subdivision required by methods such as marching cubes or dual contouring. Dual marching cubes produces a crack-free, adaptive polygonalization of the surface that reproduces sharp features. Our approach maintains the advantage of using structured grids for operations such as CSG while being able to conform to the relevant features of the implicit function yielding much sparser polygonalizations than has been possible using structured grids.", "title": "" }, { "docid": "7d78ca30853ed8a84bbb56fe82e3b9ba", "text": "Deep belief networks (DBN) have shown impressive improvements over Gaussian mixture models for automatic speech recognition. In this work we use DBNs for audio-visual speech recognition; in particular, we use deep learning from audio and visual features for noise robust speech recognition. We test two methods for using DBNs in a multimodal setting: a conventional decision fusion method that combines scores from single-modality DBNs, and a novel feature fusion method that operates on mid-level features learned by the single-modality DBNs. On a continuously spoken digit recognition task, our experiments show that these methods can reduce word error rate by as much as 21% relative over a baseline multi-stream audio-visual GMM/HMM system.", "title": "" }, { "docid": "a8fd046fb4652814c852113684a152aa", "text": "Policy gradients methods often achieve better performance when the change in policy is limited to a small Kullback-Leibler divergence. We derive policy gradients where the change in policy is limited to a small Wasserstein distance (or trust region). This is done in the discrete and continuous multi-armed bandit settings with entropy regularisation. We show that in the small steps limit with respect to the Wasserstein distance W2, policy dynamics are governed by the heat equation, following the Jordan-Kinderlehrer-Otto result. This means that policies undergo diffusion and advection, concentrating near actions with high reward. This helps elucidate the nature of convergence in the probability matching setup, and provides justification for empirical practices such as Gaussian policy priors and additive gradient noise.", "title": "" }, { "docid": "3433b283726a7e95ba5cb2a3c97cd195", "text": "Black silicon (BSi) represents a very active research area in renewable energy materials. The rise of BSi as a focus of study for its fundamental properties and potentially lucrative practical applications is shown by several recent results ranging from solar cells and light-emitting devices to antibacterial coatings and gas-sensors. In this paper, the common BSi fabrication techniques are first reviewed, including electrochemical HF etching, stain etching, metal-assisted chemical etching, reactive ion etching, laser irradiation and the molten salt Fray-Farthing-Chen-Cambridge (FFC-Cambridge) process. The utilization of BSi as an anti-reflection coating in solar cells is then critically examined and appraised, based upon strategies towards higher efficiency renewable solar energy modules. Methods of incorporating BSi in advanced solar cell architectures and the production of ultra-thin and flexible BSi wafers are also surveyed. Particular attention is given to routes leading to passivated BSi surfaces, which are essential for improving the electrical properties of any devices incorporating BSi, with a special focus on atomic layer deposition of Al2O3. Finally, three potential research directions worth exploring for practical solar cell applications are highlighted, namely, encapsulation effects, the development of micro-nano dual-scale BSi, and the incorporation of BSi into thin solar cells. It is intended that this paper will serve as a useful introduction to this novel material and its properties, and provide a general overview of recent progress in research currently being undertaken for renewable energy applications.", "title": "" }, { "docid": "f355ed837561186cff4e7492470d6ae7", "text": "Notions of Bayesian analysis are reviewed, with emphasis on Bayesian modeling and Bayesian calculation. A general hierarchical model for time series analysis is then presented and discussed. Both discrete time and continuous time formulations are discussed. An brief overview of generalizations of the fundamental hierarchical time series model concludes the article. Much of the Bayesian viewpoint can be argued (as by Jeereys and Jaynes, for examples) as direct application of the theory of probability. In this article the suggested approach for the construction of Bayesian time series models relies on probability theory to provide decompositions of complex joint probability distributions. Speciically, I refer to the familiar factorization of a joint density into an appropriate product of conditionals. Let x and y represent two random variables. I will not diierentiate between random variables and their realizations. Also, I will use an increasingly popular generic notation for probability densities: x] represents the density of x, xjy] is the conditional density of x given y, and x; y] denotes the joint density of x and y. In this notation we can write \\Bayes's Theorem\" as yjx] = xjy]]y]=x]: (1) y", "title": "" }, { "docid": "e6088779901bd4bfaf37a3a1784c3854", "text": "There has been recently a great progress in the field of automatically generated knowledge bases and corresponding disambiguation systems that are capable of mapping text mentions onto canonical entities. Efforts like the before mentioned have enabled researchers and analysts from various disciplines to semantically “understand” contents. However, most of the approaches have been specifically designed for the English language and in particular support for Arabic is still in its infancy. Since the amount of Arabic Web contents (e.g. in social media) has been increasing dramatically over the last years, we see a great potential for endeavors that support an entity-level analytics of these data. To this end, we have developed a framework called AIDArabic that extends the existing AIDA system by additional components that allow the disambiguation of Arabic texts based on an automatically generated knowledge base distilled from Wikipedia. Even further, we overcome the still existing sparsity of the Arabic Wikipedia by exploiting the interwiki links between Arabic and English contents in Wikipedia, thus, enriching the entity catalog as well as disambiguation context.", "title": "" }, { "docid": "6cf4994b5ed0e17885f229856b7cd58d", "text": "Recently Neural Architecture Search (NAS) has aroused great interest in both academia and industry, however it remains challenging because of its huge and non-continuous search space. Instead of applying evolutionary algorithm or reinforcement learning as previous works, this paper proposes a Direct Sparse Optimization NAS (DSO-NAS) method. In DSO-NAS, we provide a novel model pruning view to NAS problem. In specific, we start from a completely connected block, and then introduce scaling factors to scale the information flow between operations. Next, we impose sparse regularizations to prune useless connections in the architecture. Lastly, we derive an efficient and theoretically sound optimization method to solve it. Our method enjoys both advantages of differentiability and efficiency, therefore can be directly applied to large datasets like ImageNet. Particularly, On CIFAR-10 dataset, DSO-NAS achieves an average test error 2.84%, while on the ImageNet dataset DSO-NAS achieves 25.4% test error under 600M FLOPs with 8 GPUs in 18 hours.", "title": "" }, { "docid": "b9daaabfc245958b9dee7d4910e80431", "text": "Strawberry fruits are highly valued for their taste and nutritional value. However, results describing the bioaccessibility and intestinal absorption of phenolic compounds from strawberries are still scarce. In our study, a combined in vitro digestion/Caco-2 absorption model was used to mimic physiological conditions in the gastrointestinal track and identify compounds transported across intestinal epithelium. In the course of digestion, the loss of anthocyanins was noted whilst pelargonidin-3-glucoside remained the most abundant compound, amounting to nearly 12 mg per 100 g of digested strawberries. Digestion increased the amount of ellagic acid available by nearly 50%, probably due to decomposition of ellagitannins. Only trace amounts of pelargonidin-3-glucoside were found to be absorbed in the intestine model. Dihydrocoumaric acid sulphate and p-coumaric acid were identified as metabolites formed in enterocytes and released at the serosal side of the model.", "title": "" }, { "docid": "5b759f2d581a8940127b5e45019039d7", "text": "The structure of the domain name is highly relevant for providing insights into the management, organization and operation of a given enterprise. Security assessment and network penetration testing are using information sourced from the DNS service in order to map the network, perform reconnaissance tasks, identify services and target individual hosts. Tracking the domain names used by popular Botnets is another major application that needs to undercover their underlying DNS structure. Current approaches for this purpose are limited to simplistic brute force scanning or reverse DNS, but these are unreliable. Brute force attacks depend of a huge list of known words and thus, will not work against unknown names, while reverse DNS is not always setup or properly configured. In this paper, we address the issue of fast and efficient generation of DNS names and describe practical experiences against real world large scale DNS names. Our approach is based on techniques derived from natural language modeling and leverage Markov Chain Models in order to build the first DNS scanner (SDBF) that is leveraging both, training and advanced language modeling approaches.", "title": "" }, { "docid": "7562d0fefa669d481b55e059085cd7de", "text": "Security and privacy are huge challenges in Internet of Things (IoT) environments, but unfortunately, the harmonization of the IoT-related standards and protocols is hardly and slowly widespread. In this paper, we propose a new framework for access control in IoT based on the blockchain technology. Our first contribution consists in providing a reference model for our proposed framework within the Objectives, Models, Architecture and Mechanism specification in IoT. In addition, we introduce FairAccess as a fully decentralized pseudonymous and privacy preserving authorization management framework that enables users to own and control their data. To implement our model, we use and adapt the blockchain into a decentralized access control manager. Unlike financial bitcoin transactions, FairAccess introduces new types of transactions that are used to grant, get, delegate, and revoke access. As a proof of concept, we establish an initial implementation with a Raspberry PI device and local blockchain. Finally, we discuss some limitations and propose further opportunities. Copyright © 2017 John Wiley & Sons, Ltd.", "title": "" }, { "docid": "d68cd0d594f8db4a0decdbdf3656ece1", "text": "In this paper we describe PRISM, a tool being developed at the University of Birmingham for the analysis of probabilistic systems. PRISM supports three probabilistic models: discrete-time Markov chains, continuous-time Markov chains and Markov decision processes. Analysis is performed through model checking such systems against specifications written in the probabilistic temporal logics PCTL and CSL. The tool features three model checking engines: one symbolic, using BDDs (binary decision diagrams) and MTBDDs (multi-terminal BDDs); one based on sparse matrices; and one which combines both symbolic and sparse matrix methods. PRISM has been successfully used to analyse probabilistic termination, performance, dependability and quality of service properties for a range of systems, including randomized distributed algorithms [2], polling systems [22], workstation clusters [18] and wireless cell communication [17].", "title": "" }, { "docid": "d9599c4140819670a661bd4955680bb7", "text": "The paper assesses the demand for rural electricity services and contrasts it with the technology options available for rural electrification. Decentralised Distributed Generation can be economically viable as reflected by case studies reported in literature and analysed in our field study. Project success is driven by economically viable technology choice; however it is largely contingent on organisational leadership and appropriate institutional structures. While individual leadership can compensate for deployment barriers, we argue that a large scale roll out of rural electrification requires an alignment of economic incentives and institutional structures to implement, operate and maintain the scheme. This is demonstrated with the help of seven case studies of projects across north India. 1 Introduction We explore the contribution that decentralised and renewable energy technologies can make to rural electricity supply in India. We take a case study approach, looking at seven sites across northern India where renewable energy technologies have been established to provide electrification for rural communities. We supplement our case studies with stakeholder interviews and household surveys, estimating levels of demand for electricity services from willingness and ability to pay. We also assess the overall viability of Distributed Decentralised Generation (DDG) projects by investigating the costs of implementation as well as institutional and organisational barriers to their operation and replication. Renewable energy technologies represent some of the most promising options available for distributed and decentralised electrification. Demand for reliable electricity services is significant. It represents a key driver behind economic development and raising basic standards of living. This is especially applicable to rural India home to 70% of the nation's population and over 25% of the world's poor. Access to reliable and affordable electricity can help support income-generating activity and allow utilisation of modern appliances and agricultural equipment whilst replacing inefficient and polluting kerosene lighting. Presently only around 55% of households are electrified (MOSPI 2006) leaving over 20 million households without power. The supply of electricity across India currently lacks both quality and quantity with an extensive shortfall in supply, a poor record for outages, high levels of transmission and distribution (T&D) losses and an overall need for extended and improved infrastructure (GoI 2006). The Indian Government recently outlined an ambitious plan for 100% village level electrification by the end of 2007 and total household electrification by 2012. To achieve this, a major programme of grid extension and strengthening of the rural electricity infrastructure has been initiated under …", "title": "" }, { "docid": "ba74ebfc0e164b1e6d08c1ac63e49538", "text": "This chapter develops a unified framework for the study of how network interactions can function as a mechanism for propagation and amplification of microeconomic shocks. The framework nests various classes of games over networks, models of macroeconomic risk originating from microeconomic shocks, and models of financial interactions. Under the assumption that shocks are small, the authors provide a fairly complete characterization of the structure of equilibrium, clarifying the role of network interactions in translating microeconomic shocks into macroeconomic outcomes. This characterization provides a ranking of different networks in terms of their aggregate performance. It also sheds light on several seemingly contradictory results in the prior literature on the role of network linkages in fostering systemic risk.", "title": "" }, { "docid": "31ed2186bcd711ac4a5675275cd458eb", "text": "Location-aware wireless sensor networks will enable a new class of applications, and accurate range estimation is critical for this task. Low-cost location determination capability is studied almost entirely using radio frequency received signal strength (RSS) measurements, resulting in poor accuracy. More accurate systems use wide bandwidths and/or complex time-synchronized infrastructure. Low-cost, accurate ranging has proven difficult because small timing errors result in large range errors. This paper addresses estimation of the distance between wireless nodes using a two-way ranging technique that approaches the Cramér-Rao Bound on ranging accuracy in white noise and achieves 1-3 m accuracy in real-world ranging and localization experiments. This work provides an alternative to inaccurate RSS and complex, wide-bandwidth methods. Measured results using a prototype wireless system confirm performance in the real world.", "title": "" }, { "docid": "457efc3b22084fd7221637bd574ff075", "text": "Group-based trajectory models are used to investigate population differences in the developmental courses of behaviors or outcomes . This article demonstrates a new Stata command, traj, for fitting to longitudinal data finite (discrete) mixture models designed to identify clusters of individuals following similar progressions of some behavior or outcome over age or time. Censored normal, Poisson, zero-inflated Poisson, and Bernoulli distributions are supported. Applications to psychometric scale data, count data, and a dichotomous prevalence measure are illustrated. Introduction A developmental trajectory measures the course of an outcome over age or time. The study of developmental trajectories is a central theme of developmental and abnormal psychology and psychiatry, of life course studies in sociology and criminology, of physical and biological outcomes in medicine and gerontology. A wide variety of statistical methods are used to study these phenomena. This article demonstrates a Stata plugin for estimating group-based trajectory models. The Stata program we demonstrate adapts a well-established SAS-based procedure for estimating group-based trajectory model (Jones, Nagin, and Roeder, 2001; Jones and Nagin, 2007) to the Stata platform. Group-based trajectory modeling is a specialized form of finite mixture modeling. The method is designed identify groups of individuals following similarly developmental trajectories. For a recent review of applications of group-based trajectory modeling see Nagin and Odgers (2010) and for an extended discussion of the method, including technical details, see Nagin (2005). A Brief Overview of Group-Based Trajectory Modeling Using finite mixtures of suitably defined probability distributions, the group-based approach for modeling developmental trajectories is intended to provide a flexible and easily applied method for identifying distinctive clusters of individual trajectories within the population and for profiling the characteristics of individuals within the clusters. Thus, whereas the hierarchical and latent curve methodologies model population variability in growth with multivariate continuous distribution functions, the group-based approach utilizes a multinomial modeling strategy. Technically, the group-based trajectory model is an example of a finite mixture model. Maximum likelihood is used for the estimation of the model parameters. The maximization is performed using a general quasi-Newton procedure (Dennis, Gay, and Welsch 1981; Dennis and Mei 1979). The fundamental concept of interest is the distribution of outcomes conditional on age (or time); that is, the distribution of outcome trajectories denoted by ), | ( i i Age Y P where the random vector Yi represents individual i’s longitudinal sequence of behavioral outcomes and the vector Agei represents individual i’s age when each of those measurements is recorded. The group-based trajectory model assumes that the population distribution of trajectories arises from a finite mixture of unknown order J. The likelihood for each individual i, conditional on the number of groups J, may be written as 1 Trajectories can also be defined by time (e.g., time from treatment). 1 ( | ) ( | , ; ) (1), J j j i i i i j P Y Age P Y Age j       where  is the probability of membership in group j, and the conditional distribution of Yi given membership in j is indexed by the unknown parameter vector  which among other things determines the shape of the group-specific trajectory. The trajectory is modeled with up to a 5 order polynomial function of age (or time). For given j, conditional independence is assumed for the sequential realizations of the elements of Yi , yit, over the T periods of measurement. Thus, we may write    T i t j it it j i i j age y p j Age Y P ), 2 ( ) ; , | ( ) ; , | (   where p(.) is the distribution of yit conditional on membership in group j and the age of individual i at time t. 2 The software provides three alternative specifications of p(.): the censored normal distribution also known as the Tobit model, the zero-inflated Poisson distribution, and the binary logit distribution. The censored normal distribution is designed for the analysis of repeatedly measured, (approximately) continuous scales which may be censored by either a scale minimum or maximum or both (e.g., longitudinal data on a scale of depression symptoms). A special case is a scale or other outcome variable with no minimum or maximum. The zero-inflated Poisson distribution is designed for the analysis of longitudinal count data (e.g., arrests by age) and binary logit distribution for the analysis of longitudinal data on a dichotomous outcome variable (e.g., whether hospitalized in year t or not). The model also provides capacity for analyzing the effect of time-stable covariate effects on probability of group membership and the effect of time dependent covariates on the trajectory itself. Let i x denote a vector of time stable covariates thought to be associated with probability of trajectory group membership. Effects of time-stable covariates are modeled with a generalized logit function where without loss of generality :", "title": "" } ]
scidocsrr
b41463572e012229b7cc2ae03accfe22
Performance of a Distribution Intelligent Universal Transformer under Source and Load Disturbances
[ { "docid": "436a250dc621d58d70bee13fd3595f06", "text": "The solid-state transformer allows add-on intelligence to enhance power quality compatibility between source and load. It is desired to demonstrate the benefits gained by the use of such a device. Recent advancement in semiconductor devices and converter topologies facilitated a newly proposed intelligent universal transformer (IUT), which can isolate a disturbance from either source or load. This paper describes the basic circuit and the operating principle for the multilevel converter based IUT and its applications for medium voltages. Various power quality enhancement features are demonstrated with computer simulation for a complete IUT circuit.", "title": "" } ]
[ { "docid": "f3860c0ed0803759e44133a0110a60bb", "text": "Using comment information available from Digg we define a co-participation network between users. We focus on the analysis of this implicit network, and study the behavioral characteristics of users. Using an entropy measure, we infer that users at Digg are not highly focused and participate across a wide range of topics. We also use the comment data and social network derived features to predict the popularity of online content linked at Digg using a classification and regression framework. We show promising results for predicting the popularity scores even after limiting our feature extraction to the first few hours of comment activity that follows a Digg submission.", "title": "" }, { "docid": "765e766515c9c241ffd2d84572fd887f", "text": "The cost of reconciling consistency and state management with high availability is highly magnified by the unprecedented scale and robustness requirements of today’s Internet applications. We propose two strategies for improving overall availability using simple mechanisms that scale over large applications whose output behavior tolerates graceful degradation. We characterize this degradation in terms of harvest and yield, and map it directly onto engineering mechanisms that enhance availability by improving fault isolation, and in some cases also simplify programming. By collecting examples of related techniques in the literature and illustrating the surprising range of applications that can benefit from these approaches, we hope to motivate a broader research program in this area. 1. Motivation, Hypothesis, Relevance Increasingly, infrastructure services comprise not only routing, but also application-level resources such as search engines [15], adaptation proxies [8], and Web caches [20]. These applications must confront the same operational expectations and exponentially-growing user loads as the routing infrastructure, and consequently are absorbing comparable amounts of hardware and software. The current trend of harnessing commodity-PC clusters for scalability and availability [9] is reflected in the largest web server installations. These sites use tens to hundreds of PC’s to deliver 100M or more read-mostly page views per day, primarily using simple replication or relatively small data sets to increase throughput. The scale of these applications is bringing the wellknown tradeoff between consistency and availability [4] into very sharp relief. In this paper we propose two general directions for future work in building large-scale robust systems. Our approaches tolerate partial failures by emphasizing simple composition mechanisms that promote fault containment, and by translating possible partial failure modes into engineering mechanisms that provide smoothlydegrading functionality rather than lack of availability of the service as a whole. The approaches were developed in the context of cluster computing, where it is well accepted [22] that one of the major challenges is the nontrivial software engineering required to automate partial-failure handling in order to keep system management tractable. 2. Related Work and the CAP Principle In this discussion, strong consistency means singlecopy ACID [13] consistency; by assumption a stronglyconsistent system provides the ability to perform updates, otherwise discussing consistency is irrelevant. High availability is assumed to be provided through redundancy, e.g. data replication; data is considered highly available if a given consumer of the data can always reach some replica. Partition-resilience means that the system as whole can survive a partition between data replicas. Strong CAP Principle. Strong Consistency, High Availability, Partition-resilience: Pick at most 2. The CAP formulation makes explicit the trade-offs in designing distributed infrastructure applications. It is easy to identify examples of each pairing of CAP, outlining the proof by exhaustive example of the Strong CAP Principle: CA without P: Databases that provide distributed transactional semantics can only do so in the absence of a network partition separating server peers. CP without A: In the event of a partition, further transactions to an ACID database may be blocked until the partition heals, to avoid the risk of introducing merge conflicts (and thus inconsistency). AP without C: HTTP Web caching provides clientserver partition resilience by replicating documents, but a client-server partition prevents verification of the freshness of an expired replica. In general, any distributed database problem can be solved with either expiration-based caching to get AP, or replicas and majority voting to get PC (the minority is unavailable). In practice, many applications are best described in terms of reduced consistency or availability. For example, weakly-consistent distributed databases such as Bayou [5] provide specific models with well-defined consistency/availability tradeoffs; disconnected filesystems such as Coda [16] explicitly argued for availability over strong consistency; and expiration-based consistency mechanisms such as leases [12] provide fault-tolerant consistency management. These examples suggest that there is a Weak CAP Principle which we have yet to characterize precisely: The stronger the guarantees made about any two of strong consistency, high availability, or resilience to partitions, the weaker the guarantees that can be made about the third. 3. Harvest, Yield, and the CAP Principle Both strategies we propose for improving availability with simple mechanisms rely on the ability to broaden our notion of “correct behavior” for the target application, and then exploit the tradeoffs in the CAP principle to improve availability at large scale. We assume that clients make queries to servers, in which case there are at least two metrics for correct behavior: yield, which is the probability of completing a request, and harvest, which measures the fraction of the data reflected in the response, i.e. the completeness of the answer to the query. Yield is the common metric and is typically measured in “nines”: “four-nines availability” means a completion probability of . In practice, good HA systems aim for four or five nines. In the presence of faults there is typically a tradeoff between providing no answer (reducing yield) and providing an imperfect answer (maintaining yield, but reducing harvest). Some applications do not tolerate harvest degradation because any deviation from the single well-defined correct behavior renders the result useless. For example, a sensor application that must provide a binary sensor reading (presence/absence) does not tolerate degradation of the output.1 On the other hand, some applications tolerate graceful degradation of harvest: online aggregation [14] allows a user to explicitly trade running time for precision and confidence in performing arithmetic aggregation queries over a large dataset, thereby smoothly trading harvest for response time, which is particularly useful for approximate answers and for avoiding work that looks unlikely to be worthwhile based on preliminary results. At first glance, it would appear that this kind of degradation applies only to queries and not to updates. However, the model can be applied in the case of “single-location” updates: those changes that are localized to a single node (or technically a single partition). In this case, updates that 1This is consistent with the use of the term yield in semiconductor manufacturing: typically, each die on a wafer is intolerant to harvest degradation, and yield is defined as the fraction of working dice on a wafer. affect reachable nodes occur correctly but have limited visibility (a form of reduced harvest), while those that require unreachable nodes fail (reducing yield). These localized changes are consistent exactly because the new values are not available everywhere. This model of updates fails for global changes, but it is still quite useful for many practical applications, including personalization databases and collaborative filtering. 4. Strategy 1: Trading Harvest for Yield— Probabilistic Availability Nearly all systems are probabilistic whether they realize it or not. In particular, any system that is 100% available under single faults is probabilistically available overall (since there is a non-zero probability of multiple failures), and Internet-based servers are dependent on the best-effort Internet for true availability. Therefore availability maps naturally to probabilistic approaches, and it is worth addressing probabilistic systems directly, so that we can understand and limit the impact of faults. This requires some basic decisions about what needs to be available and the expected nature of faults. For example, node faults in the Inktomi search engine remove a proportional fraction of the search database. Thus in a 100-node cluster a single-node fault reduces the harvest by 1% during the duration of the fault (the overall harvest is usually measured over a longer interval). Implicit in this approach is graceful degradation under multiple node faults, specifically, linear degradation in harvest. By randomly placing data on nodes, we can ensure that the 1% lost is a random 1%, which makes the average-case and worstcase fault behavior the same. In addition, by replicating a high-priority subset of data, we reduce the probability of losing that data. This gives us more precise control of harvest, both increasing it and reducing the practical impact of missing data. Of course, it is possible to replicate all data, but doing so may have relatively little impact on harvest and yield despite significant cost, and in any case can never ensure 100% harvest or yield because of the best-effort Internet protocols the service relies on. As a similar example, transformation proxies for thin clients [8] also trade harvest for yield, by degrading results on demand to match the capabilities of clients that might otherwise be unable to get results at all. Even when the 100%-harvest answer is useful to the client, it may still be preferable to trade response time for harvest when clientto-server bandwidth is limited, for example, by intelligent degradation to low-bandwidth formats [7]. 5. Strategy 2: Application Decomposition and Orthogonal Mechanisms Some large applications can be decomposed into subsystems that are independently intolerant to harvest degradation (i.e. they fail by reducing yield), but whose independent failure allows the overall application to continue functioning with reduced utility. The application as a whole is then tolerant of harvest degradation. A good decomposition has at least one actual benefit and one potential benefit. The actual benefi", "title": "" }, { "docid": "7a5fb2c77cfe49e6c6070d6d9e555116", "text": "Implicit discourse relation classification is of great challenge due to the lack of connectives as strong linguistic cues, which motivates the use of annotated implicit connectives to improve the recognition. We propose a feature imitation framework in which an implicit relation network is driven to learn from another neural network with access to connectives, and thus encouraged to extract similarly salient features for accurate classification. We develop an adversarial model to enable an adaptive imitation scheme through competition between the implicit network and a rival feature discriminator. Our method effectively transfers discriminability of connectives to the implicit features, and achieves state-of-the-art performance on the PDTB benchmark.", "title": "" }, { "docid": "3fc94de55342ff7560ed0c13a18e526c", "text": "Linear optics with photon counting is a prominent candidate for practical quantum computing. The protocol by Knill, Laflamme, and Milburn 2001, Nature London 409, 46 explicitly demonstrates that efficient scalable quantum computing with single photons, linear optical elements, and projective measurements is possible. Subsequently, several improvements on this protocol have started to bridge the gap between theoretical scalability and practical implementation. The original theory and its improvements are reviewed, and a few examples of experimental two-qubit gates are given. The use of realistic components, the errors they induce in the computation, and how these errors can be corrected is discussed.", "title": "" }, { "docid": "81a9c8a0314703f2c73789f46b394bfe", "text": "In order to reproduce jaw motions and mechanics that match the human jaw function truthfully with the conception of bionics, a novel human jaw movement robot based on mechanical biomimetic principles was proposed. Firstly, based on the biomechanical properties of mandibular muscles, a jaw robot is built based on the 6-PSS parallel mechanism. Secondly, the inverse kinematics solution equations are derived. Finally, kinematics performances, such as workspace with the orientation constant, manipulability, dexterity of the jaw robot are obtained. These indices show that the parallel mechanism have a big enough flexible workspace, no singularity, and a good motion transfer performance for human chewing movement.", "title": "" }, { "docid": "99511c1267d396d3745f075a40a06507", "text": "Problem Description: It should be well known that processors are outstripping memory performance: specifically that memory latencies are not improving as fast as processor cycle time or IPC or memory bandwidth. Thought experiment: imagine that a cache miss takes 10000 cycles to execute. For such a processor instruction level parallelism is useless, because most of the time is spent waiting for memory. Branch prediction is also less effective, since most branches can be determined with data already in registers or in the cache; branch prediction only helps for branches which depend on outstanding cache misses. At the same time, pressures for reduced power consumption mount. Given such trends, some computer architects in industry (although not Intel EPIC) are talking seriously about retreating from out-of-order superscalar processor architecture, and instead building simpler, faster, dumber, 1-wide in-order processors with high degrees of speculation. Sometimes this is proposed in combination with multiprocessing and multithreading: tolerate long memory latencies by switching to other processes or threads. I propose something different: build narrow fast machines but use intelligent logic inside the CPU to increase the number of outstanding cache misses that can be generated from a single program. By MLP I mean simply the number of outstanding cache misses that can be generated (by a single thread, task, or program) and executed in an overlapped manner. It does not matter what sort of execution engine generates the multiple outstanding cache misses. An out-of-order superscalar ILP CPU may generate multiple outstanding cache misses, but 1-wide processors can be just as effective. Change the metrics: total execution time remains the overall goal, but instead of reporting IPC as an approximation to this, we must report MLP. Limit studies should be in terms of total number of non-overlapped cache misses on critical path. Now do the research: Many present-day hot topics in computer architecture help ILP, but do not help MLP. As mentioned above, predicting branch directions for branches that can be determined from data already in the cache or in registers does not help MLP for extremely long latencies. Similarly, prefetching of data cache misses for array processing codes does not help MLP – it just moves it around. Instead, investigate microarchitectures that help MLP: (0) Trivial case – explicit multithreading, like SMT. (1) Slightly less trivial case – implicitly multithread single programs, either by compiler software on an MT machine, or by a hybrid, such as …", "title": "" }, { "docid": "2d5368515f2ea6926e9347d971745eb9", "text": "Let us consider a \" random graph \" r,:l,~v having n possible (labelled) vertices and N edges; in other words, let us choose at random (with equal probabilities) one of the t 1 has no isolated points) and is connected in the ordinary sense. In the present paper we consider asymptotic statistical properties of random graphs for 11++ 30. We shall deal with the following questions: 1. What is the probability of r,,. T being completely connected? 2. What is the probability that the greatest connected component (sub-graph) of r,,, s should have effectively n-k points? (k=O, 1,. . .). 3. What is the probability that rp,N should consist of exactly kf I connected components? (k = 0, 1,. + .). 4. If the edges of a graph with n vertices are chosen successively so that after each step every edge which has not yet been chosen has the same probability to be chosen as the next, and if we continue this process until the graph becomes completely connected, what is the probability that the number of necessary sfeps v will be equal to a given number I? As (partial) answers to the above questions we prove ihe following four theorems. In Theorems 1, 2, and 3 we use the notation N,= (I-&n log n+cn 1 where c is an arbitrary fixed real number ([xl denotes the integer part of x).", "title": "" }, { "docid": "283849657698b38e537171e2e74de52d", "text": "Web logs can provide a wealth of information on user access patterns of a corresponding website, when they are properly analyzed. However, finding interesting patterns hidden in the low-level log data is non-trivial due to large log volumes, and the distribution of the log files in cluster environments. This paper presents a novel technique, the application of Density-Based Spatial Clustering of Applications with Noise (DBSCAN) and Expectation Maximization (EM) algorithms in an iterative manner for clustering web user sessions. Each cluster corresponds to one or more web user activities. The unique user access pattern of each cluster is identified by frequent pattern mining and sequential pattern mining techniques. When compared with the clustering output of EM, DBSCAN, and k-means algorithms, this technique shows better accuracy in web session mining, and it is more effective in identifying cluster changes with time. We demonstrate that the implemented system is capable of not only identifying common user behaviors, but also of identifying cyber-attacks.", "title": "" }, { "docid": "58e2cba4f609dce3b17e945f58d90c08", "text": "We develop a theory of financing of entrepreneurial ventures via an initial coin offering (ICO). Pre-selling a venture’s output by issuing tokens allows the entrepreneur to transfer part of the venture risk to diversified investors without diluting her control rights. This, however, leads to an agency conflict between the entrepreneur and investors that manifests itself in underinvestment. We show that an ICO can dominate traditional venture capital (VC) financing when VC investors are under-diversified, when the idiosyncratic component of venture risk is large enough, when the payoff distribution is sufficiently right-skewed, and when the degree of information asymmetry between the entrepreneur and ICO investors is not too large. Overall, our model suggests that an ICO can be a viable financing alternative for some but not all entrepreneurial ventures. An implication is that while regulating ICOs to reduce the information asymmetry associated with them is desirable, banning them outright is not.", "title": "" }, { "docid": "92377bb2bc4e2daee041c5b78a5fcaf9", "text": "Online discussions forums, known as forums for short, are conversational social cyberspaces constituting rich repositories of content and an important source of collaborative knowledge. However, most of this knowledge is buried inside the forum infrastructure and its extraction is both complex and difficult. The ability to automatically rate postings in online discussion forums, based on the value of their contribution, enhances the ability of users to find knowledge within this content. Several key online discussion forums have utilized collaborative intelligence to rate the value of postings made by users. However, a large percentage of posts go unattended and hence lack appropriate rating.\n In this paper, we focus on automatic rating of postings in online discussion forums. A set of features derived from the posting content and the threaded discussion structure are generated for each posting. These features are grouped into five categories, namely (i) relevance, (ii) originality, (iii) forum-specific features, (iv) surface features, and (v) posting-component features. Using a non-linear SVM classifier, the value of each posting is categorized into one of three levels High, Medium, or Low. This rating represents a seed value for each posting that is leveraged in filtering forum content. Experimental results have shown promising performance on forum data.", "title": "" }, { "docid": "520b805d2b8777a10f3fd4731af0e94b", "text": "I Promising empirical results for cost-sensitive and multivariate losses (Asif et al. 2015, Wang et al. 2015) Our Approach: 1. Recast zero-one adversarial classification from ERM perspective by analyzing the Nash equilibrium and define a new multiclass loss 2. Fill the long-standing gap in ERM methods by simultaneously: (1) Guaranteeing Fisher consistency and universal consistency (2) Enabling computational efficiency via kernel trick and dual sparsity (3) Providing competitive performance in practice 3. Significantly improve computational efficiency → no game solving using linear programming is required", "title": "" }, { "docid": "42bb77e398f19f3be69c3852a597aa33", "text": "The recently released Rodinia benchmark suite enables users to evaluate heterogeneous systems including both accelerators, such as GPUs, and multicore CPUs. As Rodinia sees higher levels of acceptance, it becomes important that researchers understand this new set of benchmarks, especially in how they differ from previous work. In this paper, we present recent extensions to Rodinia and conduct a detailed characterization of the Rodinia benchmarks (including performance results on an NVIDIA GeForce GTX480, the first product released based on the Fermi architecture). We also compare and contrast Rodinia with Parsec to gain insights into the similarities and differences of the two benchmark collections; we apply principal component analysis to analyze the application space coverage of the two suites. Our analysis shows that many of the workloads in Rodinia and Parsec are complementary, capturing different aspects of certain performance metrics.", "title": "" }, { "docid": "f6a08c6659fcb7e6e56c0d004295c809", "text": "Graph convolutional networks (GCNs) are powerful deep neural networks for graph-structured data. However, GCN computes the representation of a node recursively from its neighbors, making the receptive field size grow exponentially with the number of layers. Previous attempts on reducing the receptive field size by subsampling neighbors do not have convergence guarantee, and their receptive field size per node is still in the order of hundreds. In this paper, we develop control variate based algorithms with new theoretical guarantee to converge to a local optimum of GCN regardless of the neighbor sampling size. Empirical results show that our algorithms enjoy similar convergence rate and model quality with the exact algorithm using only two neighbors per node. The running time of our algorithms on a large Reddit dataset is only one seventh of previous neighbor sampling algorithms.", "title": "" }, { "docid": "a7c0a12e6e52a98e825c462f54be6ee5", "text": "Given the abundance of various types of satellite imagery of almost any region on the globe we are faced with a challenge of interpreting this data to extract useful information. In this thesis we look at a way of automating the detection of ships to track maritime traffic in a desired port or region. We propose a machine learning approach using deep neural networks and explore the development, implementation and evaluation of such a pipeline, as well as methods and dataset used to train the neural network classifier. We also take a look at a graphical approach to computation using TensorFlow [13] which offers easy massive parallelization and deployment to cloud. The final result is an algorithm which is capable of receiving images from various providers at various resolutions and outputs a binary pixelwise mask over all detected ships.", "title": "" }, { "docid": "080e7880623a09494652fd578802c156", "text": "Whole-cell biosensors are a good alternative to enzyme-based biosensors since they offer the benefits of low cost and improved stability. In recent years, live cells have been employed as biosensors for a wide range of targets. In this review, we will focus on the use of microorganisms that are genetically modified with the desirable outputs in order to improve the biosensor performance. Different methodologies based on genetic/protein engineering and synthetic biology to construct microorganisms with the required signal outputs, sensitivity, and selectivity will be discussed.", "title": "" }, { "docid": "db3d1a63d5505693bd6677e9b268e8d4", "text": "This paper presents a system for calibrating the extrinsic parameters and timing offsets of an array of cameras, 3-D lidars, and global positioning system/inertial navigation system sensors, without the requirement of any markers or other calibration aids. The aim of the approach is to achieve calibration accuracies comparable with state-of-the-art methods, while requiring less initial information about the system being calibrated and thus being more suitable for use by end users. The method operates by utilizing the motion of the system being calibrated. By estimating the motion each individual sensor observes, an estimate of the extrinsic calibration of the sensors is obtained. Our approach extends standard techniques for motion-based calibration by incorporating estimates of the accuracy of each sensor's readings. This yields a probabilistic approach that calibrates all sensors simultaneously and facilitates the estimation of the uncertainty in the final calibration. In addition, we combine this motion-based approach with appearance information. This gives an approach that requires no initial calibration estimate and takes advantage of all available alignment information to provide an accurate and robust calibration for the system. The new framework is validated with datasets collected with different platforms and different sensors' configurations, and compared with state-of-the-art approaches.", "title": "" }, { "docid": "62688aa48180943a6fcf73fef154fe75", "text": "Oxidative stress is a phenomenon associated with the pathology of several diseases including atherosclerosis, neurodegenerative diseases such as Alzheimer’s and Parkinson’s diseases, cancer, diabetes mellitus, inflammatory diseases, as well as psychiatric disorders or aging process. Oxidative stress is defined as an imbalance between the production of free radicals and reactive metabolites, so called oxidants, and their elimination by protective mechanisms named antioxidative systems. Free radicals and their metabolites prevail over antioxidants. This imbalance leads to damage of important biomolecules and organs with plausible impact on the whole organism. Oxidative and antioxidative processes are associated with electron transfer influencing the redox state of cells and organisms; therefore, oxidative stress is also known as redox stress. At present, the opinion that oxidative stress is not always harmful has been accepted. Depending on its intensity, it can play a role in regulation of other important processes through modulation of signal pathways, influencing synthesis of antioxidant enzymes, repair processes, inflammation, apoptosis and cell proliferation, and thus process of a malignity. Therefore, improper administration of antioxidants can potentially negatively impact biological systems.", "title": "" }, { "docid": "d2a0ff28b7163203a03be27977b9b425", "text": "The various types of shadows are characterized. Most existing shadow algorithms are described, and their complexities, advantages, and shortcomings are discussed. Hard shadows, soft shadows, shadows of transparent objects, and shadows for complex modeling primitives are considered. For each type, shadow algorithms within various rendering techniques are examined. The aim is to provide readers with enough background and insight on the various methods to allow them to choose the algorithm best suited to their needs and to help identify the areas that need more research and point to possible solutions.<<ETX>>", "title": "" }, { "docid": "d060d89c7c3fbdc35ccdf8b61fc26cbe", "text": "The increasing pervasiveness of location-acquisition technologies has enabled collection of huge amount of trajectories for almost any kind of moving objects. Discovering useful patterns from their movement behaviours can convey valuable knowledge to a variety of critical applications. In this light, we propose a novel concept, called gathering, which is a trajectory pattern modelling various group incidents such as celebrations, parades, protests, traffic jams and so on. A key observation is that these incidents typically involve large congregations of individuals, which form durable and stable areas with high density. Since the process of discovering gathering patterns over large-scale trajectory databases can be quite lengthy, we further develop a set of well thought out techniques to improve the performance. These techniques, including effective indexing structures, fast pattern detection algorithms implemented with bit vectors, and incremental algorithms for handling new trajectory arrivals, collectively constitute an efficient solution for this challenging task. Finally, the effectiveness of the proposed concepts and the efficiency of the approaches are validated by extensive experiments based on a real taxicab trajectory dataset.", "title": "" } ]
scidocsrr
aaab12e5dbb3fd1ec6115db261f2e8b4
Epileptic Spike Detection Using a Kalman Filter Based Approach
[ { "docid": "ba79dd4818facbf0cef50bb1422f43e6", "text": "A nonlinear energy operator (NEO) gives an estimate of the energy content of a linear oscillator. This has been used to quantify the AM-FM modulating signals present in a sinusoid. Here, the authors give a new interpretation of NEO and extend its use in stochastic signals. They show that NEO accentuates the high-frequency content. This instantaneous nature of NEO and its very low computational burden make it an ideal tool for spike detection. The efficacy of the proposed method has been tested with simulated signals as well as with real electroencephalograms (EEGs).", "title": "" } ]
[ { "docid": "c6134f5691f1422921f6ee260b936745", "text": "High-level feature extraction and hierarchical feature representation of image objects with a convolutional neural network (CNN) can overcome the limitations of the traditional building detection models using middle/low-level features extracted from a complex background. Aiming at the drawbacks of manual village location, high cost, and the limited accuracy of building detection in the existing rural building detection models, a two-stage CNN model is proposed in this letter to detect rural buildings in high-resolution imagery. Simulating the hierarchical processing mechanism of human vision, the proposed model is constructed with two CNNs, whose architectures can automatically locate villages and efficiently detect buildings, respectively. This two-stage CNN model effectively reduces the complexity of the background and improves the efficiency of rural building detection. The experiments showed that the proposed model could automatically locate all the villages in the two study areas, achieving a building detection accuracy of 88%. Compared with the existing models, the proposed model was proved to be effective in detecting buildings in rural areas with a complex background.", "title": "" }, { "docid": "ec0268d7d0384f0c85610ba8e4217a14", "text": "Many shared computing clusters allow users to utilize excess idle resources at lower cost or priority, with the proviso that some or all may be taken away at any time. But, exploiting such dynamic resource availability and the often fluctuating markets for them requires agile elasticity and effective acquisition strategies. Proteus aggressively exploits such transient revocable resources to do machine learning (ML) cheaper and/or faster. Its parameter server framework, AgileML, efficiently adapts to bulk additions and revocations of transient machines, through a novel 3-stage active-backup approach, with minimal use of more costly non-transient resources. Its BidBrain component adaptively allocates resources from multiple EC2 spot markets to minimize average cost per work as transient resource availability and cost change over time. Our evaluations show that Proteus reduces cost by 85% relative to non-transient pricing, and by 43% relative to previous approaches, while simultaneously reducing runtimes by up to 37%.", "title": "" }, { "docid": "72cfe76ea68d5692731531aea02444d0", "text": "Primary human tumor culture models allow for individualized drug sensitivity testing and are therefore a promising technique to achieve personalized treatment for cancer patients. This would especially be of interest for patients with advanced stage head and neck cancer. They are extensively treated with surgery, usually in combination with high-dose cisplatin chemoradiation. However, adding cisplatin to radiotherapy is associated with an increase in severe acute toxicity, while conferring only a minor overall survival benefit. Hence, there is a strong need for a preclinical model to identify patients that will respond to the intended treatment regimen and to test novel drugs. One of such models is the technique of culturing primary human tumor tissue. This review discusses the feasibility and success rate of existing primary head and neck tumor culturing techniques and their corresponding chemo- and radiosensitivity assays. A comprehensive literature search was performed and success factors for culturing in vitro are debated, together with the actual value of these models as preclinical prediction assay for individual patients. With this review, we aim to fill a gap in the understanding of primary culture models from head and neck tumors, with potential importance for other tumor types as well.", "title": "" }, { "docid": "18a5e6686a26a2f17c65a217022163b1", "text": "This paper proposes the first derivation, implementation, and experimental validation of light field image-based visual servoing. Light field image Jacobians are derived based on a compact light field feature representation that is close to the form measured directly by light field cameras. We also enhance feature detection and correspondence by enforcing light field geometry constraints, and directly estimate the image Jacobian without knowledge of point depth. The proposed approach is implemented over a standard visual servoing control loop, and applied to a custom-mirror-based light field camera mounted on a robotic arm. Light field image-based visual servoing is then validated in both simulation and experiment. We show that the proposed method outperforms conventional monocular and stereo image-based visual servoing under field-of-view constraints and occlusions.", "title": "" }, { "docid": "7276da5180e8ac789b00c4d6f78cb55c", "text": "Recent advances in convolutional neural networks have shown promising results in 3D shape completion. But due to GPU memory limitations, these methods can only produce low-resolution outputs. To inpaint 3D models with semantic plausibility and contextual details, we introduce a hybrid framework that combines a 3D Encoder-Decoder Generative Adversarial Network (3D-ED-GAN) and a Longterm Recurrent Convolutional Network (LRCN). The 3DED- GAN is a 3D convolutional neural network trained with a generative adversarial paradigm to fill missing 3D data in low-resolution. LRCN adopts a recurrent neural network architecture to minimize GPU memory usage and incorporates an Encoder-Decoder pair into a Long Shortterm Memory Network. By handling the 3D model as a sequence of 2D slices, LRCN transforms a coarse 3D shape into a more complete and higher resolution volume. While 3D-ED-GAN captures global contextual structure of the 3D shape, LRCN localizes the fine-grained details. Experimental results on both real-world and synthetic data show reconstructions from corrupted models result in complete and high-resolution 3D objects.", "title": "" }, { "docid": "1912f9ad509e446d3e34e3c6dccd4c78", "text": "Lumbar disc herniation is a common male disease. In the past, More academic attention was directed to its relationship with lumbago and leg pain than to its association with andrological diseases. Studies show that central lumber intervertebral disc herniation may cause cauda equina injury and result in premature ejaculation, erectile dysfunction, chronic pelvic pain syndrome, priapism, and emission. This article presents an overview on the correlation between central lumbar intervertebral disc herniation and andrological diseases, focusing on the aspects of etiology, pathology, and clinical progress, hoping to invite more attention from andrological and osteological clinicians.", "title": "" }, { "docid": "4179729bef0b37bb90d58395bb4dfd18", "text": "A navigation mesh is a representation of a 2D or 3D virtual environment that enables path planning and crowd simulation for walking characters. Various state-of-the-art navigation meshes exist, but there is no standardized way of evaluating or comparing them. Each implementation is in a different state of maturity, has been tested on different hardware, uses different example environments, and may have been designed with a different application in mind.\n In this paper, we conduct the first comparative study of navigation meshes. First, we give general definitions of 2D and 3D environments and navigation meshes. Second, we propose theoretical properties by which navigation meshes can be classified. Third, we introduce metrics by which the quality of a navigation mesh implementation can be measured objectively. Finally, we use these metrics to compare various state-of-the-art navigation meshes in a range of 2D and 3D environments.\n We expect that this work will set a new standard for the evaluation of navigation meshes, that it will help developers choose an appropriate navigation mesh for their application, and that it will steer future research on navigation meshes in interesting directions.", "title": "" }, { "docid": "935445679a3e94f96bcb05a947363995", "text": "While theories abound concerning knowledge transfer in organisations, little empirical work has been undertaken to assess any possible relationship between repositories of knowledge and those responsible for the use of knowledge. This paper develops a knowledge transfer framework based on an empirical analysis of part of the UK operation of a Fortune 100 corporation, which extends existing knowledge transfer theory. The proposed framework integrates knowledge storage and knowledge administration within a model of effective knowledge transfer. This integrated framework encompasses five components: the actors engaged in the transfer of knowledge, the typology of organisational knowledge that is transferred between the actors, the mechanisms by which the knowledge transfer is carried out, the repositories where explicit knowledge is retained and the knowledge administrator equivalent whose function is to manage and maintain knowledge. The paper concludes that a ‘hybridisation’ of knowledge transfer approach, revealed by the framework, offers some promise in organisational applications.", "title": "" }, { "docid": "94a59a5cbcffb2e33732533477bb51c1", "text": "Personas are a critical method for orienting design and development teams to user experience. Prior work has noted challenges in justifying them to developers. In contrast, it has been assumed that designers and user experience professionals - whose goal is to focus designs on targeted users - will readily exploit personas. This paper examines that assumption. We present the first study of how experienced user-centered design (UCD) practitioners with prior experience deploying personas, use and perceive personas in industrial software design. We identify limits to the persona approach in the context studied. Practitioners used personas almost exclusively for communication, but not for design. Participants identified four problems with personas, finding them abstract, impersonal, misleading and distracting. Our findings argue for a new approach to persona deployment and construction. Personas cannot replace immersion in actual user data. And rather than focusing on creating engaging personas, it is critical to avoid persona attributes that mislead or distract.", "title": "" }, { "docid": "81ee018bb1719d7963f057649c1c410e", "text": "Solar and wind are the most promising among the renewable energy sources. The objective of this paper is to investigate the optimal techno-economically feasible model to mitigate a large scale demand in decentralized scenario. Solar, and wind energy potential in a hybrid scenario is closely assessed with an intermittent support from diesel generator and battery banks. Based on the general usage of appliances in a residential demand for 200 families that comprises of 1000 people a suitable load pattern is developed for this study. Demand in northern Europe predominantly constitutes of heating requirement in the form of water and space heating. The proposed model demonstrates convincing reliability in terms of techno-economical prospective. EnergyPRO, HOMER, and Balmorel software environments were used to simulate the models, results are assessed in the paper.", "title": "" }, { "docid": "bb29a8e942c69cdb6634faa563cddb3a", "text": "Convolutional neural network (CNN) finds applications in a variety of computer vision applications ranging from object recognition and detection to scene understanding owing to its exceptional accuracy. There exist different algorithms for CNNs computation. In this paper, we explore conventional convolution algorithm with a faster algorithm using Winograd's minimal filtering theory for efficient FPGA implementation. Distinct from the conventional convolution algorithm, Winograd algorithm uses less computing resources but puts more pressure on the memory bandwidth. We first propose a fusion architecture that can fuse multiple layers naturally in CNNs, reusing the intermediate data. Based on this fusion architecture, we explore heterogeneous algorithms to maximize the throughput of a CNN. We design an optimal algorithm to determine the fusion and algorithm strategy for each layer. We also develop an automated toolchain to ease the mapping from Caffe model to FPGA bitstream using Vivado HLS. Experiments using widely used VGG and AlexNet demonstrate that our design achieves up to 1.99X performance speedup compared to the prior fusion-based FPGA accelerator for CNNs.", "title": "" }, { "docid": "250c1a5ac98dc6556bc62cc05555499d", "text": "Smartphones are programmable and equipped with a set of cheap but powerful embedded sensors, such as accelerometer, digital compass, gyroscope, GPS, microphone, and camera. These sensors can collectively monitor a diverse range of human activities and the surrounding environment. Crowdsensing is a new paradigm which takes advantage of the pervasive smartphones to sense, collect, and analyze data beyond the scale of what was previously possible. With the crowdsensing system, a crowdsourcer can recruit smartphone users to provide sensing service. Existing crowdsensing applications and systems lack good incentive mechanisms that can attract more user participation. To address this issue, we design incentive mechanisms for crowdsensing. We consider two system models: the crowdsourcer-centric model where the crowdsourcer provides a reward shared by participating users, and the user-centric model where users have more control over the payment they will receive. For the crowdsourcer-centric model, we design an incentive mechanism using a Stackelberg game, where the crowdsourcer is the leader while the users are the followers. We show how to compute the unique Stackelberg Equilibrium, at which the utility of the crowdsourcer is maximized, and none of the users can improve its utility by unilaterally deviating from its current strategy. For the user-centric model, we design an auction-based incentive mechanism, which is computationally efficient, individually rational, profitable, and truthful. Through extensive simulations, we evaluate the performance and validate the theoretical properties of our incentive mechanisms.", "title": "" }, { "docid": "0167d11b42eeaa94ba58abcbf2eaa99f", "text": "This paper deals with the design solution adopted for a high-speed axial-flux permanent-magnet generator devoted to supplementing power in automotive 42 V electrical systems through a low-voltage multilevel neutral-point-clamped converter. The axial-flux permanent-magnet generator is suitably designed to be directly coupled with a radial turbo-expander which provides recovery of kinetic energy available from the exhaust gases of an internal-combustion engine. The multilevel converter is properly sized for systems having low voltage and high first-order harmonic frequency. The paper describes the proposed 4-kW power rating generating system and discusses various issues resulting from electromagnetic, thermal, and mechanical design of the high-speed axial-flux permanent-magnet generator. As well, investigations on modulation strategy, total harmonic distortion, and power losses are presented for the low-voltage neutral-point-clamped power electronic converter.", "title": "" }, { "docid": "f346b7633d3470205c259d733b004f01", "text": "In this paper we consider the problem of node positioning in ad-hoc networks. We propose a distributed, infrastructure-free positioning algorithm that does not rely on Global Positioning System (GPS). The algorithm uses the distances between the nodes to build a relative coordinate system in which the node positions are computed in two dimensions. The main contribution of this work is to define and compute relative positions of the nodes in an ad-hoc network without using GPS. We further explain how the proposed approach can be applied to wide area ad-hoc networks.", "title": "" }, { "docid": "ddf4e9582bc1b86ca8cb9967c4247e8e", "text": "In the past few years, Iranian universities have embarked to use e-learning tools and technologies to extend and improve their educational services. After a few years of conducting e-learning programs a debate took place within the executives and managers of the e-learning institutes concerning which activities are of the most influence on the learning progress of online students. This research is aimed to investigate the impact of a number of e-learning activities on the students’ learning development. The results show that participation in virtual classroom sessions has the most substantial impact on the students’ final grades. This paper presents the process of applying data mining methods to the web usage records of students’ activities in a virtual learning environment. The main idea is to rank the learning activities based on their importance in order to improve students’ performance by focusing on the most important ones.", "title": "" }, { "docid": "c1a5177b64d1438794a177492896c6cd", "text": "Decision Making for Leaders is an introduction to Saaty's analytic hierarchy process (AHP) aimed at an audience of leaders in business, industry, and government. As such, the book can be viewed as a popularized version of Saaty's more technical works on AHP (for example, see [1]).", "title": "" }, { "docid": "2ce36ce9de500ba2367b1af83ac3e816", "text": "We examine whether the information content of the earnings report, as captured by the earnings response coefficient (ERC), increases when investors’ uncertainty about the manager’s reporting objectives decreases, as predicted in Fischer and Verrecchia (2000). We use the 2006 mandatory compensation disclosures as an instrument to capture a decrease in investors’ uncertainty about managers’ incentives and reporting objectives. Employing a difference-in-differences design and exploiting the staggered adoption of the new rules, we find a statistically and economically significant increase in ERC for treated firms relative to control firms, largely driven by profit firms. Cross-sectional tests suggest that the effect is more pronounced in subsets of firms most affected by the new rules. Our findings represent the first empirical evidence of a role of compensation disclosures in enhancing the information content of financial reports. JEL Classification: G38, G30, G34, M41", "title": "" }, { "docid": "b47d863479f1912ed8be154df188d4af", "text": "This paper describes a new approach t o probabilistic roadmap planners (PRMs). The overall theme of the algorithm, called Lazy PRM, i s to minimize the number of collision checks performed during planning and hence minimize the running t ime of the planner. Our algorithm builds a roadmap in the configuration space, whose nodes are the user-defined initial and goal configurations and a number of randomly generated nodes. Neighboring nodes are connected by edges representing paths between the nodes. In contrast with PRMs, our planner initially assumes that all nodes and edges in the roadmap are collision-free, and searches the roadmap at hand for a shortest path between the initial and the goal node. The nodes and edges along the path are then checked for collision. If a collision with the obstacles occurs, the corresponding nodes and edges are removed fFom the roadmap. Our planner either finds a new shortest path, or first updates the roadmap with new nodes and edges, and then searches for a shortest path. The above process i s repeated until a collision-free path is returned. Lazy P R M is tailored to eficiently answer single planning queries, but can also be used for multiple queries. Experimental results presented in this paper show that our lazy method i s very eficient in practice.", "title": "" }, { "docid": "1303f7a3ddec79951e1b0e7480cdc04e", "text": "Despite the availability of many effective antihypertensive drugs, the drug therapy for resistant hypertension remains a prominent problem. Reviews offer only the general recommendations of increasing dosage and adding drugs, offering clinicians little guidance with respect to the specifics of selecting medications and dosages. A simplified decision tree for drug selection that would be effective in most cases is needed. This review proposes such an approach. The approach is mechanism-based, targeting treatment at three hypertensive mechanisms: (1) sodium/volume, (2) the renin-angiotensin system (RAS), and (3) the sympathetic nervous system (SNS). It assumes baseline treatment with a 2-drug combination directed at sodium/volume and the RAS and recommends proceeding with one or both of just two treatment options: (1) strengthening the diuretic regimen, possibly with the addition of spironolactone, and/or (2) adding agents directed at the SNS, usually a β-blocker or combination of an α- and a β-blocker. The review calls for greater research and clinical attention directed to: (1) assessment of clinical clues that can help direct treatment toward either sodium/volume or the SNS, (2) increased recognition of the role of neurogenic (SNS-mediated) hypertension in resistant hypertension, (3) increased recognition of the effective but underutilized combination of α- + β-blockade, and (4) drug pharmacokinetics and dosing.", "title": "" }, { "docid": "0b0cd7c8e9a15ce99a95180b06f11e5c", "text": "In modern manufacturing systems and industries, more and more research efforts have been made in developing effective machine health monitoring systems. Among various machine health monitoring approaches, data-driven methods are gaining in popularity due to the development of advanced sensing and data analytic techniques. However, considering the noise, varying length and irregular sampling behind sensory data, this kind of sequential data cannot be fed into classification and regression models directly. Therefore, previous work focuses on feature extraction/fusion methods requiring expensive human labor and high quality expert knowledge. With the development of deep learning methods in the last few years, which redefine representation learning from raw data, a deep neural network structure named Convolutional Bi-directional Long Short-Term Memory networks (CBLSTM) has been designed here to address raw sensory data. CBLSTM firstly uses CNN to extract local features that are robust and informative from the sequential input. Then, bi-directional LSTM is introduced to encode temporal information. Long Short-Term Memory networks(LSTMs) are able to capture long-term dependencies and model sequential data, and the bi-directional structure enables the capture of past and future contexts. Stacked, fully-connected layers and the linear regression layer are built on top of bi-directional LSTMs to predict the target value. Here, a real-life tool wear test is introduced, and our proposed CBLSTM is able to predict the actual tool wear based on raw sensory data. The experimental results have shown that our model is able to outperform several state-of-the-art baseline methods.", "title": "" } ]
scidocsrr
6790777bd048c450951362a2dc9d0e24
Dirichlet Process Mixture Model for Correcting Technical Variation in Single-Cell Gene Expression Data
[ { "docid": "3223563162967868075a43ca86c1d31a", "text": "Deep learning research aims at discovering learning algorithms that discover multiple levels of distributed representations, with higher levels representing more abstract concepts. Although the study of deep learning has already led to impressive theoretical results, learning algorithms and breakthrough experiments, several challenges lie ahead. This paper proposes to examine some of these challenges, centering on the questions of scaling deep learning algorithms to much larger models and datasets, reducing optimization difficulties due to ill-conditioning or local minima, designing more efficient and powerful inference and sampling procedures, and learning to disentangle the factors of variation underlying the observed data. It also proposes a few forward-looking research directions aimed at overcoming these", "title": "" } ]
[ { "docid": "201170c6a687535bf77cdda9acb6fbce", "text": "PADS is a declarative data description language that allows data analysts to describe both the physical layout of ad hoc data sources and semantic properties of that data. From such descriptions, the PADS compiler generates libraries and tools for manipulating the data, including parsing routines, statistical profiling tools, translation programs to produce well-behaved formats such as Xml or those required for loading relational databases, and tools for running XQueries over raw PADS data sources. The descriptions are concise enough to serve as \"living\" documentation while flexible enough to describe most of the ASCII, binary, and Cobol formats that we have seen in practice. The generated parsing library provides for robust, application-specific error handling.", "title": "" }, { "docid": "94013936968a4864167ed4e764398deb", "text": "A prime requirement for autonomous driving is a fast and reliable estimation of the motion state of dynamic objects in the ego-vehicle's surroundings. An instantaneous approach for extended objects based on two Doppler radar sensors has recently been proposed. In this paper, that approach is augmented by prior knowledge of the object's heading angle and rotation center. These properties can be determined reliably by state-of-the-art methods based on sensors such as LIDAR or cameras. The information fusion is performed utilizing an appropriate measurement model, which directly maps the motion state in the Doppler velocity space. This model integrates the geometric properties. It is used to estimate the object's motion state using a linear regression. Additionally, the model allows a straightforward calculation of the corresponding variances. The resulting method shows a promising accuracy increase of up to eight times greater than the original approach.", "title": "" }, { "docid": "233ee357b5785572f50b79d6dd936e7c", "text": "graph is a simple, powerful, elegant abstraction with broad applicability in computer science and many related fields. Algorithms that operate on graphs see heavy use in both theoretical and practical contexts. Graphs have a very natural visual representation as nodes and connecting links arranged in space. Seeing this structure explicitly can aid tasks in many domains. Many people automatically sketch such a picture when thinking about small graphs, often including simple annotations. The pervasiveness of visual representations of small graphs testifies to their usefulness. On the other hand, although many large data sets can be expressed as graphs, few such visual representations exist. What causes this discrepancy? For one thing, graph layout poses a hard problem, 1 one that current tools just can't overcome. Conventional systems often falter when handling hundreds of edges, and none can handle more than a few thousand edges. 2 However, nonvisual manipulation of graphs with 50,000 edges is commonplace , and much larger instances exist. We can consider the Web as an extreme example of a graph with many millions of nodes and edges. Although many individual Web sites stay quite small, a significant number have more than 20,000 documents. The Unix file system reachable from a single networked workstation might include more than 100,000 files scattered across dozens of gigabytes worth of remotely mounted disk drives. Computational complexity is not the only reason that software to visually manipulate large graphs has lagged behind software to computationally manipulate them. Many previous graph layout systems have focused on fine-tuning the layout of relatively small graphs in support of polished presentations. A graph drawing system that focuses on the interactive browsing of large graphs can instead target the quite different tasks of browsing and exploration. Many researchers in scientific visual-ization have recognized the split between explanatory and exploratory goals. This distinction proves equally relevant for graph drawing. Contribution This article briefly describes a software system that explicitly attempts to handle much larger graphs than previous systems and support dynamic exploration rather than final presentation. I'll then discuss the applicability of this system to goals beyond simple exploration. A software system that supports graph exploration should include both a layout and an interactive drawing component. I have developed new algorithms for both layout and drawing—H3 and H3Viewer. A paper from InfoVis 97 contains a more extensive presentation of the H3 layout algorithm. 3 The H3Viewer drawing algorithm remains …", "title": "" }, { "docid": "09beeeaf2d92087da10c5725bda10d2f", "text": "We report a quantitative investigation of the visual identification and auditory comprehension deficits of 4 patients who had made a partial recovery from herpes simplex encephalitis. Clinical observations had suggested the selective impairment and selective preservation of certain categories of visual stimuli. In all 4 patients a significant discrepancy between their ability to identify inanimate objects and inability to identify living things and foods was demonstrated. In 2 patients it was possible to compare visual and verbal modalities and the same pattern of dissociation was observed in both. For 1 patient, comprehension of abstract words was significantly superior to comprehension of concrete words. Consistency of responses was recorded within a modality in contrast to a much lesser degree of consistency between modalities. We interpret our findings in terms of category specificity in the organization of meaning systems that are also modality specific semantic systems.", "title": "" }, { "docid": "2da528d39b8815bcbb9a8aaf20d94926", "text": "Collaborative filtering (CF) is out of question the most widely adopted and successful recommendation approach. A typical CF-based recommender system associates a user with a group of like-minded users based on their individual preferences over all the items, either explicit or implicit, and then recommends to the user some unobserved items enjoyed by the group. However, we find that two users with similar tastes on one item subset may have totally different tastes on another set. In other words, there exist many user-item subgroups each consisting of a subset of items and a group of like-minded users on these items. It is more reasonable to predict preferences through one user's correlated subgroups, but not the entire user-item matrix. In this paper, to find meaningful subgroups, we formulate a new Multiclass Co-Clustering (MCoC) model, which captures relations of user-to-item, user-to-user, and item-to-item simultaneously. Then, we combine traditional CF algorithms with subgroups for improving their top- <inline-formula><tex-math notation=\"LaTeX\">$N$</tex-math><alternatives> <inline-graphic xlink:type=\"simple\" xlink:href=\"cai-ieq1-2566622.gif\"/></alternatives></inline-formula> recommendation performance. Our approach can be seen as a new extension of traditional clustering CF models. Systematic experiments on several real data sets have demonstrated the effectiveness of our proposed approach.", "title": "" }, { "docid": "6a2b3389ad8de2a0e9a50d4324869c2a", "text": "Many web applications provide a fully automatic machine translation service, and users can easily access and understand the information they are interested in. However, the services still have inaccurate results when translating technical terms. Therefore, we suggest a new method that collects reliable translations of technical terms between Korean and English. To collect the pairs, we utilize the metadata of Korean scientific papers and make a new statistical model to adapt the metadata characteristics appropriately. The collected Korean-English pairs are evaluated in terms of reliability and compared with the results of Google translator. Through evaluation and comparison, we confirm that this research can produce highly reliable data and improve the translation quality of technical terms.", "title": "" }, { "docid": "f639aa4b80593934d4714a77ad0dde92", "text": "Moringa Oleifera (MO), a plant from the family Moringacea is a major crop in Asia and Africa. MO has been studied for its health properties, attributed to the numerous bioactive components, including vitamins, phenolic acids, flavonoids, isothiocyanates, tannins and saponins, which are present in significant amounts in various components of the plant. Moringa Oleifera leaves are the most widely studied and they have shown to be beneficial in several chronic conditions, including hypercholesterolemia, high blood pressure, diabetes, insulin resistance, non-alcoholic liver disease, cancer and overall inflammation. In this review, we present information on the beneficial results that have been reported on the prevention and alleviation of these chronic conditions in various animal models and in cell studies. The existing limited information on human studies and Moringa Oleifera leaves is also presented. Overall, it has been well documented that Moringa Oleifera leaves are a good strategic for various conditions associated with heart disease, diabetes, cancer and fatty liver.", "title": "" }, { "docid": "2dc2b9d60244e819a85b33581800ae56", "text": "In this study, a simple and effective silver ink formulation was developed to generate silver tracks with high electrical conductivity on flexible substrates at low sintering temperatures. Diethanolamine (DEA), a self-oxidizing compound at moderate temperatures, was mixed with a silver ammonia solution to form a clear and stable solution. After inkjet-printed or pen-written on plastic sheets, DEA in the silver ink decomposes at temperatures higher than 50 °C and generates formaldehyde, which reacts spontaneously with silver ammonia ions to form silver thin films. The electrical conductivity of the inkjet-printed silver films can be 26% of the bulk silver after heating at 75 °C for 20 min and show great adhesion on plastic sheets.", "title": "" }, { "docid": "d9123053892ce671665a3a4a1694a57c", "text": "Visual perceptual learning (VPL) is defined as a long-term improvement in performance on a visual task. In recent years, the idea that conscious effort is necessary for VPL to occur has been challenged by research suggesting the involvement of more implicit processing mechanisms, such as reinforcement-driven processing and consolidation. In addition, we have learnt much about the neural substrates of VPL and it has become evident that changes in visual areas and regions beyond the visual cortex can take place during VPL.", "title": "" }, { "docid": "398016f6881bff1b3bf33a654fc30dff", "text": "This paper explores the relationship between employee satisfaction, customer satisfaction and shareholders value theoretically. A conceptual model discusses about the relationship of these three variables. In first section the link between tow variables employee satisfaction and customer satisfaction is examined. In the second section the link between customer satisfaction and shareholders value is examined while in third section the link between customer satisfaction and shareholder’s value is examine. All these three models represent positive relationship among the related variables. Paper concludes that customer satisfaction and loyalty would continue as long as employees are satisfied and they deliver the required quality of goods and services. Customer satisfaction and employee’s satisfaction will increase shareholders value.", "title": "" }, { "docid": "5b5d4c33a600d93b8b999a51318980da", "text": "In this work, we focused on liveness detection for facial recognition system's spoofing via fake face movement. We have developed a pupil direction observing system for anti-spoofing in face recognition systems using a basic hardware equipment. Firstly, eye area is being extracted from real time camera by using Haar-Cascade Classifier with specially trained classifier for eye region detection. Feature points have extracted and traced for minimizing person's head movements and getting stable eye region by using Kanade-Lucas-Tomasi (KLT) algorithm. Eye area is being cropped from real time camera frame and rotated for a stable eye area. Pupils are extracted from eye area by using a new improved algorithm subsequently. After a few stable number of frames that has pupils, proposed spoofing algorithm selects a random direction and sends a signal to Arduino to activate that selected direction's LED on a square frame that has totally eight LEDs for each direction. After chosen LED has been activated, eye direction is observed whether pupil direction and LED's position matches. If the compliance requirement is satisfied, algorithm returns data that contains liveness information. Complete algorithm for liveness detection using pupil tracking is tested on volunteers and algorithm achieved high success ratio.", "title": "" }, { "docid": "bd1a13c94d0e12b4ba9f14fef47d2564", "text": "Denoising is the problem of removing the inherent noise from an image. The standard noise model is additive white Gaussian noise, where the observed image f is related to the underlying true image u by the degradation model f = u+ η, and η is supposed to be at each pixel independently and identically distributed as a zero-mean Gaussian random variable. Since this is an ill-posed problem, Rudin, Osher and Fatemi introduced the total variation as a regularizing term. It has proved to be quite efficient for regularizing images without smoothing the boundaries of the objects. This paper focuses on the simple description of the theory and on the implementation of Chambolle’s projection algorithm for minimizing the total variation of a grayscale image. Furthermore, we adapt the algorithm to the vectorial total variation for color images. The implementation is described in detail and its parameters are analyzed and varied to come up with a reliable implementation. Source Code ANSI C source code to produce the same results as the demo is accessible at the IPOL web page of this article1.", "title": "" }, { "docid": "3c745325cca06061d0e11cbc30f847f9", "text": "Walsh-Hadamard transform is used in a wide variety of scientific and engineering applications, including bent functions and cryptanalytic optimization techniques in cryptography. In linear cryptanalysis, it is a key question to find a good linear approximation, which holds with probability (1 + d)/2 and the bias d is large in absolute value. Lu and Desmedt (2011) take a step toward answering this key question in a more generalized setting and initiate the work on the generalized bias problem with linearly-dependent inputs. In this paper, we give fully extended results. Deep insights on assumptions behind the problem are given. We take an information-theoretic approach to show that our bias problem assumes the setting of the maximum input entropy subject to the input constraint. By means of Walsh transform, the bias can be expressed in a simple form. It incorporates Piling-up lemma as a special case. Secondly, as application, we answer a long-standing open problem in correlation attacks on combiners with memory. We give a closed-form exact solution for the correlation involving the multiple polynomial of any weight for the first time. We also give Walsh analysis for numerical approximation. An interesting bias phenomenon is uncovered, i.e., for even and odd weight of the polynomial, the correlation behaves differently. Thirdly, we introduce the notion of weakly biased distribution, and study bias approximation for a more general case by Walsh analysis. We show that for weakly biased distribution, Piling-up lemma is still valid. Our work shows that Walsh analysis is useful and effective to a broad class of cryptanalysis problems.", "title": "" }, { "docid": "edd415b34d60495c4da0ffc9e714acf3", "text": "Nearly two decades ago, Ward Cunningham introduced us to the term \"technical debt\" as a means of describing the long term costs associated with a suboptimal software design and implementation. For most programs, especially those with a large legacy code baseline, achieving zero absolute debt is an unnecessary and unrealistic goal. It is important to recall that a primary reason for managing and eliminating debt is to drive down maintenance costs and to reduce defects. A sufficiently low, manageable level of debt can minimize the long-term impact, i.e., \"low debt interest payments\". In this article, we define an approach for establishing program specific thresholds to define manageable levels of technical debt.", "title": "" }, { "docid": "266625d5f1c658849d34514d5dc9586f", "text": "Hand written digit recognition is highly nonlinear problem. Recognition of handwritten numerals plays an active role in day to day life now days. Office automation, e-governors and many other areas, reading printed or handwritten documents and convert them to digital media is very crucial and time consuming task. So the system should be designed in such a way that it should be capable of reading handwritten numerals and provide appropriate response as humans do. However, handwritten digits are varying from person to person because each one has their own style of writing, means the same digit or character/word written by different writer will be different even in different languages. This paper presents survey on handwritten digit recognition systems with recent techniques, with three well known classifiers namely MLP, SVM and k-NN used for classification. This paper presents comparative analysis that describes recent methods and helps to find future scope.", "title": "" }, { "docid": "1716dfce500db00a2948927e3f7cbf9b", "text": "A mm-wave transition from coplanar waveguide (CPW) to substrate integrated waveguide (SIW) is presented based on a U-shaped coplanar slot antenna. Using 3D FEM simulations the input impedance exhibited by the structure is analyzed, and simple equations are extracted to design an ultra-wide band transition once the substrate material and the waveguide cut-off frequency are chosen. As an example, a W-band transition on a high resistivity silicon-filled waveguide is implemented: an input matching better than -14.5 dB from 79 to 110 GHz and insertion loss of 0.6 dB at 110 GHz are measured.", "title": "" }, { "docid": "a5e03e76925c838cfdfc328552c9e901", "text": "OBJECTIVE\nIn this article, we describe some of the cognitive and system-based sources of detection and interpretation errors in diagnostic radiology and discuss potential approaches to help reduce misdiagnoses.\n\n\nCONCLUSION\nEvery radiologist worries about missing a diagnosis or giving a false-positive reading. The retrospective error rate among radiologic examinations is approximately 30%, with real-time errors in daily radiology practice averaging 3-5%. Nearly 75% of all medical malpractice claims against radiologists are related to diagnostic errors. As medical reimbursement trends downward, radiologists attempt to compensate by undertaking additional responsibilities to increase productivity. The increased workload, rising quality expectations, cognitive biases, and poor system factors all contribute to diagnostic errors in radiology. Diagnostic errors are underrecognized and underappreciated in radiology practice. This is due to the inability to obtain reliable national estimates of the impact, the difficulty in evaluating effectiveness of potential interventions, and the poor response to systemwide solutions. Most of our clinical work is executed through type 1 processes to minimize cost, anxiety, and delay; however, type 1 processes are also vulnerable to errors. Instead of trying to completely eliminate cognitive shortcuts that serve us well most of the time, becoming aware of common biases and using metacognitive strategies to mitigate the effects have the potential to create sustainable improvement in diagnostic errors.", "title": "" }, { "docid": "35ed2c8db6b143629e806b68741e9977", "text": "Nowadays, smart wristbands have become one of the most prevailing wearable devices as they are small and portable. However, due to the limited size of the touch screens, smart wristbands typically have poor interactive experience. There are a few works appropriating the human body as a surface to extend the input. Yet by using multiple sensors at high sampling rates, they are not portable and are energy-consuming in practice. To break this stalemate, we proposed a portable, cost efficient text-entry system, termed ViType, which firstly leverages a single small form factor sensor to achieve a practical user input with much lower sampling rates. To enhance the input accuracy with less vibration information introduced by lower sampling rate, ViType designs a set of novel mechanisms, including an artificial neural network to process the vibration signals, and a runtime calibration and adaptation scheme to recover the error due to temporal instability. Extensive experiments have been conducted on 30 human subjects. The results demonstrate that ViType is robust to fight against various confounding factors. The average recognition accuracy is 94.8% with an initial training sample size of 20 for each key, which is 1.52 times higher than the state-of-the-art on-body typing system. Furthermore, when turning on the runtime calibration and adaptation system to update and enlarge the training sample size, the accuracy can reach around 98% on average during one month.", "title": "" }, { "docid": "bfd879313c1dbb641798f1c8b56248d2", "text": "In this paper, we propose an attention-aware deep reinforcement learning (ADRL) method for video face recognition, which aims to discard the misleading and confounding frames and find the focuses of attentions in face videos for person recognition. We formulate the process of finding the attentions of videos as a Markov decision process and train the attention model through a deep reinforcement learning framework without using extra labels. Unlike existing attention models, our method takes information from both the image space and the feature space as the input to make better use of face information that is discarded in the feature learning process. Besides, our approach is attention-aware, which seeks different attentions of videos for the recognition of different pairs of videos. Our approach achieves very competitive video face recognition performance on three widely used video face datasets.", "title": "" }, { "docid": "d847ed8f2bc209285d80a7d26e577c5b", "text": "We propose a simple yet effective technique for neural network learning. The forward propagation is computed as usual. In back propagation, only a small subset of the full gradient is computed to update the model parameters. The gradient vectors are sparsified in such a way that only the top-k elements (in terms of magnitude) are kept. As a result, only k rows or columns (depending on the layout) of the weight matrix are modified, leading to a linear reduction (k divided by the vector dimension) in the computational cost. Surprisingly, experimental results demonstrate that we can update only 1–4% of the weights at each back propagation pass. This does not result in a larger number of training iterations. More interestingly, the accuracy of the resulting models is actually improved rather than degraded, and a detailed analysis is given. The code is available at https://github.com/jklj077/meProp.", "title": "" } ]
scidocsrr
de7790317f1655a0df867d7c307c0228
Planar Affine Rectification from Change of Scale
[ { "docid": "ba7701a94880b59bbbd49fbfaca4b8c3", "text": "Many rural roads lack sharp, smoothly curving edges and a homogeneous surface appearance, hampering traditional vision-based road-following methods. However, they often have strong texture cues parallel to the road direction in the form of ruts and tracks left by other vehicles. This paper describes an unsupervised algorithm for following ill-structured roads in which dominant texture orientations computed with Gabor wavelet filters vote for a consensus road vanishing point location. The technique is first described for estimating the direction of straight-road segments, then extended to curved and undulating roads by tracking the vanishing point indicated by a differential “strip” of voters moving up toward the nominal vanishing line. Finally, the vanishing point is used to constrain a search for the road boundaries by maximizing textureand color-based region discriminant functions. Results are shown for a variety of road scenes including gravel roads, dirt trails, and highways.", "title": "" } ]
[ { "docid": "6e051906ec3deac14acb249ea4982d2e", "text": "Recent attempts to fabricate surfaces with custom reflectance functions boast impressive angular resolution, yet their spatial resolution is limited. In this paper we present a method to construct spatially varying reflectance at a high resolution of up to 220dpi, orders of magnitude greater than previous attempts, albeit with a lower angular resolution. The resolution of previous approaches is limited by the machining, but more fundamentally, by the geometric optics model on which they are built. Beyond a certain scale geometric optics models break down and wave effects must be taken into account. We present an analysis of incoherent reflectance based on wave optics and gain important insights into reflectance design. We further suggest and demonstrate a practical method, which takes into account the limitations of existing micro-fabrication techniques such as photolithography to design and fabricate a range of reflection effects, based on wave interference.", "title": "" }, { "docid": "5dac8ef81c7a6c508c603b3fd6a87581", "text": "In this paper, we present a novel benchmark for the evaluation of RGB-D SLAM systems. We recorded a large set of image sequences from a Microsoft Kinect with highly accurate and time-synchronized ground truth camera poses from a motion capture system. The sequences contain both the color and depth images in full sensor resolution (640 × 480) at video frame rate (30 Hz). The ground-truth trajectory was obtained from a motion-capture system with eight high-speed tracking cameras (100 Hz). The dataset consists of 39 sequences that were recorded in an office environment and an industrial hall. The dataset covers a large variety of scenes and camera motions. We provide sequences for debugging with slow motions as well as longer trajectories with and without loop closures. Most sequences were recorded from a handheld Kinect with unconstrained 6-DOF motions but we also provide sequences from a Kinect mounted on a Pioneer 3 robot that was manually navigated through a cluttered indoor environment. To stimulate the comparison of different approaches, we provide automatic evaluation tools both for the evaluation of drift of visual odometry systems and the global pose error of SLAM systems. The benchmark website [1] contains all data, detailed descriptions of the scenes, specifications of the data formats, sample code, and evaluation tools.", "title": "" }, { "docid": "a87870fafb1b0c072ef9872db017c699", "text": "A highly integrated RF frontend module including a three-stage power amplifier (PA), a two-stage low noise amplifier (LNA) and a switch (SW) is presented for high SHF wide-band massive MIMO in 5G. In order to achieve efficient operation over wide-band frequency, Doherty PA configuration using a parasitic output capacitance neutralization technique is proposed for final stage PA. To improve LNA's gain flatness over wide frequency band, two R-LC stabilization circuits with different resonance frequencies are proposed. They are fabricated with 0.15-μm GaAs process, and integrated into a 5 × 5 mm2 QFN package. The state-of-the-art measured results show that final stage PA and three-stage PA achieve a drain efficiency (DE) at 8dB back-off of more than 22 % and 12 %, respectively, and a two-stage LNA achieves a noise figure (NF) of less than 1.4dB over 14.5–15.0 GHz.", "title": "" }, { "docid": "2949191659d01de73abdc749d5e51ca7", "text": "BACKGROUND\nIsolated infraspinatus muscle atrophy is common in overhead athletes, who place significant and repetitive stresses across their dominant shoulders. Studies on volleyball and baseball players report infraspinatus atrophy in 4% to 34% of players; however, the prevalence of infraspinatus atrophy in professional tennis players has not been reported.\n\n\nPURPOSE\nTo investigate the incidence of isolated infraspinatus atrophy in professional tennis players and to identify any correlations with other physical examination findings, ranking performance, and concurrent shoulder injuries.\n\n\nSTUDY DESIGN\nCross-sectional study; Level of evidence, 3.\n\n\nMETHODS\nA total of 125 professional female tennis players underwent a comprehensive preparticipation physical health status examination. Two orthopaedic surgeons examined the shoulders of all players and obtained digital goniometric measurements of range of motion (ROM). Infraspinatus atrophy was defined as loss of soft tissue bulk in the infraspinatus scapula fossa (and increased prominence of dorsal scapular bony anatomy) of the dominant shoulder with clear asymmetry when compared with the contralateral side. Correlations were examined between infraspinatus atrophy and concurrent shoulder disorders, clinical examination findings, ROM, glenohumeral internal rotation deficit, singles tennis ranking, and age.\n\n\nRESULTS\nThere were 65 players (52%) with evidence of infraspinatus atrophy in their dominant shoulders. No wasting was noted in the nondominant shoulder of any player. No statistically significant differences were seen in mean age, left- or right-hand dominance, height, weight, or body mass index for players with or without atrophy. Of the 77 players ranked in the top 100, 58% had clinical infraspinatus atrophy, compared with 40% of players ranked outside the top 100. No associations were found with static physical examination findings (scapular dyskinesis, ROM glenohumeral internal rotation deficit, postural abnormalities), concurrent shoulder disorders, or compromised performance when measured by singles ranking.\n\n\nCONCLUSION\nThis study reports a high level of clinical infraspinatus atrophy in the dominant shoulder of elite female tennis players. Infraspinatus atrophy was associated with a higher performance ranking, and no functional deficits or associations with concurrent shoulder disorders were found. Team physicians can be reassured that infraspinatus atrophy is a common finding in high-performing tennis players and, if asymptomatic, does not appear to significantly compromise performance.", "title": "" }, { "docid": "4d7e876d61060061ba6419869d00675e", "text": "Context-aware recommender systems (CARS) take context into consideration when modeling user preferences. There are two general ways to integrate context with recommendation: contextual filtering and contextual modeling. Currently, the most effective context-aware recommendation algorithms are based on a contextual modeling approach that estimate deviations in ratings across different contexts. In this paper, we propose context similarity as an alternative contextual modeling approach and examine different ways to represent context similarity and incorporate it into recommendation. More specifically, we show how context similarity can be integrated into the sparse linear method and matrix factorization algorithms. Our experimental results demonstrate that learning context similarity is a more effective approach to contextaware recommendation than modeling contextual rating deviations.", "title": "" }, { "docid": "337e638ed6a9147d04649af2ce273e10", "text": "Paper introduces main characteristics and particulars of an innovative design for an Unmanned Surface Vehicle to autonomously launch and recover AUVs (Autonomous Underwater Vehicles) in open sea. The USV has an unconventional SWATH hull shape and in its smaller size version, it has dedicated hangar at midship that can host one medium size AUV, completely recovered onboard. The focus of this paper is concentrated on the prediction of the steady and unsteady hydrodynamic characteristics in terms of hull resistance and motion in waves. The seakeeping prediction is made by a fully viscous 3D Unsteady NavierStokes solver. The predicted pitch and heave response of the USV-SWATH in relatively high regular waves, in the nonlinear regime, are compared with those of an equivalent catamaran vessel and dramatic reduction in vertical motions and accelerations are found. On this good basis the paper concludes presenting a first hypothesis of the L&R system based on self-tensioning winches with hoists and belt assemblies.", "title": "" }, { "docid": "899fa5a77baa6ab6097ff378cd69011b", "text": "Our ability to predict protein expression from DNA sequence alone remains poor, reflecting our limited understanding of cis-regulatory grammar and hampering the design of engineered genes for synthetic biology applications. Here, we generate a model that predicts the protein expression of the 5' untranslated region (UTR) of mRNAs in the yeast Saccharomyces cerevisiae. We constructed a library of half a million 50-nucleotide-long random 5' UTRs and assayed their activity in a massively parallel growth selection experiment. The resulting data allow us to quantify the impact on protein expression of Kozak sequence composition, upstream open reading frames (uORFs), and secondary structure. We trained a convolutional neural network (CNN) on the random library and showed that it performs well at predicting the protein expression of both a held-out set of the random 5' UTRs as well as native S. cerevisiae 5' UTRs. The model additionally was used to computationally evolve highly active 5' UTRs. We confirmed experimentally that the great majority of the evolved sequences led to higher protein expression rates than the starting sequences, demonstrating the predictive power of this model.", "title": "" }, { "docid": "1cfa5ee5d737e42487e6aa1bdf2cafc9", "text": "This article presents a new platform called PCIV (intelligent platform for vehicular control) for traffic monitoring, based on radio frequency Identification (RFID) and cloud computing, applied to road traffic monitoring in public transportation systems. This paper shows the design approach and the experimental validation of the platform in two real scenarios: a university campus and a small city. Experiments demonstrated RFID technology is viable to be implemented to monitor traffic in smart cities.", "title": "" }, { "docid": "f6099a1e6641d0a93c764efef120dd53", "text": "For the past two decades, the security community has been fighting malicious programs for Windows-based operating systems. However, the recent surge in adoption of embedded devices and the IoT revolution are rapidly changing the malware landscape. Embedded devices are profoundly different than traditional personal computers. In fact, while personal computers run predominantly on x86-flavored architectures, embedded systems rely on a variety of different architectures. In turn, this aspect causes a large number of these systems to run some variants of the Linux operating system, pushing malicious actors to give birth to \"\"Linux malware.\"\" To the best of our knowledge, there is currently no comprehensive study attempting to characterize, analyze, and understand Linux malware. The majority of resources on the topic are available as sparse reports often published as blog posts, while the few systematic studies focused on the analysis of specific families of malware (e.g., the Mirai botnet) mainly by looking at their network-level behavior, thus leaving the main challenges of analyzing Linux malware unaddressed. This work constitutes the first step towards filling this gap. After a systematic exploration of the challenges involved in the process, we present the design and implementation details of the first malware analysis pipeline specifically tailored for Linux malware. We then present the results of the first large-scale measurement study conducted on 10,548 malware samples (collected over a time frame of one year) documenting detailed statistics and insights that can help directing future work in the area.", "title": "" }, { "docid": "1fa02640e2a85c4a99ecc228e3ca6eac", "text": "An aerobic microorganism with an ability to utilize phenol as sole carbon and energy source was isolated from phenol-contaminated wastewater samples. The isolate was identified as Bacillus amyloliquefaciens strain WJDB-1 based on morphological, physiological, and biochemical characteristics, and 16S rDNA sequence analysis. Strain WJDB-1 immobilized in alginate–chitosan–alginate (ACA) microcapsules could degrade 200 mg/l phenol completely within 36 h. The concentration of phenol was determined using differential pulse voltammetry (DPV) at glassy carbon electrode (GCE) with a linear relationship between peak current and phenol concentration ranging from 2.0 to 20.0 mg/l. Cells immobilized in ACA microcapsules were found to be superior to the free suspended ones in terms of improving the tolerance to the environmental loadings. The optimal conditions to prepare microcapsules for achieving higher phenol degradation rate were investigated by changing the concentrations of sodium alginate, calcium chloride, and chitosan. Furthermore, the efficiency of phenol degradation was optimized by adjusting various processing parameters, such as the number of microcapsules, pH value, temperature, and the initial concentration of phenol. This microorganism has the potential for the efficient treatment of organic pollutants in wastewater.", "title": "" }, { "docid": "87fefee3cb35d188ad942ee7c8fad95f", "text": "Financial frictions are a central element of most of the models that the literature on emerging markets crises has proposed for explaining the ‘Sudden Stop’ phenomenon. To date, few studies have aimed to examine the quantitative implications of these models and to integrate them with an equilibrium business cycle framework for emerging economies. This paper surveys these studies viewing them as ability-to-pay and willingness-to-pay variations of a framework that adds occasionally binding borrowing constraints to the small open economy real-business-cycle model. A common feature of the different models is that agents factor in the risk of future Sudden Stops in their optimal plans, so that equilibrium allocations and prices are distorted even when credit constraints do not bind. Sudden Stops are a property of the unique, flexible-price competitive equilibrium of these models that occurs in a particular region of the state space in which negative shocks make borrowing constraints bind. The resulting nonlinear effects imply that solving the models requires non-linear numerical methods, which are described in the survey. The results show that the models can yield relatively infrequent Sudden Stops with large current account reversals and deep recessions nested within smoother business cycles. Still, research in this area is at an early stage and this survey aims to stimulate further work. Cristina Arellano Enrique G. Mendoza Department of Economics Department of Economics Social Sciences Building University of Maryland Duke University College Park, MD 20742 Durham, NC 27708-0097 and NBER mendozae@econ.duke.edu", "title": "" }, { "docid": "ed0f4616a36a2dffb6120bccd7539d0c", "text": "Many accounts of decision making and reinforcement learning posit the existence of two distinct systems that control choice: a fast, automatic system and a slow, deliberative system. Recent research formalizes this distinction by mapping these systems to \"model-free\" and \"model-based\" strategies in reinforcement learning. Model-free strategies are computationally cheap, but sometimes inaccurate, because action values can be accessed by inspecting a look-up table constructed through trial-and-error. In contrast, model-based strategies compute action values through planning in a causal model of the environment, which is more accurate but also more cognitively demanding. It is assumed that this trade-off between accuracy and computational demand plays an important role in the arbitration between the two strategies, but we show that the hallmark task for dissociating model-free and model-based strategies, as well as several related variants, do not embody such a trade-off. We describe five factors that reduce the effectiveness of the model-based strategy on these tasks by reducing its accuracy in estimating reward outcomes and decreasing the importance of its choices. Based on these observations, we describe a version of the task that formally and empirically obtains an accuracy-demand trade-off between model-free and model-based strategies. Moreover, we show that human participants spontaneously increase their reliance on model-based control on this task, compared to the original paradigm. Our novel task and our computational analyses may prove important in subsequent empirical investigations of how humans balance accuracy and demand.", "title": "" }, { "docid": "d2c6f8c766c7df909a18b8fa6c0d95fc", "text": "This paper proposes a novel approach to meet users' multi-dimensional requirements in clothing image retrieval. It enables users to add search conditions by modifying the color, texture, shape and attribute descriptors of the query images to further refine their requirements. We propose the Hybrid Topic (HT) model to learn the intricate semantic representation of the descriptors above. The model provides an effective multi-dimensional representation of clothes and is able to perform automatic image annotation by probabilistic reasoning from image search. Furthermore, we develop a demand-adaptive retrieval strategy which refines users' specific requirements and removes users' unwanted features. Our experiments show that the HT method significantly outperforms the deep neural network methods. The accuracy could be further improved in cooperation with image annotation and demand-adaptive retrieval strategy.", "title": "" }, { "docid": "a62dc7e25b050addad1c27d92deee8b7", "text": "Potentially dangerous cryptography errors are well-documented in many applications. Conventional wisdom suggests that many of these errors are caused by cryptographic Application Programming Interfaces (APIs) that are too complicated, have insecure defaults, or are poorly documented. To address this problem, researchers have created several cryptographic libraries that they claim are more usable, however, none of these libraries have been empirically evaluated for their ability to promote more secure development. This paper is the first to examine both how and why the design and resulting usability of different cryptographic libraries affects the security of code written with them, with the goal of understanding how to build effective future libraries. We conducted a controlled experiment in which 256 Python developers recruited from GitHub attempt common tasks involving symmetric and asymmetric cryptography using one of five different APIs. We examine their resulting code for functional correctness and security, and compare their results to their self-reported sentiment about their assigned library. Our results suggest that while APIs designed for simplicity can provide security benefits – reducing the decision space, as expected, prevents choice of insecure parameters – simplicity is not enough. Poor documentation, missing code examples, and a lack of auxiliary features such as secure key storage, caused even participants assigned to simplified libraries to struggle with both basic functional correctness and security. Surprisingly, the availability of comprehensive documentation and easy-to-use code examples seems to compensate for more complicated APIs in terms of functionally correct results and participant reactions, however, this did not extend to security results. We find it particularly concerning that for about 20% of functionally correct tasks, across libraries, participants believed their code was secure when it was not. Our results suggest that while new cryptographic libraries that want to promote effective security should offer a simple, convenient interface, this is not enough: they should also, and perhaps more importantly, ensure support for a broad range of common tasks and provide accessible documentation with secure, easy-to-use code examples.", "title": "" }, { "docid": "681af61234d7818964afec2b406b93ef", "text": "BACKGROUND\nTrials of patent foramen ovale (PFO) closure to prevent recurrent stroke have been inconclusive. We investigated whether patients with cryptogenic stroke and echocardiographic features representing risk of stroke would benefit from PFO closure or anticoagulation, as compared with antiplatelet therapy.\n\n\nMETHODS\nIn a multicenter, randomized, open-label trial, we assigned, in a 1:1:1 ratio, patients 16 to 60 years of age who had had a recent stroke attributed to PFO, with an associated atrial septal aneurysm or large interatrial shunt, to transcatheter PFO closure plus long-term antiplatelet therapy (PFO closure group), antiplatelet therapy alone (antiplatelet-only group), or oral anticoagulation (anticoagulation group) (randomization group 1). Patients with contraindications to anticoagulants or to PFO closure were randomly assigned to the alternative noncontraindicated treatment or to antiplatelet therapy (randomization groups 2 and 3). The primary outcome was occurrence of stroke. The comparison of PFO closure plus antiplatelet therapy with antiplatelet therapy alone was performed with combined data from randomization groups 1 and 2, and the comparison of oral anticoagulation with antiplatelet therapy alone was performed with combined data from randomization groups 1 and 3.\n\n\nRESULTS\nA total of 663 patients underwent randomization and were followed for a mean (±SD) of 5.3±2.0 years. In the analysis of randomization groups 1 and 2, no stroke occurred among the 238 patients in the PFO closure group, whereas stroke occurred in 14 of the 235 patients in the antiplatelet-only group (hazard ratio, 0.03; 95% confidence interval, 0 to 0.26; P<0.001). Procedural complications from PFO closure occurred in 14 patients (5.9%). The rate of atrial fibrillation was higher in the PFO closure group than in the antiplatelet-only group (4.6% vs. 0.9%, P=0.02). The number of serious adverse events did not differ significantly between the treatment groups (P=0.56). In the analysis of randomization groups 1 and 3, stroke occurred in 3 of 187 patients assigned to oral anticoagulants and in 7 of 174 patients assigned to antiplatelet therapy alone.\n\n\nCONCLUSIONS\nAmong patients who had had a recent cryptogenic stroke attributed to PFO with an associated atrial septal aneurysm or large interatrial shunt, the rate of stroke recurrence was lower among those assigned to PFO closure combined with antiplatelet therapy than among those assigned to antiplatelet therapy alone. PFO closure was associated with an increased risk of atrial fibrillation. (Funded by the French Ministry of Health; CLOSE ClinicalTrials.gov number, NCT00562289 .).", "title": "" }, { "docid": "a9b96c162e9a7f39a90c294167178c05", "text": "The performance of automotive radar systems is expected to significantly increase in the near future. With enhanced resolution capabilities more accurate and denser point clouds of traffic participants and roadside infrastructure can be acquired and so the amount of gathered information is growing drastically. One main driver for this development is the global trend towards self-driving cars, which all rely on precise and fine-grained sensor information. New radar signal processing concepts have to be developed in order to provide this additional information. This paper presents a prototype high resolution radar sensor which helps to facilitate algorithm development and verification. The system is operational under real-time conditions and achieves excellent performance in terms of range, velocity and angular resolution. Complex traffic scenarios can be acquired out of a moving test vehicle, which is very close to the target application. First measurement runs on public roads are extremely promising and show an outstanding single-snapshot performance. Complex objects can be precisely located and recognized by their contour shape. In order to increase the possible recording time, the raw data rate is reduced by several orders of magnitude in real-time by means of constant false alarm rate (CFAR) processing. The number of target cells can still exceed more than 10 000 points in a single measurement cycle for typical road scenarios.", "title": "" }, { "docid": "7e61652a45c490c230d368d653ef63e8", "text": "Deep embeddings answer one simple question: How similar are two images? Learning these embeddings is the bedrock of verification, zero-shot learning, and visual search. The most prominent approaches optimize a deep convolutional network with a suitable loss function, such as contrastive loss or triplet loss. While a rich line of work focuses solely on the loss functions, we show in this paper that selecting training examples plays an equally important role. We propose distance weighted sampling, which selects more informative and stable examples than traditional approaches. In addition, we show that a simple margin based loss is sufficient to outperform all other loss functions. We evaluate our approach on the Stanford Online Products, CAR196, and the CUB200-2011 datasets for image retrieval and clustering, and on the LFW dataset for face verification. Our method achieves state-of-the-art performance on all of them.", "title": "" }, { "docid": "fedfe025c82e41a7d1e8920a797edb4a", "text": "We investigate the influence of channel estimation error on the achievable system-level throughput performance of our previous non-orthogonal multiple access (NOMA) scheme in a multiple-input multiple-output (MIMO) downlink. The NOMA scheme employs intra-beam superposition coding of a multiuser signal at the transmitter and spatial filtering of inter-beam interference followed by an intra-beam successive interference canceller (SIC) at the user terminal receiver. The intra-beam SIC cancels the inter-user interference within a beam. This configuration achieves reduced overhead for the downlink reference signaling for channel estimation at the user terminal in the case of non-orthogonal user multiplexing and enables the SIC receiver to be applied to the MIMO downlink. The channel estimation error in the NOMA scheme causes residual interference in the SIC process, which decreases the achievable user throughput. Furthermore, the channel estimation error causes error In the transmission rate control for the respective users, which may result in decoding error at not only the destination user terminal but also at other user terminals for the SIC process. However, we show that by using a simple transmission rate back-off algorithm, the impact of the channel estimation error is effectively abated and the NOMA scheme achieves clear average and cell-edge user throughput gains relative to orthogonal multiple access (OMA) similar to the case with perfect channel estimation.", "title": "" }, { "docid": "8292d5c1e13042aa42f1efb60058ef96", "text": "The epithelial-to-mesenchymal transition (EMT) is a vital control point in metastatic breast cancer (MBC). TWIST1, SNAIL1, SLUG, and ZEB1, as key EMT-inducing transcription factors (EMT-TFs), are involved in MBC through different signaling cascades. This updated meta-analysis was conducted to assess the correlation between the expression of EMT-TFs and prognostic value in MBC patients. A total of 3,218 MBC patients from fourteen eligible studies were evaluated. The pooled hazard ratios (HR) for EMT-TFs suggested that high EMT-TF expression was significantly associated with poor prognosis in MBC patients (HRs = 1.72; 95% confidence intervals (CIs) = 1.53-1.93; P = 0.001). In addition, the overexpression of SLUG was the most impactful on the risk of MBC compared with TWIST1 and SNAIL1, which sponsored fixed models. Strikingly, the increased risk of MBC was less associated with ZEB1 expression. However, the EMT-TF expression levels significantly increased the risk of MBC in the Asian population (HR = 2.11, 95% CI = 1.70-2.62) without any publication bias (t = 1.70, P = 0.11). These findings suggest that the overexpression of potentially TWIST1, SNAIL1 and especially SLUG play a key role in the aggregation of MBC treatment as well as in the improvement of follow-up plans in Asian MBC patients.", "title": "" }, { "docid": "6b52bb06c140e5f55f7094cbbf906769", "text": "A method for tracking and predicting cloud movement using ground based sky imagery is presented. Sequences of partial sky images, with each image taken one second apart with a size of 640 by 480 pixels, were processed to determine the time taken for clouds to reach a user defined region in the image or the Sun. The clouds were first identified by segmenting the image based on the difference between the blue and red colour channels, producing a binary detection image. Good features to track were then located in the image and tracked utilising the Lucas-Kanade method for optical flow. From the trajectory of the tracked features and the binary detection image, cloud signals were generated. The trajectory of the individual features were used to determine the risky cloud signals (signals that pass over the user defined region or Sun). Time to collision estimates were produced based on merging these risky cloud signals. Estimates of times up to 40 seconds were achieved with error in the estimate increasing when the estimated time is larger. The method presented has the potential for tracking clouds travelling in different directions and at different velocities.", "title": "" } ]
scidocsrr
c4d19b13e92558c0cfab7f6748d7a35e
Ensemble diversity measures and their application to thinning
[ { "docid": "0fb2afcd2997a1647bb4edc12d2191f9", "text": "Many databases have grown to the point where they cannot fit into the fast memory of even large memory machines, to say nothing of current workstations. If what we want to do is to use these data bases to construct predictions of various characteristics, then since the usual methods require that all data be held in fast memory, various work-arounds have to be used. This paper studies one such class of methods which give accuracy comparable to that which could have been obtained if all data could have been held in core and which are computationally fast. The procedure takes small pieces of the data, grows a predictor on each small piece and then pastes these predictors together. A version is given that scales up to terabyte data sets. The methods are also applicable to on-line learning.", "title": "" } ]
[ { "docid": "a880d38d37862b46dc638b9a7e45b6ee", "text": "This paper presents the modeling, simulation, and analysis of the dynamic behavior of a fictitious 2 × 320 MW variable-speed pump-turbine power plant, including a hydraulic system, electrical equipment, rotating inertias, and control systems. The modeling of the hydraulic and electrical components of the power plant is presented. The dynamic performances of a control strategy in generating mode and one in pumping mode are investigated by the simulation of the complete models in the case of change of active power set points. Then, a pseudocontinuous model of the converters feeding the rotor circuits is described. Due to this simplification, the simulation time can be reduced drastically (approximately factor 60). A first validation of the simplified model of the converters is obtained by comparison of the simulated results coming from the simplified and complete models for different modes of operation of the power plant. Experimental results performed on a 2.2-kW low-power test bench are also compared with the simulated results coming from both complete and simplified models related to this case and confirm the validity of the proposed simplified approach for the converters.", "title": "" }, { "docid": "833c110e040311909aa38b05e457b2af", "text": "The scyphozoan Aurelia aurita (Linnaeus) s. l., is a cosmopolitan species-complex which blooms seasonally in a variety of coastal and shelf sea environments around the world. We hypothesized that ephyrae of Aurelia sp.1 are released from the inner part of the Jiaozhou Bay, China when water temperature is below 15°C in late autumn and winter. The seasonal occurrence, growth, and variation of the scyphomedusa Aurelia sp.1 were investigated in Jiaozhou Bay from January 2011 to December 2011. Ephyrae occurred from May through June with a peak abundance of 2.38 ± 0.56 ind/m3 in May, while the temperature during this period ranged from 12 to 18°C. The distribution of ephyrae was mainly restricted to the coastal area of the bay, and the abundance was higher in the dock of the bay than at the other inner bay stations. Young medusae derived from ephyrae with a median diameter of 9.74 ± 1.7 mm were present from May 22. Growth was rapid from May 22 to July 2 with a maximum daily growth rate of 39%. Median diameter of the medusae was 161.80 ± 18.39 mm at the beginning of July. In August, a high proportion of deteriorated specimens was observed and the median diameter decreased. The highest average abundance is 0.62 ± 1.06 ind/km2 in Jiaozhou Bay in August. The abundance of Aurelia sp.1 medusae was low from September and then decreased to zero. It is concluded that water temperature is the main driver regulating the life cycle of Aurelia sp.1 in Jiaozhou Bay.", "title": "" }, { "docid": "db4bb32f6fdc7a05da41e223afac3025", "text": "Modern imaging techniques for probing brain function, including functional magnetic resonance imaging, intrinsic and extrinsic contrast optical imaging, and magnetoencephalography, generate large data sets with complex content. In this paper we develop appropriate techniques for analysis and visualization of such imaging data to separate the signal from the noise and characterize the signal. The techniques developed fall into the general category of multivariate time series analysis, and in particular we extensively use the multitaper framework of spectral analysis. We develop specific protocols for the analysis of fMRI, optical imaging, and MEG data, and illustrate the techniques by applications to real data sets generated by these imaging modalities. In general, the analysis protocols involve two distinct stages: \"noise\" characterization and suppression, and \"signal\" characterization and visualization. An important general conclusion of our study is the utility of a frequency-based representation, with short, moving analysis windows to account for nonstationarity in the data. Of particular note are 1) the development of a decomposition technique (space-frequency singular value decomposition) that is shown to be a useful means of characterizing the image data, and 2) the development of an algorithm, based on multitaper methods, for the removal of approximately periodic physiological artifacts arising from cardiac and respiratory sources.", "title": "" }, { "docid": "7dcba854d1f138ab157a1b24176c2245", "text": "Essential oils distilled from members of the genus Lavandula have been used both cosmetically and therapeutically for centuries with the most commonly used species being L. angustifolia, L. latifolia, L. stoechas and L. x intermedia. Although there is considerable anecdotal information about the biological activity of these oils much of this has not been substantiated by scientific or clinical evidence. Among the claims made for lavender oil are that is it antibacterial, antifungal, carminative (smooth muscle relaxing), sedative, antidepressive and effective for burns and insect bites. In this review we detail the current state of knowledge about the effect of lavender oils on psychological and physiological parameters and its use as an antimicrobial agent. Although the data are still inconclusive and often controversial, there does seem to be both scientific and clinical data that support the traditional uses of lavender. However, methodological and oil identification problems have severely hampered the evaluation of the therapeutic significance of much of the research on Lavandula spp. These issues need to be resolved before we have a true picture of the biological activities of lavender essential oil.", "title": "" }, { "docid": "83b8944584693b9568f6ad3533ad297b", "text": "BACKGROUND\nChemotherapy is the standard of care for incurable advanced gastric cancer. Whether the addition of gastrectomy to chemotherapy improves survival for patients with advanced gastric cancer with a single non-curable factor remains controversial. We aimed to investigate the superiority of gastrectomy followed by chemotherapy versus chemotherapy alone with respect to overall survival in these patients.\n\n\nMETHODS\nWe did an open-label, randomised, phase 3 trial at 44 centres or hospitals in Japan, South Korea, and Singapore. Patients aged 20-75 years with advanced gastric cancer with a single non-curable factor confined to either the liver (H1), peritoneum (P1), or para-aortic lymph nodes (16a1/b2) were randomly assigned (1:1) in each country to chemotherapy alone or gastrectomy followed by chemotherapy by a minimisation method with biased-coin assignment to balance the groups according to institution, clinical nodal status, and non-curable factor. Patients, treating physicians, and individuals who assessed outcomes and analysed data were not masked to treatment assignment. Chemotherapy consisted of oral S-1 80 mg/m(2) per day on days 1-21 and cisplatin 60 mg/m(2) on day 8 of every 5-week cycle. Gastrectomy was restricted to D1 lymphadenectomy without any resection of metastatic lesions. The primary endpoint was overall survival, analysed by intention to treat. This study is registered with UMIN-CTR, number UMIN000001012.\n\n\nFINDINGS\nBetween Feb 4, 2008, and Sept 17, 2013, 175 patients were randomly assigned to chemotherapy alone (86 patients) or gastrectomy followed by chemotherapy (89 patients). After the first interim analysis on Sept 14, 2013, the predictive probability of overall survival being significantly higher in the gastrectomy plus chemotherapy group than in the chemotherapy alone group at the final analysis was only 13·2%, so the study was closed on the basis of futility. Overall survival at 2 years for all randomly assigned patients was 31·7% (95% CI 21·7-42·2) for patients assigned to chemotherapy alone compared with 25·1% (16·2-34·9) for those assigned to gastrectomy plus chemotherapy. Median overall survival was 16·6 months (95% CI 13·7-19·8) for patients assigned to chemotherapy alone and 14·3 months (11·8-16·3) for those assigned to gastrectomy plus chemotherapy (hazard ratio 1·09, 95% CI 0·78-1·52; one-sided p=0·70). The incidence of the following grade 3 or 4 chemotherapy-associated adverse events was higher in patients assigned to gastrectomy plus chemotherapy than in those assigned to chemotherapy alone: leucopenia (14 patients [18%] vs two [3%]), anorexia (22 [29%] vs nine [12%]), nausea (11 [15%] vs four [5%]), and hyponatraemia (seven [9%] vs four [5%]). One treatment-related death occurred in a patient assigned to chemotherapy alone (sudden cardiopulmonary arrest of unknown cause during the second cycle of chemotherapy) and one occurred in a patient assigned to chemotherapy plus gastrectomy (rapid growth of peritoneal metastasis after discharge 12 days after surgery).\n\n\nINTERPRETATION\nSince gastrectomy followed by chemotherapy did not show any survival benefit compared with chemotherapy alone in advanced gastric cancer with a single non-curable factor, gastrectomy cannot be justified for treatment of patients with these tumours.\n\n\nFUNDING\nThe Ministry of Health, Labour and Welfare of Japan and the Korean Gastric Cancer Association.", "title": "" }, { "docid": "ddb77ec8a722c50c28059d03919fb299", "text": "Among the smart cities applications, optimizing lottery games is one of the urgent needs to ensure their fairness and transparency. The emerging blockchain technology shows a glimpse of solutions to fairness and transparency issues faced by lottery industries. This paper presents the design of a blockchain-based lottery system for smart cities applications. We adopt the smart contracts of blockchain technology and the cryptograph blockchain model, Hawk [8], to design the blockchain-based lottery system, FairLotto, for future smart cities applications. Fairness, transparency, and privacy of the proposed blockchain-based lottery system are discussed and ensured.", "title": "" }, { "docid": "872ccba4f0a0ba6a57500d4b73384ce1", "text": "This research demonstrates the application of association rule mining to spatio-temporal data. Association rule mining seeks to discover associations among transactions encoded in a database. An association rule takes the form A → B where A (the antecedent) and B (the consequent) are sets of predicates. A spatio-temporal association rule occurs when there is a spatio-temporal relationship in the antecedent or consequent of the rule. As a case study, association rule mining is used to explore the spatial and temporal relationships among a set of variables that characterize socioeconomic and land cover change in the Denver, Colorado, USA region from 1970–1990. Geographic Information Systems (GIS)-based data pre-processing is used to integrate diverse data sets, extract spatio-temporal relationships, classify numeric data into ordinal categories, and encode spatio-temporal relationship data in tabular format for use by conventional (non-spatio-temporal) association rule mining software. Multiple level association rule mining is supported by the development of a hierarchical classification scheme (concept hierarchy) for each variable. Further research in spatiotemporal association rule mining should address issues of data integration, data classification, the representation and calculation of spatial relationships, and strategies for finding ‘interesting’ rules.", "title": "" }, { "docid": "5ec64c4a423ccd32a5c1ceb918e3e003", "text": "The leading edge (approximately 1 microgram) of lamellipodia in Xenopus laevis keratocytes and fibroblasts was shown to have an extensively branched organization of actin filaments, which we term the dendritic brush. Pointed ends of individual filaments were located at Y-junctions, where the Arp2/3 complex was also localized, suggesting a role of the Arp2/3 complex in branch formation. Differential depolymerization experiments suggested that the Arp2/3 complex also provided protection of pointed ends from depolymerization. Actin depolymerizing factor (ADF)/cofilin was excluded from the distal 0.4 micrometer++ of the lamellipodial network of keratocytes and in fibroblasts it was located within the depolymerization-resistant zone. These results suggest that ADF/cofilin, per se, is not sufficient for actin brush depolymerization and a regulatory step is required. Our evidence supports a dendritic nucleation model (Mullins, R.D., J.A. Heuser, and T.D. Pollard. 1998. Proc. Natl. Acad. Sci. USA. 95:6181-6186) for lamellipodial protrusion, which involves treadmilling of a branched actin array instead of treadmilling of individual filaments. In this model, Arp2/3 complex and ADF/cofilin have antagonistic activities. Arp2/3 complex is responsible for integration of nascent actin filaments into the actin network at the cell front and stabilizing pointed ends from depolymerization, while ADF/cofilin promotes filament disassembly at the rear of the brush, presumably by pointed end depolymerization after dissociation of the Arp2/3 complex.", "title": "" }, { "docid": "b81f30a692d57ebc2fdef7df652d0ca2", "text": "Suppose that Alice wishes to send messages to Bob through a communication channel C1, but her transmissions also reach an eavesdropper Eve through another channel C2. This is the wiretap channel model introduced by Wyner in 1975. The goal is to design a coding scheme that makes it possible for Alice to communicate both reliably and securely. Reliability is measured in terms of Bob's probability of error in recovering the message, while security is measured in terms of the mutual information between the message and Eve's observations. Wyner showed that the situation is characterized by a single constant Cs, called the secrecy capacity, which has the following meaning: for all ε >; 0, there exist coding schemes of rate R ≥ Cs-ε that asymptotically achieve the reliability and security objectives. However, his proof of this result is based upon a random-coding argument. To date, despite consider able research effort, the only case where we know how to construct coding schemes that achieve secrecy capacity is when Eve's channel C2 is an erasure channel, or a combinatorial variation thereof. Polar codes were recently invented by Arikan; they approach the capacity of symmetric binary-input discrete memoryless channels with low encoding and decoding complexity. In this paper, we use polar codes to construct a coding scheme that achieves the secrecy capacity for a wide range of wiretap channels. Our construction works for any instantiation of the wiretap channel model, as long as both C1 and C2 are symmetric and binary-input, and C2 is degraded with respect to C1. Moreover, we show how to modify our construction in order to provide strong security, in the sense defined by Maurer, while still operating at a rate that approaches the secrecy capacity. In this case, we cannot guarantee that the reliability condition will also be satisfied unless the main channel C1 is noiseless, although we believe it can be always satisfied in practice.", "title": "" }, { "docid": "a2c26a8b15cafeb365ad9870f9bbf884", "text": "Microgrids consist of multiple parallel-connected distributed generation (DG) units with coordinated control strategies, which are able to operate in both grid-connected and islanded mode. Microgrids are attracting more and more attention since they can alleviate the stress of main transmission systems, reduce feeder losses, and improve system power quality. When the islanded microgrids are concerned, it is important to maintain system stability and achieve load power sharing among the multiple parallel-connected DG units. However, the poor active and reactive power sharing problems due to the influence of impedance mismatch of the DG feeders and the different ratings of the DG units are inevitable when the conventional droop control scheme is adopted. Therefore, the adaptive/improved droop control, network-based control methods and cost-based droop schemes are compared and summarized in this paper for active power sharing. Moreover, nonlinear and unbalanced loads could further affect the reactive power sharing when regulating the active power, and it is difficult to share the reactive power accurately only by using the enhanced virtual impedance method. Therefore, the hierarchical control strategies are utilized as supplements of the conventional droop controls and virtual impedance methods. The improved hierarchical control approaches such as the algorithms based on graph theory, multi-agent system, the gain scheduling method and predictive control have been proposed to achieve proper reactive power sharing for islanded microgrids and eliminate the effect of the communication delays on hierarchical control. Finally, the future research trends on islanded microgrids are also discussed in this paper.", "title": "" }, { "docid": "87da90ee583f5aa1777199f67bdefc83", "text": "The rapid development of computer networks in the past decades has created many security problems related to intrusions on computer and network systems. Intrusion Detection Systems IDSs incorporate methods that help to detect and identify intrusive and non-intrusive network packets. Most of the existing intrusion detection systems rely heavily on human analysts to analyze system logs or network traffic to differentiate between intrusive and non-intrusive network traffic. With the increase in data of network traffic, involvement of human in the detection system is a non-trivial problem. IDS’s ability to perform based on human expertise brings limitations to the system’s capability to perform autonomously over exponentially increasing data in the network. However, human expertise and their ability to analyze the system can be efficiently modeled using soft-computing techniques. Intrusion detection techniques based on machine learning and softcomputing techniques enable autonomous packet detections. They have the potential to analyze the data packets, autonomously. These techniques are heavily based on statistical analysis of data. The ability of the algorithms that handle these data-sets can use patterns found in previous data to make decisions for the new evolving data-patterns in the network traffic. In this paper, we present a rigorous survey study that envisages various soft-computing and machine learning techniques used to build autonomous IDSs. A robust IDSs system lays a foundation to build an efficient Intrusion Detection and Prevention System IDPS.", "title": "" }, { "docid": "2d5a8949119d7881a97693867a009917", "text": "Labeling a histopathology image as having cancerous regions or not is a critical task in cancer diagnosis; it is also clinically important to segment the cancer tissues and cluster them into various classes. Existing supervised approaches for image classification and segmentation require detailed manual annotations for the cancer pixels, which are time-consuming to obtain. In this paper, we propose a new learning method, multiple clustered instance learning (MCIL) (along the line of weakly supervised learning) for histopathology image segmentation. The proposed MCIL method simultaneously performs image-level classification (cancer vs. non-cancer image), medical image segmentation (cancer vs. non-cancer tissue), and patch-level clustering (different classes). We embed the clustering concept into the multiple instance learning (MIL) setting and derive a principled solution to performing the above three tasks in an integrated framework. In addition, we introduce contextual constraints as a prior for MCIL, which further reduces the ambiguity in MIL. Experimental results on histopathology colon cancer images and cytology images demonstrate the great advantage of MCIL over the competing methods.", "title": "" }, { "docid": "f02b44ff478952f1958ba33d8a488b8e", "text": "Plagiarism is an illicit act of using other’s work wholly or partially as one’s own in any field such as art, poetry literature, cinema, research and other creative forms of study. It has become a serious crime in academia and research fields and access to wide range of resources on the internet has made the situation even worse. Therefore, there is a need for automatic detection of plagiarism in text. This paper presents a survey of various plagiarism detection techniques used for different languages.", "title": "" }, { "docid": "026a0651177ee631a80aaa7c63a1c32f", "text": "This paper is an introduction to natural language interfaces to databases (Nlidbs). A brief overview of the history of Nlidbs is rst given. Some advantages and disadvantages of Nlidbs are then discussed, comparing Nlidbs to formal query languages, form-based interfaces, and graphical interfaces. An introduction to some of the linguistic problems Nlidbs have to confront follows, for the beneet of readers less familiar with computational linguistics. The discussion then moves on to Nlidb architectures, porta-bility issues, restricted natural language input systems (including menu-based Nlidbs), and Nlidbs with reasoning capabilities. Some less explored areas of Nlidb research are then presented, namely database updates, meta-knowledge questions, temporal questions, and multi-modal Nlidbs. The paper ends with reeections on the current state of the art.", "title": "" }, { "docid": "02605f4044a69b70673121985f1bd913", "text": "A novel class of low-cost, small-footprint and high-gain antenna arrays is presented for W-band applications. A 4 × 4 antenna array is proposed and demonstrated using substrate-integrated waveguide (SIW) technology for the design of its feed network and longitudinal slots in the SIW top metallic surface to drive the array antenna elements. Dielectric cubes of low-permittivity material are placed on top of each 1 × 4 antenna array to increase the gain of the circular patch antenna elements. This new design is compared to a second 4 × 4 antenna array which, instead of dielectric cubes, uses vertically stacked Yagi-like parasitic director elements to increase the gain. Measured impedance bandwidths of the two 4 × 4 antenna arrays are about 7.5 GHz (94.2-101.8 GHz) at 18 ± 1 dB gain level, with radiation patterns and gains of the two arrays remaining nearly constant over this bandwidth. While the fabrication effort of the new array involving dielectric cubes is significantly reduced, its measured radiation efficiency of 81 percent is slightly lower compared to 90 percent of the Yagi-like design.", "title": "" }, { "docid": "b05f96e22157b69d7033db35ab38524a", "text": "Novelty search has shown to be a promising approach for the evolution of controllers for swarms of robots. In existing studies, however, the experimenter had to craft a task-specific behaviour similarity measure. The reliance on hand-crafted similarity measures places an additional burden to the experimenter and introduces a bias in the evolutionary process. In this paper, we propose and compare two generic behaviour similarity measures: combined state count and sampled average state. The proposed measures are based on the values of sensors and effectors recorded for each individual robot of the swarm. The characterisation of the group-level behaviour is then obtained by combining the sensor-effector values from all the robots. We evaluate the proposed measures in an aggregation task and in a resource sharing task. We show that the generic measures match the performance of task-specific measures in terms of solution quality. Our results indicate that the proposed generic measures operate as effective behaviour similarity measures, and that it is possible to leverage the benefits of novelty search without having to craft task-specific similarity measures.", "title": "" }, { "docid": "ba2710c7df05b149f6d2befa8dbc37ee", "text": "This work proposes a method for blind equalization of possibly non-minimum phase channels using particular infinite impulse response (IIR) filters. In this context, the transfer function of the equalizer is represented by a linear combination of specific rational basis functions. This approach estimates separately the coefficients of the linear expansion and the poles of the rational basis functions by alternating iteratively between an adaptive (fixed pole) estimation of the coefficients and a pole placement method. The focus of the work is mainly on the issue of good pole placement (initialization and updating).", "title": "" }, { "docid": "6b0a4a8c61fb4ceabe3aa3d5664b4b67", "text": "Most existing approaches for text classification represent texts as vectors of words, namely ``Bag-of-Words.'' This text representation results in a very high dimensionality of feature space and frequently suffers from surface mismatching. Short texts make these issues even more serious, due to their shortness and sparsity. In this paper, we propose using ``Bag-of-Concepts'' in short text representation, aiming to avoid the surface mismatching and handle the synonym and polysemy problem. Based on ``Bag-of-Concepts,'' a novel framework is proposed for lightweight short text classification applications. By leveraging a large taxonomy knowledgebase, it learns a concept model for each category, and conceptualizes a short text to a set of relevant concepts. A concept-based similarity mechanism is presented to classify the given short text to the most similar category. One advantage of this mechanism is that it facilitates short text ranking after classification, which is needed in many applications, such as query or ad recommendation. We demonstrate the usage of our proposed framework through a real online application: Channel-based Query Recommendation. Experiments show that our framework can map queries to channels with a high degree of precision (avg. precision=90.3%), which is critical for recommendation applications.", "title": "" }, { "docid": "32fb1d8492e06b1424ea61d4c28f3c6c", "text": "Modern IT systems often produce large volumes of event logs, and event pattern discovery is an important log management task. For this purpose, data mining methods have been suggested in many previous works. In this paper, we present the LogCluster algorithm which implements data clustering and line pattern mining for textual event logs. The paper also describes an open source implementation of LogCluster.", "title": "" } ]
scidocsrr
8715a064a0406b1de5635d2da80a4508
A content account of creative analogies in biologically inspired design
[ { "docid": "ad5ff550d8e326166bb50a7b6bded485", "text": "Inspiration is useful for exploration and discovery of new solution spaces. Systems in natural and artificial worlds and their functionality are seen as rich sources of inspiration for idea generation. However, unlike in the artificial domain where existing systems are often used for inspiration, those from the natural domain are rarely used in a systematic way for this purpose. Analogy is long regarded as a powerful means for inspiring novel idea generation. One aim of the work reported here is to initiate similar work in the area of systematic biomimetics for product development, so that inspiration from both natural and artificial worlds can be used systematically to help develop novel, analogical ideas for solving design problems. A generic model for representing causality of natural and artificial systems has been developed, and used to structure information in a database of systems from both the domains. These are implemented in a piece of software for automated analogical search of relevant ideas from the databases to solve a given problem. Preliminary experiments at validating the software indicate substantial potential for the approach.", "title": "" } ]
[ { "docid": "35ce8c11fa7dd22ef0daf9d0bd624978", "text": "Out-of-vocabulary (OOV) words represent an important source of error in large vocabulary continuous speech recognition (LVCSR) systems. These words cause recognition failures, which propagate through pipeline systems impacting the performance of downstream applications. The detection of OOV regions in the output of a LVCSR system is typically addressed as a binary classification task, where each region is independently classified using local information. In this paper, we show that jointly predicting OOV regions, and including contextual information from each region, leads to substantial improvement in OOV detection. Compared to the state-of-the-art, we reduce the missed OOV rate from 42.6% to 28.4% at 10% false alarm rate.", "title": "" }, { "docid": "91dcf0f281724bd6a5cc8c6479f5d632", "text": "In this paper, a cable-driven planar parallel haptic interface is presented. First, the velocity equations are derived and the forces in the cables are obtained by the principle of virtual work. Then, an analysis of the wrench-closure workspace is performed and a geometric arrangement of the cables is proposed. Control issues are then discussed and a control scheme is presented. The calibration of the attachment points is also discussed. Finally, the prototype is described and experimental results are provided.", "title": "" }, { "docid": "5637bed8be75d7e79a2c2adb95d4c28e", "text": "BACKGROUND\nLimited evidence exists to show that adding a third agent to platinum-doublet chemotherapy improves efficacy in the first-line advanced non-small-cell lung cancer (NSCLC) setting. The anti-PD-1 antibody pembrolizumab has shown efficacy as monotherapy in patients with advanced NSCLC and has a non-overlapping toxicity profile with chemotherapy. We assessed whether the addition of pembrolizumab to platinum-doublet chemotherapy improves efficacy in patients with advanced non-squamous NSCLC.\n\n\nMETHODS\nIn this randomised, open-label, phase 2 cohort of a multicohort study (KEYNOTE-021), patients were enrolled at 26 medical centres in the USA and Taiwan. Patients with chemotherapy-naive, stage IIIB or IV, non-squamous NSCLC without targetable EGFR or ALK genetic aberrations were randomly assigned (1:1) in blocks of four stratified by PD-L1 tumour proportion score (<1% vs ≥1%) using an interactive voice-response system to 4 cycles of pembrolizumab 200 mg plus carboplatin area under curve 5 mg/mL per min and pemetrexed 500 mg/m2 every 3 weeks followed by pembrolizumab for 24 months and indefinite pemetrexed maintenance therapy or to 4 cycles of carboplatin and pemetrexed alone followed by indefinite pemetrexed maintenance therapy. The primary endpoint was the proportion of patients who achieved an objective response, defined as the percentage of patients with radiologically confirmed complete or partial response according to Response Evaluation Criteria in Solid Tumors version 1.1 assessed by masked, independent central review, in the intention-to-treat population, defined as all patients who were allocated to study treatment. Significance threshold was p<0·025 (one sided). Safety was assessed in the as-treated population, defined as all patients who received at least one dose of the assigned study treatment. This trial, which is closed for enrolment but continuing for follow-up, is registered with ClinicalTrials.gov, number NCT02039674.\n\n\nFINDINGS\nBetween Nov 25, 2014, and Jan 25, 2016, 123 patients were enrolled; 60 were randomly assigned to the pembrolizumab plus chemotherapy group and 63 to the chemotherapy alone group. 33 (55%; 95% CI 42-68) of 60 patients in the pembrolizumab plus chemotherapy group achieved an objective response compared with 18 (29%; 18-41) of 63 patients in the chemotherapy alone group (estimated treatment difference 26% [95% CI 9-42%]; p=0·0016). The incidence of grade 3 or worse treatment-related adverse events was similar between groups (23 [39%] of 59 patients in the pembrolizumab plus chemotherapy group and 16 [26%] of 62 in the chemotherapy alone group). The most common grade 3 or worse treatment-related adverse events in the pembrolizumab plus chemotherapy group were anaemia (seven [12%] of 59) and decreased neutrophil count (three [5%]); an additional six events each occurred in two (3%) for acute kidney injury, decreased lymphocyte count, fatigue, neutropenia, and sepsis, and thrombocytopenia. In the chemotherapy alone group, the most common grade 3 or worse events were anaemia (nine [15%] of 62) and decreased neutrophil count, pancytopenia, and thrombocytopenia (two [3%] each). One (2%) of 59 patients in the pembrolizumab plus chemotherapy group experienced treatment-related death because of sepsis compared with two (3%) of 62 patients in the chemotherapy group: one because of sepsis and one because of pancytopenia.\n\n\nINTERPRETATION\nCombination of pembrolizumab, carboplatin, and pemetrexed could be an effective and tolerable first-line treatment option for patients with advanced non-squamous NSCLC. This finding is being further explored in an ongoing international, randomised, double-blind, phase 3 study.\n\n\nFUNDING\nMerck & Co.", "title": "" }, { "docid": "7dadeadea2d281b981dcb72506f19366", "text": "Spacecrafts, which are used for stereoscopic mapping, imaging and telecommunication applications, require fine attitude and stabilization control which has an important role in high precision pointing and accurate stabilization. The conventional techniques for attitude and stabilization control are thrusters, reaction wheels, control moment gyroscopes (CMG) and magnetic torquers. Since reaction wheel can generate relatively smaller torques, they provide very fine stabilization and attitude control. Although conventional PID framework solves many stabilization problems, it is reported that many PID feedback loops are poorly tuned. In this paper, a model reference adaptive LQR control for reaction wheel stabilization problem is implemented. The tracking performance and disturbance rejection capability of proposed controller is found to give smooth motion after abnormal disruptions.", "title": "" }, { "docid": "20ef5a8b6835bedd44d571952b46ca90", "text": "This paper proposes an XYZ-flexure parallel mechanism (FPM) with large displacement and decoupled kinematics structure. The large-displacement FPM has large motion range more than 1 mm. Moreover, the decoupled XYZ-stage has small cross-axis error and small parasitic rotation. In this study, the typical prismatic joints are investigated, and a new large-displacement prismatic joint using notch hinges is designed. The conceptual design of the FPM is proposed by assembling these modular prismatic joints, and then the optimal design of the FPM is conducted. The analytical models of linear stiffness and dynamics are derived using pseudo-rigid-body (PRB) method. Finally, the numerical simulation using ANSYS is conducted for modal analysis to verify the analytical dynamics equation. Experiments are conducted to verify the proposed design for linear stiffness, cross-axis error and parasitic rotation", "title": "" }, { "docid": "dec3f821a1f9fc8102450a4add31952b", "text": "Homicide by hanging is an extremely rare incident [1]. Very few cases have been reported in which a person is rendered senseless and then hanged to simulate suicidal death; though there are a lot of cases in wherein a homicide victim has been hung later. We report a case of homicidal hanging of a young Sikh individual found hanging in a well. It became evident from the results of forensic autopsy that the victim had first been given alcohol mixed with pesticides and then hanged by his turban from a well. The rare combination of lynching (homicidal hanging) and use of organo-phosporous pesticide poisoning as a means of homicide are discussed in this paper.", "title": "" }, { "docid": "260dfcd7679ac125204bc50c4a6e2658", "text": "We present Chronos, a system that enables a single WiFi access point to localize clients to within tens of centimeters. Such a system can bring indoor positioning to homes and small businesses which typically have a single access point. The key enabler underlying Chronos is a novel algorithm that can compute sub-nanosecond time-of-flight using commodity WiFi cards. By multiplying the time-offlight with the speed of light, a MIMO access point computes the distance between each of its antennas and the client, hence localizing it. Our implementation on commodity WiFi cards demonstrates that Chronos’s accuracy is comparable to state-of-the-art localization systems, which use four or five access points.", "title": "" }, { "docid": "fa7ec2419ffc22b1ee43694b5f4e21b9", "text": "We consider the problem of finding outliers in large multivariate databases. Outlier detection can be applied during the data cleansing process of data mining to identify problems with the data itself, and to fraud detection where groups of outliers are often of particular interest. We use replicator neural networks (RNNs) to provide a measure of the outlyingness of data records. The performance of the RNNs is assessed using a ranked score measure. The effectiveness of the RNNs for outlier detection is demonstrated on two publicly available databases.", "title": "" }, { "docid": "4e35e75d5fc074b1e02f5dded5964c19", "text": "This paper presents a new bidirectional wireless power transfer (WPT) topology using current fed half bridge converter. Generally, WPT topology with current fed converter uses parallel LC resonant tank network in the transmitter side to compensate the reactive power. However, in medium power application this topology suffers a major drawback that the voltage stress in the inverter switches are considerably high due to high reactive power consumed by the loosely coupled coil. In the proposed topology this is mitigated by adding a suitably designed capacitor in series with the transmitter coil. Both during grid to vehicle and vehicle to grid operations the power flow is controlled through variable switching frequency to achieve extended ZVS of the inverter switches. Detail analysis and converter design procedure is presented for both grid to vehicle and vehicle to grid operations. A 1.2kW lab-prototype is developed and experimental results are presented to verify the analysis.", "title": "" }, { "docid": "e8af6607d171f43f0e1410a5850f10e8", "text": "Postpartum depression (PPD) is a serious mental health problem. It is prevalent, and offspring are at risk for disturbances in development. Major risk factors include past depression, stressful life events, poor marital relationship, and social support. Public health efforts to detect PPD have been increasing. Standard treatments (e.g., Interpersonal Psychotherapy) and more tailored treatments have been found effective for PPD. Prevention efforts have been less consistently successful. Future research should include studies of epidemiological risk factors and prevalence, interventions aimed at the parenting of PPD mothers, specific diathesis for a subset of PPD, effectiveness trials of psychological interventions, and prevention interventions aimed at addressing mental health issues in pregnant women.", "title": "" }, { "docid": "cccecb08c92f8bcec4a359373a20afcb", "text": "To solve the problem of the false matching and low robustness in detecting copy-move forgeries, a new method was proposed in this study. It involves the following steps: first, establish a Gaussian scale space; second, extract the orientated FAST key points and the ORB features in each scale space; thirdly, revert the coordinates of the orientated FAST key points to the original image and match the ORB features between every two different key points using the hamming distance; finally, remove the false matched key points using the RANSAC algorithm and then detect the resulting copy-move regions. The experimental results indicate that the new algorithm is effective for geometric transformation, such as scaling and rotation, and exhibits high robustness even when an image is distorted by Gaussian blur, Gaussian white noise and JPEG recompression; the new algorithm even has great detection on the type of hiding object forgery.", "title": "" }, { "docid": "33aa9af9a5f3d3f0b8bf21dca3b13d2f", "text": "Microarchitectural resources such as caches and predictors can be used to leak information across security domains. Significant prior work has demonstrated attacks and defenses for specific types of such microarchitectural side and covert channels. In this paper, we introduce a general mathematical study of microarchitectural channels using information theory. Our conceptual contribution is a simple mathematical abstraction that captures the common characteristics of all microarchitectural channels. We call this the Bucket model and it reveals that microarchitectural channels are fundamentally different from side and covert channels in networking. We then quantify the communication capacity of several microarchitectural covert channels (including channels that rely on performance counters, AES hardware and memory buses) and measure bandwidths across both KVM based heavy-weight virtualization and light-weight operating-system level isolation. We demonstrate channel capacities that are orders of magnitude higher compared to what was previously considered possible. Finally, we introduce a novel way of detecting intelligent adversaries that try to hide while running covert channel eavesdropping attacks. Our method generalizes a prior detection scheme (that modeled static adversaries) by introducing noise that hides the detection process from an intelligent eavesdropper.", "title": "" }, { "docid": "2c87f9ef35795c89de6b60e1ceff18c8", "text": "The paper presents a fusion-tracker and pedestrian classifier for color and thermal cameras. The tracker builds a background model as a multi-modal distribution of colors and temperatures. It is constructed as a particle filter that makes a number of informed reversible transformations to sample the model probability space in order to maximize posterior probability of the scene model. Observation likelihoods of moving objects account their 3D locations with respect to the camera and occlusions by other tracked objects as well as static obstacles. After capturing the coordinates and dimensions of moving objects we apply a pedestrian classifier based on periodic gait analysis. To separate humans from other moving objects, such as cars, we detect, in human gait, a symmetrical double helical pattern, that can then be analyzed using the Frieze Group theory. The results of tracking on color and thermal sequences demonstrate that our algorithm is robust to illumination noise and performs well in the outdoor environments.", "title": "" }, { "docid": "2b1adb51eafbcd50675513bc67e42140", "text": "This text reviews the generic aspects of the central nervous system evolutionary development, emphasizing the developmental features of the brain structures related with behavior and with the cognitive functions that finally characterized the human being. Over the limbic structures that with the advent of mammals were developed on the top of the primitive nervous system of their ancestrals, the ultimate cortical development with neurons arranged in layers constituted the structural base for an enhanced sensory discrimination, for more complex motor activities, and for the development of cognitive and intellectual functions that finally characterized the human being. The knowledge of the central nervous system phylogeny allow us particularly to infer possible correlations between the brain structures that were developed along phylogeny and the behavior of their related beings. In this direction, without discussing its conceptual aspects, this review ends with a discussion about the central nervous system evolutionary development and the emergence of consciousness, in the light of its most recent contributions.", "title": "" }, { "docid": "7cf90874c70202653a47fa165a1a87f7", "text": "This work proposes a new trust management system (TMS) for the Internet of Things (IoT). The wide majority of these systems are today bound to the assessment of trustworthiness with respect to a single function. As such, they cannot use past experiences related to other functions. Even those that support multiple functions hide this heterogeneity by regrouping all past experiences into a single metric. These restrictions are detrimental to the adaptation of TMSs to today’s emerging M2M and IoT architectures, which are characterized with heterogeneity in nodes, capabilities and services. To overcome these limitations, we design a context-aware and multi-service trust management system fitting the new requirements of the IoT. Simulation results show the good performance of the proposed system and especially highlight its ability to deter a class of common attacks designed to target trust management systems. a 2013 Elsevier Ltd. All rights reserved.", "title": "" }, { "docid": "77379e9c6c0781cd44f4e3208d9e5ca4", "text": "Recent developments in sensing and communication technologies have led to an explosion in the use of mobile devices such as smartphones and tablets. With the increase in the use of mobile devices, one has to constantly worry about the security and privacy as the loss of a mobile device could compromise personal information of the user. To deal with this problem, continuous authentication (also known as active authentication) systems have been proposed in which users are continuously monitored after the initial access to the mobile device. In this paper, we provide an overview of different continuous authentication methods on mobile devices. We discuss the merits and drawbacks of available approaches and identify promising avenues of research in this rapidly evolving field.", "title": "" }, { "docid": "3810c6b33a895730bc57fdc658d3f72e", "text": "Comics have been shown to be able to tell a story by guiding the viewers gaze patterns through a sequence of images. However, not much research has been done on how comic techniques affect these patterns. We focused this study to investigate the effect that the structure of a comics panels have on the viewers reading patterns, specifically with the time spent reading the comic and the number of times the viewer fixates on a point. We use two versions of a short comic as a stimulus, one version with four long panels and another with sixteen smaller panels. We collected data using the GazePoint eye tracker, focusing on viewing time and number of fixations, and we collected subjective information about the viewers preferences using a questionnaire. We found that no significant effect between panel structure and viewing time or number of fixations, but those viewers slightly tended to prefer the format of four long panels.", "title": "" }, { "docid": "7010278254ee0fadb7b59cb05169578a", "text": "INTRODUCTION\nLumbar disc herniation (LDH) is a common condition in adults and can impose a heavy burden on both the individual and society. It is defined as displacement of disc components beyond the intervertebral disc space. Various conservative treatments have been recommended for the treatment of LDH and physical therapy plays a major role in the management of patients. Therapeutic exercise is effective for relieving pain and improving function in individuals with symptomatic LDH. The aim of this systematic review is to evaluate the effectiveness of motor control exercise (MCE) for symptomatic LDH.\n\n\nMETHODS AND ANALYSIS\nWe will include all clinical trial studies with a concurrent control group which evaluated the effect of MCEs in patients with symptomatic LDH. We will search PubMed, SCOPUS, PEDro, SPORTDiscus, CINAHL, CENTRAL and EMBASE with no restriction of language. Primary outcomes of this systematic review are pain intensity and functional disability and secondary outcomes are functional tests, muscle thickness, quality of life, return to work, muscle endurance and adverse events. Study selection and data extraction will be performed by two independent reviewers. The assessment of risk of bias will be implemented using the PEDro scale. Publication bias will be assessed by funnel plots, Begg's and Egger's tests. Heterogeneity will be evaluated using the I2 statistic and the χ2 test. In addition, subgroup analyses will be conducted for population and the secondary outcomes. All meta-analyses will be performed using Stata V.12 software.\n\n\nETHICS AND DISSEMINATION\nNo ethical concerns are predicted. The systematic review findings will be published in a peer-reviewed journal and will also be presented at national/international academic and clinical conferences.\n\n\nTRIAL REGISTRATION NUMBER\nCRD42016038166.", "title": "" }, { "docid": "6934b06f35dc7855a8410329b099ca2f", "text": "Privacy protection in publishing transaction data is an important problem. A key feature of transaction data is the extreme sparsity, which renders any single technique ineffective in anonymizing such data. Among recent works, some incur high information loss, some result in data hard to interpret, and some suffer from performance drawbacks. This paper proposes to integrate generalization and suppression to reduce information loss. However, the integration is non-trivial. We propose novel techniques to address the efficiency and scalability challenges. Extensive experiments on real world databases show that this approach outperforms the state-of-the-art methods, including global generalization, local generalization, and total suppression. In addition, transaction data anonymized by this approach can be analyzed by standard data mining tools, a property that local generalization fails to provide.", "title": "" }, { "docid": "19339fa01942ad3bf33270aa1f6ceae2", "text": "This study investigated query formulations by users with {\\it Cognitive Search Intents} (CSIs), which are users' needs for the cognitive characteristics of documents to be retrieved, {\\em e.g. comprehensibility, subjectivity, and concreteness. Our four main contributions are summarized as follows (i) we proposed an example-based method of specifying search intents to observe query formulations by users without biasing them by presenting a verbalized task description;(ii) we conducted a questionnaire-based user study and found that about half our subjects did not input any keywords representing CSIs, even though they were conscious of CSIs;(iii) our user study also revealed that over 50\\% of subjects occasionally had experiences with searches with CSIs while our evaluations demonstrated that the performance of a current Web search engine was much lower when we not only considered users' topical search intents but also CSIs; and (iv) we demonstrated that a machine-learning-based query expansion could improve the performances for some types of CSIs.Our findings suggest users over-adapt to current Web search engines,and create opportunities to estimate CSIs with non-verbal user input.", "title": "" } ]
scidocsrr
0c39cc7afb570af24adeb2b801b6598e
Personal self-concept and satisfaction with life in adolescence, youth and adulthood.
[ { "docid": "c2448cd1ac95923b11b033041cfa0cb7", "text": "Reigning measures of psychological well-being have little theoretical grounding, despite an extensive literature on the contours of positive functioning. Aspects of well-being derived from this literature (i.e., self-acceptance, positive relations with others, autonomy, environmental mastery, purpose in life, and personal growth) were operationalized. Three hundred and twenty-one men and women, divided among young, middle-aged, and older adults, rated themselves on these measures along with six instruments prominent in earlier studies (i.e., affect balance, life satisfaction, self-esteem, morale, locus of control, depression). Results revealed that positive relations with others, autonomy, purpose in life, and personal growth were not strongly tied to prior assessment indexes, thereby supporting the claim that key aspects of positive functioning have not been represented in the empirical arena. Furthermore, age profiles revealed a more differentiated pattern of well-being than is evident in prior research.", "title": "" } ]
[ { "docid": "07a718d6e7136e90dbd35ea18d6a5f11", "text": "We discuss the importance of understanding psychological aspects of phishing, and review some recent findings. Given these findings, we critique some commonly used security practices and suggest and review alternatives, including educational approaches. We suggest a few techniques that can be used to assess and remedy threats remotely, without requiring any user involvement. We conclude by discussing some approaches to anticipate the next wave of threats, based both on psychological and technical insights. 1 What Will Consumers Believe? There are several reasons why it is important to understand what consumers will find believable. First of all, it is crucial for service providers to know their vulnerabilities (and those of their clients) in order to assess their exposure to risks and the associated liabilities. Second, recognizing what the vulnerabilities are translates into knowing from where the attacks are likely to come; this allows for suitable technical security measures to be deployed to detect and protect against attacks of concern. It also allows for a proactive approach in which the expected vulnerabilities are minimized by the selection and deployment of appropriate email and web templates, and the use of appropriate manners of interaction. Finally, there are reasons for why understanding users is important that are not directly related to security: Knowing what consumers will believe—and will not believe—means a better ability to reach the consumers with information they do not expect, whether for reasons of advertising products or communicating alerts. Namely, given the mimicry techniques used by phishers, there is a risk that consumers incorrectly classify legitimate messages as attempts to attack them. Being aware of potential pitfalls may guide decisions that facilitate communication. While technically knowledgeable, specialists often make the mistake of believing that security measures that succeed in protecting them are sufficient to protect average consumers. For example, it was for a long time commonly held among security practitioners that the widespread deployment of SSL would eliminate phishing once consumers become aware of the risks and nature of phishing attacks. This, very clearly, has not been the case, as supported both by reallife observations and by experiments [48]. This can be ascribed to a lack of attention to security among typical users [47, 35], but also to inconsistent or inappropriate security education [12]— whether implicit or not. An example of a common procedure that indirectly educates user is the case of lock symbols. Many financial institutions place a lock symbol in the content portion of the login page to indicate that a secure connection will be established as the user submits his credentials. This is to benefit from the fact that users have been educated to equate an SSL lock with a higher level of security. However, attackers may also place lock icons in the content of the page, whether they intend to establish an SSL connection or not. Therefore, the use of the lock", "title": "" }, { "docid": "e91d3ae1224ca4c86f72646fd86cc661", "text": "We examine the functional cohesion of procedures using a data slice abstraction. Our analysis identi es the data tokens that lie on more than one slice as the \\glue\" that binds separate components together. Cohesion is measured in terms of the relative number of glue tokens, tokens that lie on more than one data slice, and super-glue tokens, tokens that lie on all data slices in a procedure, and the adhesiveness of the tokens. The intuition and measurement scale factors are demonstrated through a set of abstract transformations and composition operators. Index terms | software metrics, cohesion, program slices, measurement theory", "title": "" }, { "docid": "8e26d11fa1ab330a429f072c1ac17fe2", "text": "The objective of this study was to report the signalment, indications for surgery, postoperative complications and outcome in dogs undergoing penile amputation and scrotal urethrostomy. Medical records of three surgical referral facilities were reviewed for dogs undergoing penile amputation and scrotal urethrostomy between January 2003 and July 2010. Data collected included signalment, presenting signs, indication for penile amputation, surgical technique, postoperative complications and long-term outcome. Eighteen dogs were included in the study. Indications for surgery were treatment of neoplasia (n=6), external or unknown penile trauma (n=4), penile trauma or necrosis associated with urethral obstruction with calculi (n=3), priapism (n=4) and balanoposthitis (n=1). All dogs suffered mild postoperative haemorrhage (posturination and/or spontaneous) from the urethrostomy stoma for up to 21 days (mean 5.5 days). Four dogs had minor complications recorded at suture removal (minor dehiscence (n=1), mild bruising and swelling around the urethrostomy site and mild haemorrhage at suture removal (n=2), and granulation at the edge of stoma (n=1)). One dog had a major complication (wound dehiscence and subsequent stricture of the stoma). Long-term outcome was excellent in all dogs with non-neoplastic disease. Local tumour recurrence and/or metastatic disease occurred within five to 12 months of surgery in two dogs undergoing penile amputation for the treatment of neoplasia. Both dogs were euthanased.", "title": "" }, { "docid": "878cd4545931099ead5df71076afc731", "text": "The pioneer deep neural networks (DNNs) have emerged to be deeper or wider for improving their accuracy in various applications of artificial intelligence. However, DNNs are often too heavy to deploy in practice, and it is often required to control their architectures dynamically given computing resource budget, i.e., anytime prediction. While most existing approaches have focused on training multiple shallow sub-networks jointly, we study training thin sub-networks instead. To this end, we first build many inclusive thin sub-networks (of the same depth) under a minor modification of existing multi-branch DNNs, and found that they can significantly outperform the state-of-art dense architecture for anytime prediction. This is remarkable due to their simplicity and effectiveness, but training many thin subnetworks jointly faces a new challenge on training complexity. To address the issue, we also propose a novel DNN architecture by forcing a certain sparsity pattern on multi-branch network parameters, making them train efficiently for the purpose of anytime prediction. In our experiments on the ImageNet dataset, its sub-networks have up to 43.3% smaller sizes (FLOPs) compared to those of the state-of-art anytime model with respect to the same accuracy. Finally, we also propose an alternative task under the proposed architecture using a hierarchical taxonomy, which brings a new angle for anytime prediction.", "title": "" }, { "docid": "be447131554900aaba025be449944613", "text": "Attackers increasingly take advantage of innocent users who tend to casually open email messages assumed to be benign, carrying malicious documents. Recent targeted attacks aimed at organizations utilize the new Microsoft Word documents (*.docx). Anti-virus software fails to detect new unknown malicious files, including malicious docx files. In this paper, we present ALDOCX, a framework aimed at accurate detection of new unknown malicious docx files that also efficiently enhances the framework’s detection capabilities over time. Detection relies upon our new structural feature extraction methodology (SFEM), which is performed statically using meta-features extracted from docx files. Using machine-learning algorithms with SFEM, we created a detection model that successfully detects new unknown malicious docx files. In addition, because it is crucial to maintain the detection model’s updatability and incorporate new malicious files created daily, ALDOCX integrates our active-learning (AL) methods, which are designed to efficiently assist anti-virus vendors by better focusing their experts’ analytical efforts and enhance detection capability. ALDOCX identifies and acquires new docx files that are most likely malicious, as well as informative benign files. These files are used for enhancing the knowledge stores of both the detection model and the anti-virus software. The evaluation results show that by using ALDOCX and SFEM, we achieved a high detection rate of malicious docx files (94.44% TPR) compared with the anti-virus software (85.9% TPR)—with very low FPR rates (0.19%). ALDOCX’s AL methods used only 14% of the labeled docx files, which led to a reduction of 95.5% in security experts’ labeling efforts compared with the passive learning and the support vector machine (SVM)-Margin (existing active-learning method). Our AL methods also showed a significant improvement of 91% in number of unknown docx malware acquired, compared with the passive learning and the SVM-Margin, thus providing an improved updating solution for the detection model, as well as the anti-virus software widely used within organizations.", "title": "" }, { "docid": "e2988860c1e8b4aebd6c288d37d1ca4e", "text": "Numerous studies have shown that datacenter computers rarely operate at full utilization, leading to a number of proposals for creating servers that are energy proportional with respect to the computation that they are performing.\n In this paper, we show that as servers themselves become more energy proportional, the datacenter network can become a significant fraction (up to 50%) of cluster power. In this paper we propose several ways to design a high-performance datacenter network whose power consumption is more proportional to the amount of traffic it is moving -- that is, we propose energy proportional datacenter networks.\n We first show that a flattened butterfly topology itself is inherently more power efficient than the other commonly proposed topology for high-performance datacenter networks. We then exploit the characteristics of modern plesiochronous links to adjust their power and performance envelopes dynamically. Using a network simulator, driven by both synthetic workloads and production datacenter traces, we characterize and understand design tradeoffs, and demonstrate an 85% reduction in power --- which approaches the ideal energy-proportionality of the network.\n Our results also demonstrate two challenges for the designers of future network switches: 1) We show that there is a significant power advantage to having independent control of each unidirectional channel comprising a network link, since many traffic patterns show very asymmetric use, and 2) system designers should work to optimize the high-speed channel designs to be more energy efficient by choosing optimal data rate and equalization technology. Given these assumptions, we demonstrate that energy proportional datacenter communication is indeed possible.", "title": "" }, { "docid": "555afe09318573b475e96e72d2c7e54e", "text": "A conflict-free replicated data type (CRDT) is an abstract data type, with a well defined interface, designed to be replicated at multiple processes and exhibiting the following properties: (i) any replica can be modified without coordinating with another replicas; (ii) when any two replicas have received the same set of updates, they reach the same state, deterministically, by adopting mathematically sound rules to guarantee state convergence.", "title": "" }, { "docid": "fba5b69c3b0afe9f39422db8c18dba06", "text": "It is well known that stressful experiences may affect learning and memory processes. Less clear is the exact nature of these stress effects on memory: both enhancing and impairing effects have been reported. These opposite effects may be explained if the different time courses of stress hormone, in particular catecholamine and glucocorticoid, actions are taken into account. Integrating two popular models, we argue here that rapid catecholamine and non-genomic glucocorticoid actions interact in the basolateral amygdala to shift the organism into a 'memory formation mode' that facilitates the consolidation of stressful experiences into long-term memory. The undisturbed consolidation of these experiences is then promoted by genomic glucocorticoid actions that induce a 'memory storage mode', which suppresses competing cognitive processes and thus reduces interference by unrelated material. Highlighting some current trends in the field, we further argue that stress affects learning and memory processes beyond the basolateral amygdala and hippocampus and that stress may pre-program subsequent memory performance when it is experienced during critical periods of brain development.", "title": "" }, { "docid": "352c61af854ffc6dab438e7a1be56fcb", "text": "Question-answering (QA) on video contents is a significant challenge for achieving human-level intelligence as it involves both vision and language in real-world settings. Here we demonstrate the possibility of an AI agent performing video story QA by learning from a large amount of cartoon videos. We develop a video-story learning model, i.e. Deep Embedded Memory Networks (DEMN), to reconstruct stories from a joint scene-dialogue video stream using a latent embedding space of observed data. The video stories are stored in a long-term memory component. For a given question, an LSTM-based attention model uses the long-term memory to recall the best question-story-answer triplet by focusing on specific words containing key information. We trained the DEMN on a novel QA dataset of children’s cartoon video series, Pororo. The dataset contains 16,066 scene-dialogue pairs of 20.5-hour videos, 27,328 fine-grained sentences for scene description, and 8,913 story-related QA pairs. Our experimental results show that the DEMN outperforms other QA models. This is mainly due to 1) the reconstruction of video stories in a scene-dialogue combined form that utilize the latent embedding and 2) attention. DEMN also achieved state-of-the-art results on the MovieQA benchmark.", "title": "" }, { "docid": "84301afe8fa5912dc386baab84dda7ea", "text": "There is a growing understanding that machine learning architectures have to be much bigger and more complex to approach any intelligent behavior. There is also a growing understanding that purely supervised learning is inadequate to train such systems. A recent paradigm of artificial recurrent neural network (RNN) training under the umbrella-name Reservoir Computing (RC) demonstrated that training big recurrent networks (the reservoirs) differently than supervised readouts from them is often better. It started with Echo State Networks (ESNs) and Liquid State Machines ten years ago where the reservoir was generated randomly and only linear readouts from it were trained. Rather surprisingly, such simply and fast trained ESNs outperformed classical fully-trained RNNs in many tasks. While full supervised training of RNNs is problematic, intuitively there should also be something better than a random network. In recent years RC became a vivid research field extending the initial paradigm from fixed random reservoir and trained output into using different methods for training the reservoir and the readout. In this thesis we overview existing and investigate new alternatives to the classical supervised training of RNNs and their hierarchies. First we present a taxonomy and a systematic overview of the RNN training approaches under the RC umbrella. Second, we propose and investigate the use of two different neural network models for the reservoirs together with several unsupervised adaptation techniques, as well as unsupervisedly layer-wise trained deep hierarchies of such models. We rigorously empirically test the proposed methods on two temporal pattern recognition datasets, comparing it to the classical reservoir computing state of art.", "title": "" }, { "docid": "fa313356d7267e963f75cd2ba4452814", "text": "INTRODUCTION\nStroke is a major cause of death and disability. Accurately predicting stroke outcome from a set of predictive variables may identify high-risk patients and guide treatment approaches, leading to decreased morbidity. Logistic regression models allow for the identification and validation of predictive variables. However, advanced machine learning algorithms offer an alternative, in particular, for large-scale multi-institutional data, with the advantage of easily incorporating newly available data to improve prediction performance. Our aim was to design and compare different machine learning methods, capable of predicting the outcome of endovascular intervention in acute anterior circulation ischaemic stroke.\n\n\nMETHOD\nWe conducted a retrospective study of a prospectively collected database of acute ischaemic stroke treated by endovascular intervention. Using SPSS®, MATLAB®, and Rapidminer®, classical statistics as well as artificial neural network and support vector algorithms were applied to design a supervised machine capable of classifying these predictors into potential good and poor outcomes. These algorithms were trained, validated and tested using randomly divided data.\n\n\nRESULTS\nWe included 107 consecutive acute anterior circulation ischaemic stroke patients treated by endovascular technique. Sixty-six were male and the mean age of 65.3. All the available demographic, procedural and clinical factors were included into the models. The final confusion matrix of the neural network, demonstrated an overall congruency of ∼ 80% between the target and output classes, with favourable receiving operative characteristics. However, after optimisation, the support vector machine had a relatively better performance, with a root mean squared error of 2.064 (SD: ± 0.408).\n\n\nDISCUSSION\nWe showed promising accuracy of outcome prediction, using supervised machine learning algorithms, with potential for incorporation of larger multicenter datasets, likely further improving prediction. Finally, we propose that a robust machine learning system can potentially optimise the selection process for endovascular versus medical treatment in the management of acute stroke.", "title": "" }, { "docid": "43cc6e40a7a31948ca2e7c141b271dbf", "text": "The false discovery rate (FDR)—the expected fraction of spurious discoveries among all the discoveries—provides a popular statistical assessment of the reproducibility of scientific studies in various disciplines. In this work, we introduce a new method for controlling the FDR in meta-analysis of many decentralized linear models. Our method targets the scenario where many research groups—possibly the number of which is random—are independently testing a common set of hypotheses and then sending summary statistics to a coordinating center in an online manner. Built on the knockoffs framework introduced by Barber and Candès (2015), our procedure starts by applying the knockoff filter to each linear model and then aggregates the summary statistics via one-shot communication in a novel way. This method gives exact FDR control non-asymptotically without any knowledge of the noise variances or making any assumption about sparsity of the signal. In certain settings, it has a communication complexity that is optimal up to a logarithmic factor.", "title": "" }, { "docid": "5e07328bf13a9dd2486e9dddbe6a3d8f", "text": "We present VOSviewer, a freely available computer program that we have developed for constructing and viewing bibliometric maps. Unlike most computer programs that are used for bibliometric mapping, VOSviewer pays special attention to the graphical representation of bibliometric maps. The functionality of VOSviewer is especially useful for displaying large bibliometric maps in an easy-to-interpret way. The paper consists of three parts. In the first part, an overview of VOSviewer’s functionality for displaying bibliometric maps is provided. In the second part, the technical implementation of specific parts of the program is discussed. Finally, in the third part, VOSviewer’s ability to handle large maps is demonstrated by using the program to construct and display a co-citation map of 5,000 major scientific journals.", "title": "" }, { "docid": "64a0e5d297c1bf2d42eae909e9548fb6", "text": "How to find the representative bands is a key issue in band selection for hyperspectral data. Very often, unsupervised band selection is associated with data clustering, and the cluster centers (or exemplars) are considered ideal representatives. However, partitioning the bands into clusters may be very time-consuming and affected by the distribution of the data points. In this letter, we propose a new band selection method, i.e., exemplar component analysis (ECA), aiming at selecting the exemplars of bands. Interestingly, ECA does not involve actual clustering. Instead, it prioritizes the bands according to their exemplar score, which is an easy-to-compute indicator defined in this letter measuring the possibility of bands to be exemplars. As a result, ECA is of high efficiency and immune to distribution structures of the data. The experiments on real hyperspectral data set demonstrate that ECA is an effective and efficient band selection method.", "title": "" }, { "docid": "74227709f4832c3978a21abb9449203b", "text": "Mobile consumer-electronics devices, especially phones, are powered from batteries which are limited in size and therefore capacity. This implies that managing energy well is paramount in such devices. Good energy management requires a good understanding of where and how the energy is used. To this end we present a detailed analysis of the power consumption of a recent mobile phone, the Openmoko Neo Freerunner. We measure not only overall system power, but the exact breakdown of power consumption by the device’s main hardware components. We present this power breakdown for micro-benchmarks as well as for a number of realistic usage scenarios. These results are validated by overall power measurements of two other devices: the HTC Dream and Google Nexus One. We develop a power model of the Freerunner device and analyse the energy usage and battery lifetime under a number of usage patterns. We discuss the significance of the power drawn by various components, and identify the most promising areas to focus on for further improvements of power management. We also analyse the energy impact of dynamic voltage and frequency scaling of the device’s application processor.", "title": "" }, { "docid": "867bb8f30a1e9440a03903d8471443f0", "text": "In this paper we present the Reactable, a new electronic musical instrument with a simple and intuitive tabletop interface that turns music into a tangible and visual experience, enabling musicians to experiment with sound, change its structure, control its parameters and be creative in a direct, refreshing and unseen way.", "title": "" }, { "docid": "4c5ed8940b888a4eb2abc5791afd5a36", "text": "A low-gain antenna (LGA) is designed for high cross-polarization discrimination (XPD) and low backward radiation within the 8.025-8.4-GHz frequency band to mitigate cross-polarization and multipath interference given the spacecraft layout constraints. The X-band choke ring horn was optimized, fabricated, and measured. The antenna gain remains higher than 2.5 dBi for angles between 0° and 60° off-boresight. The XPD is higher than 15 dB from 0° to 40° and higher than 20 dB from 40° to 60° off-boresight. The calculated and measured data are in excellent agreement.", "title": "" }, { "docid": "59f083611e4dc81c5280fc118e05401c", "text": "We propose a low area overhead and power-efficient asynchronous-logic quasi-delay-insensitive (QDI) sense-amplifier half-buffer (SAHB) approach with quad-rail (i.e., 1-of-4) data encoding. The proposed quad-rail SAHB approach is targeted for area- and energy-efficient asynchronous network-on-chip (ANoC) router designs. There are three main features in the proposed quad-rail SAHB approach. First, the quad-rail SAHB is designed to use four wires for selecting four ANoC router directions, hence reducing the number of transistors and area overhead. Second, the quad-rail SAHB switches only one out of four wires for 2-bit data propagation, hence reducing the number of transistor switchings and dynamic power dissipation. Third, the quad-rail SAHB abides by QDI rules, hence the designed ANoC router features high operational robustness toward process-voltage-temperature (PVT) variations. Based on the 65-nm CMOS process, we use the proposed quad-rail SAHB to implement and prototype an 18-bit ANoC router design. When benchmarked against the dual-rail counterpart, the proposed quad-rail SAHB ANoC router features 32% smaller area and dissipates 50% lower energy under the same excellent operational robustness toward PVT variations. When compared to the other reported ANoC routers, our proposed quad-rail SAHB ANoC router is one of the high operational robustness, smallest area, and most energy-efficient designs.", "title": "" }, { "docid": "19ea89fc23e7c4d564e4a164cfc4947a", "text": "OBJECTIVES\nThe purpose of this study was to evaluate the proximity of the mandibular molar apex to the buccal bone surface in order to provide anatomic information for apical surgery.\n\n\nMATERIALS AND METHODS\nCone-beam computed tomography (CBCT) images of 127 mandibular first molars and 153 mandibular second molars were analyzed from 160 patients' records. The distance was measured from the buccal bone surface to the root apex and the apical 3.0 mm on the cross-sectional view of CBCT.\n\n\nRESULTS\nThe second molar apex and apical 3 mm were located significantly deeper relative to the buccal bone surface compared with the first molar (p < 0.01). For the mandibular second molars, the distance from the buccal bone surface to the root apex was significantly shorter in patients over 70 years of age (p < 0.05). Furthermore, this distance was significantly shorter when the first molar was missing compared to nonmissing cases (p < 0.05). For the mandibular first molars, the distance to the distal root apex of one distal-rooted tooth was significantly greater than the distance to the disto-buccal root apex (p < 0.01). In mandibular second molar, the distance to the apex of C-shaped roots was significantly greater than the distance to the mesial root apex of non-C-shaped roots (p < 0.01).\n\n\nCONCLUSIONS\nFor apical surgery in mandibular molars, the distance from the buccal bone surface to the apex and apical 3 mm is significantly affected by the location, patient age, an adjacent missing anterior tooth, and root configuration.", "title": "" }, { "docid": "3f4953e2fd874fa9be4ab64912cd190a", "text": "Road detection from a monocular camera is an important perception module in any advanced driver assistance or autonomous driving system. Traditional techniques [1, 2, 3, 4, 5, 6] work reasonably well for this problem, when the roads are well maintained and the boundaries are clearly marked. However, in many developing countries or even for the rural areas in the developed countries, the assumption does not hold which leads to failure of such techniques. In this paper we propose a novel technique based on the combination of deep convolutional neural networks (CNNs), along with color lines model [7] based prior in a conditional random field (CRF) framework. While the CNN learns the road texture, the color lines model allows to adapt to varying illumination conditions. We show that our technique outperforms the state of the art segmentation techniques on the unmarked road segmentation problem. Though, not a focus of this paper, we show that even on the standard benchmark datasets like KITTI [8] and CamVid [9], where the road boundaries are well marked, the proposed technique performs competitively to the contemporary techniques.", "title": "" } ]
scidocsrr
03b8497dfb86e54bc80bbbc1730be3b6
Modeling Cyber-Physical Systems with Semantic Agents
[ { "docid": "73dd590da37ffec2d698142bee2e23fb", "text": "Agent-based modeling and simulation (ABMS) is a new approach to modeling systems comprised of interacting autonomous agents. ABMS promises to have far-reaching effects on the way that businesses use computers to support decision-making and researchers use electronic laboratories to do research. Some have gone so far as to contend that ABMS is a new way of doing science. Computational advances make possible a growing number of agent-based applications across many fields. Applications range from modeling agent behavior in the stock market and supply chains, to predicting the spread of epidemics and the threat of bio-warfare, from modeling the growth and decline of ancient civilizations to modeling the complexities of the human immune system, and many more. This tutorial describes the foundations of ABMS, identifies ABMS toolkits and development methods illustrated through a supply chain example, and provides thoughts on the appropriate contexts for ABMS versus conventional modeling techniques.", "title": "" } ]
[ { "docid": "4487f3713062ef734ceab5c7f9ccc6e3", "text": "In the analysis of machine learning models, it is often convenient to assume that the parameters are IID. This assumption is not satisfied when the parameters are updated through training processes such as SGD. A relaxation of the IID condition is a probabilistic symmetry known as exchangeability. We show the sense in which the weights in MLPs are exchangeable. This yields the result that in certain instances, the layer-wise kernel of fully-connected layers remains approximately constant during training. We identify a sharp change in the macroscopic behavior of networks as the covariance between weights changes from zero.", "title": "" }, { "docid": "b6fff873c084e9a44d870ffafadbc9e7", "text": "A wide variety of smartphone applications today rely on third-party advertising services, which provide libraries that are linked into the hosting application. This situation is undesirable for both the application author and the advertiser. Advertising libraries require their own permissions, resulting in additional permission requests to users. Likewise, a malicious application could simulate the behavior of the advertising library, forging the user’s interaction and stealing money from the advertiser. This paper describes AdSplit, where we extended Android to allow an application and its advertising to run as separate processes, under separate user-ids, eliminating the need for applications to request permissions on behalf of their advertising libraries, and providing services to validate the legitimacy of clicks, locally and remotely. AdSplit automatically recompiles apps to extract their ad services, and we measure minimal runtime overhead. AdSplit also supports a system resource that allows advertisements to display their content in an embedded HTML widget, without requiring any native code.", "title": "" }, { "docid": "47ee1b71ed10b64110b84e5eecf2857c", "text": "Measurements for future outdoor cellular systems at 28 GHz and 38 GHz were conducted in urban microcellular environments in New York City and Austin, Texas, respectively. Measurements in both line-of-sight and non-line-of-sight scenarios used multiple combinations of steerable transmit and receive antennas (e.g. 24.5 dBi horn antennas with 10.9° half power beamwidths at 28 GHz, 25 dBi horn antennas with 7.8° half power beamwidths at 38 GHz, and 13.3 dBi horn antennas with 24.7° half power beamwidths at 38 GHz) at different transmit antenna heights. Based on the measured data, we present path loss models suitable for the development of fifth generation (5G) standards that show the distance dependency of received power. In this paper, path loss is expressed in easy-to-use formulas as the sum of a distant dependent path loss factor, a floating intercept, and a shadowing factor that minimizes the mean square error fit to the empirical data. The new models are compared with previous models that were limited to using a close-in free space reference distance. Here, we illustrate the differences of the two modeling approaches, and show that a floating intercept model reduces the shadow factors by several dB and offers smaller path loss exponents while simultaneously providing a better fit to the empirical data. The upshot of these new path loss models is that coverage is actually better than first suggested by work in [1], [7] and [8].", "title": "" }, { "docid": "9e451fe70d74511d2cc5a58b667da526", "text": "Convolutional Neural Networks (CNNs) are propelling advances in a range of different computer vision tasks such as object detection and object segmentation. Their success has motivated research in applications of such models for medical image analysis. If CNN-based models are to be helpful in a medical context, they need to be precise, interpretable, and uncertainty in predictions must be well understood. In this paper, we develop and evaluate recent advances in uncertainty estimation and model interpretability in the context of semantic segmentation of polyps from colonoscopy images. We evaluate and enhance several architectures of Fully Convolutional Networks (FCNs) for semantic segmentation of colorectal polyps and provide a comparison between these models. Our highest performing model achieves a 76.06% mean IOU accuracy on the EndoScene dataset, a considerable improvement over the previous state-of-the-art.", "title": "" }, { "docid": "b42b17131236abc1ee3066905025aa8c", "text": "The planet Mars, while cold and arid today, once possessed a warm and wet climate, as evidenced by extensive fluvial features observable on its surface. It is believed that the warm climate of the primitive Mars was created by a strong greenhouse effect caused by a thick CO2 atmosphere. Mars lost its warm climate when most of the available volatile CO2 was fixed into the form of carbonate rock due to the action of cycling water. It is believed, however, that sufficient CO2 to form a 300 to 600 mb atmosphere may still exist in volatile form, either adsorbed into the regolith or frozen out at the south pole. This CO2 may be released by planetary warming, and as the CO2 atmosphere thickens, positive feedback is produced which can accelerate the warming trend. Thus it is conceivable, that by taking advantage of the positive feedback inherent in Mars' atmosphere/regolith CO2 system, that engineering efforts can produce drastic changes in climate and pressure on a planetary scale. In this paper we propose a mathematical model of the Martian CO2 system, and use it to produce analysis which clarifies the potential of positive feedback to accelerate planetary engineering efforts. It is shown that by taking advantage of the feedback, the requirements for planetary engineering can be reduced by about 2 orders of magnitude relative to previous estimates. We examine the potential of various schemes for producing the initial warming to drive the process, including the stationing of orbiting mirrors, the importation of natural volatiles with high greenhouse capacity from the outer solar system, and the production of artificial halocarbon greenhouse gases on the Martian surface through in-situ industry. If the orbital mirror scheme is adopted, mirrors with dimension on the order or 100 km radius are required to vaporize the CO2 in the south polar cap. If manufactured of solar sail like material, such mirrors would have a mass on the order of 200,000 tonnes. If manufactured in space out of asteroidal or Martian moon material, about 120 MWe-years of energy would be needed to produce the required aluminum. This amount of power can be provided by near-term multimegawatt nuclear power units, such as the 5 MWe modules now under consideration for NEP spacecraft. Orbital transfer of very massive bodies from the outer solar system can be accomplished using nuclear thermal rocket engines using the asteroid's volatile material as propellant. Using major planets for gravity assists, the rocket ∆V required to move an outer solar system asteroid onto a collision trajectory with Mars can be as little as 300 m/s. If the asteroid is made of NH3, specific impulses of about 400 s can be attained, and as little as 10% of the asteroid will be required for propellant. Four 5000 MWt NTR engines would require a 10 year burn time to push a 10 billion tonne asteroid through a ∆V of 300 m/s. About 4 such objects would be sufficient to greenhouse Mars. Greenhousing Mars via the manufacture of halocarbon gases on the planet's surface may well be the most practical option. Total surface power requirements to drive planetary warming using this method are calculated and found to be on the order of 1000 MWe, and the required times scale for climate and atmosphere modification is on the order of 50 years. It is concluded that a drastic modification of Martian conditions can be achieved using 21st century technology. The Mars so produced will closely resemble the conditions existing on the primitive Mars. Humans operating on the surface of such a Mars would require breathing gear, but pressure suits would be unnecessary. With outside atmospheric pressures raised, it will be possible to create large dwelling areas by means of very large inflatable structures. Average temperatures could be above the freezing point of water for significant regions during portions of the year, enabling the growth of plant life in the open. The spread of plants could produce enough oxygen to make Mars habitable for animals in several millennia. More rapid oxygenation would require engineering efforts supported by multi-terrawatt power sources. It is speculated that the desire to speed the terraforming of Mars will be a driver for developing such technologies, which in turn will define a leap in human power over nature as dramatic as that which accompanied the creation of post-Renaissance industrial civilization.", "title": "" }, { "docid": "6e4d846272030b160b30d56a60eb2cad", "text": "MapReduce and Spark are two very popular open source cluster computing frameworks for large scale data analytics. These frameworks hide the complexity of task parallelism and fault-tolerance, by exposing a simple programming API to users. In this paper, we evaluate the major architectural components in MapReduce and Spark frameworks including: shuffle, execution model, and caching, by using a set of important analytic workloads. To conduct a detailed analysis, we developed two profiling tools: (1) We correlate the task execution plan with the resource utilization for both MapReduce and Spark, and visually present this correlation; (2) We provide a break-down of the task execution time for in-depth analysis. Through detailed experiments, we quantify the performance differences between MapReduce and Spark. Furthermore, we attribute these performance differences to different components which are architected differently in the two frameworks. We further expose the source of these performance differences by using a set of micro-benchmark experiments. Overall, our experiments show that Spark is about 2.5x, 5x, and 5x faster than MapReduce, for Word Count, k-means, and PageRank, respectively. The main causes of these speedups are the efficiency of the hash-based aggregation component for combine, as well as reduced CPU and disk overheads due to RDD caching in Spark. An exception to this is the Sort workload, for which MapReduce is 2x faster than Spark. We show that MapReduce’s execution model is more efficient for shuffling data than Spark, thus making Sort run faster on MapReduce.", "title": "" }, { "docid": "6fb1f05713db4e771d9c610fa9c9925d", "text": "Objectives: Straddle injury represents a rare and complex injury to the female genito urinary tract (GUT). Overall prevention would be the ultimate goal, but due to persistent inhomogenity and inconsistency in definitions and guidelines, or suboptimal coding, the optimal study design for a prevention programme is still missing. Thus, medical records data were tested for their potential use for an injury surveillance registry and their impact on future prevention programmes. Design: Retrospective record analysis out of a 3 year period. Setting: All patients were treated exclusively by the first author. Patients: Six girls, median age 7 years, range 3.5 to 12 years with classical straddle injury. Interventions: Medical treatment and recording according to National and International Standards. Main Outcome Measures: All records were analyzed for accuracy in diagnosis and coding, surgical procedure, time and location of incident and examination findings. Results: All registration data sets were complete. A specific code for “straddle injury” in International Classification of Diseases (ICD) did not exist. Coding followed mainly reimbursement issues and specific information about the injury was usually expressed in an individual style. Conclusions: As demonstrated in this pilot, population based medical record data collection can play a substantial part in local injury surveillance registry and prevention initiatives planning.", "title": "" }, { "docid": "68f0f63fcfa29d3867fa7d2dea6807cc", "text": "We propose a machine learning framework to capture the dynamics of highfrequency limit order books in financial equity markets and automate real-time prediction of metrics such as mid-price movement and price spread crossing. By characterizing each entry in a limit order book with a vector of attributes such as price and volume at different levels, the proposed framework builds a learning model for each metric with the help of multi-class support vector machines (SVMs). Experiments with real data establish that features selected by the proposed framework are effective for short term price movement forecasts.", "title": "" }, { "docid": "35c299197861d0a57763bbc392e90bb2", "text": "Imperfect-information games, where players have private information, pose a unique challenge in artificial intelligence. In recent years, Heads-Up NoLimit Texas Hold’em poker, a popular version of poker, has emerged as the primary benchmark for evaluating game-solving algorithms for imperfectinformation games. We demonstrate a winning agent from the 2016 Annual Computer Poker Competition, Baby Tartanian8.", "title": "" }, { "docid": "61953c398f2bcd4fd0ff4662689293a0", "text": "Today's smartphones and mobile devices typically embed advanced motion sensors. Due to their increasing market penetration, there is a potential for the development of distributed sensing platforms. In particular, over the last few years there has been an increasing interest in monitoring vehicles and driving data, aiming to identify risky driving maneuvers and to improve driver efficiency. Such a driver profiling system can be useful in fleet management, insurance premium adjustment, fuel consumption optimization or CO2 emission reduction. In this paper, we analyze how smartphone sensors can be used to identify driving maneuvers and propose SenseFleet, a driver profile platform that is able to detect risky driving events independently from the mobile device and vehicle. A fuzzy system is used to compute a score for the different drivers using real-time context information like route topology or weather conditions. To validate our platform, we present an evaluation study considering multiple drivers along a predefined path. The results show that our platform is able to accurately detect risky driving events and provide a representative score for each individual driver.", "title": "" }, { "docid": "ff4cfe56f31e21a8f69164790eb39634", "text": "Active individuals often perform exercises in the heat following heat stress exposure (HSE) regardless of the time-of-day and its variation in body temperature. However, there is no information concerning the diurnal effects of a rise in body temperature after HSE on subsequent exercise performance in a hot environnment. This study therefore investigated the diurnal effects of prior HSE on both sprint and endurance exercise capacity in the heat. Eight male volunteers completed four trials which included sprint and endurance cycling tests at 30 °C and 50% relative humidity. At first, volunteers completed a 30-min pre-exercise routine (30-PR): a seated rest in a temperate environment in AM (AmR) or PM (PmR) (Rest trials); and a warm water immersion at 40 °C to induce a 1 °C increase in core temperature in AM (AmW) or PM (PmW) (HSE trials). Volunteers subsequently commenced exercise at 0800 h in AmR/AmW and at 1700 h in PmR/PmW. The sprint test determined a 10-sec maximal sprint power at 5 kp. Then, the endurance test was conducted to measure time to exhaustion at 60% peak oxygen uptake. Maximal sprint power was similar between trials (p = 0.787). Time to exhaustion in AmW (mean±SD; 15 ± 8 min) was less than AmR (38 ± 16 min; p < 0.01) and PmR (43 ± 24 min; p < 0.01) but similar with PmW (24 ± 9 min). Core temperature was higher from post 30-PR to 6 min into the endurance test in AmW and PmW than AmR and PmR (p < 0.05) and at post 30-PR and the start of the endurance test in PmR than AmR (p < 0.05). The rate of rise in core temperature during the endurance test was greater in AmR than AmW and PmW (p < 0.05). Mean skin temperature was higher from post 30-PR to 6 min into the endurance test in HSE trials than Rest trials (p < 0.05). Mean body temperature was higher from post 30-PR to 6 min into the endurance test in AmW and PmW than AmR and PmR (p < 0.05) and the start to 6 min into the endurance test in PmR than AmR (p < 0.05). Convective, radiant, dry and evaporative heat losses were greater on HSE trials than on Rest trials (p < 0.001). Heart rate and cutaneous vascular conductance were higher at post 30-PR in HSE trials than Rest trials (p < 0.05). Thermal sensation was higher from post 30-PR to the start of the endurance test in AmW and PmW than AmR and PmR (p < 0.05). Perceived exertion from the start to 6 min into the endurance test was higher in HSE trials than Rest trials (p < 0.05). This study demonstrates that an approximately 1 °C increase in core temperature by prior HSE has the diurnal effects on endurance exercise capacity but not on sprint exercise capacity in the heat. Moreover, prior HSE reduces endurance exercise capacity in AM, but not in PM. This reduction is associated with a large difference in pre-exercise core temperature between AM trials which is caused by a relatively lower body temperature in the morning due to the time-of-day variation and contributes to lengthening the attainment of high core temperature during exercise in AmR.", "title": "" }, { "docid": "27136e888c3ebfef4ea7105d68a13ffd", "text": "The huge amount of (potentially) available spectrum makes millimeter wave (mmWave) a promising candidate for fifth generation cellular networks. Unfortunately, differences in the propagation environment as a function of frequency make it hard to make comparisons between systems operating at mmWave and microwave frequencies. This paper presents a simple channel model for evaluating system level performance in mmWave cellular networks. The model uses insights from measurement results that show mmWave is sensitive to blockages revealing very different path loss characteristics between line-of-sight (LOS) and non-line-of-sight (NLOS) links. The conventional path loss model with a single log-distance path loss function and a shadowing term is replaced with a stochastic path loss model with a distance-dependent LOS probability and two different path loss functions to account for LOS and NLOS links. The proposed model is used to compare microwave and mmWave networks in simulations. It is observed that mmWave networks can provide comparable coverage probability with a dense deployment, leading to much higher data rates thanks to the large bandwidth available in the mmWave spectrum.", "title": "" }, { "docid": "1d7d96d37584398359f9b85bc7741578", "text": "BACKGROUND\nTwo types of soft tissue filler that are in common use are those formulated primarily with calcium hydroxylapatite (CaHA) and those with cross-linked hyaluronic acid (cross-linked HA).\n\n\nOBJECTIVE\nTo provide physicians with a scientific rationale for determining which soft tissue fillers are most appropriate for volume replacement.\n\n\nMATERIALS\nSix cross-linked HA soft tissue fillers (Restylane and Perlane from Medicis, Scottsdale, AZ; Restylane SubQ from Q-Med, Uppsala, Sweden; and Juvéderm Ultra, Juvéderm Ultra Plus, and Juvéderm Voluma from Allergan, Pringy, France) and a soft tissue filler consisting of CaHA microspheres in a carrier gel containing carboxymethyl cellulose (Radiesse, BioForm Medical, Inc., San Mateo, CA). METHODS The viscosity and elasticity of each filler gel were quantified according to deformation oscillation measurements conducted using a Thermo Haake RS600 Rheometer (Newington, NH) using a plate and plate geometry with a 1.2-mm gap. All measurements were performed using a 35-mm titanium sensor at 30°C. Oscillation measurements were taken at 5 pascal tau (τ) over a frequency range of 0.1 to 10 Hz (interpolated at 0.7 Hz). Researchers chose the 0.7-Hz frequency because it elicited the most reproducible results and was considered physiologically relevant for stresses that are common to the skin. RESULTS The rheological measurements in this study support the concept that soft tissue fillers that are currently used can be divided into three groups. CONCLUSION Rheological evaluation enables the clinician to objectively classify soft tissue fillers, to select specific filler products based on scientific principles, and to reliably predict how these products will perform--lifting, supporting, and sculpting--after they are appropriately injected.", "title": "" }, { "docid": "31756ac6aaa46df16337dbc270831809", "text": "Broadly speaking, the goal of neuromorphic engineering is to build computer systems that mimic the brain. Spiking Neural Network (SNN) is a type of biologically-inspired neural networks that perform information processing based on discrete-time spikes, different from traditional Artificial Neural Network (ANN). Hardware implementation of SNNs is necessary for achieving high-performance and low-power. We present the Darwin Neural Processing Unit (NPU), a neuromorphic hardware co-processor based on SNN implemented with digitallogic, supporting a maximum of 2048 neurons, 20482 = 4194304 synapses, and 15 possible synaptic delays. The Darwin NPU was fabricated by standard 180 nm CMOS technology with an area size of 5 ×5 mm2 and 70 MHz clock frequency at the worst case. It consumes 0.84 mW/MHz with 1.8 V power supply for typical applications. Two prototype applications are used to demonstrate the performance and efficiency of the hardware implementation. 脉冲神经网络(SNN)是一种基于离散神经脉冲进行信息处理的人工神经网络。本文提出的“达尔文”芯片是一款基于SNN的类脑硬件协处理器。它支持神经网络拓扑结构,神经元与突触各种参数的灵活配置,最多可支持2048个神经元,四百万个神经突触及15个不同的突触延迟。该芯片采用180纳米CMOS工艺制造,面积为5x5平方毫米,最坏工作频率达到70MHz,1.8V供电下典型应用功耗为0.84mW/MHz。基于该芯片实现了两个应用案例,包括手写数字识别和运动想象脑电信号分类。", "title": "" }, { "docid": "357e09114978fc0ac1fb5838b700e6ca", "text": "Instance level video object segmentation is an important technique for video editing and compression. To capture the temporal coherence, in this paper, we develop MaskRNN, a recurrent neural net approach which fuses in each frame the output of two deep nets for each object instance — a binary segmentation net providing a mask and a localization net providing a bounding box. Due to the recurrent component and the localization component, our method is able to take advantage of long-term temporal structures of the video data as well as rejecting outliers. We validate the proposed algorithm on three challenging benchmark datasets, the DAVIS-2016 dataset, the DAVIS-2017 dataset, and the Segtrack v2 dataset, achieving state-of-the-art performance on all of them.", "title": "" }, { "docid": "46980b89e76bc39bf125f63ed9781628", "text": "In this paper, a design of miniaturized 3-way Bagley polygon power divider (BPD) is presented. The design is based on using non-uniform transmission lines (NTLs) in each arm of the divider instead of the conventional uniform ones. For verification purposes, a 3-way BPD is designed, simulated, fabricated, and measured. Besides suppressing the fundamental frequency's odd harmonics, a size reduction of almost 30% is achieved.", "title": "" }, { "docid": "6784e31e2ec313698a622a7e78288f68", "text": "Web-based technology is often the technology of choice for distance education given the ease of use of the tools to browse the resources on the Web, the relative affordability of accessing the ubiquitous Web, and the simplicity of deploying and maintaining resources on the WorldWide Web. Many sophisticated web-based learning environments have been developed and are in use around the world. The same technology is being used for electronic commerce and has become extremely popular. However, while there are clever tools developed to understand on-line customer’s behaviours in order to increase sales and profit, there is very little done to automatically discover access patterns to understand learners’ behaviour on web-based distance learning. Educators, using on-line learning environments and tools, have very little support to evaluate learners’ activities and discriminate between different learners’ on-line behaviours. In this paper, we discuss some data mining and machine learning techniques that could be used to enhance web-based learning environments for the educator to better evaluate the leaning process, as well as for the learners to help them in their learning endeavour.", "title": "" }, { "docid": "3b9b49f8c2773497f8e05bff4a594207", "text": "SSD (Single Shot Detector) is one of the state-of-the-art object detection algorithms, and it combines high detection accuracy with real-time speed. However, it is widely recognized that SSD is less accurate in detecting small objects compared to large objects, because it ignores the context from outside the proposal boxes. In this paper, we present CSSD–a shorthand for context-aware single-shot multibox object detector. CSSD is built on top of SSD, with additional layers modeling multi-scale contexts. We describe two variants of CSSD, which differ in their context layers, using dilated convolution layers (DiCSSD) and deconvolution layers (DeCSSD) respectively. The experimental results show that the multi-scale context modeling significantly improves the detection accuracy. In addition, we study the relationship between effective receptive fields (ERFs) and the theoretical receptive fields (TRFs), particularly on a VGGNet. The empirical results further strengthen our conclusion that SSD coupled with context layers achieves better detection results especially for small objects (+3.2%AP@0.5 on MSCOCO compared to the newest SSD), while maintaining comparable runtime performance.", "title": "" }, { "docid": "fe3a2ef6ffc3e667f73b19f01c14d15a", "text": "The study of socio-technical systems has been revolutionized by the unprecedented amount of digital records that are constantly being produced by human activities such as accessing Internet services, using mobile devices, and consuming energy and knowledge. In this paper, we describe the richest open multi-source dataset ever released on two geographical areas. The dataset is composed of telecommunications, weather, news, social networks and electricity data from the city of Milan and the Province of Trentino. The unique multi-source composition of the dataset makes it an ideal testbed for methodologies and approaches aimed at tackling a wide range of problems including energy consumption, mobility planning, tourist and migrant flows, urban structures and interactions, event detection, urban well-being and many others.", "title": "" } ]
scidocsrr
584a295353653bc5ebdc6639c1b72f70
Open Problems in Universal Induction & Intelligence
[ { "docid": "4545a74d04769f6b251da9da7b357d09", "text": "Despite a long history of research and debate, there is still no standard definition of intelligence. This has lead some to believe that intelligence may be approximately described, but cannot be fully defined. We believe that this degree of pessimism is too strong. Although there is no single standard definition, if one surveys the many definitions that have been proposed, strong similarities between many of the definitions quickly become obvious. In many cases different definitions, suitably interpreted, actually say the same thing but in different words. This observation lead us to believe that a single general and encompassing definition for arbitrary systems was possible. Indeed we have constructed a formal definition of intelligence, called universal intelligence [21], which has strong connections to the theory of optimal learning agents [19]. Rather than exploring very general formal definitions of intelligence, here we will instead take the opportunity to present the many informal definitions that we have collected over the years. Naturally, compiling a complete list would be impossible as many definitions of intelligence are buried deep inside articles and books. Nevertheless, the 70 odd definitions presented below are, to the best of our knowledge, the largest and most well referenced collection there is. We continue to add to this collect as we discover further definitions, and keep the most up to date version of the collection available online [22]. If you know of additional definitions that we could add, please send us an email.", "title": "" } ]
[ { "docid": "27cc510f79a4ed76da42046b49bbb9fd", "text": "This article reports the orthodontic treatment ofa 25-year-old female patient whose chief complaint was the inclination of the maxillary occlusal plane in front view. The individualized vertical placement of brackets is described. This placement made possible a symmetrical occlusal plane to be achieved in a rather straightforward manner without the need for further technical resources.", "title": "" }, { "docid": "525a819d97e84862d4190b1e0aa4acc0", "text": "HELIOS2014 is a 2D soccer simulation team which has been participating in the RoboCup competition since 2000. We recently focus on an online multiagent planning using tree search methodology. This paper describes the overview of our search framework and an evaluation method to select the best action sequence.", "title": "" }, { "docid": "1466bdb9a7f5662c8a15de9009bc7687", "text": "Mining opinions and analyzing sentiments from social network data help in various fields such as even prediction, analyzing overall mood of public on a particular social issue and so on. This paper involves analyzing the mood of the society on a particular news from Twitter posts. The key idea of the paper is to increase the accuracy of classification by including Natural Language Processing Techniques (NLP) especially semantics and Word Sense Disambiguation. The mined text information is subjected to Ensemble classification to analyze the sentiment. Ensemble classification involves combining the effect of various independent classifiers on a particular classification problem. Experiments conducted demonstrate that ensemble classifier outperforms traditional machine learning classifiers by 3-5%.", "title": "" }, { "docid": "f18dc5d572f60da7c85d50e6a42de2c9", "text": "Recent developments in remote sensing are offering a promising opportunity to rethink conventional control strategies of wind turbines. With technologies such as LIDAR, the information about the incoming wind field - the main disturbance to the system - can be made available ahead of time. Feedforward control can be easily combined with traditional collective pitch feedback controllers and has been successfully tested on real systems. Nonlinear model predictive controllers adjusting both collective pitch and generator torque can further reduce structural loads in simulations but have higher computational times compared to feedforward or linear model predictive controller. This paper compares a linear and a commercial nonlinear model predictive controller to a baseline controller. On the one hand simulations show that both controller have significant improvements if used along with the preview of the rotor effective wind speed. On the other hand the nonlinear model predictive controller can achieve better results compared to the linear model close to the rated wind speed.", "title": "" }, { "docid": "90a9e56cc5a2f9c149dfb33d3446f095", "text": "The author explores the viability of a comparative approach to personality research. A review of the diverse animal-personality literature suggests that (a) most research uses trait constructs, focuses on variation within (vs. across) species, and uses either behavioral codings or trait ratings; (b) ratings are generally reliable and show some validity (7 parameters that could influence reliability and 4 challenges to validation are discussed); and (c) some dimensions emerge across species, but summaries are hindered by a lack of standard descriptors. Arguments for and against cross-species comparisons are discussed, and research guidelines are suggested. Finally, a research agenda guided by evolutionary and ecological principles is proposed. It is concluded that animal studies provide unique opportunities to examine biological, genetic, and environmental bases of personality and to study personality change, personality-health links, and personality perception.", "title": "" }, { "docid": "a1f79badfd7c33b0f6348b58c449b155", "text": "Athlete identification is important for sport video content analysis since users often care about the video clips with their preferred athletes. In this paper, we propose a method for athlete identification by combing the segmentation, tracking and recognition procedures into a coarse-to-fine scheme for jersey number (digital characters on sport shirt) detection. Firstly, image segmentation is employed to separate the jersey number regions with its background. And size/pipe-like attributes of digital characters are used to filter out candidates. Then, a K-NN (K nearest neighbor) classifier is employed to classify a candidate into a digit in “0-9” or negative. In the recognition procedure, we use the Zernike moment features, which are invariant to rotation and scale for digital shape recognition. Synthetic training samples with different fonts are used to represent the pattern of digital characters with non-rigid deformation. Once a character candidate is detected, a SSD (smallest square distance)-based tracking procedure is started. The recognition procedure is performed every several frames in the tracking process. After tracking tens of frames, the overall recognition results are combined to determine if a candidate is a true jersey number or not by a voting procedure. Experiments on several types of sports video shows encouraging result.", "title": "" }, { "docid": "78041edf455a96c60d1ceea68c857785", "text": "Sequence-to-sequence models provide a simple and elegant solution for building speech recognition systems by folding separate components of a typical system, namely acoustic (AM), pronunciation (PM) and language (LM) models into a single neural network. In this work, we look at one such sequence-to-sequence model, namely listen, attend and spell (LAS) [1], and explore the possibility of training a single model to serve different English dialects, which simplifies the process of training multi-dialect systems without the need for separate AM, PM and LMs for each dialect. We show that simply pooling the data from all dialects into one LAS model falls behind the performance of a model fine-tuned on each dialect. We then look at incorporating dialect-specific information into the model, both by modifying the training targets by inserting the dialect symbol at the end of the original grapheme sequence and also feeding a 1-hot representation of the dialect information into all layers of the model. Experimental results on seven English dialects show that our proposed system is effective in modeling dialect variations within a single LAS model, outperforming a LAS model trained individually on each of the seven dialects by 3.1~16.5% relative.", "title": "" }, { "docid": "24902498d03f15aa63110e8cd4ee8a83", "text": "Precision robotic pollination systems can not only fill the gap of declining natural pollinators, but can also surpass them in efficiency and uniformity, helping to feed the fast-growing human population on Earth. This paper presents the design and ongoing development of an autonomous robot named “BrambleBee”, which aims at pollinating bramble plants in a greenhouse environment. Partially inspired by the ecology and behavior of bees, BrambleBee employs state-of-the-art localization and mapping, visual perception, path planning, motion control, and manipulation techniques to create an efficient and robust autonomous pollination system.", "title": "" }, { "docid": "225b834e820b616e0ccfed7259499fd6", "text": "Introduction: Actinic cheilitis (AC) is a lesion potentially malignant that affects the lips after prolonged exposure to solar ultraviolet (UV) radiation. The present study aimed to assess and describe the proliferative cell activity, using silver-stained nucleolar organizer region (AgNOR) quantification proteins, and to investigate the potential associations between AgNORs and the clinical aspects of AC lesions. Materials and methods: Cases diagnosed with AC were selected and reviewed from Center of Histopathological Diagnosis of the Institute of Biological Sciences, Passo Fundo University, Brazil. Clinical data including clinical presentation of the patients affected with AC were collected. The AgNOR techniques were performed in all recovered cases. The different microscopic areas of interest were printed with magnification of *1000, and in each case, 200 epithelial cell nuclei were randomly selected. The mean quantity in each nucleus for NORs was recorded. One-way analysis of variance was used for statistical analysis. Results: A total of 22 cases of AC were diagnosed. The patients were aged between 46 and 75 years (mean age: 55 years). Most of the patients affected were males presenting asymptomatic white plaque lesions in the lower lip. The mean value quantified for AgNORs was 2.4 ± 0.63, ranging between 1.49 and 3.82. No statistically significant difference was observed associating the quantity of AgNORs with the clinical aspects collected from the patients (p > 0.05). Conclusion: The present study reports the lack of association between the proliferative cell activity and the clinical aspects observed in patients affected by AC through the quantification of AgNORs. Clinical significance: Knowing the potential relation between the clinical aspects of AC and the proliferative cell activity quantified by AgNORs could play a significant role toward the early diagnosis of malignant lesions in the clinical practice. Keywords: Actinic cheilitis, Proliferative cell activity, Silver-stained nucleolar organizer regions.", "title": "" }, { "docid": "3cf60753c37f2520188b26e67e243b6c", "text": "The growing dependence of critical infrastructures and industrial automation on interconnected physical and cyber-based control systems has resulted in a growing and previously unforeseen cyber security threat to supervisory control and data acquisition (SCADA) and distributed control systems (DCSs). It is critical that engineers and managers understand these issues and know how to locate the information they need. This paper provides a broad overview of cyber security and risk assessment for SCADA and DCS, introduces the main industry organizations and government groups working in this area, and gives a comprehensive review of the literature to date. Major concepts related to the risk assessment methods are introduced with references cited for more detail. Included are risk assessment methods such as HHM, IIM, and RFRM which have been applied successfully to SCADA systems with many interdependencies and have highlighted the need for quantifiable metrics. Presented in broad terms is probability risk analysis (PRA) which includes methods such as FTA, ETA, and FEMA. The paper concludes with a general discussion of two recent methods (one based on compromise graphs and one on augmented vulnerability trees) that quantitatively determine the probability of an attack, the impact of the attack, and the reduction in risk associated with a particular countermeasure.", "title": "" }, { "docid": "2d0121e8509d09571d8973da784440a5", "text": "In this paper we examine the suitability of BPMN for business process modelling, using the Workflow Patterns as an evaluation framework. The Workflow Patterns are a collection of patterns developed for assessing control-flow, data and resource capabilities in the area of Process Aware Information Systems (PAIS). In doing so, we provide a comprehensive evaluation of the capabilities of BPMN, and its strengths and weaknesses when utilised for business process modelling. The analysis provided for BPMN is part of a larger effort aiming at an unbiased and vendor-independent survey of the suitability and the expressive power of some mainstream process modelling languages. It is a sequel to an analysis series where languages like BPEL and UML 2.0 A.D are evaluated.", "title": "" }, { "docid": "294ac617bbd49afe95c278836fa4c9ec", "text": "We present a practical lock-free shared data structure that efficiently implements the operations of a concurrent deque as well as a general doubly linked list. The implementation supports parallelism for disjoint accesses and uses atomic primitives which are available in modern computer systems. Previously known lock-free algorithms of doubly linked lists are either based on non-available atomic synchronization primitives, only implement a subset of the functionality, or are not designed for disjoint accesses. Our algorithm only requires single-word compare-and-swap atomic primitives, supports fully dynamic list sizes, and allows traversal also through deleted nodes and thus avoids unnecessary operation retries. We have performed an empirical study of our new algorithm on two different multiprocessor platforms. Results of the experiments performed under high contention show that the performance of our implementation scales linearly with increasing number of processors. Considering deque implementations and systems with low concurrency, the algorithm by Michael shows the best performance. However, as our algorithm is designed for disjoint accesses, it performs significantly better on systems with high concurrency and non-uniform memory architecture. © 2008 Elsevier Inc. All rights reserved.", "title": "" }, { "docid": "b55d2448633f70da4830565268a2b590", "text": "This paper proposes an online tree-based Bayesian approach for reinforcement learning. For inference, we employ a generalised context tree model. This defines a distribution on multivariate Gaussian piecewise-linear models, which can be updated in closed form. The tree structure itself is constructed using the cover tree method, which remains efficient in high dimensional spaces. We combine the model with Thompson sampling and approximate dynamic programming to obtain effective exploration policies in unknown environments. The flexibility and computational simplicity of the model render it suitable for many reinforcement learning problems in continuous state spaces. We demonstrate this in an experimental comparison with a Gaussian process model, a linear model and simple least squares policy iteration.", "title": "" }, { "docid": "c00665e950eadf8cd9b707ac82a3f818", "text": "We propose the deep hierarchical network (DHN) for the quantitative analysis of facial palsy. Facial palsy, also known as Bell’s palsy, is the most common type of facial nerve palsy that results in the loss of muscle control in the affected facial regions. Typical symptoms include facial deformity and facial expression dysfunction. To the best of our best knowledge, all approaches for the automatic detection of facial palsy consider hand-crafted features. This paper reports the first deep-learning-based approach developed for the real-time quantitative analysis of facial palsy. The proposed DHN consists of three component networks: the first detects the subject’s face, the second detects the facial landmarks and line segments on the detected face, and the third detects the local palsy regions. The first component network is built on the YOLO2 detector. The second component network is developed on a fused network architecture that incorporates a line segment learning network for locating the facial landmarks and line segments. The third component network is developed on an object detection network with the line-segment-embedded input that combines the landmarked region and the line segments detected by the second component network. The novelties of this research include: 1) the modification of a state-of-the-art edge detector for extracting the facial line segments; 2) the embedding of the line segment learning for the detection of facial landmarks and local palsy regions; 3) the quantitative description of the facial palsy syndrome intensity; and 4) the release of the first clinically labeled database, the YouTube Facial Palsy (YFP) database. The making of the YFP database solves the issue that previous methods were all evaluated on proprietary databases, making the comparison of different methods extremely difficult. The YFP database includes 32 videos of 21 patients collected from YouTube and labeled by clinic specialists. To enhance the robustness against facial expression variations, we include the CK+ facial expression database in the training. We show that the proposed DHN not only just detects the local palsy regions but also captures the intensity of the facial palsy syndrome over time, enabling the quantitative description of the syndrome. The experiments show that the proposed approach offers an accurate and efficient real-time solution for facial palsy analysis.", "title": "" }, { "docid": "545c43532852acbb4adb48fedcca7ccc", "text": "Spin-Torque Transfer Magnetic RAM (STT MRAM) is a promising candidate for future universal memory. It combines the desirable attributes of current memory technologies such as SRAM, DRAM and flash memories. It also solves the key drawbacks of conventional MRAM technology: poor scalability and high write current. In this paper, we analyzed and modeled the failure probabilities of STT MRAM cells due to parameter variations. Based on the model, we developed an efficient simulation tool to capture the coupled electro/magnetic dynamics of spintronic device, leading to effective prediction for memory yield. We also developed a statistical optimization methodology to minimize the memory failure probability. The proposed methodology can be used at an early stage of the design cycle to enhance memory yield.", "title": "" }, { "docid": "18c30c601e5f52d5117c04c85f95105b", "text": "Crohn's disease is a relapsing systemic inflammatory disease, mainly affecting the gastrointestinal tract with extraintestinal manifestations and associated immune disorders. Genome wide association studies identified susceptibility loci that--triggered by environmental factors--result in a disturbed innate (ie, disturbed intestinal barrier, Paneth cell dysfunction, endoplasmic reticulum stress, defective unfolded protein response and autophagy, impaired recognition of microbes by pattern recognition receptors, such as nucleotide binding domain and Toll like receptors on dendritic cells and macrophages) and adaptive (ie, imbalance of effector and regulatory T cells and cytokines, migration and retention of leukocytes) immune response towards a diminished diversity of commensal microbiota. We discuss the epidemiology, immunobiology, amd natural history of Crohn's disease; describe new treatment goals and risk stratification of patients; and provide an evidence based rational approach to diagnosis (ie, work-up algorithm, new imaging methods [ie, enhanced endoscopy, ultrasound, MRI and CT] and biomarkers), management, evolving therapeutic targets (ie, integrins, chemokine receptors, cell-based and stem-cell-based therapies), prevention, and surveillance.", "title": "" }, { "docid": "f9fbbbebde6feede5cc34afb60f854cd", "text": "Software has bugs, and fixing those bugs pervades the software engineering process. It is folklore that bug fixes are often buggy themselves, resulting in bad fixes, either failing to fix a bug or creating new bugs. To confirm this folklore, we explored bug databases of the Ant, AspectJ, and Rhino projects, and found that bad fixes comprise as much as 9% of all bugs. Thus, detecting and correcting bad fixes is important for improving the quality and reliability of software. However, no prior work has systematically considered this bad fix problem, which this paper introduces and formalizes. In particular, the paper formalizes two criteria to determine whether a fix resolves a bug: coverage and disruption. The coverage of a fix measures the extent to which the fix correctly handles all inputs that may trigger a bug, while disruption measures the deviations from the program's intended behavior after the application of a fix. This paper also introduces a novel notion of distance-bounded weakest precondition as the basis for the developed practical techniques to compute the coverage and disruption of a fix.\n To validate our approach, we implemented Fixation, a prototype that automatically detects bad fixes for Java programs. When it detects a bad fix, Fixation returns an input that still triggers the bug or reports a newly introduced bug. Programmers can then use that bug-triggering input to refine or reformulate their fix. We manually extracted fixes drawn from real-world projects and evaluated Fixation against them: Fixation successfully detected the extracted bad fixes.", "title": "" }, { "docid": "59bbad311162d1bd8b145554c3861e53", "text": "Satellite images are used in many applications like military, forecasting, astronomy, and geographical information. Satellite images have to face spatial and spectral resolution problems due to scattering, atmospheric conditions, etc. , also they have poor perception. This limitation of resolution needs to be overcome before further processing. The goal of image resolution enhancement is to improve specific features of an image for its correct representation. Better resolution is obtained by applying enhancement techniques on blurred and noisy images. In this paper various image enhancement techniques under wavelet domain like WZP, DWT, and DT-CWT are discussed. This paper also gives selection of suitable enhancement technique", "title": "" }, { "docid": "7bd4691f1995bbe6bd1591191b0f4f87", "text": "In this paper, we present a system developed for content-based broadcasted news video browsing for home users. There are three main factors that distinguish our work from other similar ones. First, we have integrated the image and audio analysis results in identifying news segments. Second, we use the video OCR technology to detect text from frames, which provides a good source of textual information for story classification when transcripts and close captions are not available. Finally, natural language processing (NLP) technologies are used to perform automated categorization of news stories based on the texts obtained from close caption or video OCR process. Based on these video structure and content analysis technologies, we have developed two advanced video browsers for home users: intelligent highlight player and HTML-based video browser.", "title": "" } ]
scidocsrr
456efc967f72ee4ee38118d7573ee762
Concolic Execution on Small-Size Binaries: Challenges and Empirical Study
[ { "docid": "70c0c2d5209d6cd7b0bae3378d8e400b", "text": "The automatic exploit generation challenge is given a program, automatically find vulnerabilities and generate exploits for them. In this paper we present AEG, the first end-to-end system for fully automatic exploit generation. We used AEG to analyze 14 open-source projects and successfully generated 16 control flow hijacking exploits. Two of the generated exploits (expect-5.43 and htget-0.93) are zero-day exploits against unknown vulnerabilities. Our contributions are: 1) we show how exploit generation for control flow hijack attacks can be modeled as a formal verification problem, 2) we propose preconditioned symbolic execution, a novel technique for targeting symbolic execution, 3) we present a general approach for generating working exploits once a bug is found, and 4) we build the first end-to-end system that automatically finds vulnerabilities and generates exploits that produce a shell.", "title": "" }, { "docid": "cc7033023e1c5a902dfa10c8346565c4", "text": "Satisfiability Modulo Theories (SMT) problem is a decision problem for logical first order formulas with respect to combinations of background theories such as: arithmetic, bit-vectors, arrays, and uninterpreted functions. Z3 is a new and efficient SMT Solver freely available from Microsoft Research. It is used in various software verification and analysis applications.", "title": "" }, { "docid": "c62bc7391e55d66c9e27befe81446ebe", "text": "Opaque predicates have been widely used to insert superfluous branches for control flow obfuscation. Opaque predicates can be seamlessly applied together with other obfuscation methods such as junk code to turn reverse engineering attempts into arduous work. Previous efforts in detecting opaque predicates are far from mature. They are either ad hoc, designed for a specific problem, or have a considerably high error rate. This paper introduces LOOP, a Logic Oriented Opaque Predicate detection tool for obfuscated binary code. Being different from previous work, we do not rely on any heuristics; instead we construct general logical formulas, which represent the intrinsic characteristics of opaque predicates, by symbolic execution along a trace. We then solve these formulas with a constraint solver. The result accurately answers whether the predicate under examination is opaque or not. In addition, LOOP is obfuscation resilient and able to detect previously unknown opaque predicates. We have developed a prototype of LOOP and evaluated it with a range of common utilities and obfuscated malicious programs. Our experimental results demonstrate the efficacy and generality of LOOP. By integrating LOOP with code normalization for matching metamorphic malware variants, we show that LOOP is an appealing complement to existing malware defenses.", "title": "" } ]
[ { "docid": "53fca78f9ecbfe0a88eb1df8596976e1", "text": "As there has been an explosive increase in wireless data traffic, mmw communication has become one of the most attractive techniques in the 5G mobile communications systems. Although mmw communication systems have been successfully applied to indoor scenarios, various external factors in an outdoor environment limit the applications of mobile communication systems working at the mmw bands. In this article, we discuss the issues involved in the design of antenna array architecture for future 5G mmw systems, in which the antenna elements can be deployed in the shapes of a cross, circle, or hexagon, in addition to the conventional rectangle. The simulation results indicate that while there always exists a non-trivial gain fluctuation in other regular antenna arrays, the circular antenna array has a flat gain in the main lobe of the radiation pattern with varying angles. This makes the circular antenna array more robust to angle variations that frequently occur due to antenna vibration in an outdoor environment. In addition, in order to guarantee effective coverage of mmw communication systems, possible solutions such as distributed antenna systems and cooperative multi-hop relaying are discussed, together with the design of mmw antenna arrays. Furthermore, other challenges for the implementation of mmw cellular networks, for example, blockage, communication security, hardware development, and so on, are discussed, as are potential solutions.", "title": "" }, { "docid": "07c2edb27aa6ac918d6ad681af82e34d", "text": "This paper presents a cooperative perception system for multiple heterogeneous UAVs. It considers different kind of sensors: infrared and visual cameras and fire detectors. The system is based on a set of multipurpose low-level image-processing functions including segmentation, stabilization of sequences of images and geo-referencing, and it also involves data fusion algorithms for cooperative perception. It has been tested in field experiments that pursued autonomous multi-UAV cooperative detection, monitoring and measurement of forest fires. This paper presents the overall architecture of the perception system, describes some of the implemented cooperative perception techniques and shows experimental results on automatic forest fire detection and localization with cooperating UAVs.", "title": "" }, { "docid": "237b178f5f6640e6d3f14956760355c1", "text": "Automatic music transcription is considered by many to be the Holy Grail in the field of music signal analysis. However, the performance of transcription systems is still significantly below that of a human expert, and accuracies reported in recent years seem to have reached a limit, although the field is still very active. In this paper we analyse limitations of current methods and identify promising directions for future research. Current transcription methods use general purpose models which are unable to capture the rich diversity found in music signals. In order to overcome the limited performance of transcription systems, algorithms have to be tailored to specific use-cases. Semiautomatic approaches are another way of achieving a more reliable transcription. Also, the wealth of musical scores and corresponding audio data now available are a rich potential source of training data, via forced alignment of audio to scores, but large scale utilisation of such data has yet to be attempted. Other promising approaches include the integration of information across different methods and musical aspects.", "title": "" }, { "docid": "04d7b3e3584d89d5a3bc5c22c3fd1438", "text": "With the widespread use of information technologies, information networks are becoming increasingly popular to capture complex relationships across various disciplines, such as social networks, citation networks, telecommunication networks, and biological networks. Analyzing these networks sheds light on different aspects of social life such as the structure of societies, information diffusion, and communication patterns. In reality, however, the large scale of information networks often makes network analytic tasks computationally expensive or intractable. Network representation learning has been recently proposed as a new learning paradigm to embed network vertices into a low-dimensional vector space, by preserving network topology structure, vertex content, and other side information. This facilitates the original network to be easily handled in the new vector space for further analysis. In this survey, we perform a comprehensive review of the current literature on network representation learning in the data mining and machine learning field. We propose new taxonomies to categorize and summarize the state-of-the-art network representation learning techniques according to the underlying learning mechanisms, the network information intended to preserve, as well as the algorithmic designs and methodologies. We summarize evaluation protocols used for validating network representation learning including published benchmark datasets, evaluation methods, and open source algorithms. We also perform empirical studies to compare the performance of representative algorithms on common datasets, and analyze their computational complexity. Finally, we suggest promising research directions to facilitate future study.", "title": "" }, { "docid": "cd23b0dfd98fb42513229070035e0aa9", "text": "Sixteen residents in long-term care with advanced dementia (14 women; average age = 88) showed significantly more constructive engagement (defined as motor or verbal behaviors in response to an activity), less passive engagement (defined as passively observing an activity), and more pleasure while participating in Montessori-based programming than in regularly scheduled activities programming. Principles of Montessori-based programming, along with examples of such programming, are presented. Implications of the study and methods for expanding the use of Montessori-based dementia programming are discussed.", "title": "" }, { "docid": "d90d40a59f91b59bd63a3c52a8d715a4", "text": "The paradigm shift from planar (two dimensional (2D)) to vertical (three-dimensional (3D)) models has placed the NAND flash technology on the verge of a design evolution that can handle the demands of next-generation storage applications. However, it also introduces challenges that may obstruct the realization of such 3D NAND flash. Specifically, we observed that the fast threshold drift (fast-drift) in a charge-trap flash-based 3D NAND cell can make it lose a critical fraction of the stored charge relatively soon after programming and generate errors.\n In this work, we first present an elastic read reference (VRef) scheme (ERR) for reducing such errors in ReveNAND—our fast-drift aware 3D NAND design. To address the inherent limitation of the adaptive VRef, we introduce a new intra-block page organization (hitch-hike) that can enable stronger error correction for the error-prone pages. In addition, we propose a novel reinforcement-learning-based smart data refill scheme (iRefill) to counter the impact of fast-drift with minimum performance and hardware overhead. Finally, we present the first analytic model to characterize fast-drift and evaluate its system-level impact. Our results show that, compared to conventional 3D NAND design, our ReveNAND can reduce fast-drift errors by 87%, on average, and can lower the ECC latency and energy overheads by 13× and 10×, respectively.", "title": "" }, { "docid": "11399ccfc503e9f43402896e5871a4d8", "text": "This work investigated using n-grams, parts-ofspeech and support vector machines for detecting the customer intents in the user generated contents. The work demonstrated a system of categorization of customer intents that is concise and useful for business purposes. We examined possible sources of text posts to be analyzed using three text mining algorithms. We presented the three algorithms and the results of testing them in detecting different six intents. This work established that intent detection can be performed on text posts with approximately 61% accuracy. Keywords—Intent detection; text mining; support vector machines; N-grams; parts of speech", "title": "" }, { "docid": "99f57f28f8c262d4234d07deb9dcf49d", "text": "Historically, conversational systems have focused on goal-directed interaction and this focus defined much of the work in the field of spoken dialog systems. More recently researchers have started to focus on nongoal-oriented dialog systems often referred to as ”chat” systems. We can refer to these as Chat-oriented Dialog (CHAD)systems. CHAD systems are not task-oriented and focus on what can be described as social conversation where the goal is to interact while maintaining an appropriate level of engagement with a human interlocutor. Work to date has identified a number of techniques that can be used to implement working CHADs but it has also highlighted important limitations. This note describes CHAD characteristics and proposes a research agenda.", "title": "" }, { "docid": "e8eaeb8a2bb6fa71997aa97306bf1bb0", "text": "Article history: Available online 18 February 2016", "title": "" }, { "docid": "ddb77ec8a722c50c28059d03919fb299", "text": "Among the smart cities applications, optimizing lottery games is one of the urgent needs to ensure their fairness and transparency. The emerging blockchain technology shows a glimpse of solutions to fairness and transparency issues faced by lottery industries. This paper presents the design of a blockchain-based lottery system for smart cities applications. We adopt the smart contracts of blockchain technology and the cryptograph blockchain model, Hawk [8], to design the blockchain-based lottery system, FairLotto, for future smart cities applications. Fairness, transparency, and privacy of the proposed blockchain-based lottery system are discussed and ensured.", "title": "" }, { "docid": "83c184b9a9b533835c74bbe844f54a70", "text": "This work addresses issues related to the design and implementation of focused crawlers. Several variants of state-of-the-art crawlers relying on web page content and link information for estimating the relevance of web pages to a given topic are proposed. Particular emphasis is given to crawlers capable of learning not only the content of relevant pages (as classic crawlers do) but also paths leading to relevant pages. A novel learning crawler inspired by a previously proposed Hidden Markov Model (HMM) crawler is described as well. The crawlers have been implemented using the same baseline implementation (only the priority assignment function differs in each crawler) providing an unbiased evaluation framework for a comparative analysis of their performance. All crawlers achieve their maximum performance when a combination of web page content and (link) anchor text is used for assigning download priorities to web pages. Furthermore, the new HMM crawler improved the performance of the original HMM crawler and also outperforms classic focused crawlers in searching for specialized topics.", "title": "" }, { "docid": "ca509048385b8cf28bd7b89c685f21b2", "text": "Recent studies on knowledge base completion, the task of recovering missing relationships based on recorded relations, demonstrate the importance of learning embeddings from multi-step relations. However, due to the size of knowledge bases, learning multi-step relations directly on top of observed instances could be costly. In this paper, we propose Implicit ReasoNets (IRNs), which is designed to perform large-scale inference implicitly through a search controller and shared memory. Unlike previous work, IRNs use training data to learn to perform multi-step inference through the shared memory, which is also jointly updated during training. While the inference procedure is not operating on top of observed instances for IRNs, our proposed model outperforms all previous approaches on the popular FB15k benchmark by more than 5.7%.", "title": "" }, { "docid": "5010761051983f5de1f18a11d477f185", "text": "Financial forecasting has been challenging problem due to its high non-linearity and high volatility. An Artificial Neural Network (ANN) can model flexible linear or non-linear relationship among variables. ANN can be configured to produce desired set of output based on set of given input. In this paper we attempt at analyzing the usefulness of artificial neural network for forecasting financial data series with use of different algorithms such as backpropagation, radial basis function etc. With their ability of adapting non-linear and chaotic patterns, ANN is the current technique being used which offers the ability of predicting financial data more accurately. \"A x-y-1 network topology is adopted because of x input variables in which variable y was determined by the number of hidden neurons during network selection with single output.\" Both x and y were changed.", "title": "" }, { "docid": "afdb022bd163c1d5af226dc9624c1aee", "text": "Sapienza University of Rome, Italy 1.", "title": "" }, { "docid": "4a677dae1152d5d69369ac76590f52f3", "text": "This paper presents a digital implementation of power control for induction cooking appliances with domestic low-cost vessels. The proposed control strategy is based on the asymmetrical duty-cycle with automatic switching-frequency tracking control employing a digital phase locked-loop (DPLL) control on high performance microcontroller. With the use of a phase locked-loop control, this method ensures the zero voltage switching (ZVS) operation under load parameter variation and power control at any power levels. Experimental results have shown that the proposed control method can reach the minimum output power at 15% of the rated value.", "title": "" }, { "docid": "a64f1bb761ac8ee302a278df03eecaa8", "text": "We analyze StirTrace towards benchmarking face morphing forgeries and extending it by additional scaling functions for the face biometrics scenario. We benchmark a Benford's law based multi-compression-anomaly detection approach and acceptance rates of morphs for a face matcher to determine the impact of the processing on the quality of the forgeries. We use 2 different approaches for automatically creating 3940 images of morphed faces. Based on this data set, 86614 images are created using StirTrace. A manual selection of 183 high quality morphs is used to derive tendencies based on the subjective forgery quality. Our results show that the anomaly detection seems to be able to detect anomalies in the morphing regions, the multi-compression-anomaly detection performance after the processing can be differentiated into good (e.g. cropping), partially critical (e.g. rotation) and critical results (e.g. additive noise). The influence of the processing on the biometric matcher is marginal.", "title": "" }, { "docid": "a3f06bfcc2034483cac3ee200803878c", "text": "This paper presents a technique for motion detection that incorporates several innovative mechanisms. For example, our proposed technique stores, for each pixel, a set of values taken in the past at the same location or in the neighborhood. It then compares this set to the current pixel value in order to determine whether that pixel belongs to the background, and adapts the model by choosing randomly which values to substitute from the background model. This approach differs from those based upon the classical belief that the oldest values should be replaced first. Finally, when the pixel is found to be part of the background, its value is propagated into the background model of a neighboring pixel. We describe our method in full details (including pseudo-code and the parameter values used) and compare it to other background subtraction techniques. Efficiency figures show that our method outperforms recent and proven state-of-the-art methods in terms of both computation speed and detection rate. We also analyze the performance of a downscaled version of our algorithm to the absolute minimum of one comparison and one byte of memory per pixel. It appears that even such a simplified version of our algorithm performs better than mainstream techniques.", "title": "" }, { "docid": "04e9ecf5ad4d5282f2b0f5ded36ca00c", "text": "There are several billion network-oriented devices in use today that are facilitated to inter-communicate; thereby forming a giant neural-like architecture known as the Internet-of-Things (IoT). The benefits of the IoT cut across all spectrums of our individual lives, corporate culture, and societal co-existence. This is because IoT devices support health tracking, security monitoring, consumer tracking, forecasting, and so on. However, the huge interconnectedness in IoT architectures complicates traceability and faulty data propagation is not easily detected since there are challenges with data origin authentication. Thus, this research proposes a provenance technique to deal with these issues. The technique is based on associative rules and lexical chaining methodologies, which enable traceability through the identification of propagation routes of data and object-to-object communications. Through visualization tools, the proposed methodologies also enabled us to determine linkability and unlinkability between IoT devices in a network which further leads to mechanisms to check correctness in sensor data propagation.", "title": "" }, { "docid": "66acaa4909502a8d7213366e0667c3c2", "text": "Facial rejuvenation, particularly lip augmentation, has gained widespread popularity. An appreciation of perioral anatomy as well as the structural characteristics that define the aging face is critical to achieve optimal patient outcomes. Although techniques and technology evolve continuously, hyaluronic acid (HA) dermal fillers continue to dominate aesthetic practice. A combination approach including neurotoxin and volume restoration demonstrates superior results in select settings.", "title": "" }, { "docid": "bccbfd27cad96c0e859bb8951b898dd7", "text": "Hassler Hallstedt, M. 2018. Closing the Gap. How an Adaptive Behavioral Based Program on a Tablet Can Help Low Performing Children Catch Up in Math: a Randomized Placebo Controlled Study. Digital Comprehensive Summaries of Uppsala Dissertations from the Faculty of Social Sciences 150. 88 pp. Uppsala: Acta Universitatis Upsaliensis. ISBN 978-91-513-0200-3. Early mathematic skills have a substantial impact on later school achievement. Children with poor school achievement are at risk for adverse consequences later in life. Math competencies also have consequences for the economy at large because societies are becoming increasingly dependent on skill sets including mathematics. Proficiency with basic arithmetic, also known as math fact (i.e., 3+8, 12-3), is considered to be a critical early math skill. Intervention research in mathematics have demonstrated that math fact deficits among students with low math performance can be improved with additional targeted, nontechnological interventions (i.e., small-group tutoring). The aim of the present thesis was to investigate the effect, using a randomized placebo controlled design, of addititional adaptive, behavioral based, math training on a tablet on low performing second graders. The first study (study I), investigated if arithmetic skills could be assessed in a reliable and valid way on tablet. The examination showed that arithmetic scales could be transferred from paper-based tests to tablet with comparable psychometric properties, although not for a pictorial scale, and that separate norms are needed for tablet. Study II demonstrated that training on a tablet, for on average 19 hours across 20 weeks, improved basic arithmetic skills after training in the math conditions compared to control/ placebo conditions. The effects were medium sized at post assessment. There was a fadeout of effects at 6 months follow-up, where small effects were shown, and the effects decreased further at 12 months follow-up. Children with lower non-verbal IQ seemed to gain significantly more at followups than children with higher non-verbal IQ. The study found no additional effects of combining working memory training and math training. Study III, using a machine learning analysis, found that children demonstrating a positive response at 6 months follow-up were characterized by having completed 90 % or more of the math program at the default level, in combination with having a fairly favorable socioeconomic background. In summation, this work demonstrates how an adaptive behavioral based program on a tablet can help low performing children improve critical early math skills.", "title": "" } ]
scidocsrr
b76682699bd65eb1bb86bfedf78406c9
A food image recognition system with Multiple Kernel Learning
[ { "docid": "432fe001ec8f1331a4bd033e9c49ccdf", "text": "Recently, methods based on local image features have shown promise for texture and object recognition tasks. This paper presents a large-scale evaluation of an approach that represents images as distributions (signatures or histograms) of features extracted from a sparse set of keypoint locations and learns a Support Vector Machine classifier with kernels based on two effective measures for comparing distributions, the Earth Mover’s Distance and the χ2 distance. We first evaluate the performance of our approach with different keypoint detectors and descriptors, as well as different kernels and classifiers. We then conduct a comparative evaluation with several state-of-the-art recognition methods on four texture and five object databases. On most of these databases, our implementation exceeds the best reported results and achieves comparable performance on the rest. Finally, we investigate the influence of background correlations on recognition performance via extensive tests on the PASCAL database, for which ground-truth object localization information is available. Our experiments demonstrate that image representations based on distributions of local features are surprisingly effective for classification of texture and object images under challenging real-world conditions, including significant intra-class variations and substantial background clutter.", "title": "" }, { "docid": "dce51c1fed063c9d9776fce998209d25", "text": "While classical kernel-based learning algorithms are based on a single kernel, in practice it is often desirable to use multiple kernels. Lankriet et al. (2004) considered conic combinations of kernel matrices for classification, leading to a convex quadratically constrained quadratic program. We show that it can be rewritten as a semi-infinite linear program that can be efficiently solved by recycling the standard SVM implementations. Moreover, we generalize the formulation and our method to a larger class of problems, including regression and one-class classification. Experimental results show that the proposed algorithm works for hundred thousands of examples or hundreds of kernels to be combined, and helps for automatic model selection, improving the interpretability of the learning result. In a second part we discuss general speed up mechanism for SVMs, especially when used with sparse feature maps as appear for string kernels, allowing us to train a string kernel SVM on a 10 million real-world splice dataset from computational biology. We integrated Multiple Kernel Learning in our Machine Learning toolbox SHOGUN for which the source code is publicly available at http://www.fml.tuebingen.mpg.de/raetsch/projects/shogun.", "title": "" } ]
[ { "docid": "02156199912027e9230b3c000bcbe87b", "text": "Voice conversion (VC) using sequence-to-sequence learning of context posterior probabilities is proposed. Conventional VC using shared context posterior probabilities predicts target speech parameters from the context posterior probabilities estimated from the source speech parameters. Although conventional VC can be built from non-parallel data, it is difficult to convert speaker individuality such as phonetic property and speaking rate contained in the posterior probabilities because the source posterior probabilities are directly used for predicting target speech parameters. In this work, we assume that the training data partly include parallel speech data and propose sequence-to-sequence learning between the source and target posterior probabilities. The conversion models perform non-linear and variable-length transformation from the source probability sequence to the target one. Further, we propose a joint training algorithm for the modules. In contrast to conventional VC, which separately trains the speech recognition that estimates posterior probabilities and the speech synthesis that predicts target speech parameters, our proposed method jointly trains these modules along with the proposed probability conversion modules. Experimental results demonstrate that our approach outperforms the conventional VC.", "title": "" }, { "docid": "be009b972c794d01061c4ebdb38cc720", "text": "The existing efforts in computer assisted semen analysis have been focused on high speed imaging and automated image analysis of sperm motility. This results in a large amount of data, and it is extremely challenging for both clinical scientists and researchers to interpret, compare and correlate the multidimensional and time-varying measurements captured from video data. In this work, we use glyphs to encode a collection of numerical measurements taken at a regular interval and to summarize spatio-temporal motion characteristics using static visual representations. The design of the glyphs addresses the needs for (a) encoding some 20 variables using separable visual channels, (b) supporting scientific observation of the interrelationships between different measurements and comparison between different sperm cells and their flagella, and (c) facilitating the learning of the encoding scheme by making use of appropriate visual abstractions and metaphors. As a case study, we focus this work on video visualization for computer-aided semen analysis, which has a broad impact on both biological sciences and medical healthcare. We demonstrate that glyph-based visualization can serve as a means of external memorization of video data as well as an overview of a large set of spatiotemporal measurements. It enables domain scientists to make scientific observation in a cost-effective manner by reducing the burden of viewing videos repeatedly, while providing them with a new visual representation for conveying semen statistics.", "title": "" }, { "docid": "de3ba8a5e83dc1fa153b9341ff7cbc76", "text": "The 1990s have seen a rapid growth of research interests in mobile ad hoc networking. The infrastructureless and the dynamic nature of these networks demands new set of networking strategies to be implemented in order to provide efficient end-to-end communication. This, along with the diverse application of these networks in many different scenarios such as battlefield and disaster recovery, have seen MANETs being researched by many different organisations and institutes. MANETs employ the traditional TCP/IP structure to provide end-to-end communication between nodes. However, due to their mobility and the limited resource in wireless networks, each layer in the TCP/IP model require redefinition or modifications to function efficiently in MANETs. One interesting research area in MANET is routing. Routing in the MANETs is a challenging task and has received a tremendous amount of attention from researches. This has led to development of many different routing protocols for MANETs, and each author of each proposed protocol argues that the strategy proposed provides an improvement over a number of different strategies considered in the literature for a given network scenario. Therefore, it is quite difficult to determine which protocols may perform best under a number of different network scenarios, such as increasing node density and traffic. In this paper, we provide an overview of a wide range of routing protocols proposed in the literature. We also provide a performance comparison of all routing protocols and suggest which protocols may perform best in large networks.", "title": "" }, { "docid": "2d784404588a3b214684f38b060ac29c", "text": "Complex query types huge data volumes and very high read update ratios make the indexing techniques designed and tuned for traditional database systems unsuitable for data warehouses DW We propose an encoded bitmap indexing for DWs which improves the performance of known bitmap indexing in the case of large cardinality domains A performance analysis and theorems which identify properties of good encodings for better performance are presented We compare en coded bitmap indexing with related techniques such as bit slicing projection dynamic and range based indexing", "title": "" }, { "docid": "3419c35e0dff7b47328943235419a409", "text": "Several methods of classification of partially edentulous arches have been proposed and are in use. The most familiar classifications are those originally proposed by Kennedy, Cummer, and Bailyn. None of these classification systems include implants, simply because most of them were proposed before implants became widely accepted. At this time, there is no classification system for partially edentulous arches incorporating implants placed or to be placed in the edentulous spaces for a removable partial denture (RPD). This article proposes a simple classification system for partially edentulous arches with implants based on the Kennedy classification system, with modification, to be used for RPDs. It incorporates the number and positions of implants placed or to be placed in the edentulous areas. A different name, Implant-Corrected Kennedy (ICK) Classification System, is given to the new classification system to be differentiated from other partially edentulous arch classification systems.", "title": "" }, { "docid": "af842014eb9d2201f20f5ec5a5025fe5", "text": "In the context of deep learning for robotics, we show effective method of training a real robot to grasp a tiny sphere (1.37cm of diameter), with an original combination of system design choices. We decompose the end-to-end system into a vision module and a closed-loop controller module. The two modules use target object segmentation as their common interface. The vision module extracts information from the robot end-effector camera, in the form of a binary segmentation mask of the target. We train it to achieve effective domain transfer by composing real background images with simulated images of the target. The controller module takes as input the binary segmentation mask, and thus is agnostic to visual discrepancies between simulated and real environments. We train our closed-loop controller in simulation using imitation learning and show it is robust with respect to discrepancies between the dynamic model of the simulated and real robot: when combined with eye-in-hand observations, we achieve a 90% success rate in grasping a tiny sphere with a real robot. The controller can generalize to unseen scenarios where the target is moving and even learns to recover from failures.", "title": "" }, { "docid": "e464cde1434026c17b06716c6a416b7a", "text": "Three experiments supported the hypothesis that people are more willing to express attitudes that could be viewed as prejudiced when their past behavior has established their credentials as nonprejudiced persons. In Study 1, participants given the opportunity to disagree with blatantly sexist statements were later more willing to favor a man for a stereotypically male job. In Study 2, participants who first had the opportunity to select a member of a stereotyped group (a woman or an African American) for a category-neutral job were more likely to reject a member of that group for a job stereotypically suited for majority members. In Study 3, participants who had established credentials as nonprejudiced persons revealed a greater willingness to express a politically incorrect opinion even when the audience was unaware of their credentials. The general conditions under which people feel licensed to act on illicit motives are discussed.", "title": "" }, { "docid": "037fb8eb72b55b8dae1aee107eb6b15c", "text": "Traditional methods on video summarization are designed to generate summaries for single-view video records, and thus they cannot fully exploit the mutual information in multi-view video records. In this paper, we present a multiview metric learning framework for multi-view video summarization. It combines the advantages of maximum margin clustering with the disagreement minimization criterion. The learning framework thus has the ability to find a metric that best separates the input data, and meanwhile to force the learned metric to maintain underlying intrinsic structure of data points, for example geometric information. Facilitated by such a framework, a systematic solution to the multi-view video summarization problem is developed from the viewpoint of metric learning. The effectiveness of the proposed method is demonstrated by experiments.", "title": "" }, { "docid": "7e08a713a97f153cdd3a7728b7e0a37c", "text": "The availability of long circulating, multifunctional polymers is critical to the development of drug delivery systems and bioconjugates. The ease of synthesis and functionalization make linear polymers attractive but their rapid clearance from circulation compared to their branched or cyclic counterparts, and their high solution viscosities restrict their applications in certain settings. Herein, we report the unusual compact nature of high molecular weight (HMW) linear polyglycerols (LPGs) (LPG - 100; M(n) - 104 kg mol(-1), M(w)/M(n) - 1.15) in aqueous solutions and its impact on its solution properties, blood compatibility, cell compatibility, in vivo circulation, biodistribution and renal clearance. The properties of LPG have been compared with hyperbranched polyglycerol (HPG) (HPG-100), linear polyethylene glycol (PEG) with similar MWs. The hydrodynamic size and the intrinsic viscosity of LPG-100 in water were considerably lower compared to PEG. The Mark-Houwink parameter of LPG was almost 10-fold lower than that of PEG. LPG and HPG demonstrated excellent blood and cell compatibilities. Unlike LPG and HPG, HMW PEG showed dose dependent activation of blood coagulation, platelets and complement system, severe red blood cell aggregation and hemolysis, and cell toxicity. The long blood circulation of LPG-100 (t(1/2β,) 31.8 ± 4 h) was demonstrated in mice; however, it was shorter compared to HPG-100 (t(1/2β,) 39.2 ± 8 h). The shorter circulation half life of LPG-100 was correlated with its higher renal clearance and deformability. Relatively lower organ accumulation was observed for LPG-100 and HPG-100 with some influence of on the architecture of the polymers. Since LPG showed better biocompatibility profiles, longer in vivo circulation time compared to PEG and other linear drug carrier polymers, and has multiple functionalities for conjugation, makes it a potential candidate for developing long circulating multifunctional drug delivery systems similar to HPG.", "title": "" }, { "docid": "6cd9df79a38656597b124b139746462e", "text": "Load balancing is a technique which allows efficient parallelization of irregular workloads, and a key component of many applications and parallelizing runtimes. Work-stealing is a popular technique for implementing load balancing, where each parallel thread maintains its own work set of items and occasionally steals items from the sets of other threads.\n The conventional semantics of work stealing guarantee that each inserted task is eventually extracted exactly once. However, correctness of a wide class of applications allows for relaxed semantics, because either: i) the application already explicitly checks that no work is repeated or ii) the application can tolerate repeated work.\n In this paper, we introduce idempotent work tealing, and present several new algorithms that exploit the relaxed semantics to deliver better performance. The semantics of the new algorithms guarantee that each inserted task is eventually extracted at least once-instead of exactly once.\n On mainstream processors, algorithms for conventional work stealing require special atomic instructions or store-load memory ordering fence instructions in the owner's critical path operations. In general, these instructions are substantially slower than regular memory access instructions. By exploiting the relaxed semantics, our algorithms avoid these instructions in the owner's operations.\n We evaluated our algorithms using common graph problems and micro-benchmarks and compared them to well-known conventional work stealing algorithms, the THE Cilk and Chase-Lev algorithms. We found that our best algorithm (with LIFO extraction) outperforms existing algorithms in nearly all cases, and often by significant margins.", "title": "" }, { "docid": "65117f76b795ad5fabd271fad5ee4287", "text": "We present a novel, fast, and compact method to improve semantic segmentation of three-dimensional (3-D) point clouds, which is able to learn and exploit common contextual relations between observed structures and objects. Introducing 3-D Entangled Forests (3-DEF), we extend the concept of entangled features for decision trees to 3-D point clouds, enabling the classifier not only to learn, which labels are likely to occur close to each other, but also in which specific geometric configuration. Operating on a plane-based representation of a point cloud, our method does not require a final smoothing step and achieves state-of-the-art results on the NYU Depth Dataset in a single inference step. This compactness in turn allows for fast processing times, a crucial factor to consider for online applications on robotic platforms. In a thorough evaluation, we demonstrate the expressiveness of our new 3-D entangled feature set and the importance of spatial context in the scope of semantic segmentation.", "title": "" }, { "docid": "7681a78f2d240afc6b2e48affa0612c1", "text": "Web usage mining applies data mining procedures to analyze user access of Web sites. As with any KDD (knowledge discovery and data mining) process, WUM contains three main steps: preprocessing, knowledge extraction, and results analysis. We focus on data preprocessing, a fastidious, complex process. Analysts aim to determine the exact list of users who accessed the Web site and to reconstitute user sessions-the sequence of actions each user performed on the Web site. Intersites WUM deals with Web server logs from several Web sites, generally belonging to the same organization. Thus, analysts must reassemble the users' path through all the different Web servers that they visited. Our solution is to join all the log files and reconstitute the visit. Classical data preprocessing involves three steps: data fusion, data cleaning, and data structuration. Our solution for WUM adds what we call advanced data preprocessing. This consists of a data summarization step, which will allow the analyst to select only the information of interest. We've successfully tested our solution in an experiment with log files from INRIA Web sites.", "title": "" }, { "docid": "f693b26866ca8eb2a893dead7aa0fb21", "text": "This paper deals with response signals processing in eddy current non-destructive testing. Non-sinusoidal excitation is utilized to drive eddy currents in a conductive specimen. The response signals due to a notch with variable depth are calculated by numerical means. The signals are processed in order to evaluate the depth of the notch. Wavelet transformation is used for this purpose. Obtained results are presented and discussed in this paper. Streszczenie. Praca dotyczy sygnałów wzbudzanych przy nieniszczącym testowaniu za pomocą prądów wirowych. Przy pomocy symulacji numerycznych wyznaczono sygnały odpowiedzi dla niesinusoidalnych sygnałów wzbudzających i defektów o różnej głębokości. Celem symulacji jest wyznaczenie zależności pozwalającej wyznaczyć głębokość defektu w zależności od odbieranego sygnału. W artykule omówiono wykorzystanie do tego celu transformaty falkowej. (Analiza falkowa impulsowych prądów wirowych)", "title": "" }, { "docid": "d81c25a953bc14e3316e2ae7485c023a", "text": "The amphibious robot is so attractive and challenging for its broad application and its complex working environment. It should walk on rough ground, maneuver underwater and pass through transitional terrain such as sand and mud, simultaneously. To tackle with such a complex task, a novel amphibious robot (AmphiHex-I) with transformable leg-flipper composite propulsion is proposed and developed. This paper presents the detailed structure design of the transformable leg-flipper propulsion mechanism and its drive module, which enables the amphibious robot passing through the terrain, water and transitional zone between them. A preliminary theoretical analysis is conducted to study the interaction between the elliptic leg and transitional environment such as granular medium. An orthogonal experiment is designed to study the leg locomotion in the sandy and muddy terrain with different water content. Finally, basic propulsion experiments of AmphiHex-I are launched, which verified the locomotion capability on land and underwater is achieved by the transformable leg-flipper mechanism.", "title": "" }, { "docid": "1488c4ad77f042cbc67aa1681fca8d7e", "text": "Mining chemical-induced disease relations embedded in the vast biomedical literature could facilitate a wide range of computational biomedical applications, such as pharmacovigilance. The BioCreative V organized a Chemical Disease Relation (CDR) Track regarding chemical-induced disease relation extraction from biomedical literature in 2015. We participated in all subtasks of this challenge. In this article, we present our participation system Chemical Disease Relation Extraction SysTem (CD-REST), an end-to-end system for extracting chemical-induced disease relations in biomedical literature. CD-REST consists of two main components: (1) a chemical and disease named entity recognition and normalization module, which employs the Conditional Random Fields algorithm for entity recognition and a Vector Space Model-based approach for normalization; and (2) a relation extraction module that classifies both sentence-level and document-level candidate drug-disease pairs by support vector machines. Our system achieved the best performance on the chemical-induced disease relation extraction subtask in the BioCreative V CDR Track, demonstrating the effectiveness of our proposed machine learning-based approaches for automatic extraction of chemical-induced disease relations in biomedical literature. The CD-REST system provides web services using HTTP POST request. The web services can be accessed fromhttp://clinicalnlptool.com/cdr The online CD-REST demonstration system is available athttp://clinicalnlptool.com/cdr/cdr.html. Database URL:http://clinicalnlptool.com/cdr;http://clinicalnlptool.com/cdr/cdr.html.", "title": "" }, { "docid": "0ebcadb280792dfc14714cd13e550775", "text": "Brushless DC (BLDC) motor drives are continually gaining popularity in motion control applications. Therefore, it is necessary to have a low cost, but effective BLDC motor speed/torque regulator. This paper introduces a novel concept for digital control of trapezoidal BLDC motors. The digital controller was implemented via two different methods, namely conduction-angle control and current-mode control. Motor operation is allowed only at two operating points or states. Alternating between the two operating points results in an average operating point that produces an average operating speed. The controller design equations are derived from Newton's second law. The novel controller is verified via computer simulations and an experimental demonstration is carried out with the rapid prototyping and real-time interface system dSPACE.", "title": "" }, { "docid": "5cdc962d9ce66938ad15829f8d0331ed", "text": "This study aims to provide a picture of how relationship quality can influence customer loyalty or loyalty in the business-to-business context. Building on prior research, we propose relationship quality as a higher construct comprising trust, commitment, satisfaction and service quality. These dimensions of relationship quality can reasonably explain the influence of relationship quality on customer loyalty. This study follows the composite loyalty approach providing both behavioural aspects (purchase intentions) and attitudinal loyalty in order to fully explain the concept of customer loyalty. A literature search is undertaken in the areas of customer loyalty, relationship quality, perceived service quality, trust, commitment and satisfaction. This study then seeks to address the following research issues: Does relationship quality influence both aspects of customer loyalty? Which relationship quality dimensions influence each of the components of customer loyalty? This study was conducted in a business-to-business setting of the courier and freight delivery service industry in Australia. The survey was targeted to Australian Small to Medium Enterprises (SMEs). Two methods were chosen for data collection: mail survey and online survey. The total number of usable respondents who completed both survey was 306. In this study, a two step approach (Anderson and Gerbing 1988) was selected for measurement model and structural model. The results also show that all measurement models of relationship dimensions achieved a satisfactory level of fit to the data. The hypothesized relationships were estimated using structural equation modeling. The overall goodness of fit statistics shows that the structural model fits the data well. As the results show, to maintain customer loyalty to the supplier, a supplier may enhance all four aspects of relationship quality which are trust, commitment, satisfaction and service quality. Specifically, in order to enhance customer’s trust, a supplier should promote the customer’s trust in the supplier. In efforts to emphasize commitment, a supplier should focus on building affective aspects of commitment rather than calculative aspects. Satisfaction appears to be a crucial factor in maintaining purchase intentions whereas service quality will strongly enhance both purchase intentions and attitudinal loyalty.", "title": "" }, { "docid": "7170a9d4943db078998e1844ad67ae9e", "text": "Privacy has become increasingly important to the database community which is reflected by a noteworthy increase in research papers appearing in the literature. While researchers often assume that their definition of “privacy” is universally held by all readers, this is rarely the case; so many papers addressing key challenges in this domain have actually produced results that do not consider the same problem, even when using similar vocabularies. This paper provides an explicit definition of data privacy suitable for ongoing work in data repositories such as a DBMS or for data mining. The work contributes by briefly providing the larger context for the way privacy is defined legally and legislatively but primarily provides a taxonomy capable of thinking of data privacy technologically. We then demonstrate the taxonomy’s utility by illustrating how this perspective makes it possible to understand the important contribution made by researchers to the issue of privacy. The conclusion of this paper is that privacy is indeed multifaceted so no single current research effort adequately addresses the true breadth of the issues necessary to fully understand the scope of this important issue.", "title": "" }, { "docid": "dfa25bfc23d0a7be74d190af7377b740", "text": "Dental erosion is a contemporary disease, mostly because of the change of the eating patterns that currently exist in society. It is a \"silent\" and multifactorial disease, and is highly influenced by habits and lifestyles. The prevalence of dental erosion has considerably increased, with this condition currently standing as a great challenge for the clinician, regarding the diagnosis, identification of the etiological factors, prevention, and execution of an adequate treatment. This article presents a dental erosion review and a case report of a restorative treatment of dental erosion lesions using a combination of bonded ceramic overlays to reestablish vertical dimension and composite resin to restore the worn palatal and incisal surfaces of the anterior upper teeth. Adequate function and esthetics can be achieved with this approach.", "title": "" }, { "docid": "7835a3ecdb9a8563e29ee122e5987503", "text": "Women diagnosed with complete spinal cord injury (SCI) at T10 or higher report sensations generated by vaginal-cervical mechanical self-stimulation (CSS). In this paper we review brain responses to sexual arousal and orgasm in such women, and further hypothesize that the afferent pathway for this unexpected perception is provided by the Vagus nerves, which bypass the spinal cord. Using functional magnetic resonance imaging (fMRI), we ascertained that the region of the medulla oblongata to which the Vagus nerves project (the Nucleus of the Solitary Tract or NTS) is activated by CSS. We also used an objective measure, CSS-induced analgesia response to experimentally induced finger pain, to ascertain the functionality of this pathway. During CSS, several women experienced orgasms. Brain regions activated during orgasm included the hypothalamic paraventricular nucleus, amygdala, accumbens-bed nucleus of the stria terminalis-preoptic area, hippocampus, basal ganglia (especially putamen), cerebellum, and anterior cingulate, insular, parietal and frontal cortices, and lower brainstem (central gray, mesencephalic reticular formation, and NTS). We conclude that the Vagus nerves provide a spinal cord-bypass pathway for vaginal-cervical sensibility and that activation of this pathway can produce analgesia and orgasm.", "title": "" } ]
scidocsrr
8aad42609bf989c816c96442c69dd42f
Evaluating Reliability and Predictive Validity of the Persian Translation of Quantitative Checklist for Autism in Toddlers (Q-CHAT)
[ { "docid": "ab8cc15fe47a9cf4aa904f7e1eea4bc9", "text": "Autism, a severe disorder of development, is difficult to detect in very young children. However, children who receive early intervention have improved long-term prognoses. The Modified Checklist for Autism in Toddlers (M-CHAT), consisting of 23 yes/no items, was used to screen 1,293 children. Of the 58 children given a diagnostic/developmental evaluation, 39 were diagnosed with a disorder on the autism spectrum. Six items pertaining to social relatedness and communication were found to have the best discriminability between children diagnosed with and without autism/PDD. Cutoff scores were created for the best items and the total checklist. Results indicate that the M-CHAT is a promising instrument for the early detection of autism.", "title": "" }, { "docid": "81ca5239dbd60a988e7457076aac05d7", "text": "OBJECTIVE\nFrontline health professionals need a \"red flag\" tool to aid their decision making about whether to make a referral for a full diagnostic assessment for an autism spectrum condition (ASC) in children and adults. The aim was to identify 10 items on the Autism Spectrum Quotient (AQ) (Adult, Adolescent, and Child versions) and on the Quantitative Checklist for Autism in Toddlers (Q-CHAT) with good test accuracy.\n\n\nMETHOD\nA case sample of more than 1,000 individuals with ASC (449 adults, 162 adolescents, 432 children and 126 toddlers) and a control sample of 3,000 controls (838 adults, 475 adolescents, 940 children, and 754 toddlers) with no ASC diagnosis participated. Case participants were recruited from the Autism Research Centre's database of volunteers. The control samples were recruited through a variety of sources. Participants completed full-length versions of the measures. The 10 best items were selected on each instrument to produce short versions.\n\n\nRESULTS\nAt a cut-point of 6 on the AQ-10 adult, sensitivity was 0.88, specificity was 0.91, and positive predictive value (PPV) was 0.85. At a cut-point of 6 on the AQ-10 adolescent, sensitivity was 0.93, specificity was 0.95, and PPV was 0.86. At a cut-point of 6 on the AQ-10 child, sensitivity was 0.95, specificity was 0.97, and PPV was 0.94. At a cut-point of 3 on the Q-CHAT-10, sensitivity was 0.91, specificity was 0.89, and PPV was 0.58. Internal consistency was >0.85 on all measures.\n\n\nCONCLUSIONS\nThe short measures have potential to aid referral decision making for specialist assessment and should be further evaluated.", "title": "" } ]
[ { "docid": "9775396477ccfde5abdd766588655539", "text": "The use of hand gestures offers an alternative to the commonly used human computer interfaces, providing a more intuitive way of navigating among menus and multimedia applications. This paper presents a system for hand gesture recognition devoted to control windows applications. Starting from the images captured by a time-of-flight camera (a camera that produces images with an intensity level inversely proportional to the depth of the objects observed) the system performs hand segmentation as well as a low-level extraction of potentially relevant features which are related to the morphological representation of the hand silhouette. Classification based on these features discriminates between a set of possible static hand postures which results, combined with the estimated motion pattern of the hand, in the recognition of dynamic hand gestures. The whole system works in real-time, allowing practical interaction between user and application.", "title": "" }, { "docid": "888b24ac96c2258d47bec205ccd418b6", "text": "We present a graph-based semi-supervised label propagation algorithm for acquiring opendomain labeled classes and their instances from a combination of unstructured and structured text sources. This acquisition method significantly improves coverage compared to a previous set of labeled classes and instances derived from free text, while achieving comparable precision.", "title": "" }, { "docid": "798ee46a8ac10787eaa154861d0311c6", "text": "In the last few years, we have seen the transformative impact of deep learning in many applications, particularly in speech recognition and computer vision. Inspired by Google's Inception-ResNet deep convolutional neural network (CNN) for image classification, we have developed\"Chemception\", a deep CNN for the prediction of chemical properties, using just the images of 2D drawings of molecules. We develop Chemception without providing any additional explicit chemistry knowledge, such as basic concepts like periodicity, or advanced features like molecular descriptors and fingerprints. We then show how Chemception can serve as a general-purpose neural network architecture for predicting toxicity, activity, and solvation properties when trained on a modest database of 600 to 40,000 compounds. When compared to multi-layer perceptron (MLP) deep neural networks trained with ECFP fingerprints, Chemception slightly outperforms in activity and solvation prediction and slightly underperforms in toxicity prediction. Having matched the performance of expert-developed QSAR/QSPR deep learning models, our work demonstrates the plausibility of using deep neural networks to assist in computational chemistry research, where the feature engineering process is performed primarily by a deep learning algorithm.", "title": "" }, { "docid": "6f16ccc24022c4fc46f8b0b106b0f3c4", "text": "We reviewed 25 patients ascertained through the finding of trigonocephaly/metopic synostosis as a prominent manifestation. In 16 patients, trigonocephaly/metopic synostosis was the only significant finding (64%); 2 patients had metopic/sagittal synostosis (8%) and in 7 patients the trigonocephaly was part of a syndrome (28%). Among the nonsyndromic cases, 12 were males and 6 were females and the sex ratio was 2 M:1 F. Only one patient with isolated trigonocephaly had an affected parent (5.6%). All nonsyndromic patients had normal psychomotor development. In 2 patients with isolated metopic/sagittal synostosis, FGFR2 and FGFR3 mutations were studied and none were detected. Among the syndromic cases, two had Jacobsen syndrome associated with deletion of chromosome 11q 23 (28.5%). Of the remaining five syndromic cases, different conditions were found including Say-Meyer syndrome, multiple congenital anomalies and bilateral retinoblastoma with no detectable deletion in chromosome 13q14.2 by G-banding chromosomal analysis and FISH, I-cell disease, a new acrocraniofacial dysostosis syndrome, and Opitz C trigonocephaly syndrome. The last two patients were studied for cryptic chromosomal rearrangements, with SKY and subtelomeric FISH probes. Also FGFR2 and FGFR3 mutations were studied in two syndromic cases, but none were found. This study demonstrates that the majority of cases with nonsyndromic trigonocephaly are sporadic and benign, apart from the associated cosmetic implications. Syndromic trigonocephaly cases are causally heterogeneous and associated with chromosomal as well as single gene disorders. An investigation to delineate the underlying cause of trigonocephaly is indicated because of its important implications on medical management for the patient and the reproductive plans for the family.", "title": "" }, { "docid": "a500afda393ad60ddd1bb39778655172", "text": "The success and the failure of a data warehouse (DW) project are mainly related to the design phase according to most researchers in this domain. When analyzing the decision-making system requirements, many recurring problems appear and requirements modeling difficulties are detected. Also, we encounter the problem associated with the requirements expression by non-IT professionals and non-experts makers on design models. The ambiguity of the term of decision-making requirements leads to a misinterpretation of the requirements resulting from data warehouse design failure and incorrect OLAP analysis. Therefore, many studies have focused on the inclusion of vague data in information systems in general, but few studies have examined this case in data warehouses. This article describes one of the shortcomings of current approaches to data warehouse design which is the study of in the requirements inaccuracy expression and how ontologies can help us to overcome it. We present a survey on this topic showing that few works that take into account the imprecision in the study of this crucial phase in the decision-making process for the presentation of challenges and problems that arise and requires more attention by researchers to improve DW design. According to our knowledge, no rigorous study of vagueness in this area were made. Keywords— Data warehouses Design, requirements analysis, imprecision, ontology", "title": "" }, { "docid": "c66069fc52e1d6a9ab38f699b6a482c6", "text": "An understanding of the age of the Acheulian and the transition to the Middle Stone Age in southern Africa has been hampered by a lack of reliable dates for key sequences in the region. A number of researchers have hypothesised that the Acheulian first occurred simultaneously in southern and eastern Africa at around 1.7-1.6 Ma. A chronological evaluation of the southern African sites suggests that there is currently little firm evidence for the Acheulian occurring before 1.4 Ma in southern Africa. Many researchers have also suggested the occurrence of a transitional industry, the Fauresmith, covering the transition from the Early to Middle Stone Age, but again, the Fauresmith has been poorly defined, documented, and dated. Despite the occurrence of large cutting tools in these Fauresmith assemblages, they appear to include all the technological components characteristic of the MSA. New data from stratified Fauresmith bearing sites in southern Africa suggest this transitional industry maybe as old as 511-435 ka and should represent the beginning of the MSA as a broad entity rather than the terminal phase of the Acheulian. The MSA in this form is a technology associated with archaic H. sapiens and early modern humans in Africa with a trend of greater complexity through time.", "title": "" }, { "docid": "95612aa090b77fc660279c5f2886738d", "text": "Healthy biological systems exhibit complex patterns of variability that can be described by mathematical chaos. Heart rate variability (HRV) consists of changes in the time intervals between consecutive heartbeats called interbeat intervals (IBIs). A healthy heart is not a metronome. The oscillations of a healthy heart are complex and constantly changing, which allow the cardiovascular system to rapidly adjust to sudden physical and psychological challenges to homeostasis. This article briefly reviews current perspectives on the mechanisms that generate 24 h, short-term (~5 min), and ultra-short-term (<5 min) HRV, the importance of HRV, and its implications for health and performance. The authors provide an overview of widely-used HRV time-domain, frequency-domain, and non-linear metrics. Time-domain indices quantify the amount of HRV observed during monitoring periods that may range from ~2 min to 24 h. Frequency-domain values calculate the absolute or relative amount of signal energy within component bands. Non-linear measurements quantify the unpredictability and complexity of a series of IBIs. The authors survey published normative values for clinical, healthy, and optimal performance populations. They stress the importance of measurement context, including recording period length, subject age, and sex, on baseline HRV values. They caution that 24 h, short-term, and ultra-short-term normative values are not interchangeable. They encourage professionals to supplement published norms with findings from their own specialized populations. Finally, the authors provide an overview of HRV assessment strategies for clinical and optimal performance interventions.", "title": "" }, { "docid": "e756574e701c9ecc4e28da6135499215", "text": "MicroRNAs are small noncoding RNA molecules that regulate gene expression posttranscriptionally through complementary base pairing with thousands of messenger RNAs. They regulate diverse physiological, developmental, and pathophysiological processes. Recent studies have uncovered the contribution of microRNAs to the pathogenesis of many human diseases, including liver diseases. Moreover, microRNAs have been identified as biomarkers that can often be detected in the systemic circulation. We review the role of microRNAs in liver physiology and pathophysiology, focusing on viral hepatitis, liver fibrosis, and cancer. We also discuss microRNAs as diagnostic and prognostic markers and microRNA-based therapeutic approaches for liver disease.", "title": "" }, { "docid": "e9f9d022007833ab7ae928619641e1b1", "text": "BACKGROUND\nDissemination and implementation of health care interventions are currently hampered by the variable quality of reporting of implementation research. Reporting of other study types has been improved by the introduction of reporting standards (e.g. CONSORT). We are therefore developing guidelines for reporting implementation studies (StaRI).\n\n\nMETHODS\nUsing established methodology for developing health research reporting guidelines, we systematically reviewed the literature to generate items for a checklist of reporting standards. We then recruited an international, multidisciplinary panel for an e-Delphi consensus-building exercise which comprised an initial open round to revise/suggest a list of potential items for scoring in the subsequent two scoring rounds (scale 1 to 9). Consensus was defined a priori as 80% agreement with the priority scores of 7, 8, or 9.\n\n\nRESULTS\nWe identified eight papers from the literature review from which we derived 36 potential items. We recruited 23 experts to the e-Delphi panel. Open round comments resulted in revisions, and 47 items went forward to the scoring rounds. Thirty-five items achieved consensus: 19 achieved 100% agreement. Prioritised items addressed the need to: provide an evidence-based justification for implementation; describe the setting, professional/service requirements, eligible population and intervention in detail; measure process and clinical outcomes at population level (using routine data); report impact on health care resources; describe local adaptations to the implementation strategy and describe barriers/facilitators. Over-arching themes from the free-text comments included balancing the need for detailed descriptions of interventions with publishing constraints, addressing the dual aims of reporting on the process of implementation and effectiveness of the intervention and monitoring fidelity to an intervention whilst encouraging adaptation to suit diverse local contexts.\n\n\nCONCLUSIONS\nWe have identified priority items for reporting implementation studies and key issues for further discussion. An international, multidisciplinary workshop, where participants will debate the issues raised, clarify specific items and develop StaRI standards that fit within the suite of EQUATOR reporting guidelines, is planned.\n\n\nREGISTRATION\nThe protocol is registered with Equator: http://www.equator-network.org/library/reporting-guidelines-under-development/#17 .", "title": "" }, { "docid": "82250ed88b90a942ddf551b0e9c78dd5", "text": "This paper is focused on proposal of image steganographic method that is able to embedding of encoded secret message using Quick Response Code (QR) code into image data. Discrete Wavelet Transformation (DWT) domain is used for the embedding of QR code, while embedding process is additionally protected by Advanced Encryption Standard (AES) cipher algorithm. In addition, typical characteristics of QR code was broken using the encryption, therefore it makes the method more secure. The aim of this paper is design of image steganographic method with high secure level and high non-perceptibility level. The relation between security and capacity of the method was improved by special compression of QR code before the embedding process. Efficiency of the proposed method was measured by Peak Signal-to-Noise Ratio (PSNR) and achieved results were compared with other steganographic tools.", "title": "" }, { "docid": "dc3417d01a998ee476aeafc0e9d11c74", "text": "We present an overview of techniques for quantizing convolutional neural networks for inference with integer weights and activations. 1. Per-channel quantization of weights and per-layer quantization of activations to 8-bits of precision post-training produces classification accuracies within 2% of floating point networks for a wide variety of CNN architectures (section 3.1). 2. Model sizes can be reduced by a factor of 4 by quantizing weights to 8bits, even when 8-bit arithmetic is not supported. This can be achieved with simple, post training quantization of weights (section 3.1). 3. We benchmark latencies of quantized networks on CPUs and DSPs and observe a speedup of 2x-3x for quantized implementations compared to floating point on CPUs. Speedups of up to 10x are observed on specialized processors with fixed point SIMD capabilities, like the Qualcomm QDSPs with HVX (section 6). 4. Quantization-aware training can provide further improvements, reducing the gap to floating point to 1% at 8-bit precision. Quantization-aware training also allows for reducing the precision of weights to four bits with accuracy losses ranging from 2% to 10%, with higher accuracy drop for smaller networks (section 3.2). 5. We introduce tools in TensorFlow and TensorFlowLite for quantizing convolutional networks (Section 3). 6. We review best practices for quantization-aware training to obtain high accuracy with quantized weights and activations (section 4). 7. We recommend that per-channel quantization of weights and per-layer quantization of activations be the preferred quantization scheme for hardware acceleration and kernel optimization. We also propose that future processors and hardware accelerators for optimized inference support precisions of 4, 8 and 16 bits (section 7).", "title": "" }, { "docid": "c808655e7272293ef8ae8af563700c2e", "text": "3D scene flow estimation aims to jointly recover dense geometry and 3D motion from stereoscopic image sequences, thus generalizes classical disparity and 2D optical flow estimation. To realize its conceptual benefits and overcome limitations of many existing methods, we propose to represent the dynamic scene as a collection of rigidly moving planes, into which the input images are segmented. Geometry and 3D motion are then jointly recovered alongside an over-segmentation of the scene. This piecewise rigid scene model is significantly more parsimonious than conventional pixel-based representations, yet retains the ability to represent real-world scenes with independent object motion. It, furthermore, enables us to define suitable scene priors, perform occlusion reasoning, and leverage discrete optimization schemes toward stable and accurate results. Assuming the rigid motion to persist approximately over time additionally enables us to incorporate multiple frames into the inference. To that end, each view holds its own representation, which is encouraged to be consistent across all other viewpoints and frames in a temporal window. We show that such a view-consistent multi-frame scheme significantly improves accuracy, especially in the presence of occlusions, and increases robustness against adverse imaging conditions. Our method currently achieves leading performance on the KITTI benchmark, for both flow and stereo.", "title": "" }, { "docid": "55a0fb2814fde7890724a137fc414c88", "text": "Quantitative structure-activity relationship modeling is one of the major computational tools employed in medicinal chemistry. However, throughout its entire history it has drawn both praise and criticism concerning its reliability, limitations, successes, and failures. In this paper, we discuss (i) the development and evolution of QSAR; (ii) the current trends, unsolved problems, and pressing challenges; and (iii) several novel and emerging applications of QSAR modeling. Throughout this discussion, we provide guidelines for QSAR development, validation, and application, which are summarized in best practices for building rigorously validated and externally predictive QSAR models. We hope that this Perspective will help communications between computational and experimental chemists toward collaborative development and use of QSAR models. We also believe that the guidelines presented here will help journal editors and reviewers apply more stringent scientific standards to manuscripts reporting new QSAR studies, as well as encourage the use of high quality, validated QSARs for regulatory decision making.", "title": "" }, { "docid": "f5e44676e9ce8a06bcdb383852fb117f", "text": "We explore techniques to significantly improve the compute efficiency and performance of Deep Convolution Networks without impacting their accuracy. To improve the compute efficiency, we focus on achieving high accuracy with extremely low-precision (2-bit) weight networks, and to accelerate the execution time, we aggressively skip operations on zero-values. We achieve the highest reported accuracy of 76.6% Top-1/93% Top-5 on the Imagenet object classification challenge with low-precision network while reducing the compute requirement by ∼3× compared to a full-precision network that achieves similar accuracy. Furthermore, to fully exploit the benefits of our low-precision networks, we build a deep learning accelerator core, DLAC, that can achieve up to 1 TFLOP/mm2 equivalent for single-precision floating-point operations (∼2 TFLOP/mm2 for half-precision), which is ∼5× better than Linear Algebra Core [16] and ∼4× better than previous deep learning accelerator proposal [8].", "title": "" }, { "docid": "2ead9e973f2a237b604bf68284e0acf1", "text": "Cognitive radio networks challenge the traditional wireless networking paradigm by introducing concepts firmly stemmed into the Artificial Intelligence (AI) field, i.e., learning and reasoning. This fosters optimal resource usage and management allowing a plethora of potential applications such as secondary spectrum access, cognitive wireless backbones, cognitive machine-to-machine etc. The majority of overview works in the field of cognitive radio networks deal with the notions of observation and adaptations, which are not a distinguished cognitive radio networking aspect. Therefore, this paper provides insight into the mechanisms for obtaining and inferring knowledge that clearly set apart the cognitive radio networks from other wireless solutions.", "title": "" }, { "docid": "6a3dc4c6bcf2a4133532c37dfa685f3b", "text": "Feature selection can be de ned as a problem of nding a minimum set of M relevant at tributes that describes the dataset as well as the original N attributes do where M N After examining the problems with both the exhaustive and the heuristic approach to fea ture selection this paper proposes a proba bilistic approach The theoretic analysis and the experimental study show that the pro posed approach is simple to implement and guaranteed to nd the optimal if resources permit It is also fast in obtaining results and e ective in selecting features that im prove the performance of a learning algo rithm An on site application involving huge datasets has been conducted independently It proves the e ectiveness and scalability of the proposed algorithm Discussed also are various aspects and applications of this fea ture selection algorithm", "title": "" }, { "docid": "141e3ad8619577140f02a1038981ecb2", "text": "Sponges are sessile benthic filter-feeding animals, which harbor numerous microorganisms. The enormous diversity and abundance of sponge associated bacteria envisages sponges as hot spots of microbial diversity and dynamics. Many theories were proposed on the ecological implications and mechanism of sponge-microbial association, among these, the biosynthesis of sponge derived bioactive molecules by the symbiotic bacteria is now well-indicated. This phenomenon however, is not exhibited by all marine sponges. Based on the available reports, it has been well established that the sponge associated microbial assemblages keep on changing continuously in response to environmental pressure and/or acquisition of microbes from surrounding seawater or associated macroorganisms. In this review, we have discussed nutritional association of sponges with its symbionts, interaction of sponges with other eukaryotic organisms, dynamics of sponge microbiome and sponge-specific microbial symbionts, sponge-coral association etc.", "title": "" }, { "docid": "9f3f5e2baa1bff4aa28a2ce2a4c47088", "text": "One of the most perplexing problems in risk analysis is why some relatively minor risks or risk events, as assessed by technical experts, often elicit strong public concerns and result in substantial impacts upon society and economy. This article sets forth a conceptual framework that seeks to link systematically the technical assessment of risk with psychological, sociological, and cultural perspectives of risk perception and risk-related behavior. The main thesis is that hazards interact with psychological, social, institutional, and cultural processes in ways that may amplify or attenuate public responses to the risk or risk event. A structural description of the social amplification of risk is now possible. Amplification occurs at two stages: in the transfer of information about the risk, and in the response mechanisms of society. Signals about risk are processed by individual and social amplification stations, including the scientist who communicates the risk assessment, the news media, cultural groups, interpersonal networks, and others. Key steps of amplifications can be identified at each stage. The amplified risk leads to behavioral responses, which, in turn, result in secondary impacts. Models are presented that portray the elements and linkages in the proposed conceptual framework.", "title": "" }, { "docid": "165429eb7bf6661af60081aa9cdeb370", "text": "Central to the looming paradigm shift toward data-intensive science, machine-learning techniques are becoming increasingly important. In particular, deep learning has proven to be both a major breakthrough and an extremely powerful tool in many fields. Shall we embrace deep learning as the key to everything? Or should we resist a black-box solution? These are controversial issues within the remote-sensing community. In this article, we analyze the challenges of using deep learning for remote-sensing data analysis, review recent advances, and provide resources we hope will make deep learning in remote sensing seem ridiculously simple. More importantly, we encourage remote-sensing scientists to bring their expertise into deep learning and use it as an implicit general model to tackle unprecedented, large-scale, influential challenges, such as climate change and urbanization.", "title": "" }, { "docid": "a3cb3e28db4e44642ecdac8eb4ae9a8a", "text": "A Ka-band highly linear power amplifier (PA) is implemented in 28-nm bulk CMOS technology. Using a deep class-AB PA topology with appropriate harmonic control circuit, highly linear and efficient PAs are designed at millimeter-wave band. This PA architecture provides a linear PA operation close to the saturated power. Also elaborated harmonic tuning and neutralization techniques are used to further improve the transistor gain and stability. A two-stack PA is designed for higher gain and output power than a common source (CS) PA. Additionally, average power tracking (APT) is applied to further reduce the power consumption at a low power operation and, hence, extend battery life. Both the PAs are tested with two different signals at 28.5 GHz; they are fully loaded long-term evolution (LTE) signal with 16-quadrature amplitude modulation (QAM), a 7.5-dB peakto-average power ratio (PAPR), and a 20-MHz bandwidth (BW), and a wireless LAN (WLAN) signal with 64-QAM, a 10.8-dB PAPR, and an 80-MHz BW. The CS/two-stack PAs achieve power-added efficiency (PAE) of 27%/25%, error vector magnitude (EVM) of 5.17%/3.19%, and adjacent channel leakage ratio (ACLRE-UTRA) of -33/-33 dBc, respectively, with an average output power of 11/14.6 dBm for the LTE signal. For the WLAN signal, the CS/2-stack PAs achieve the PAE of 16.5%/17.3%, and an EVM of 4.27%/4.21%, respectively, at an average output power of 6.8/11 dBm.", "title": "" } ]
scidocsrr
3bad9c8d77eeb7d45ecc853380175289
Accurate, Fast Fall Detection Using Gyroscopes and Accelerometer-Derived Posture Information
[ { "docid": "2841935e11a246a68d71cca27728f387", "text": "Unintentional falls are a common cause of severe injury in the elderly population. By introducing small, non-invasive sensor motes in conjunction with a wireless network, the Ivy Project aims to provide a path towards more independent living for the elderly. Using a small device worn on the waist and a network of fixed motes in the home environment, we can detect the occurrence of a fall and the location of the victim. Low-cost and low-power MEMS accelerometers are used to detect the fall while RF signal strength is used to locate the person", "title": "" } ]
[ { "docid": "afae94714340326278c1629aa4ecc48c", "text": "The purpose of this investigation was to examine the influence of upper-body static stretching and dynamic stretching on upper-body muscular performance. Eleven healthy men, who were National Collegiate Athletic Association Division I track and field athletes (age, 19.6 +/- 1.7 years; body mass, 93.7 +/- 13.8 kg; height, 183.6 +/- 4.6 cm; bench press 1 repetition maximum [1RM], 106.2 +/- 23.0 kg), participated in this study. Over 4 sessions, subjects participated in 4 different stretching protocols (i.e., no stretching, static stretching, dynamic stretching, and combined static and dynamic stretching) in a balanced randomized order followed by 4 tests: 30% of 1 RM bench throw, isometric bench press, overhead medicine ball throw, and lateral medicine ball throw. Depending on the exercise, test peak power (Pmax), peak force (Fmax), peak acceleration (Amax), peak velocity (Vmax), and peak displacement (Dmax) were measured. There were no differences among stretch trials for Pmax, Fmax, Amax, Vmax, or Dmax for the bench throw or for Fmax for the isometric bench press. For the overhead medicine ball throw, there were no differences among stretch trials for Vmax or Dmax. For the lateral medicine ball throw, there was no difference in Vmax among stretch trials; however, Dmax was significantly larger (p </= 0.05) for the static and dynamic condition compared to the static-only condition. In general, there was no short-term effect of stretching on upper-body muscular performance in young adult male athletes, regardless of stretch mode, potentially due to the amount of rest used after stretching before the performances. Since throwing performance was largely unaffected by static or dynamic upper-body stretching, athletes competing in the field events could perform upper-body stretching, if enough time were allowed before the performance. However, prior studies on lower-body musculature have demonstrated dramatic negative effects on speed and power. Therefore, it is recommended that a dynamic warm-up be used for the entire warm-up.", "title": "" }, { "docid": "551d642efa547b9d8c089b8ecb9530fb", "text": "Using piezoelectric materials to harvest energy from ambient vibrations to power wireless sensors has been of great interest over the past few years. Due to the power output of the piezoelectric materials is relatively low, rechargeable battery is considered as one kind of energy storage to accumulate the harvested energy for intermittent use. Piezoelectric harvesting circuits for rechargeable batteries have two schemes: non-adaptive and adaptive ones. A non-adaptive harvesting scheme includes a conventional diode bridge rectifier and a passive circuit. In recent years, several researchers have developed adaptive schemes for the harvesting circuit. Among them, the adaptive harvesting scheme by Ottman et al. is the most promising. This paper is aimed to quantify the performances of adaptive and non-adaptive schemes and to discuss their performance characteristics.", "title": "" }, { "docid": "3776b7fdcd1460b60a18c87cd60b639e", "text": "A sketch is a probabilistic data structure that is used to record frequencies of items in a multi-set. Various types of sketches have been proposed in literature and applied in a variety of fields, such as data stream processing, natural language processing, distributed data sets etc. While several variants of sketches have been proposed in the past, existing sketches still have a significant room for improvement in terms of accuracy. In this paper, we propose a new sketch, called Slim-Fat (SF) sketch, which has a significantly higher accuracy compared to prior art, a much smaller memory footprint, and at the same time achieves the same speed as the best prior sketch. The key idea behind our proposed SF-sketch is to maintain two separate sketches: a small sketch called Slim-subsketch and a large sketch called Fat-subsketch. The Slim-subsketch, stored in the fast memory (SRAM), enables fast and accurate querying. The Fat-subsketch, stored in the relatively slow memory (DRAM), is used to assist the insertion and deletion from Slim-subsketch. We implemented and extensively evaluated SF-sketch along with several prior sketches and compared them side by side. Our experimental results show that SF-sketch outperforms the most commonly used CM-sketch by up to 33.1 times in terms of accuracy.", "title": "" }, { "docid": "5eab71f546a7dc8bae157a0ca4dd7444", "text": "We introduce a new usability inspection method called HED (heuristic evaluation during demonstrations) for measuring and comparing usability of competing complex IT systems in public procurement. The method presented enhances traditional heuristic evaluation to include the use context, comprehensive view of the system, and reveals missing functionality by using user scenarios and demonstrations. HED also quantifies the results in a comparable way. We present findings from a real-life validation of the method in a large-scale procurement project of a healthcare and social welfare information system. We analyze and compare the performance of HED to other usability evaluation methods used in procurement. Based on the analysis HED can be used to evaluate the level of usability of an IT system during procurement correctly, comprehensively and efficiently.", "title": "" }, { "docid": "e2a7ff093714cc6a0543816b3d7c08e9", "text": "Microblogs such as Twitter reflect the general public’s reactions to major events. Bursty topics from microblogs reveal what events have attracted the most online attention. Although bursty event detection from text streams has been studied before, previous work may not be suitable for microblogs because compared with other text streams such as news articles and scientific publications, microblog posts are particularly diverse and noisy. To find topics that have bursty patterns on microblogs, we propose a topic model that simultaneously captures two observations: (1) posts published around the same time are more likely to have the same topic, and (2) posts published by the same user are more likely to have the same topic. The former helps find eventdriven posts while the latter helps identify and filter out “personal” posts. Our experiments on a large Twitter dataset show that there are more meaningful and unique bursty topics in the top-ranked results returned by our model than an LDA baseline and two degenerate variations of our model. We also show some case studies that demonstrate the importance of considering both the temporal information and users’ personal interests for bursty topic detection from microblogs.", "title": "" }, { "docid": "910a3be33d479be4ed6e7e44a56bb8fb", "text": "Support vector machine (SVM) is a supervised machine learning approach that was recognized as a statistical learning apotheosis for the small-sample database. SVM has shown its excellent learning and generalization ability and has been extensively employed in many areas. This paper presents a performance analysis of six types of SVMs for the diagnosis of the classical Wisconsin breast cancer problem from a statistical point of view. The classification performance of standard SVM (St-SVM) is analyzed and compared with those of the other modified classifiers such as proximal support vector machine (PSVM) classifiers, Lagrangian support vector machines (LSVM), finite Newton method for Lagrangian support vector machine (NSVM), Linear programming support vector machines (LPSVM), and smooth support vector machine (SSVM). The experimental results reveal that these SVM classifiers achieve very fast, simple, and efficient breast cancer diagnosis. The training results indicated that LSVM has the lowest accuracy of 95.6107 %, while St-SVM performed better than other methods for all performance indices (accuracy = 97.71 %) and is closely followed by LPSVM (accuracy = 97.3282). However, in the validation phase, the overall accuracies of LPSVM achieved 97.1429 %, which was superior to LSVM (95.4286 %), SSVM (96.5714 %), PSVM (96 %), NSVM (96.5714 %), and St-SVM (94.86 %). Value of ROC and MCC for LPSVM achieved 0.9938 and 0.9369, respectively, which outperformed other classifiers. The results strongly suggest that LPSVM can aid in the diagnosis of breast cancer.", "title": "" }, { "docid": "95612aa090b77fc660279c5f2886738d", "text": "Healthy biological systems exhibit complex patterns of variability that can be described by mathematical chaos. Heart rate variability (HRV) consists of changes in the time intervals between consecutive heartbeats called interbeat intervals (IBIs). A healthy heart is not a metronome. The oscillations of a healthy heart are complex and constantly changing, which allow the cardiovascular system to rapidly adjust to sudden physical and psychological challenges to homeostasis. This article briefly reviews current perspectives on the mechanisms that generate 24 h, short-term (~5 min), and ultra-short-term (<5 min) HRV, the importance of HRV, and its implications for health and performance. The authors provide an overview of widely-used HRV time-domain, frequency-domain, and non-linear metrics. Time-domain indices quantify the amount of HRV observed during monitoring periods that may range from ~2 min to 24 h. Frequency-domain values calculate the absolute or relative amount of signal energy within component bands. Non-linear measurements quantify the unpredictability and complexity of a series of IBIs. The authors survey published normative values for clinical, healthy, and optimal performance populations. They stress the importance of measurement context, including recording period length, subject age, and sex, on baseline HRV values. They caution that 24 h, short-term, and ultra-short-term normative values are not interchangeable. They encourage professionals to supplement published norms with findings from their own specialized populations. Finally, the authors provide an overview of HRV assessment strategies for clinical and optimal performance interventions.", "title": "" }, { "docid": "5519eea017d8f69804060f5e40748b1a", "text": "The nonlinear Fourier transform is a transmission and signal processing technique that makes positive use of the Kerr nonlinearity in optical fibre channels. I will overview recent advances and some of challenges in this field.", "title": "" }, { "docid": "db02adcb4f8ace13ab1f6f4a79bf7232", "text": "This paper presents a spectral and time-frequency analysis of EEG signals recorded on seven healthy subjects walking on a treadmill at three different speeds. An accelerometer was placed on the head of the subjects in order to record the shocks undergone by the EEG electrodes during walking. Our results indicate that up to 15 harmonics of the fundamental stepping frequency may pollute EEG signals, depending on the walking speed and also on the electrode location. This finding may call into question some conclusions drawn in previous EEG studies where low-delta band (especially around 1 Hz, the fundamental stepping frequency) had been announced as being the seat of angular and linear kinematics control of the lower limbs during walk. Additionally, our analysis reveals that EEG and accelerometer signals exhibit similar time-frequency properties, especially in frequency bands extending up to 150 Hz, suggesting that previous conclusions claiming the activation of high-gamma rhythms during walking may have been drawn on the basis of insufficiently cleaned EEG signals. Our results are put in perspective with recent EEG studies related to locomotion and extensively discussed in particular by focusing on the low-delta and high-gamma bands.", "title": "" }, { "docid": "41c3505d1341247972d99319cba3e7ba", "text": "A 32-year-old pregnant woman in the 25th week of pregnancy underwent oral glucose tolerance screening at the diabetologist's. Later that day, she was found dead in her apartment possibly poisoned with Chlumsky disinfectant solution (solutio phenoli camphorata). An autopsy revealed chemical burns in the digestive system. The lungs and the brain showed signs of severe edema. The blood of the woman and fetus was analyzed using gas chromatography with mass spectrometry and revealed phenol, its metabolites (phenyl glucuronide and phenyl sulfate) and camphor. No ethanol was found in the blood samples. Both phenol and camphor are contained in Chlumsky disinfectant solution, which is used for disinfecting surgical equipment in healthcare facilities. Further investigation revealed that the deceased woman had been accidentally administered a disinfectant instead of a glucose solution by the nurse, which resulted in acute intoxication followed by the death of the pregnant woman and the fetus.", "title": "" }, { "docid": "f231bff77a403fe18a445d894e9b93e5", "text": "The geographical location of Internet IP addresses is important for academic research, commercial and homeland security applications. Thus, both commercial and academic databases and tools are available for mapping IP addresses to geographic locations. Evaluating the accuracy of these mapping services is complex since obtaining diverse large scale ground truth is very hard. In this work we evaluate mapping services using an algorithm that groups IP addresses to PoPs, based on structure and delay. This way we are able to group close to 100,000 IP addresses world wide into groups that are known to share a geo-location with high confidence. We provide insight into the strength and weaknesses of IP geolocation databases, and discuss their accuracy and encountered anomalies.", "title": "" }, { "docid": "df0756ecff9f2ba84d6db342ee6574d3", "text": "Security is becoming a critical part of organizational information systems. Intrusion detection system (IDS) is an important detection that is used as a countermeasure to preserve data integrity and system availability from attacks. Data mining is being used to clean, classify, and examine large amount of network data to correlate common infringement for intrusion detection. The main reason for using data mining techniques for intrusion detection systems is due to the enormous volume of existing and newly appearing network data that require processing. The amount of data accumulated each day by a network is huge. Several data mining techniques such as clustering, classification, and association rules are proving to be useful for gathering different knowledge for intrusion detection. This paper presents the idea of applying data mining techniques to intrusion detection systems to maximize the effectiveness in identifying attacks, thereby helping the users to construct more secure information systems.", "title": "" }, { "docid": "89aa13fe76bf48c982e44b03acb0dd3d", "text": "Stock trading strategy plays a crucial role in investment companies. However, it is challenging to obtain optimal strategy in the complex and dynamic stock market. We explore the potential of deep reinforcement learning to optimize stock trading strategy and thus maximize investment return. 30 stocks are selected as our trading stocks and their daily prices are used as the training and trading market environment. We train a deep reinforcement learning agent and obtain an adaptive trading strategy. The agent’s performance is evaluated and compared with Dow Jones Industrial Average and the traditional min-variance portfolio allocation strategy. The proposed deep reinforcement learning approach is shown to outperform the two baselines in terms of both the Sharpe ratio and cumulative returns.", "title": "" }, { "docid": "fe1c70068301a379f6658775c6eb7ba0", "text": "Fashion is a perpetual topic in human social life, and the mass has the penchant to emulate what large city residents and celebrities wear. Undeniably, New York City is such a bellwether large city with all kinds of fashion leadership. Consequently, to study what the fashion trends are during this year, it is very helpful to learn the fashion trends of New York City. Discovering fashion trends in New York City could boost many applications such as clothing recommendation and advertising. Does the fashion trend in the New York Fashion Show actually influence the clothing styles on the public? To answer this question, we design a novel system that consists of three major components: (1) constructing a large dataset from the New York Fashion Shows and New York street chic in order to understand the likely clothing fashion trends in New York, (2) utilizing a learning-based approach to discover fashion attributes as the representative characteristics of fashion trends, and (3) comparing the analysis results from the New York Fashion Shows and street-chic images to verify whether the fashion shows have actual influence on the people in New York City. Through the preliminary experiments over a large clothing dataset, we demonstrate the effectiveness of our proposed system, and obtain useful insights on fashion trends and fashion influence.", "title": "" }, { "docid": "3d0103c34fcc6a65ad56c85a9fe10bad", "text": "This paper approaches the problem of finding correspondences between images in which there are large changes in viewpoint, scale and illumination. Recent work has shown that scale-space ‘interest points’ may be found with good repeatability in spite of such changes. Furthermore, the high entropy of the surrounding image regions means that local descriptors are highly discriminative for matching. For descriptors at interest points to be robustly matched between images, they must be as far as possible invariant to the imaging process. In this work we introduce a family of features which use groups of interest points to form geometrically invariant descriptors of image regions. Feature descriptors are formed by resampling the image relative to canonical frames defined by the points. In addition to robust matching, a key advantage of this approach is that each match implies a hypothesis of the local 2D (projective) transformation. This allows us to immediately reject most of the false matches using a Hough transform. We reject remaining outliers using RANSAC and the epipolar constraint. Results show that dense feature matching can be achieved in a few seconds of computation on 1GHz Pentium III machines.", "title": "" }, { "docid": "7c4c33097c12f55a08f8a7cc3634c5cb", "text": "Pattern queries are widely used in complex event processing (CEP) systems. Existing pattern matching techniques, however, can provide only limited performance for expensive queries in real-world applications, which may involve Kleene closure patterns, flexible event selection strategies, and events with imprecise timestamps. To support these expensive queries with high performance, we begin our study by analyzing the complexity of pattern queries, with a focus on the fundamental understanding of which features make pattern queries more expressive and at the same time more computationally expensive. This analysis allows us to identify performance bottlenecks in processing those expensive queries, and provides key insights for us to develop a series of optimizations to mitigate those bottlenecks. Microbenchmark results show superior performance of our system for expensive pattern queries while most state-of-the-art systems suffer from poor performance. A thorough case study on Hadoop cluster monitoring further demonstrates the efficiency and effectiveness of our proposed techniques.", "title": "" }, { "docid": "e33e3e46a4bcaaae32a5743672476cd9", "text": "This paper is based on the notion of data quality. It includes correctness, completeness and minimality for which a notational framework is shown. In long living databases the maintenance of data quality is a rst order issue. This paper shows that even well designed and implemented information systems cannot guarantee correct data in any circumstances. It is shown that in any such system data quality tends to decrease and therefore some data correction procedure should be applied from time to time. One aspect of increasing data quality is the correction of data values. Characteristics of a software tool which supports this data value correction process are presented and discussed.", "title": "" }, { "docid": "8f621c393298a81ef46c104a92297231", "text": "A new method of free-form deformation, t-FFD, is proposed. An original shape of large-scale polygonal mesh or point-cloud is deformed by using a control mesh, which is constituted of a set of triangles with arbitrary topology and geometry, including the cases of disconnection or self-intersection. For modeling purposes, a designer can handle the shape directly or indirectly, and also locally or globally. This method works on a simple mapping mechanism. First, each point of the original shape is parametrized by the local coordinate system on each triangle of the control mesh. After modifying the control mesh, the point is mapped according to each modified triangle. Finally, the mapped locations are blended as a new position of the original point, then a smoothly deformed shape is achieved. Details of the t-FFD are discussed and examples are shown.", "title": "" }, { "docid": "3c8e85a977df74c2fd345db9934d4699", "text": "The abstract paragraph should be indented 1/2 inch (3 picas) on both left and righthand margins. Use 10 point type, with a vertical spacing of 11 points. The word Abstract must be centered, bold, and in point size 12. Two line spaces precede the abstract. The abstract must be limited to one paragraph.", "title": "" }, { "docid": "9cbe52f8a135310d5da850c51b0a7d08", "text": "Training robots for operation in the real world is a complex, time consuming and potentially expensive task. Despite significant success of reinforcement learning in games and simulations, research in real robot applications has not been able to match similar progress. While sample complexity can be reduced by training policies in simulation, such policies can perform sub-optimally on the real platform given imperfect calibration of model dynamics. We present an approach – supplemental to fine tuning on the real robot – to further benefit from parallel access to a simulator during training and reduce sample requirements on the real robot. The developed approach harnesses auxiliary rewards to guide the exploration for the real world agent based on the proficiency of the agent in simulation and vice versa. In this context, we demonstrate empirically that the reciprocal alignment for both agents provides further benefit as the agent in simulation can optimize its behaviour for states commonly visited by the real-world agent.", "title": "" } ]
scidocsrr
856b35eca381031c01d0434bcd9ec421
Lean UX: the next generation of user-centered agile development?
[ { "docid": "d50cdc6a7a939716196489f3e18c6222", "text": "ì Personasî is an interaction design technique with considerable potential for software product development. In three years of use, our colleagues and we have extended Alan Cooperís technique to make Personas a powerful complement to other usability methods. After describing and illustrating our approach, we outline the psychological theory that explains why Personas are more engaging than design based primarily on scenarios. As Cooper and others have observed, Personas can engage team members very effectively. They also provide a conduit for conveying a broad range of qualitative and quantitative data, and focus attention on aspects of design and use that other methods do not.", "title": "" }, { "docid": "382ac4d3ba3024d0c760cff1eef505c3", "text": "We seek to close the gap between software engineering (SE) and human-computer interaction (HCI) by indicating interdisciplinary interfaces throughout the different phases of SE and HCI lifecycles. As agile representatives of SE, Extreme Programming (XP) and Agile Modeling (AM) contribute helpful principles and practices for a common engineering approach. We present a cross-discipline user interface design lifecycle that integrates SE and HCI under the umbrella of agile development. Melting IT budgets, pressure of time and the demand to build better software in less time must be supported by traveling as light as possible. We did, therefore, choose not just to mediate both disciplines. Following our surveys, a rather radical approach best fits the demands of engineering organizations.", "title": "" } ]
[ { "docid": "a60a60a345fed5e16df157ebf2951c3f", "text": "A dielectric fibre with a refractive index higher than its surrounding region is a form of dielectric waveguide which represents a possible medium for the guided transmission of energy at optical frequencies. The particular type of dielectric-fibre waveguide discussed is one with a circular cross-section. The choice of the mode of propagation for a fibre waveguide used for communication purposes is governed by consideration of loss characteristics and information capacity. Dielectric loss, bending loss and radiation loss are discussed, and mode stability, dispersion and power handling are examined with respect to information capacity. Physicalrealisation aspects are also discussed. Experimental investigations at both optical and microwave wavelengths are included. List of principle symbols Jn = nth-order Bessel function of the first kind Kn = nth-order modified Bessel function of the second kind 271 271 B — —, phase coefficient of the waveguide Xg }'n = first derivative of Jn K ,̂ = first derivative of Kn hi = radial wavenumber or decay coefficient €,= relative permittivity k0 = free-space propagation coefficient a = radius of the fibre y = longitudinal propagation coefficient k = Boltzman's constant T = absolute temperature, K j5 c = isothermal compressibility X = wavelength n = refractive index Hj, = uth-order Hankel function of the ith type H'v = derivation of Hu v = azimuthal propagation coefficient = i^ — jv2 L = modulation period Subscript n is an integer and subscript m refers to the mth root of L = 0", "title": "" }, { "docid": "ae23145d649c6df81a34babdfc142b31", "text": "Multi-head attention is appealing for the ability to jointly attend to information from different representation subspaces at different positions. In this work, we introduce a disagreement regularization to explicitly encourage the diversity among multiple attention heads. Specifically, we propose three types of disagreement regularization, which respectively encourage the subspace, the attended positions, and the output representation associated with each attention head to be different from other heads. Experimental results on widely-used WMT14 English⇒German and WMT17 Chinese⇒English translation tasks demonstrate the effectiveness and universality of the proposed approach.", "title": "" }, { "docid": "49d42dbbe33a2b0a16d7ec586654a128", "text": "The goal of the present study is to explore the application of deep convolutional network features to emotion recognition. Results indicate that they perform similarly to recently published models at a best recognition rate of 94.4%, and do so with a single still image rather than a video stream. An implementation of an affective feedback game is also described, where a classifier using these features tracks the facial expressions of a player in real-time. Keywords—emotion recognition, convolutional network, affective computing", "title": "" }, { "docid": "c1735e08317b4c2bfe3622cab7b557e6", "text": "Intensive repetitive therapy shows promise to improve motor function and quality of life for stroke patients. Intense therapies provided by individualized interaction between the patient and rehabilitation specialist to overcome upper extremity impairment are beneficial, however, they are expensive and difficult to evaluate quantitatively and objectively. The development of a pneumatic muscle (PM) driven therapeutic device, the RUPERT/spl trade/ has the potential of providing a low cost and safe take-home method of supplementing therapy in addition to in the clinic treatment. The device can also provide real-time, objective assessment of functional improvement from the therapy.", "title": "" }, { "docid": "7518c3029ec09d6d2b3f6785047a1fc9", "text": "In this paper, we describe a novel deep convolutional neural networks (CNN) based approach called contextual deep CNN that can jointly exploit spatial and spectral features for hyperspectral image classification. The contextual deep CNN first concurrently applies multiple 3-dimensional local convolutional filters with different sizes jointly exploiting spatial and spectral features of a hyperspectral image. The initial spatial and spectral feature maps obtained from applying the variable size convolutional filters are then combined together to form a joint spatio-spectral feature map. The joint feature map representing rich spectral and spatial properties of the hyperspectral image is then fed through fully convolutional layers that eventually predict the corresponding label of each pixel vector. The proposed approach is tested on two benchmark datasets: the Indian Pines dataset and the Pavia University scene dataset. Performance comparison shows enhanced classification performance of the proposed approach over the current state of the art on both datasets.", "title": "" }, { "docid": "350334f676d5590cda9d6f430af6e80d", "text": "Benferhat, S, Dubois D and Prade, H, 1992. \"Representing default rules in possibilistic logic\" In: Proc. of the 3rd Inter. Conf. on Principles of knowledge Representation and Reasoning (KR'92), 673-684, Cambridge, MA, October 26-29. De Finetti, B, 1936. \"La logique de la probabilite\" Actes du Congres Inter, de Philosophic Scientifique, Paris. (Hermann et Cie Editions, 1936, IV1-IV9). Driankov, D, Hellendoorn, H and Reinfrank, M, 1995. An Introduction to Fuzzy Control, Springer-Verlag. Dubois, D and Prade, H, 1988. \"An introduction to possibilistic and fuzzy logics\" In: Non-Standard Logics for Automated Reasoning (P Smets, A Mamdani, D Dubois and H Prade, editors), 287-315, Academic Press. Dubois, D and Prade, H, 1994. \"Can we enforce full compositionality in uncertainty calculi?\" In: Proc. 12th US National Conf. On Artificial Intelligence (AAAI94), 149-154, Seattle, WA. Elkan, C, 1994. \"The paradoxical success of fuzzy logic\" IEEE Expert August, 3-8. Lehmann, D and Magidor. M, 1992. \"What does a conditional knowledge base entail?\" Artificial Intelligence 55 (1) 1-60. Maung, 1,1995. \"Two characterizations of a minimum-information principle in possibilistic reasoning\" Int. J. of Approximate Reasoning 12 133-156. Pearl, J, 1990. \"System Z: A natural ordering of defaults with tractable applications to default reasoning\" Proc. of the 2nd Conf. on Theoretical Aspects of Reasoning about Knowledge (TARK'90) 121-135, San Francisco, CA, Morgan Karfman. Shoham, Y, 1988. Reasoning about Change MIT Press. Smets, P, 1988. \"Belief functions\" In: Non-Standard Logics for Automated Reasoning (P Smets, A Mamdani, D Dubois and H Prade, editors), 253-286, Academic Press. Smets, P, 1990a. \"The combination of evidence in the transferable belief model\" IEEE Trans, on Pattern Anal. Mach. Intell. 12 447-458. Smets, P, 1990b. \"Constructing the pignistic probability function in a context of uncertainty\" Un certainty in Artificial Intelligence 5 (M Henrion et al., editors), 29-40, North-Holland. Smets, P, 1995. \"Quantifying beliefs by belief functions: An axiomatic justification\" In: Procoj the 13th Inter. Joint Conf. on Artificial Intelligence (IJACT93), 598-603, Chambey, France, August 28-September 3. Smets, P and Kennes, R, 1994. \"The transferable belief model\" Artificial Intelligence 66 191-234.", "title": "" }, { "docid": "c5c5d56d2db769996d8164a0d0a5e00a", "text": "This paper presents the development of a polymer-based tendon-driven wearable robotic hand, Exo-Glove Poly. Unlike the previously developed Exo-Glove, a fabric-based tendon-driven wearable robotic hand, Exo-Glove Poly was developed using silicone to allow for sanitization between users in multiple-user environments such as hospitals. Exo-Glove Poly was developed to use two motors, one for the thumb and the other for the index/middle finger, and an under-actuation mechanism to grasp various objects. In order to realize Exo-Glove Poly, design features and fabrication processes were developed to permit adjustment to different hand sizes, to protect users from injury, to enable ventilation, and to embed Teflon tubes for the wire paths. The mechanical properties of Exo-Glove Poly were verified with a healthy subject through a wrap grasp experiment using a mat-type pressure sensor and an under-actuation performance experiment with a specialized test set-up. Finally, performance of the Exo-Glove Poly for grasping various shapes of object was verified, including objects needing under-actuation.", "title": "" }, { "docid": "d2c36f67971c22595bc483ebb7345404", "text": "Resistive-switching random access memory (RRAM) devices utilizing a crossbar architecture represent a promising alternative for Flash replacement in high-density data storage applications. However, RRAM crossbar arrays require the adoption of diodelike select devices with high on-off -current ratio and with sufficient endurance. To avoid the use of select devices, one should develop passive arrays where the nonlinear characteristic of the RRAM device itself provides self-selection during read and write. This paper discusses the complementary switching (CS) in hafnium oxide RRAM, where the logic bit can be encoded in two high-resistance levels, thus being immune from leakage currents and related sneak-through effects in the crossbar array. The CS physical mechanism is described through simulation results by an ion-migration model for bipolar switching. Results from pulsed-regime characterization are shown, demonstrating that CS can be operated at least in the 10-ns time scale. The minimization of the reset current is finally discussed.", "title": "" }, { "docid": "b89099e9b01a83368a1ebdb2f4394eba", "text": "Orangutans (Pongo pygmaeus and Pongo abelii) are semisolitary apes and, among the great apes, the most distantly related to humans. Raters assessed 152 orangutans on 48 personality descriptors; 140 of these orangutans were also rated on a subjective well-being questionnaire. Principal-components analysis yielded 5 reliable personality factors: Extraversion, Dominance, Neuroticism, Agreeableness, and Intellect. The authors found no factor analogous to human Conscientiousness. Among the orangutans rated on all 48 personality descriptors and the subjective well-being questionnaire, Extraversion, Agreeableness, and low Neuroticism were related to subjective well-being. These findings suggest that analogues of human, chimpanzee, and orangutan personality domains existed in a common ape ancestor.", "title": "" }, { "docid": "a753be5a5f81ae77bfcb997a2748d723", "text": "The design of electromagnetic (EM) interference filters for converter systems is usually based on measurements with a prototype during the final stages of the design process. Predicting the conducted EM noise spectrum of a converter by simulation in an early stage has the potential to save time/cost and to investigate different noise reduction methods, which could, for example, influence the layout or the design of the control integrated circuit. Therefore, the main sources of conducted differential-mode (DM) and common-mode (CM) noise of electronic ballasts for fluorescent lamps are identified in this paper. For each source, the noise spectrum is calculated and a noise propagation model is presented. The influence of the line impedance stabilizing network (LISN) and the test receiver is also included. Based on the presented models, noise spectrums are calculated and validated by measurements.", "title": "" }, { "docid": "cf32bac4be646211d09d1b4107b3f58a", "text": "The single-feature-based background model often fails in complex scenes, since a pixel is better described by several features, which highlight different characteristics of it. Therefore, the multi-feature-based background model has drawn much attention recently. In this paper, we propose a novel multi-feature-based background model, named stability of adaptive feature (SoAF) model, which utilizes the stabilities of different features in a pixel to adaptively weigh the contributions of these features for foreground detection. We do this mainly due to the fact that the features of pixels in the background are often more stable. In SoAF, a pixel is described by several features and each of these features is depicted by a unimodal model that offers an initial label of the target pixel. Then, we measure the stability of each feature by its histogram statistics over a time sequence and use them as weights to assemble the aforementioned unimodal models to yield the final label. The experiments on some standard benchmarks, which contain the complex scenes, demonstrate that the proposed approach achieves promising performance in comparison with some state-of-the-art approaches.", "title": "" }, { "docid": "f794d4a807a4d69727989254c557d2d1", "text": "The purpose of this study was to describe the operative procedures and clinical outcomes of a new three-column internal fixation system with anatomical locking plates on the tibial plateau to treat complex three-column fractures of the tibial plateau. From June 2011 to May 2015, 14 patients with complex three-column fractures of the tibial plateau were treated with reduction and internal fixation through an anterolateral approach combined with a posteromedial approach. The patients were randomly divided into two groups: a control group which included seven cases using common locking plates, and an experimental group which included seven cases with a new three-column internal fixation system with anatomical locking plates. The mean operation time of the control group was 280.7 ± 53.7 minutes, which was 215.0 ± 49.1 minutes in the experimental group. The mean intra-operative blood loss of the control group was 692.8 ± 183.5 ml, which was 471.4 ± 138.0 ml in the experimental group. The difference was statistically significant between the two groups above. The differences were not statistically significant between the following mean numbers of the two groups: Rasmussen score immediately after operation; active extension–flexion degrees of knee joint at three and 12 months post-operatively; tibial plateau varus angle (TPA) and posterior slope angle (PA) immediately after operation, at three and at 12 months post-operatively; HSS (The Hospital for Special Surgery) knee-rating score at 12 months post-operatively. All fractures healed. A three-column internal fixation system with anatomical locking plates on tibial plateau is an effective and safe tool to treat complex three-column fractures of the tibial plateau and it is more convenient than the common plate.", "title": "" }, { "docid": "8216a6da70affe452ec3c5998e3c77ba", "text": "In this paper, the performance of a rectangular microstrip patch antenna fed by microstrip line is designed to operate for ultra-wide band applications. It consists of a rectangular patch with U-shaped slot on one side of the substrate and a finite ground plane on the other side. The U-shaped slot and the finite ground plane are used to achieve an excellent impedance matching to increase the bandwidth. The proposed antenna is designed and optimized based on extensive 3D EM simulation studies. The proposed antenna is designed to operate over a frequency range from 3.6 to 15 GHz.", "title": "" }, { "docid": "6ac9ddefaeaddad00fb3d85b94b07f74", "text": "Cognitive architectures are theories of cognition that try to capture the essential representations and mechanisms that underlie cognition. Research in cognitive architectures has gradually moved from a focus on the functional capabilities of architectures to the ability to model the details of human behavior, and, more recently, brain activity. Although there are many different architectures, they share many identical or similar mechanisms, permitting possible future convergence. In judging the quality of a particular cognitive model, it is pertinent to not just judge its fit to the experimental data but also its simplicity and ability to make predictions.", "title": "" }, { "docid": "d0d5081b93f48972c92b3c5a7e69350e", "text": "Comprehending lyrics, as found in songs and poems, can pose a challenge to human and machine readers alike. This motivates the need for systems that can understand the ambiguity and jargon found in such creative texts, and provide commentary to aid readers in reaching the correct interpretation. We introduce the task of automated lyric annotation (ALA). Like text simplification, a goal of ALA is to rephrase the original text in a more easily understandable manner. However, in ALA the system must often include additional information to clarify niche terminology and abstract concepts. To stimulate research on this task, we release a large collection of crowdsourced annotations for song lyrics. We analyze the performance of translation and retrieval models on this task, measuring performance with both automated and human evaluation. We find that each model captures a unique type of information important to the task.", "title": "" }, { "docid": "f41c9b1bcc36ed842f15d7570ff67f92", "text": "Game and creation are activities which have good potential for computational thinking skills. In this paper we present T-Maze, an economical tangible programming tool for children aged 5-9 to build computer programs in maze games by placing wooden blocks. Through the use of computer vision technology, T-Maze provides a live programming interface with real-time graphical and voice feedback. We conducted a user study with 7 children using T-Maze to play two levels of maze-escape games and create their own mazes. The results show that T-Maze is not only easy to use, but also has the potential to help children cultivate computational thinking like abstraction, problem decomposition, and creativity.", "title": "" }, { "docid": "8375f143ff6b42e36e615a78a362304b", "text": "The Ball and Beam system is a popular technique for the study of control systems. The system has highly non-linear characteristics and is an excellent tool to represent an unstable system. The control of such a system presents a challenging task. The ball and beam mirrors the real time unstable complex systems such as flight control, on a small laboratory level and provides for developing control algorithms which can be implemented at a higher scale. The objective of this paper is to design and implement cascade PD control of the ball and beam system in LabVIEW using data acquisition board and DAQmx and use the designed control circuit to verify results in real time.", "title": "" }, { "docid": "b96b422be2b358d92347659d96a68da7", "text": "The bipedal spring-loaded inverted pendulum (SLIP) model captures characteristic properties of human locomotion, and it is therefore often used to study human-like walking. The extended variable spring-loaded inverted pendulum (V-SLIP) model provides a control input for gait stabilization and shows robust and energy-efficient walking patterns. This work presents a control strategy that maps the conceptual V-SLIP model on a realistic model of a bipedal robot. This walker implements the variable leg compliance by means of variable stiffness actuators in the knees. The proposed controller consists of multiple levels, each level controlling the robot at a different level of abstraction. This allows the controller to control a simple dynamic structure at the top level and control the specific degrees of freedom of the robot at a lower level. The proposed controller is validated by both numeric simulations and preliminary experimental tests.", "title": "" }, { "docid": "8b2f4d597b1aa5a9579fa3e37f6acc65", "text": "This work presents a 910MHz/2.4GHz dual-band dipole antenna for Power Harvesting and/or Sensor Network applications whose main advantage lies on its easily tunable bands. Tunability is achieved via the low and high frequency dipole separation Wgap. This separation is used to increase or decrease the S11 magnitude of the required bands. Such tunability can be used to harvest energy in environments where the electric field strength of one carrier band is dominant over the other one, or in the case when both carriers have similar electric field strength. If the environment is crowed by 820MHz-1.02GHz carries Wgap is adjusted to 1mm in order to harvest/sense only the selected band; if the environment is full of 2.24GHz - 2.52 GHz carriers Wgap is set to 7mm. When Wgap is selected to 4mm both bands can be harvested/sensed. The proposed antenna works for UHF-RFID, GSM-840MHz, 3G-UMTS, Wi-Fi and Bluetooth standards. Simulations are carried out in Advanced Design System (ADS) Momentum using commercial FR4 printed circuit board specification.", "title": "" } ]
scidocsrr
1857c554e673450b9fa00a12050b936a
Digital auto-tuning system for inductor current sensing in VRM applications
[ { "docid": "1648a759d2487177af4b5d62407fd6cd", "text": "This paper discusses the presence of steady-state limit cycles in digitally controlled pulse-width modulation (PWM) converters, and suggests conditions on the control law and the quantization resolution for their elimination. It then introduces single-phase and multi-phase controlled digital dither as a means of increasing the effective resolution of digital PWM (DPWM) modules, allowing for the use of low resolution DPWM units in high regulation accuracy applications. Bounds on the number of bits of dither that can be used in a particular converter are derived.", "title": "" } ]
[ { "docid": "3e2542619ff6ccda4c2aaf13f03a5ba4", "text": "Resting-state functional magnetic resonance imaging (fMRI) has highlighted the rich structure of brain activity in absence of a task or stimulus. A great effort has been dedicated in the last two decades to investigate functional connectivity (FC), i.e. the functional interplay between different regions of the brain, which was for a long time assumed to have stationary nature. Only recently was the dynamic behaviour of FC revealed, showing that on top of correlational patterns of spontaneous fMRI signal fluctuations, connectivity between different brain regions exhibits meaningful variations within a typical resting-state fMRI experiment. As a consequence, a considerable amount of work has been directed to assessing and characterising dynamic FC (dFC), and several different approaches were explored to identify relevant FC fluctuations. At the same time, several questions were raised about the nature of dFC, which would be of interest only if brought back to a neural origin. In support of this, correlations with electroencephalography (EEG) recordings, demographic and behavioural data were established, and various clinical applications were explored, where the potential of dFC could be preliminarily demonstrated. In this review, we aim to provide a comprehensive description of the dFC approaches proposed so far, and point at the directions that we see as most promising for the future developments of the field. Advantages and pitfalls of dFC analyses are addressed, helping the readers to orient themselves through the complex web of available methodologies and tools.", "title": "" }, { "docid": "fdfea6d3a5160c591863351395929a99", "text": "Deep networks have recently enjoyed enormous success when applied to recognition and classification problems in computer vision [22, 33], but their use in graphics problems has been limited ([23, 7] are notable recent exceptions). In this work, we present a novel deep architecture that performs new view synthesis directly from pixels, trained from a large number of posed image sets. In contrast to traditional approaches, which consist of multiple complex stages of processing, each of which requires careful tuning and can fail in unexpected ways, our system is trained end-to-end. The pixels from neighboring views of a scene are presented to the network, which then directly produces the pixels of the unseen view. The benefits of our approach include generality (we only require posed image sets and can easily apply our method to different domains), and high quality results on traditionally difficult scenes. We believe this is due to the end-to-end nature of our system, which is able to plausibly generate pixels according to color, depth, and texture priors learnt automatically from the training data. We show view interpolation results on imagery from the KITTI dataset [12], from data from [1] as well as on Google Street View images. To our knowledge, our work is the first to apply deep learning to the problem of new view synthesis from sets of real-world, natural imagery.", "title": "" }, { "docid": "958b0739c5c2d65bbb1cf0b7687610ff", "text": "BACKGROUND\nDexlansoprazole is a new proton pump inhibitor (PPI) with a dual delayed-release system. Both dexlansoprazole and esomeprazole are an enantiomer of lansoprazole and omeprazole respectively. However, there is no head-to-head trial data or indirect comparison analyses between dexlansoprazole and esomeprazole.\n\n\nAIM\nTo compare the efficacy of dexlansoprazole with esomeprazole in healing erosive oesophagitis (EO), the maintenance of healed EO and the treatment of non-erosive reflux disease (NERD).\n\n\nMETHODS\nRandomised Controlled Trials (RCTs) comparing dexlansoprazole or esomeprazole with either placebo or another PPI were systematically reviewed. Random-effect meta-analyses and adjusted indirect comparisons were conducted to compare the treatment effect of dexlansoprazole and esomeprazole using a common comparator. The relative risk (RR) and 95% confidence interval (CI) were calculated.\n\n\nRESULTS\nThe indirect comparisons revealed significant differences in symptom control of heartburn in patients with NERD at 4 weeks. Dexlansoprazole 30 mg was more effective than esomeprazole 20 mg or 40 mg (RR: 2.01, 95% CI: 1.15-3.51; RR: 2.17, 95% CI: 1.39-3.38). However, there were no statistically significant differences between the two drugs in EO healing and maintenance of healed EO. Comparison of symptom control in healed EO was not able to be made due to different definitions used in the RCTs.\n\n\nCONCLUSIONS\nAdjusted indirect comparisons based on currently available RCT data suggested significantly better treatment effect in symptom control of heartburn in patients with NERD for dexlansoprazole against esomeprazole. No statistically significant differences were found in other EO outcomes. However, these study findings need to be interpreted with caution due to small number of studies and other limitations.", "title": "" }, { "docid": "fff644a5c46c937e01f6c6d390e12864", "text": "Safety-critical systems are those systems whose failure could result in loss of life, significant property damage, or damage to the environment. There are many well known examples in application areas such as medical devices, aircraft flight control, weapons, and nuclear systems. Many modern information systems are becoming safety-critical in a general sense because financial loss and even loss of life can result from their failure. Future safety-critical systems will be more common and more powerful. From a software perspective, developing safety critical systems in the numbers required and with adequate dependability is going to require significant advances in areas such as specification, architecture, verification, and process. The very visible problems that have arisen in the area of information-system security suggests that security is a major challenge also.", "title": "" }, { "docid": "4c102cb77b3992f6cb29a117994804eb", "text": "These current studies explored the impact of individual differences in personality factors on interface interaction and learning performance behaviors in both an interactive visualization and a menu-driven web table in two studies. Participants were administered 3 psychometric measures designed to assess Locus of Control, Extraversion, and Neuroticism. Participants were then asked to complete multiple procedural learning tasks in each interface. Results demonstrated that all three measures predicted completion times. Additionally, results analyses demonstrated personality factors also predicted the number of insights participants reported while completing the tasks in each interface. We discuss how these findings advance our ongoing research in the Personal Equation of Interaction.", "title": "" }, { "docid": "c14cf1310945b32b54f78b4173cc443c", "text": "The paper studies the solution of stochastic optimization problems in which approximations to the gradient and Hessian are obtained through subsampling. We first consider Newton-like methods that employ these approximations and discuss how to coordinate the accuracy in the gradient and Hessian to yield a superlinear rate of convergence in expectation. The second part of the paper analyzes an inexact Newton method that solves linear systems approximately using the conjugate gradient (CG) method, and that samples the Hessian and not the gradient (the gradient is assumed to be exact). We provide a complexity analysis for this method based on the properties of the CG iteration and the quality of the Hessian approximation, and compare it with a method that employs a stochastic gradient iteration instead of the CG method. We report preliminary numerical results that illustrate the performance of inexact subsampled Newton methods on machine learning applications based on logistic regression.", "title": "" }, { "docid": "71f8aca9d325f015836033c2a46adaa6", "text": "BACKGROUND\nTwenty states currently require that women seeking abortion be counseled on possible psychological responses, with six states stressing negative responses. The majority of research finds that women whose unwanted pregnancies end in abortion do not subsequently have adverse mental health outcomes; scant research examines this relationship for young women.\n\n\nMETHODS\nFour waves of data from the National Longitudinal Study of Adolescent Health were analyzed. Population-averaged lagged logistic and linear regression models were employed to test the relationship between pregnancy resolution outcome and subsequent depressive symptoms, adjusting for prior depressive symptoms, history of traumatic experiences, and sociodemographic covariates. Depressive symptoms were measured using a nine-item version of the Center for Epidemiologic Studies Depression scale. Analyses were conducted among two subsamples of women whose unwanted first pregnancies were resolved in either abortion or live birth: (1) 856 women with an unwanted first pregnancy between Waves 2 and 3; and (2) 438 women with an unwanted first pregnancy between Waves 3 and 4 (unweighted n's).\n\n\nRESULTS\nIn unadjusted and adjusted linear and logistic regression analyses for both subsamples, there was no association between having an abortion after an unwanted first pregnancy and subsequent depressive symptoms. In fully adjusted models, the most recent measure of prior depressive symptoms was consistently associated with subsequent depressive symptoms.\n\n\nCONCLUSIONS\nIn a nationally representative, longitudinal dataset, there was no evidence that young women who had abortions were at increased risk of subsequent depressive symptoms compared with those who give birth after an unwanted first pregnancy.", "title": "" }, { "docid": "5baf5eb1c98a06ccf129fc65f539ea35", "text": "In this paper, we propose to incorporate topic aspects information for online comments convincingness evaluation. Our model makes use of graph convolutional network to utilize implicit topic information within a discussion thread to assist the evaluation of convincingness of each single comment. In order to test the effectiveness of our proposed model, we annotate topic information on top of a public dataset for argument convincingness evaluation. Experimental results show that topic information is able to improve the performance for convincingness evaluation. We also make a move to detect topic aspects automatically.", "title": "" }, { "docid": "97ad45410c0b613d08f1b0202777d124", "text": "Much of the emerging literature on social media in the workplace is characterized by an “ideology of openness” that assumes social media use will increase knowledge sharing in organizations, and that open communication is effective and desirable. We argue that affordances of social media may in fact promote both overt and covert behavior, creating dialectical tensions for distributed workers that must be communicatively managed. Drawing on a case study of the engineering division of a distributed high tech start-up, we find our participants navigate tensions in visibility-invisibility, engagement-disengagement, and sharing-control and strategically manage these tensions to preserve both openness and ambiguity. These findings highlight ways in which organizational members limit as well as share knowledge through social media, and the productive role of tensions in enabling them to attend to multiple goals.", "title": "" }, { "docid": "6f70b6071c945ca22edda9e2b8fe22a8", "text": "BACKGROUND\nHyaluronidase (Hylase Dessau(®)) is a hyaluronic acid-metabolizing enzyme, which has been shown to loosen the extracellular matrix, thereby improving the diffusion of local anesthetics. Lower eyelid edema is a common post-interventional complication of cosmetic procedures performed in the lid region, such as the injection of hyaluronic acid fillers for tear-trough augmentation. The purpose of this study was to validate the efficacy of hyaluronidase in the management of lower eyelid edema.\n\n\nMETHODS\nWe performed a retrospective analysis with 20 patients with lower eyelid edema. Most patients (n = 14) presented with edema following hyaluronic acid injection (tear-trough augmentation), whereas the minority (n = 6) were treated due to idiopathic edema (malar edema or malar mounds). Patients were treated by local infiltration of approximately 0.2 ml to 0.5 ml of hyaluronidase (Hylase Dessau(®) 20 IU to 75 IU) per eyelid. Photographs were taken prior to and seven days after infiltration.\n\n\nRESULTS\nHyaluronidase was found to reduce effectively and rapidly or resolve eyelid edema after a single injection. No relevant adverse effects were observed. However, it must be noted that a hyaluronidase injection may also dissolve injected hyaluronic acid fillers and may therefore negatively affect tear-trough augmentations. While the effects of a treatment for edema due to tear-trough augmentation were permanent, malar edema and malar mounds reoccurred within two to three weeks.\n\n\nCONCLUSION\nThe infiltration of hyaluronidase is rapid, safe and currently the only effective option for the management of eyelid edema. No relevant adverse effects were observed.", "title": "" }, { "docid": "3e6151d32fc5c2be720aab5cc467eecb", "text": "The weighted linear combination (WLC) technique is a decision rule for deriving composite maps using GIS. It is one of the most often used decision models in GIS. The method, however, is frequently applied without full understanding of the assumptions underling this approach. In many case studies, the WLC model has been applied incorrectly and with dubious results because analysts (decision makers) have ignored or been unaware of the assumptions. This paper provides a critical overview of the current practice with respect to GIS/WLC and suggests the best practice approach.", "title": "" }, { "docid": "0105247ab487c2d06f3ffa0d00d4b4f9", "text": "Many distributed storage systems achieve high data access throughput via partitioning and replication, each system with its own advantages and tradeoffs. In order to achieve high scalability, however, today's systems generally reduce transactional support, disallowing single transactions from spanning multiple partitions. Calvin is a practical transaction scheduling and data replication layer that uses a deterministic ordering guarantee to significantly reduce the normally prohibitive contention costs associated with distributed transactions. Unlike previous deterministic database system prototypes, Calvin supports disk-based storage, scales near-linearly on a cluster of commodity machines, and has no single point of failure. By replicating transaction inputs rather than effects, Calvin is also able to support multiple consistency levels---including Paxos-based strong consistency across geographically distant replicas---at no cost to transactional throughput.", "title": "" }, { "docid": "5c6c8834304264b59db5f28021ccbdb8", "text": "We develop a dynamic optimal control model of a fashion designer’s challenge of maintaining brand image in the face of short-term pro…t opportunities through expanded sales that risk brand dilution in the longer-run. The key state variable is the brand’s reputation, and the key decision is sales volume. Depending on the brand’s capacity to command higher prices, one of two regimes is observed. If the price mark-ups relative to production costs are modest, then the optimal solution may simply be to exploit whatever value can be derived from the brand in the short-run and retire the brand when that capacity is fully diluted. However, if the price markups are more substantial, then an existing brand should be preserved.", "title": "" }, { "docid": "e06a55edd75d067245a2ddf131a70367", "text": "This paper presents a simple method to realize a circular polarizer by inserting a dielectric septum in the middle of the cylindrical waveguide. Since fixing slots are built to precisely locate the septum, dual-compensation slots are made in the orthogonal plane to balance the effects of the fixing slots. The measured axial ratio is smaller than 0.5 dB and the phase difference is flat in the frequency range from 60 to 62.25 GHz. In addition, the return losses are better than -13 dB for both E/sub x/ and E/sub y/ polarizations in the same frequency range. This design has the added advantage that poor phase differences resulting from fabrication error or an inaccurate dielectric constant can easily be improved by adjusting the length of the inserted dielectric septum.", "title": "" }, { "docid": "6f68ed77668f21696051947a8ccc4f56", "text": "Most discussions of computer security focus on control of disclosure. In Particular, the U.S. Department of Defense has developed a set of criteria for computer mechanisms to provide control of classified information. However, for that core of data processing concerned with business operation and control of assets, the primary security concern is data integrity. This paper presents a policy for data integrity based on commercial data processing practices, and compares the mechanisms needed for this policy with the mechanisms needed to enforce the lattice model for information security. We argue that a lattice model is not sufficient to characterize integrity policies, and that distinct mechanisms are needed to Control disclosure and to provide integrity.", "title": "" }, { "docid": "ca112b427468d6394a0ba0a4b4ec5211", "text": "Medical diagnosis is basically a pattern classification phenomena: based on some input provided by a patient, an expert gives a conclusion on the basis of its knowledge, which is normally stored in a binary form, and finally the result is calculated i.e. either the patient suffering from a certain disease or not. There are a number of properties in fuzzy set theory has a number of facilities that make it suitable for medical diagnosis. The results and findings from the study had shown that the technique of fuzzy logic can contribute a reliable result in order to notify the disease. Human subject has been used to test the system. In this paper we have proposed a system for medical diagnosis which is a generated using Fuzzy Logic Toolbox in MATLAB. Specifically, it focuses on medical diagnosis.", "title": "" }, { "docid": "bba4d637cf40e81ea89e61e875d3c425", "text": "Recent years have witnessed the fast development of UAVs (unmanned aerial vehicles). As an alternative to traditional image acquisition methods, UAVs bridge the gap between terrestrial and airborne photogrammetry and enable flexible acquisition of high resolution images. However, the georeferencing accuracy of UAVs is still limited by the low-performance on-board GNSS and INS. This paper investigates automatic geo-registration of an individual UAV image or UAV image blocks by matching the UAV image(s) with a previously taken georeferenced image, such as an individual aerial or satellite image with a height map attached or an aerial orthophoto with a DSM (digital surface model) attached. As the biggest challenge for matching UAV and aerial images is in the large differences in scale and rotation, we propose a novel feature matching method for nadir or slightly tilted images. The method is comprised of a dense feature detection scheme, a one-to-many matching strategy and a global geometric verification scheme. The proposed method is able to find thousands of valid matches in cases where SIFT and ASIFT fail. Those matches can be used to geo-register the whole UAV image block towards the reference image data. When the reference images offer high georeferencing accuracy, the UAV images can also be geolocalized in a global coordinate system. A series of experiments involving different scenarios was conducted to validate the proposed method. The results demonstrate that our approach achieves not only decimeter-level registration accuracy, but also comparable global accuracy as the reference images.", "title": "" }, { "docid": "5e75a4ea83600736c601e46cb18aa2c9", "text": "This paper deals with a low-cost 24GHz Doppler radar sensor for traffic surveillance. The basic building blocks of the transmit/receive chain, namely the antennas, the balanced power amplifier (PA), the dielectric resonator oscillator (DRO), the low noise amplifier (LNA) and the down conversion diode mixer are presented underlining the key technologies and manufacturing approaches by means the required performances can be attained while keeping industrial costs extremely low.", "title": "" }, { "docid": "9081cb169f74b90672f84afa526f40b3", "text": "The paper presents an analysis of the main mechanisms of decryption of SSL/TLS traffic. Methods and technologies for detecting malicious activity in encrypted traffic that are used by leading companies are also considered. Also, the approach for intercepting and decrypting traffic transmitted over SSL/TLS is developed, tested and proposed. The developed approach has been automated and can be used for remote listening of the network, which will allow to decrypt transmitted data in a mode close to real time.", "title": "" } ]
scidocsrr
cf7f7e9fdd17d22ebaa8f6bfcbfe4186
Inverse Reinforcement Learning from Failure
[ { "docid": "3d20ba5dc32270cb75df7a2d499a70e4", "text": "The Maximum Margin Planning (MMP) (Ratliff et al., 2006) algorithm solves imitation learning problems by learning linear mappings from features to cost functions in a planning domain. The learned policy is the result of minimum-cost planning using these cost functions. These mappings are chosen so that example policies (or trajectories) given by a teacher appear to be lower cost (with a lossscaled margin) than any other policy for a given planning domain. We provide a novel approach, MMPBOOST , based on the functional gradient descent view of boosting (Mason et al., 1999; Friedman, 1999a) that extends MMP by “boosting” in new features. This approach uses simple binary classification or regression to improve performance of MMP imitation learning, and naturally extends to the class of structured maximum margin prediction problems. (Taskar et al., 2005) Our technique is applied to navigation and planning problems for outdoor mobile robots and robotic legged locomotion.", "title": "" } ]
[ { "docid": "3cc4ba42c0174aa68dae5dc2ef928970", "text": "Software security practitioners are often torn between choosing performance or security. In particular, OS kernels are sensitive to the smallest performance regressions. This makes it difficult to develop innovative kernel hardening mechanisms: they may inevitably incur some run-time performance overhead. Here, we propose building each kernel function with and without hardening, within a single split kernel. In particular, this allows trusted processes to be run under unmodified kernel code, while system calls of untrusted processes are directed to the hardened kernel code. We show such trusted processes run with no overhead when compared to an unmodified kernel. This allows deferring the decision of making use of hardening to the run-time. This means kernel distributors, system administrators and users can selectively enable hardening according to their needs: we give examples of such cases. Although this approach cannot be directly applied to arbitrary kernel hardening mechanisms, we show cases where it can. Finally, our implementation in the Linux kernel requires few changes to the kernel sources and no application source changes. Thus, it is both maintainable and easy to use.", "title": "" }, { "docid": "3690d1655578d94f620f510c8a5e1e40", "text": "This paper presents a discrete-time option pricing model that is rooted in Reinforcement Learning (RL), and more specifically in the famous Q-Learning method of RL. We construct a riskadjusted Markov Decision Process for a discrete-time version of the classical Black-ScholesMerton (BSM) model, where the option price is an optimal Q-function, while the optimal hedge is a second argument of this optimal Q-function, so that both the price and hedge are parts of the same formula. Pricing is done by learning to dynamically optimize risk-adjusted returns for an option replicating portfolio, as in the Markowitz portfolio theory. Using Q-Learning and related methods, once created in a parametric setting, the model is able to go model-free and learn to price and hedge an option directly from data generated from a dynamic replicating portfolio which is rebalanced at discrete times. If the world is according to BSM, our risk-averse Q-Learner converges, given enough training data, to the true BSM price and hedge ratio of the option in the continuous time limit ∆t → 0, even if hedges applied at the stage of data generation are completely random (i.e. it can learn the BSM model itself, too!), because QLearning is an off-policy algorithm. If the world is different from a BSM world, the Q-Learner will find it out as well, because Q-Learning is a model-free algorithm. For finite time steps ∆t, the Q-Learner is able to efficiently calculate both the optimal hedge and optimal price for the option directly from trading data, and without an explicit model of the world. This suggests that RL may provide efficient data-driven and model-free methods for optimal pricing and hedging of options, once we depart from the academic continuous-time limit ∆t → 0, and vice versa, option pricing methods developed in Mathematical Finance may be viewed as special cases of model-based Reinforcement Learning. Further, due to simplicity and tractability of our model which only needs basic linear algebra (plus Monte Carlo simulation, if we work with synthetic data), and its close relation to the original BSM model, we suggest that our model could be used for benchmarking of different RL algorithms for financial trading applications. I would like to thank my students for their interest in this work and stimulating discussions that challenged me to look for simple explanations of complex topics. I thank Tom N.L. for an initial implementation of a timediscretized BSM model. This work is dedicated to my wife Lola on the occasion of her birthday and receiving a doctoral degree.", "title": "" }, { "docid": "37a0c6ac688c7d7f2dd622ebbe3ec184", "text": "Prior research shows that directly applying phrase-based SMT on lexical tokens to migrate Java to C# produces much semantically incorrect code. A key limitation is the use of sequences in phrase-based SMT to model and translate source code with well-formed structures. We propose mppSMT, a divide-and-conquer technique to address that with novel training and migration algorithms using phrase-based SMT in three phases. First, mppSMT treats a program as a sequence of syntactic units and maps/translates such sequences in two languages to one another. Second, with a syntax-directed fashion, it deals with the tokens within syntactic units by encoding them with semantic symbols to represent their data and token types. This encoding via semantic symbols helps better migration of API usages. Third, the lexical tokens corresponding to each sememe are mapped or migrated. The resulting sequences of tokens are merged together to form the final migrated code. Such divide-and-conquer and syntax-direction strategies enable phrase-based SMT to adapt well to syntactical structures in source code, thus, improving migration accuracy. Our empirical evaluation on several real-world systems shows that 84.8 -- 97.9% and 70 -- 83% of the migrated methods are syntactically and semantically correct, respectively. 26.3 -- 51.2% of total migrated methods are exactly matched to the human-written C# code in the oracle. Compared to Java2CSharp, a rule-based migration tool, it achieves higher semantic accuracy from 6.6 -- 57.7% relatively. Importantly, it does not require manual labeling for training data or manual definition of rules.", "title": "" }, { "docid": "5b2a2079025d899b7ce4184ee824e8e8", "text": "This paper presents a control scheme based on deep reinforcement learning for a two-dimensional positioning system with electromagnetic actuators. Two neuro-controllers are trained and used for controlling the X-Y position of an object. The neuro-controllers learning approach is based on the actor-critic architecture and the deep deterministic policy gradient (DDPG) algorithm using the Q-learning method. The performance of the control system is verified for different setpoints and working conditions.", "title": "" }, { "docid": "e010c9ce6606ae64904a95bde0d1dfe8", "text": "OBJECT\nThe extent of tumor resection that should be undertaken in patients with glioblastoma multiforme (GBM) remains controversial. The purpose of this study was to identify significant independent predictors of survival in these patients and to determine whether the extent of resection was associated with increased survival time.\n\n\nMETHODS\nThe authors retrospectively analyzed 416 consecutive patients with histologically proven GBM who underwent tumor resection at the authors' institution between June 1993 and June 1999. Volumetric data and other tumor characteristics identified on magnetic resonance (MR) imaging were collected prospectively.\n\n\nCONCLUSIONS\nFive independent predictors of survival were identified: age, Karnofsky Performance Scale (KPS) score, extent of resection, and the degree of necrosis and enhancement on preoperative MR imaging studies. A significant survival advantage was associated with resection of 98% or more of the tumor volume (median survival 13 months, 95% confidence interval [CI] 11.4-14.6 months), compared with 8.8 months (95% CI 7.4-10.2 months; p < 0.0001) for resections of less than 98%. Using an outcome scale ranging from 0 to 5 based on age, KPS score, and tumor necrosis on MR imaging, we observed significantly longer survival in patients with lower scores (1-3) who underwent aggressive resections, and a trend toward slightly longer survival was found in patients with higher scores (4-5). Gross-total tumor resection is associated with longer survival in patients with GBM, especially when other predictive variables are favorable.", "title": "" }, { "docid": "ce858818f7575684a6f3479c3124fffd", "text": "Most object detection systems consist of three stages. First, a set of individual hypotheses for object locations is generated using a proposal generating algorithm. Second, a classifier scores every generated hypothesis independently to obtain a multi-class prediction. Finally, all scored hypotheses are filtered via a non-differentiable and decoupled non-maximum suppression (NMS) post-processing step. In this paper, we propose a filtering network (FNet), a method which replaces NMS with a differentiable neural network that allows joint reasoning and rescoring of the generated set of hypotheses per image. This formulation enables end-to-end training of the full object detection pipeline. First, we demonstrate that FNet, a feed-forward network architecture, is able to mimic NMS decisions, despite the sequential nature of NMS. We further analyze NMS failures and propose a loss formulation that is better aligned with the mean average precision (mAP) evaluation metric. We evaluate FNet on several standard detection datasets. Results surpass standard NMS on highly occluded settings of a synthetic overlapping MNIST dataset and show competitive behavior on PascalVOC2007 and KITTI detection benchmarks.", "title": "" }, { "docid": "c030e7906593d7ce2854c4dfafe12d95", "text": "Design and implementation of a PGA-based controller is presented in this paper. First general control scheme for resonant inverter is introduced and the PGA-based controller construction is given. Then the small signal model of the close loop system for a resonant inverter is analyzed. Thus compensator can be designed. Moreover, the key functional blocks within FPGA including variable frequency pulse width modulator (VFPWM), PLL and power control loop are discussed in detail. Finally experimental architecture and results are given.", "title": "" }, { "docid": "103f4a18b4ae42756fef6ae583c4d742", "text": "The Essex intelligent dormitory, iDorm, uses embedded agents to create an ambient-intelligence environment. In a five-and-a-half-day experiment, a user occupied the iDorm, testing its ability to learn user behavior and adapt to user needs. The embedded agent discreetly controls the iDorm according to user preferences. Our work focuses on developing learning and adaptation techniques for embedded agents. We seek to provide online, lifelong, personalized learning of anticipatory adaptive control to realize the ambient-intelligence vision in ubiquitous-computing environments. We developed the Essex intelligent dormitory, or iDorm, as a test bed for this work and an exemplar of this approach.", "title": "" }, { "docid": "0aa8a611e7ea7934e52a1cb2cd46a579", "text": "The software defined networking (SDN) paradigm promises to dramatically simplify network configuration and resource management. Such features are extremely valuable to network operators and therefore, the industrial (besides the academic) research and development community is paying increasing attention to SDN. Although wireless equipment manufacturers are increasing their involvement in SDN-related activities, to date there is not a clear and comprehensive understanding of what are the opportunities offered by SDN in most common networking scenarios involving wireless infrastructureless communications and how SDN concepts should be adapted to suit the characteristics of wireless and mobile communications. This paper is a first attempt to fill this gap as it aims at analyzing how SDN can be beneficial in wireless infrastructureless networking environments with special emphasis on wireless personal area networks (WPAN). Furthermore, a possible approach (called SDWN) for such environments is presented and some design guidelines are provided.", "title": "" }, { "docid": "af3fe6b35f345a604d06999b06623072", "text": "Cross-language plagiarism detection deals with the automatic identification and extraction of plagiarism in a multilingual setting. In this setting, a suspicious document is given, and the task is to retrieve all sections from the document that originate from a large, multilingual document collection. Our contributions in this field are as follows: (i) a comprehensive retrieval process for cross-language plagiarism detection is introduced, highlighting the differences to monolingual plagiarism detection, (ii) state-of-the-art solutions for two important subtasks are reviewed, (iii) retrieval models for the assessment of cross-language similarity are surveyed, and, (iv) the three models CL-CNG, CL-ESA and CL-ASA are compared. Our evaluation is of realistic scale: it relies on 120 000 test documents which are selected from the corpora JRC-Acquis and Wikipedia, so that for each test document highly similar documents are available in all of the 6 languages English, German, Spanish, French, Dutch, and Polish. The models are employed in a series of ranking tasks, and more than 100 million similarities are computed with each model. The results of our evaluation indicate that CL-CNG, despite its simple approach, is the best choice to rank and compare texts across languages if they are syntactically related. CL-ESA almost matches the performance of CL-CNG, but on arbitrary pairs of languages. CL-ASA works best on “exact” translations but does not generalize well.", "title": "" }, { "docid": "88e97dc5105ef142d422bec88e897ddd", "text": "This paper reports on an experiment realized on the IBM 5Q chip which demonstrates strong evidence for the advantage of using error detection and fault-tolerant design of quantum circuits. By showing that fault-tolerant quantum computation is already within our reach, the author hopes to encourage this approach.", "title": "" }, { "docid": "35ffdb3e5b2ac637f7e8d796c4cdc97e", "text": "Pedestrian detection in real world scenes is a challenging problem. In recent years a variety of approaches have been proposed, and impressive results have been reported on a variety of databases. This paper systematically evaluates (1) various local shape descriptors, namely Shape Context and Local Chamfer descriptor and (2) four different interest point detectors for the detection of pedestrians. Those results are compared to the standard global Chamfer matching approach. A main result of the paper is that Shape Context trained on real edge images rather than on clean pedestrian silhouettes combined with the Hessian-Laplace detector outperforms all other tested approaches.", "title": "" }, { "docid": "1e710793567f19377cba5aac1587ec05", "text": "Recently, there have been great interests for computer-aided diagnosis of Alzheimer’s disease (AD) and its prodromal stage, mild cognitive impairment (MCI). Unlike the previous methods that considered simple low-level features such as gray matter tissue volumes from MRI, and mean signal intensities from PET, in this paper, we propose a deep learning-based latent feature representation with a stacked auto-encoder (SAE). We believe that there exist latent non-linear complicated patterns inherent in the low-level features such as relations among features. Combining the latent information with the original features helps build a robust model in AD/MCI classification, with high diagnostic accuracy. Furthermore, thanks to the unsupervised characteristic of the pre-training in deep learning, we can benefit from the target-unrelated samples to initialize parameters of SAE, thus finding optimal parameters in fine-tuning with the target-related samples, and further enhancing the classification performances across four binary classification problems: AD vs. healthy normal control (HC), MCI vs. HC, AD vs. MCI, and MCI converter (MCI-C) vs. MCI non-converter (MCI-NC). In our experiments on ADNI dataset, we validated the effectiveness of the proposed method, showing the accuracies of 98.8, 90.7, 83.7, and 83.3 % for AD/HC, MCI/HC, AD/MCI, and MCI-C/MCI-NC classification, respectively. We believe that deep learning can shed new light on the neuroimaging data analysis, and our work presented the applicability of this method to brain disease diagnosis.", "title": "" }, { "docid": "126e8ee3eafa69206b91a64f4b08185e", "text": "BACKGROUND\nAccumulating evidence indicates that prenatal maternal and fetal processes can have a lasting influence on infant and child development. Results from animal models indicate that prenatal exposure to maternal stress and stress hormones has lasting consequences for development of the offspring. Few prospective studies of human pregnancy have examined the consequences of prenatal exposure to stress and stress hormones.\n\n\nMETHOD\nIn this study the effects of prenatal maternal psychosocial (anxiety, depression, and perceived stress) and endocrine (cortisol) indicators of stress on infant temperament were examined in a sample of 247 full-term infants. Maternal salivary cortisol and psychological state were evaluated at 18-20, 24-26, and 30-32 weeks of gestation and at 2 months postpartum. Infant temperament was assessed with a measure of negative reactivity (the fear subscale of the Infant Temperament Questionnaire) at 2 months of age.\n\n\nRESULTS\nElevated maternal cortisol at 30-32 weeks of gestation, but not earlier in pregnancy, was significantly associated with greater maternal report of infant negative reactivity. Prenatal maternal anxiety and depression additionally predicted infant temperament. The associations between maternal cortisol and maternal depression remained after controlling for postnatal maternal psychological state.\n\n\nCONCLUSIONS\nThese data suggest that prenatal exposure to maternal stress has consequences for the development of infant temperament.", "title": "" }, { "docid": "13d913cba71b9c0308b67cfe7c625dbd", "text": "This paper presents an approach to image understanding on the aspect of unsupervised scene segmentation. With the goal of image understanding in mind, we consider ‘unsupervised scene segmentation’ a task of dividing a given image into semantically meaningful regions without using annotation or other human-labeled information. We seek to investigate how well an algorithm can achieve at partitioning an image with limited human-involved learning procedures. Specifically, we are interested in developing an unsupervised segmentation algorithm that only relies on the contextual prior learned from a set of images. Our algorithm incorporates a small set of images that are similar to the input image in their scene structures. We use the sparse coding technique to analyze the appearance of this set of images; the effectiveness of sparse coding allows us to derive a priori the context of the scene from the set of images. Gaussian mixture models can then be constructed for different parts of the input image based on the sparse-coding contextual prior, and can be combined into an Markov-random-field-based segmentation process. The experimental results show that our unsupervised segmentation algorithm is able to partition an image into semantic regions, such as buildings, roads, trees, and skies, without using human-annotated information. The semantic regions generated by our algorithm can be useful, as pre-processed inputs for subsequent classification-based labeling algorithms, in achieving automatic scene annotation and scene parsing.", "title": "" }, { "docid": "716ffa93dad3c9cc533ff3861ecfa776", "text": "We present a 3D shape retrieval methodology based on the theory of spherical harmonics. Using properties of spherical harmonics, scaling and axial flipping invariance is achieved. Rotation normalization is performed by employing the continuous principal component analysis along with a novel approach which applies PCA on the face normals of the model. The 3D model is decomposed into a set of spherical functions which represents not only the intersections of the corresponding surface with rays emanating from the origin but also points in the direction of each ray which are closer to the origin than the furthest intersection point. The superior performance of the proposed methodology is demonstrated through a comparison against state-of-the-art approaches on standard databases. 2007 Pattern Recognition Society. Published by Elsevier Ltd. All rights reserved.", "title": "" }, { "docid": "c549fd965f95eb3a22bbc5f574b32b9e", "text": "Branchial cleft cysts are benign lesions caused by anomalous development of the brachial cleft. This report describes a 20-year-old girl with swelling on the right lateral aspect of the neck, which expanded slowly but progressively. The clinical suspicion was that of a branchial cleft cyst. Sonography revealed a homogeneously hypo- to anechoic mass with well-defined margins and no intralesional septa. Color Doppler reviewed no internal vascularization. The ultrasound examination confirmed the clinical diagnosis of a second branchial cleft cyst, demonstrating the cystic nature of the mass and excluding the presence of complications. For superficial lesions like these, ultrasound is the first-level imaging study of choice because it is non-invasive, rapid, low-cost, and does not involve exposure to ionizing radiation.", "title": "" }, { "docid": "e2bc0f8d8275b93e8559b460590149c8", "text": "Lot of research work has been done on cluster based mining on relational databases. K-means is a basic algorithm, which is used in many of them. The main drawback of k-means is that it does not give a high precision rate and results are affected by random initialization of cluster centroids. It may produce empty clusters depending on the initial centroids, which reduce the performance of the system. In this paper, we have proposed an Improved K-means algorithm, which improve data clustering by removing empty clusters. Further, it improves the computational time of the algorithm by reusing stored information of previous iterations. The results obtained from our experiments show improvement in accuracy, precision rate and efficiency of the algorithm. The complexity of the algorithm is also reduced from O(nlk) to O(nk).", "title": "" }, { "docid": "a21019afc7b68aad2e5b98b21fb02e99", "text": "Analytics is the future of big data because only transforming data into information gives them value and can turn data in business in competitive advantage. Large data volumes, their variety and the increasing speed their growth, stretch the boundaries of traditional data warehouses and ETL tools. This paper investigates the benefits of Big Data technology and main methods of analysis that can be applied to the particular case of fraud detection in public health insurance system in Romania.", "title": "" }, { "docid": "3c7d25c85b837a3337c93ca2e1e54af4", "text": "BACKGROUND\nThe treatment of acne scars with fractional CO(2) lasers is gaining increasing impact, but has so far not been compared side-by-side to untreated control skin.\n\n\nOBJECTIVE\nIn a randomized controlled study to examine efficacy and adverse effects of fractional CO(2) laser resurfacing for atrophic acne scars compared to no treatment.\n\n\nMETHODS\nPatients (n = 13) with atrophic acne scars in two intra-individual areas of similar sizes and appearances were randomized to (i) three monthly fractional CO(2) laser treatments (MedArt 610; 12-14 W, 48-56 mJ/pulse, 13% density) and (ii) no treatment. Blinded on-site evaluations were performed by three physicians on 10-point scales. Endpoints were change in scar texture and atrophy, adverse effects, and patient satisfaction.\n\n\nRESULTS\nPreoperatively, acne scars appeared with moderate to severe uneven texture (6.15 ± 1.23) and atrophy (5.72 ± 1.45) in both interventional and non-interventional control sites, P = 1. Postoperatively, lower scores of scar texture and atrophy were obtained at 1 month (scar texture 4.31 ± 1.33, P < 0.0001; atrophy 4.08 ± 1.38, P < 0.0001), at 3 months (scar texture 4.26 ± 1.97, P < 0.0001; atrophy 3.97 ± 2.08, P < 0.0001), and at 6 months (scar texture 3.89 ± 1.7, P < 0.0001; atrophy 3.56 ± 1.76, P < 0.0001). Patients were satisfied with treatments and evaluated scar texture to be mild or moderately improved. Adverse effects were minor.\n\n\nCONCLUSIONS\nIn this single-blinded randomized controlled trial we demonstrated that moderate to severe atrophic acne scars can be safely improved by ablative fractional CO(2) laser resurfacing. The use of higher energy levels might have improved the results and possibly also induced significant adverse effects.", "title": "" } ]
scidocsrr
289ce329470af9e6b54bd23244088c24
Modeling and synthesizing task placement constraints in Google compute clusters
[ { "docid": "fa008caa1176f007e0c1c55d752e034a", "text": "The analysis of workloads is important for understanding how systems are used. In addition, workload models are needed as input for the evaluation of new system designs, and for the comparison of system designs. This is especially important in costly largescale parallel systems. Luckily, workload data are available in the form of accounting logs. Using such logs from three different sites, we analyze and model the job-level workloads with an emphasis on those aspects that are universal to all sites. As many distributions turn out to span a large range, we typically first apply a logarithmic transformation to the data, and then fit it to a novel hyperGamma distribution or one of its special cases. This is a generalization of distributions proposed previously, and leads to good goodness-of-fit scores. The parameters for the distribution are found using the iterative EM algorithm. The results of the analysis have been codified in a modeling program that creates a synthetic workload based on the results of the analysis. r 2003 Elsevier Inc. All rights reserved.", "title": "" } ]
[ { "docid": "be01fc6b7c89259c1aa06ccbfb6402c3", "text": "Nowadays, automakers have invested in new technologies in order to improve the efficiency of their products. Giant automakers have taken an important step toward achieving this objective by designing continuously variable transmission systems (CVT) to continuously adapt the power of the engine with the external load according to the optimum efficiency curve of engine and reducing fuel consumption; beside, making smooth start up and removing the shock caused by changing the gear ratio and making more pleasurable driving. Considering the specifications of one of Iranian automaker products (the Saipa Pride 131), a CVT with a metal pushing belt and variable pulleys have been designed to replace its current manual transmission system. The necessary parts and components for the CVT have been determined and considering the necessary constraints, its mechanism and components have been designed.", "title": "" }, { "docid": "8589033e3627f42c3179a7f3ccbadf9f", "text": "Although recent research has shown that social cognition and emotion engage overlapping regions of the brain, few accounts of this overlap have been offered. What systems might be commonly or distinctively involved in each? The close functional relationship between social cognition and emotion might be understood in terms of a central role for mental state attribution in the understanding, learning and regulation of emotion. In each of these cases, mental state attributions might be supported by either stimulus-driven or more reflective processes.", "title": "" }, { "docid": "81a9907ddc512cbf74e1b10ac620f910", "text": "Spent coffee grounds (SCG) were extracted with an environmentally friendly procedure and analyzed to evaluate the recovery of relevant natural antioxidants for use as nutritional supplements, foods, or cosmetic additives. SCG were characterized in terms of their total phenolic content by the Folin-Ciocalteu procedure and antioxidant activity by the DPPH scavenging assay. Flavonoid content was also determined by a colorimetric assay. The total phenolic content was strongly correlated with the DPPH scavenging activity, suggesting that phenolic compounds are mainly responsible for the antioxidant activity of SCG. An UHPLC-PDA-TOF-MS system was used to separate, identify, and quantify phenolic and nonphenolic compounds in the SCG extracts. Important amounts of chlorogenic acids (CGA) and related compounds as well as caffeine (CAF) evidenced the high potential of SCG, a waste material that is widely available in the world, as a source of natural phenolic antioxidants.", "title": "" }, { "docid": "e620d0ddbdaf2dbfa6ad23f77f40d603", "text": "The design of line-start Synchronous Reluctance machines is proposed, based on the state of the art of motors designed for closed loop, vector control. The guidelines for overcoming the dilemma between synchronization capability and steady state performance are given, with examples of good and bad design choices. The proposed solutions compared via finite element analysis with a competitor induction motor in terms of efficiency and power factor. The finite element calculations are finally validated via experiments on a laboratory prototype.", "title": "" }, { "docid": "6cb246cadd7df12543d23a83d42d87a1", "text": "New waves of consumer-centric applications, such as voice search and voice interaction with mobile devices and home entertainment systems, increasingly require automatic speech recognition (ASR) to be robust to the full range of real-world noise and other acoustic distorting conditions. Despite its practical importance, however, the inherent links between and distinctions among the myriad of methods for noise-robust ASR have yet to be carefully studied in order to advance the field further. To this end, it is critical to establish a solid, consistent, and common mathematical foundation for noise-robust ASR, which is lacking at present. This article is intended to fill this gap and to provide a thorough overview of modern noise-robust techniques for ASR developed over the past 30 years. We emphasize methods that are proven to be successful and that are likely to sustain or expand their future applicability. We distill key insights from our comprehensive overview in this field and take a fresh look at a few old problems, which nevertheless are still highly relevant today. Specifically, we have analyzed and categorized a wide range of noise-robust techniques using five different criteria: 1) feature-domain vs. model-domain processing, 2) the use of prior knowledge about the acoustic environment distortion, 3) the use of explicit environment-distortion models, 4) deterministic vs. uncertainty processing, and 5) the use of acoustic models trained jointly with the same feature enhancement or model adaptation process used in the testing stage. With this taxonomy-oriented review, we equip the reader with the insight to choose among techniques and with the awareness of the performance-complexity tradeoffs. The pros and cons of using different noise-robust ASR techniques in practical application scenarios are provided as a guide to interested practitioners. The current challenges and future research directions in this field is also carefully analyzed.", "title": "" }, { "docid": "69624d1ab7b438d5ff4b5192f492a11a", "text": "1. SLICED PROGRAMMABLE NETWORKS OpenFlow [4] has been demonstrated as a way for researchers to run networking experiments in their production network. Last year, we demonstrated how an OpenFlow controller running on NOX [3] could move VMs seamlessly around an OpenFlow network [1]. While OpenFlow has potential [2] to open control of the network, only one researcher can innovate on the network at a time. What is required is a way to divide, or slice, network resources so that researchers and network administrators can use them in parallel. Network slicing implies that actions in one slice do not negatively affect other slices, even if they share the same underlying physical hardware. A common network slicing technique is VLANs. With VLANs, the administrator partitions the network by switch port and all traffic is mapped to a VLAN by input port or explicit tag. This coarse-grained type of network slicing complicates more interesting experiments such as IP mobility or wireless handover. Here, we demonstrate FlowVisor, a special purpose OpenFlow controller that allows multiple researchers to run experiments safely and independently on the same production OpenFlow network. To motivate FlowVisor’s flexibility, we demonstrate four network slices running in parallel: one slice for the production network and three slices running experimental code (Figure 1). Our demonstration runs on real network hardware deployed on our production network at Stanford and a wide-area test-bed with a mix of wired and wireless technologies.", "title": "" }, { "docid": "df5c384e9fb6ba57a5bbd7fef44ce5f0", "text": "CONTEXT\nPressure ulcers are common in a variety of patient settings and are associated with adverse health outcomes and high treatment costs.\n\n\nOBJECTIVE\nTo systematically review the evidence examining interventions to prevent pressure ulcers.\n\n\nDATA SOURCES AND STUDY SELECTION\nMEDLINE, EMBASE, and CINAHL (from inception through June 2006) and Cochrane databases (through issue 1, 2006) were searched to identify relevant randomized controlled trials (RCTs). UMI Proquest Digital Dissertations, ISI Web of Science, and Cambridge Scientific Abstracts were also searched. All searches used the terms pressure ulcer, pressure sore, decubitus, bedsore, prevention, prophylactic, reduction, randomized, and clinical trials. Bibliographies of identified articles were further reviewed.\n\n\nDATA SYNTHESIS\nFifty-nine RCTs were selected. Interventions assessed in these studies were grouped into 3 categories, ie, those addressing impairments in mobility, nutrition, or skin health. Methodological quality for the RCTs was variable and generally suboptimal. Effective strategies that addressed impaired mobility included the use of support surfaces, mattress overlays on operating tables, and specialized foam and specialized sheepskin overlays. While repositioning is a mainstay in most pressure ulcer prevention protocols, there is insufficient evidence to recommend specific turning regimens for patients with impaired mobility. In patients with nutritional impairments, dietary supplements may be beneficial. The incremental benefit of specific topical agents over simple moisturizers for patients with impaired skin health is unclear.\n\n\nCONCLUSIONS\nGiven current evidence, using support surfaces, repositioning the patient, optimizing nutritional status, and moisturizing sacral skin are appropriate strategies to prevent pressure ulcers. Although a number of RCTs have evaluated preventive strategies for pressure ulcers, many of them had important methodological limitations. There is a need for well-designed RCTs that follow standard criteria for reporting nonpharmacological interventions and that provide data on cost-effectiveness for these interventions.", "title": "" }, { "docid": "99ed46c953a7a00e6d9a5dbd214cae77", "text": "A number of important problems in theoretical computer science and machine learning can be interpreted as recovering a certain basis. These include certain tensor decompositions, Independent Component Analysis (ICA), spectral clustering and Gaussian mixture learning. Each of these problems reduces to an instance of our general model, which we call a “Basis Encoding Function” (BEF). We show that learning a basis within this model can then be provably and efficiently achieved using a first order iteration algorithm (gradient iteration). Our algorithm goes beyond tensor methods, providing a function-based generalization for a number of existing methods including the classical matrix power method, the tensor power iteration as well as cumulant-based FastICA. Our framework also unifies the unusual phenomenon observed in these domains that they can be solved using efficient non-convex optimization. Specifically, we describe a class of BEFs such that their local maxima on the unit sphere are in one-to-one correspondence with the basis elements. This description relies on a certain “hidden convexity” property of these functions. We provide a complete theoretical analysis of gradient iteration even when the BEF is perturbed. We show convergence and complexity bounds polynomial in dimension and other relevant parameters, such as perturbation size. Our perturbation results can be considered as a non-linear version of the classical Davis-Kahan theorem for perturbations of eigenvectors of symmetric matrices. In addition we show that our algorithm exhibits fast (superlinear) convergence and relate the speed of convergence to the properties of the BEF. Moreover, the gradient iteration algorithm can be easily and efficiently implemented in practice. Finally we apply our framework by providing the first provable algorithm for recovery in a general perturbed ICA model. ar X iv :1 41 1. 14 20 v3 [ cs .L G ] 3 N ov 2 01 5", "title": "" }, { "docid": "d623c2223c3971b3a204b3369a16bce7", "text": "Simultaneous localization, mapping and moving object tracking (SLAMMOT) involves both simultaneous localization and mapping (SLAM) in dynamic environments and detecting and tracking these dynamic objects. In this paper, we establish a mathematical framework to integrate SLAM and moving object tracking. We describe two solutions: SLAM with generalized objects, and SLAM with detection and tracking of moving objects (DATMO). SLAM with generalized objects calculates a joint posterior over all generalized objects and the robot. Such an approach is similar to existing SLAM algorithms, but with additional structure to allow for motion modeling of generalized objects. Unfortunately, it is computationally demanding and generally infeasible. SLAM with DATMO decomposes the estimation problem into two separate estimators. By maintaining separate posteriors for stationary objects and moving objects, the resulting estimation problems are much lower dimensional then SLAM with generalized objects. Both SLAM and moving object tracking from a moving vehicle in crowded urban areas are daunting tasks. Based on the SLAM with DATMO framework, we propose practical algorithms which deal with issues of perception modeling, data association, and moving object detection. The implementation of SLAM with DATMO was demonstrated using data collected from the CMU Navlab11 vehicle at high speeds in crowded urban environments. Ample experimental results shows the feasibility of the proposed theory and algorithms.", "title": "" }, { "docid": "39c097ba72618ccc901e714b855d3048", "text": "In this paper we present a pattern for growth mindset development. We believe that students can be taught to positively change their mindset, where experience, training, and personal effort can add to a unique student's genetic endowment. We use our long years' experience and synthesized facilitation methods and techniques to assess insight mentoring and to improve it through growth mindset development. These can help students make creative changes in their life and see the world with new eyes in a new way. The pattern allows developing a growth mindset and improving our lives and the lives of those around us.", "title": "" }, { "docid": "34511b4ab4a5e3b8cfa914cb8b943dac", "text": "Hybrid automata model systems with both digital and analog components, such az embedded control programs. Many verification tasks for such programs can be expressed as reachability problems for hybrid automata. By improving on previous decidability and undecidability results, we identify the precise boundary between decidability and undecidability of the reachability problem for hybrid automata. On the positive side, we give an (optimal) PSPACE reachability algorithm for the case of initialized rectangular automata, where all analog variables follow trajectories within piecewise-linear envelopes and are reinitialized whenever the envelope changes. Our algorithm is based on a translation of an initialized rectangular automaton into a timed automaton that defines the same timed language. The translation has practical significance for verification, because it guarantees the termination of symbolic procedures for the reachability analysis of initialized rectangular automata. On the negative side, we show that several slight generalizations of initialized rectangular automata lead to an undecidable reachability problem. In particular, we prove that the reachability problem is undecidable for timed automata with a single stopwatch.", "title": "" }, { "docid": "bc8b40babfc2f16144cdb75b749e3a90", "text": "The Bitcoin scheme is a rare example of a large scale global payment system in which all the transactions are publicly accessible (but in an anonymous way). We downloaded the full history of this scheme, and analyzed many statistical properties of its associated transaction graph. In this paper we answer for the first time a variety of interesting questions about the typical behavior of users, how they acquire and how they spend their bitcoins, the balance of bitcoins they keep in their accounts, and how they move bitcoins between their various accounts in order to better protect their privacy. In addition, we isolated all the large transactions in the system, and discovered that almost all of them are closely related to a single large transaction that took place in November 2010, even though the associated users apparently tried to hide this fact with many strange looking long chains and fork-merge structures in the transaction graph.", "title": "" }, { "docid": "fb9afce9cc1683cb3adc2e3c747758e4", "text": "Hundreds of millions of users each day use web search engines to meet their information needs. Advances in web search effectiveness are therefore perhaps the most significant public outcomes of IR research. Query expansion is one such method for improving the effectiveness of ranked retrieval by adding additional terms to a query. In previous approaches to query expansion, the additional terms are selected from highly ranked documents returned from an initial retrieval run. We propose a new method of obtaining expansion terms, based on selecting terms from past user queries that are associated with documents in the collection. Our scheme is effective for query expansion for web retrieval: our results show relative improvements over unexpanded full text retrieval of 26%--29%, and 18%--20% over an optimised, conventional expansion approach.", "title": "" }, { "docid": "3d8345898c5d058217447de807027902", "text": "A problem in the design of decision aids is how to design them so that decision makers will trust them and therefore use them appropriately. This problem is approached in this paper by taking models of trust between humans as a starting point, and extending these to the human-machine relationship. A definition and model of human-machine trust are proposed, and the dynamics of trust between humans and machines are examined. Based upon this analysis, recommendations are made for calibrating users' trust in decision aids.", "title": "" }, { "docid": "afb60fbc42d447a7cc539c57b429bf8d", "text": "We propose a technique that propagates information forward through video data. The method is conceptually simple and can be applied to tasks that require the propagation of structured information, such as semantic labels, based on video content. We propose a Video Propagation Network that processes video frames in an adaptive manner. The model is applied online: it propagates information forward without the need to access future frames. In particular we combine two components, a temporal bilateral network for dense and video adaptive filtering, followed by a spatial network to refine features and increased flexibility. We present experiments on video object segmentation and semantic video segmentation and show increased performance comparing to the best previous task-specific methods, while having favorable runtime. Additionally we demonstrate our approach on an example regression task of color propagation in a grayscale video.", "title": "" }, { "docid": "22bcd1d04c92bc6c108638df91997e9b", "text": "State of the art automatic optimization of OpenCL applications focuses on improving the performance of individual compute kernels. Programmers address opportunities for inter-kernel optimization in specific applications by ad-hoc hand tuning: manually fusing kernels together. However, the complexity of interactions between host and kernel code makes this approach weak or even unviable for applications involving more than a small number of kernel invocations or a highly dynamic control flow, leaving substantial potential opportunities unexplored. It also leads to an over complex, hard to maintain code base. We present Helium, a transparent OpenCL overlay which discovers, manipulates and exploits opportunities for inter-and intra-kernel optimization. Helium is implemented as preloaded library and uses a delay-optimize-replay mechanism in which kernel calls are intercepted, collectively optimized, and then executed according to an improved execution plan. This allows us to benefit from composite optimizations, on large, dynamically complex applications, with no impact on the code base. Our results show that Helium obtains at least the same, and frequently even better performance, than carefully handtuned code. Helium outperforms hand-optimized code where the exact dynamic composition of compute kernel cannot be known statically. In these cases, we demonstrate speedups of up to 3x over unoptimized code and an average speedup of 1.4x over hand optimized code.", "title": "" }, { "docid": "1f8ac49b7e723a3ac45307211ce80d6e", "text": "Morphological development, including the body proportions, fins, pigmentation and labyrinth organ, in laboratory-hatched larval and juvenile three-spot gourami Trichogaster trichopterus was described. In addition, some wild larval and juvenile specimens were observed for comparison. Body lengths of larvae and juveniles were 2.5 ± 0.1 mm just after hatching (day 0) and 9.2 ± 1.4 mm on day 22, reaching 20.4 ± 5.0 mm on day 40. Aggregate fin ray numbers attained their full complements in juveniles >11.9 mm BL. Preflexion larvae started feeding on day 3 following upper and lower jaw formation, the yolk being completely absorbed by day 11. Subsequently, oblong conical teeth appeared in postflexion larvae >6.4 mm BL (day 13). Melanophores on the body increased with growth, and a large spot started forming at the caudal margin of the body in flexion postlarvae >6.7 mm BL, followed by a second large spot positioned posteriorly on the midline in postflexion larvae >8.6 mm BL. The labyrinth organ differentiated in postflexion larvae >7.9 mm BL (day 19). For eye diameter and the first soft fin ray of pelvic fin length, the proportions in laboratory-reared specimens were smaller than those in wild specimens in 18.5–24.5 mm BL. The pigmentation pattern of laboratory-reared fish did not distinctively differ from that in the wild ones. Comparisons with larval and juvenile morphology of a congener T. pectoralis revealed several distinct differences, particularly in the numbers of myomeres, pigmentations and the proportional length of the first soft fin ray of the pelvic fin.", "title": "" }, { "docid": "e4f3337ce89cac4531ec3e7602d331ba", "text": "Existing object proposal algorithms usually search for possible object regions over multiple locations and scales separately, which ignore the interdependency among different objects and deviate from the human perception procedure. To incorporate global interdependency between objects into object localization, we propose an effective Tree-structured Reinforcement Learning (Tree-RL) approach to sequentially search for objects by fully exploiting both the current observation and historical search paths. The Tree-RL approach learns multiple searching policies through maximizing the long-term reward that reflects localization accuracies over all the objects. Starting with taking the entire image as a proposal, the Tree-RL approach allows the agent to sequentially discover multiple objects via a tree-structured traversing scheme. Allowing multiple near-optimal policies, Tree-RL offers more diversity in search paths and is able to find multiple objects with a single feedforward pass. Therefore, Tree-RL can better cover different objects with various scales which is quite appealing in the context of object proposal. Experiments on PASCAL VOC 2007 and 2012 validate the effectiveness of the Tree-RL, which can achieve comparable recalls with current object proposal algorithms via much fewer candidate windows.", "title": "" }, { "docid": "97adb3a003347f579706cd01a762bdc9", "text": "The Universal Serial Bus (USB) is an extremely popular interface standard for computer peripheral connections and is widely used in consumer Mass Storage Devices (MSDs). While current consumer USB MSDs provide relatively high transmission speed and are convenient to carry, the use of USB MSDs has been prohibited in many commercial and everyday environments primarily due to security concerns. Security protocols have been previously proposed and a recent approach for the USB MSDs is to utilize multi-factor authentication. This paper proposes significant enhancements to the three-factor control protocol that now makes it secure under many types of attacks including the password guessing attack, the denial-of-service attack, and the replay attack. The proposed solution is presented with a rigorous security analysis and practical computational cost analysis to demonstrate the usefulness of this new security protocol for consumer USB MSDs.", "title": "" }, { "docid": "28d1e4683ea4a3261f6a8a24f2870479", "text": "Memetic computation is a paradigm that uses the notion of meme(s) as units of information encoded in computational representations for the purpose of problem-solving. It covers a plethora of potentially rich meme-inspired computing methodologies, frameworks and operational algorithms including simple hybrids, adaptive hybrids and memetic automaton. In this paper, a comprehensive multi-facet survey of recent research in memetic computation is presented.", "title": "" } ]
scidocsrr
0db971cbfe8ef8f9ad0afa755a4c77f8
A Wideband-to-Narrowband Tunable Antenna Using A Reconfigurable Filter
[ { "docid": "e9f9a7c506221bacf966808f54c4f056", "text": "Reconfigurable antennas, with the ability to radiate more than one pattern at different frequencies and polarizations, are necessary in modern telecommunication systems. The requirements for increased functionality (e.g., direction finding, beam steering, radar, control, and command) within a confined volume place a greater burden on today's transmitting and receiving systems. Reconfigurable antennas are a solution to this problem. This paper discusses the different reconfigurable components that can be used in an antenna to modify its structure and function. These reconfiguration techniques are either based on the integration of radio-frequency microelectromechanical systems (RF-MEMS), PIN diodes, varactors, photoconductive elements, or on the physical alteration of the antenna radiating structure, or on the use of smart materials such as ferrites and liquid crystals. Various activation mechanisms that can be used in each different reconfigurable implementation to achieve optimum performance are presented and discussed. Several examples of reconfigurable antennas for both terrestrial and space applications are highlighted, such as cognitive radio, multiple-input-multiple-output (MIMO) systems, and satellite communication.", "title": "" }, { "docid": "76081fd0b4e06c6ee5d7f1e5cef7fe84", "text": "Systematic procedure is described for designing bandpass filters with wide bandwidths based on parallel coupled three-line microstrip structures. It is found that the tight gap sizes between the resonators of end stages and feed lines, required for wideband filters based on traditional coupled line design, can be greatly released. The relation between the circuit parameters of a three-line coupling section and an admittance inverter circuit is derived. A design graph for substrate with /spl epsiv//sub r/=10.2 is provided. Two filters of orders 3 and 5 with fractional bandwidths 40% and 50%, respectively, are fabricated and measured. Good agreement between prediction and measurement is obtained.", "title": "" } ]
[ { "docid": "8ef991aaa84e2d72e37f14d6cb7d7a4a", "text": "This research investigates the paradox of creativity in autism. That is, whether people with subclinical autistic traits have cognitive styles conducive to creativity or whether they are disadvantaged by the implied cognitive and behavioural rigidity of the autism phenotype. The relationship between divergent thinking (a cognitive component of creativity), perception of ambiguous figures, and self-reported autistic traits was evaluated in 312 individuals in a non-clinical sample. High levels of autistic traits were significantly associated with lower fluency scores on the divergent thinking tasks. However autistic traits were associated with high numbers of unusual responses on the divergent thinking tasks. Generation of novel ideas is a prerequisite for creative problem solving and may be an adaptive advantage associated with autistic traits.", "title": "" }, { "docid": "53afae9502234d778015f172fc1c3a68", "text": "Polynomial chaos expansions (PCE) are an attractive technique for uncertainty quantification (UQ) due to their strong mathematical basis and ability to produce functional representations of stochastic variability. When tailoring the orthogonal polynomial bases to match the forms of the input uncertainties in a Wiener-Askey scheme, excellent convergence properties can be achieved for general probabilistic analysis problems. Non-intrusive PCE methods allow the use of simulations as black boxes within UQ studies, and involve the calculation of chaos expansion coefficients based on a set of response function evaluations. These methods may be characterized as being either Galerkin projection methods, using sampling or numerical integration, or regression approaches (also known as point collocation or stochastic response surfaces), using linear least squares. Numerical integration methods may be further categorized as either tensor product quadrature or sparse grid Smolyak cubature and as either isotropic or anisotropic. Experience with these approaches is presented for algebraic and PDE-based benchmark test problems, demonstrating the need for accurate, efficient coefficient estimation approaches that scale for problems with significant numbers of random variables.", "title": "" }, { "docid": "18278db21edaef3446c2bbaa976d88ef", "text": "In the current IoT (Internet of Things) environment, more and more Things: devices, objects, sensors, and everyday items not usually considered computers, are connected to the Internet, and these Things affect and change our social life and economic activities. By using IoTs, service providers can collect and store personal information in the real world, and such providers can gain access to detailed behaviors of the user. Although service providers offer users new services and numerous benefits using their detailed information, most users have concerns about the privacy and security of their personal data. Thus, service providers need to take countermeasures to eliminate those concerns. To help eliminate those concerns, first we conduct a survey regarding users’ privacy and security concerns about IoT services, and then we analyze data collected from the survey using structural equation modeling (SEM). Analysis of the results provide answers to issues of privacy and security concerns to service providers and their users. And we also analyze the effectiveness and effects of personal information management and protection functions in IoT services. key words: IoT (Internet of Things), privacy, security, SEM (Structural Equation Modeling)", "title": "" }, { "docid": "c66386207b13f1352af3c20832a3b5b4", "text": "Audio tagging aims to perform multi-label classification on audio chunks and it is a newly proposed task in the Detection and Classification of Acoustic Scenes and Events 2016 (DCASE 2016) challenge. This task encourages research efforts to better analyze and understand the content of the huge amounts of audio data on the web. The difficulty in audio tagging is that it only has a chunk-level label without a frame-level label. This paper presents a weakly supervised method to not only predict the tags but also indicate the temporal locations of the occurred acoustic events. The attention scheme is found to be effective in identifying the important frames while ignoring the unrelated frames. The proposed framework is a deep convolutional recurrent model with two auxiliary modules: an attention module and a localization module. The proposed algorithm was evaluated on the Task 4 of DCASE 2016 challenge. State-of-the-art performance was achieved on the evaluation set with equal error rate (EER) reduced from 0.13 to 0.11, compared with the convolutional recurrent baseline system.", "title": "" }, { "docid": "aa7b187adf8478465e580e43730e9d40", "text": "Vehicle detection in aerial images, being an interesting but challenging problem, plays an important role for a wide range of applications. Traditional methods are based on sliding-window search and handcrafted or shallow-learning-based features with heavy computational costs and limited representation power. Recently, deep learning algorithms, especially region-based convolutional neural networks (R-CNNs), have achieved state-of-the-art detection performance in computer vision. However, several challenges limit the applications of R-CNNs in vehicle detection from aerial images: 1) vehicles in large-scale aerial images are relatively small in size, and R-CNNs have poor localization performance with small objects; 2) R-CNNs are particularly designed for detecting the bounding box of the targets without extracting attributes; 3) manual annotation is generally expensive and the available manual annotation of vehicles for training R-CNNs are not sufficient in number. To address these problems, this paper proposes a fast and accurate vehicle detection framework. On one hand, to accurately extract vehicle-like targets, we developed an accurate-vehicle-proposal-network (AVPN) based on hyper feature map which combines hierarchical feature maps that are more accurate for small object detection. On the other hand, we propose a coupled R-CNN method, which combines an AVPN and a vehicle attribute learning network to extract the vehicle's location and attributes simultaneously. For original large-scale aerial images with limited manual annotations, we use cropped image blocks for training with data augmentation to avoid overfitting. Comprehensive evaluations on the public Munich vehicle dataset and the collected vehicle dataset demonstrate the accuracy and effectiveness of the proposed method.", "title": "" }, { "docid": "5688bb564d7bd172be1aacc994305137", "text": "Spain is one of the largest and most successful powers in international youth football, but this success has not extended to the national team. This lack of continued success seems to indicate a loss of potential. The relative age effect has been detected in football in many countries. Understanding the extent of this bias in the youth teams of Spanish elite clubs may help to improve selection processes and reduce the waste of potential. Comparisons between players from: the Spanish Professional Football League, all age categories of these clubs' youth teams, the Under-17 to Under-21 national teams, the national team, and the Spanish population, show a constant tendency to under-represent players from the later months of the selection year at all age groups of youth and Under-17 to Under-21 national teams. Professional and national team players show a similar but diminished behaviour that weakens with ageing, which suggests that talent identification and selection processes can be improved to help better identify potential talent early on and minimize wasted potential.", "title": "" }, { "docid": "ba58efc16a48e8a2203189781d58cb03", "text": "Introduction The typical size of large networks such as social network services, mobile phone networks or the web now counts in millions when not billions of nodes and these scales demand new methods to retrieve comprehensive information from their structure. A promising approach consists in decomposing the networks into communities of strongly connected nodes, with the nodes belonging to different communities only sparsely connected. Finding exact optimal partitions in networks is known to be computationally intractable, mainly due to the explosion of the number of possible partitions as the number of nodes increases. It is therefore of high interest to propose algorithms to find reasonably “good” solutions of the problem in a reasonably “fast” way. One of the fastest algorithms consists in optimizing the modularity of the partition in a greedy way (Clauset et al, 2004), a method that, even improved, does not allow to analyze more than a few millions nodes (Wakita et al, 2007).", "title": "" }, { "docid": "048ff79b90371eb86b9d62810cfea31f", "text": "In October, 2006 Netflix released a dataset containing 100 million anonymous movie ratings and challenged the data mining, machine learning and computer science communities to develop systems that could beat the accuracy of its recommendation system, Cinematch. We briefly describe the challenge itself, review related work and efforts, and summarize visible progress to date. Other potential uses of the data are outlined, including its application to the KDD Cup 2007.", "title": "" }, { "docid": "9343a2775b5dac7c48c1c6cec3d0a59c", "text": "The Extended String-to-String Correction Problem [ESSCP] is defined as the problem of determining, for given strings A and B over alphabet V, a minimum-cost sequence S of edit operations such that S(A) &equil; B. The sequence S may make use of the operations: <underline>Change, Insert, Delete</underline> and <underline>Swaps</underline>, each of constant cost W<subscrpt>C</subscrpt>, W<subscrpt>I</subscrpt>, W<subscrpt>D</subscrpt>, and W<subscrpt>S</subscrpt> respectively. Swap permits any pair of adjacent characters to be interchanged.\n The principal results of this paper are:\n (1) a brief presentation of an algorithm (the CELLAR algorithm) which solves ESSCP in time Ø(¦A¦* ¦B¦* ¦V¦<supscrpt>s</supscrpt>*s), where s &equil; min(4W<subscrpt>C</subscrpt>, W<subscrpt>I</subscrpt>+W<subscrpt>D</subscrpt>)/W<subscrpt>S</subscrpt> + 1;\n (2) presentation of polynomial time algorithms for the cases (a) W<subscrpt>S</subscrpt> &equil; 0, (b) W<subscrpt>S</subscrpt> > 0, W<subscrpt>C</subscrpt>&equil; W<subscrpt>I</subscrpt>&equil; W<subscrpt>D</subscrpt>&equil; @@@@;\n (3) proof that ESSCP, with W<subscrpt>I</subscrpt> < W<subscrpt>C</subscrpt> &equil; W<subscrpt>D</subscrpt> &equil; @@@@, 0 < W<subscrpt>S</subscrpt> < @@@@, suitably encoded, is NP-complete. (The remaining case, W<subscrpt>S</subscrpt>&equil; @@@@, reduces ESSCP to the string-to-string correction problem of [1], where an Ø( ¦A¦* ¦B¦) algorithm is given.) Thus, “almost all” ESSCP's can be solved in deterministic polynomial time, but the general problem is NP-complete.", "title": "" }, { "docid": "7ff0befa9e6d5694228a8199cd3c1c8c", "text": "This article examined the effects of product aesthetics on several outcome variables in usability tests. Employing a computer simulation of a mobile phone, 60 adolescents (14-17 yrs) were asked to complete a number of typical tasks of mobile phone users. Two functionally identical mobile phones were manipulated with regard to their visual appearance (highly appealing vs not appealing) to determine the influence of appearance on perceived usability, performance measures and perceived attractiveness. The results showed that participants using the highly appealing phone rated their appliance as being more usable than participants operating the unappealing model. Furthermore, the visual appearance of the phone had a positive effect on performance, leading to reduced task completion times for the attractive model. The study discusses the implications for the use of adolescents in ergonomic research.", "title": "" }, { "docid": "682686007186f8af85f2eb27b49a2df5", "text": "In the last few years, deep learning has lead to very good performance on a variety of problems, such as object recognition, speech recognition and natural language processing. Among different types of deep neural networks, convolutional neural networks have been most extensively studied. Due to the lack of training data and computing power in early days, it is hard to train a large high-capacity convolutional neural network without overfitting. Recently, with the rapid growth of data size and the increasing power of graphics processor unit, many researchers have improved the convolutional neural networks and achieved state-of-the-art results on various tasks. In this paper, we provide a broad survey of the recent advances in convolutional neural networks. Besides, we also introduce some applications of convolutional neural networks in computer vision.", "title": "" }, { "docid": "d253029f47fe3afb6465a71e966fdbd5", "text": "With the development of the social economy, more and more appliances have been presented in a house. It comes out a problem that how to manage and control these increasing various appliances efficiently and conveniently so as to achieve more comfortable, security and healthy space at home. In this paper, a smart control system base on the technologies of internet of things has been proposed to solve the above problem. The smart home control system uses a smart central controller to set up a radio frequency 433 MHz wireless sensor and actuator network (WSAN). A series of control modules, such as switch modules, radio frequency control modules, have been developed in the WSAN to control directly all kinds of home appliances. Application servers, client computers, tablets or smart phones can communicate with the smart central controller through a wireless router via a Wi-Fi interface. Since it has WSAN as the lower control layer, a appliance can be added into or withdrawn from the control system very easily. The smart control system embraces the functions of appliance monitor, control and management, home security, energy statistics and analysis.", "title": "" }, { "docid": "5638ba62bcbfd1bd5e46b4e0dccf0d94", "text": "Sentiment analysis aims to automatically uncover the underlying attitude that we hold towards an entity. The aggregation of these sentiment over a population represents opinion polling and has numerous applications. Current text-based sentiment analysis rely on the construction of dictionaries and machine learning models that learn sentiment from large text corpora. Sentiment analysis from text is currently widely used for customer satisfaction assessment and brand perception analysis, among others. With the proliferation of social media, multimodal sentiment analysis is set to bring new opportunities with the arrival of complementary data streams for improving and going beyond text-based sentiment analysis. Since sentiment can be detected through affective traces it leaves, such as facial and vocal displays, multimodal sentiment analysis offers promising avenues for analyzing facial and vocal expressions in addition to the transcript or textual content. These approaches leverage emotion recognition and context inference to determine the underlying polarity and scope of an individual’s sentiment. In this survey, we define sentiment and the problem of multimodal sentiment analysis and review recent developments in multimodal sentiment analysis in different domains, including spoken reviews, images, video blogs, human-machine and human-human interaction. Challenges and opportunities of this emerging field are also discussed leading to our thesis that multimodal sentiment analysis holds a significant untapped potential.", "title": "" }, { "docid": "621ccb0c477255108583505cde0f9eb3", "text": "As a collective and highly dynamic social group, the human crowd is a fascinating phenomenon that has been frequently studied by experts from various areas. Recently, computer-based modeling and simulation technologies have emerged to support investigation of the dynamics of crowds, such as a crowd's behaviors under normal and emergent situations. This article assesses the major existing technologies for crowd modeling and simulation. We first propose a two-dimensional categorization mechanism to classify existing work depending on the size of crowds and the time-scale of the crowd phenomena of interest. Four evaluation criteria have also been introduced to evaluate existing crowd simulation systems from the point of view of both a modeler and an end-user.\n We have discussed some influential existing work in crowd modeling and simulation regarding their major features, performance as well as the technologies used in this work. We have also discussed some open problems in the area. This article will provide the researchers with useful information and insights on the state of the art of the technologies in crowd modeling and simulation as well as future research directions.", "title": "" }, { "docid": "eaf6b4c216515c967ec7addea3916d0b", "text": "In an effort to provide high-quality preschool education, policymakers are increasingly requiring public preschool teachers to have at least a Bachelor's degree, preferably in early childhood education. Seven major studies of early care and education were used to predict classroom quality and children's academic outcomes from the educational attainment and major of teachers of 4-year-olds. The findings indicate largely null or contradictory associations, indicating that policies focused solely on increasing teachers' education will not suffice for improving classroom quality or maximizing children's academic gains. Instead, raising the effectiveness of early childhood education likely will require a broad range of professional development activities and supports targeted toward teachers' interactions with children.", "title": "" }, { "docid": "dd9e3513c4be6100b5d3b3f25469f028", "text": "Software testing is the process to uncover requirement, design and coding errors in the program. It is used to identify the correctness, completeness, security and quality of software products against a specification. Software testing is the process used to measure the quality of developed computer software. It exhibits all mistakes, errors and flaws in the developed software. There are many approaches to software testing, but effective testing of complex product is essentially a process of investigation, not merely a matter of creating and following route procedure. It is not possible to find out all the errors in the program. This fundamental problem in testing thus throws an open question, as to what would be the strategy we should adopt for testing. In our paper, we have described and compared the three most prevalent and commonly used software testing techniques for detecting errors, they are: white box testing, black box testing and grey box testing. KeywordsBlack Box; Grey Box; White Box.", "title": "" }, { "docid": "b5ecd3e4e14cae137b88de8bd4c92c5d", "text": "Design and analysis of ultrahigh-frequency (UHF) micropower rectifiers based on a diode-connected dynamic threshold MOSFET (DTMOST) is discussed. An analytical design model for DTMOST rectifiers is derived based on curve-fitted diode equation parameters. Several DTMOST six-stage charge-pump rectifiers were designed and fabricated using a CMOS 0.18-mum process with deep n-well isolation. Measured results verified the design model with average accuracy of 10.85% for an input power level between -4 and 0 dBm. At the same time, three other rectifiers based on various types of transistors were fabricated on the same chip. The measured results are compared with a Schottky diode solution.", "title": "" }, { "docid": "599c2f4205f3a0978d0567658daf8be6", "text": "With increasing audio/video service consumption through unmanaged IP networks, HTTP adaptive streaming techniques have emerged to handle bandwidth limitations and variations. But while it is becoming common to serve multiple clients in one home network, these solutions do not adequately address fine tuned quality arbitration between the multiple streams. While clients compete for bandwidth, the video suffers unstable conditions and/or inappropriate bit-rate levels.\n We hereby experiment a mechanism based on traffic chapping that allow bandwidth arbitration to be implemented in the home gateway, first determining desirable target bit-rates to be reached by each stream and then constraining the clients to stay within their limits. This enables the delivery of optimal quality of experience to the maximum number of users. This approach is validated through experimentation, and results are shown through a set of objective measurement criteria.", "title": "" }, { "docid": "727a53dad95300ee9749c13858796077", "text": "Device to device (D2D) communication underlaying LTE can be used to distribute traffic loads of eNBs. However, a conventional D2D link is controlled by an eNB, and it still remains burdens to the eNB. We propose a completely distributed power allocation method for D2D communication underlaying LTE using deep learning. In the proposed scheme, a D2D transmitter can decide the transmit power without any help from other nodes, such as an eNB or another D2D device. Also, the power set, which is delivered from each D2D node independently, can optimize the overall cell throughput. We suggest a distirbuted deep learning architecture in which the devices are trained as a group, but operate independently. The deep learning can optimize total cell throughput while keeping constraints such as interference to eNB. The proposed scheme, which is implemented model using Tensorflow, can provide same throughput with the conventional method even it operates completely on distributed manner.", "title": "" }, { "docid": "05a93bfe8e245edbe2438a0dc7025301", "text": "Statistical machine translation (SMT) treats the translation of natural language as a machine learning problem. By examining many samples of human-produced translation, SMT algorithms automatically learn how to translate. SMT has made tremendous strides in less than two decades, and many popular techniques have only emerged within the last few years. This survey presents a tutorial overview of state-of-the-art SMT at the beginning of 2007. We begin with the context of the current research, and then move to a formal problem description and an overview of the four main subproblems: translational equivalence modeling, mathematical modeling, parameter estimation, and decoding. Along the way, we present a taxonomy of some different approaches within these areas. We conclude with an overview of evaluation and notes on future directions. This is a revised draft of a paper currently under review. The contents may change in later drafts. Please send any comments, questions, or corrections to alopez@cs.umd.edu. Feel free to cite as University of Maryland technical report UMIACS-TR-2006-47. The support of this research by the GALE program of the Defense Advanced Research Projects Agency, Contract No. HR0011-06-2-0001, ONR MURI Contract FCPO.810548265, and Department of Defense contract RD-02-5700 is acknowledged.", "title": "" } ]
scidocsrr
6b0478b5f8cc9425bc7a57cd949e47c6
Survey on Automatic Number Plate Recognition (ANR)
[ { "docid": "12eff845ccb6e5cc2b2fbe74935aff46", "text": "The study of this paper presents a new technique to use automatic number plate detection and recognition. This system plays a significant role throughout this busy world, owing to rise in use of vehicles day-by-day. Some of the applications of this software are automatic toll tax collection, unmanned parking slots, safety, and security. The current scenario happening in India is, people, break the rules of the toll and move away which can cause many serious issues like accidents. This system uses efficient algorithms to detect the vehicle number from real-time images. The system detects the license plate on the vehicle first and then captures the image of it. Vehicle number plate is localized and characters are segmented and further recognized with help of neural network. The system is designed for grayscale images so it detects the number plate regardless of its color. The resulting vehicle number plate is then compared with the available database of all vehicles which have been already registered by the users so as to come up with information about vehicle type and charge accordingly. The vehicle information such as date, toll amount is stored in the database to maintain the record.", "title": "" } ]
[ { "docid": "77564f157ea8ab43d6d9f95a212e7948", "text": "We consider the problem of mining association rules on a shared-nothing multiprocessor. We present three algorithms that explore a spectrum of trade-oos between computation, communication, memory usage, synchronization, and the use of problem-speciic information. The best algorithm exhibits near perfect scaleup behavior, yet requires only minimal overhead compared to the current best serial algorithm.", "title": "" }, { "docid": "9c698f09275057887803010fb6dc789e", "text": "Type 2 diabetes is now a pandemic and shows no signs of abatement. In this Seminar we review the pathophysiology of this disorder, with particular attention to epidemiology, genetics, epigenetics, and molecular cell biology. Evidence is emerging that a substantial part of diabetes susceptibility is acquired early in life, probably owing to fetal or neonatal programming via epigenetic phenomena. Maternal and early childhood health might, therefore, be crucial to the development of effective prevention strategies. Diabetes develops because of inadequate islet β-cell and adipose-tissue responses to chronic fuel excess, which results in so-called nutrient spillover, insulin resistance, and metabolic stress. The latter damages multiple organs. Insulin resistance, while forcing β cells to work harder, might also have an important defensive role against nutrient-related toxic effects in tissues such as the heart. Reversal of overnutrition, healing of the β cells, and lessening of adipose tissue defects should be treatment priorities.", "title": "" }, { "docid": "6e8b6b3f0bb2496d11961715e28d8b48", "text": "The purpose of this paper is to provide a broad overview of the WITAS Unmanned Aerial Vehicle Project. The WITAS UAV project is an ambitious, long-term basic research project with the goal of developing technologies and functionalities necessary for the successful deployment of a fully autonomous UAV operating over diverse geographical terrain containing road and traffic networks. The project is multi-disciplinary in nature, requiring many different research competences, and covering a broad spectrum of basic research issues, many of which relate to current topics in artificial intelligence. A number of topics considered are knowledge representation issues, active vision systems and their integration with deliberative/reactive architectures, helicopter modeling and control, ground operator dialogue systems, actual physical platforms, and a number of simulation techniques.", "title": "" }, { "docid": "62a51c43d4972d41d3b6cdfa23f07bb9", "text": "To meet the development of Internet of Things (IoT), IETF has proposed IPv6 standards working under stringent low-power and low-cost constraints. However, the behavior and performance of the proposed standards have not been fully understood, especially the RPL routing protocol lying at the heart the protocol stack. In this work, we make an in-depth study on a popular implementation of the RPL (routing protocol for low power and lossy network) to provide insights and guidelines for the adoption of these standards. Specifically, we use the Contiki operating system and COOJA simulator to evaluate the behavior of the ContikiRPL implementation. We analyze the performance for different networking settings. Different from previous studies, our work is the first effort spanning across the whole life cycle of wireless sensor networks, including both the network construction process and the functioning stage. The metrics evaluated include signaling overhead, latency, energy consumption and so on, which are vital to the overall performance of a wireless sensor network. Furthermore, based on our observations, we provide a few suggestions for RPL implemented WSN. This study can also serve as a basis for future enhancement on the proposed standards.", "title": "" }, { "docid": "a0c1f145f423052b6e8059c5849d3e34", "text": "Improved methods of assessment and research design have established a robust and causal association between stressful life events and major depressive episodes. The chapter reviews these developments briefly and attempts to identify gaps in the field and new directions in recent research. There are notable shortcomings in several important topics: measurement and evaluation of chronic stress and depression; exploration of potentially different processes of stress and depression associated with first-onset versus recurrent episodes; possible gender differences in exposure and reactivity to stressors; testing kindling/sensitization processes; longitudinal tests of diathesis-stress models; and understanding biological stress processes associated with naturally occurring stress and depressive outcomes. There is growing interest in moving away from unidirectional models of the stress-depression association, toward recognition of the effects of contexts and personal characteristics on the occurrence of stressors, and on the likelihood of progressive and dynamic relationships between stress and depression over time-including effects of childhood and lifetime stress exposure on later reactivity to stress.", "title": "" }, { "docid": "8ce3fa727ff12f742727d5b80d8611b9", "text": "Algorithmic approaches endow deep learning systems with implicit bias that helps them generalize even in over-parametrized settings. In this paper, we focus on understanding such a bias induced in learning through dropout, a popular technique to avoid overfitting in deep learning. For single hidden-layer linear neural networks, we show that dropout tends to make the norm of incoming/outgoing weight vectors of all the hidden nodes equal. In addition, we provide a complete characterization of the optimization landscape induced by dropout.", "title": "" }, { "docid": "04500f0dbf48d3c1d8eb02ed43d46e00", "text": "The coverage of a test suite is often used as a proxy for its ability to detect faults. However, previous studies that investigated the correlation between code coverage and test suite effectiveness have failed to reach a consensus about the nature and strength of the relationship between these test suite characteristics. Moreover, many of the studies were done with small or synthetic programs, making it unclear whether their results generalize to larger programs, and some of the studies did not account for the confounding influence of test suite size. In addition, most of the studies were done with adequate suites, which are are rare in practice, so the results may not generalize to typical test suites. \n We have extended these studies by evaluating the relationship between test suite size, coverage, and effectiveness for large Java programs. Our study is the largest to date in the literature: we generated 31,000 test suites for five systems consisting of up to 724,000 lines of source code. We measured the statement coverage, decision coverage, and modified condition coverage of these suites and used mutation testing to evaluate their fault detection effectiveness. \n We found that there is a low to moderate correlation between coverage and effectiveness when the number of test cases in the suite is controlled for. In addition, we found that stronger forms of coverage do not provide greater insight into the effectiveness of the suite. Our results suggest that coverage, while useful for identifying under-tested parts of a program, should not be used as a quality target because it is not a good indicator of test suite effectiveness.", "title": "" }, { "docid": "a23aa9d2a0a100e805e3c25399f4f361", "text": "Cases of poisoning by oleander (Nerium oleander) were observed in several species, except in goats. This study aimed to evaluate the pathological effects of oleander in goats. The experimental design used three goats per group: the control group, which did not receive oleander and the experimental group, which received leaves of oleander (50 mg/kg/day) for six consecutive days. On the seventh day, goats received 110 mg/kg of oleander leaves four times at one-hourly interval. A last dose of 330 mg/kg of oleander leaves was given subsequently. After the last dose was administered, clinical signs such as apathy, colic, vocalizations, hyperpnea, polyuria, and moderate rumen distention were observed. Electrocardiogram revealed second-degree atrioventricular block. Death occurred on an average at 92 min after the last dosing. Microscopic evaluation revealed renal necrosis at convoluted and collector tubules and slight myocardial degeneration was observed by unequal staining of cardiomyocytes. Data suggest that goats appear to respond to oleander poisoning in a manner similar to other species.", "title": "" }, { "docid": "ffbcc6070b471bcf86dfb270d5fd2504", "text": "This paper focuses on the specific problem of multiview learning where samples have the same feature set but different probability distributions, e.g., different viewpoints or different modalities. Since samples lying in different distributions cannot be compared directly, this paper aims to learn a latent subspace shared by multiple views assuming that the input views are generated from this latent subspace. Previous approaches usually learn the common subspace by either maximizing the empirical likelihood, or preserving the geometric structure. However, considering the complementarity between the two objectives, this paper proposes a novel approach, named low-rank discriminant embedding (LRDE), for multiview learning by taking full advantage of both sides. By further considering the duality between data points and features of multiview scene, i.e., data points can be grouped based on their distribution on features, while features can be grouped based on their distribution on the data points, LRDE not only deploys low-rank constraints on both sample level and feature level to dig out the shared factors across different views, but also preserves geometric information in both the ambient sample space and the embedding feature space by designing a novel graph structure under the framework of graph embedding. Finally, LRDE jointly optimizes low-rank representation and graph embedding in a unified framework. Comprehensive experiments in both multiview manner and pairwise manner demonstrate that LRDE performs much better than previous approaches proposed in recent literatures.", "title": "" }, { "docid": "23afac6bd3ed34fc0c040581f630c7bd", "text": "Automatic Facial Expression Recognition and Analysis, in particular FACS Action Unit (AU) detection and discrete emotion detection, has been an active topic in computer science for over two decades. Standardisation and comparability has come some way; for instance, there exist a number of commonly used facial expression databases. However, lack of a common evaluation protocol and lack of sufficient details to reproduce the reported individual results make it difficult to compare systems to each other. This in turn hinders the progress of the field. A periodical challenge in Facial Expression Recognition and Analysis would allow this comparison in a fair manner. It would clarify how far the field has come, and would allow us to identify new goals, challenges and targets. In this paper we present the first challenge in automatic recognition of facial expressions to be held during the IEEE conference on Face and Gesture Recognition 2011, in Santa Barbara, California. Two sub-challenges are defined: one on AU detection and another on discrete emotion detection. It outlines the evaluation protocol, the data used, and the results of a baseline method for the two sub-challenges.", "title": "" }, { "docid": "5c9ea5fcfef7bac1513a79fd918d3194", "text": "Elderly suffers from injuries or disabilities through falls every year. With a high likelihood of falls causing serious injury or death, falling can be extremely dangerous, especially when the victim is home-alone and is unable to seek timely medical assistance. Our fall detection systems aims to solve this problem by automatically detecting falls and notify healthcare services or the victim’s caregivers so as to provide help. In this paper, development of a fall detection system based on Kinect sensor is introduced. Current fall detection algorithms were surveyed and we developed a novel posture recognition algorithm to improve the specificity of the system. Data obtained through trial testing with human subjects showed a 26.5% increase in fall detection compared to control algorithms. With our novel detection algorithm, the system conducted in a simulated ward scenario can achieve up to 90% fall detection rate.", "title": "" }, { "docid": "a208f2a2720313479773c00a74b1cbc6", "text": "I present a web service for querying an embedding of entities in the Wikidata knowledge graph. The embedding is trained on the Wikidata dump using Gensim’s Word2Vec implementation and a simple graph walk. A REST API is implemented. Together with the Wikidata API the web service exposes a multilingual resource for over 600’000 Wikidata items and properties.", "title": "" }, { "docid": "2ad3d7f4f10b323b177247362b7a9f63", "text": "Spotify is a peer-assisted music streaming service that has gained worldwide popularity in the past few years. Until now, little has been published about user behavior in such services. In this paper, we study the user behavior in Spotify by analyzing a massive dataset collected between 2010 and 2011. Firstly, we investigate the system dynamics including session arrival patterns, playback arrival patterns, and daily variation of session length. Secondly, we analyze individual user behavior on both multiple and single devices. Our analysis reveals the favorite times of day for Spotify users. We also show the correlations between both the length and the downtime of successive user sessions on single devices. In particular, we conduct the first analysis of the device-switching behavior of a massive user base.", "title": "" }, { "docid": "01a649c8115810c8318e572742d9bd00", "text": "In this effort we propose a data-driven learning framework for reduced order modeling of fluid dynamics. Designing accurate and efficient reduced order models for nonlinear fluid dynamic problems is challenging for many practical engineering applications. Classical projection-based model reduction methods generate reduced systems by projecting full-order differential operators into low-dimensional subspaces. However, these techniques usually lead to severe instabilities in the presence of highly nonlinear dynamics, which dramatically deteriorates the accuracy of the reduced-order models. In contrast, our new framework exploits linear multistep networks, based on implicit Adams-Moulton schemes, to construct the reduced system. The advantage is that the method optimally approximates the full order model in the low-dimensional space with a given supervised learning task. Moreover, our approach is non-intrusive, such that it can be applied to other complex nonlinear dynamical systems with sophisticated legacy codes. We demonstrate the performance of our method through the numerical simulation of a twodimensional flow past a circular cylinder with Reynolds number Re = 100. The results reveal that the new data-driven model is significantly more accurate than standard projectionbased approaches.", "title": "" }, { "docid": "3d06052330110c1a401c327af6140d43", "text": "Many online videogames make use of characters controlled by both humans (avatar) and computers (agent) to facilitate game play. However, the level of agency a teammate shows potentially produces differing levels of social presence during play, which in turn may impact on the player experience. To better understand these effects, two experimental studies were conducted utilising cooperative multiplayer games (Left 4 Dead 2 and Rocket League). In addition, the effect of familiarity between players was considered. The trend across the two studies show that playing with another human is more enjoyable, and facilitates greater connection, cooperation, presence and positive mood than play with a computer agent. The implications for multiplayer game design is discussed.", "title": "" }, { "docid": "28352c478552728dddf09a2486f6c63c", "text": "Motion blur due to camera motion can significantly degrade the quality of an image. Since the path of the camera motion can be arbitrary, deblurring of motion blurred images is a hard problem. Previous methods to deal with this problem have included blind restoration of motion blurred images, optical correction using stabilized lenses, and special CMOS sensors that limit the exposure time in the presence of motion. In this paper, we exploit the fundamental trade off between spatial resolution and temporal resolution to construct a hybrid camera that can measure its own motion during image integration. The acquired motion information is used to compute a point spread function (PSF) that represents the path of the camera during integration. This PSF is then used to deblur the image. To verify the feasibility of hybrid imaging for motion deblurring, we have implemented a prototype hybrid camera. This prototype system was evaluated in different indoor and outdoor scenes using long exposures and complex camera motion paths. The results show that, with minimal resources, hybrid imaging outperforms previous approaches to the motion blur problem. We conclude with a brief discussion on how our ideas can be extended beyond the case of global camera motion to the case where individual objects in the scene move with different velocities.", "title": "" }, { "docid": "be3bf1e95312cc0ce115e3aaac2ecc96", "text": "This paper contributes a first study into how different human users deliver simultaneous control and feedback signals during human-robot interaction. As part of this work, we formalize and present a general interactive learning framework for online cooperation between humans and reinforcement learning agents. In many humanmachine interaction settings, there is a growing gap between the degrees-of-freedom of complex semi-autonomous systems and the number of human control channels. Simple human control and feedback mechanisms are required to close this gap and allow for better collaboration between humans and machines on complex tasks. To better inform the design of concurrent control and feedback interfaces, we present experimental results from a human-robot collaborative domain wherein the human must simultaneously deliver both control and feedback signals to interactively train an actor-critic reinforcement learning robot. We compare three experimental conditions: 1) human delivered control signals, 2) reward-shaping feedback signals, and 3) simultaneous control and feedback. Our results suggest that subjects provide less feedback when simultaneously delivering feedback and control signals and that control signal quality is not significantly diminished. Our data suggest that subjects may also modify when and how they provide feedback. Through algorithmic development and tuning informed by this study, we expect semi-autonomous actions of robotic agents can be better shaped by human feedback, allowing for seamless collaboration and improved performance in difficult interactive domains. University of Alberta, Dep. of Computing Science, Edmonton, Canada University of Alberta, Deps. of Medicine and Computing Science, Edmonton, Alberta, Canada. Correspondence to: Kory Mathewson <korym@ualberta.ca>. Under review for the 34 th International Conference on Machine Learning, Sydney, Australia, 2017. JMLR: W&CP. Copyright 2017 by the authors. Figure 1. Experimental configuration. One of the study participants with the Myo band on their right arm providing a control signal, while simultaneously providing feedback signals with their left hand. The Aldebaran Nao robot simulation is visible on the screen alongside experimental logging.", "title": "" }, { "docid": "9fa46e75dc28961fe3ce6fadd179cff7", "text": "Task-oriented repetitive movements can improve motor recovery in patients with neurological or orthopaedic lesions. The application of robotics can serve to assist, enhance, evaluate, and document neurological and orthopaedic rehabilitation. ARMin II is the second prototype of a robot for arm therapy applicable to the training of activities of daily living. ARMin II has a semi-exoskeletal structure with seven active degrees of freedom (two of them coupled), five adjustable segments to fit in with different patient sizes, and is equipped with position and force sensors. The mechanical structure, the actuators and the sensors of the robot are optimized for patient-cooperative control strategies based on impedance and admittance architectures. This paper describes the mechanical structure and kinematics of ARMin II.", "title": "" }, { "docid": "349f53ceb63e415d2fb3e97410c0ef88", "text": "The current prominence and future promises of the Internet of Things (IoT), Internet of Everything (IoE) and Internet of Nano Things (IoNT) are extensively reviewed and a summary survey report is presented. The analysis clearly distinguishes between IoT and IoE which are wrongly considered to be the same by many people. Upon examining the current advancement in the fields of IoT, IoE and IoNT, the paper presents scenarios for the possible future expansion of their applications.", "title": "" } ]
scidocsrr
bffc21925bf37c6af821150d9a109478
Improving a credit card fraud detection system using genetic algorithm
[ { "docid": "51eb8e36ffbf5854b12859602f7554ef", "text": "Fraud is increasing dramatically with the expansion of modern technology and the global superhighways of communication, resulting in the loss of billions of dollars worldwide each year. Although prevention technologies are the best way to reduce fraud, fraudsters are adaptive and, given time, will usually find ways to circumvent such measures. Methodologies for the detection of fraud are essential if we are to catch fraudsters once fraud prevention has failed. Statistics and machine learning provide effective technologies for fraud detection and have been applied successfully to detect activities such as money laundering, e-commerce credit card fraud, telecommunications fraud and computer intrusion, to name but a few. We describe the tools available for statistical fraud detection and the areas in which fraud detection technologies are most used.", "title": "" }, { "docid": "e404699c5b86d3a3a47a1f3d745eecc1", "text": "We apply Artificial Immune Systems(AIS) [4] for credit card fraud detection and we compare it to other methods such as Neural Nets(NN) [8] and Bayesian Nets(BN) [2], Naive Bayes(NB) and Decision Trees(DT) [13]. Exhaustive search and Genetic Algorithm(GA) [7] are used to select optimized parameters sets, which minimizes the fraud cost for a credit card database provided by a Brazilian card issuer. The specifics of the fraud database are taken into account, such as skewness of data and different costs associated with false positives and negatives. Tests are done with holdout sample sets, and all executions are run using Weka [18], a publicly available software. Our results are consistent with the early result of Maes in [12] which concludes that BN is better than NN, and this occurred in all our evaluated tests. Although NN is widely used in the market today, the evaluated implementation of NN is among the worse methods for our database. In spite of a poor behavior if used with the default parameters set, AIS has the best performance when parameters optimized by GA are used.", "title": "" } ]
[ { "docid": "fdaf5546d430226721aa1840f92ba5af", "text": "The recent development of regulatory policies that permit the use of TV bands spectrum on a secondary basis has motivated discussion about coexistence of primary (e.g. TV broadcasts) and secondary users (e.g. WiFi users in TV spectrum). However, much less attention has been given to coexistence of different secondary wireless technologies in the TV white spaces. Lack of coordination between secondary networks may create severe interference situations, resulting in less efficient usage of the spectrum. In this paper, we consider two of the most prominent wireless technologies available today, namely Long Term Evolution (LTE), and WiFi, and address some problems that arise from their coexistence in the same band. We perform exhaustive system simulations and observe that WiFi is hampered much more significantly than LTE in coexistence scenarios. A simple coexistence scheme that reuses the concept of almost blank subframes in LTE is proposed, and it is observed that it can improve the WiFi throughput per user up to 50 times in the studied scenarios.", "title": "" }, { "docid": "f7121b434ae326469780f300256367a8", "text": "Aerial Manipulators (AMs) are a special class of underactuated mechanical systems formed by the join of Unmanned Aerial Vehicles (UAVs) and manipulators. A thorough analysis of the dynamics and a fully constructive controller design for a quadrotor plus n-link manipulator in a free-motion on an arbitrary plane is provided, via the lDA-PBC methodology. A controller is designed with the manipulator locked at any position ensuring global asymptotic stability in an open set and avoiding the AM goes upside down (autonomous). The major result of stability/robustness arises when it is proved that, additionally, the controller guarantees the boundedness of the trajectories for bounded movements of the manipulator, i.e. the robot manipulator executing planned tasks, giving rise to a non-autonomous port-controlled Hamiltonian system in closed loop. Moreover, all trajectories converge to a positive limit set, a strong result for matching-type controllers.", "title": "" }, { "docid": "1773e82a9f8f928a1ce0abd053a7cd99", "text": "INTRODUCTION\nThe aim of this study was to investigate the role of treatment timing on the effectiveness of vertical-pull chincup (V-PCC) therapy in conjunction with a bonded rapid maxillary expander (RME) in growing subjects with mild-to-severe hyperdivergent facial patterns.\n\n\nMETHODS\nThe records of 39 subjects treated with a bonded RME combined with a V-PCC were compared with 29 untreated subjects with similar vertical skeletal disharmonies. Lateral cephalograms were analyzed before (T1) and after treatment or observation (T2). Both the treated and the untreated samples were divided into prepubertal and pubertal groups on the basis of cervical vertebral maturation (prepubertal treated group, 21 subjects; pubertal treated group, 18 subjects; prepubertal control group, 15 subjects; pubertal control group, 14 subjects). Mean change differences from T2 to T1 were compared in the 2 prepubertal and the 2 pubertal groups with independent-sample t tests.\n\n\nRESULTS\nNo statistically significant differences between the 2 prepubertal groups were found for any cephalometric skeletal measures from T1 to T2. When compared with the untreated pubertal sample, the group treated with the RME and V-PCC at puberty showed a statistically significant reduction in the inclination of the mandibular plane to the Frankfort horizontal (-2.2 mm), a statistically significant reduction in the inclination of the condylar axis to the mandibular plane (-2.2 degrees), and statistically significant supplementary growth of the mandibular ramus (1.7 mm).\n\n\nCONCLUSIONS\nTreatment of increased vertical dimension with the RME and V-PCC protocol appears to produce better results during the pubertal growth spurt than before puberty, although the absolute amount of correction in the vertical skeletal parameters is limited.", "title": "" }, { "docid": "8468e279ff6dfcd11a5525ab8a60d816", "text": "We provide a concise introduction to basic approaches to reinforcement learning from the machine learning perspective. The focus is on value function and policy gradient methods. Some selected recent trends are highlighted.", "title": "" }, { "docid": "9b430645f7b0da19b2c55d43985259d8", "text": "Research on human spatial memory and navigational ability has recently shown the strong influence of reference systems in spatial memory on the ways spatial information is accessed in navigation and other spatially oriented tasks. One of the main findings can be characterized as a large cognitive cost, both in terms of speed and accuracy that occurs whenever the reference system used to encode spatial information in memory is not aligned with the reference system required by a particular task. In this paper, the role of aligned and misaligned reference systems is discussed in the context of the built environment and modern architecture. The role of architectural design on the perception and mental representation of space by humans is investigated. The navigability and usability of built space is systematically analysed in the light of cognitive theories of spatial and navigational abilities of humans. It is concluded that a building’s navigability and related wayfinding issues can benefit from architectural design that takes into account basic results of spatial cognition research. 1 Wayfinding and Architecture Life takes place in space and humans, like other organisms, have developed adaptive strategies to find their way around their environment. Tasks such as identifying a place or direction, retracing one’s path, or navigating a large-scale space, are essential elements to mobile organisms. Most of these spatial abilities have evolved in natural environments over a very long time, using properties present in nature as cues for spatial orientation and wayfinding. With the rise of complex social structure and culture, humans began to modify their natural environment to better fit their needs. The emergence of primitive dwellings mainly provided shelter, but at the same time allowed builders to create environments whose spatial structure “regulated” the chaotic natural environment. They did this by using basic measurements and geometric relations, such as straight lines, right angles, etc., as the basic elements of design (Le Corbusier, 1931, p. 69ff.) In modern society, most of our lives take place in similar regulated, human-made spatial environments, with paths, tracks, streets, and hallways as the main arteries of human locomotion. Architecture and landscape architecture embody the human effort to structure space in meaningful and useful ways. Architectural design of space has multiple functions. Architecture is designed to satisfy the different representational, functional, aesthetic, and emotional needs of organizations and the people who live or work in these structures. In this chapter, emphasis lies on a specific functional aspect of architectural design: human wayfinding. Many approaches to improving architecture focus on functional issues, like improved ecological design, the creation of improved workplaces, better climate control, lighting conditions, or social meeting areas. Similarly, when focusing on the mobility of humans, the ease of wayfinding within a building can be seen as an essential function of a building’s design (Arthur & Passini, 1992; Passini, 1984). When focusing on wayfinding issues in buildings, cities, and landscapes, the designed spatial environment can be seen as an important tool in achieving a particular goal, e.g., reaching a destination or finding an exit in case of emergency. This view, if taken to a literal extreme, is summarized by Le Corbusier’s (1931) notion of the building as a “machine,” mirroring in architecture the engineering ideals of efficiency and functionality found in airplanes and cars. In the narrow sense of wayfinding, a building thus can be considered of good design if it allows easy and error-free navigation. This view is also adopted by Passini (1984), who states that “although the architecture and the spatial configuration of a building generate the wayfinding problems people have to solve, they are also a wayfinding support system in that they contain the information necessary to solve the problem” (p. 110). Like other problems of engineering, the wayfinding problem in architecture should have one or more solutions that can be evaluated. This view of architecture can be contrasted with the alternative view of architecture as “built philosophy”. According to this latter view, architecture, like art, expresses ideas and cultural progress by shaping the spatial structure of the world – a view which gives consideration to the users as part of the philosophical approach but not necessarily from a usability perspective. Viewing wayfinding within the built environment as a “man-machine-interaction” problem makes clear that good architectural design with respect to navigability needs to take two factors into account. First, the human user comes equipped with particular sensory, perceptual, motoric, and cognitive abilities. Knowledge of these abilities and the limitations of an average user or special user populations thus is a prerequisite for good design. Second, structural, functional, financial, and other design considerations restrict the degrees of freedom architects have in designing usable spaces. In the following sections, we first focus on basic research on human spatial cognition. Even though not all of it is directly applicable to architectural design and wayfinding, it lays the foundation for more specific analyses in part 3 and 4. In part 3, the emphasis is on a specific research question that recently has attracted some attention: the role of environmental structure (e.g., building and street layout) for the selection of a spatial reference frame. In part 4, implications for architectural design are discussed by means of two real-world examples. 2 The human user in wayfinding 2.1 Navigational strategies Finding one’s way in the environment, reaching a destination, or remembering the location of relevant objects are some of the elementary tasks of human activity. Fortunately, human navigators are well equipped with an array of flexible navigational strategies, which usually enable them to master their spatial environment (Allen, 1999). In addition, human navigation can rely on tools that extend human sensory and mnemonic abilities. Most spatial or navigational strategies are so common that they do not occur to us when we perform them. Walking down a hallway we hardly realize that the optical and acoustical flows give us rich information about where we are headed and whether we will collide with other objects (Gibson, 1979). Our perception of other objects already includes physical and social models on how they will move and where they will be once we reach the point where paths might cross. Following a path can consist of following a particular visual texture (e.g., asphalt) or feeling a handrail in the dark by touch. At places where multiple continuing paths are possible, we might have learned to associate the scene with a particular action (e.g., turn left; Schölkopf & Mallot, 1995), or we might try to approximate a heading direction by choosing the path that most closely resembles this direction. When in doubt about our path we might ask another person or consult a map. As is evident from this brief (and not exhaustive) description, navigational strategies and activities are rich in diversity and adaptability (for an overview see Golledge, 1999; Werner, Krieg-Brückner, & Herrmann, 2000), some of which are aided by architectural design and signage (see Arthur & Passini, 1992; Passini, 1984). Despite the large number of different navigational strategies, people still experience problems finding their way or even feel lost momentarily. This feeling of being lost might reflect the lack of a key component of human wayfinding: knowledge about where one is located in an environment – with respect to one’s goal, one’s starting location, or with respect to the global environment one is in. As Lynch put it, “the terror of being lost comes from the necessity that a mobile organism be oriented in its surroundings” (1960, p. 125.) Some wayfinding strategies, like vector navigation, rely heavily on this information. Other strategies, e.g. piloting or path-following, which are based on purely local information can benefit from even vague locational knowledge as a redundant source of information to validate or question navigational decisions (see Werner et al., 2000, for examples.) Proficient signage in buildings, on the other hand, relies on a different strategy. It relieves a user from keeping track of his or her position in space by indicating the correct navigational choice whenever the choice becomes relevant. Keeping track of one’s position during navigation can be done quite easily if access to global landmarks, reference directions, or coordinates is possible. Unfortunately, the built environment often does not allow for simple navigational strategies based on these types of information. Instead, spatial information has to be integrated across multiple places, paths, turns, and extended periods of time (see Poucet, 1993, for an interesting model of how this can be achieved). In the next section we will describe an essential ingredient of this integration – the mental representation of spatial information in memory. 2.2 Alignment effects in spatial memory When observing tourists in an unfamiliar environment, one often notices people frantically turning maps to align the noticeable landmarks depicted in the map with the visible landmarks as seen from the viewpoint of the tourist. This type of behavior indicates a well-established cognitive principle (Levine, Jankovic, & Palij, 1982). Observers more easily comprehend and use information depicted in “You-are-here” (YAH) maps if the up-down direction of the map coincides with the front-back direction of the observer. In this situation, the natural preference of directional mapping of top to front and bottom to back is used, and left and right in the map stay left and right in the depicted world. While th", "title": "" }, { "docid": "54d3d5707e50b979688f7f030770611d", "text": "In this article, we describe an automatic differentiation module of PyTorch — a library designed to enable rapid research on machine learning models. It builds upon a few projects, most notably Lua Torch, Chainer, and HIPS Autograd [4], and provides a high performance environment with easy access to automatic differentiation of models executed on different devices (CPU and GPU). To make prototyping easier, PyTorch does not follow the symbolic approach used in many other deep learning frameworks, but focuses on differentiation of purely imperative programs, with a focus on extensibility and low overhead. Note that this preprint is a draft of certain sections from an upcoming paper covering all PyTorch features.", "title": "" }, { "docid": "403d54a5672037cb8adb503405845bbd", "text": "This paper introduces adaptor grammars, a class of probabil istic models of language that generalize probabilistic context-free grammar s (PCFGs). Adaptor grammars augment the probabilistic rules of PCFGs with “ada ptors” that can induce dependencies among successive uses. With a particular choice of adaptor, based on the Pitman-Yor process, nonparametric Bayesian mo dels f language using Dirichlet processes and hierarchical Dirichlet proc esses can be written as simple grammars. We present a general-purpose inference al gorithm for adaptor grammars, making it easy to define and use such models, and ill ustrate how several existing nonparametric Bayesian models can be expressed wi thin this framework.", "title": "" }, { "docid": "d952de00554b9a6bb21fbce802729b3f", "text": "In the past five years there has been a dramatic increase in work on Search Based Software Engineering (SBSE), an approach to software engineering in which search based optimisation algorithms are used to address problems in Software Engineering. SBSE has been applied to problems throughout the Software Engineering lifecycle, from requirements and project planning to maintenance and re-engineering. The approach is attractive because it offers a suite of adaptive automated and semi-automated solutions in situations typified by large complex problem spaces with multiple competing and conflicting objectives. This paper provides a review and classification of literature on SBSE. The paper identifies research trends and relationships between the techniques applied and the applications to which they have been applied and highlights gaps in the literature and avenues for further research.", "title": "" }, { "docid": "e2a1c8dfae27d56faf2fee494ffbae28", "text": "Quantitative structure-activity relationship (QSAR) modeling pertains to the construction of predictive models of biological activities as a function of structural and molecular information of a compound library. The concept of QSAR has typically been used for drug discovery and development and has gained wide applicability for correlating molecular information with not only biological activities but also with other physicochemical properties, which has therefore been termed quantitative structure-property relationship (QSPR). Typical molecular parameters that are used to account for electronic properties, hydrophobicity, steric effects, and topology can be determined empirically through experimentation or theoretically via computational chemistry. A given compilation of data sets is then subjected to data pre-processing and data modeling through the use of statistical and/or machine learning techniques. This review aims to cover the essential concepts and techniques that are relevant for performing QSAR/QSPR studies through the use of selected examples from our previous work.", "title": "" }, { "docid": "69201195326d4e8c5cac61d817e4c1f2", "text": "This paper focuses on the evaluation of theoretical and numerical aspects related to an original DC microgrid power architecture for efficient charging of plug-in electric vehicles (PEVs). The proposed DC microgrid is based on photovoltaic array (PVA) generation, electrochemical storage, and grid connection; it is assumed that PEVs have a direct access to their DC charger input. As opposed to conventional power architecture designs, the PVA is coupled directly on the DC link without a static converter, which implies no DC voltage stabilization, increasing energy efficiency, and reducing control complexity. Based on a real-time rule-based algorithm, the proposed power management allows self-consumption according to PVA power production and storage constraints, and the public grid is seen only as back-up. The first phase of modeling aims to evaluate the main energy flows within the proposed DC microgrid architecture and to identify the control structure and the power management strategies. For this, an original model is obtained by applying the Energetic Macroscopic Representation formalism, which allows deducing the control design using Maximum Control Structure. The second phase of simulation is based on the numerical characterization of the DC microgrid components and the energy management strategies, which consider the power source requirements, charging times of different PEVs, electrochemical storage ageing, and grid power limitations for injection mode. The simulation results show the validity of the model and the feasibility of the proposed DC microgrid power architecture which presents good performance in terms of total efficiency and simplified control. OPEN ACCESS Energies 2015, 8 4336", "title": "" }, { "docid": "1394eaac58304e5d6f951ca193e0be40", "text": "We introduce low-cost hardware for performing non-invasive side-channel attacks on Radio Frequency Identi cation Devices (RFID) and develop techniques for facilitating a correlation power analysis (CPA) in the presence of the eld of an RFID reader. We practically verify the e ectiveness of the developed methods by analysing the security of commercial contactless smartcards employing strong cryptography, pinpointing weaknesses in the protocol and revealing a vulnerability towards side-channel attacks. Employing the developed hardware, we present the rst successful key-recovery attack on commercially available contactless smartcards based on the Data Encryption Standard (DES) or TripleDES (3DES) cipher that are widely used for security-sensitive applications, e.g., payment purposes.", "title": "" }, { "docid": "21943e640ce9b56414994b5df504b1a6", "text": "It is a preferable method to transfer power wirelessly using contactless slipring systems for rotary applications. The current single or multiple-unit single-phase systems often have limited power transfer capability, so they may not be able to meet the load requirements. This paper presents a contactless slipring system based on axially traveling magnetic field that can achieve a high output power level. A new index termed mutual inductance per pole is introduced to simplify the analysis of the mutually coupled poly-phase system to a single-phase basis. Both simulation and practical results have shown that the proposed system can transfer 2.7 times more power than a multiple-unit (six individual units) single-phase system with the same amount of ferrite and copper materials at higher power transfer efficiency. It has been found that the new system can achieve about 255.6 W of maximum power at 97% efficiency, compared to 68.4 W at 90% of a multiple-unit (six individual units) single-phase system.", "title": "" }, { "docid": "43a7e786704b5347f3b67c08ac9c4f70", "text": "Before beginning any robot task, users must position the robot's base, a task that now depends entirely on user intuition. While slight perturbation is tolerable for robots with moveable bases, correcting the problem is imperative for fixed- base robots if some essential task sections are out of reach. For mobile manipulation robots, it is necessary to decide on a specific base position before beginning manipulation tasks. This paper presents Reuleaux, an open source library for robot reachability analyses and base placement. It reduces the amount of extra repositioning and removes the manual work of identifying potential base locations. Based on the reachability map, base placement locations of a whole robot or only the arm can be efficiently determined. This can be applied to both statically mounted robots, where the position of the robot and workpiece ensure the maximum amount of work performed, and to mobile robots, where the maximum amount of workable area can be reached. The methods were tested on different robots of different specifications and evaluated for tasks in simulation and real world environment. Evaluation results indicate that Reuleaux had significantly improved performance than prior existing methods in terms of time-efficiency and range of applicability.", "title": "" }, { "docid": "039bcd32a6ad2ebe93e08f518ffa5c7b", "text": "Falling down and not managing to get up again is one of the main concerns of elderly people living alone in their home. Robotic assistance for the elderly promises to have a great potential of detecting these critical situations and calling for help. This paper presents a feature-based method to detect fallen people on the ground by a mobile robot equipped with a Kinect sensor. Point clouds are segmented, layered and classified to detect fallen people, even under occlusions by parts of their body or furniture. Different features, originally from pedestrian and object detection in depth data, and different classifiers are evaluated. Evaluation was done using data of 12 people lying on the floor. Negative samples were collected from objects similar to persons, two tall dogs, and five real apartments of elderly people. The best feature-classifier combination is selected to built a robust system to detect fallen people.", "title": "" }, { "docid": "07fbce97ec4e5e7fd176507b64b01e33", "text": "Drought and heat-induced forest dieback and mortality are emerging global concerns. Although Mediterranean-type forest (MTF) ecosystems are considered to be resilient to drought and other disturbances, we observed a sudden and unprecedented forest collapse in a MTF in Western Australia corresponding with record dry and heat conditions in 2010/2011. An aerial survey and subsequent field investigation were undertaken to examine: the incidence and severity of canopy dieback and stem mortality, associations between canopy health and stand-related factors as well as tree species response. Canopy mortality was found to be concentrated in distinct patches, representing 1.5 % of the aerial sample (1,350 ha). Within these patches, 74 % of all measured stems (>1 cm DBHOB) had dying or recently killed crowns, leading to 26 % stem mortality six months following the collapse. Patches of canopy collapse were more densely stocked with the dominant species, Eucalyptus marginata, and lacked the prominent midstorey species Banksia grandis, compared to the surrounding forest. A differential response to the disturbance was observed among co-occurring tree species, which suggests contrasting strategies for coping with extreme water stress. These results suggest that MTFs, once thought to be resilient to climate change, are susceptible to sudden and severe forest collapse when key thresholds have been reached.", "title": "" }, { "docid": "d774759e03329d0cc5611ab9104f8299", "text": "The flexibility of neural networks is a very powerful property. In many cases, these changes lead to great improvements in accuracy compared to basic models that we discussed in the previous tutorial. In the last part of the tutorial, I will also explain how to parallelize the training of neural networks. This is also an important topic because parallelizing neural networks has played an important role in the current deep learning movement.", "title": "" }, { "docid": "db2b94a49d4907504cf2444305287ec8", "text": "In this paper, we propose a principled Tag Disentangled Generative Adversarial Networks (TDGAN) for re-rendering new images for the object of interest from a single image of it by specifying multiple scene properties (such as viewpoint, illumination, expression, etc.). The whole framework consists of a disentangling network, a generative network, a tag mapping net, and a discriminative network, which are trained jointly based on a given set of images that are completely/partially tagged (i.e., supervised/semi-supervised setting). Given an input image, the disentangling network extracts disentangled and interpretable representations, which are then used to generate images by the generative network. In order to boost the quality of disentangled representations, the tag mapping net is integrated to explore the consistency between the image and its tags. Furthermore, the discriminative network is introduced to implement the adversarial training strategy for generating more realistic images. Experiments on two challenging datasets demonstrate the state-of-the-art performance of the proposed framework in the problem of interest.", "title": "" }, { "docid": "d7ecb69aeb14b5f899c768032f36cc43", "text": "Building on top of the success of generative adversarial networks (GANs), conditional GANs attempt to better direct the data generation process by conditioning with certain additional information. Inspired by the most recent AC-GAN, in this paper we propose a fast-converging conditional GAN (FC-GAN). In addition to the real/fake classifier used in vanilla GANs, our discriminator has an advanced auxiliary classifier which distinguishes each real class from an extra ‘fake’ class. The ‘fake’ class avoids mixing generated data with real data, which can potentially confuse the classification of real data as AC-GAN does, and makes the advanced auxiliary classifier behave as another real/fake classifier. As a result, FC-GAN can accelerate the process of differentiation of all classes, thus boost the convergence speed. Experimental results on image synthesis demonstrate our model is competitive in the quality of images generated while achieving a faster convergence rate.", "title": "" }, { "docid": "f967ad72daeb84e2fce38aec69997c8a", "text": "While HCI has focused on multitasking with information workers, we report on multitasking among Millennials who grew up with digital media - focusing on college students. We logged computer activity and used biosensors to measure stress of 48 students for 7 days for all waking hours, in their in situ environments. We found a significant positive relationship with stress and daily time spent on computers. Stress is positively associated with the amount of multitasking. Conversely, stress is negatively associated with Facebook and social media use. Heavy multitaskers use significantly more social media and report lower positive affect than light multitaskers. Night habits affect multitasking the following day: late-nighters show longer duration of computer use and those ending their activities earlier in the day multitask less. Our study shows that college students multitask at double the frequency compared to studies of information workers. These results can inform designs for stress management of college students.", "title": "" }, { "docid": "936c4fb60d37cce15ed22227d766908f", "text": "English. The SENTIment POLarity Classification Task 2016 (SENTIPOLC), is a rerun of the shared task on sentiment classification at the message level on Italian tweets proposed for the first time in 2014 for the Evalita evaluation campaign. It includes three subtasks: subjectivity classification, polarity classification, and irony detection. In 2016 SENTIPOLC has been again the most participated EVALITA task with a total of 57 submitted runs from 13 different teams. We present the datasets – which includes an enriched annotation scheme for dealing with the impact on polarity of a figurative use of language – the evaluation methodology, and discuss results and participating systems. Italiano. Descriviamo modalità e risultati della seconda edizione della campagna di valutazione di sistemi di sentiment analysis (SENTIment POLarity Classification Task), proposta nel contesto di “EVALITA 2016: Evaluation of NLP and Speech Tools for Italian”. In SENTIPOLC è stata valutata la capacità dei sistemi di riconoscere diversi aspetti del sentiment espresso nei messaggi Twitter in lingua italiana, con un’articolazione in tre sottotask: subjectivity classification, polarity classification e irony detection. La campagna ha suscitato nuovamente grande interesse, con un totale di 57 run inviati da 13 gruppi di partecipanti.", "title": "" } ]
scidocsrr
1d52c50130f737e30eae4b14fe3ffe0a
Pricing in Network Effect Markets
[ { "docid": "1e18be7d7e121aa899c96cbcf5ea906b", "text": "Internet-based technologies such as micropayments increasingly enable the sale and delivery of small units of information. This paper draws attention to the opposite strategy of bundling a large number of information goods, such as those increasingly available on the Internet, for a fixed price that does not depend on how many goods are actually used by the buyer. We analyze the optimal bundling strategies for a multiproduct monopolist, and we find that bundling very large numbers of unrelated information goods can be surprisingly profitable. The reason is that the law of large numbers makes it much easier to predict consumers' valuations for a bundle of goods than their valuations for the individual goods when sold separately. As a result, this \"predictive value of bundling\" makes it possible to achieve greater sales, greater economic efficiency and greater profits per good from a bundle of information goods than can be attained when the same goods are sold separately. Our results do not extend to most physical goods, as the marginal costs of production typically negate any benefits from the predictive value of bundling. While determining optimal bundling strategies for more than two goods is a notoriously difficult problem, we use statistical techniques to provide strong asymptotic results and bounds on profits for bundles of any arbitrary size. We show how our model can be used to analyze the bundling of complements and substitutes, bundling in the presence of budget constraints and bundling of goods with various types of correlations. We find that when different market segments of consumers differ systematically in their valuations for goods, simple bundling will no longer be optimal. However, by offering a menu of different bundles aimed at each market segment, a monopolist can generally earn substantially higher profits than would be possible without bundling. The predictions of our analysis appear to be consistent with empirical observations of the markets for Internet and on-line content, cable television programming, and copyrighted music. ________________________________________ We thank Timothy Bresnahan, Hung-Ken Chien, Frank Fisher, Michael Harrison, Paul Kleindorfer, Thomas Malone, Robert Pindyck, Nancy Rose, Richard Schmalensee, John Tsitsiklis, Hal Varian, Albert Wenger, Birger Wernerfelt, four anonymous reviewers and seminar participants at the University of California at Berkeley, MIT, New York University, Stanford University, University of Rochester, the Wharton School, the 1995 Workshop on Information Systems and Economics and the 1998 Workshop on Marketing Science and the Internet for many helpful suggestions. Any errors that remain are only our responsibility. BUNDLING INFORMATION GOODS Page 1", "title": "" } ]
[ { "docid": "dd14f9eb9a9e0e4e0d24527cf80d04f4", "text": "The growing popularity of microblogging websites has transformed these into rich resources for sentiment mining. Even though opinion mining has more than a decade of research to boost about, it is mostly confined to the exploration of formal text patterns like online reviews, news articles etc. Exploration of the challenges offered by informal and crisp microblogging have taken roots but there is scope for a large way ahead. The proposed work aims at developing a hybrid model for sentiment classification that explores the tweet specific features and uses domain independent and domain specific lexicons to offer a domain oriented approach and hence analyze and extract the consumer sentiment towards popular smart phone brands over the past few years. The experiments have proved that the results improve by around 2 points on an average over the unigram baseline.", "title": "" }, { "docid": "6f45bc16969ed9deb5da46ff8529bb8a", "text": "In the future, mobile systems will increasingly feature more advanced organic light-emitting diode (OLED) displays. The power consumption of these displays is highly dependent on the image content. However, existing OLED power-saving techniques either change the visual experience of users or degrade the visual quality of images in exchange for a reduction in the power consumption. Some techniques attempt to enhance the image quality by employing a compound objective function. In this article, we present a win-win scheme that always enhances the image quality while simultaneously reducing the power consumption. We define metrics to assess the benefits and cost for potential image enhancement and power reduction. We then introduce algorithms that ensure the transformation of images into their quality-enhanced power-saving versions. Next, the win-win scheme is extended to process videos at a justifiable computational cost. All the proposed algorithms are shown to possess the win-win property without assuming accurate OLED power models. Finally, the proposed scheme is realized through a practical camera application and a video camcorder on mobile devices. The results of experiments conducted on a commercial tablet with a popular image database and on a smartphone with real-world videos are very encouraging and provide valuable insights for future research and practices.", "title": "" }, { "docid": "d34c96bb2399e4bd3f19825eef98d6dd", "text": "This paper proposes logic programs as a specification for robot control. These provide a formal specification of what an agent should do depending on what it senses, and its previous sensory inputs and actions. We show how to axiomatise reactive agents, events as an interface between continuous and discrete time, and persistence, as well as axiomatising integration and differentiation over time (in terms of the limit of sums and differences). This specification need not be evaluated as a Prolog program; we use can the fact that it will be evaluated in time to get a more efficient agent. We give a detailed example of a nonholonomic maze travelling robot, where we use the same language to model both the agent and the environment. One of the main motivations for this work is that there is a clean interface between the logic programs here and the model of uncertainty embedded in probabilistic Horn abduction. This is one step towards building a decisiontheoretic planning system where the output of the planner is a plan suitable for actually controlling a robot.", "title": "" }, { "docid": "e578bafcfef89e66cd77f6ee41c1fd1e", "text": "Quadruped robot is expected to serve in complex conditions such as mountain road, grassland, etc., therefore we desire a walking pattern generation that can guarantee both the speed and the stability of the quadruped robot. In order to solve this problem, this paper focuses on the stability for the tort pattern and proposes trot pattern generation for quadruped robot on the basis of ZMP stability margin. The foot trajectory is first designed based on the work space limitation. Then the ZMP and stability margin is computed to achieve the optimal trajectory of the midpoint of the hip joint of the robot. The angles of each joint are finally obtained through the inverse kinematics calculation. Finally, the effectiveness of the proposed method is demonstrated by the results from the simulation and the experiment on the quadruped robot in BIT.", "title": "" }, { "docid": "be91ec9b4f017818f32af09cafbb2a9a", "text": "Brainard et al. 2 INTRODUCTION Object recognition is difficult because there is no simple relation between an object's properties and the retinal image. Where the object is located, how it is oriented, and how it is illuminated also affect the image. Moreover, the relation is under-determined: multiple physical configurations can give rise to the same retinal image. In the case of object color, the spectral power distribution of the light reflected from an object depends not only on the object's intrinsic surface reflectance but also factors extrinsic to the object, such as the illumination. The relation between intrinsic reflectance, extrinsic illumination, and the color signal reflected to the eye is shown schematically in Figure 1. The light incident on a surface is characterized by its spectral power distribution E(λ). A small surface element reflects a fraction of the incident illuminant to the eye. The surface reflectance function S(λ) specifies this fraction as a function of wavelength. The spectrum of the light reaching the eye is called the color signal and is given by C(λ) = E(λ)S(λ). Information about C(λ) is encoded by three classes of cone photoreceptors, the L-, M-, and Scones. The top two patches rendered in Plate 1 illustrate the large effect that a typical change in natural illumination (see Wyszecki and Stiles, 1982) can have on the color signal. This effect might lead us to expect that the color appearance of objects should vary radically, depending as much on the current conditions of illumination as on the object's surface reflectance. Yet the very fact that we can sensibly refer to objects as having a color indicates otherwise. Somehow our visual system stabilizes the color appearance of objects against changes in illumination, a perceptual effect that is referred to as color constancy. Because the illumination is the most salient object-extrinsic factor that affects the color signal, it is natural that emphasis has been placed on understanding how changing the illumination affects object color appearance. In a typical color constancy experiment, the independent variable is the illumination and the dependent variable is a measure of color appearance experiments employ different stimulus configurations and psychophysical tasks, but taken as a whole they support the view that human vision exhibits a reasonable degree of color constancy. Recall that the top two patches of Plate 1 illustrate the limiting case where a single surface reflectance is seen under multiple illuminations. Although this …", "title": "" }, { "docid": "14a8adf666b115ff4a72ff600432ff07", "text": "In all branches of medicine, there is an inevitable element of patient exposure to problems arising from human error, and this is increasingly the subject of bad publicity, often skewed towards an assumption that perfection is achievable, and that any error or discrepancy represents a wrong that must be punished. Radiology involves decision-making under conditions of uncertainty, and therefore cannot always produce infallible interpretations or reports. The interpretation of a radiologic study is not a binary process; the “answer” is not always normal or abnormal, cancer or not. The final report issued by a radiologist is influenced by many variables, not least among them the information available at the time of reporting. In some circumstances, radiologists are asked specific questions (in requests for studies) which they endeavour to answer; in many cases, no obvious specific question arises from the provided clinical details (e.g. “chest pain”, “abdominal pain”), and the reporting radiologist must strive to interpret what may be the concerns of the referring doctor. (A friend of one of the authors, while a resident in a North American radiology department, observed a staff radiologist dictate a chest x-ray reporting stating “No evidence of leprosy”. When subsequently confronted by an irate respiratory physician asking for an explanation of the seemingly-perverse report, he explained that he had no idea what the clinical concerns were, as the clinical details section of the request form had been left blank).", "title": "" }, { "docid": "28d19824a598ae20039f2ed5d8885234", "text": "Soft-tissue augmentation of the face is an increasingly popular cosmetic procedure. In recent years, the number of available filling agents has also increased dramatically, improving the range of options available to physicians and patients. Understanding the different characteristics, capabilities, risks, and limitations of the available dermal and subdermal fillers can help physicians improve patient outcomes and reduce the risk of complications. The most popular fillers are those made from cross-linked hyaluronic acid (HA). A major and unique advantage of HA fillers is that they can be quickly and easily reversed by the injection of hyaluronidase into areas in which elimination of the filler is desired, either because there is excess HA in the area or to accelerate the resolution of an adverse reaction to treatment or to the product. In general, a lower incidence of complications (especially late-occurring or long-lasting effects) has been reported with HA fillers compared with the semi-permanent and permanent fillers. The implantation of nonreversible fillers requires more and different expertise on the part of the physician than does injection of HA fillers, and may produce effects and complications that are more difficult or impossible to manage even by the use of corrective surgery. Most practitioners use HA fillers as the foundation of their filler practices because they have found that HA fillers produce excellent aesthetic outcomes with high patient satisfaction, and a low incidence and severity of complications. Only limited subsets of physicians and patients have been able to justify the higher complexity and risks associated with the use of nonreversible fillers.", "title": "" }, { "docid": "597311f3187b504d91f7c788144f6b30", "text": "Objective: Body Integrity Identity Disorder (BIID) describes a phenomenon in which physically healthy people feel the constant desire for an impairment of their body. M. First [4] suggested to classify BIID as an identity disorder. The other main disorder in this respect is Gender Dysphoria. In this paper these phenomena are compared. Method: A questionnaire survey with transsexuals (number of subjects, N=19) and BIID sufferers (N=24) measuring similarities and differences. Age and educational level of the subjects are predominantly matched. Results: No differences were found between BIID and Gender Dysphoria with respect to body image and body perception (U-test: p-value=.757), age of onset (p=.841), the imitation of the desired identity (p=.699 and p=.938), the etiology (p=.299) and intensity of desire (p=.989 and p=.224) as well as in relation to a high level of suffering and impaired quality of life (p=.066). Conclusion: There are many similarities between BIID and Gender Dysphoria, but the sample was too small to make general statements. The results, however, indicate that BIID can actually be classified as an identity disorder.", "title": "" }, { "docid": "714c06da1a728663afd8dbb1cd2d472d", "text": "This paper proposes hybrid semiMarkov conditional random fields (SCRFs) for neural sequence labeling in natural language processing. Based on conventional conditional random fields (CRFs), SCRFs have been designed for the tasks of assigning labels to segments by extracting features from and describing transitions between segments instead of words. In this paper, we improve the existing SCRF methods by employing word-level and segment-level information simultaneously. First, word-level labels are utilized to derive the segment scores in SCRFs. Second, a CRF output layer and an SCRF output layer are integrated into an unified neural network and trained jointly. Experimental results on CoNLL 2003 named entity recognition (NER) shared task show that our model achieves state-of-the-art performance when no external knowledge is used.", "title": "" }, { "docid": "f4ebbcebefbcc1ba8b6f8e5bf6096645", "text": "With advances in wireless communication technology, more and more people depend heavily on portable mobile devices for businesses, entertainments and social interactions. Although such portable mobile devices can offer various promising applications, their computing resources remain limited due to their portable size. This however can be overcome by remotely executing computation-intensive tasks on clusters of near by computers known as cloudlets. As increasing numbers of people access the Internet via mobile devices, it is reasonable to envision in the near future that cloudlet services will be available for the public through easily accessible public wireless metropolitan area networks (WMANs). However, the outdated notion of treating cloudlets as isolated data-centers-in-a-box must be discarded as there are clear benefits to connecting multiple cloudlets together to form a network. In this paper we investigate how to balance the workload between multiple cloudlets in a network to optimize mobile application performance. We first introduce a system model to capture the response times of offloaded tasks, and formulate a novel optimization problem, that is to find an optimal redirection of tasks between cloudlets such that the maximum of the average response times of tasks at cloudlets is minimized. We then propose a fast, scalable algorithm for the problem. We finally evaluate the performance of the proposed algorithm through experimental simulations. The experimental results demonstrate the significant potential of the proposed algorithm in reducing the response times of tasks.", "title": "" }, { "docid": "1c8e47f700926cf0b6ab6ed7446a6e7a", "text": "Named Entity Recognition (NER) is a key task in biomedical text mining. Accurate NER systems require task-specific, manually-annotated datasets, which are expensive to develop and thus limited in size. Since such datasets contain related but different information, an interesting question is whether it might be possible to use them together to improve NER performance. To investigate this, we develop supervised, multi-task, convolutional neural network models and apply them to a large number of varied existing biomedical named entity datasets. Additionally, we investigated the effect of dataset size on performance in both single- and multi-task settings. We present a single-task model for NER, a Multi-output multi-task model and a Dependent multi-task model. We apply the three models to 15 biomedical datasets containing multiple named entities including Anatomy, Chemical, Disease, Gene/Protein and Species. Each dataset represent a task. The results from the single-task model and the multi-task models are then compared for evidence of benefits from Multi-task Learning. With the Multi-output multi-task model we observed an average F-score improvement of 0.8% when compared to the single-task model from an average baseline of 78.4%. Although there was a significant drop in performance on one dataset, performance improves significantly for five datasets by up to 6.3%. For the Dependent multi-task model we observed an average improvement of 0.4% when compared to the single-task model. There were no significant drops in performance on any dataset, and performance improves significantly for six datasets by up to 1.1%. The dataset size experiments found that as dataset size decreased, the multi-output model’s performance increased compared to the single-task model’s. Using 50, 25 and 10% of the training data resulted in an average drop of approximately 3.4, 8 and 16.7% respectively for the single-task model but approximately 0.2, 3.0 and 9.8% for the multi-task model. Our results show that, on average, the multi-task models produced better NER results than the single-task models trained on a single NER dataset. We also found that Multi-task Learning is beneficial for small datasets. Across the various settings the improvements are significant, demonstrating the benefit of Multi-task Learning for this task.", "title": "" }, { "docid": "b238ceff7cf19621a420494ac311b2dd", "text": "In this paper, we discuss the extension and integration of the statistical concept of Kernel Density Estimation (KDE) in a scatterplot-like visualization for dynamic data at interactive rates. We present a line kernel for representing streaming data, we discuss how the concept of KDE can be adapted to enable a continuous representation of the distribution of a dependent variable of a 2D domain. We propose to automatically adapt the kernel bandwith of KDE to the viewport settings, in an interactive visualization environment that allows zooming and panning. We also present a GPU-based realization of KDE that leads to interactive frame rates, even for comparably large datasets. Finally, we demonstrate the usefulness of our approach in the context of three application scenarios - one studying streaming ship traffic data, another one from the oil & gas domain, where process data from the operation of an oil rig is streaming in to an on-shore operational center, and a third one studying commercial air traffic in the US spanning 1987 to 2008.", "title": "" }, { "docid": "4c30af9dd05b773ce881a312bcad9cb9", "text": "This review summarized various chemical recycling methods for PVC, such as pyrolysis, catalytic dechlorination and hydrothermal treatment, with a view to solving the problem of energy crisis and the impact of environmental degradation of PVC. Emphasis was paid on the recent progress on the pyrolysis of PVC, including co-pyrolysis of PVC with biomass/coal and other plastics, catalytic dechlorination of raw PVC or Cl-containing oil and hydrothermal treatment using subcritical and supercritical water. Understanding the advantage and disadvantage of these treatment methods can be beneficial for treating PVC properly. The dehydrochlorination of PVC mainly happed at low temperature of 250-320°C. The process of PVC dehydrochlorination can catalyze and accelerate the biomass pyrolysis. The intermediates from dehydrochlorination stage of PVC can increase char yield of co-pyrolysis of PVC with PP/PE/PS. For the catalytic degradation and dechlorination of PVC, metal oxides catalysts mainly acted as adsorbents for the evolved HCl or as inhibitors of HCl formation depending on their basicity, while zeolites and noble metal catalysts can produce lighter oil, depending the total number of acid sites and the number of accessible acidic sites. For hydrothermal treatment, PVC decomposed through three stages. In the first region (T<250°C), PVC went through dehydrochlorination to form polyene; in the second region (250°C<T<350°C), polyene decomposed to low-molecular weight compounds; in the third region (350°C<T), polyene further decomposed into a large amount of low-molecular weight compounds.", "title": "" }, { "docid": "e6245f210bfbcf47795604b45cb927ad", "text": "The grid-connected AC module is an alternative solution in photovoltaic (PV) generation systems. It combines a PV panel and a micro-inverter connected to grid. The use of a high step-up converter is essential for the grid-connected micro-inverter because the input voltage is about 15 V to 40 V for a single PV panel. The proposed converter employs a Zeta converter and a coupled inductor, without the extreme duty ratios and high turns ratios generally needed for the coupled inductor to achieve high step-up voltage conversion; the leakage-inductor energy of the coupled inductor is efficiently recycled to the load. These features improve the energy-conversion efficiency. The operating principles and steady-state analyses of continuous and boundary conduction modes, as well as the voltage and current stresses of the active components, are discussed in detail. A 25 V input voltage, 200 V output voltage, and 250 W output power prototype circuit of the proposed converter is implemented to verify the feasibility; the maximum efficiency is up to 97.3%, and full-load efficiency is 94.8%.", "title": "" }, { "docid": "0bce954374d27d4679eb7562350674fc", "text": "Humanoid robotics is attracting the interest of many research groups world-wide. In particular, developing humanoids requires the implementation of manipulation capabilities, which is still a most complex problem in robotics. This paper presents an overview of current activities in the development of humanoid robots, with special focus on manipulation. Then we discuss our current approach to the design and development of anthropomorphic sensorized hand and of anthropomorphic control and sensory-motor coordination schemes. Current achievements in the development of a robotic human hand prosthesis are described, together with preliminary experimental results, as well as in the implementation of biologically-inspired schemes for control and sensory-motor co-ordination in manipulation, derived from models of well-identified human brain areas.", "title": "" }, { "docid": "f37d32a668751198ed8acde8ab3bdc12", "text": "INTRODUCTION\nAlthough the critical feature of attention-deficit/hyperactivity disorder (ADHD) is a persistent pattern of inattention and/or hyperactivity/impulsivity behavior, the disorder is clinically heterogeneous, and concomitant difficulties are common. Children with ADHD are at increased risk for experiencing lifelong impairments in multiple domains of daily functioning. In the present study we aimed to build a brief ADHD impairment-related tool -ADHD concomitant difficulties scale (ADHD-CDS)- to assess the presence of some of the most important comorbidities that usually appear associated with ADHD such as emotional/motivational management, fine motor coordination, problem-solving/management of time, disruptive behavior, sleep habits, academic achievement and quality of life. The two main objectives of the study were (i) to discriminate those profiles with several and important ADHD functional difficulties and (ii) to create a brief clinical tool that fosters a comprehensive evaluation process and can be easily used by clinicians.\n\n\nMETHODS\nThe total sample included 399 parents of children with ADHD aged 6-18 years (M = 11.65; SD = 3.1; 280 males) and 297 parents of children without a diagnosis of ADHD (M = 10.91; SD = 3.2; 149 male). The scale construction followed an item improved sequential process.\n\n\nRESULTS\nFactor analysis showed a 13-item single factor model with good fit indices. Higher scores on inattention predicted higher scores on ADHD-CDS for both the clinical sample (β = 0.50; p < 0.001) and the whole sample (β = 0.85; p < 0.001). The ROC curve for the ADHD-CDS (against the ADHD diagnostic status) gave an area under the curve (AUC) of.979 (95%, CI = [0.969, 0.990]).\n\n\nDISCUSSION\nThe ADHD-CDS has shown preliminary adequate psychometric properties, with high convergent validity and good sensitivity for different ADHD profiles, which makes it a potentially appropriate and brief instrument that may be easily used by clinicians, researchers, and health professionals in dealing with ADHD.", "title": "" }, { "docid": "20e19999be17bce4ba3ae6d94400ba3c", "text": "Due to the coarse granularity of data accesses and the heavy use of latches, indices in the B-tree family are not efficient for in-memory databases, especially in the context of today's multi-core architecture. In this paper, we study the parallelizability of skip lists for the parallel and concurrent environment, and present PSL, a Parallel in-memory Skip List that lends itself naturally to the multi-core environment, particularly with non-uniform memory access. For each query, PSL traverses the index in a Breadth-First-Search (BFS) to find the list node with the matching key, and exploits SIMD processing to speed up this process. Furthermore, PSL distributes incoming queries among multiple execution threads disjointly and uniformly to eliminate the use of latches and achieve a high parallelizability. The experimental results show that PSL is comparable to a readonly index, FAST, in terms of read performance, and outperforms ART and Masstree respectively by up to 30% and 5x for a variety of workloads.", "title": "" }, { "docid": "0cd2da131bf78526c890dae72514a8f0", "text": "This paper presents a research model to explicate that the level of consumers’ participation on companies’ brand microblogs is influenced by their brand attachment process. That is, self-congruence and partner quality affect consumers’ trust and commitment toward companies’ brands, which in turn influence participation on brand microblogs. Further, we propose that gender has important moderating effects in our research model. We empirically test the research hypotheses through an online survey. The findings illustrate that self-congruence and partner quality have positive effects on trust and commitment. Trust affects commitment and participation, while participation is also influenced by commitment. More importantly, the effects of self-congruence on trust and commitment are found to be stronger for male consumers than females. In contrast, the effects of partner quality on trust and commitment are stronger for female consumers than males. Trust posits stronger effects on commitment and participation for males, while commitment has a stronger effect on participation for females. We believe that our findings contribute to the literature on consumer participation behavior and gender differences on brand microblogs. Companies can also apply our findings to strengthen their brand building and participation level of different consumers on their microblogs. 2014 Elsevier Ltd. All rights reserved.", "title": "" }, { "docid": "91e9f4d67c89aea99299966492648300", "text": "In safety critical domains, system test cases are often derived from functional requirements in natural language (NL) and traceability between requirements and their corresponding test cases is usually mandatory. The definition of test cases is therefore time-consuming and error prone, especially so given the quickly rising complexity of embedded systems in many critical domains. Though considerable research has been devoted to automatic generation of system test cases from NL requirements, most of the proposed approaches re- quire significant manual intervention or additional, complex behavioral modelling. This significantly hinders their applicability in practice. In this paper, we propose Use Case Modelling for System Tests Generation (UMTG), an approach that automatically generates executable system test cases from use case spec- ifications and a domain model, the latter including a class diagram and constraints. Our rationale and motivation are that, in many environments, including that of our industry partner in the reported case study, both use case specifica- tions and domain modelling are common and accepted prac- tice, whereas behavioural modelling is considered a difficult and expensive exercise if it is to be complete and precise. In order to extract behavioral information from use cases and enable test automation, UMTG employs Natural Language Processing (NLP), a restricted form of use case specifica- tions, and constraint solving.", "title": "" } ]
scidocsrr
5e60acc4e7cda9b7472ea9b5ce9e44b8
Hardware for machine learning: Challenges and opportunities
[ { "docid": "67adb7fcdf7f1171ea2056c6c8cb81b0", "text": "Today advanced computer vision (CV) systems of ever increasing complexity are being deployed in a growing number of application scenarios with strong real-time and power constraints. Current trends in CV clearly show a rise of neural network-based algorithms, which have recently broken many object detection and localization records. These approaches are very flexible and can be used to tackle many different challenges by only changing their parameters. In this paper, we present the first convolutional network accelerator which is scalable to network sizes that are currently only handled by workstation GPUs, but remains within the power envelope of embedded systems. The architecture has been implemented on 3.09 mm2 core area in UMC 65 nm technology, capable of a throughput of 274 GOp/s at 369 GOp/s/W with an external memory bandwidth of just 525 MB/s full-duplex \" a decrease of more than 90% from previous work.", "title": "" }, { "docid": "5c8c391a10f32069849d743abc5e8210", "text": "We present a massively parallel coprocessor for accelerating Convolutional Neural Networks (CNNs), a class of important machine learning algorithms. The coprocessor functional units, consisting of parallel 2D convolution primitives and programmable units performing sub-sampling and non-linear functions specific to CNNs, implement a “meta-operator” to which a CNN may be compiled to. The coprocessor is serviced by distributed off-chip memory banks with large data bandwidth. As a key feature, we use low precision data and further increase the effective memory bandwidth by packing multiple words in every memory operation, and leverage the algorithm’s simple data access patterns to use off-chip memory as a scratchpad for intermediate data, critical for CNNs. A CNN is mapped to the coprocessor hardware primitives with instructions to transfer data between the memory and coprocessor. We have implemented a prototype of the CNN coprocessor on an off-the-shelf PCI FPGA card with a single Xilinx Virtex5 LX330T FPGA and 4 DDR2 memory banks totaling 1GB. The coprocessor prototype can process at the rate of 3.4 billion multiply accumulates per second (GMACs) for CNN forward propagation, a speed that is 31x faster than a software implementation on a 2.2 GHz AMD Opteron processor. For a complete face recognition application with the CNN on the coprocessor and the rest of the image processing tasks on the host, the prototype is 6-10x faster, depending on the host-coprocessor bandwidth.", "title": "" }, { "docid": "b7d13c090e6d61272f45b1e3090f0341", "text": "Deep Neural Networks (DNN) have achieved state-of-the-art results in a wide range of tasks, with the best results obtained with large training sets and large models. In the past, GPUs enabled these breakthroughs because of their greater computational speed. In the future, faster computation at both training and test time is likely to be crucial for further progress and for consumer applications on low-power devices. As a result, there is much interest in research and development of dedicated hardware for Deep Learning (DL). Binary weights, i.e., weights which are constrained to only two possible values (e.g. -1 or 1), would bring great benefits to specialized DL hardware by replacing many multiply-accumulate operations by simple accumulations, as multipliers are the most space and powerhungry components of the digital implementation of neural networks. We introduce BinaryConnect, a method which consists in training a DNN with binary weights during the forward and backward propagations, while retaining precision of the stored weights in which gradients are accumulated. Like other dropout schemes, we show that BinaryConnect acts as regularizer and we obtain near state-of-the-art results with BinaryConnect on the permutation-invariant MNIST, CIFAR-10 and SVHN.", "title": "" }, { "docid": "59ba2709e4f3653dcbd3a4c0126ceae1", "text": "Processing-in-memory (PIM) is a promising solution to address the \"memory wall\" challenges for future computer systems. Prior proposed PIM architectures put additional computation logic in or near memory. The emerging metal-oxide resistive random access memory (ReRAM) has showed its potential to be used for main memory. Moreover, with its crossbar array structure, ReRAM can perform matrix-vector multiplication efficiently, and has been widely studied to accelerate neural network (NN) applications. In this work, we propose a novel PIM architecture, called PRIME, to accelerate NN applications in ReRAM based main memory. In PRIME, a portion of ReRAM crossbar arrays can be configured as accelerators for NN applications or as normal memory for a larger memory space. We provide microarchitecture and circuit designs to enable the morphable functions with an insignificant area overhead. We also design a software/hardware interface for software developers to implement various NNs on PRIME. Benefiting from both the PIM architecture and the efficiency of using ReRAM for NN computation, PRIME distinguishes itself from prior work on NN acceleration, with significant performance improvement and energy saving. Our experimental results show that, compared with a state-of-the-art neural processing unit design, PRIME improves the performance by ~2360× and the energy consumption by ~895×, across the evaluated machine learning benchmarks.", "title": "" } ]
[ { "docid": "6315288620132b456feeb78f36362ca7", "text": "Autonomous systems such as unmanned vehicles are beginning to operate within society. All participants in society are required to follow specific regulations and laws. An autonomous system cannot be an exception. Inevitably an autonomous system will find itself in a situation in which it needs to not only choose to obey a rule or not, but also make a complex ethical decision. However, there exists no obvious way to implement the human understanding of ethical behaviour in computers. Even if we enable autonomous systems to distinguish between more and less ethical alternatives, how can we be sure that they would choose right? We consider autonomous systems with a hybrid architecture in which the highest level of reasoning is executed by a rational (BDI) agent. For such a system, formal verification has been used successfully to prove that specific rules of behaviour are observed when making decisions. We propose a theoretical framework for ethical plan selection that can be formally verified. We implement a rational agent that incorporates a given ethical policy in its plan selection and show that we can formally verify that the agent chooses to execute, to the best of its beliefs, the most ethical available plan. © 2015 The Authors. Published by Elsevier B.V. This is an open access article under the CC BY license (http://creativecommons.org/licenses/by/4.0/).", "title": "" }, { "docid": "bc262b5366f1bf14e5120f68df8f5254", "text": "BACKGROUND\nThe aim of this study was to compare the results of laparoscopy-assisted total gastrectomy with those of open total gastrectomy for early gastric cancer.\n\n\nMETHODS\nPatients with gastric cancer who underwent total gastrectomy with curative intent in three Korean tertiary hospitals between January 2003 and December 2010 were included in this multicentre, retrospective, propensity score-matched cohort study. Cox proportional hazards regression models were used to evaluate the association between operation method and survival.\n\n\nRESULTS\nA total of 753 patients with early gastric cancer were included in the study. There were no significant differences in the matched cohort for overall survival (hazard ratio (HR) for laparoscopy-assisted versus open total gastrectomy 0.96, 95 per cent c.i. 0.57 to 1.65) or recurrence-free survival (HR 2.20, 0.51 to 9.52). The patterns of recurrence were no different between the two groups. The severity of complications, according to the Clavien-Dindo classification, was similar in both groups. The most common complications were anastomosis-related in the laparoscopy-assisted group (8.0 per cent versus 4.2 per cent in the open group; P = 0.015) and wound-related in the open group (1.6 versus 5.6 per cent respectively; P = 0.003). Postoperative death was more common in the laparoscopy-assisted group (1.6 versus 0.2 per cent; P = 0.045).\n\n\nCONCLUSION\nLaparoscopy-assisted total gastrectomy for early gastric cancer is feasible in terms of long-term results, including survival and recurrence. However, a higher postoperative mortality rate and an increased risk of anastomotic leakage after laparoscopic-assisted total gastrectomy are of concern.", "title": "" }, { "docid": "c6daad10814bafb3453b12cfac30b788", "text": "In this paper, we study the problem of image-text matching. Inferring the latent semantic alignment between objects or other salient stuff (e.g. snow, sky, lawn) and the corresponding words in sentences allows to capture fine-grained interplay between vision and language, and makes image-text matching more interpretable. Prior work either simply aggregates the similarity of all possible pairs of regions and words without attending differentially to more and less important words or regions, or uses a multi-step attentional process to capture limited number of semantic alignments which is less interpretable. In this paper, we present Stacked Cross Attention to discover the full latent alignments using both image regions and words in a sentence as context and infer image-text similarity. Our approach achieves the state-of-the-art results on the MSCOCO and Flickr30K datasets. On Flickr30K, our approach outperforms the current best methods by 22.1% relatively in text retrieval from image query, and 18.2% relatively in image retrieval with text query (based on Recall@1). On MS-COCO, our approach improves sentence retrieval by 17.8% relatively and image retrieval by 16.6% relatively (based on Recall@1 using the 5K test set). Code has been made available at: https: //github.com/kuanghuei/SCAN.", "title": "" }, { "docid": "adc2398201dc98a887ab0a4232777123", "text": "In this study, we examine how geographic distance affects collaboration using computer-mediated communication technology. We investigated experimentally the effects of cooperating partners being in the same or distant city on three behaviors: cooperation, persuasion, and deception using video conferencing and instant messaging (IM). Our results indicate that subjects are more likely to deceive, be less persuaded by, and initially cooperate less, with someone they believe is in a distant city, as opposed to in the same city as them. Although people initially cooperate less with someone they believe is far away, their willingness to cooperate increases quickly with interaction. Since the same media were used in both the far and near city conditions, these effects cannot be attributed to the media, but rather to social differences. This study confirms how CSCW needs to be concerned with developing technologies for bridging social distance, as well as geographic distance.", "title": "" }, { "docid": "95fbf262f9e673bd646ad7e02c5cbd53", "text": "Department of Finance Stern School of Business and NBER, New York University, 44 W. 4th Street, New York, NY 10012; mkacperc@stern.nyu.edu; http://www.stern.nyu.edu/∼mkacperc. Department of Finance Stern School of Business, NBER, and CEPR, New York University, 44 W. 4th Street, New York, NY 10012; svnieuwe@stern.nyu.edu; http://www.stern.nyu.edu/∼svnieuwe. Department of Economics Stern School of Business, NBER, and CEPR, New York University, 44 W. 4th Street, New York, NY 10012; lveldkam@stern.nyu.edu; http://www.stern.nyu.edu/∼lveldkam. We thank John Campbell, Joseph Chen, Xavier Gabaix, Vincent Glode, Ralph Koijen, Jeremy Stein, Matthijs van Dijk, and seminar participants at NYU Stern (economics and finance), Harvard Business School, Chicago Booth, MIT Sloan, Yale SOM, Stanford University (economics and finance), University of California at Berkeley (economics and finance), UCLA economics, Duke economics, University of Toulouse, University of Vienna, Australian National University, University of Melbourne, University of New South Wales, University of Sydney, University of Technology Sydney, Erasmus University, University of Mannheim, University of Alberta, Concordia, Lugano, the Amsterdam Asset Pricing Retreat, the Society for Economic Dynamics meetings in Istanbul, CEPR Financial Markets conference in Gerzensee, UBC Summer Finance conference, and Econometric Society meetings in Atlanta for useful comments and suggestions. Finally, we thank the Q-group for their generous financial support.", "title": "" }, { "docid": "b5a0dc7905455c56a27b021603e6be86", "text": "The aim of the next generation of computer numerically controlled (CNC) machines is to be portable, interoperable and adaptable. Over the years, G-codes (ISO 6983) have been extensively used by the CNC machine tools for part programming and are now considered as a bottleneck for developing next generation of CNC machines. A new standard known as STEP-NC is being developed as the data model for a new breed of CNC machine tools. The data model represents a common standard specifically aimed at the intelligent CNC manufacturing workstation, making the goal of a standardised CNC controller and NC code generation facility a reality. It is believed that CNC machines implementing STEP-NC will be the basis for a more open and adaptable architecture. This paper outlines a futuristic view of STEP-NC to support distributed interoperable intelligent manufacturing through global networking with autonomous manufacturing workstations with STEP compliant data interpretation, intelligent part program generation, diagnostics and maintenance, monitoring and job production scheduling. # 2005 Elsevier B.V. All rights reserved.", "title": "" }, { "docid": "698500e168dcabc66517a2f2bc10aeed", "text": "Lindsay, R.K., B.G. Buchanan, E.A. Feigenbaum and J. Lederberg, DENDRAL: a case study of the first expert system for scientific hypothesis formation, Artificial Intelligence 61 (1993) 209-261. The DENDRAL Project was one of the first large-scale programs to embody the strategy of using detailed, task-specific knowledge about a problem domain as a source of heuristics, and to seek generality through automating the acquisition of such knowledge. This paper summarizes the major conceptual contributions and accomplishments of that project. It is an attempt to distill from this research the lessons that are of importance to artificial intelligence research and to provide a record of the final status of two decades of work. Correspondence to: R.K. Lindsay, University of Michigan, 205 Zina Pitcher Place, Ann Arbor, MI 48109, USA. Telephone: (313) 764-4227. Fax: (313) 747.4130. E-mail: lindsay@umich.edu. *This research was supported by the National Aeronautics and Space Administrations, the Advanced Research Projects Agency of the Department of Defense, and the National Institutes of Health. This paper draws upon [37], expanding and updating that account in light of subsequent developments and the benefit of hindsight. Large portions of descriptive material are taken nearly verbatim to make the present paper self-contained since the book itself is no longer in print. OOO4-3702/93/$06.00", "title": "" }, { "docid": "8cdd4a8910467974dc7cfee30f6f570b", "text": "This work contains a theoretical study and computer simulations of a new self-organizing process. The principal discovery is that in a simple network of adaptive physical elements which receives signals from a primary event space, the signal representations are automatically mapped onto a set of output responses in such a way that the responses acquire the same topological order as that of the primary events. In other words, a principle has been discovered which facilitates the automatic formation of topologically correct maps of features of observable events. The basic self-organizing system is a one- or two-dimensional array of processing units resembling a network of threshold-logic units, and characterized by short-range lateral feedback between neighbouring units. Several types of computer simulations are used to demonstrate the ordering process as well as the conditions under which it fails.", "title": "" }, { "docid": "fcdc29be7b6766110ee5b4d4d1a777bd", "text": "A high-voltage stimulator has been designed to allow transcutaneous stimulation of tactile fibers of the fingertip. The stimulator's output stage was based upon an improved Howland current pump topology, modified to allow high load impedances and small currents, The compliance voltage of approximately 800 V is achieved using commercially available high-voltage operational amplifiers. The output current accuracy is better than /spl plusmn/5% over the range of 1 to 25 mA for 30 /spl mu/s or longer pulses. The rise time for square pulses is less than 1 /spl mu/s. High-voltage, common-mode, latch-up power supply problems and solutions are discussed. The stimulator's input stage is optically coupled to the controlling computer and complies with applicable safety standards for use in a hospital environment. The design presented here is for monophasic stimulation only, but could be modified for biphasic stimulation.", "title": "" }, { "docid": "009f83c48787d956b8ee79c1d077d825", "text": "Learning salient representations of multiview data is an essential step in many applications such as image classification, retrieval, and annotation. Standard predictive methods, such as support vector machines, often directly use all the features available without taking into consideration the presence of distinct views and the resultant view dependencies, coherence, and complementarity that offer key insights to the semantics of the data, and are therefore offering weak performance and are incapable of supporting view-level analysis. This paper presents a statistical method to learn a predictive subspace representation underlying multiple views, leveraging both multiview dependencies and availability of supervising side-information. Our approach is based on a multiview latent subspace Markov network (MN) which fulfills a weak conditional independence assumption that multiview observations and response variables are conditionally independent given a set of latent variables. To learn the latent subspace MN, we develop a large-margin approach which jointly maximizes data likelihood and minimizes a prediction loss on training data. Learning and inference are efficiently done with a contrastive divergence method. Finally, we extensively evaluate the large-margin latent MN on real image and hotel review datasets for classification, regression, image annotation, and retrieval. Our results demonstrate that the large-margin approach can achieve significant improvements in terms of prediction performance and discovering predictive latent subspace representations.", "title": "" }, { "docid": "bb1b3878d1f96e12d82a4fb1c5f84351", "text": "BACKGROUND\nSex and lifestyle factors are known to influence the oxidation of protein, lipids, and DNA. Biomarkers such as protein carbonyls (PC), malondialdehyde (MDA), and 8-hydroxydeoxyguanosine (8-OHdG) have been commonly used in an attempt to characterize the oxidative status of human subjects.\n\n\nOBJECTIVE\nThis study compared resting blood oxidative stress biomarkers, in relation to exercise training status and dietary intake, between men and women.\n\n\nMETHODS\nExercise-trained and sedentary men and women (with normal menstrual cycles; reporting during the early follicular phase) were recruited from the University of Memphis, Tennessee, campus and surrounding community via recruitment flyers and word of mouth. Participants were categorized by sex and current exercise training status (ie, trained or untrained). Each completed a detailed 5-day food record of all food and drink consumed. Diets were analyzed for kilocalories and macro- and micronutrient (vitamins C, E, A) intake. Venous blood samples were obtained at rest and analyzed for PC, MDA, and 8-OHdG.\n\n\nRESULTS\nIn the 131 participants (89 men, of whom 74 were exercise trained and 15 untrained, and 42 women, of whom 22 were exercise trained and 20 untrained; mean [SD] age, 24 [4] years), PC did not differ significantly between trained men and women or between untrained men and women. However, trained participants had significantly lower plasma PC (measured in nmol . mg protein(-1)) (mean [SEM] 0.0966 [0.0055]) than did untrained participants (0.1036 [0.0098]) (P < 0.05). MDA levels (measured in micromol . L(-1)) were significantly lower in trained women (0.4264 [0.0559]) compared with trained men (0.6959 [0.0593]); in trained men and women combined (0.5621 [0.0566]) compared with untrained men and women combined (0.7397 [0.0718]); and in women combined (0.5665 [0.0611]) compared with men combined (0.7338 [0.0789]) (P < 0.05 for all comparisons). No significant differences were noted between any groups for 8-OHdG. Neither PC nor 8-OHdG were correlated to any dietary variable, with the exception of PC and percent of protein in untrained men (r = 0.552; P = 0.033). MDA was positively correlated to protein intake and negatively correlated to percent of carbohydrate and vitamin C intake, primarily in trained men (P < or = 0.03).\n\n\nCONCLUSIONS\nIn this sample of young healthy adults, oxidative stress was lower in women than in men and in trained compared with untrained individuals, particularly regarding MDA. With the exception of MDA primarily in trained men, dietary intake did not appear to be correlated to biomarkers of oxidative stress.", "title": "" }, { "docid": "7220e44cff27a0c402a8f39f95ca425d", "text": "The Argument Web is maturing as both a platform built upon a synthesis of many contemporary theories of argumentation in philosophy and also as an ecosystem in which various applications and application components are contributed by different research groups around the world. It already hosts the largest publicly accessible corpora of argumentation and has the largest number of interoperable and cross compatible tools for the analysis, navigation and evaluation of arguments across a broad range of domains, languages and activity types. Such interoperability is key in allowing innovative combinations of tool and data reuse that can further catalyse the development of the field of computational argumentation. The aim of this paper is to summarise the key foundations, the recent advances and the goals of the Argument Web, with a particular focus on demonstrating the relevance to, and roots in, philosophical argumentation theory.", "title": "" }, { "docid": "8f3eaf1a65cd3d81e718143304e4ce81", "text": "Issue tracking systems store valuable data for testing hypotheses concerning maintenance, building statistical prediction models and recently investigating developers \"affectiveness\". In particular, the Jira Issue Tracking System is a proprietary tracking system that has gained a tremendous popularity in the last years and offers unique features like the project management system and the Jira agile kanban board. This paper presents a dataset extracted from the Jira ITS of four popular open source ecosystems (as well as the tools and infrastructure used for extraction) the Apache Software Foundation, Spring, JBoss and CodeHaus communities. Our dataset hosts more than 1K projects, containing more than 700K issue reports and more than 2 million issue comments. Using this data, we have been able to deeply study the communication process among developers, and how this aspect affects the development process. Furthermore, comments posted by developers contain not only technical information, but also valuable information about sentiments and emotions. Since sentiment analysis and human aspects in software engineering are gaining more and more importance in the last years, with this repository we would like to encourage further studies in this direction.", "title": "" }, { "docid": "33447e2bf55a419dfec2520e9449ef0e", "text": "We present a unified unsupervised statistical model for text normalization. The relationship between standard and non-standard tokens is characterized by a log-linear model, permitting arbitrary features. The weights of these features are trained in a maximumlikelihood framework, employing a novel sequential Monte Carlo training algorithm to overcome the large label space, which would be impractical for traditional dynamic programming solutions. This model is implemented in a normalization system called UNLOL, which achieves the best known results on two normalization datasets, outperforming more complex systems. We use the output of UNLOL to automatically normalize a large corpus of social media text, revealing a set of coherent orthographic styles that underlie online language variation.", "title": "" }, { "docid": "71d1ec46c47aacab15e2c34f279a3c7a", "text": "Although additive layer manufacturing is well established for rapid prototyping the low throughput and historic costs have prevented mass-scale adoption. The recent development of the RepRap, an open source self-replicating rapid prototyper, has made low-cost 3-D printers readily available to the public at reasonable prices (<$1,000). The RepRap (Prusa Mendell variant) currently prints 3-D objects in a 200x200x140 square millimeters build envelope from acrylonitrile butadiene styrene (ABS) and polylactic acid (PLA). ABS and PLA are both thermoplastics that can be injection-molded, each with their own benefits, as ABS is rigid and durable, while PLA is plant-based and can be recycled and composted. The melting temperature of ABS and PLA enable use in low-cost 3-D printers, as these temperature are low enough to use in melt extrusion in the home, while high enough for prints to retain their shape at average use temperatures. Using 3-D printers to manufacture provides the ability to both change the fill composition by printing voids and fabricate shapes that are impossible to make using tradition methods like injection molding. This allows more complicated shapes to be created while using less material, which could reduce environmental impact. As the open source 3-D printers continue to evolve and improve in both cost and performance, the potential for economically-viable distributed manufacturing of products increases. Thus, products and components could be customized and printed on-site by individual consumers as needed, reversing the historical trend towards centrally mass-manufactured and shipped products. Distributed manufacturing reduces embodied transportation energy from the distribution of conventional centralized manufacturing, but questions remain concerning the potential for increases in the overall embodied energy of the manufacturing due to reduction in scale. In order to quantify the environmental impact of distributed manufacturing using 3-D printers, a life cycle analysis was performed on a plastic juicer. The energy consumed and emissions produced from conventional large-scale production overseas are compared to experimental measurements on a RepRap producing identical products with ABS and PLA. The results of this LCA are discussed in relation to the environmental impact of distributed manufacturing with 3-D printers and polymer selection for 3-D printing to reduce this impact. The results of this study show that distributed manufacturing uses less energy than conventional manufacturing due to the RepRap's unique ability to reduce fill composition. Distributed manufacturing also has less emissions than conventional manufacturing when using PLA and when using ABS with solar photovoltaic power. The results of this study indicate that opensource additive layer distributed manufacturing is both technically viable and beneficial from an ecological perspective. Mater. Res. Soc. Symp. Proc. Vol. 1492 © 2013 Materials Research Society DOI: 1 557/op 013 0.1 l.2 .319", "title": "" }, { "docid": "1ead17fc0770233db8903db2b4f15c79", "text": "The major objective of this paper is to examine the determinants of collaborative commerce (c-commerce) adoption with special emphasis on Electrical and Electronic organizations in Malaysia. Original research using a self-administered questionnaire was distributed to 400 Malaysian organizations. Out of the 400 questionnaires posted, 109 usable questionnaires were returned, yielding a response rate of 27.25%. Data were analysed by using correlation and multiple regression analysis. External environment, organization readiness and information sharing culture were found to be significant in affecting organ izations decision to adopt c-commerce. Information sharing culture factor was found to have the strongest influence on the adoption of c-commerce, followed by organization readiness and external environment. Contrary to other technology adoption studies, this research found that innovation attributes have no significant influence on the adoption of c-commerce. In terms of theoretical contributions, this study has extended previous researches conducted in western countries and provides great potential by advancing the understanding between the association of adoption factors and c-commerce adoption level. This research show that adoption studies could move beyond studying the factors based on traditional adoption models. Organizations planning to adopt c-commerce would also be able to applied strategies based on the findings from this research.", "title": "" }, { "docid": "bd700aba43a8a8de5615aa1b9ca595a7", "text": "Cloud computing has formed the conceptual and infrastructural basis for tomorrow’s computing. The global computing infrastructure is rapidly moving towards cloud based architecture. While it is important to take advantages of could based computing by means of deploying it in diversified sectors, the security aspects in a cloud based computing environment remains at the core of interest. Cloud based services and service providers are being evolved which has resulted in a new business trend based on cloud technology. With the introduction of numerous cloud based services and geographically dispersed cloud service providers, sensitive information of different entities are normally stored in remote servers and locations with the possibilities of being exposed to unwanted parties in situations where the cloud servers storing those information are compromised. If security is not robust and consistent, the flexibility and advantages that cloud computing has to offer will have little credibility. This paper presents a review on the cloud computing concepts as well as security issues inherent within the context of cloud computing and cloud", "title": "" }, { "docid": "a903f9eb225a79ebe963d1905af6d3c8", "text": "We have developed a multithreaded implementation of breadth-first search (BFS) of a sparse graph using the Cilk++ extensions to C++. Our PBFS program on a single processor runs as quickly as a standar. C++ breadth-first search implementation. PBFS achieves high work-efficiency by using a novel implementation of a multiset data structure, called a \"bag,\" in place of the FIFO queue usually employed in serial breadth-first search algorithms. For a variety of benchmark input graphs whose diameters are significantly smaller than the number of vertices -- a condition met by many real-world graphs -- PBFS demonstrates good speedup with the number of processing cores.\n Since PBFS employs a nonconstant-time \"reducer\" -- \"hyperobject\" feature of Cilk++ -- the work inherent in a PBFS execution depends nondeterministically on how the underlying work-stealing scheduler load-balances the computation. We provide a general method for analyzing nondeterministic programs that use reducers. PBFS also is nondeterministic in that it contains benign races which affect its performance but not its correctness. Fixing these races with mutual-exclusion locks slows down PBFS empirically, but it makes the algorithm amenable to analysis. In particular, we show that for a graph G=(V,E) with diameter D and bounded out-degree, this data-race-free version of PBFS algorithm runs it time O((V+E)/P + Dlg3(V/D)) on P processors, which means that it attains near-perfect linear speedup if P << (V+E)/Dlg3(V/D).", "title": "" }, { "docid": "a0c2d66833addbd7a3c565e2ddbd8405", "text": "Renewable Micro Sources (RENMSs) will strongly contribute to the accelerating electrification trend currently ongoing. Furthermore, the upcoming mass electrification of automotive, with the related pulverized, but numerically important, electricity storage potential, suggests to start considering how to guarantee a stable and sustainable grid power. In this frame, it is interesting to consider the possibility to couple to each RENMS a dedicated Small Scale Electrical Energy Storage System (SS-EESS), so to be able to dispatch out of the RENMS a grid-compliant RENMS-produced power. An overview of SS-EESSs is hence hereby given, under the points of view of their current main technical features and their prospected costs. It is found that mechanical-based systems like Small Scale Compressed Energy Storage and Flywheels are interesting options for RENMS/SS-EESS dedicated coupling, although fast technological progress in the field of SS-EESSs and the emergence of a clear trend towards joining more energy storage principles (like batteries-supercapacitors assemblies) will likely change the landscape of this field in the next years. In this view, further studies over dedicated coupling of SS-EESSs and RENMSs could help to avoid difficulties in dealing with exploding electricity storage problems in the next years.", "title": "" } ]
scidocsrr
5a05b75aec6ae542f8a13389f558bb09
Developing the Models of Service Quality Gaps : A Critical Discussion
[ { "docid": "5971934855f9d4dde2a7fc91e757606c", "text": "The use of total quality management (TQM), which creates a system of management procedures that focuses on customer satisfaction and transforms the corporate culture so as to guarantee continual improvement, is discussed. The team approach essential to its implementation is described. Two case studies of applying TQM at AT&T are presented.<<ETX>>", "title": "" }, { "docid": "67379c945de57c3662a2cd96cd67c15b", "text": "Introduction This paper’s purpose is to illustrate the relationship of profitability to intermediate, customer-related outcomes that managers can influence directly. It is predominantly a general management discussion, consistent with the Nordic School’s view that services are highly interdisciplinary, requiring a “service management” approach (see Grönroos, 1984, 1991). Its findings support the theory that customer satisfaction is related to customer loyalty, which in turn is related to profitability (Heskett et al., 1994, and discussed in Storbacka et al., 1994). While this theory has been advocated for service firms as a class, this paper presents an empirical analysis of one retail bank, limiting the findings’ generalizability. The service profit chain (Heskett et al., 1994) hypothesizes that:", "title": "" } ]
[ { "docid": "c04e3a28b6f3f527edae534101232701", "text": "An intelligent interface for an information retrieval system has the aims of controlling an underlying information retrieval system di rectly interacting with the user and allowing him to retrieve relevant information without the support of a human intermediary Developing intelligent interfaces for information retrieval is a di cult activity and no well established models of the functions that such systems should possess are available Despite of this di culty many intelligent in terfaces for information retrieval have been implemented in the past years This paper surveys these systems with two aims to stand as a useful entry point for the existing literature and to sketch an ana lysis of the functionalities that an intelligent interface for information retrieval has to possess", "title": "" }, { "docid": "f17f2e754149474ea879711dc5bcd087", "text": "In grasping, shape adaptation between hand and object has a major influence on grasp success. In this paper, we present an approach to grasping unknown objects that explicitly considers the effect of shape adaptability to simplify perception. Shape adaptation also occurs between the hand and the environment, for example, when fingers slide across the surface of the table to pick up a small object. Our approach to grasping also considers environmental shape adaptability to select grasps with high probability of success. We validate the proposed shape-adaptability-aware grasping approach in 880 real-world grasping trials with 30 objects. Our experiments show that the explicit consideration of shape adaptability of the hand leads to robust grasping of unknown objects. Simple perception suffices to achieve this robust grasping behavior.", "title": "" }, { "docid": "d59cc1c197099db86aba4d9f79cb6267", "text": "The rapid growth of the Internet as an environment for information exchange and the lack of enforceable standards regarding the information it contains has lead to numerous information qual ity problems. A major issue is the inability of Search Engine technology to wade through the vast expanse of questionable content and return \"quality\" results to a user's query. This paper attempts to address some of the issues involved in determining what quality is, as it pertains to information retrieval on the Internet. The IQIP model is presented as an approach to managing the choice and implementation of quality related algorithms of an Internet crawling Search Engine.", "title": "" }, { "docid": "b314fcc883f4182c45d0c4eb5511df0b", "text": "The absorption of the light by sea water and light scattering by small particles of underwater environment has become an obstacle of underwater vision researches with camera. It gives impact to the limitation of visibility distances camera in the sea water. The research of 3D reconstruction requires image matching technique to find out the keypoints of image pairs. SIFT is one of the image matching technique where the quality of image matching depends on the quality of the image. This research proposed HSV conversion image with auto level color correction to increase the number of SIFT image matching. The experimental results show the number of image matching is increase until 4 %.", "title": "" }, { "docid": "a5e3a061af7386db9d7c116409da205e", "text": "This paper describes an online learning based method to detect flames in video by processing the data generated by an ordinary camera monitoring a scene. Our fire detection method consists of weak classifiers based on temporal and spatial modeling of flames. Markov models representing the flame and flame colored ordinary moving objects are used to distinguish temporal flame flicker process from motion of flame colored moving objects. Boundary of flames are represented in wavelet domain and high frequency nature of the boundaries of fire regions is also used as a clue to model the flame flicker spatially. Results from temporal and spatial weak classifiers based on flame flicker and irregularity of the flame region boundaries are updated online to reach a final decision. False alarms due to ordinary and periodic motion of flame colored moving objects are greatly reduced when compared to the existing video based fire detection systems.", "title": "" }, { "docid": "9bacc1ef43fd8c05dde814a18f59e467", "text": "The processes that affect removal and retention of nitrogen during wastewater treatment in constructed wetlands (CWs) are manifold and include NH(3) volatilization, nitrification, denitrification, nitrogen fixation, plant and microbial uptake, mineralization (ammonification), nitrate reduction to ammonium (nitrate-ammonification), anaerobic ammonia oxidation (ANAMMOX), fragmentation, sorption, desorption, burial, and leaching. However, only few processes ultimately remove total nitrogen from the wastewater while most processes just convert nitrogen to its various forms. Removal of total nitrogen in studied types of constructed wetlands varied between 40 and 55% with removed load ranging between 250 and 630 g N m(-2) yr(-1) depending on CWs type and inflow loading. However, the processes responsible for the removal differ in magnitude among systems. Single-stage constructed wetlands cannot achieve high removal of total nitrogen due to their inability to provide both aerobic and anaerobic conditions at the same time. Vertical flow constructed wetlands remove successfully ammonia-N but very limited denitrification takes place in these systems. On the other hand, horizontal-flow constructed wetlands provide good conditions for denitrification but the ability of these system to nitrify ammonia is very limited. Therefore, various types of constructed wetlands may be combined with each other in order to exploit the specific advantages of the individual systems. The soil phosphorus cycle is fundamentally different from the N cycle. There are no valency changes during biotic assimilation of inorganic P or during decomposition of organic P by microorganisms. Phosphorus transformations during wastewater treatment in CWs include adsorption, desorption, precipitation, dissolution, plant and microbial uptake, fragmentation, leaching, mineralization, sedimentation (peat accretion) and burial. The major phosphorus removal processes are sorption, precipitation, plant uptake (with subsequent harvest) and peat/soil accretion. However, the first three processes are saturable and soil accretion occurs only in FWS CWs. Removal of phosphorus in all types of constructed wetlands is low unless special substrates with high sorption capacity are used. Removal of total phosphorus varied between 40 and 60% in all types of constructed wetlands with removed load ranging between 45 and 75 g N m(-2) yr(-1) depending on CWs type and inflow loading. Removal of both nitrogen and phosphorus via harvesting of aboveground biomass of emergent vegetation is low but it could be substantial for lightly loaded systems (cca 100-200 g N m(-2) yr(-1) and 10-20 g P m(-2) yr(-1)). Systems with free-floating plants may achieve higher removal of nitrogen via harvesting due to multiple harvesting schedule.", "title": "" }, { "docid": "fa7d7672301fdb3cdf3a6f7624165df1", "text": "We present a 2-mm diameter, 35-μm-thick disk resonator gyro (DRG) fabricated in <;111> silicon with integrated 0.35-μm CMOS analog front-end circuits. The device is fabricated in the commercial InvenSense Fabrication MEMSCMOS integrated platform, which incorporates a wafer-level vacuum seal, yielding a quality factor (Q) of 2800 at the DRGs 78-kHz resonant frequency. After performing electrostatic tuning to enable mode-matched operation, this DRG achieves a 55 μV/°/s sensitivity. Resonator vibration in the sense and drive axes is sensed using capacitive transduction, and amplified using a lownoise, on-chip integrated circuit. This allows the DRG to achieve Brownian noise-limited performance. The angle random walk is measured to be 0.008°/s/√(Hz) and the bias instability is 20°/h.", "title": "" }, { "docid": "4a2cf5de0787b9b5a486c411fd6455e6", "text": "To improve a product you will need most likely developers, managers and user feedback. Besides the basic software qualities other important properties are usability and user experience for developing a good product. Usability is well known and can be tested with e.g. a usability test or an expert review. In contrast user experience describes the whole impact a product has on the end-user. The timeline goes from before, while and after the use of a product. We present a tool that allows to evaluate the user experience of a product with little effort. We show in addition how this tool can be used for a continuous user experience assessment.", "title": "" }, { "docid": "af4055df4a60a241f43d453f34189d86", "text": "We propose an adaptive learning procedure to learn patch-based image priors for image denoising. The new algorithm, called the expectation-maximization (EM) adaptation, takes a generic prior learned from a generic external database and adapts it to the noisy image to generate a specific prior. Different from existing methods that combine internal and external statistics in ad hoc ways, the proposed algorithm is rigorously derived from a Bayesian hyper-prior perspective. There are two contributions of this paper. First, we provide full derivation of the EM adaptation algorithm and demonstrate methods to improve the computational complexity. Second, in the absence of the latent clean image, we show how EM adaptation can be modified based on pre-filtering. The experimental results show that the proposed adaptation algorithm yields consistently better denoising results than the one without adaptation and is superior to several state-of-the-art algorithms.", "title": "" }, { "docid": "a19787b0ddf3a6458b0eced0e971eb20", "text": "BACKGROUND\nThe psychological autopsy method offers the most direct technique currently available for examining the relationship between particular antecedents and suicide. This systematic review aimed to examine the results of studies of suicide that used a psychological autopsy method.\n\n\nMETHOD\nA computer aided search of MEDLINE, BIDS ISI and PSYCHLIT, supplemented by reports known to the reviewers and reports identified from the reference lists of other retrieved reports. Two investigators systematically and independently examined all reports. Median proportions were determined and population attributable fractions were calculated, where possible, in cases of suicide and controls.\n\n\nRESULTS\nOne hundred and fifty-four reports were identified, of which 76 met the criteria for inclusion; 54 were case series and 22 were case-control studies. The median proportion of cases with mental disorder was 91% (95 % CI 81-98%) in the case series. In the case-control studies the figure was 90% (88-95%) in the cases and 27% (14-48%) in the controls. Co-morbid mental disorder and substance abuse also preceded suicide in more cases (38%, 19-57%) than controls (6%, 0-13%). The population attributable fraction for mental disorder ranged from 47-74% in the seven studies in which it could be calculated. The effects of particular disorders and sociological variables have been insufficiently studied to draw clear conclusions.\n\n\nCONCLUSIONS\nThe results indicated that mental disorder was the most strongly associated variable of those that have been studied. Further studies should focus on specific disorders and psychosocial factors. Suicide prevention strategies may be most effective if focused on the treatment of mental disorders.", "title": "" }, { "docid": "77362cc72d7a09dbbb0f067c11fe8087", "text": "The Cloud computing paradigm has revolutionised the computer science horizon during the past decade and has enabled the emergence of computing as the fifth utility. It has captured significant attention of academia, industries, and government bodies. Now, it has emerged as the backbone of modern economy by offering subscription-based services anytime, anywhere following a pay-as-you-go model. This has instigated (1) shorter establishment times for start-ups, (2) creation of scalable global enterprise applications, (3) better cost-to-value associativity for scientific and high-performance computing applications, and (4) different invocation/execution models for pervasive and ubiquitous applications. The recent technological developments and paradigms such as serverless computing, software-defined networking, Internet of Things, and processing at network edge are creating new opportunities for Cloud computing. However, they are also posing several new challenges and creating the need for new approaches and research strategies, as well as the re-evaluation of the models that were developed to address issues such as scalability, elasticity, reliability, security, sustainability, and application models. The proposed manifesto addresses them by identifying the major open challenges in Cloud computing, emerging trends, and impact areas. It then offers research directions for the next decade, thus helping in the realisation of Future Generation Cloud Computing.", "title": "" }, { "docid": "eb17d97b32db0682d10dfef2ab0c2902", "text": "Previous studies have suggested that solar-induced chlorophyll fluorescence (SIF) is correlated with Gross Primary Production (GPP). However, it remains unclear to what extent this relationship is due to absorbed photosynthetically active radiation (APAR) and/or light use efficiency (LUE). Here we present the first time series of near-surface measurement of canopy-scale SIF at 760 nm in temperate deciduous forests. SIF correlated with GPP estimated with eddy covariance at diurnal and seasonal scales (r = 0.82 and 0.73, respectively), as well as with APAR diurnally and seasonally (r = 0.90 and 0.80, respectively). SIF/APAR is significantly positively correlated with LUE and is higher during cloudy days than sunny days. Weekly tower-based SIF agreed with SIF from the Global Ozone Monitoring Experiment-2 (r = 0.82). Our results provide ground-based evidence that SIF is directly related to both APAR and LUE and thus GPP, and confirm that satellite SIF can be used as a proxy for GPP.", "title": "" }, { "docid": "877bc8fb07b60f61bcd3b98e925a7aa0", "text": "Most existing approaches to autonomous driving fall into one of two categories: modular pipelines, that build an extensive model of the environment, and imitation learning approaches, that map images directly to control outputs. A recently proposed third paradigm, direct perception, aims to combine the advantages of both by using a neural network to learn appropriate low-dimensional intermediate representations. However, existing direct perception approaches are restricted to simple highway situations, lacking the ability to navigate intersections, stop at traffic lights or respect speed limits. In this work, we propose a direct perception approach which maps video input to intermediate representations suitable for autonomous navigation in complex urban environments given high-level directional inputs. Compared to state-of-the-art reinforcement and conditional imitation learning approaches, we achieve an improvement of up to 68 % in goal-directed navigation on the challenging CARLA simulation benchmark. In addition, our approach is the first to handle traffic lights and speed signs by using image-level labels only, as well as smooth car-following, resulting in a significant reduction of traffic accidents in simulation.", "title": "" }, { "docid": "a74aef75f5b1d5bc44da2f6d2c9284cf", "text": "In this paper, we define irregular bipolar fuzzy graphs and its various classifications. Size of regular bipolar fuzzy graphs is derived. The relation between highly and neighbourly irregular bipolar fuzzy graphs are established. Some basic theorems related to the stated graphs have also been presented.", "title": "" }, { "docid": "1852d9b0fab03cfc3abe5e0448198299", "text": "Efficient exploration in high-dimensional environments remains a key challenge in reinforcement learning (RL). Deep reinforcement learning methods have demonstrated the ability to learn with highly general policy classes for complex tasks with high-dimensional inputs, such as raw images. However, many of the most effective exploration techniques rely on tabular representations, or on the ability to construct a generative model over states and actions. Both are exceptionally difficult when these inputs are complex and high dimensional. On the other hand, it is comparatively easy to build discriminative models on top of complex states such as images using standard deep neural networks. This paper introduces a novel approach, EX, which approximates state visitation densities by training an ensemble of discriminators, and assigns reward bonuses to rarely visited states. We demonstrate that EX achieves comparable performance to the state-of-the-art methods on lowdimensional tasks, and its effectiveness scales into high-dimensional state spaces such as visual domains without hand-designing features or density models.", "title": "" }, { "docid": "f1d69b033490ed8c4eec7b476e9b7c08", "text": "Performance-based measures of emotional intelligence (EI) are more likely than measures based on self-report to assess EI as a construct distinct from personality. A multivariate investigation was conducted with the performance-based, Multi-Factor Emotional Intelligence Scale (MEIS; J. D. Mayer, D. Caruso, & P. Salovey, 1999). Participants (N = 704) also completed the Trait Self-Description Inventory (TSDI, a measure of the Big Five personality factors; Christal, 1994; R. D. Roberts et al.), and the Armed Services Vocational Aptitude Battery (ASVAB, a measure of intelligence). Results were equivocal. Although the MEIS showed convergent validity (correlating moderately with the ASVAB) and divergent validity (correlating minimally with the TSDI), different scoring protocols (i.e., expert and consensus) yielded contradictory findings. Analyses of factor structure and subscale reliability identified further measurement problems. Overall, it is questionable whether the MEIS operationalizes EI as a reliable and valid construct.", "title": "" }, { "docid": "1f62f4d5b84de96583e17fdc0f4828be", "text": "This study examined age differences in perceptions of online communities held by people who were not yet participating in these relatively new social spaces. Using the Technology Acceptance Model (TAM), we investigated the factors that affect future intention to participate in online communities. Our results supported the proposition that perceived usefulness positively affects behavioral intention, yet it was determined that perceived ease of use was not a significant predictor of perceived usefulness. The study also discovered negative relationships between age and Internet self-efficacy and the perceived quality of online community websites. However, the moderating role of age was not found. The findings suggest that the relationships among perceived ease of use, perceived usefulness, and intention to participate in online communities do not change with age. Theoretical and practical implications and limitations were discussed. ! 2010 Elsevier Ltd. All rights reserved.", "title": "" }, { "docid": "d5e16b5d2c0e10e2ee626bf2c35cca13", "text": "The co-occurrence of diseases can inform the underlying network biology of shared and multifunctional genes and pathways. In addition, comorbidities help to elucidate the effects of external exposures, such as diet, lifestyle and patient care. With worldwide health transaction data now often being collected electronically, disease co-occurrences are starting to be quantitatively characterized. Linking network dynamics to the real-life, non-ideal patient in whom diseases co-occur and interact provides a valuable basis for generating hypotheses on molecular disease mechanisms, and provides knowledge that can facilitate drug repurposing and the development of targeted therapeutic strategies.", "title": "" }, { "docid": "34af5ac483483fa59eda7804918bdb1c", "text": "Automatic spelling and grammatical correction systems are one of the most widely used tools within natural language applications. In this thesis, we assume the task of error correction as a type of monolingual machine translation where the source sentence is potentially erroneous and the target sentence should be the corrected form of the input. Our main focus in this project is building neural network models for the task of error correction. In particular, we investigate sequence-to-sequence and attention-based models which have recently shown a higher performance than the state-of-the-art of many language processing problems. We demonstrate that neural machine translation models can be successfully applied to the task of error correction. While the experiments of this research are performed on an Arabic corpus, our methods in this thesis can be easily applied to any language. Keywords— natural language error correction, recurrent neural networks, encoderdecoder models, attention mechanism", "title": "" } ]
scidocsrr
a82c38a5d68f93c8ae879267c0acabbd
Stack-Pointer Networks for Dependency Parsing
[ { "docid": "58d64f5c8c9d953b3c2df0a029eab864", "text": "We adapt the greedy Stack-LSTM dependency parser of Dyer et al. (2015) to support a training-with-exploration procedure using dynamic oracles (Goldberg and Nivre, 2013) instead of cross-entropy minimization. This form of training, which accounts for model predictions at training time rather than assuming an error-free action history, improves parsing accuracies for both English and Chinese, obtaining very strong results for both languages. We discuss some modifications needed in order to get training with exploration to work well for a probabilistic neural-network dependency parser.", "title": "" } ]
[ { "docid": "277cf6fa4b5085287593ee2ca86e67fc", "text": "What can we learn of the human mind by examining its products? Here it is argued that a great deal can be learned, and that the study of human minds through its creations in the real world could be a promising field of study within the cognitive sciences. The city is a case in point. Since the beginning of cities human ideas about them have been dominated by geometric ideas, and the real history of cities has always oscillated between the geometric and the ‘organic’. Set in the context of the suggestion from cognitive neuroscience that we impose more geometric order on the world that it actually possesses, an intriguing question arises: what is the role of geometric intuition in how we understand cities and how we create them? Here we argue that all cities, the organic as well as the geometric, are pervasively ordered by geometric intuition, so that neither the forms of the cities nor their functioning can be understood without insight into their distinctive and pervasive emergent geometrical forms. The city is, as it is often said to be, the creation of economic and social processes, but, it is argued, these processes operate within an envelope of geometric possibility defined by human minds in its interaction with spatial laws that govern the relations between objects and spaces in the ambient world. Note: I have included only selected images here. All the examples will be shown fully in the presentation. Introduction: the Ideal and the Organic The most basic distinction we make about the form of cities is between the ideal and the organic. The ideal are geometric, the organic are not — or seem not to be. The geometric we define in terms of straight lines and 90 or 45 degree angles, the organic in terms of the lack of either (Fig. 1). The ideal seem to be top-down impositions of the human mind, the outcome of reason, often in association with power. We easily grasp their patterns when seen ‘all at once’. The organic we take to be the outcome of unplanned bottom up processes reflecting the", "title": "" }, { "docid": "bdd86f5b88b47b62356a14234467dd9a", "text": "Multi-sampled imaging is a general framework for using pixels on an image detector to simultaneously sample multiple dimensions of imaging (space, time, spectrum, brightness, polarization, etc.). The mosaic of red, green and blue spectral filters found in most solid-state color cameras is one example of multi-sampled imaging. We briefly describe how multi-sampling can be used to explore other dimensions of imaging. Once such an image is captured, smooth reconstructions along the individual dimensions can be obtained using standard interpolation algorithms. Typically, this results in a substantial reduction of resolution (and hence image quality). One can extract significantly greater resolution in each dimension by noting that the light fields associated with real scenes have enormous redundancies within them, causing different dimensions to be highly correlated. Hence, multi-sampled images can be better interpolated using local structural models that are learned off- line from a diverse set of training images. The specific type of structural models we use are based on polynomial functions of measured image intensities. They are very effective as well as computationally efficient. We demonstrate the benefits of structural interpolation using three specific applications. These are (a) traditional color imaging with a mosaic of color filters, (b) high dynamic range monochrome imaging using a mosaic of exposure filters, and (c) high dynamic range color imaging using a mosaic of overlapping color and exposure filters.", "title": "" }, { "docid": "4cd7f19d0413f9bab1a2cda5a5b7a9a4", "text": "Web-based learning plays a vital role in the modern education system, where different technologies are being emerged to enhance this E-learning process. Therefore virtual and online laboratories are gaining popularity due to its easy implementation and accessibility worldwide. These types of virtual labs are useful where the setup of the actual laboratory is complicated due to several factors such as high machinery or hardware cost. This paper presents a very efficient method of building a model using JavaScript Web Graphics Library with HTML5 enabled and having controllable features inbuilt. This type of program is free from any web browser plug-ins or application and also server independent. Proprietary software has always been a bottleneck in the development of such platforms. This approach rules out this issue and can easily applicable. Here the framework has been discussed and neatly elaborated with an example of a simplified robot configuration.", "title": "" }, { "docid": "0ce46853852a20e5e0ab9aacd3ec20c1", "text": "In immunocompromised subjects, Epstein-Barr virus (EBV) infection of terminally differentiated oral keratinocytes may result in subclinical productive infection of the virus in the stratum spinosum and in the stratum granulosum with shedding of infectious virions into the oral fluid in the desquamating cells. In a minority of cases this productive infection with dysregulation of the cell cycle of terminally differentiated epithelial cells may manifest as oral hairy leukoplakia. This is a white, hyperkeratotic, benign lesion of low morbidity, affecting primarily the lateral border of the tongue. Factors that determine whether productive EBV replication within the oral epithelium will cause oral hairy leukoplakia include the fitness of local immune responses, the profile of EBV gene expression, and local environmental factors.", "title": "" }, { "docid": "1348ee3316643f4269311b602b71d499", "text": "This paper describes our proposed solution for SemEval 2017 Task 1: Semantic Textual Similarity (Daniel Cer and Specia, 2017). The task aims at measuring the degree of equivalence between sentences given in English. Performance is evaluated by computing Pearson Correlation scores between the predicted scores and human judgements. Our proposed system consists of two subsystems and one regression model for predicting STS scores. The two subsystems are designed to learn Paraphrase and Event Embeddings that can take the consideration of paraphrasing characteristics and sentence structures into our system. The regression model associates these embeddings to make the final predictions. The experimental result shows that our system acquires 0.8 of Pearson Correlation Scores in this task.", "title": "" }, { "docid": "d46415de07d618b5127602b614415c83", "text": "In many cases, the topology of communcation systems can be abstracted and represented as graph. Graph theories and algorithms are useful in these situations. In this paper, we introduced an algorithm to enumerate all cycles in a graph. It can be applied on digraph or undirected graph. Multigraph can also be used on for this purpose. It can be used to enumerate given length cycles without enumerating all cycles. This algorithm is simple and easy to be implemented.", "title": "" }, { "docid": "a4349b9a7c0fef87c7f451bf67dc63ce", "text": "For the convenience of complex trajectory programming of robot and in order to enrich robotic off-line programming (OLP) types, this paper presents an efficient robotic OLP method based on DXF files of 3D modeling software. By decoding DXF files, the 3D position information of object graphic elements such as points, lines, arcs and splines are first extracted, all the graphic elements are then converted into point elements. A trajectory planning algorithm is proposed to make these points linked into robot trajectories according to the drawing order in CAD software. Except for the position information of the trajectory, the orientation of the trajectory is also planned by an easy and efficient method. Coordinate transformation is fulfilled by calibration,The planned trajectory is verified with OpenGL simulation, the executable program is then generated and downloaded into the robot controlle. Experiment results of the 5-DoFs modular robot show that the presented OLP system is effective and can be used in practice.", "title": "" }, { "docid": "bd4234dc626b4c56d0170948ac5d5de3", "text": "ISSN: 1049-4820 (Print) 1744-5191 (Online) Journal homepage: http://www.tandfonline.com/loi/nile20 Gamification and student motivation Patrick Buckley & Elaine Doyle To cite this article: Patrick Buckley & Elaine Doyle (2016) Gamification and student motivation, Interactive Learning Environments, 24:6, 1162-1175, DOI: 10.1080/10494820.2014.964263 To link to this article: https://doi.org/10.1080/10494820.2014.964263", "title": "" }, { "docid": "c03ae003e3fd6503822480267108e2a6", "text": "A relatively simple model of the phonological loop (A. D. Baddeley, 1986), a component of working memory, has proved capable of accommodating a great deal of experimental evidence from normal adult participants, children, and neuropsychological patients. Until recently, however, the role of this subsystem in everyday cognitive activities was unclear. In this article the authors review studies of word learning by normal adults and children, neuropsychological patients, and special developmental populations, which provide evidence that the phonological loop plays a crucial role in learning the novel phonological forms of new words. The authors propose that the primary purpose for which the phonological loop evolved is to store unfamiliar sound patterns while more permanent memory records are being constructed. Its use in retaining sequences of familiar words is, it is argued, secondary.", "title": "" }, { "docid": "7e459967f93c4cf0b432717aa41201e1", "text": "Paper describes the development of prototype that enables monitoring of heart rate and inter beat interval for several subjects. The prototype was realized using ESP8266 hardware modules, WebSocket library, nodejs and JavaScript. System architecture is described where nodejs server acts as the signal processing and GUI code provider for clients. Signal processing algorithm was implemented in JavaScript. Application GUI is presented which can be used on mobile devices. Several important parts of the code are described which illustrate the communication between ESP8266 modules, server and clients. Developed prototype shows one of the possible realizations of group monitoring of biomedical data.", "title": "" }, { "docid": "ff91ed2072c93eeae5f254fb3de0d780", "text": "Machine learning requires access to all the data used for training. Recently, Google Research proposed Federated Learning as an alternative, where the training data is distributed over a federation of clients that each only access their own training data; the partially trained model is updated in a distributed fashion to maintain a situation where the data from all participating clients remains unknown. In this research we construct different distributions of the DMOZ dataset over the clients in the network and compare the resulting performance of Federated Averaging when learning a classifier. We find that the difference in spread of topics for each client has a strong correlation with the performance of the Federated Averaging algorithm.", "title": "" }, { "docid": "9e11598c99b0345525e9df897e108e9c", "text": "A new shielding scheme, active shielding, is proposed for reducing delays on interconnects. As opposed to conventional (passive) shielding, the active shielding approach helps to speed up signal propagation on a wire by ensuring in-phase switching of adjacent nets. Results show that the active shielding scheme improves performance by up to 16% compared to passive shields and up to 29% compared to unshielded wires. When signal slopes at the end of the line are compared, savings of up to 38% and 27% can be achieved when compared to passive shields and unshielded wires, respectively.", "title": "" }, { "docid": "224bacc72ba9785d158f506eea68e4c9", "text": "A model of commumcations protocols based on finite-state machines is investigated. The problem addressed is how to ensure certain generally desirable properties, which make protocols \"wellformed,\" that is, specify a response to those and only those events that can actually occur. It is determined to what extent the problem is solvable, and one approach to solving it ts described. Categories and SubJect Descriptors' C 2 2 [Computer-Conununication Networks]: Network Protocols-protocol verification; F 1 1 [Computation by Abstract Devices] Models of Computation--automata; G.2.2 [Discrete Mathematics] Graph Theory--graph algoruhms; trees General Terms: Reliability, Verification Additional", "title": "" }, { "docid": "9be1489eb73687b9a98c23f46dae6421", "text": "Smart consumer devices are omnipresent in our everyday lives. We find novel interesting applications of smart devices, such as mobile phones, tablets, smartwatches and smartglasses, in monitoring personal health, tracking sporting performances, identifying physical activities and obtaining navigation information among many others. These novel applications make use of a large variety of the smart devices' sensors, such as accelerometer, gyroscope and GPS. However, the usefulness of these applications relies often primarily on the abilities of interpreting noisy, and often biased, measurements from said sensors in order to extract high-level context information, such as the activity currently performed by the user.", "title": "" }, { "docid": "05e6cbaf225c03de8a3e1f97f8690014", "text": "Despite the fact that seizures are commonly associated with autism spectrum disorder (ASD), the effectiveness of treatments for seizures has not been well studied in individuals with ASD. This manuscript reviews both traditional and novel treatments for seizures associated with ASD. Studies were selected by systematically searching major electronic databases and by a panel of experts that treat ASD individuals. Only a few anti-epileptic drugs (AEDs) have undergone carefully controlled trials in ASD, but these trials examined outcomes other than seizures. Several lines of evidence point to valproate, lamotrigine, and levetiracetam as the most effective and tolerable AEDs for individuals with ASD. Limited evidence supports the use of traditional non-AED treatments, such as the ketogenic and modified Atkins diet, multiple subpial transections, immunomodulation, and neurofeedback treatments. Although specific treatments may be more appropriate for specific genetic and metabolic syndromes associated with ASD and seizures, there are few studies which have documented the effectiveness of treatments for seizures for specific syndromes. Limited evidence supports l-carnitine, multivitamins, and N-acetyl-l-cysteine in mitochondrial disease and dysfunction, folinic acid in cerebral folate abnormalities and early treatment with vigabatrin in tuberous sclerosis complex. Finally, there is limited evidence for a number of novel treatments, particularly magnesium with pyridoxine, omega-3 fatty acids, the gluten-free casein-free diet, and low-frequency repetitive transcranial magnetic simulation. Zinc and l-carnosine are potential novel treatments supported by basic research but not clinical studies. This review demonstrates the wide variety of treatments used to treat seizures in individuals with ASD as well as the striking lack of clinical trials performed to support the use of these treatments. Additional studies concerning these treatments for controlling seizures in individuals with ASD are warranted.", "title": "" }, { "docid": "68f0bdda44beba9203a785b8be1035bb", "text": "Nasal mucociliary clearance is one of the most important factors affecting nasal delivery of drugs and vaccines. This is also the most important physiological defense mechanism inside the nasal cavity. It removes inhaled (and delivered) particles, microbes and substances trapped in the mucus. Almost all inhaled particles are trapped in the mucus carpet and transported with a rate of 8-10 mm/h toward the pharynx. This transport is conducted by the ciliated cells, which contain about 100-250 motile cellular appendages called cilia, 0.3 µm wide and 5 µm in length that beat about 1000 times every minute or 12-15 Hz. For efficient mucociliary clearance, the interaction between the cilia and the nasal mucus needs to be well structured, where the mucus layer is a tri-layer: an upper gel layer that floats on the lower, more aqueous solution, called the periciliary liquid layer and a third layer of surfactants between these two main layers. Pharmacokinetic calculations of the mucociliary clearance show that this mechanism may account for a substantial difference in bioavailability following nasal delivery. If the formulation irritates the nasal mucosa, this mechanism will cause the irritant to be rapidly diluted, followed by increased clearance, and swallowed. The result is a much shorter duration inside the nasal cavity and therefore less nasal bioavailability.", "title": "" }, { "docid": "5d879bdbf7667fa8ad19c3bb86219880", "text": "The cellular concept applied in mobile communication systems enables significant increase of overall system capacity, but requires careful radio network planning and dimensioning. Wireless and mobile network operators typically rely on various commercial radio network planning and dimensioning tools, which incorporate different radio signal propagation models. In this paper we present the use of open-source Geographical Resources Analysis Support System (GRASS) for the calculation of radio signal coverage. We developed GRASS modules for radio coverage prediction for a number of different radio channel models, with antenna radiation patterns given in the standard MSI format. The results are stored in a data base (e.g. MySQL, PostgreSQL) for further processing and in a simplified form as a bit-map file for displaying in GRASS. The accuracy of prediction was confirmed by comparison with results obtained by a dedicated professional prediction tool as well as with measurement results. Key-Words: network planning tool, open-source, GRASS GIS, path loss, raster, clutter, radio signal coverage", "title": "" }, { "docid": "424444dbbed92a12aadf3d32d18fbaf4", "text": "Examined the relative and combined associations among relational and overt forms of aggression and victimization and adolescents' concurrent depression symptoms, loneliness, self-esteem, and externalizing behavior. An ethnically diverse sample of 566 adolescents (55% girls) in Grades 9 to 12 participated. Results replicated prior work on relational aggression and victimization as distinct forms of peer behavior that are uniquely associated with concurrent social-psychological adjustment. Victimization was associated most closely with internalizing symptoms, and peer aggression was related to symptoms of disruptive behavior disorder. Findings also supported the hypothesis that victims of multiple forms of aggression are at greater risk for adjustment difficulties than victims of one or no form of aggression. Social support from close friends appeared to buffer the effects of victimization on adjustment.", "title": "" }, { "docid": "7de911386f69397afe76e427e7ae3997", "text": "Photonic crystal slabs are a versatile and important platform for molding the flow of light. In this thesis, we consider ways to control the emission of light from photonic crystal slab structures, specifically focusing on directional, asymmetric emission, and on emitting light with interesting topological features. First, we develop a general coupled-mode theory formalism to derive bounds on the asymmetric decay rates to top and bottom of a photonic crystal slab, for a resonance with arbitrary in-plane wavevector. We then employ this formalism to inversionsymmetric structures, and show through numerical simulations that asymmetries of top-down decay rates exceeding 104 can be achieved by tuning the resonance frequency to coincide with the perfectly transmitting Fabry-Perot frequency. The emission direction can also be rapidly switched from top to bottom by tuning the wavevector or frequency. We then consider the generation of Mobius strips of light polarization, i.e. vector beams with half-integer polarization winding, from photonic crystal slabs. We show that a quadratic degeneracy formed by symmetry considerations can be split into a pair of Dirac points, which can be further split into four exceptional points. Through calculations of an analytical two-band model and numerical simulations of two-dimensional photonic crystals and photonic crystal slabs, we demonstrate the existence of isofrequency contours encircling two exceptional points, and show the half-integer polarization winding along these isofrequency contours. We further propose a realistic photonic crystal slab structure and experimental setup to verify the existence of such Mobius strips of light polarization. Thesis Supervisor: Marin Solja-id Title: Professor of Physics and MacArthur Fellow", "title": "" }, { "docid": "8993812bd489fbcb32c242c6adf18c24", "text": "The emergence of big data has stimulated enormous investments into business analytics solutions, but large-scale and reliable empirical evidence about the business value of big data and analytics (BDA) remains scarce. This paper presents the results of an econometric study that analyzes the direction, sign, and magnitude of the relationship between BDA and firm performance based on objective measurements of BDA assets. Using a unique panel data set that contains detailed information about BDA solutions owned by 814 companies during the timeframe from 2008 to 2014, on the one hand, and their financial performance, on the other hand, we estimate the relationship between BDA assets and firm productivity and find that live BDA assets are associated with an average of 3 to 7 percent improvement in firm productivity. Yet, we also find substantial differences in returns from BDA when we consider the industry in which a firm operates: While firms in IT-intensive or highly competitive industries are clearly able to extract value from BDA assets, we did not detect measurable productivity improvement for firms outside these industry groups. Taken together, our findings provide robust empirical evidence for the business value of BDA, but also highlight important boundary conditions.", "title": "" } ]
scidocsrr
33c0170fbe936ebf10972956b27bf1d1
Sampling Algorithms in a Stream Operator
[ { "docid": "aa2b1a8d0cf511d5862f56b47d19bc6a", "text": "DBMSs have long suffered from SQL’s lack of power and extensibility. We have implemented ATLaS [1], a powerful database language and system that enables users to develop complete data-intensive applications in SQL—by writing new aggregates and table functions in SQL, rather than in procedural languages as in current Object-Relational systems. As a result, ATLaS’ SQL is Turing-complete [7], and is very suitable for advanced data-intensive applications, such as data mining and stream queries. The ATLaS system is now available for download along with a suite of applications [1] including various data mining functions, that have been coded in ATLaS’ SQL, and execute with a modest (20–40%) performance overhead with respect to the same applications written in C/C++. Our proposed demo will illustrate the key features and applications of ATLaS. In particular, we will demonstrate:", "title": "" } ]
[ { "docid": "ac56668cdaad25e9df31f71bc6d64995", "text": "Hand-crafted illustrations are often more effective than photographs for conveying the shape and important features of an object, but they require expertise and time to produce. We describe an image compositing system and user interface that allow an artist to quickly and easily create technical illustrations from a set of photographs of an object taken from the same point of view under variable lighting conditions. Our system uses a novel compositing process in which images are combined using spatially-varying light mattes, enabling the final lighting in each area of the composite to be manipulated independently. We describe an interface that provides for the painting of local lighting effects (e.g. shadows, highlights, and tangential lighting to reveal texture) directly onto the composite. We survey some of the techniques used in illustration and lighting design to convey the shape and features of objects and describe how our system can be used to apply these techniques.", "title": "" }, { "docid": "37dc4a306f043684042e6af01223a275", "text": "In recent years, studies about control methods for complex machines and robots have been developed rapidly. Biped robots are often treated as inverted pendulums for its simple structure. But modeling of robot and other complex machines is a time-consuming procedure. A new method of modeling and simulation of robot based on SimMechanics is proposed in this paper. Physical modeling, parameter setting and simulation are presented in detail. The SimMechanics block model is first used in modeling and simulation of inverted pendulums. Simulation results of the SimMechanics block model and mathematical model for single inverted pendulum are compared. Furthermore, a full state feedback controller is designed to satisfy the performance requirement. It indicates that SimMechanics can be used for unstable nonlinear system and robots.", "title": "" }, { "docid": "54c2914107ae5df0a825323211138eb9", "text": "An implicit, but pervasive view in the information science community is that people are perpetual seekers after new public information, incessantly identifying and consuming new information by browsing the Web and accessing public collections. One aim of this review is to move beyond this consumer characterization, which regards information as a public resource containing novel data that we seek out, consume, and then discard. Instead, I want to focus on a very different view: where familiar information is used as a personal resource that we keep, manage, and (sometimes repeatedly) exploit. I call this information curation. I first summarize limitations of the consumer perspective. I then review research on three different information curation processes: keeping, management, and exploitation. I describe existing work detailing how each of these processes is applied to different types of personal data: documents, e-mail messages, photos, and Web pages. The research indicates people tend to keep too much information, with the exception of contacts and Web pages. When managing information, strategies that rely on piles as opposed to files provide surprising benefits. And in spite of the emergence of desktop search, exploitation currently remains reliant on manual methods such as navigation. Several new technologies have the potential to address important", "title": "" }, { "docid": "1854e443a1b4b0ba9762c7364bbe5c69", "text": "In this paper, we describe our investigation of traces of naturally occurring emotions in electrical brain signals, that can be used to build interfaces that respond to our emotional state. This study confirms a number of known affective correlates in a realistic, uncontrolled environment for the emotions of valence (or pleasure), arousal and dominance: (1) a significant decrease in frontal power in the theta range is found for increasingly positive valence, (2) a significant frontal increase in power in the alpha range is associated with increasing emotional arousal, (3) a significant right posterior power increase in the delta range correlates with increasing arousal and (4) asymmetry in power in the lower alpha bands correlates with self-reported valence. Furthermore, asymmetry in the higher alpha bands correlates with self-reported dominance. These last two effects provide a simple measure for subjective feelings of pleasure and feelings of control.", "title": "" }, { "docid": "2603c07864b92c6723b40c83d3c216b9", "text": "Background: A study was undertaken to record exacerbations and health resource use in patients with COPD during 6 months of treatment with tiotropium, salmeterol, or matching placebos. Methods: Patients with COPD were enrolled in two 6-month randomised, placebo controlled, double blind, double dummy studies of tiotropium 18 μg once daily via HandiHaler or salmeterol 50 μg twice daily via a metered dose inhaler. The two trials were combined for analysis of heath outcomes consisting of exacerbations, health resource use, dyspnoea (assessed by the transitional dyspnoea index, TDI), health related quality of life (assessed by St George’s Respiratory Questionnaire, SGRQ), and spirometry. Results: 1207 patients participated in the study (tiotropium 402, salmeterol 405, placebo 400). Compared with placebo, tiotropium but not salmeterol was associated with a significant delay in the time to onset of the first exacerbation. Fewer COPD exacerbations/patient year occurred in the tiotropium group (1.07) than in the placebo group (1.49, p<0.05); the salmeterol group (1.23 events/year) did not differ from placebo. The tiotropium group had 0.10 hospital admissions per patient year for COPD exacerbations compared with 0.17 for salmeterol and 0.15 for placebo (not statistically different). For all causes (respiratory and non-respiratory) tiotropium, but not salmeterol, was associated with fewer hospital admissions while both groups had fewer days in hospital than the placebo group. The number of days during which patients were unable to perform their usual daily activities was lowest in the tiotropium group (tiotropium 8.3 (0.8), salmeterol 11.1 (0.8), placebo 10.9 (0.8), p<0.05). SGRQ total score improved by 4.2 (0.7), 2.8 (0.7) and 1.5 (0.7) units during the 6 month trial for the tiotropium, salmeterol and placebo groups, respectively (p<0.01 tiotropium v placebo). Compared with placebo, TDI focal score improved in both the tiotropium group (1.1 (0.3) units, p<0.001) and the salmeterol group (0.7 (0.3) units, p<0.05). Evaluation of morning pre-dose FEV1, peak FEV1 and mean FEV1 (0–3 hours) showed that tiotropium was superior to salmeterol while both active drugs were more effective than placebo. Conclusions: Exacerbations of COPD and health resource usage were positively affected by daily treatment with tiotropium. With the exception of the number of hospital days associated with all causes, salmeterol twice daily resulted in no significant changes compared with placebo. Tiotropium also improved health related quality of life, dyspnoea, and lung function in patients with COPD.", "title": "" }, { "docid": "338dc5d14a5c00a110823dd3ce7c2867", "text": "Le diagnostic de l'hallux valgus est clinique. Le bilan radiographique n'intervient qu'en seconde intention pour préciser les vices architecturaux primaires ou secondaires responsables des désaxations ostéo-musculotendineuses. Ce bilan sera toujours réalisé dans des conditions physiologiques, c'est-à-dire le pied en charge. La radiographie de face en charge apprécie la formule du pied (égyptien, grec, carré), le degré de luxation des sésamoïdes (stades 1, 2 ou 3), les valeurs angulaires (ouverture du pied, varus intermétatarsien, valgus interphalangien) et linéaires, tel l'étalement de l'avant-pied. La radiographie de profil en charge évalue la formule d'un pied creux, plat ou normo axé. L'incidence de Guntz Walter reflétant l'appui métatarsien décèle les zones d'hyperappui pathologique. En post-opératoire, ce même bilan permettra d'évaluer le geste chirurgical et de reconnaître une éventuelle hyper ou hypocorrection. The diagnosis of hallux valgus is a clinical one. Radiographic examination is involved only secondarily, to define the primary or secondary structural defects responsible for bony and musculotendinous malalignement. This examination should always be made under physiologic conditions, i.e., with the foot taking weight. The frontal radiograph in weight-bearing assesses the category of the foot (Egyptian, Greek, square), the degree of luxation of the sesamoids (stages 1, 2 or 3), the angular values (opening of the foot, intermetatarsal varus, interphalangeal valgus) and the linear values such as the spreading of the forefoot. The lateral radiograph in weight-bearing categorises the foot as cavus, flat or normally oriented. The Guntz Walter view indicates the thrust on the metatarsals and reveals zones of abnormal excessive thrust. Postoperatively, the same examination makes it possible to assess the outcome of the surgical procedure and to detect any over- or under-correction.", "title": "" }, { "docid": "5a392f4c9779c06f700e2ff004197de9", "text": "Breiman's bagging and Freund and Schapire's boosting are recent methods for improving the predictive power of classiier learning systems. Both form a set of classiiers that are combined by v oting, bagging by generating replicated boot-strap samples of the data, and boosting by adjusting the weights of training instances. This paper reports results of applying both techniques to a system that learns decision trees and testing on a representative collection of datasets. While both approaches substantially improve predictive accuracy, boosting shows the greater beneet. On the other hand, boosting also produces severe degradation on some datasets. A small change to the way that boosting combines the votes of learned classiiers reduces this downside and also leads to slightly better results on most of the datasets considered.", "title": "" }, { "docid": "c6878e9e106655f492a989be9e33176f", "text": "Employees who are engaged in their work are fully connected with their work roles. They are bursting with energy, dedicated to their work, and immersed in their work activities. This article presents an overview of the concept of work engagement. I discuss the antecedents and consequences of engagement. The review shows that job and personal resources are the main predictors of engagement. These resources gain their salience in the context of high job demands. Engaged workers are more open to new information, more productive, and more willing to go the extra mile. Moreover, engaged workers proactively change their work environment in order to stay engaged. The findings of previous studies are integrated in an overall model that can be used to develop work engagement and advance job performance in today’s workplace.", "title": "" }, { "docid": "bc7d0895bcbb47c8bf79d0ba7078b209", "text": "The processing of a visual stimulus can be subdivided into a number of stages. Upon stimulus presentation there is an early phase of feedforward processing where the visual information is propagated from lower to higher visual areas for the extraction of basic and complex stimulus features. This is followed by a later phase where horizontal connections within areas and feedback connections from higher areas back to lower areas come into play. In this later phase, image elements that are behaviorally relevant are grouped by Gestalt grouping rules and are labeled in the cortex with enhanced neuronal activity (object-based attention in psychology). Recent neurophysiological studies revealed that reward-based learning influences these recurrent grouping processes, but it is not well understood how rewards train recurrent circuits for perceptual organization. This paper examines the mechanisms for reward-based learning of new grouping rules. We derive a learning rule that can explain how rewards influence the information flow through feedforward, horizontal and feedback connections. We illustrate the efficiency with two tasks that have been used to study the neuronal correlates of perceptual organization in early visual cortex. The first task is called contour-integration and demands the integration of collinear contour elements into an elongated curve. We show how reward-based learning causes an enhancement of the representation of the to-be-grouped elements at early levels of a recurrent neural network, just as is observed in the visual cortex of monkeys. The second task is curve-tracing where the aim is to determine the endpoint of an elongated curve composed of connected image elements. If trained with the new learning rule, neural networks learn to propagate enhanced activity over the curve, in accordance with neurophysiological data. We close the paper with a number of model predictions that can be tested in future neurophysiological and computational studies.", "title": "" }, { "docid": "d2e56a45e0b901024776d36eaa5fa998", "text": "In this paper, we present our results of automatic gesture recognition systems using different types of cameras in order to compare them in reference to their performances in segmentation. The acquired image segments provide the data for further analysis. The images of a single camera system are mostly used as input data in the research area of gesture recognition. In comparison to that, the analysis results of a stereo color camera and a thermal camera system are used to determine the advantages and disadvantages of these camera systems. On this basis, a real-time gesture recognition system is proposed to classify alphabets (A-Z) and numbers (0-9) with an average recognition rate of 98% using Hidden Markov Models (HMM).", "title": "" }, { "docid": "271731e414285690f3de89ccd3a29ff4", "text": "BACKGROUND\nRice bran is a nutritionally valuable by-product of paddy milling. In this study an experimental infrared (IR) stabilization system was developed to prevent rice bran rancidity. The free fatty acid content of raw and IR-stabilized rice bran samples was monitored every 15 days during 6 months of storage. In addition, energy consumption was determined.\n\n\nRESULTS\nThe free fatty acid content of rice bran stabilized at 600 W IR power for 5 min remained below 5% for 165 days. No significant change in γ-oryzanol content or fatty acid composition but a significant decrease in tocopherol content was observed in stabilized rice bran compared with raw bran. IR stabilization was found to be comparable to extrusion with regard to energy consumption.\n\n\nCONCLUSION\nIR stabilization was effective in preventing hydrolytic rancidity of rice bran. By optimizing the operational parameters of IR stabilization, this by-product has the potential for use in the food industry in various ways as a value-added commodity.", "title": "" }, { "docid": "e8246712bb8c4e793697b9933ab8b4f6", "text": "In this paper we utilize a dimensional emotion representation named Resonance-Arousal-Valence to express music emotion and inverse exponential function to represent emotion decay process. The relationship between acoustic features and their emotional impact reflection based on this representation has been well constructed. As music well expresses feelings, through the users' historical playlist in a session, we utilize the Conditional Random Fields to compute the probabilities of different emotion states, choosing the largest as the predicted user's emotion state. In order to recommend music based on the predicted user's emotion, we choose the optimized ranked music list that has the highest emotional similarities to the music invoking the predicted emotion state in the playlist for recommendation. We utilize our minimization iteration algorithm to assemble the optimized ranked recommended music list. The experiment results show that the proposed emotion-based music recommendation paradigm is effective to track the user's emotions and recommend music fitting his emotional state.", "title": "" }, { "docid": "723eeeb477bb6cde7cb69ce2deeff707", "text": "The charge stored in series-connected lithium batteries needs to be well equalized between the elements of the series. We present here an innovative lithium-battery cell-to-cell active equalizer capable of moving charge between series-connected cells using a super-capacitor as an energy tank. The system temporarily stores the charge drawn from a cell in the super-capacitor, then the charge is moved into another cell without wasting energy as it happens in passive equalization. The architecture of the system which employs a digitally-controlled switching converter is compared with the state of the art, then fully investigated, together with the methodology used in its design. The performance of the system is described by presenting and discussing the experimental results of laboratory tests. The most innovative and attractive aspect of the proposed system is its very high efficiency, which is over 90%.", "title": "" }, { "docid": "6fe71d8d45fa940f1a621bfb5b4e14cd", "text": "We present Attract-Repel, an algorithm for improving the semantic quality of word vectors by injecting constraints extracted from lexical resources. Attract-Repel facilitates the use of constraints from mono- and cross-lingual resources, yielding semantically specialized cross-lingual vector spaces. Our evaluation shows that the method can make use of existing cross-lingual lexicons to construct high-quality vector spaces for a plethora of different languages, facilitating semantic transfer from high- to lower-resource ones. The effectiveness of our approach is demonstrated with state-of-the-art results on semantic similarity datasets in six languages. We next show that Attract-Repel-specialized vectors boost performance in the downstream task of dialogue state tracking (DST) across multiple languages. Finally, we show that cross-lingual vector spaces produced by our algorithm facilitate the training of multilingual DST models, which brings further performance improvements.", "title": "" }, { "docid": "ce6744b63b6ca028036e7b127c351468", "text": "Leeches are found in fresh water as well as moist marshy tropical areas. Orifical Hirudiniasis is the presence of leech in natural human orifices. Leech have been reported in nose, oropharynx, vagina, rectum and bladder but leech per urethra is very rare. We report a case of leech in urethra causing hematuria and bleeding disorder in the form of epistaxis and impaired clotting profile after use of stream water for ablution. The case was diagnosed after a prolonged diagnostic dilemma. Asingle alive leech was recovered from the urethra after ten days with the help of forceps. The hematuria and epistaxis gradually improved over next 48 hours and the patient became asymptomatic. Natives of leech infested areas should be advised to avoid swimming in fresh water and desist from drinking and using stream water without inspection for leeches.", "title": "" }, { "docid": "a991cf65cd79abf578a935e1a28a9abb", "text": "Till now, neural abstractive summarization methods have achieved great success for single document summarization (SDS). However, due to the lack of large scale multi-document summaries, such methods can be hardly applied to multi-document summarization (MDS). In this paper, we investigate neural abstractive methods for MDS by adapting a state-of-the-art neural abstractive summarization model for SDS. We propose an approach to extend the neural abstractive model trained on large scale SDS data to the MDS task. Our approach only makes use of a small number of multi-document summaries for fine tuning. Experimental results on two benchmark DUC datasets demonstrate that our approach can outperform a variety of base-", "title": "" }, { "docid": "ec9c15e543444e88cc5d636bf1f6e3b9", "text": "Which ZSL method is more robust to GZSL? An Empirical Study and Analysis of Generalized Zero-Shot Learning for Object Recognition in the Wild Wei-Lun Chao*1, Soravit Changpinyo*1, Boqing Gong2, and Fei Sha1,3 1U. of Southern California, 2U. of Central Florida, 3U. of California, Los Angeles NSF IIS-1566511, 1065243, 1451412, 1513966, 1208500, CCF-1139148, USC Graduate Fellowship, a Google Research Award, an Alfred P. Sloan Research Fellowship and ARO# W911NF-12-1-0241 and W911NF-15-1-0484.", "title": "" }, { "docid": "a2251a3cd69eacf72c078f21e9ee3a40", "text": "This proposal investigates Selective Harmonic Elimination (SHE) to eliminate harmonics brought by Pulse Width Modulation (PWM) inverter. The selective harmonic elimination method for three phase voltage source inverter is generally based on ideas of opposite harmonic injection. In this proposed scheme, the lower order harmonics 3rd, 5th, 7th and 9th are eliminated. The dominant harmonics of same order generated in opposite phase by sine PWM inverter and by using this scheme the Total Harmonic Distortion (THD) is reduced. The analysis of Sinusoidal PWM technique (SPWM) and selective harmonic elimination is simulated using MATLAB/SIMULINK model.", "title": "" }, { "docid": "61a9bc06d96eb213ed5142bfa47920b9", "text": "This paper is concerned with the derivation of a progression of shadow-free image representations. First, we show that adopting certain assumptions about lights and cameras leads to a 1D, gray-scale image representation which is illuminant invariant at each image pixel. We show that as a consequence, images represented in this form are shadow-free. We then extend this 1D representation to an equivalent 2D, chromaticity representation. We show that in this 2D representation, it is possible to relight all the image pixels in the same way, effectively deriving a 2D image representation which is additionally shadow-free. Finally, we show how to recover a 3D, full color shadow-free image representation by first (with the help of the 2D representation) identifying shadow edges. We then remove shadow edges from the edge-map of the original image by edge in-painting and we propose a method to reintegrate this thresholded edge map, thus deriving the sought-after 3D shadow-free image.", "title": "" }, { "docid": "a1d6ec19be444705fd6c339d501bce10", "text": "The transmission properties of a guide consisting of a dielectric rod of rectangular cross-section surrounded by dielectrics of smaller refractive indices are determined. This guide is the basic component in a new technology called integrated optical circuitry. The directional coupler, a particularly useful device, made of two of those guides closely spaced is also analyzed. [The SCI indicates that this paper has been cited over 145 times since 1969.]", "title": "" } ]
scidocsrr
98a86ab760b03a88c42e3400e56c1024
Cascaded Interactional Targeting Network for Egocentric Video Analysis
[ { "docid": "9d0b7f84d0d326694121a8ba7a3094b4", "text": "Passive sensing of human hand and limb motion is important for a wide range of applications from human-computer interaction to athletic performance measurement. High degree of freedom articulated mechanisms like the human hand are di cult to track because of their large state space and complex image appearance. This article describes a model-based hand tracking system, called DigitEyes, that can recover the state of a 27 DOF hand model from ordinary gray scale images at speeds of up to 10 Hz.", "title": "" } ]
[ { "docid": "673ce42f089d555d8457f35bf7dcb733", "text": "Visual relationship detection aims to capture interactions between pairs of objects in images. Relationships between objects and humans represent a particularly important subset of this problem, with implications for challenges such as understanding human behaviour, and identifying affordances, amongst others. In addressing this problem we first construct a large-scale human-centric visual relationship detection dataset (HCVRD), which provides many more types of relationship annotation (nearly 10K categories) than the previous released datasets. This large label space better reflects the reality of human-object interactions, but gives rise to a long-tail distribution problem, which in turn demands a zero-shot approach to labels appearing only in the test set. This is the first time this issue has been addressed. We propose a webly-supervised approach to these problems and demonstrate that the proposed model provides a strong baseline on our HCVRD dataset.", "title": "" }, { "docid": "87e56672751a8eb4d5a08f0459e525ca", "text": "— The Internet of Things (IoT) has transformed many aspects of modern manufacturing, from design to production to quality control. In particular, IoT and digital manufacturing technologies have substantially accelerated product development cycles and manufacturers can now create products of a complexity and precision not heretofore possible. New threats to supply chain security have arisen from connecting machines to the Internet and introducing complex IoT-based systems controlling manufacturing processes. By attacking these IoT-based manufacturing systems and tampering with digital files, attackers can manipulate physical characteristics of parts and change the dimensions, shapes, or mechanical properties of the parts, which can result in parts that fail in the field. These defects increase manufacturing costs and allow silent problems to occur only under certain loads that can threaten safety and/or lives. To understand potential dangers and protect manufacturing system safety, this paper presents two taxonomies: one for classifying cyber-physical attacks against manufacturing processes and another for quality control measures for counteracting these attacks. We systematically identify and classify possible cyber-physical attacks and connect the attacks with variations in manufacturing processes and quality control measures. Our tax-onomies also provide a scheme for linking emerging IoT-based manufacturing system vulnerabilities to possible attacks and quality control measures.", "title": "" }, { "docid": "f73422fc1b0988718de776ae09b35ed3", "text": "A new method for hand gesture recognition that is based on a hand gesture fitting procedure via a new Self-Growing and Self-Organized Neural Gas (SGONG) network is proposed. Initially, the region of the hand is detected by applying a color segmentation technique based on a skin color filtering procedure in the YCbCr color space. Then, the SGONG network is applied on the hand area so as to approach its shape. Based on the output grid of neurons produced by the neural network, palm morphologic characteristics are extracted. These characteristics, in accordance with powerful finger features, allow the identification of the raised fingers. Finally, the hand gesture recognition is accomplished through a likelihood-based classification technique. The proposed system has been extensively tested with success. & 2009 Elsevier Ltd. All rights reserved.", "title": "" }, { "docid": "e86e4a07d1daa8a113d855fca2781815", "text": "In this paper, we propose a bidimensional attention based recursive autoencoder (BattRAE) to integrate cues and source-target interactions at multiple levels of granularity into bilingual phrase representations. We employ recursive autoencoders to generate tree structures of phrase with embeddings at different levels of granularity (e.g., words, sub-phrases, phrases). Over these embeddings on the source and target side, we introduce a bidimensional attention network to learn their interactions encoded in a bidimensional attention matrix, from which we extract two soft attention weight distributions simultaneously. The weight distributions enable BattRAE to generate compositive phrase representations via convolution. Based on the learned phrase representations, we further use a bilinear neural model, trained via a max-margin method, to measure bilingual semantic similarity. In order to evaluate the effectiveness of BattRAE, we incorporate this semantic similarity as an additional feature into a state-of-the-art SMT system. Extensive experiments on NIST Chinese-English test sets show that our model achieves a substantial improvement of up to 1.82 BLEU points over the baseline.", "title": "" }, { "docid": "bf9da537d5efcc5b90609db9f9ec39b9", "text": "why the pattern is found in other types of skin lesions with active vascularization, such as our patient’s scars. When first described in actinic keratosis, rosettes were characterized as ‘‘4 white points arranged as a 4-leaf clover.’’2 The sign has since been reported in other skin lesions such as squamous cell carcinoma, basal cell carcinoma, melanoma, and lichenoid keratosis.3--7 Rosettes are believed to be the result of an optical effect caused by interaction between polarized light and follicular openings.6 The rainbow pattern and rosettes are not considered to be specific dermoscopic features of the lesion. Since it appears that they are secondary effects of the interaction between different skin structures and polarized light, they will likely be observed in various types of skin lesions. References", "title": "" }, { "docid": "e36b2e45cd0153c9167dc515c08f84d0", "text": "It can be argued that the successful management of change is crucial to any organisation in order to survive and succeed in the present highly competitive and continuously evolving business environment. However, theories and approaches to change management currently available to academics and practitioners are often contradictory, mostly lacking empirical evidence and supported by unchallenged hypotheses concerning the nature of contemporary organisational change management. The purpose of this article is, therefore, to provide a critical review of some of the main theories and approaches to organisational change management as an important first step towards constructing a new framework for managing change. The article concludes with recommendations for further research.", "title": "" }, { "docid": "2e5981a41d13ee2d588ee0e9fe04e1ec", "text": "Malicious software (malware) has been extensively employed for illegal purposes and thousands of new samples are discovered every day. The ability to classify samples with similar characteristics into families makes possible to create mitigation strategies that work for a whole class of programs. In this paper, we present a malware family classification approach using VGG16 deep neural network’s bottleneck features. Malware samples are represented as byteplot grayscale images and the convolutional layers of a VGG16 deep neural network pre-trained on the ImageNet dataset is used for bottleneck features extraction. These features are used to train a SVM classifier for the malware family classification task. The experimental results on a dataset comprising 10,136 samples from 20 different families showed that our approach can effectively be used to classify malware families with an accuracy of 92.97%, outperforming similar approaches proposed in the literature which require feature engineering and considerable domain expertise.", "title": "" }, { "docid": "a00a0b35fda88ed4f7e02586ae745252", "text": "This paper discusses solving and generating Sudoku puzzles with evolutionary algorithms. Sudoku is a Japanese number puzzle game that has become a worldwide phenomenon. As an optimization problem Sudoku belongs to the group of combinatorial problems, but it is also a constraint satisfaction problem. The objective of this paper is to test if genetic algorithm optimization is an efficient method for solving Sudoku puzzles and to generate new puzzles. Another goal is to find out if the puzzles, that are difficult for human solver, are also difficult for the genetic algorithms. In that case it would offer an opportunity to use genetic algorithm solver to test the difficulty levels of new Sudoku puzzles, i.e. to use it as a rating machine.", "title": "" }, { "docid": "24f74b24c68d633ee74f0da78f6ec084", "text": "This paper presents a fully integrated energy harvester that maintains >35% end-to-end efficiency when harvesting from a 0.84 mm 2 solar cell in low light condition of 260 lux, converting 7 nW input power from 250 mV to 4 V. Newly proposed self-oscillating switched-capacitor (SC) DC-DC voltage doublers are cascaded to form a complete harvester, with configurable overall conversion ratio from 9× to 23×. In each voltage doubler, the oscillator is completely internalized within the SC network, eliminating clock generation and level shifting power overheads. A single doubler has >70% measured efficiency across 1 nA to 0.35 mA output current ( >10 5 range) with low idle power consumption of 170 pW. In the harvester, each doubler has independent frequency modulation to maintain its optimum conversion efficiency, enabling optimization of harvester overall conversion efficiency. A leakage-based delay element provides energy-efficient frequency control over a wide range, enabling low idle power consumption and a wide load range with optimum conversion efficiency. The harvester delivers 5 nW-5 μW output power with >40% efficiency and has an idle power consumption 3 nW, in test chip fabricated in 0.18 μm CMOS technology.", "title": "" }, { "docid": "426c4eb5e83563a5b59b9dca1d428310", "text": "Software Defined Networking enables centralized network control and hence paves the way for new services that use network resources more efficiently. Bandwidth Calendaring (BWC) is a typical such example that exploits the knowledge of future to optimally pack the arising demands over the network. In this paper, we consider a generic BWC instance, where a carrier network operator has to accommodate at minimum cost demands of predetermined, but time-varying, bandwidth requirements. Some of the demands may be flexible, i.e., can be scheduled within a specific time window. We demonstrate that the resulting problem is NP-hard and we propose a scalable problem decomposition based on column generation. Our numerical results reveal that the proposed solution approach is near-optimal and outperforms state-of-the art methods based on relaxation and randomized rounding by more than 20% in terms of network cost.", "title": "" }, { "docid": "d8cdef48386a73c72436f6ed570f0630", "text": "Webbed penis as an isolated anomaly is rare, having been reported in 10 cases. A report is made of a 1-year-old child successfully repaired by a rectangular scrotal flap to close the penoscrotal junction and multiple W-plasty incisions for closure of the skin of the shaft of the penis.", "title": "" }, { "docid": "07eb6616cec9d319b6d867de98ec577e", "text": "We propose a new witness encryption based on Subset-Sum which achieves extractable security without relying on obfuscation and is more efficient than the existing ones. Our witness encryption employs multilinear maps of arbitrary order and it is independent of the implementations of multilinear maps. As an application, we construct a new timed-release encryption based on the Bitcoin protocol and extractable witness encryption. The novelty of our scheme is that the decryption key will be automatically revealed in the bitcoin block-chain when the block-chain reaches a certain length.", "title": "" }, { "docid": "efcf84406a2218deeb4ca33cb8574172", "text": "Cross-site scripting attacks represent one of the major security threats in today’s Web applications. Current approaches to mitigate cross-site scripting vulnerabilities rely on either server-based or client-based defense mechanisms. Although effective for many attacks, server-side protection mechanisms may leave the client vulnerable if the server is not well patched. On the other hand, client-based mechanisms may incur a significant overhead on the client system. In this work, we present a hybrid client-server solution that combines the benefits of both architectures. Our Proxy-based solution leverages the strengths of both anomaly detection and control flow analysis to provide accurate detection. We demonstrate the feasibility and accuracy of our approach through extended testing using real-world cross-site scripting exploits.", "title": "" }, { "docid": "ed8ee467e7f40d6ba35cc6f8329ca681", "text": "This paper proposes an architecture for Software Defined Optical Transport Networks. The SDN Controller includes a network abstraction layer allowing the implementation of cognitive controls and policies for autonomic operation, based on global network view. Additionally, the controller implements a virtualized GMPLS control plane, offloading and simplifying the network elements, while unlocking the implementation of new services such as optical VPNs, optical network slicing, and keeping standard OIF interfaces, such as UNI and NNI. The concepts have been implemented and validated in a real testbed network formed by five DWDM nodes equipped with flexgrid WSS ROADMs.", "title": "" }, { "docid": "1841f11b5c2b2e4a59a47ea6707dc1c6", "text": "We develop a causal inference approach to recommender systems. Observational recommendation data contains two sources of information: which items each user decided to look at and which of those items each user liked. We assume these two types of information come from differentmodels—the exposure data comes from a model by which users discover items to consider; the click data comes from a model by which users decide which items they like. Traditionally, recommender systems use the click data alone (or ratings data) to infer the user preferences. But this inference is biased by the exposure data, i.e., that users do not consider each item independently at random. We use causal inference to correct for this bias. On real-world data, we demonstrate that causal inference for recommender systems leads to improved generalization to new data.", "title": "" }, { "docid": "4be7f5f022b158f5b1967e2413a785f0", "text": "Business digitalization is changing the competitive landscape in many industries. Digitally savvy customers are demanding more while threats of digital disruptions from new entrants are rising. The full article describes how DBS, a large Asian bank, responded to digital threats and opportunities by adopting a digital business strategy. It identifies the capabilities needed and provides lessons for organizations aspiring to pursue a successful digital business strategy. Most organizations respond to new digital threats and opportunities in an ad hoc manner within some organizational functions, but there is a growing sense that functionally oriented initiatives fail to maximize the potential of digital business strategy. To respond effectively to the threats and opportunities arising from digitalization, companies need a more holistic and integrated approach that develops capabilities in the areas of leadership, operations, customer needs and innovation. This is the approach followed by DBS.", "title": "" }, { "docid": "8308fe89676df668e66287a44103980b", "text": "Designing discriminative powerful texture features robust to realistic imaging conditions is a challenging computer vision problem with many applications, including material recognition and analysis of satellite or aerial imagery. In the past, most texture description approaches were based on dense orderless statistical distribution of local features. However, most recent approaches to texture recognition and remote sensing scene classification are based on Convolutional Neural Networks (CNNs). The de facto practice when learning these CNN models is to use RGB patches as input with training performed on large amounts of labeled data (ImageNet). In this paper, we show that Local Binary Patterns (LBP) encoded CNN models, codenamed TEX-Nets, trained using mapped coded images with explicit LBP based texture information provide complementary information to the standard RGB deep models. Additionally, two deep architectures, namely early and late fusion, are investigated to combine the texture and color information. To the best of our knowledge, we are the first to investigate Binary Patterns encoded CNNs and different deep network fusion architectures for texture recognition and remote sensing scene classification. We perform comprehensive experiments on four texture recognition datasets and four remote sensing scene classification benchmarks: UC-Merced with 21 scene categories, WHU-RS19 with 19 scene classes, RSSCN7 with 7 categories and the recently introduced large scale aerial image dataset (AID) with 30 aerial scene types. We demonstrate that TEX-Nets provide complementary information to standard RGB deep model of the same network architecture. Our late fusion TEX-Net architecture always improves the overall performance compared to the standard RGB network on both recognition problems. Furthermore, our final combination leads to consistent improvement over the state-of-the-art for remote sensing scene classification.", "title": "" }, { "docid": "9097bf29a9ad2b33919e0667d20bf6d7", "text": "Object detection, though gaining popularity, has largely been limited to detection from the ground or from satellite imagery. Aerial images, where the target may be obfuscated from the environmental conditions, angle-of-attack, and zoom level, pose a more significant challenge to correctly detect targets in. This paper describes the implementation of a regional convolutional neural network to locate and classify objects across several categories in complex, aerial images. Our current results show promise in detecting and classifying objects. Further adjustments to the network and data input should increase the localization and classification accuracies.", "title": "" }, { "docid": "81537ba56a8f0b3beb29a03ed3c74425", "text": "About ten years ago, soon after the Web’s birth, Web “search engines” were first by word of mouth. Soon, however, automated search engines became a world wide phenomenon, especially AltaVista at the beginning. I was pleasantly surprised by the amount and diversity of information made accessible by the Web search engines even in the mid 1990’s. The growth of the available Web pages is beyond most, if not all, people’s imagination. The search engines enabled people to find information, facts, and references among these Web pages.", "title": "" }, { "docid": "8428d808331ba2e3fcdefd3971986447", "text": "The appearance of the retinal blood vessels is an important diagnostic indicator of various clinical disorders of the eye and the body. Retinal blood vessels have been shown to provide evidence in terms of change in diameter, branching angles, or tortuosity, as a result of ophthalmic disease. This paper reports the development for an automated method for segmentation of blood vessels in retinal images. A unique combination of methods for retinal blood vessel skeleton detection and multidirectional morphological bit plane slicing is presented to extract the blood vessels from the color retinal images. The skeleton of main vessels is extracted by the application of directional differential operators and then evaluation of combination of derivative signs and average derivative values. Mathematical morphology has been materialized as a proficient technique for quantifying the retinal vasculature in ocular fundus images. A multidirectional top-hat operator with rotating structuring elements is used to emphasize the vessels in a particular direction, and information is extracted using bit plane slicing. An iterative region growing method is applied to integrate the main skeleton and the images resulting from bit plane slicing of vessel direction-dependent morphological filters. The approach is tested on two publicly available databases DRIVE and STARE. Average accuracy achieved by the proposed method is 0.9423 for both the databases with significant values of sensitivity and specificity also; the algorithm outperforms the second human observer in terms of precision of segmented vessel tree.", "title": "" } ]
scidocsrr
00edd60b32dca1b610be096d0a5f8e46
Validation of a Greek version of PSS-14; a global measure of perceived stress.
[ { "docid": "51743d233ec269cfa7e010d2109e10a6", "text": "Stress is a part of every life to varying degrees, but individuals differ in their stress vulnerability. Stress is usefully viewed from a biological perspective; accordingly, it involves activation of neurobiological systems that preserve viability through change or allostasis. Although they are necessary for survival, frequent neurobiological stress responses increase the risk of physical and mental health problems, perhaps particularly when experienced during periods of rapid brain development. Recently, advances in noninvasive measurement techniques have resulted in a burgeoning of human developmental stress research. Here we review the anatomy and physiology of stress responding, discuss the relevant animal literature, and briefly outline what is currently known about the psychobiology of stress in human development, the critical role of social regulation of stress neurobiology, and the importance of individual differences as a lens through which to approach questions about stress experiences during development and child outcomes.", "title": "" } ]
[ { "docid": "944efa24cef50c0fd9d940a2ccbcdbcc", "text": "This conceptual paper in sustainable business research introduces a business sustainability maturity model as an innovative solution to support companies move towards sustainable development. Such model offers the possibility for each firm to individually assess its position regarding five sustainability maturity levels and, as a consequence, build a tailored as well as a common strategy along its network of relationships and influence to progress towards higher levels of sustainable development. The maturity model suggested is based on the belief that business sustainability is a continuous process of evolution in which a company will be continuously seeking to achieve its vision of sustainable development in uninterrupted cycles of improvement, where at each new cycle the firm starts the process at a higher level of business sustainability performance. The referred model is therefore dynamic to incorporate changes along the way and enable its own evolution following the firm’s and its network partners’ progress towards the sustainability vision. The research on which this paper is based combines expertise in science and technology policy, R&D and innovation management, team performance and organisational learning, strategy alignment and integrated business performance, knowledge management and technology foresighting.", "title": "" }, { "docid": "71d744aefd254acfc24807d805fb066b", "text": "Bitcoin provides only pseudo-anonymous transactions, which can be exploited to link payers and payees -- defeating the goal of anonymous payments. To thwart such attacks, several Bitcoin mixers have been proposed, with the objective of providing unlinkability between payers and payees. However, existing Bitcoin mixers can be regarded as either insecure or inefficient.\n We present Obscuro, a highly efficient and secure Bitcoin mixer that utilizes trusted execution environments (TEEs). With the TEE's confidentiality and integrity guarantees for code and data, our mixer design ensures the correct mixing operations and the protection of sensitive data (i.e., private keys and mixing logs), ruling out coin theft and address linking attacks by a malicious service provider. Yet, the TEE-based implementation does not prevent the manipulation of inputs (e.g., deposit submissions, blockchain feeds) to the mixer, hence Obscuro is designed to overcome such limitations: it (1) offers an indirect deposit mechanism to prevent a malicious service provider from rejecting benign user deposits; and (2) scrutinizes blockchain feeds to prevent deposits from being mixed more than once (thus degrading anonymity) while being eclipsed from the main blockchain branch. In addition, Obscuro provides several unique anonymity features (e.g., minimum mixing set size guarantee, resistant to dropping user deposits) that are not available in existing centralized and decentralized mixers.\n Our prototype of Obscuro is built using Intel SGX and we demonstrate its effectiveness in Bitcoin Testnet. Our implementation mixes 1000 inputs in just 6.49 seconds, which vastly outperforms all of the existing decentralized mixers.", "title": "" }, { "docid": "2e6d9b7d514463caf66f7adf35868d1d", "text": "Unlike simpler organisms, C. elegans possesses several distinct chemosensory pathways and chemotactic mechanisms. These mechanisms and pathways are individually capable of driving chemotaxis in a chemical concentration gradient. However, it is not understood if they are redundant or co-operate in more sophisticated ways. Here we examine the specialisation of different chemotactic mechanisms in a model of chemotaxis to NaCl. We explore the performance of different chemotactic mechanisms in a range of chemical gradients and show that, in the model, far from being redundant, the mechanisms are specialised both for different environments and for distinct features within those environments. We also show that the chemotactic drive mediated by the ASE pathway is not robust to the presence of noise in the chemical gradient. This problem cannot be solved along the ASE pathway without destroying its ability to drive chemotaxis. Instead, we show that robustness to noise can be achieved by introducing a second, much slower NaCl-sensing pathway. This secondary pathway is simpler than the ASE pathway, in the sense that it can respond to either up-steps or down-steps in NaCl but not both, and could correspond to one of several candidates in the literature which we identify and evaluate. This work provides one possible explanation of why there are multiple NaCl sensing pathways and chemotactic mechanisms in C. elegans: rather than being redundant the different pathways and mechanism are specialised both for the characteristics of different environments and for distinct features within a single environment.", "title": "" }, { "docid": "963b6b2b337541fd741d31b2c8addc8d", "text": "I. Unary terms • Body part detection candidates • Capture distribution of scores over all part classes II. Pairwise terms • Capture part relationships within/across people – proximity: same body part class (c = c) – kinematic relations: different part classes (c!= c) III. Integer Linear Program (ILP) • Substitute zdd cc = xdc xd c ydd ′ to linearize objective • NP-Hard problem solved via branch-and-cut (1% gap) • Linear constraints on 0/1 labelings: plausible poses – uniqueness", "title": "" }, { "docid": "9da1449675af42a2fc75ba8259d22525", "text": "The purpose of the research reported here was to test empirically a conceptualization of brand associations that consists of three dimensions: brand image, brand attitude and perceived quality. A better understanding of brand associations is needed to facilitate further theoretical development and practical measurement of the construct. Three studies were conducted to: test a protocol for developing product category specific measures of brand image; investigate the dimensionality of the brand associations construct; and explore whether the degree of dimensionality of brand associations varies depending upon a brand's familiarity. Findings confirm the efficacy of the brand image protocol and indicate that brand associations differ across brands and product categories. The latter finding supports the conclusion that brand associations for different products should be measured using different items. As predicted, dimensionality of brand associations was found to be influenced by brand familiarity. Research interest in branding continues to be strong in the marketing literature (e.g. Alden et al., 1999; Kirmani et al., 1999; Erdem, 1998). Likewise, marketing managers continue to realize the power of brands, manifest in the recent efforts of many companies to build strong Internet `̀ brands'' such as amazon.com and msn.com (Narisetti, 1998). The way consumers perceive brands is a key determinant of long-term businessconsumer relationships (Fournier, 1998). Hence, building strong brand perceptions is a top priority for many firms today (Morris, 1996). Despite the importance of brands and consumer perceptions of them, marketing researchers have not used a consistent definition or measurement technique to assess consumer perceptions of brands. To address this, two scholars have recently developed extensive conceptual treatments of branding and related issues. Keller (1993; 1998) refers to consumer perceptions of brands as brand knowledge, consisting of brand awareness (recognition and recall) and brand image. Keller defines brand image as `̀ perceptions about a brand as reflected by the brand associations held in consumer memory''. These associations include perceptions of brand quality and attitudes toward the brand. Similarly, Aaker (1991, 1996a) proposes that brand associations are anything linked in memory to a brand. Keller and Aaker both appear to hypothesize that consumer perceptions of brands are The current issue and full text archive of this journal is available at http://www.emerald-library.com The authors thank Paul Herr, Donnie Lichtenstein, Rex Moody, Dave Cravens and Julie Baker for helpful comments on earlier versions of this manuscript. Funding was provided by the Graduate School of the University of Colorado and the Charles Tandy American Enterprise Center at Texas Christian University. Top priority for many firms today 350 JOURNAL OF PRODUCT & BRAND MANAGEMENT, VOL. 9 NO. 6 2000, pp. 350-368, # MCB UNIVERSITY PRESS, 1061-0421 An executive summary for managers and executive readers can be found at the end of this article multi-dimensional, yet many of the dimensions they identify appear to be very similar. Furthermore, Aaker's and Keller's conceptualizations of consumers' psychological representation of brands have not been subjected to empirical validation. Consequently, it is difficult to determine if the various constructs they discuss, such as brand attitudes and perceived quality, are separate dimensions of brand associations, (multi-dimensional) as they propose, or if they are simply indicators of brand associations (unidimensional). A number of studies have appeared recently which measure some aspect of consumer brand associations, but these studies do not use consistent measurement techniques and hence, their results are not comparable. They also do not discuss the issue of how to conceptualize brand associations, but focus on empirically identifying factors which enhance or diminish one component of consumer perceptions of brands (e.g. Berthon et al., 1997; Keller and Aaker, 1997; Keller et al., 1998; RoedderJohn et al., 1998; Simonin and Ruth, 1998). Hence, the proposed multidimensional conceptualizations of brand perceptions have not been tested empirically, and the empirical work operationalizes these perceptions as uni-dimensional. Our goal is to provide managers of brands a practical measurement protocol based on a parsimonious conceptual model of brand associations. The specific objectives of the research reported here are to: . test a protocol for developing category-specific measures of brand image; . examine the conceptualization of brand associations as a multidimensional construct by testing brand image, brand attitude, and perceived quality in the same model; and . explore whether the degree of dimensionality of brand associations varies depending on a brand's familiarity. In subsequent sections of this paper we explain the theoretical background of our research, describe three studies we conducted to test our conceptual model, and discuss the theoretical and managerial implications of the results. Conceptual background Brand associations According to Aaker (1991), brand associations are the category of a brand's assets and liabilities that include anything `̀ linked'' in memory to a brand (Aaker, 1991). Keller (1998) defines brand associations as informational nodes linked to the brand node in memory that contain the meaning of the brand for consumers. Brand associations are important to marketers and to consumers. Marketers use brand associations to differentiate, position, and extend brands, to create positive attitudes and feelings toward brands, and to suggest attributes or benefits of purchasing or using a specific brand. Consumers use brand associations to help process, organize, and retrieve information in memory and to aid them in making purchase decisions (Aaker, 1991, pp. 109-13). While several research efforts have explored specific elements of brand associations (Gardner and Levy, 1955; Aaker, 1991; 1996a; 1996b; Aaker and Jacobson, 1994; Aaker, 1997; Keller, 1993), no research has been reported that combined these elements in the same study in order to measure how they are interrelated. Practical measurement protocol Importance to marketers and consumers JOURNAL OF PRODUCT & BRAND MANAGEMENT, VOL. 9 NO. 6 2000 351 Scales to measure partially brand associations have been developed. For example, Park and Srinivasan (1994) developed items to measure one dimension of toothpaste brand associations that included the brand's perceived ability to fight plaque, freshen breath and prevent cavities. This scale is clearly product category specific. Aaker (1997) developed a brand personality scale with five dimensions and 42 items. This scale is not practical to use in some applied studies because of its length. Also, the generalizability of the brand personality scale is limited because many brands are not personality brands, and no protocol is given to adapt the scale. As Aaker (1996b, p. 113) notes, `̀ using personality as a general indicator of brand strength will be a distortion for some brands, particularly those that are positioned with respect to functional advantages and value''. Hence, many previously developed scales are too specialized to allow for general use, or are too long to be used in some applied settings. Another important issue that has not been empirically examined in the literature is whether brand associations represent a one-dimensional or multi-dimensional construct. Although this may appear to be an obvious question, we propose later in this section the conditions under which this dimensionality may be more (or less) measurable. As previously noted, Aaker (1991) defines brand associations as anything linked in memory to a brand. Three related constructs that are, by definition, linked in memory to a brand, and which have been researched conceptually and measured empirically, are brand image, brand attitude, and perceived quality. We selected these three constructs as possible dimensions or indicators of brand associations in our conceptual model. Of the many possible components of brand associations we could have chosen, we selected these three constructs because they: (1) are the three most commonly cited consumer brand perceptions in the empirical marketing literature; (2) have established, reliable, published measures in the literature; and (3) are three dimensions discussed frequently in prior conceptual research (Aaker, 1991; 1996; Keller, 1993; 1998). We conceptualize brand image (functional and symbolic perceptions), brand attitude (overall evaluation of a brand), and perceived quality (judgments of overall superiority) as possible dimensions of brand associations (see Figure 1). Brand image, brand attitude, and perceived quality Brand image is defined as the reasoned or emotional perceptions consumers attach to specific brands (Dobni and Zinkhan,1990) and is the first consumer brand perception that was identified in the marketing literature (Gardner and Levy, 1955). Brand image consists of functional and symbolic brand beliefs. A measurement technique using semantic differential items generated for the relevant product category has been suggested for measuring brand image (Dolich, 1969; Fry and Claxton, 1971). Brand image associations are largely product category specific and measures should be customized for the unique characteristics of specific brand categories (Park and Srinivasan, 1994; Bearden and Etzel, 1982). Brand attitude is defined as consumers' overall evaluation of a brand ± whether good or bad (Mitchell and Olson, 1981). Semantic differential scales measuring brand attitude have frequently appeared in the marketing Linked in memory to a brand Reasoned or emotional perceptions 352 JOURNAL OF PRODUCT & BRAND MANAGEMENT, VOL. 9 NO. 6 2000 literature. Bruner and Hensel (1996) reported 66 published studies which measured brand attitud", "title": "" }, { "docid": "179e9c0672086798e74fa1197a0fda21", "text": "Narcissism is typically viewed as a dimensional construct in social psychology. Direct evidence supporting this position is lacking, however, and recent research suggests that clinical measures of narcissism exhibit categorical properties. It is therefore unclear whether social psychological researchers should conceptualize narcissism as a category or continuum. To help remedy this, the latent structure of narcissism—measured by the Narcissistic Personality Inventory (NPI)—was examined using 3895 participants and three taxometric procedures. Results suggest that NPI scores are distributed dimensionally. There is no apparent shift from ‘‘normal’’ to ‘‘narcissist’’ observed across the NPI continuum. This is consistent with the prevailing view of narcissism in social psychology and suggests that narcissism is structured similar to other aspects of general personality. This also suggests a difference in how narcissism is structured in clinical versus social psychology (134 words). 2007 Elsevier Ltd. All rights reserved.", "title": "" }, { "docid": "ede04c4692c5e575871e66a249e46d3c", "text": "Distributionally robust stochastic optimization (DRSO) is an approach to optimization under uncertainty in which, instead of assuming that there is an underlying probability distribution that is known exactly, one hedges against a chosen set of distributions. In this paper we first point out that the set of distributions should be chosen to be appropriate for the application at hand, and that some of the choices that have been popular until recently are, for many applications, not good choices. We consider sets of distributions that are within a chosen Wasserstein distance from a nominal distribution, for example an empirical distribution resulting from available data. The paper argues that such a choice of sets has two advantages: (1) The resulting distributions hedged against are more reasonable than those resulting from other popular choices of sets. (2) The problem of determining the worst-case expectation over the resulting set of distributions has desirable tractability properties. We derive a dual reformulation of the corresponding DRSO problem and construct approximate worst-case distributions (or an exact worst-case distribution if it exists) explicitly via the first-order optimality conditions of the dual problem. Our contributions are five-fold. (i) We identify necessary and sufficient conditions for the existence of a worst-case distribution, which are naturally related to the growth rate of the objective function. (ii) We show that the worst-case distributions resulting from an appropriate Wasserstein distance have a concise structure and a clear interpretation. (iii) Using this structure, we show that data-driven DRSO problems can be approximated to any accuracy by robust optimization problems, and thereby many DRSO problems become tractable by using tools from robust optimization. (iv) To the best of our knowledge, our proof of strong duality is the first constructive proof for DRSO problems, and we show that the constructive proof technique is also useful in other contexts. (v) Our strong duality result holds in a very general setting, and we show that it can be applied to infinite dimensional process control problems and worst-case value-at-risk analysis.", "title": "" }, { "docid": "100d6140939d37b530888ff9fc644855", "text": "WA-COM has developed an E/D pHEMT process for use in control circuit applications. By adding an E-mode FET to our existing D-mode pHEMT switch process, we are able to integrate logic circuits onto the same die as the RF portion of complex control products (multi-throw switches, multi bit attenuators, etc.). While this capability is not uncommon in the GaAs community, it is new for our fab, and provided new challenges both in processing and in reliability testing. We conducted many tests that focused on the reliability characteristics of this new Emode FET; in the meanwhile, we also needed to assure no degradation of the already qualified D-mode FET. While our initial test suggested low mean-time-tofailure (MTTF) for E-mode devices, recent reliability results have been much better, exceeding our minimum MTTF requirement of 106 hours at channel temperature TCH= 125 °C. Our analysis also shows that devices from this process have high activation energy (Ea 1.6 eV).", "title": "" }, { "docid": "fc3b087bd2c0bd4e12f3cb86f6346c96", "text": "This study investigated whether changes in the technological/social environment in the United States over time have resulted in concomitant changes in the multitasking skills of younger generations. One thousand, three hundred and nineteen Americans from three generations were queried to determine their at-home multitasking behaviors. An anonymous online questionnaire asked respondents to indicate which everyday and technology-based tasks they choose to combine for multitasking and to indicate how difficult it is to multitask when combining the tasks. Combining tasks occurred frequently, especially while listening to music or eating. Members of the ‘‘Net Generation” reported more multitasking than members of ‘‘Generation X,” who reported more multitasking than members of the ‘‘Baby Boomer” generation. The choices of which tasks to combine for multitasking were highly correlated across generations, as were difficulty ratings of specific multitasking combinations. The results are consistent with a greater amount of general multitasking resources in younger generations, but similar mental limitations in the types of tasks that can be multitasked. 2008 Elsevier Ltd. All rights reserved.", "title": "" }, { "docid": "917ab22adee174259bef5171fe6f14fb", "text": "The manner in which quadrupeds change their locomotive patterns—walking, trotting, and galloping—with changing speed is poorly understood. In this paper, we provide evidence for interlimb coordination during gait transitions using a quadruped robot for which coordination between the legs can be self-organized through a simple “central pattern generator” (CPG) model. We demonstrate spontaneous gait transitions between energy-efficient patterns by changing only the parameter related to speed. Interlimb coordination was achieved with the use of local load sensing only without any preprogrammed patterns. Our model exploits physical communication through the body, suggesting that knowledge of physical communication is required to understand the leg coordination mechanism in legged animals and to establish design principles for legged robots that can reproduce flexible and efficient locomotion.", "title": "" }, { "docid": "f8639b0d3a5792bda63dd2f22bfc496a", "text": "The animal metaphor in poststructuralists thinkers like Roland Barthes and Jacques Derrida, offers an understanding into the human self through the relational modes of being and co-being. The present study focuses on the concept of “semiotic animal” proposed by John Deely with reference to Roland Barthes. Human beings are often considered as “rational animal” (Descartes) capable of reason and thinking. By analyzing the “semiotic animal” in Roland Barthes, the intention is to study him as a “mind-dependent” being who discovers the contrast between ens reale and ens rationis through his writing. For Barthes “it is the intimate which seeks utterance” in one and makes “it cry, heard, confronting generality, confronting science.” Roland Barthes attempts to read “his body” from the “tissues of signs” that is driven by the unconscious desires. The study is an attempt to explore the semiological underpinnings in Barthes which are found in the form of rhetorical tropes of cats and dogs and the way he relates it with the ‘self’.", "title": "" }, { "docid": "eb083b4c46d49a6cc639a89b74b1f269", "text": "ROC analyses generated low area under the curve (.695, 95% confidence interval (.637.752)) and cutoff scores with poor sensitivity/specificity balance. BDI-II. Because the distribution of BDI-II scores was not normal, percentile ranks for raw scores were provided for the total sample and separately by gender. symptoms two scales were used: The Beck Depression Inventory-II (BDIII) smokers and non smokers, we found that the mean scores on the BDI-II (9.21 vs.", "title": "" }, { "docid": "1e2768be2148ff1fd102c6621e8da14d", "text": "Example-based learning for computer vision can be difficult when a large number of examples to represent each pattern or object class is not available. In such situations, learning from a small number of samples is of practical value. To study this issue, the task of face expression recognition with a small number of training images of each expression is considered. A new technique based on linear programming for both feature selection and classifier training is introduced. A pairwise framework for feature selection, instead of using all classes simultaneously, is presented. Experimental results compare the method with three others: a simplified Bayes classifier, support vector machine, and AdaBoost. Finally, each algorithm is analyzed and a new categorization of these algorithms is given, especially for learning from examples in the small sample case.", "title": "" }, { "docid": "cbc6986bf415292292b7008ae4d13351", "text": "In this work we present a method to improve the pruning step of the current state-of-the-art methodology to compress neural networks. The novelty of the proposed pruning technique is in its differentiability, which allows pruning to be performed during the backpropagation phase of the network training. This enables an end-to-end learning and strongly reduces the training time. The technique is based on a family of differentiable pruning functions and a new regularizer specifically designed to enforce pruning. The experimental results show that the joint optimization of both the thresholds and the network weights permits to reach a higher compression rate, reducing the number of weights of the pruned network by a further 14% to 33 % compared to the current state-of-the-art. Furthermore, we believe that this is the first study where the generalization capabilities in transfer learning tasks of the features extracted by a pruned network are analyzed. To achieve this goal, we show that the representations learned using the proposed pruning methodology maintain the same effectiveness and generality of those learned by the corresponding non-compressed network on a set of different recognition tasks.", "title": "" }, { "docid": "faca51b6762e4d7c3306208ad800abd3", "text": "Two images of a single scene/object are related by the epipolar geometry, which can be described by a 3×3 singular matrix called the essential matrix if images' internal parameters are known, or the fundamental matrix otherwise. It captures all geometric information contained in two images, and its determination is very important in many applications such as scene modeling and vehicle navigation. This paper gives an introduction to the epipolar geometry, and provides a complete review of the current techniques for estimating the fundamental matrix and its uncertainty. A well-founded measure is proposed to compare these techniques. Projective reconstruction is also reviewed. The software which we have developed for this review is available on the Internet.", "title": "" }, { "docid": "80cf82caebfb48dac02d001b24163bdf", "text": "This paper presents a new current sensor based on fluxgate principle. The sensor consists of a U-shaped magnetic gathering shell. In the designed sensor, the exciting winding and the secondary winding are arranged orthogonally, so that the magnetic fields produced by the two windings are mutually orthogonal and decoupled. Introducing a magnetic gathering shell into the sensor is to concentrate the detected magnetic field and to reduce the interference of an external stray field. Based on the theoretical analysis and the simulation results, a prototype was designed. Test results show that the proposed sensor can measure currents up to 25 A, and has an accuracy of 0.6% and a remarkable resolution.", "title": "" }, { "docid": "2aea197bd094643ecc735b604501b602", "text": "OBJECTIVE\nTo update previous meta-analyses of cohort studies that investigated the association between the Mediterranean diet and health status and to utilize data coming from all of the cohort studies for proposing a literature-based adherence score to the Mediterranean diet.\n\n\nDESIGN\nWe conducted a comprehensive literature search through all electronic databases up to June 2013.\n\n\nSETTING\nCohort prospective studies investigating adherence to the Mediterranean diet and health outcomes. Cut-off values of food groups used to compute the adherence score were obtained.\n\n\nSUBJECTS\nThe updated search was performed in an overall population of 4 172 412 subjects, with eighteen recent studies that were not present in the previous meta-analyses.\n\n\nRESULTS\nA 2-point increase in adherence score to the Mediterranean diet was reported to determine an 8 % reduction of overall mortality (relative risk = 0·92; 95 % CI 0·91, 0·93), a 10 % reduced risk of CVD (relative risk = 0·90; 95 % CI 0·87, 0·92) and a 4 % reduction of neoplastic disease (relative risk = 0·96; 95 % CI 0·95, 0·97). We utilized data coming from all cohort studies available in the literature for proposing a literature-based adherence score. Such a score ranges from 0 (minimal adherence) to 18 (maximal adherence) points and includes three different categories of consumption for each food group composing the Mediterranean diet.\n\n\nCONCLUSIONS\nThe Mediterranean diet was found to be a healthy dietary pattern in terms of morbidity and mortality. By using data from the cohort studies we proposed a literature-based adherence score that can represent an easy tool for the estimation of adherence to the Mediterranean diet also at the individual level.", "title": "" }, { "docid": "9c8fefeb34cc1adc053b5918ea0c004d", "text": "Mezzo is a computer program designed that procedurally writes Romantic-Era style music in real-time to accompany computer games. Leitmotivs are associated with game characters and elements, and mapped into various musical forms. These forms are distinguished by different amounts of harmonic tension and formal regularity, which lets them musically convey various states of markedness which correspond to states in the game story. Because the program is not currently attached to any game or game engine, “virtual” gameplays were been used to explore the capabilities of the program; that is, videos of various game traces were used as proxy examples. For each game trace, Leitmotivs were input to be associated with characters and game elements, and a set of ‘cues’ was written, consisting of a set of time points at which a new set of game data would be passed to Mezzo to reflect the action of the game trace. Examples of music composed for one such game trace, a scene from Red Dead Redemption, are given to illustrate the various ways the program maps Leitmotivs into different levels of musical markedness that correspond with the game state. Introduction Mezzo is a computer program designed by the author that procedurally writes Romantic-Era-style music in real time to accompany computer games. It was motivated by the desire for game music to be as rich and expressive as that written for traditional media such as opera, ballet, or film, while still being procedurally generated, and thus able to adapt to a variety of dramatic situations. To do this, it models deep theories of musical form and semiotics in Classical and Romantic music. Characters and other important game elements like props and environmental features are given Leitmotivs, which are constantly rearranged and developed throughout gameplay in ways Copyright © 2012, Association for the Advancement of Artificial Intelligence (www.aaai.org). All rights reserved. that evoke the conditions and relationships of these elements. Story states that occur in a game are musically conveyed by employing or withholding normative musical features. This creates various states of markedness, a concept which is defined in semiotic terms as a valuation given to difference (Hatten 1994). An unmarked state or event is one that conveys normativity, while an unmarked one conveys deviation from or lack of normativity. A succession of musical sections that passes through varying states of markedness and unmarkedness, producing various trajectories of expectation and fulfillment, tension and release, correlates with the sequence of episodes that makes up a game story’s structure. Mezzo uses harmonic tension and formal regularity as its primary vehicles for musically conveying markedness; it is constantly adjusting the values of these features in order to express states of the game narrative. Motives are associated with characters, and markedness with game conditions. These two independent associations allow each coupling of a motive with a level of markedness to be interpreted as a pair of coordinates in a state space (a “semiotic square”), where various regions of the space correspond to different expressive musical qualities (Grabócz 2009). Certain patterns of melodic repetition combined with harmonic function became conventionalized in the Classical Era as normative forms, labeled the sentence, period, and sequence (Caplin 1998, Schoenberg 1969). These forms exist in the middleground of a musical work, each comprising one or several phrase repetitions and one or a small number of harmonic cadences. Each musical form has a normative structure, and various ways in which it can be deformed by introducing irregular amounts of phrase repetition to make the form asymmetrical. Mezzo’s expressive capability comes from the idea that there are different perceptible levels of formal irregularity that can be quantitatively measured, and that these different levels convey different levels of markedness. Musical Metacreation: Papers from the 2012 AIIDE Workshop AAAI Technical Report WS-12-16", "title": "" }, { "docid": "f20a3c60d7415186b065dc7782af16ef", "text": "The present research examined how implicit racial associations and explicit racial attitudes of Whites relate to behaviors and impressions in interracial interactions. Specifically, the authors examined how response latency and self-report measures predicted bias and perceptions of bias in verbal and nonverbal behavior exhibited by Whites while they interacted with a Black partner. As predicted, Whites' self-reported racial attitudes significantly predicted bias in their verbal behavior to Black relative to White confederates. Furthermore, these explicit attitudes predicted how much friendlier Whites felt that they behaved toward White than Black partners. In contrast, the response latency measure significantly predicted Whites' nonverbal friendliness and the extent to which the confederates and observers perceived bias in the participants' friendliness.", "title": "" }, { "docid": "678d3dccdd77916d0c653d88785e1300", "text": "BACKGROUND\nFatigue is one of the common complaints of multiple sclerosis (MS) patients, and its treatment is relatively unclear. Ginseng is one of the herbal medicines possessing antifatigue properties, and its administration in MS for such a purpose has been scarcely evaluated. The purpose of this study was to evaluate the efficacy and safety of ginseng in the treatment of fatigue and the quality of life of MS patients.\n\n\nMETHODS\nEligible female MS patients were randomized in a double-blind manner, to receive 250-mg ginseng or placebo twice daily over 3 months. Outcome measures included the Modified Fatigue Impact Scale (MFIS) and the Iranian version of the Multiple Sclerosis Quality Of Life Questionnaire (MSQOL-54). The questionnaires were used after randomization, and again at the end of the study.\n\n\nRESULTS\nOf 60 patients who were enrolled in the study, 52 (86%) subjects completed the trial with good drug tolerance. Statistical analysis showed better effects for ginseng than the placebo as regards MFIS (p = 0.046) and MSQOL (p ≤ 0.0001) after 3 months. No serious adverse events were observed during follow-up.\n\n\nCONCLUSIONS\nThis study indicates that 3-month ginseng treatment can reduce fatigue and has a significant positive effect on quality of life. Ginseng is probably a good candidate for the relief of MS-related fatigue. Further studies are needed to shed light on the efficacy of ginseng in this field.", "title": "" } ]
scidocsrr
6abbfbafb51f135d86be2c030883d198
Multi-modal Capsule Routing for Actor and Action Video Segmentation Conditioned on Natural Language Queries
[ { "docid": "1f2ec917e09792294b08d1d9ea380a97", "text": "Can humans fly? Emphatically no. Can cars eat? Again, absolutely not. Yet, these absurd inferences result from the current disregard for particular types of actors in action understanding. There is no work we know of on simultaneously inferring actors and actions in the video, not to mention a dataset to experiment with. Our paper hence marks the first effort in the computer vision community to jointly consider various types of actors undergoing various actions. To start with the problem, we collect a dataset of 3782 videos from YouTube and label both pixel-level actors and actions in each video. We formulate the general actor-action understanding problem and instantiate it at various granularities: both video-level single- and multiple-label actor-action recognition and pixel-level actor-action semantic segmentation. Our experiments demonstrate that inference jointly over actors and actions outperforms inference independently over them, and hence concludes our argument of the value of explicit consideration of various actors in comprehensive action understanding.", "title": "" }, { "docid": "c2b1dd2d2dd1835ed77cf6d43044eed8", "text": "The artificial neural networks that are used to recognize shapes typically use one or more layers of learned feature detectors that produce scalar outputs. By contrast, the computer vision community uses complicated, hand-engineered features, like SIFT [6], that produce a whole vector of outputs including an explicit representation of the pose of the feature. We show how neural networks can be used to learn features that output a whole vector of instantiation parameters and we argue that this is a much more promising way of dealing with variations in position, orientation, scale and lighting than the methods currently employed in the neural networks community. It is also more promising than the handengineered features currently used in computer vision because it provides an efficient way of adapting the features to the domain.", "title": "" } ]
[ { "docid": "ee5c8e8c4f2964510604d1ef4a452372", "text": "Learning customer preferences from an observed behaviour is an important topic in the marketing literature. Structural models typically model forward-looking customers or firms as utility-maximizing agents whose utility is estimated using methods of Stochastic Optimal Control. We suggest an alternative approach to study dynamic consumer demand, based on Inverse Reinforcement Learning (IRL). We develop a version of the Maximum Entropy IRL that leads to a highly tractable model formulation that amounts to low-dimensional convex optimization in the search for optimal model parameters. Using simulations of consumer demand, we show that observational noise for identical customers can be easily confused with an apparent consumer heterogeneity.", "title": "" }, { "docid": "e591165d8e141970b8263007b076dee1", "text": "Treating a human mind like a machine is an essential component of dehumanization, whereas attributing a humanlike mind to a machine is an essential component of anthropomorphism. Here we tested how a cue closely connected to a person's actual mental experience-a humanlike voice-affects the likelihood of mistaking a person for a machine, or a machine for a person. We predicted that paralinguistic cues in speech are particularly likely to convey the presence of a humanlike mind, such that removing voice from communication (leaving only text) would increase the likelihood of mistaking the text's creator for a machine. Conversely, adding voice to a computer-generated script (resulting in speech) would increase the likelihood of mistaking the text's creator for a human. Four experiments confirmed these hypotheses, demonstrating that people are more likely to infer a human (vs. computer) creator when they hear a voice expressing thoughts than when they read the same thoughts in text. Adding human visual cues to text (i.e., seeing a person perform a script in a subtitled video clip), did not increase the likelihood of inferring a human creator compared with only reading text, suggesting that defining features of personhood may be conveyed more clearly in speech (Experiments 1 and 2). Removing the naturalistic paralinguistic cues that convey humanlike capacity for thinking and feeling, such as varied pace and intonation, eliminates the humanizing effect of speech (Experiment 4). We discuss implications for dehumanizing others through text-based media, and for anthropomorphizing machines through speech-based media. (PsycINFO Database Record", "title": "" }, { "docid": "f591ae6217c769d3bca2c15a021125cc", "text": "Recent years have witnessed an explosive growth of mobile devices. Mobile devices are permeating every aspect of our daily lives. With the increasing usage of mobile devices and intelligent applications, there is a soaring demand for mobile applications with machine learning services. Inspired by the tremendous success achieved by deep learning in many machine learning tasks, it becomes a natural trend to push deep learning towards mobile applications. However, there exist many challenges to realize deep learning in mobile applications, including the contradiction between the miniature nature of mobile devices and the resource requirement of deep neural networks, the privacy and security concerns about individuals' data, and so on. To resolve these challenges, during the past few years, great leaps have been made in this area. In this paper, we provide an overview of the current challenges and representative achievements about pushing deep learning on mobile devices from three aspects: training with mobile data, efficient inference on mobile devices, and applications of mobile deep learning. The former two aspects cover the primary tasks of deep learning. Then, we go through our two recent applications that apply the data collected by mobile devices to inferring mood disturbance and user identification. Finally, we conclude this paper with the discussion of the future of this area.", "title": "" }, { "docid": "5ebdda11fbba5d0633a86f2f52c7a242", "text": "What is index modulation (IM)? This is an interesting question that we have started to hear more and more frequently over the past few years. The aim of this paper is to answer this question in a comprehensive manner by covering not only the basic principles and emerging variants of IM, but also reviewing the most recent as well as promising advances in this field toward the application scenarios foreseen in next-generation wireless networks. More specifically, we investigate three forms of IM: spatial modulation, channel modulation and orthogonal frequency division multiplexing (OFDM) with IM, which consider the transmit antennas of a multiple-input multiple-output system, the radio frequency mirrors (parasitic elements) mounted at a transmit antenna and the subcarriers of an OFDM system for IM techniques, respectively. We present the up-to-date advances in these three promising frontiers and discuss possible future research directions for IM-based schemes toward low-complexity, spectrum- and energy-efficient next-generation wireless networks.", "title": "" }, { "docid": "2a78ef9f2d3fb35e1595a6ffca20851b", "text": "Is AI antithetical to good user interface design? From the earliest times in the development of computers, activities in human-computer interaction (HCI) and AI have been intertwined. But as subfields of computer science, HCI and AI have always had a love-hate relationship. The goal of HCI is to make computers easier to use and more helpful to their users. The goal of artificial intelligence is to model human thinking and to embody those mechanisms in computers. How are these goals related? Some in HCI have seen these goals sometimes in opposition. They worry that the heuristic nature of many AI algorithms will lead to unreliability in the interface. They worry that AI’s emphasis on mimicking human decision-making functions might usurp the decision-making prerogative of the human user. These concerns are not completely without merit. There are certainly many examples of failed attempts to prematurely foist AI on the public. These attempts gave AI a bad name, at least at the time. But so too have there been failed attempts to popularize new HCI approaches. The first commercial versions of window systems, such as the Xerox Star and early versions of Microsoft Windows, weren’t well accepted at the time of their introduction. Later design iterations of window systems, such as the Macintosh and Windows 3.0, finally achieved success. Key was that these early failures did not lead their developers to conclude window systems were a bad idea. Researchers shouldn’t construe these (perceived) AI failures as a refutation of the idea of AI in interfaces. Modern PDA, smartphone, and tablet computers are now beginning to have quite usable handwriting recognition. Voice recognition is being increasingly employed on phones, and even in the noisy environment of cars. Animated agents, more polite, less intrusive, and better thought out, might also make a", "title": "" }, { "docid": "c56063a72110b03e7cadcedc2982cbb5", "text": "We present a system for keyframe-based dense camera tracking and depth map estimation that is entirely learned. For tracking, we estimate small pose increments between the current camera image and a synthetic viewpoint. This significantly simplifies the learning problem and alleviates the dataset bias for camera motions. Further, we show that generating a large number of pose hypotheses leads to more accurate predictions. For mapping, we accumulate information in a cost volume centered at the current depth estimate. The mapping network then combines the cost volume and the keyframe image to update the depth prediction, thereby effectively making use of depth measurements and image-based priors. Our approach yields state-of-the-art results with few images and is robust with respect to noisy camera poses. We demonstrate that the performance of our 6 DOF tracking competes with RGB-D tracking algorithms.We compare favorably against strong classic and deep learning powered dense depth algorithms.", "title": "" }, { "docid": "4a5d4db892145324597bd8d6b98c009f", "text": "Advances in wireless communication technologies, such as wearable and implantable biosensors, along with recent developments in the embedded computing area are enabling the design, development, and implementation of body area networks. This class of networks is paving the way for the deployment of innovative healthcare monitoring applications. In the past few years, much of the research in the area of body area networks has focused on issues related to wireless sensor designs, sensor miniaturization, low-power sensor circuitry, signal processing, and communications protocols. In this paper, we present an overview of body area networks, and a discussion of BAN communications types and their related issues. We provide a detailed investigation of sensor devices, physical layer, data link layer, and radio technology aspects of BAN research. We also present a taxonomy of BAN projects that have been introduced/proposed to date. Finally, we highlight some of the design challenges and open issues that still need to be addressed to make BANs truly ubiquitous for a wide range of applications. M. Chen · S. Gonzalez · H. Cao · V. C. M. Leung Department of Electrical and Computer Engineering, The University of British Columbia, Vancouver, BC, Canada M. Chen School of Computer Science and Engineering, Seoul National University, Seoul, South Korea A. Vasilakos (B) Department of Computer and Telecommunications Engineering, University of Western Macedonia, Macedonia, Greece e-mail: vasilako@ath.forthnet.gr", "title": "" }, { "docid": "3817c02b7cc8846553854f270d236047", "text": "The annualized interest rate for a payday loan often exceeds 10 times that of a typical credit card, yet this market grew immensely in the 1990s and 2000s, elevating concerns about the risk payday loans pose to consumers and whether payday lenders target minority neighborhoods. This paper employs individual credit record data, and Census data on payday lender store locations, to assess these concerns. Taking advantage of several state law changes since 2006 and, following previous work, within-state-year differences in access arising from proximity to states that allow payday loans, I find little to no effect of payday loans on credit scores, new delinquencies, or the likelihood of overdrawing credit lines. The analysis also indicates that neighborhood racial composition has little influence on payday lender store locations conditional on income, wealth and demographic characteristics. JEL Codes: D14, G2", "title": "" }, { "docid": "c01f4b10c9d29e66c9132928e36e15b4", "text": "In shared autonomy, user input and robot autonomy are combined to control a robot to achieve a goal. Often, the robot does not know a priori which goal the user wants to achieve, and must both predict the user's intended goal, and assist in achieving that goal. We formulate the problem of shared autonomy as a Partially Observable Markov Decision Process with uncertainty over the user's goal. We utilize maximum entropy inverse optimal control to estimate a distribution over the user's goal based on the history of inputs. Ideally, the robot assists the user by solving for an action which minimizes the expected cost-to-go for the (unknown) goal. As solving the POMDP to select the optimal action is intractable, we use hindsight optimization to approximate the solution. In a user study, we compare our method to a standard predict-then-blend approach. We find that our method enables users to accomplish tasks more quickly while utilizing less input. However, when asked to rate each system, users were mixed in their assessment, citing a tradeoff between maintaining control authority and accomplishing tasks quickly.", "title": "" }, { "docid": "54a1c132e2a51677b8ff28e3cfce9c6c", "text": "The huge size of deep networks hinders their use in small computing devices. In this paper, we consider compressing the network by weight quantization. We extend a recently proposed loss-aware weight binarization scheme to ternarization, with possibly different scaling parameters for the positive and negative weights, and m-bit (where m > 2) quantization. Experiments on feedforward and recurrent neural networks show that the proposed scheme outperforms state-of-the-art weight quantization algorithms, and is as accurate (or even more accurate) than the full-precision network.", "title": "" }, { "docid": "467abdfe4b111aac0918b4bda427be63", "text": "We propose a new algorithm for the incremental training of support vector machines (SVMs) that is suitable for problems of sequentially arriving data and fast constraint parameter variation. Our method involves using a \"warm-start\" algorithm for the training of SVMs, which allows us to take advantage of the natural incremental properties of the standard active set approach to linearly constrained optimization problems. Incremental training involves quickly retraining a support vector machine after adding a small number of additional training vectors to the training set of an existing (trained) support vector machine. Similarly, the problem of fast constraint parameter variation involves quickly retraining an existing support vector machine using the same training set but different constraint parameters. In both cases, we demonstrate the computational superiority of incremental training over the usual batch retraining method.", "title": "" }, { "docid": "bc21fc6e54bf9b31449811b573f3654c", "text": "The effects of transformational leadership on the outcomes of specific change initiatives are not well understood. Conversely, organizational change studies have examined leader behaviors during specific change implementations yet have failed to link these to broader leadership theories. In this study, the authors investigate the relationship between transformational and change leadership and followers' commitment to a particular change initiative as a function of the personal impact of the changes. Transformational leadership was found to be more strongly related to followers' change commitment than change-specific leadership practices, especially when the change had significant personal impact. For leaders who were not viewed as transformational, good change-management practices were found to be associated with higher levels of change commitment.", "title": "" }, { "docid": "f733125d8cd3d90ac7bf463ae93ca24a", "text": "Various online, networked systems offer a lightweight process for obtaining identities (e.g., confirming a valid e-mail address), so that users can easily join them. Such convenience comes with a price, however: with minimum effort, an attacker can subvert the identity management scheme in place, obtain a multitude of fake accounts, and use them for malicious purposes. In this work, we approach the issue of fake accounts in large-scale, distributed systems, by proposing a framework for adaptive identity management. Instead of relying on users' personal information as a requirement for granting identities (unlike existing proposals), our key idea is to estimate a trust score for identity requests, and price them accordingly using a proof of work strategy. The research agenda that guided the development of this framework comprised three main items: (i) investigation of a candidate trust score function, based on an analysis of users' identity request patterns, (ii) combination of trust scores and proof of work strategies (e.g. cryptograhic puzzles) for adaptively pricing identity requests, and (iii) reshaping of traditional proof of work strategies, in order to make them more resource-efficient, without compromising their effectiveness (in stopping attackers).", "title": "" }, { "docid": "2d7a13754631206203d6618ab2a27a76", "text": "This Contrast enhancement is frequently referred to as one of the most important issues in image processing. Histogram equalization (HE) is one of the common methods used for improving contrast in digital images. Histogram equalization (HE) has proved to be a simple and effective image contrast enhancement technique. However, the conventional histogram equalization methods usually result in excessive contrast enhancement, which causes the unnatural look and visual artifacts of the processed image. This paper presents a review of new forms of histogram for image contrast enhancement. The major difference among the methods in this family is the criteria used to divide the input histogram. Brightness preserving BiHistogram Equalization (BBHE) and Quantized Bi-Histogram Equalization (QBHE) use the average intensity value as their separating point. Dual Sub-Image Histogram Equalization (DSIHE) uses the median intensity value as the separating point. Minimum Mean Brightness Error Bi-HE (MMBEBHE) uses the separating point that produces the smallest Absolute Mean Brightness Error (AMBE). Recursive Mean-Separate Histogram Equalization (RMSHE) is another improvement of BBHE. The Brightness preserving dynamic histogram equalization (BPDHE) method is actually an extension to both MPHEBP and DHE. Weighting mean-separated sub-histogram equalization (WMSHE) method is to perform the effective contrast enhancement of the digital image. Keywords-component image processing; contrast enhancement; histogram equalization; minimum mean brightness error; brightness preserving enhancement, histogram partition.", "title": "" }, { "docid": "b2171911e8c45ebc86585e0a179718c3", "text": "Robots are envisioned to collaborate with people in tasks that require physical manipulation such as a robot instructing a human in assembling household furniture, a human teaching a robot how to repair machinery, or a robot and a human collaboratively completing construction work. These scenarios characterize joint actions in which the robot and the human must effectively communicate and coordinate their actions with each other in order to successfully achieve task goals. Drawing on recent research in cognitive sciences on joint action, this paper discusses key mechanisms for effective coordination—joint attention, action observation, task-sharing, action coordination, and perception of agency—toward informing the design of communication and coordination mechanisms for robots. It presents two illustrative studies that explore how robot behavior might be designed to employ these mechanisms, particularly joint attention and action observation, to improve measures of task performance and perceptions of the robot in human-robot collaboration.", "title": "" }, { "docid": "f7fae3f76a871fbf935a3daa3aa770cc", "text": "OBJECTIVE\nIn this paper, we focus on three aspects: (1) to annotate a set of standard corpus in Chinese discharge summaries; (2) to perform word segmentation and named entity recognition in the above corpus; (3) to build a joint model that performs word segmentation and named entity recognition.\n\n\nDESIGN\nTwo independent systems of word segmentation and named entity recognition were built based on conditional random field models. In the field of natural language processing, while most approaches use a single model to predict outputs, many works have proved that performance of many tasks can be improved by exploiting combined techniques. Therefore, in this paper, we proposed a joint model using dual decomposition to perform both the two tasks in order to exploit correlations between the two tasks. Three sets of features were designed to demonstrate the advantage of the joint model we proposed, compared with independent models, incremental models and a joint model trained on combined labels.\n\n\nMEASUREMENTS\nMicro-averaged precision (P), recall (R), and F-measure (F) were used to evaluate results.\n\n\nRESULTS\nThe gold standard corpus is created using 336 Chinese discharge summaries of 71 355 words. The framework using dual decomposition achieved 0.2% improvement for segmentation and 1% improvement for recognition, compared with each of the two tasks alone.\n\n\nCONCLUSIONS\nThe joint model is efficient and effective in both segmentation and recognition compared with the two individual tasks. The model achieved encouraging results, demonstrating the feasibility of the two tasks.", "title": "" }, { "docid": "fea7c2a33fe30e32cc1be0a7b8c392b6", "text": "This paper describes the development and characterization of a high frequency (65 MHz) ultrasound transducer array. The array was built using bulk PZT that was etched using an optimized chlorine-based plasma process. The median etch rate of 6 mum/hr yielded a good profile (sidewall) angle (>830) and a reasonable processing time for etch depths up to 40 mum. A backing layer having an acoustic impedance of 6 MRayl together with a front-end matching layer of parylene yielded a transducer bandwidth of 40%. The impedance of the backing material will be increased to 20 MRayls in the near future, and this will increase the bandwidth to 70%. The two-way insertion loss and cross talk between adjacent channels at the center frequency are 26.5 dB and -25 dB, respectively.", "title": "" }, { "docid": "26a5208a45e5c95cbfb1085c258302ce", "text": "This study examined changes in time perception as a function of depressive symptoms, assessed for each participant with the Beck Depression Inventory (BDI). The participants performed a temporal bisection task in which they had to categorize a signal duration of between 400 and 1600 ms as either as short or long. The data showed that the bisection function was shifted toward the right, and that the point of subjective equality was higher in the depressive than in the non-depressive participants. Furthermore, the higher the depression score was, the shorter the signal duration was judged to be. In contrast, the sensitivity to time was similar in these two groups of participants. These results thus indicate that the probe durations were underestimated by the depressive participants. The sadness scores assessed by the Brief Mood Inventory Scale (BMIS) also suggest that the emotional state of sadness in the depressive participants goes some way to explaining their temporal performance. Statistical analyses and modeling of data support the idea according to which these results may be explained by a slowing down of the internal clock in the depressive participants.", "title": "" }, { "docid": "e303bb209a0240c2f5f087b52acbe673", "text": "While environmental issues keep gaining increasing attention from the public opinion and policy makers, several experiments demonstrated the feasibility of wireless sensor networks to be used in a large variety of environmental monitoring applications. Focusing on the assessment of environmental noise pollution in urban areas, we provide qualitative considerations and preliminary experimental results that motivate and encourage the use of wireless sensor networks in this context.", "title": "" }, { "docid": "1defbf845efc29a5a9bc780e17d11a92", "text": "The Resource Description Framework (RDF) is a graphbased data model promoted by the W3C as the standard for Semantic Web applications. Its associated query language is SPARQL. RDF graphs are often large and varied, produced in a variety of contexts, e.g., scientific applications, social or online media, government data etc. They are heterogeneous, i.e., resources described in an RDF graph may have very different sets of properties. An RDF resource may have: no types, one or several types (which may or may not be related to each other). RDF Schema (RDFS) information may optionally be attached to an RDF graph, to enhance the description of its resources. Such statements also entail that in an RDF graph, some data is implicit. According to the W3C RDF and SPARQL specification, the semantics of an RDF graph comprises both its explicit and implicit data; in particular, SPARQL query answers must be computed reflecting both the explicit and implicit data. These features make RDF graphs complex, both structurally and conceptually. It is intrinsically hard to get familiar with a new RDF dataset, especially if an RDF schema is sparse or not available at all. In this work, we study the problem of RDF summarization, that is: given an input RDF graph G, find an RDF graph SG which summarizes G as accurately as possible, while being possibly orders of magnitude smaller than the original graph. Such a summary can be used in a variety of contexts: to help an RDF application designer get acquainted with a new dataset, as a first-level user interface, or as a support for query optimization as typically used in semistructured graph data management [4] etc. Our approach is query-oriented, i.e., a summary should enable static analysis and help formulating and optimizing queries; for instance, querying a summary of a graph should reflect whether the query has some answers against this graph, or finding a simpler way to formulate the query etc. Ours is the first semi-structured data summarization approach focused on partially explicit, partially implicit RDF graphs. In the sequel, Section 2 recalls RDF basics, and sets the", "title": "" } ]
scidocsrr
4982dcd3706ce5b3bc405984cc6f6dfe
Textual analysis of stock market prediction using breaking financial news: The AZFin text system
[ { "docid": "456fd41267a82663fee901b111ff7d47", "text": "The tagging of Named Entities, the names of particular things or classes, is regarded as an important component technology for many NLP applications. The first Named Entity set had 7 types, organization, location, person, date, time, money and percent expressions. Later, in the IREX project artifact was added and ACE added two, GPE and facility, to pursue the generalization of the technology. However, 7 or 8 kinds of NE are not broad enough to cover general applications. We proposed about 150 categories of NE (Sekine et al. 2002) and now we have extended it again to 200 categories. Also we have developed dictionaries and an automatic tagger for NEs in Japanese.", "title": "" } ]
[ { "docid": "5bd1085c9f2026454c547b6e5c102443", "text": "Home advantage is well documented in a wide range of team sports including association football (soccer). Home team crowd support has been shown to be a likely causal factor and its influence on referee decision-making appears to play a significant role. Match data from the 2009/2010 and 2010/2011 seasons of the Union of European Football Associations (UEFA) Champions League and Europa League were used to investigate referee bias in terms of the association between match location (home vs. away) and disciplinary sanctions used by football referees. The adjusted mean number of yellow cards received by home and away teams and the ratios of these means were estimated from Poisson regression models. After controlling for within-match measures of attacking dominance referees in the Champions League and Europa League issued 25% (p<0.001) and 10% (p=0.002) more yellow cards, respectively, to away teams than to home teams. The higher level of home team bias in the Champions League appeared to be mainly due to higher crowd densities. In a combined analysis of both UEFA leagues the magnitude of referee bias increased with increasing crowd density (p<0.001). Crowd size and crowd proximity were not associated with referee bias after controlling for crowd density. These results provide further evidence that crowd support influences referee decisions. Failure to control for within-match team performance may over-estimate the extent of referee bias in terms of the number of disciplinary sanctions used.", "title": "" }, { "docid": "9687de8102eecaf14261e0a32318b146", "text": "This paper presents a set of algorithms for distinguishing personal names with multiple real referents in text, based on little or no supervision. The approach utilizes an unsupervised clustering technique over a rich feature space of biographic facts, which are automatically extracted via a language-independent bootstrapping process. The induced clustering of named entities are then partitioned and linked to their real referents via the automatically extracted biographic data. Performance is evaluated based on both a test set of handlabeled multi-referent personal names and via automatically generated pseudonames.", "title": "" }, { "docid": "19e2790010bfa1081fb9503ba5f9d808", "text": "Existing electricity market segmentation analysis techniques only make use of limited consumption statistics (usually averages and variances). In this paper we use power demand distributions (PDDs) obtained from fine-grain smart meter data to perform market segmentation based on distributional clustering. We apply this approach to mining 8 months of readings from about 1000 US Google employees.", "title": "" }, { "docid": "76ae2082a4ab35fa3046f3f0af54bfe2", "text": "Electoral prediction from Twitter data is an appealing research topic. It seems relatively straightforward and the prevailing view is overly optimistic. This is problematic because while simple approaches are assumed to be good enough, core problems are not addressed. Thus, this paper aims to (1) provide a balanced and critical review of the state of the art; (2) cast light on the presume predictive power of Twitter data; and (3) depict a roadmap to push forward the field. Hence, a scheme to characterize Twitter prediction methods is proposed. It covers every aspect from data collection to performance evaluation, through data processing and vote inference. Using that scheme, prior research is analyzed and organized to explain the main approaches taken up to date but also their weaknesses. This is the first meta-analysis of the whole body of research regarding electoral prediction from Twitter data. It reveals that its presumed predictive power regarding electoral prediction has been somewhat exaggerated: although social media may provide a glimpse on electoral outcomes current research does not provide strong evidence to support it can currently replace traditional polls. Finally, future lines of work are suggested.", "title": "" }, { "docid": "adbf41c50f7245c34439fd692d413cd3", "text": "A low voltage low power CMOS limiter and received signal strength indicator (RSSI) with integrated automatic gain control (AGC) loop are designed using TSMC 0.13um CMOS technology. The limiter uses six-stage amplifier architecture for minimum power consideration achieves 56dB gain and 17MHz bandwidth. The RSSI has a dynamic range more than 60dB, and the RSSI linearity error is within ±0.5dB for an input power from −65dBm to −8dBm. The RSSI output voltage is from 0.2V to 1V and the slope of the curve is 14.28mV/dB. The RSSI with integrated AGC loop draws 1.5 mA (I and Q paths) from a 1.2V single supply, including limiters, RSSI and comparators.", "title": "" }, { "docid": "2d6225b20cf13d2974ce78877642a2f7", "text": "Low rank and sparse representation based methods, which make few specific assumptions about the background, have recently attracted wide attention in background modeling. With these methods, moving objects in the scene are modeled as pixel-wised sparse outliers. However, in many practical scenarios, the distributions of these moving parts are not truly pixel-wised sparse but structurally sparse. Meanwhile a robust analysis mechanism is required to handle background regions or foreground movements with varying scales. Based on these two observations, we first introduce a class of structured sparsity-inducing norms to model moving objects in videos. In our approach, we regard the observed sequence as being constituted of two terms, a low-rank matrix (background) and a structured sparse outlier matrix (foreground). Next, in virtue of adaptive parameters for dynamic videos, we propose a saliency measurement to dynamically estimate the support of the foreground. Experiments on challenging well known data sets demonstrate that the proposed approach outperforms the state-of-the-art methods and works effectively on a wide range of complex videos.", "title": "" }, { "docid": "4596da5305ce150406a8f46a621620a6", "text": "Incorporating prior knowledge like lexical constraints into the model’s output to generate meaningful and coherent sentences has many applications in dialogue system, machine translation, image captioning, etc. However, existing RNN-based models incrementally generate sentences from left to right via beam search, which makes it difficult to directly introduce lexical constraints into the generated sentences. In this paper, we propose a new algorithmic framework, dubbed BFGAN, to address this challenge. Specifically, we employ a backward generator and a forward generator to generate lexically constrained sentences together, and use a discriminator to guide the joint training of two generators by assigning them reward signals. Due to the difficulty of BFGAN training, we propose several training techniques to make the training process more stable and efficient. Our extensive experiments on two large-scale datasets with human evaluation demonstrate that BFGAN has significant improvements over previous methods.", "title": "" }, { "docid": "4f2319ce4f4a138f80872ff7dfb9cb51", "text": "Social media has become prominently popular. Tens of millions of users login to social media sites like Twitter to disseminate breaking news and share their opinions and thoughts. For businesses, social media is potentially useful for monitoring the public perception and the social reputation of companies and products. Despite great potential, how bad news about a company influences the public sentiments in social media has not been studied in depth. The aim of this study is to assess people’s sentiments in Twitter upon the spread of two types of information: corporate bad news and a CEO’s apology. We attempted to understand how sentiments on corporate bad news propagate in Twitter and whether any social network feature facilitates its spread. We investigated the Domino’s Pizza crisis in 2009, where bad news spread rapidly through social media followed by an official apology from the company. Our work shows that bad news spreads faster than other types of information, such as an apology, and sparks a great degree of negative sentiments in the network. However, when users converse about bad news repeatedly, their negative sentiments are softened. We discuss various reactions of users towards the bad news in social media such as negative purchase intent.", "title": "" }, { "docid": "4540d9e955e1c38de8997424465a9b2b", "text": "The Internet Movie Database (IMDB) is one of the largest online resources for general movie information combined with a forum in which users can rate movies. We investigate the extent to which a movie’s average user rating can be predicted after learning the relationship between the rating and a movie’s various attributes from a training set. Two methods are evaluated: kernel regression and model trees. Modifications to standard algorithms for training these two regressors lead to better prediction accuracy on this data set.", "title": "" }, { "docid": "022f0b83e93b82dfbdf7ae5f5ebe6f8f", "text": "Most pregnant women at risk of for infection with Plasmodium vivax live in the Asia-Pacific region. However, malaria in pregnancy is not recognised as a priority by many governments, policy makers, and donors in this region. Robust data for the true burden of malaria throughout pregnancy are scarce. Nevertheless, when women have little immunity, each infection is potentially fatal to the mother, fetus, or both. WHO recommendations for the control of malaria in pregnancy are largely based on the situation in Africa, but strategies in the Asia-Pacific region are complicated by heterogeneous transmission settings, coexistence of multidrug-resistant Plasmodium falciparum and Plasmodium vivax parasites, and different vectors. Most knowledge of the epidemiology, effect, treatment, and prevention of malaria in pregnancy in the Asia-Pacific region comes from India, Papua New Guinea, and Thailand. Improved estimates of the morbidity and mortality of malaria in pregnancy are urgently needed. When malaria in pregnancy cannot be prevented, accurate diagnosis and prompt treatment are needed to avert dangerous symptomatic disease and to reduce effects on fetuses.", "title": "" }, { "docid": "26e24e4a59943f9b80d6bf307680b70c", "text": "We present a machine-learned model that can automatically detect when a student using an intelligent tutoring system is off-task, i.e., engaged in behavior which does not involve the system or a learning task. This model was developed using only log files of system usage (i.e. no screen capture or audio/video data). We show that this model can both accurately identify each student's prevalence of off-task behavior and can distinguish off-task behavior from when the student is talking to the teacher or another student about the subject matter. We use this model in combination with motivational and attitudinal instruments, developing a profile of the attitudes and motivations associated with off-task behavior, and compare this profile to the attitudes and motivations associated with other behaviors in intelligent tutoring systems. We discuss how the model of off-task behavior can be used within interactive learning environments which respond to when students are off-task.", "title": "" }, { "docid": "be8e1e4fd9b8ddb0fc7e1364455999e8", "text": "In this paper, we describe the development and exploitation of a corpus-based tool for the identification of metaphorical patterns in large datasets. The analysis of metaphor as a cognitive and cultural, rather than solely linguistic, phenomenon has become central as metaphor researchers working within ‘Cognitive Metaphor Theory’ have drawn attention to the presence of systematic and pervasive conventional metaphorical patterns in ‘ordinary’ language (e.g. I’m at a crossroads in my life). Cognitive Metaphor Theory suggests that these linguistic patterns reflect the existence of conventional conceptual metaphors, namely systematic cross-domain correspondences in conceptual structure (e.g. LIFE IS A JOURNEY). This theoretical approach, described further in section 2, has led to considerable advances in our understanding of metaphor both as a linguistic device and a cognitive model, and to our awareness of its role in many different genres and discourses. Although some recent research has incorporated corpus linguistic techniques into this framework for the analysis of metaphor, to date, such analyses have primarily involved the concordancing of pre-selected search strings (e.g. Deignan 2005). The method described in this paper represents an attempt to extend the limits of this form of analysis. In our approach, we have applied an existing semantic field annotation tool (USAS) developed at Lancaster University to aid metaphor researchers in searching corpora. We are able to filter all possible candidate semantic fields proposed by USAS to assist in finding possible ‘source’ (e.g. JOURNEY) and ‘target’ (e.g. LIFE) domains, and we can then go on to consider the potential metaphoricity of the expressions included under each possible source domain. This method thus enables us to identify open-ended sets of metaphorical expressions, which are not limited to predetermined search strings. In section 3, we present this emerging methodology for the computer-assisted analysis of metaphorical patterns in discourse. The semantic fields automatically annotated by USAS can be seen as roughly corresponding to the domains of metaphor theory. We have used USAS in combination with key word and domain techniques in Wmatrix (Rayson, 2003) to replicate earlier manual analyses, e.g. machine metaphors in Ken Kesey’s One Flew Over the Cuckoo’s Nest (Semino and Swindlehurst, 1996) and war, machine and organism metaphors in business magazines (Koller, 2004a). These studies are described in section 4.", "title": "" }, { "docid": "dde77ad495cf14c29ae4d18a1cf8e007", "text": "A novel differentially fed dual-band implantable antenna is proposed for the first time for a fully implantable neuro-microsystem. The antenna operates at two center frequencies of 433.9 MHz and 542.4 MHz, which are close to the 402-405 MHz medical implant communication services (MICS) band, to support sub-GHz wideband communication for high-data rate implantable neural recording application. The size of the antenna is 480.06 mm3 (27 mm × 14 mm × 1.27 mm). The simulated and measured bandwidths are 7.3% and 7.9% at the first resonant frequency, 5.4% and 6.4% at the second resonant frequency. The specific absorption rate (SAR) distribution induced by the implantable antenna inside a tissue-mimicking solution is evaluated. The performance of the communication link between the implanted antenna and external half-wavelength dual-band dipole is also examined.", "title": "" }, { "docid": "3bf99a4fdd8db8d56edb2a5840f296a7", "text": "BACKGROUND AND OBJECTIVES\nCalcium deposits of the shoulder may persist for many years with resulting pain and impairment of mechanical function. The effects of different treatments vary significantly and do not show consistent and reliable long-term results. Cimetidine decreases calcium levels and improves symptoms in patients with hyperparathyroidism. We evaluated cimetidine as a treatment for chronic calcifying tendinitis of the shoulder in patients who did not respond to conservative treatment.\n\n\nMETHODS\nCimetidine, 200 mg twice daily, was given orally for 3 months in 16 patients who did not respond to more than 6 months of conservative treatment. We recorded subjective, functional, and radiologic findings at 1 day before, at 2 weeks after, and at 2 and 3 months after the start of cimetidine. We also performed a follow-up study (4 to 24 months).\n\n\nRESULTS\nAfter treatment, peak pain score (visual analogue scale: 0 - 100) decreased significantly from 63 +/- 13 to 14 +/- 19 (mean +/- SD, P <.01) and 10 patients (63%) became pain free. Physical impairment was also significantly improved. Calcium deposits disappeared in 9 patients (56%), decreased in 4 patients (25%), and did not change in 3 patients (19%). Follow-up data showed that improvement of symptoms was sustained. No recurrence or enlargement of calcium deposits was observed. Plasma concentrations of calcium and parathyroid hormone did not change significantly.\n\n\nCONCLUSIONS\nOur results indicate that cimetidine is effective in treating chronic calcifying tendinitis of the shoulder; however, the mechanism by which cimetidine improves the symptoms is unknown.", "title": "" }, { "docid": "a551b1034e5378a2d6437a8e298490aa", "text": "The role of increasingly powerful computers in the modeling and simulation domain has resulted in great advancements in the fields of wireless communications, medicine, and space technology to name a few. In The authors of this book start from the fundamental equations that govern low-frequency electromagnetic phenomenon and go through each stage of solving such problems by striking a balance between mathematical rigor and actual implementation in code. The use of MATLAB makes the advanced concepts discussed in the book immediately testable through experiments. The book pays close attention to various applications in an electrical and biological system that are of immediate relevance in today’s world. The use of state-of-the-art human phantom meshes, especially from the Visible Human Project (VHP) of the U.S. National Library of Medicine, makes this text singular in its field. The text is systematic and very well-organized in presenting the various topics on low-frequency electromagnetic. It also should be known that the first part of this text presents the mathematical theory behind low-frequency electromagnetic modeling and follows it with the topic of meshing. The text starts with the basics of meshing and builds it up in an easy-to-read manner with plenty of illustrations.", "title": "" }, { "docid": "ef95fb0c6fae05eb1811928af55c1dbb", "text": "We present the recursive least squares dictionary learning algorithm, RLS-DLA, which can be used for learning overcomplete dictionaries for sparse signal representation. Most DLAs presented earlier, for example ILS-DLA and K-SVD, update the dictionary after a batch of training vectors has been processed, usually using the whole set of training vectors as one batch. The training set is used iteratively to gradually improve the dictionary. The approach in RLS-DLA is a continuous update of the dictionary as each training vector is being processed. The core of the algorithm is compact and can be effectively implemented. The algorithm is derived very much along the same path as the recursive least squares (RLS) algorithm for adaptive filtering. Thus, as in RLS, a forgetting factor ¿ can be introduced and easily implemented in the algorithm. Adjusting ¿ in an appropriate way makes the algorithm less dependent on the initial dictionary and it improves both convergence properties of RLS-DLA as well as the representation ability of the resulting dictionary. Two sets of experiments are done to test different methods for learning dictionaries. The goal of the first set is to explore some basic properties of the algorithm in a simple setup, and for the second set it is the reconstruction of a true underlying dictionary. The first experiment confirms the conjectural properties from the derivation part, while the second demonstrates excellent performance.", "title": "" }, { "docid": "c3ec7e2cbd8d0c6af9d94ac28493b09e", "text": "Relatively high computational cost for Bayesian methods of ten limits their application for big data analysis. In recent years, there have been many atte mpts to improve computational efficiency of Bayesian inference. Here we propose an efficien t and scalable computational technique for a state-of-the-art Markov Chain Monte Carlo ( MCMC) methods, namely, Hamiltonian Monte Carlo (HMC). The key idea is to explore and exploit the regularity in parameter space for the underlying probabilistic model to c onstruct an effective approximation of the collective geometric and statistical proper ties of the whole observed data. To this end, we use shallow neural networks along with efficie nt l arning algorithms. The choice of basis functions (or hidden units in neural network s) and the optimized learning process provides a flexible, scalable and efficient sampling algorithm. Experiments based on simulated and real data show that our approach leads to sub stantially more efficient sampling algorithms compared to existing state-of-the art methods.", "title": "" }, { "docid": "6f6733c35f78b00b771cf7099c953954", "text": "This paper proposes an asymmetrical pulse width modulation (APWM) with frequency tracking control of full bridge series resonant inverter for induction heating application. In this method, APWM is used as power regulation, and phased locked loop (PLL) is used to attain zero-voltage-switching (ZVS) over a wide load range. The complete closed loop control model is obtained using small signal analysis. The validity of the proposed control is verified by simulation results.", "title": "" }, { "docid": "449f984469b40fe10f7a2e0e3a359d1d", "text": "The correlation of phenotypic outcomes with genetic variation and environmental factors is a core pursuit in biology and biomedicine. Numerous challenges impede our progress: patient phenotypes may not match known diseases, candidate variants may be in genes that have not been characterized, model organisms may not recapitulate human or veterinary diseases, filling evolutionary gaps is difficult, and many resources must be queried to find potentially significant genotype-phenotype associations. Non-human organisms have proven instrumental in revealing biological mechanisms. Advanced informatics tools can identify phenotypically relevant disease models in research and diagnostic contexts. Large-scale integration of model organism and clinical research data can provide a breadth of knowledge not available from individual sources and can provide contextualization of data back to these sources. The Monarch Initiative (monarchinitiative.org) is a collaborative, open science effort that aims to semantically integrate genotype-phenotype data from many species and sources in order to support precision medicine, disease modeling, and mechanistic exploration. Our integrated knowledge graph, analytic tools, and web services enable diverse users to explore relationships between phenotypes and genotypes across species.", "title": "" }, { "docid": "2de04c57a9034cf2b4eb7055b4e150f6", "text": "This paper presents an online detection-based two-stage multi-object tracking method in dense visual surveillances scenarios with a single camera. In the local stage, a particle filter with observer selection that could deal with partial object occlusion is used to generate a set of reliable tracklets. In the global stage, the detection responses are collected from a temporal sliding window to deal with ambiguity caused by full object occlusion to generate a set of potential tracklets. The reliable tracklets generated in the local stage and the potential tracklets generated within the temporal sliding window are associated by Hungarian algorithm on a modified pairwise tracklets association cost matrix to get the global optimal association. This method is applied to the pedestrian class and evaluated on two challenging datasets. The experimental results prove the effectiveness of our method.", "title": "" } ]
scidocsrr
18b187af6666031609b07017bfa0c654
Customer relationship management classification using data mining techniques
[ { "docid": "c3525081c0f4eec01069dd4bd5ef12ab", "text": "More than twelve years have elapsed since the first public release of WEKA. In that time, the software has been rewritten entirely from scratch, evolved substantially and now accompanies a text on data mining [35]. These days, WEKA enjoys widespread acceptance in both academia and business, has an active community, and has been downloaded more than 1.4 million times since being placed on Source-Forge in April 2000. This paper provides an introduction to the WEKA workbench, reviews the history of the project, and, in light of the recent 3.6 stable release, briefly discusses what has been added since the last stable version (Weka 3.4) released in 2003.", "title": "" }, { "docid": "4bf5fd6fdb2cb82fa13abdb13653f3ac", "text": "Customer relationship management (CRM) has once again gained prominence amongst academics and practitioners. However, there is a tremendous amount of confusion regarding its domain and meaning. In this paper, the authors explore the conceptual foundations of CRM by examining the literature on relationship marketing and other disciplines that contribute to the knowledge of CRM. A CRM process framework is proposed that builds on other relationship development process models. CRM implementation challenges as well as CRM's potential to become a distinct discipline of marketing are also discussed in this paper. JEL Classification Codes: M31.", "title": "" } ]
[ { "docid": "c1d5df0e2058e3f191a8227fca51a2fb", "text": "We propose in this paper a new approach to train the Generative Adversarial Nets (GANs) with a mixture of generators to overcome the mode collapsing problem. The main intuition is to employ multiple generators, instead of using a single one as in the original GAN. The idea is simple, yet proven to be extremely effective at covering diverse data modes, easily overcoming the mode collapsing problem and delivering state-of-the-art results. A minimax formulation was able to establish among a classifier, a discriminator, and a set of generators in a similar spirit with GAN. Generators create samples that are intended to come from the same distribution as the training data, whilst the discriminator determines whether samples are true data or generated by generators, and the classifier specifies which generator a sample comes from. The distinguishing feature is that internal samples are created from multiple generators, and then one of them will be randomly selected as final output similar to the mechanism of a probabilistic mixture model. We term our method Mixture Generative Adversarial Nets (MGAN). We develop theoretical analysis to prove that, at the equilibrium, the Jensen-Shannon divergence (JSD) between the mixture of generators’ distributions and the empirical data distribution is minimal, whilst the JSD among generators’ distributions is maximal, hence effectively avoiding the mode collapsing problem. By utilizing parameter sharing, our proposed model adds minimal computational cost to the standard GAN, and thus can also efficiently scale to large-scale datasets. We conduct extensive experiments on synthetic 2D data and natural image databases (CIFAR-10, STL-10 and ImageNet) to demonstrate the superior performance of our MGAN in achieving state-of-the-art Inception scores over latest baselines, generating diverse and appealing recognizable objects at different resolutions, and specializing in capturing different types of objects by the generators.", "title": "" }, { "docid": "36cf5e6ffec29f0eede4f369104d00d3", "text": "This meta-analysis is a study of the experimental literature of technology use in postsecondary education from 1990 up to 2010 exclusive of studies of online or distance education previously reviewed by Bernard et al. (2004). It reports the overall weighted average effects of technology use on achievement and attitude outcomes and explores moderator variables in an attempt to explain how technology treatments lead to positive or negative effects. Out of an initial pool of 11,957 study abstracts, 1105 were chosen for analysis, yielding 879 achievement and 181 attitude effect sizes after pre-experimental designs and studies with obvious methodological confounds were removed. The random effects weighted average effect size for achievement was gþ 1⁄4 0.27, k 1⁄4 879, p < .05, and for attitude outcomes it was gþ 1⁄4 0.20, k 1⁄4 181, p < .05. The collection of achievement outcomes was divided into two sub-collections, according to the amount of technology integration in the control condition. These were no technology in the control condition (k 1⁄4 479) and some technology in the control condition (k 1⁄4 400). Random effects multiple meta-regression analysis was run on each sub-collection revealing three significant predictors (subject matter, degree of difference in technology use between the treatment and the control and pedagogical uses of technology). The set of predictors for each sub-collection was both significant and homogeneous. Differences were found among the levels of all three moderators, but particularly in favor of cognitive support applications. There were no significant predictors for attitude outcomes. Crown Copyright 2013 Published by Elsevier Ltd. All rights reserved.", "title": "" }, { "docid": "e28613435d7dbd944a997f2d1fa67598", "text": "Emerging multimedia content including images and texts are always jointly utilized to describe the same semantics. As a result, crossmedia retrieval becomes increasingly important, which is able to retrieve the results of the same semantics with the query but with different media types. In this paper, we propose a novel heterogeneous similarity measure with nearest neighbors (HSNN). Unlike traditional similarity measures which are limited in homogeneous feature space, HSNN could compute the similarity between media objects with different media types. The heterogeneous similarity is obtained by computing the probability for two media objects belonging to the same semantic category. The probability is achieved by analyzing the homogeneous nearest neighbors of each media object. HSNN is flexible so that any traditional similarity measure could be incorporated, which is further regarded as the weak ranker. An effective ranking model is learned from multiple weak rankers through AdaRank for cross-media retrieval. Experiments on the wikipedia dataset show the effectiveness of the proposed approach, compared with stateof-the-art methods. The cross-media retrieval also shows to outperform image retrieval systems on a unimedia retrieval task.", "title": "" }, { "docid": "b617762a18685137a1e18838b2e46f11", "text": "Information Extraction (IE) is a technology for localizing and classifying pieces of relevant information in unstructured natural language texts and detecting relevant relations among them. This thesis deals with one of the central tasks of IE, i.e., relation extraction. The goal is to provide a general framework that automatically learns mappings between linguistic analyses and target semantic relations, with minimal human intervention. Furthermore, this framework is supposed to support the adaptation to new application domains and new relations with various complexities. The central result is a new approach to relation extraction which is based on a minimally supervised method for automatically learning extraction grammars from a large collection of parsed texts, initialized by some instances of the target relation, called semantic seed. Due to the semantic seed approach, the framework can accommodate new relation types and domains with minimal effort. It supports relations of different arity as well as their projections. Furthermore, this framework is general enough to employ any linguistic analysis tools that provide the required type and depth of analysis. The adaptability and the scalability of the framework is facilitated by the DARE rule representation model which is recursive and compositional. In comparison to other IE rule representation models, e.g., Stevenson and Greenwood (2006), the DARE rule representation model is expressive enough to achieve good coverage of linguistic constructions for finding mentions of the target relation. The powerful DARE rules are constructed via a bottom-up and compositional rule discovery strategy, driven by the semantic seed. The control of the quality of newly acquired knowledge during the bootstrapping process is realized through a ranking and filtering strategy, taking two aspects into account: the domain relevance and the trustworthiness of the origin. A spe-", "title": "" }, { "docid": "6fe39cbe3811ac92527ba60620b39170", "text": "Providing accurate information about human's state, activity is one of the most important elements in Ubiquitous Computing. Various applications can be enabled if one's state, activity can be recognized. Due to the low deployment cost, non-intrusive sensing nature, Wi-Fi based activity recognition has become a promising, emerging research area. In this paper, we survey the state-of-the-art of the area from four aspects ranging from historical overview, theories, models, key techniques to applications. In addition to the summary about the principles, achievements of existing work, we also highlight some open issues, research directions in this emerging area.", "title": "" }, { "docid": "7111c220a28d7a6fab32d9ecc914c5aa", "text": "Songbirds are one of the best-studied examples of vocal learners. Learning of both human speech and birdsong depends on hearing. Once learned, adult song in many species remains unchanging, suggesting a reduced influence of sensory experience. Recent studies have revealed, however, that adult song is not always stable, extending our understanding of the mechanisms involved in song maintenance, and their similarity to those active during song learning. Here we review some of the processes that contribute to song learning and production, with an emphasis on the role of auditory feedback. We then consider some of the possible neural substrates involved in these processes, particularly basal ganglia circuitry. Although a thorough treatment of human speech is beyond the scope of this article, we point out similarities between speech and song learning, and ways in which studies of these disparate behaviours complement each other in developing an understanding of general principles that contribute to learning and maintenance of vocal behaviour.", "title": "" }, { "docid": "f44bfa0a366fb50a571e6df9f4c3f91d", "text": "BACKGROUND\nIn silico predictive models have proved to be valuable for the optimisation of compound potency, selectivity and safety profiles in the drug discovery process.\n\n\nRESULTS\ncamb is an R package that provides an environment for the rapid generation of quantitative Structure-Property and Structure-Activity models for small molecules (including QSAR, QSPR, QSAM, PCM) and is aimed at both advanced and beginner R users. camb's capabilities include the standardisation of chemical structure representation, computation of 905 one-dimensional and 14 fingerprint type descriptors for small molecules, 8 types of amino acid descriptors, 13 whole protein sequence descriptors, filtering methods for feature selection, generation of predictive models (using an interface to the R package caret), as well as techniques to create model ensembles using techniques from the R package caretEnsemble). Results can be visualised through high-quality, customisable plots (R package ggplot2).\n\n\nCONCLUSIONS\nOverall, camb constitutes an open-source framework to perform the following steps: (1) compound standardisation, (2) molecular and protein descriptor calculation, (3) descriptor pre-processing and model training, visualisation and validation, and (4) bioactivity/property prediction for new molecules. camb aims to speed model generation, in order to provide reproducibility and tests of robustness. QSPR and proteochemometric case studies are included which demonstrate camb's application.Graphical abstractFrom compounds and data to models: a complete model building workflow in one package.", "title": "" }, { "docid": "2bf1766eccd14d2da3581018ff621f09", "text": "We propose a novel segmentation approach for introducing shape priors in the geometric active contour framework. Following the work of Leventon, we propose to revisit the use of linear principal component analysis (PCA) to introduce prior knowledge about shapes in a more robust manner. Our contribution in this paper is twofold. First, we demonstrate that building a space of familiar shapes by applying PCA on binary images (instead of signed distance functions) enables one to constrain the contour evolution in a way that is more faithful to the elements of a training set. Secondly, we present a novel region-based segmentation framework, able to separate regions of different intensities in an image. Shape knowledge and image information are encoded into two energy functionals entirely described in terms of shapes. This consistent description allows for the simultaneous encoding of multiple types of shapes and leads to promising segmentation results. In particular, our shape-driven segmentation technique offers a convincing level of robustness with respect to noise, clutter, partial occlusions, and blurring.", "title": "" }, { "docid": "6c71078281d0ff7e4829624af5124bfb", "text": "The modeling of artificial, human-level creativity is becoming more and more achievable. In recent years, neural networks have been successfully applied to different tasks such as image and music generation, demonstrating their great potential in realizing computational creativity. The fuzzy definition of creativity combined with varying goals of the evaluated generative systems, however, makes subjective evaluation seem to be the only viable methodology of choice. We review the evaluation of generative music systems and discuss the inherent challenges of their evaluation. Although subjective evaluation should always be the ultimate choice for the evaluation of creative results, researchers unfamiliar with rigorous subjective experiment design and without the necessary resources for the execution of a large-scale experiment face challenges in terms of reliability, validity, and replicability of the results. In numerous studies, this leads to the report of insignificant and possibly irrelevant results and the lack of comparability with similar and previous generative systems. Therefore, we propose a set of simple musically informed objective metrics enabling an objective and reproducible way of evaluating and comparing the output of music generative systems. We demonstrate the usefulness of the proposed metrics with several experiments on real-world data.", "title": "" }, { "docid": "973426438175226bb46c39cc0a390d97", "text": "This paper proposes a methodology for the creation of specialized data sets for Textual Entailment, made of monothematic Text-Hypothesis pairs (i.e. pairs in which only one linguistic phenomenon relevant to the entailment relation is highlighted and isolated). The annotation procedure assumes that humans have knowledge about the linguistic phenomena relevant to inference, and a classification of such phenomena both into fine grained and macro categories is suggested. We experimented with the proposed methodology over a sample of pairs taken from the RTE-5 data set, and investigated critical issues arising when entailment, contradiction or unknown pairs are considered. The result is a new resource, which can be profitably used both to advance the comprehension of the linguistic phenomena relevant to entailment judgments and to make a first step towards the creation of large-scale specialized data sets.", "title": "" }, { "docid": "9e31cedf404c989d15a2f06c5800f207", "text": "For automatic driving, vehicles must be able to recognize their environment and take control of the vehicle. The vehicle must perceive relevant objects, which includes other traffic participants as well as infrastructure information, assess the situation and generate appropriate actions. This work is a first step of integrating previous works on environment perception and situation analysis toward automatic driving strategies. We present a method for automatic cruise control of vehicles in urban environments. The longitudinal velocity is influenced by the speed limit, the curvature of the lane, the state of the next traffic light and the most relevant target on the current lane. The necessary acceleration is computed in respect to the information which is estimated by an instrumented vehicle.", "title": "" }, { "docid": "4d52865efa6c359d68125c7013647c86", "text": "In recent years, we have witnessed an unprecedented proliferation of large document collections. This development has spawned the need for appropriate analytical means. In particular, to seize the thematic composition of large document collections, researchers increasingly draw on quantitative topic models. Among their most prominent representatives is the Latent Dirichlet Allocation (LDA). Yet, these models have significant drawbacks, e.g. the generated topics lack context and thus meaningfulness. Prior research has rarely addressed this limitation through the lens of mixed-methods research. We position our paper towards this gap by proposing a structured mixedmethods approach to the meaningful analysis of large document collections. Particularly, we draw on qualitative coding and quantitative hierarchical clustering to validate and enhance topic models through re-contextualization. To illustrate the proposed approach, we conduct a case study of the thematic composition of the AIS Senior Scholars' Basket of Journals.", "title": "" }, { "docid": "a62aae5ac55e884d6e1e3ef0282657cc", "text": "Nowadays, the remote Home Automation turns out to be more and more significant and appealing. It improves the value of our lives by automating various electrical appliances or instruments. This paper describes GSM (Global System Messaging) based secured device control system using App Inventor for Android mobile phones. App Inventor is a latest visual programming platform for developing mobile applications for Android-based smart phones. The Android Mobile Phone Platform becomes more and more popular among software developers, because of its powerful capabilities and open architecture. It is a fantastic platform for the real world interface control, as it offers an ample of resources and already incorporates a lot of sensors. No need to write programming codes to develop apps in the App Inventor, instead it provides visual design interface as the way the apps looks and use blocks of interlocking components to control the app’s behaviour. The App Inventor aims to make programming enjoyable and accessible to", "title": "" }, { "docid": "506d3e23383de6d3a37471798770ed70", "text": "One of the most controversial issues in uncertainty modelling and information sciences is the relationship between probability theory and fuzzy sets. This paper is meant to survey the literature pertaining to this debate, and to try to overcome misunderstandings and to supply access to many basic references that have addressed the \"probability versus fuzzy set\" challenge. This problem has not a single facet, as will be claimed here. Moreover it seems that a lot of controversies might have been avoided if protagonists had been patient enough to build a common language and to share their scientific backgrounds. The main points made here are as follows. i) Fuzzy set theory is a consistent body of mathematical tools. ii) Although fuzzy sets and probability measures are distinct, several bridges relating them have been proposed that should reconcile opposite points of view ; especially possibility theory stands at the cross-roads between fuzzy sets and probability theory. iii) Mathematical objects that behave like fuzzy sets exist in probability theory. It does not mean that fuzziness is reducible to randomness. Indeed iv) there are ways of approaching fuzzy sets and possibility theory that owe nothing to probability theory. Interpretations of probability theory are multiple especially frequentist versus subjectivist views (Fine [31]) ; several interpretations of fuzzy sets also exist. Some interpretations of fuzzy sets are in agreement with probability calculus and some are not. The paper is structured as follows : first we address some classical misunderstandings between fuzzy sets and probabilities. They must be solved before any discussion can take place. Then we consider probabilistic interpretations of membership functions, that may help in membership function assessment. We also point out nonprobabilistic interpretations of fuzzy sets. The next section examines the literature on possibility-probability transformations and tries to clarify some lurking controversies on that topic. In conclusion, we briefly mention several subfields of fuzzy set research where fuzzy sets and probability are conjointly used.", "title": "" }, { "docid": "eec7a9a6859e641c3cc0ade73583ef5c", "text": "We propose an Apache Spark-based scale-up server architecture using Docker container-based partitioning method to improve performance scalability. The performance scalability problem of Apache Spark-based scale-up servers is due to garbage collection(GC) and remote memory access overheads when the servers are equipped with significant number of cores and Non-Uniform Memory Access(NUMA). The proposed method minimizes the problems using Docker container-based architecture effectively partitioning the original scale-up server into small logical servers. Our evaluation study based on benchmark programs revealed that the partitioning method showed performance improvement by ranging from 1.1x through 1.7x on a 120 core scale-up system. Our proof-of-concept scale-up server architecture provides the basis towards complete and practical design of partitioning-based scale-up servers showing performance scalability.", "title": "" }, { "docid": "ce463006a11477c653c15eb53f673837", "text": "This paper presents a meaning-based statistical math word problem (MWP) solver with understanding, reasoning and explanation. It comprises a web user interface and pipelined modules for analysing the text, transforming both body and question parts into their logic forms, and then performing inference on them. The associated context of each quantity is represented with proposed role-tags (e.g., nsubj, verb, etc.), which provides the flexibility for annotating the extracted math quantity with its associated syntactic and semantic information (which specifies the physical meaning of that quantity). Those role-tags are then used to identify the desired operands and filter out irrelevant quantities (so that the answer can be obtained precisely). Since the physical meaning of each quantity is explicitly represented with those role-tags and used in the inference process, the proposed approach could explain how the answer is obtained in a human comprehensible way.", "title": "" }, { "docid": "325003e43d73d68a851a8c3fa6681f94", "text": "This tutorial is aimed at introducing some basic ideas of stochastic programming. The intended audience of the tutorial is optimization practitioners and researchers who wish to acquaint themselves with the fundamental issues that arise when modeling optimization problems as stochastic programs. The emphasis of the paper is on motivation and intuition rather than technical completeness (although we could not avoid giving some technical details). Since it is not intended to be a historical overview of the subject, relevant references are given in the “Notes” section at the end of the paper, rather than in the text. Stochastic programming is an approach for modeling optimization problems that involve uncertainty. Whereas deterministic optimization problems are formulated with known parameters, real world problems almost invariably include parameters which are unknown at the time a decision should be made. When the parameters are uncertain, but assumed to lie in some given set of possible values, one might seek a solution that is feasible for all possible parameter choices and optimizes a given objective function. Such an approach might make sense for example when designing a least-weight bridge with steel having a tensile strength that is known only to within some tolerance. Stochastic programming models are similar in style but try to take advantage of the fact that probability distributions governing the data are known or can be estimated. Often these models apply to settings in which decisions are made repeatedly in essentially the same circumstances, and the objective is to come up with a decision that will perform well on average. An example would be designing truck routes for daily milk delivery to customers with random demand. Here probability distributions (e.g., of demand) could be estimated from data that have been collected over time. The goal is to find some policy that is feasible for all (or almost all) the possible parameter realizations and optimizes the expectation of some function of the decisions and the random variables.", "title": "" }, { "docid": "a6bc752bd6a4fc070fa01a5322fb30a1", "text": "The formulation of a generalized area-based confusion matrix for exploring the accuracy of area estimates is presented. The generalized confusion matrix is appropriate for both traditional classiŽ cation algorithms and sub-pixel area estimation models. An error matrix, derived from the generalized confusion matrix, allows the accuracy of maps generated using area estimation models to be assessed quantitatively and compared to the accuracies obtained from traditional classiŽ cation techniques. The application of this approach is demonstrated for an area estimation model applied to Landsat data of an urban area of the United Kingdom.", "title": "" }, { "docid": "391fb9de39cb2d0635f2329362db846e", "text": "In recent years, there has been an explosion of interest in mining time series databases. As with most computer science problems, representation of the data is the key to efficient and effective solutions. One of the most commonly used representations is piecewise linear approximation. This representation has been used by various researchers to support clustering, classification, indexing and association rule mining of time series data. A variety of algorithms have been proposed to obtain this representation, with several algorithms having been independently rediscovered several times. In this paper, we undertake the first extensive review and empirical comparison of all proposed techniques. We show that all these algorithms have fatal flaws from a data mining perspective. We introduce a novel algorithm that we empirically show to be superior to all others in the literature.", "title": "" }, { "docid": "e78c1fed6f3c09642a8c2c592545bea0", "text": "We present a general framework and algorithmic approach for incremental approximation algorithms. The framework handles cardinality constrained minimization problems, such as the k-median and k-MST problems. Given some notion of ordering on solutions of different cardinalities k, we give solutions for all values of k such that the solutions respect the ordering and such that for any k, our solution is close in value to the value of an optimal solution of cardinality k. For instance, for the k-median problem, the notion of ordering is set inclusion and our incremental algorithm produces solutions such that any k and k', k < k', our solution of size k is a subset of our solution of size k'. We show that our framework applies to this incremental version of the k-median problem (introduced by Mettu and Plaxton [30]), and incremental versions of the k-MST problem, k-vertex cover problem, k-set cover problem, as well as the uncapacitated facility location problem (which is not cardinality-constrained). For these problems we either get new incremental algorithms, or improvements over what was previously known. We also show that the framework applies to hierarchical clustering problems. In particular, we give an improved algorithm for a hierarchical version of the k-median problem introduced by Plaxton [31].", "title": "" } ]
scidocsrr
e0cd98bb8a433c5a1cc52331c7cf059a
Focused Depth-first Proof Number Search using Convolutional Neural Networks for the Game of Hex
[ { "docid": "6836e08a29fa9aea26284a0ff799019a", "text": "Mastering the game of Go has remained a longstanding challenge to the field of AI. Modern computer Go programs rely on processing millions of possible future positions to play well, but intuitively a stronger and more ‘humanlike’ way to play the game would be to rely on pattern recognition rather than brute force computation. Following this sentiment, we train deep convolutional neural networks to play Go by training them to predict the moves made by expert Go players. To solve this problem we introduce a number of novel techniques, including a method of tying weights in the network to ‘hard code’ symmetries that are expected to exist in the target function, and demonstrate in an ablation study they considerably improve performance. Our final networks are able to achieve move prediction accuracies of 41.1% and 44.4% on two different Go datasets, surpassing previous state of the art on this task by significant margins. Additionally, while previous move prediction systems have not yielded strong Go playing programs, we show that the networks trained in this work acquired high levels of skill. Our convolutional neural networks can consistently defeat the well known Go program GNU Go and win some games against state of the art Go playing program Fuego while using a fraction of the play time.", "title": "" } ]
[ { "docid": "fd392f5198794df04c70da6bc7fe2f0d", "text": "Performance tuning in modern database systems requires a lot of expertise, is very time consuming and often misdirected. Tuning attempts often lack a methodology that has a holistic view of the database. The absence of historical diagnostic information to investigate performance issues at first occurrence exacerbates the whole tuning process often requiring that problems be reproduced before they can be correctly diagnosed. In this paper we describe how Oracle overcomes these challenges and provides a way to perform automatic performance diagnosis and tuning. We define a new measure called ‘Database Time’ that provides a common currency to gauge the performance impact of any resource or activity in the database. We explain how the Automatic Database Diagnostic Monitor (ADDM) automatically diagnoses the bottlenecks affecting the total database throughput and provides actionable recommendations to alleviate them. We also describe the types of performance measurements that are required to perform an ADDM analysis. Finally we show how ADDM plays a central role within Oracle 10g’s manageability framework to self-manage a database and provide a comprehensive tuning solution.", "title": "" }, { "docid": "b35518ee64e8751d1bd995add8a20394", "text": "Does the structure of an adult human brain alter in response to environmental demands? Here we use whole-brain magnetic-resonance imaging to visualize learning-induced plasticity in the brains of volunteers who have learned to juggle. We find that these individuals show a transient and selective structural change in brain areas that are associated with the processing and storage of complex visual motion. This discovery of a stimulus-dependent alteration in the brain's macroscopic structure contradicts the traditionally held view that cortical plasticity is associated with functional rather than anatomical changes.", "title": "" }, { "docid": "d825c2f09996993b668a355398e25b0d", "text": "A novel ultrahigh frequency (UHF) near-field radio-frequency identification (RFID) reader antenna based on the complementary split ring resonator (CSRR) elements is presented in this communication. The antenna consists of a power divider and two arms. The two arms are terminated with two 50-<inline-formula> <tex-math notation=\"LaTeX\">$\\Omega $ </tex-math></inline-formula> terminations. First arm is forward arm, which is a microstrip transmission line. The second arm is backward arm, which is loaded with CSRR elements, instigating backward wave propagation. The oppositely directed currents are generated by this configuration to produce strong and uniform magnetic field over the antenna plane for UHF near-field RFID operations. The proposed antenna operates from 0.76 to 0.88 GHz, and a total impedance bandwidth of 120 MHz is obtained. A near-field read range of 100 mm and an interrogation area of 220 mm <inline-formula> <tex-math notation=\"LaTeX\">$\\times180$ </tex-math></inline-formula> mm over the antenna plane at a height of 50 mm is reported for this antenna.", "title": "" }, { "docid": "6327964ae4eb3410a1772edee4ff358d", "text": "We introduce a method for the automatic extraction of musical structures in popular music. The proposed algorithm uses non-negative matrix factorization to segment regions of acoustically similar frames in a self-similarity matrix of the audio data. We show that over the dimensions of the NMF decomposition, structural parts can easily be modeled. Based on that observation, we introduce a clustering algorithm that can explain the structure of the whole music piece. The preliminary evaluation we report in the the paper shows very encouraging results.", "title": "" }, { "docid": "67e599e65a963f54356b78ce436096c2", "text": "This paper establishes the existence of observable footprints that reveal the causal dispositions of the object categories appearing in collections of images. We achieve this goal in two steps. First, we take a learning approach to observational causal discovery, and build a classifier that achieves state-of-the-art performance on finding the causal direction between pairs of random variables, given samples from their joint distribution. Second, we use our causal direction classifier to effectively distinguish between features of objects and features of their contexts in collections of static images. Our experiments demonstrate the existence of a relation between the direction of causality and the difference between objects and their contexts, and by the same token, the existence of observable signals that reveal the causal dispositions of objects.", "title": "" }, { "docid": "9077dede1c2c4bc4b696a93e01c84f52", "text": "Reliable continuous core temperature measurement is of major importance for monitoring patients. The zero heat flux method (ZHF) can potentially fulfil the requirements of non-invasiveness, reliability and short delay time that current measurement methods lack. The purpose of this study was to determine the performance of a new ZHF device on the forehead regarding these issues. Seven healthy subjects performed a protocol of 10 min rest, 30 min submaximal exercise (average temperature increase about 1.5 °C) and 10 min passive recovery in ambient conditions of 35 °C and 50% relative humidity. ZHF temperature (T(zhf)) was compared to oesophageal (T(es)) and rectal (T(re)) temperature. ΔT(zhf)-T(es) had an average bias ± standard deviation of 0.17 ± 0.19 °C in rest, -0.05 ± 0.18 °C during exercise and -0.01 ± 0.20 °C during recovery, the latter two being not significant. The 95% limits of agreement ranged from -0.40 to 0.40 °C and T(zhf) had hardly any delay compared to T(es). T(re) showed a substantial delay and deviation from T(es) when core temperature changed rapidly. Results indicate that the studied ZHF sensor tracks T(es) very well in hot and stable ambient conditions and may be a promising alternative for reliable non-invasive continuous core temperature measurement in hospital.", "title": "" }, { "docid": "7909114f9fb2d92f4dc5899e86c80644", "text": "Rehabilitation is an important process to restore muscle strength and joint's range of motion. This paper proposes a biomechatronic design of a robotic arm that is able to mimic the natural movement of the human shoulder, elbow and wrist joint. In a preliminary experiment, a subject was asked to perform four different arm movements using the developed robotic arm for a period of two weeks. The experimental results were recorded and can be plotted into graphical results using Matlab. Based on the results, the robotic arm shows encouraging effect by increasing the performance of rehabilitation process. This is proven when the result in degree value are accurate when being compared with the flexion of both shoulder and elbow joints. This project can give advantages on research if the input parameter needed in the flexion of elbow and wrist.", "title": "" }, { "docid": "312c601e5a9d626a96d4d3b2d008c3b2", "text": "We present a strategy for mining frequent item sets from terabyte-scale data sets on cluster systems. The algorithm embraces the holistic notion of architecture-conscious datamining, taking into account the capabilities of the processor, the memory hierarchy and the available network interconnects. Optimizations have been designed for lowering communication costs using compressed data structures and a succinct encoding. Optimizations for improving cache, memory and I/O utilization using pruningand tiling techniques, and smart data placement strategies are also employed. We leverage the extended memory spaceand computational resources of a distributed message-passing clusterto design a scalable solution, where each node can extend its metastructures beyond main memory by leveraging 64-bit architecture support. Our solution strategy is presented in the context of FPGrowth, a well-studied and rather efficient frequent pattern mining algorithm. Results demonstrate that the proposed strategy result in near-linearscaleup on up to 48 nodes.", "title": "" }, { "docid": "13be873fdb53f25d81e35c0ee245fc40", "text": "Deep neural networks are learning models with a very high capacity and therefore prone to over- fitting. Many regularization techniques such as Dropout, DropConnect, and weight decay all attempt to solve the problem of over-fitting by reducing the capacity of their respective models (Srivastava et al., 2014), (Wan et al., 2013), (Krogh & Hertz, 1992). In this paper we introduce a new form of regularization that guides the learning problem in a way that reduces over- fitting without sacrificing the capacity of the model. The mistakes that models make in early stages of training carry information about the learning problem. By adjusting the labels of the current epoch of training through a weighted average of the real labels, and an exponential average of the past soft-targets we achieved a regularization scheme as powerful as Dropout without necessarily reducing the capacity of the model, and simplified the complexity of the learning problem. SoftTarget regularization proved to be an effective tool in various neural network architectures.", "title": "" }, { "docid": "3f5dc865bb0db60d3bbdf13777e10eb9", "text": "It has been proposed that pre-exercise static stretching may reduce muscle force and power. Recent systematic and meta-analytical reviews have proposed a threshold regarding the effect of short (<45 seconds) and moderate (≥60 seconds) stretching durations on subsequent performance in a multi-joint task (e.g., jump performance), although its effect on power output remains less clear. Furthermore, no single experimental study has explicitly compared the effect of short (e.g., 30 seconds) and moderate (60 seconds) durations of continuous static stretching on multi-joint performance. Therefore, the aim of the present study was determine the effect of acute short- and moderate-duration continuous stretching interventions on vertical jump performance and power output. Sixteen physically active men (21.0 ± 1.9 years; 1.7 ± 0.1 m; 78.4 ± 12.1 kg) volunteered for the study. After familiarization, subjects attended the laboratory for 3 testing sessions. In the nonstretching (NS) condition, subjects performed a countermovement jump (CMJ) test without a preceding stretching bout. In the other 2 conditions, subjects performed 30-second (30SS; 4 minutes) or 60-second (60SS; 8 minutes) static stretching bouts in calf muscles, hamstrings, gluteus maximus, and quadriceps, respectively, followed by the CMJ test. Results were compared by repeated-measures analysis of variance. In comparison with NS, 60SS resulted in a lower CMJ height (-3.4%, p ≤ 0.05) and average (-2.7%, p ≤ 0.05) and peak power output (-2.0%, p ≤ 0.05), but no difference was observed between 30SS and the other conditions (p > 0.05). These data suggest a dose-dependent effect of stretching on muscular performance, which is in accordance with previous studies. The present results suggest a threshold of continuous static stretching in which muscular power output in a multi-joint task may be impaired immediately following moderate-duration (60 seconds; 8 minutes) static stretching while short-duration (30 seconds; 4 minutes) stretching has a negligible influence.", "title": "" }, { "docid": "274e41b6d37a7d165efc8d986660f3a2", "text": "Web 2.0 and online social networking websites heavily affect today most of the online activities and their effect on tourism is obviously rather important. This paper aims at verifying the impact that online social networks (OSN) have on the popularity of tourism websites. Two OSNs have been considered: Facebook and Twitter. The pattern of visits to a sample of Italian tourism websites was analysed and the relationship between the total visits and those having the OSNs as referrals were measured. The analysis shows a clear correlation and confirms the starting hypothesis. Consequences and implications of these outcomes are discussed.", "title": "" }, { "docid": "629c6c7ca3db9e7cad2572c319ec52f0", "text": "Recent research on pornography suggests that perception of addiction predicts negative outcomes above and beyond pornography use. Research has also suggested that religious individuals are more likely to perceive themselves to be addicted to pornography, regardless of how often they are actually using pornography. Using a sample of 686 unmarried adults, this study reconciles and expands on previous research by testing perceived addiction to pornography as a mediator between religiosity and relationship anxiety surrounding pornography. Results revealed that pornography use and religiosity were weakly associated with higher relationship anxiety surrounding pornography use, whereas perception of pornography addiction was highly associated with relationship anxiety surrounding pornography use. However, when perception of pornography addiction was inserted as a mediator in a structural equation model, pornography use had a small indirect effect on relationship anxiety surrounding pornography use, and perception of pornography addiction partially mediated the association between religiosity and relationship anxiety surrounding pornography use. By understanding how pornography use, religiosity, and perceived pornography addiction connect to relationship anxiety surrounding pornography use in the early relationship formation stages, we hope to improve the chances of couples successfully addressing the subject of pornography and mitigate difficulties in romantic relationships.", "title": "" }, { "docid": "c9e9807acbc69afd9f6a67d9bda0d535", "text": "Domain adaptation is one of the most challenging tasks of modern data analytics. If the adaptation is done correctly, models built on a specific data representation become more robust when confronted to data depicting the same classes, but described by another observation system. Among the many strategies proposed, finding domain-invariant representations has shown excellent properties, in particular since it allows to train a unique classifier effective in all domains. In this paper, we propose a regularized unsupervised optimal transportation model to perform the alignment of the representations in the source and target domains. We learn a transportation plan matching both PDFs, which constrains labeled samples of the same class in the source domain to remain close during transport. This way, we exploit at the same time the labeled samples in the source and the distributions observed in both domains. Experiments on toy and challenging real visual adaptation examples show the interest of the method, that consistently outperforms state of the art approaches. In addition, numerical experiments show that our approach leads to better performances on domain invariant deep learning features and can be easily adapted to the semi-supervised case where few labeled samples are available in the target domain.", "title": "" }, { "docid": "d16114259da9edf0022e2a3774c5acf0", "text": "The multivesicular body (MVB) pathway is responsible for both the biosynthetic delivery of lysosomal hydrolases and the downregulation of numerous activated cell surface receptors which are degraded in the lysosome. We demonstrate that ubiquitination serves as a signal for sorting into the MVB pathway. In addition, we characterize a 350 kDa complex, ESCRT-I (composed of Vps23, Vps28, and Vps37), that recognizes ubiquitinated MVB cargo and whose function is required for sorting into MVB vesicles. This recognition event depends on a conserved UBC-like domain in Vps23. We propose that ESCRT-I represents a conserved component of the endosomal sorting machinery that functions in both yeast and mammalian cells to couple ubiquitin modification to protein sorting and receptor downregulation in the MVB pathway.", "title": "" }, { "docid": "e3f5fa38361ed12c40d6435cad835cb8", "text": "BACKGROUND\nStudies suggest that where people live, play, and work can influence health and well-being. However, the dearth of neighborhood data, especially data that is timely and consistent across geographies, hinders understanding of the effects of neighborhoods on health. Social media data represents a possible new data resource for neighborhood research.\n\n\nOBJECTIVE\nThe aim of this study was to build, from geotagged Twitter data, a national neighborhood database with area-level indicators of well-being and health behaviors.\n\n\nMETHODS\nWe utilized Twitter's streaming application programming interface to continuously collect a random 1% subset of publicly available geolocated tweets for 1 year (April 2015 to March 2016). We collected 80 million geotagged tweets from 603,363 unique Twitter users across the contiguous United States. We validated our machine learning algorithms for constructing indicators of happiness, food, and physical activity by comparing predicted values to those generated by human labelers. Geotagged tweets were spatially mapped to the 2010 census tract and zip code areas they fall within, which enabled further assessment of the associations between Twitter-derived neighborhood variables and neighborhood demographic, economic, business, and health characteristics.\n\n\nRESULTS\nMachine labeled and manually labeled tweets had a high level of accuracy: 78% for happiness, 83% for food, and 85% for physical activity for dichotomized labels with the F scores 0.54, 0.86, and 0.90, respectively. About 20% of tweets were classified as happy. Relatively few terms (less than 25) were necessary to characterize the majority of tweets on food and physical activity. Data from over 70,000 census tracts from the United States suggest that census tract factors like percentage African American and economic disadvantage were associated with lower census tract happiness. Urbanicity was related to higher frequency of fast food tweets. Greater numbers of fast food restaurants predicted higher frequency of fast food mentions. Surprisingly, fitness centers and nature parks were only modestly associated with higher frequency of physical activity tweets. Greater state-level happiness, positivity toward physical activity, and positivity toward healthy foods, assessed via tweets, were associated with lower all-cause mortality and prevalence of chronic conditions such as obesity and diabetes and lower physical inactivity and smoking, controlling for state median income, median age, and percentage white non-Hispanic.\n\n\nCONCLUSIONS\nMachine learning algorithms can be built with relatively high accuracy to characterize sentiment, food, and physical activity mentions on social media. Such data can be utilized to construct neighborhood indicators consistently and cost effectively. Access to neighborhood data, in turn, can be leveraged to better understand neighborhood effects and address social determinants of health. We found that neighborhoods with social and economic disadvantage, high urbanicity, and more fast food restaurants may exhibit lower happiness and fewer healthy behaviors.", "title": "" }, { "docid": "cd9552d9891337f7e58b3e7e36dfab54", "text": "Multi-variant program execution is an application of n-version programming, in which several slightly different instances of the same program are executed in lockstep on a multiprocessor. These variants are created in such a way that they behave identically under \"normal\" operation and diverge when \"out of specification\" events occur, which may be indicative of attacks. This paper assess the effectiveness of different code variation techniques to address different classes of vulnerabilities. In choosing a variant or combination of variants, security demands need to be balanced against runtime overhead. Our study indicates that a good combination of variations when running two variants is to choose one of instruction set randomization, system call number randomization, and register randomization, and use that together with library entry point randomization. Running more variants simultaneously makes it exponentially more difficult to take over the system.", "title": "" }, { "docid": "6e9064fa15335f3f9013533b8770d297", "text": "The last decade has witnessed a renaissance of empirical and psychological approaches to art study, especially regarding cognitive models of art processing experience. This new emphasis on modeling has often become the basis for our theoretical understanding of human interaction with art. Models also often define areas of focus and hypotheses for new empirical research, and are increasingly important for connecting psychological theory to discussions of the brain. However, models are often made by different researchers, with quite different emphases or visual styles. Inputs and psychological outcomes may be differently considered, or can be under-reported with regards to key functional components. Thus, we may lose the major theoretical improvements and ability for comparison that can be had with models. To begin addressing this, this paper presents a theoretical assessment, comparison, and new articulation of a selection of key contemporary cognitive or information-processing-based approaches detailing the mechanisms underlying the viewing of art. We review six major models in contemporary psychological aesthetics. We in turn present redesigns of these models using a unified visual form, in some cases making additions or creating new models where none had previously existed. We also frame these approaches in respect to their targeted outputs (e.g., emotion, appraisal, physiological reaction) and their strengths within a more general framework of early, intermediate, and later processing stages. This is used as a basis for general comparison and discussion of implications and future directions for modeling, and for theoretically understanding our engagement with visual art.", "title": "" }, { "docid": "3cd7523afa1b648516b86c5221a630e7", "text": "MOTIVATION\nAdvances in Next-Generation Sequencing technologies and sample preparation recently enabled generation of high-quality jumping libraries that have a potential to significantly improve short read assemblies. However, assembly algorithms have to catch up with experimental innovations to benefit from them and to produce high-quality assemblies.\n\n\nRESULTS\nWe present a new algorithm that extends recently described exSPAnder universal repeat resolution approach to enable its applications to several challenging data types, including jumping libraries generated by the recently developed Illumina Nextera Mate Pair protocol. We demonstrate that, with these improvements, bacterial genomes often can be assembled in a few contigs using only a single Nextera Mate Pair library of short reads.\n\n\nAVAILABILITY AND IMPLEMENTATION\nDescribed algorithms are implemented in C++ as a part of SPAdes genome assembler, which is freely available at bioinf.spbau.ru/en/spades.\n\n\nCONTACT\nap@bioinf.spbau.ru\n\n\nSUPPLEMENTARY INFORMATION\nSupplementary data are available at Bioinformatics online.", "title": "" }, { "docid": "f32213171b0509e23770333ba4874cb5", "text": "14 Regulatory, safety, and environmental issues have prompted the development of aqueous 15 enzymatic extraction (AEE) for extracting components from oil-bearing materials. The 16 emulsion resulting from AEE requires de-emulsification to separate the oil; when enzymes 17 are used for this purpose, the method is known as aqueous enzymatic emulsion de18 emulsification (AEED). In general, enzyme assisted oil extraction is known to yield oil 19 having highly favourable characteristics. This review covers technological aspects of 20 enzyme assisted oil extraction, and explores the quality characteristics of the oils obtained, 21 focusing particularly on recent efforts undertaken to improve process economics by 22 recovering and reusing enzymes. 23 24", "title": "" }, { "docid": "f331337a19cff2cf29e89a87d7ab234f", "text": "This paper presents an investigation of lexical chaining (Morris and Hirst, 1991) for measuring discourse coherence quality in test-taker essays. We hypothesize that attributes of lexical chains, as well as interactions between lexical chains and explicit discourse elements, can be harnessed for representing coherence. Our experiments reveal that performance achieved by our new lexical chain features is better than that of previous discourse features used for this task, and that the best system performance is achieved when combining lexical chaining features with complementary discourse features, such as those provided by a discourse parser based on rhetorical structure theory, and features that reflect errors in grammar, word usage, and mechanics.", "title": "" } ]
scidocsrr
e2a6440dfb55b8643d8baa4aa813ce33
Online extremism and the communities that sustain it: Detecting the ISIS supporting community on Twitter
[ { "docid": "261daa58ee9553a5c35693329073b53a", "text": "In the last decade, the field of international relations has undergone a revolution in conflict studies. Where earlier approaches attempted to identify the attributes of individuals, states, and systems that produced conflict, the “rationalist approach to war” now explains violence as the product of private information with incentives to misrepresent, problems of credible commitment, and issue indivisibilities. In this new approach, war is understood as a bargaining failure that leaves both sides worse off than had they been able to negotiate an efficient solution. This rationalist framework has proven remarkably general—being applied to civil wars, ethnic conflicts, and interstate wars—and fruitful in understanding not only the causes of war but also war termination and conflict management. Interstate war is no longer seen as sui generis, but as a particular form within a single, integrated theory of conflict. This rationalist approach to war may at first appear to be mute in the face of the terrorist attacks of September 11, 2001. Civilian targets were attacked “out of the blue.” The terrorists did not issue prior demands. A theory premised on bargaining, therefore, would seem ill-suited to explaining such violence. Yet, as I hope to show, extremist terrorism can be rational and strategic. A rationalist approach also yields insights into the nature and strategy of terrorism and offers some general guidelines that targets should consider in response, including the importance of a multilateral coalition as a means of committing the target to a moderate military strategy. Analytically, and more centrally for this essay, extremist terrorism reveals a silence at the heart of the current rationalist approach to war even as it suggests a potentially fruitful way of extending the basic model. In extant models, the distribution of capabilities and, thus, the range of acceptable bargains are exogenous,", "title": "" } ]
[ { "docid": "6a4638a12c87b470a93e0d373a242868", "text": "Unfortunately, few of today’s classrooms focus on helping students develop as creative thinkers. Even students who perform well in school are often unprepared for the challenges that they encounter after graduation, in their work lives as well as their personal lives. Many students learn to solve specific types of problems, but they are unable to adapt and improvise in response to the unexpected situations that inevitably arise in today’s fast-changing world.", "title": "" }, { "docid": "5dc898dc6c9dd35994170cf134de3be6", "text": "This paper investigates a new approach in straw row position and orientation reconstruction in an open field, based on image segmentation with Fully Convolutional Networks (FCN). The model architecture consists of an encoder (for feature extraction) and decoder (produces segmentation map from encoded features) modules and similar to [1] except for two fully connected layers. The heatmaps produced by the FCN are used to determine orientations and spatial arrangments of the straw rows relatively to harvester via transforming the bird's eye view and Fast Hough Transform (FHT). This leads to real-time harvester trajectory optimization over treated area of the field by correction conditions calculation through the row’s directions family.", "title": "" }, { "docid": "4d9ad24707702e70747143ad477ed831", "text": "The paper presents a high-speed (500 f/s) large-format 1 K/spl times/1 K 8 bit 3.3 V CMOS active pixel sensor (APS) with 1024 ADCs integrated on chip. The sensor achieves an extremely high output data rate of over 500 Mbytes per second and a low power dissipation of 350 mW at the 66 MHz master clock rate. Principal architecture and circuit solutions allowing such a high throughput are discussed along with preliminary results of the chip characterization.", "title": "" }, { "docid": "cfb08af0088de56519960beb9ee56607", "text": "Research into corpus-based semantics has focused on the development of ad hoc models that treat single tasks, or sets of closely related tasks, as unrelated challenges to be tackled by extracting different kinds of distributional information from the corpus. As an alternative to this “one task, one model” approach, the Distributional Memory framework extracts distributional information once and for all from the corpus, in the form of a set of weighted word-link-word tuples arranged into a third-order tensor. Different matrices are then generated from the tensor, and their rows and columns constitute natural spaces to deal with different semantic problems. In this way, the same distributional information can be shared across tasks such as modeling word similarity judgments, discovering synonyms, concept categorization, predicting selectional preferences of verbs, solving analogy problems, classifying relations between word pairs, harvesting qualia structures with patterns or example pairs, predicting the typical properties of concepts, and classifying verbs into alternation classes. Extensive empirical testing in all these domains shows that a Distributional Memory implementation performs competitively against task-specific algorithms recently reported in the literature for the same tasks, and against our implementations of several state-of-the-art methods. The Distributional Memory approach is thus shown to be tenable despite the constraints imposed by its multi-purpose nature.", "title": "" }, { "docid": "3fb6e2a0f91f4cbb1ed514e422a57ca0", "text": "Recent years have seen an increased interest in and availability of parallel corpora. Large corpora from international organizations (e.g. European Union, United Nations, European Patent Office), or from multilingual Internet sites (e.g. OpenSubtitles) are now easily available and are used for statistical machine translation but also for online search by different user groups. This paper gives an overview of different usages and different types of search systems. In the past, parallel corpus search systems were based on sentence-aligned corpora. We argue that automatic word alignment allows for major innovations in searching parallel corpora. Some online query systems already employ word alignment for sorting translation variants, but none supports the full query functionality that has been developed for parallel treebanks. We propose to develop such a system for efficiently searching large parallel corpora with a powerful query language.", "title": "" }, { "docid": "a1c917d7a685154060ddd67d631ea061", "text": "In this paper, for finding the place of plate, a real time and fast method is expressed. In our suggested method, the image is taken to HSV color space; then, it is broken into blocks in a stable size. In frequent process, each block, in special pattern is probed. With the appearance of pattern, its neighboring blocks according to geometry of plate as a candidate are considered and increase blocks, are omitted. This operation is done for all of the uncontrolled blocks of images. First, all of the probable candidates are exploited; then, the place of plate is obtained among exploited candidates as density and geometry rate. In probing every block, only its lip pixel is studied which consists 23.44% of block area. From the features of suggestive method, we can mention the lack of use of expensive operation in image process and its low dynamic that it increases image process speed. This method is examined on the group of picture in background, distance and point of view. The rate of exploited plate reached at 99.33% and character recognition rate achieved 97%.", "title": "" }, { "docid": "e6c0aa517c857ed217fc96aad58d7158", "text": "Conjoined twins, popularly known as Siamese twins, result from aberrant embryogenesis [1]. It is a rare presentation with an incidence of 1 in 50,000 births. Since 60% of these cases are still births, so the true incidence is estimated to be approximately 1 in 200,000 births [2-4]. This disorder is more common in females with female to male ratio of 3:1 [5]. Conjoined twins are classified based on their site of attachment with a suffix ‘pagus’ which is a Greek term meaning “fixed”. The main types of conjoined twins are omphalopagus (abdomen), thoracopagus (thorax), cephalopagus (ventrally head to umbilicus), ischipagus (pelvis), parapagus (laterally body side), craniopagus (head), pygopagus (sacrum) and rachipagus (vertebral column) [6]. Cephalophagus is an extremely rare variant of conjoined twins with an incidence of 11% among all cases. These types of twins are fused at head, thorax and upper abdominal cavity. They are pre-dominantly of two types: Janiceps (two faces are on the either side of the head) or non Janiceps type (normal single head and face). We hereby report a case of non janiceps cephalopagus conjoined twin, which was diagnosed after delivery.", "title": "" }, { "docid": "9d97803a016e24fc9a742d45adf1cc3a", "text": "Biochemical compositional analysis of microbial biomass is a useful tool that can provide insight into the behaviour of an organism and its adaptational response to changes in its environment. To some extent, it reflects the physiological and metabolic status of the organism. Conventional methods to estimate biochemical composition often employ different sample pretreatment strategies and analytical steps for analysing each major component, such as total proteins, carbohydrates, and lipids, making it labour-, time- and sample-intensive. Such analyses when carried out individually can also result in uncertainties of estimates as different pre-treatment or extraction conditions are employed for each of the component estimations and these are not necessarily standardised for the organism, resulting in observations that are not easy to compare within the experimental set-up or between laboratories. We recently reported a method to estimate total lipids in microalgae (Chen, Vaidyanathan, Anal. Chim. Acta, 724, 67-72). Here, we propose a unified method for the simultaneous estimation of the principal biological components, proteins, carbohydrates, lipids, chlorophyll and carotenoids, in a single microalgae culture sample that incorporates the earlier published lipid assay. The proposed methodology adopts an alternative strategy for pigment assay that has a high sensitivity. The unified assay is shown to conserve sample (by 79%), time (67%), chemicals (34%) and energy (58%) when compared to the corresponding assay for each component, carried out individually on different samples. The method can also be applied to other microorganisms, especially those with recalcitrant cell walls.", "title": "" }, { "docid": "dc26775493cad4149e639bcae6fa6a8c", "text": "Fast expansion of natural language functionality of intelligent virtual agents is critical for achieving engaging and informative interactions. However, developing accurate models for new natural language domains is a time and data intensive process. We propose efficient deep neural network architectures that maximally re-use available resources through transfer learning. Our methods are applied for expanding the understanding capabilities of a popular commercial agent and are evaluated on hundreds of new domains, designed by internal or external developers. We demonstrate that our proposed methods significantly increase accuracy in low resource settings and enable rapid development of accurate models with less data.", "title": "" }, { "docid": "1a9670cc170343073fba2a5820619120", "text": "Occlusions present a great challenge for pedestrian detection in practical applications. In this paper, we propose a novel approach to simultaneous pedestrian detection and occlusion estimation by regressing two bounding boxes to localize the full body as well as the visible part of a pedestrian respectively. For this purpose, we learn a deep convolutional neural network (CNN) consisting of two branches, one for full body estimation and the other for visible part estimation. The two branches are treated differently during training such that they are learned to produce complementary outputs which can be further fused to improve detection performance. The full body estimation branch is trained to regress full body regions for positive pedestrian proposals, while the visible part estimation branch is trained to regress visible part regions for both positive and negative pedestrian proposals. The visible part region of a negative pedestrian proposal is forced to shrink to its center. In addition, we introduce a new criterion for selecting positive training examples, which contributes largely to heavily occluded pedestrian detection. We validate the effectiveness of the proposed bi-box regression approach on the Caltech and CityPersons datasets. Experimental results show that our approach achieves promising performance for detecting both non-occluded and occluded pedestrians, especially heavily occluded ones.", "title": "" }, { "docid": "4cb942fd2549525412b1a49590d4dfbd", "text": "This paper proposes a new adaptive patient-cooperative control strategy for improving the effectiveness and safety of robot-assisted ankle rehabilitation. This control strategy has been developed and implemented on a compliant ankle rehabilitation robot (CARR). The CARR is actuated by four Festo Fluidic muscles located to the calf in parallel, has three rotational degrees of freedom. The control scheme consists of a position controller implemented in joint space and a high-level admittance controller in task space. The admittance controller adaptively modifies the predefined trajectory based on real-time ankle measurement, which enhances the training safety of the robot. Experiments were carried out using different modes to validate the proposed control strategy on the CARR. Three training modes include: 1) a passive mode using a joint-space position controller, 2) a patient–robot cooperative mode using a fixed-parameter admittance controller, and 3) a cooperative mode using a variable-parameter admittance controller. Results demonstrate satisfactory trajectory tracking accuracy, even when externally disturbed, with a maximum normalized root mean square deviation less than 5.4%. These experimental findings suggest the potential of this new patient-cooperative control strategy as a safe and engaging control solution for rehabilitation robots.", "title": "" }, { "docid": "e23d1c9fb7cd7aac7fcfe156ff9a9d35", "text": "This is the second in a series of papers that describes the use of the Internet on a distance-taught undergraduate Computer Science course (Thomas et al., 1998). This paper examines students’ experience of a large-scale trial in which students were taught using electronic communication exclusively. The paper compares the constitution and experiences of a group of Internet students to those of conventional distance learning students on the same course. Learning styles, background questionnaires, and learning outcomes were used in the comparison of the two groups. The study reveals comparable learning outcomes with no discrimination in grade as the result of using different communication media. The student experience is reported, highlighting the main gains and issues of using the Internet as a communication medium in distance education. This paper also shows that using the Internet in this context can provide students with a worthwhile experience. Introduction There is a danger assuming that replacing traditional teaching techniques with new technologies can cause a significant improvement (Dede, 1996; Moore, 1996). There are many examples where attempts have been made to use electronic communication to cope with increasing student numbers (Daniel, 1998) (and proportionately diminishing resources) or to improve learning outcomes (Bischoff et al., 1996; Scardamalia and Bereiter, 1992; Moskal et al., 1997). However, it is vital to discover whether the pressure to increase student numbers overshadows the need to provide students with a meaningful educational experience, and whether course appraisal techniques disguise the quality of the courses that are presented. The Open University (OU) in the UK has an eye on both the future and the past: the future to embrace new technologies with which to enrich its distance teaching programmes, the past to ensure maintenance of standards and quality. Our aims focus on providing valuable and repeatable learning experiences. In our view, improvements in student performance should not come at the expense of the student experience. As a distance education university we are interested in the effects of new technology on the student who is remote from both teacher and fellow students. The Internet could be a life-line for students in remote areas: it is a means for combating their isolation, extending their knowledge, and gaining proficiency in its use (Franks, 1996). It gives students a communications technology that cheaply and quickly connects them to the rest of the world, giving them ready access to information. The issue for educators is how to harness effectively the benefits of the Internet in order to provide students with a fulfilling educational experience (Bates, 1991). The work reported here focuses on the effect of the Internet on student experiences to determine what real gains there might be, if any, in replacing traditional teaching processes with new methods that exploit the Internet. Background The distance approach to education requires an understanding of the issues facing part-time students, including: • dealing with distance: ie, overcoming isolation; • dealing with asynchronous learning: ie, handling delays when help or feedback is not available as soon as required; • managing part-time study: ie, coping with job, family or other commitments as well as studying. Helping students deal with these issues by providing an appropriate support network is reflected in the student’s experiences. The reputation of the OU stands firmly on a high quality “supported” distance learning process (Baker et al., 1996) which has nurtured the “good experience” reported by many of its students over the lifetime of the university. The OU is keen to ensure this experience is not undermined by the use of new technologies. When we first began investigating the use of the Internet in one of our popular undergraduate Computing courses, experienced teaching staff expressed concern about the effect it would have on students. Not surprisingly, they were unconvinced by the argument that the Internet might improve student performance as they had seen technology fads come and go. Their perspective focused on the student experience, ie, the intellectual self-development and self-awareness en route, which they regard as the most valuable aspect of an OU student’s life. Therefore, our investigation of the effects of introducing Internet-based teaching had two main aims: • to examine the experiences of the Internet students and compare them to those of the students on the conventional course; • to identify means of improving the service to students by use of appropriate technology. 30 British Journal of Educational Technology Vol 31 No 1 2000 © British Educational Communications and Technology Agency, 2000. Thus, both the Internet and conventional students studied the same course with the same materials; they attempted the same assignments and they sat the same examination. The difference in treatment between the groups was solely the communications medium. The Internet trial The Internet trial was conducted with the introductory course, Fundamentals of Computing (M205). This course used Pascal as its exemplar programming language and taught data structures, file processing and programming. It attracted students with a range of abilities and backgrounds, from complete novices taking the course as their first taste of university education, to those with considerable experience both of Computing and of distance education. The course was typical of Open University courses; study materials including printed texts, audio and video tapes, CD-ROMs and floppy discs, were mailed to students. Students were required to submit assignments for grading and feedback, and to take a final examination. During the term, students could attend a small number of local tutorials, telephone or write to their personal tutor for advice, and form self-help groups with other students. Thus, students had opportunities to communicate with their tutor, either on a one-to-one basis or in a group situation, and with other students. In our trial, the Internet was used for communication in every aspect of the course’s presentation. Internet students communicated with their tutors and fellow students via electronic mail and HyperNews (a simple electronic news system used for conferencing). In practice, the students used email for one-to-one asynchronous communication, and conferencing for communication with either their tutorial group or their peer group. Tutor-marked written assignments (known as “TMAs”) are the core of the Open University’s teaching system, providing a mechanism for individual feedback and instruction, as well as assessment. Traditionally, TMAs are paper documents exchanged by post: passing from student to tutor, then to the central Assignment Handling Office (AHO), and then back to the student. Despite the excellent postal service in the UK, this can be a cumbersome and slow procedure. In the Internet trial, assignments were processed electronically: students submitted word-processed documents, either by email attachment or secure Web form, to a central database. Tutors down-loaded assignments from the database and, with the aid of a specially designed marking tool, graded and commented on student scripts on-screen. Marked scripts were returned to the central database via an automated handler where the results were recorded. The script was then routed electronically back to the student. Details of the electronic submission and marking system can be found in Thomas et al. (1998). The study groups The students elected to enrol for either the conventional course or the Internet version. In a typical year, the conventional course attracts about 3,500 students; of this, we Distance education via the Internet 31 © British Educational Communications and Technology Agency, 2000. were restricted to about 300 students for the Internet version. The target groups were as follows: • Internet: all students who enrolled on the Internet presentation (300); • Conventional: students enrolled on the conventional course, including students whose tutors also had Internet students (150) and students of selected tutors with only conventional students (50). The composition of the conventional target group allowed us to consider tutor differences as well as to make conventional–Internet comparisons for given tutors. The study Given that the Internet students were self-selected (a “fact of life”, since the OU philosophy prevents researchers from imposing special conditions on students), we were keen to establish how divergent they were from conventional students in terms of the factors we would have been likely to have used to make selections in a controlled study. The data sources for this analysis included: • background questionnaires: used to establish students’ previous computing experience and prior knowledge, helping to assess group constitution; • learning style questionnaires: used to assess whether any student who displayed a preferred learning style fared better in one medium or the other, and to compare the learning style profiles of the groups overall; • final grades including both continuous assessment and final examination; used to compare the two groups’ learning outcomes. The background and learning style questionnaires were sent to students in the target populations at the beginning of the course. Conventional students received these materials by post and Internet students by electronic mail. Background questionnaire The background questionnaire was designed to reveal individual characteristics and, in compilation, to indicate group constitution. It was assumed that it would be possible to assess through analysis whether groups were comparable and, if necessary, to compensate for group differences. It is a self-assessment questionnaire which asks students for their opinions, rather than a psychological index of their", "title": "" }, { "docid": "8498a3240ae68bcd2b34e2b09cc1d7e2", "text": "The impact of capping agents and environmental conditions (pH, ionic strength, and background electrolytes) on surface charge and aggregation potential of silver nanoparticles (AgNPs) suspensions were investigated. Capping agents are chemicals used in the synthesis of nanoparticles to prevent aggregation. The AgNPs examined in the study were as follows: (a) uncoated AgNPs (H(2)-AgNPs), (b) electrostatically stabilized (citrate and NaBH(4)-AgNPs), (c) sterically stabilized (polyvinylpyrrolidone (PVP)-AgNPs), and (d) electrosterically stabilized (branched polyethyleneimine (BPEI)-AgNPs)). The uncoated (H(2)-AgNPs), the citrate, and NaBH(4)-coated AgNPs aggregated at higher ionic strengths (100 mM NaNO(3)) and/or acidic pH (3.0). For these three nanomaterials, chloride (Cl(-), 10 mM), as a background electrolyte, resulted in a minimal change in the hydrodynamic diameter even at low pH (3.0). This was limited by the presence of residual silver ions, which resulted in the formation of stable negatively charged AgCl colloids. Furthermore, the presence of Ca(2+) (10 mM) resulted in aggregation of the three previously identified AgNPs regardless of the pH. As for PVP coated AgNPs, the ionic strength, pH and electrolyte type had no impact on the aggregation of the sterically stabilized AgNPs. The surface charge and aggregation of the BPEI coated AgNPs varied according to the solution pH.", "title": "" }, { "docid": "727a97b993098aa1386e5bfb11a99d4b", "text": "Inevitably, reading is one of the requirements to be undergone. To improve the performance and quality, someone needs to have something new every day. It will suggest you to have more inspirations, then. However, the needs of inspirations will make you searching for some sources. Even from the other people experience, internet, and many books. Books and internet are the recommended media to help you improving your quality and performance.", "title": "" }, { "docid": "d8fab661721e70a64fac930343203d20", "text": "Studies of a range of higher cognitive functions consistently activate a region of anterior cingulate cortex (ACC), typically posterior to the genu and superior to the corpus collosum. In particular, this ACC region appears to be active in task situations where there is a need to override a prepotent response tendency, when responding is underdetermined, and when errors are made. We have hypothesized that the function of this ACC region is to monitor for the presence of crosstalk or competition between incompatible responses. In prior work, we provided initial support for this hypothesis, demonstrating ACC activity in the same region both during error trials and during correct trials in task conditions designed to elicit greater response competition. In the present study, we extend our testing of this hypothesis to task situations involving underdetermined responding. Specifically, 14 healthy control subjects performed a verb-generation task during event-related functional magnetic resonance imaging (fMRI), with the on-line acquisition of overt verbal responses. The results demonstrated that the ACC, and only the ACC, was more active in a series of task conditions that elicited competition among alternative responses. These conditions included a greater ACC response to: (1) Nouns categorized as low vs. high constraint (i.e., during a norming study, multiple verbs were produced with equal frequency vs. a single verb that produced much more frequently than any other); (2) the production of verbs that were weak associates, rather than, strong associates of particular nouns; and (3) the production of verbs that were weak associates for nouns categorized as high constraint. We discuss the implication of these results for understanding the role that the ACC plays in human cognition.", "title": "" }, { "docid": "9c98b5467d454ca46116b479f63c2404", "text": "A learning style describes the attitudes and behaviors, which determine an individual’s preferred way of learning. Learning styles are particularly important in educational settings since they may help students and tutors become more self-aware of their strengths and weaknesses as learners. The traditional way to identify learning styles is using a test or questionnaire. Despite being reliable, these instruments present some problems that hinder the learning style identification. Some of these problems include students’ lack of motivation to fill out a questionnaire and lack of self-awareness of their learning preferences. Thus, over the last years, several approaches have been proposed for automatically detecting learning styles, which aim to solve these problems. In this work, we review and analyze current trends in the field of automatic detection of learning styles. We present the results of our analysis and discuss some limitations, implications and research gaps that can be helpful to researchers working in the field of learning styles.", "title": "" }, { "docid": "6a2aeddd0ed502712647d1c53216d28f", "text": "High voltage pulse power supply using Marx generator and solid-state switches is proposed in this study. The Marx generator is composed of 12 stages and each stage is made of IGBT stack, two diode stacks, and capacitor. To charge the capacitors of each stage in parallel, inductive charging method is used and this method results in high efficiency and high repetition rates. It can generate the pulse voltage with the following parameters: voltage: up to 120 kV, rising time: sub /spl mu/S, pulse width: up to 10 /spl mu/S, pulse repetition rate: 1000 pps. The proposed pulsed power generator uses IGBT stack with a simple driver and has modular design. So this system structure gives compactness and easiness to implement total system. Some experimental results are included to verify the system performances in this paper.", "title": "" }, { "docid": "3f9f01e3b3f5ab541cbe78fb210cf744", "text": "The reliable and effective localization system is the basis of Automatic Guided Vehicle (AGV) to complete given tasks automatically in warehouse environment. However, there are no obvious features that can be used for localization of AGV to be extracted in warehouse environment and it dose make it difficult to realize the localization of AGV. So in this paper, we concentrate on the problem of optimal landmarks placement in warehouse so as to improve the reliability of localization. Firstly, we take the practical warehouse environment into consideration and transform the problem of landmarks placement into an optimization problem which aims at maximizing the difference degree between each basic unit of localization. Then Genetic Algorithm (GA) is used to solve the optimization problem. Then we match the observed landmarks with the already known ones stored in the map and the Triangulation method is used to estimate the position of AGV after the matching has been done. Finally, experiments in a real warehouse environment validate the effectiveness and reliability of our method.", "title": "" }, { "docid": "d973047c3143043bb25d4a53c6b092ec", "text": "Persian License Plate Detection and Recognition System is an image-processing technique used to identify a vehicle by its license plate. In fact this system is one kind of automatic inspection of transport, traffic and security systems and is of considerable interest because of its potential applications to areas such as automatic toll collection, traffic law enforcement and security control of restricted areas. License plate location is an important stage in vehicle license plate recognition for automated transport system. This paper presents a real time and robust method of license plate detection and recognition from cluttered images based on the morphology and template matching. In this system main stage is the isolation of the license plate from the digital image of the car obtained by a digital camera under different circumstances such as illumination, slop, distance, and angle. The algorithm starts with preprocessing and signal conditioning. Next license plate is localized using morphological operators. Then a template matching scheme will be used to recognize the digits and characters within the plate. This system implemented with help of Isfahan Control Traffic organization and the performance was 98.2% of correct plates identification and localization and 92% of correct recognized characters. The results regarding the complexity of the problem and diversity of the test cases show the high accuracy and robustness of the proposed method. The method could also be applicable for other applications in the transport information systems, where automatic recognition of registration plates, shields, signs, and so on is often necessary. This paper presents a morphology-based method.", "title": "" }, { "docid": "d7582552589626891258f52b0d750915", "text": "Social Live Stream Services (SLSS) exploit a new level of social interaction. One of the main challenges in these services is how to detect and prevent deviant behaviors that violate community guidelines. In this work, we focus on adult content production and consumption in two widely used SLSS, namely Live.me and Loops Live, which have millions of users producing massive amounts of video content on a daily basis. We use a pre-trained deep learning model to identify broadcasters of adult content. Our results indicate that moderation systems in place are highly ineffective in suspending the accounts of such users. We create two large datasets by crawling the social graphs of these platforms, which we analyze to identify characterizing traits of adult content producers and consumers, and discover interesting patterns of relationships among them, evident in both networks.", "title": "" } ]
scidocsrr
3af031fec10baf11591b1893b75e394c
A contractor muscle based continuum trunk robot
[ { "docid": "8bb465b2ec1f751b235992a79c6f7bf1", "text": "Continuum robotics has rapidly become a rich and diverse area of research, with many designs and applications demonstrated. Despite this diversity in form and purpose, there exists remarkable similarity in the fundamental simplified kinematic models that have been applied to continuum robots. However, this can easily be obscured, especially to a newcomer to the field, by the different applications, coordinate frame choices, and analytical formalisms employed. In this paper we review several modeling approaches in a common frame and notational convention, illustrating that for piecewise constant curvature, they produce identical results. This discussion elucidates what has been articulated in different ways by a number of researchers in the past several years, namely that constant-curvature kinematics can be considered as consisting of two separate submappings: one that is general and applies to all continuum robots, and another that is robot-specific. These mappings are then developed both for the singlesection and for the multi-section case. Similarly, we discuss the decomposition of differential kinematics (the robot’s Jacobian) into robot-specific and robot-independent portions. The paper concludes with a perspective on several of the themes of current research that are shaping the future of continuum robotics.", "title": "" } ]
[ { "docid": "70830fc4130b4c3281f596e8d7d2529e", "text": "In 1948 Shannon developed fundamental limits on the efficiency of communication over noisy channels. The coding theorem asserts that there are block codes with code rates arbitrarily close to channel capacity and probabilities of error arbitrarily close to zero. Fifty years later, codes for the Gaussian channel have been discovered that come close to these fundamental limits. There is now a substantial algebraic theory of error-correcting codes with as many connections to mathematics as to engineering practice, and the last 20 years have seen the construction of algebraic-geometry codes that can be encoded and decoded in polynomial time, and that beat the Gilbert–Varshamov bound. Given the size of coding theory as a subject, this review is of necessity a personal perspective, and the focus is reliable communication, and not source coding or cryptography. The emphasis is on connecting coding theories for Hamming and Euclidean space and on future challenges, specifically in data networking, wireless communication, and quantum information theory.", "title": "" }, { "docid": "82e170219f7fefdc2c36eb89e44fa0f5", "text": "The Internet of Things (IOT), the idea of getting real-world objects connected with each other, will change the ways we organize, obtain and consume information radically. Through sensor networks, agriculture can be connected to the IOT, which allows us to create connections among agronomists, farmers and crops regardless of their geographical differences. With the help of the connections, the agronomists will have better understanding of crop growth models and farming practices will be improved as well. This paper reports on the design of the sensor network when connecting agriculture to the IOT. Reliability, management, interoperability, low cost and commercialization are considered in the design. Finally, we share our experiences in both development and deployment.", "title": "" }, { "docid": "38a0c9b833bd907065b549cc28d28dd4", "text": "Increased adoption of mobile devices introduces a new spin to Internet: mobile apps are becoming a key source of user traffic. Surprisingly, service providers and enterprises are largely unprepared for this change as they increasingly lose understanding of their traffic and fail to persistently identify individual apps. App traffic simply appears no different than any other HTTP data exchange. This raises a number of concerns for security and network management. In this paper, we propose AppPrint, a system that learns fingerprints of mobile apps via comprehensive traffic observations. We show that these fingerprints identify apps even in small traffic samples where app identity cannot be explicitly revealed in any individual traffic flows. This unique AppPrint feature is crucial because explicit app identifiers are extremely scarce, leading to a very limited characterization coverage of the existing approaches. In fact, our experiments on a nationwide dataset from a major cellular provider show that AppPrint significantly outperforms any existing app identification. Moreover, the proposed system is robust to the lack of key app-identification sources, i.e., the traffic related to ads and analytic services commonly leveraged by the state-of-the-art identification methods.", "title": "" }, { "docid": "de73e604d238ee253ba31864cd07708b", "text": "36 patients aged 65 and over who were admitted to hospital after suffering a fall were examined soon after admission and followed for 4 months. 10 patients developed a severe tendency to clutch and grab and were unable to walk unsupported; 9 of these died or were still in hospital 4 months later. 16 patients showed similar signs but were able to walk independently; 5 of these died or were still in hospital after 4 months. 10 patients had no features of the post-fall syndrome; only 1 of these died within 4 months, and one of the survivors remained in hospital. The syndrome may represent the end result of a positive feed-back relationship between disturbed balance and falls.", "title": "" }, { "docid": "dec78cff9fa87a3b51fc32681ba39a08", "text": "Alkaline saponification is often used to remove interfering chlorophylls and lipids during carotenoids analysis. However, saponification also hydrolyses esterified carotenoids and is known to induce artifacts. To avoid carotenoid artifact formation during saponification, Larsen and Christensen (2005) developed a gentler and simpler analytical clean-up procedure involving the use of a strong basic resin (Ambersep 900 OH). They hypothesised a saponification mechanism based on their Liquid Chromatography-Photodiode Array (LC-PDA) data. In the present study, we show with LC-PDA-accurate mass-Mass Spectrometry that the main chlorophyll removal mechanism is not based on saponification, apolar adsorption or anion exchange, but most probably an adsorption mechanism caused by H-bonds and dipole-dipole interactions. We showed experimentally that esterified carotenoids and glycerolipids were not removed, indicating a much more selective mechanism than initially hypothesised. This opens new research opportunities towards a much wider scope of applications (e.g. the refinement of oils rich in phytochemical content).", "title": "" }, { "docid": "07fc4ce339369ecd744ab180c5b56b45", "text": "The main objective of this study was to identify successful factors in implementing an e-learning program. Existing literature has identified several successful factors in implementing an e-learning program. These factors include program content, web page accessibility, learners’ participation and involvement, web site security and support, institution commitment, interactive learning environment, instructor competency, and presentation and design. All these factors were tested together with other related criteria which are important for e-learning program implementation. The samples were collected based on quantitative methods, specifically, self-administrated questionnaires. All the criteria that were tested to see if they were important in an e-learning program implementation.", "title": "" }, { "docid": "931e6f034abd1a3004d021492382a47a", "text": "SARSA (Sutton, 1996) is applied to a simulated, traac-light control problem (Thorpe, 1997) and its performance is compared with several, xed control strategies. The performance of SARSA with four diierent representations of the current state of traac is analyzed using two reinforcement schemes. Training on one intersection is compared to, and is as eeective as training on all intersections in the environment. SARSA is shown to be better than xed-duration light timing and four-way stops for minimizing total traac travel time, individual vehicle travel times, and vehicle wait times. Comparisons of performance using a constant reinforcement function versus a variable reinforcement function dependent on the number of vehicles at an intersection showed that the variable reinforcement resulted in slightly improved performance for some cases.", "title": "" }, { "docid": "9b85018faaa87dc6bf197ea1eee426e2", "text": "Currently, a large number of industrial data, usually referred to big data, are collected from Internet of Things (IoT). Big data are typically heterogeneous, i.e., each object in big datasets is multimodal, posing a challenging issue on the convolutional neural network (CNN) that is one of the most representative deep learning models. In this paper, a deep convolutional computation model (DCCM) is proposed to learn hierarchical features of big data by using the tensor representation model to extend the CNN from the vector space to the tensor space. To make full use of the local features and topologies contained in the big data, a tensor convolution operation is defined to prevent overfitting and improve the training efficiency. Furthermore, a high-order backpropagation algorithm is proposed to train the parameters of the deep convolutional computational model in the high-order space. Finally, experiments on three datasets, i.e., CUAVE, SNAE2, and STL-10 are carried out to verify the performance of the DCCM. Experimental results show that the deep convolutional computation model can give higher classification accuracy than the deep computation model or the multimodal model for big data in IoT.", "title": "" }, { "docid": "ba3e9746291c2a355321125093b41c88", "text": "Sentiment analysis of microblogs such as Twitter has recently gained a fair amount of attention. One of the simplest sentiment analysis approaches compares the words of a posting against a labeled word list, where each word has been scored for valence, — a “sentiment lexicon” or “affective word lists”. There exist several affective word lists, e.g., ANEW (Affective Norms for English Words) developed before the advent of microblogging and sentiment analysis. I wanted to examine how well ANEW and other word lists performs for the detection of sentiment strength in microblog posts in comparison with a new word list specifically constructed for microblogs. I used manually labeled postings from Twitter scored for sentiment. Using a simple word matching I show that the new word list may perform better than ANEW, though not as good as the more elaborate approach found in SentiStrength.", "title": "" }, { "docid": "ad6dc9f74e0fa3c544c4123f50812e14", "text": "An ultra-wideband transition from microstrip to stripline in PCB technology is presented applying only through via holes for simple fabrication. The design is optimized using full-wave EM simulations. A prototype is manufactured and measured achieving a return loss better than 8.7dB and an insertion loss better than 1.2 dB in the FCC frequency range. A meander-shaped delay line in stripline technique is presented as an example of application.", "title": "" }, { "docid": "87a0972d43efa272887c3bcc70cab656", "text": "We used event-related fMRI to assess whether brain responses to fearful versus neutral faces are modulated by spatial attention. Subjects performed a demanding matching task for pairs of stimuli at prespecified locations, in the presence of task-irrelevant stimuli at other locations. Faces or houses unpredictably appeared at the relevant or irrelevant locations, while the faces had either fearful or neutral expressions. Activation of fusiform gyri by faces was strongly affected by attentional condition, but the left amygdala response to fearful faces was not. Right fusiform activity was greater for fearful than neutral faces, independently of the attention effect on this region. These results reveal differential influences on face processing from attention and emotion, with the amygdala response to threat-related expressions unaffected by a manipulation of attention that strongly modulates the fusiform response to faces.", "title": "" }, { "docid": "284c52c29b5a5c2d3fbd0a7141353e35", "text": "This paper presents results of patient experiments using a new gait-phase detection sensor (GPDS) together with a programmable functional electrical stimulation (FES) system for subjects with a dropped-foot walking dysfunction. The GPDS (sensors and processing unit) is entirely embedded in a shoe insole and detects in real time four phases (events) during the gait cycle: stance, heel off, swing, and heel strike. The instrumented GPDS insole consists of a miniature gyroscope that measures the angular velocity of the foot and three force sensitive resistors that measure the force load on the shoe insole at the heel and the metatarsal bones. The extracted gait-phase signal is transmitted from the embedded microcontroller to the electrical stimulator and used in a finite state control scheme to time the electrical stimulation sequences. The electrical stimulations induce muscle contractions in the paralyzed muscles leading to a more physiological motion of the affected leg. The experimental results of the quantitative motion analysis during walking of the affected and nonaffected sides showed that the use of the combined insole and FES system led to a significant improvement in the gait-kinematics of the affected leg. This combined sensor and stimulation system has the potential to serve as a walking aid for rehabilitation training or permanent use in a wide range of gait disabilities after brain stroke, spinal-cord injury, or neurological diseases.", "title": "" }, { "docid": "11b05bd0c0b5b9319423d1ec0441e8a7", "text": "Today’s huge volumes of data, heterogeneous information and communication technologies, and borderless cyberinfrastructures create new challenges for security experts and law enforcement agencies investigating cybercrimes. The future of digital forensics is explored, with an emphasis on these challenges and the advancements needed to effectively protect modern societies and pursue cybercriminals.", "title": "" }, { "docid": "8f34145117004d2a66123a4b6363d853", "text": "Our study examined the determinants of ERP knowledge transfer from implementation consultants (ICs) to key users (KUs), and vice versa. An integrated model was developed, positing that knowledge transfer was influenced by the knowledge-, source-, recipient-, and transfer context-related aspects. Data to test this model were collected from 85 ERP-implementation projects of firms that were mainly located in Zhejiang province, China. The results of the analysis demonstrated that all four aspects had a significant influence on ERP knowledge transfer. Furthermore, the results revealed the mediator role of the transfer activities and arduous relationship between ICs and KUs. The influence on knowledge transfer from the source’s willingness to transfer and the recipient’s willingness to accept knowledge was fully mediated by transfer activities, whereas the influence on knowledge transfer from the recipient’s ability to absorb knowledge was only partially mediated by transfer activities. The influence on knowledge transfer from the communication capability (including encoding and decoding competence) was fully mediated by arduous relationship. 2008 Elsevier B.V. All rights reserved.", "title": "" }, { "docid": "a5be27d89874b1dfcad85206ad7403ba", "text": "The upcoming Fifth Generation (5G) networks can provide ultra-reliable ultra-low latency vehicle-to-everything for vehicular ad hoc networks (VANET) to promote road safety, traffic management, information dissemination, and automatic driving for drivers and passengers. However, 5G-VANET also attracts tremendous security and privacy concerns. Although several pseudonymous authentication schemes have been proposed for VANET, the expensive cost for their initial authentication may cause serious denial of service (DoS) attacks, which furthermore enables to do great harm to real space via VANET. Motivated by this, a puzzle-based co-authentication (PCA) scheme is proposed here. In the PCA scheme, the Hash puzzle is carefully designed to mitigate DoS attacks against the pseudonymous authentication process, which is facilitated through collaborative verification. The effectiveness and efficiency of the proposed scheme is approved by performance analysis based on theory and experimental results.", "title": "" }, { "docid": "411706fcbb3a3fee07f873eb4d2d4eda", "text": "One of the more novel approaches to collaboratively creating language resources in recent years is to use online games to collect and validate data. The most significant challenges collaborative systems face are how to train users with the necessary expertise and how to encourage participation on a scale required to produce high quality data comparable with data produced by “traditional” experts. In this chapter we provide a brief overview of collaborative creation and the different approaches that have been used to create language resources, before analysing games used for this purpose. We discuss some key issues in using a gaming approach, including task design, player motivation and data quality, and compare the costs of each approach in terms of development, distribution and ongoing administration. In conclusion, we summarise the benefits and limitations of using a gaming approach to resource creation and suggest key considerations for evaluating its utility in different research scenarios.", "title": "" }, { "docid": "f28170dcc3c4949c27ee609604c53bc2", "text": "Debates over Cannabis sativa L. and C. indica Lam. center on their taxonomic circumscription and rank. This perennial puzzle has been compounded by the viral spread of a vernacular nomenclature, “Sativa” and “Indica,” which does not correlate with C. sativa and C. indica. Ambiguities also envelop the epithets of wild-type Cannabis: the spontanea versus ruderalis debate (i.e., vernacular “Ruderalis”), as well as another pair of Cannabis epithets, afghanica and kafirstanica. To trace the rise of vernacular nomenclature, we begin with the protologues (original descriptions, synonymies, type specimens) of C. sativa and C. indica. Biogeographical evidence (obtained from the literature and herbarium specimens) suggests 18th–19th century botanists were biased in their assignment of these taxa to field specimens. This skewed the perception of Cannabis biodiversity and distribution. The development of vernacular “Sativa,” “Indica,” and “Ruderalis” was abetted by twentieth century botanists, who ignored original protologues and harbored their own cultural biases. Predominant taxonomic models by Vavilov, Small, Schultes, de Meijer, and Hillig are compared and critiqued. Small’s model adheres closest to protologue data (with C. indica treated as a subspecies). “Sativa” and “Indica” are subpopulations of C. sativa subsp. indica; “Ruderalis” represents a protean assortment of plants, including C. sativa subsp. sativa and recent hybrids.", "title": "" }, { "docid": "fd56fae1f21644a28aa1e86b3f0347d0", "text": "Different types •Date: On May 22, 1995, Farkas was ... •Time: ... in Brownsville around 7:15 p.m. •Duration: He spent six days abroad ... •Set: ... for liver transplants each year ... Different occurrences in documents • explicit easy to normalize • implicit knowledge is needed • relative reference time is needed (& additional information) Annotation scheme •TimeML: ISO standard for temporal annotation (Timex3) [2] Main Challenges", "title": "" }, { "docid": "77c98efaba38e54e8aae1216ed9ac0c0", "text": "There is a disconnect between explanatory artificial intelligence (XAI) methods and the types of explanations that are useful for and demanded by society (policy makers, government officials, etc.) Questions that experts in artificial intelligence (AI) ask opaque systems provide inside explanations, focused on debugging, reliability, and validation. These are different from those that society will ask of these systems to build trust and confidence in their decisions. Although explanatory AI systems can answer many questions that experts desire, they often don’t explain why they made decisions in a way that is precise (true to the model) and understandable to humans. These outside explanations can be used to build trust, comply with regulatory and policy changes, and act as external validation. In this paper, we focus on XAI methods for deep neural networks (DNNs) because of DNNs’ use in decision-making and inherent opacity. We explore the types of questions that explanatory DNN systems can answer and discuss challenges in building explanatory systems that provide outside explanations for societal requirements and benefit.", "title": "" }, { "docid": "dba73424d6215af4a696765ddf03c09d", "text": "We describe how to train a two-layer convolutional Deep Belief Network (DBN) on the 1.6 million tiny images dataset. When training a convolutional DBN, one must decide what to do with the edge pixels of teh images. As the pixels near the edge of an image contribute to the fewest convolutional lter outputs, the model may see it t to tailor its few convolutional lters to better model the edge pixels. This is undesirable becaue it usually comes at the expense of a good model for the interior parts of the image. We investigate several ways of dealing with the edge pixels when training a convolutional DBN. Using a combination of locally-connected convolutional units and globally-connected units, as well as a few tricks to reduce the e ects of over tting, we achieve state-of-the-art performance in the classi cation task of the CIFAR-10 subset of the tiny images dataset.", "title": "" } ]
scidocsrr
4bd646da50658547d1ab74cfe5d08613
Metaphors We Think With: The Role of Metaphor in Reasoning
[ { "docid": "45082917d218ec53559c328dcc7c02db", "text": "How are people able to think about things they have never seen or touched? We demonstrate that abstract knowledge can be built analogically from more experience-based knowledge. People's understanding of the abstract domain of time, for example, is so intimately dependent on the more experience-based domain of space that when people make an air journey or wait in a lunch line, they also unwittingly (and dramatically) change their thinking about time. Further, our results suggest that it is not sensorimotor spatial experience per se that influences people's thinking about time, but rather people's representations of and thinking about their spatial experience.", "title": "" }, { "docid": "5ebd92444b69b2dd8e728de2381f3663", "text": "A mind is a computer.", "title": "" }, { "docid": "e39cafd4de135ccb17f7cf74cbd38a97", "text": "A central question in metaphor research is how metaphors establish mappings between concepts from different domains. The authors propose an evolutionary path based on structure-mapping theory. This hypothesis--the career of metaphor--postulates a shift in mode of mapping from comparison to categorization as metaphors are conventionalized. Moreover, as demonstrated by 3 experiments, this processing shift is reflected in the very language that people use to make figurative assertions. The career of metaphor hypothesis offers a unified theoretical framework that can resolve the debate between comparison and categorization models of metaphor. This account further suggests that whether metaphors are processed directly or indirectly, and whether they operate at the level of individual concepts or entire conceptual domains, will depend both on their degree of conventionality and on their linguistic form.", "title": "" }, { "docid": "c0fc94aca86a6aded8bc14160398ddea", "text": "THE most persistent problems of recall all concern the ways in which past experiences and past reactions are utilised when anything is remembered. From a general point of view it looks as if the simplest explanation available is to suppose that when any specific event occurs some trace, or some group of traces, is made and stored up in the organism or in the mind. Later, an immediate stimulus re-excites the trace, or group of traces, and, provided a further assumption is made to the effect that the trace somehow carries with it a temporal sign, the re-excitement appears to be equivalent to recall. There is, of course, no direct evidence for such traces, but the assumption at first sight seems to be a very simple one, and so it has commonly been made.", "title": "" } ]
[ { "docid": "242686291812095c5320c1c8cae6da27", "text": "In the modern high-performance transceivers, mixers (both upand down-converters) are required to have large dynamic range in order to meet the system specifications. The lower end of the dynamic range is indicated by the noise floor which tells how small a signal may be processed while the high end is determined by the non-linearity which causes distortion, compression and saturation of the signal and thus limits the maximum signal amplitude input to the mixer for the undistorted output. Compared to noise, the linearity requirement is much higher in mixer design because it is generally the limiting factor to the transceiver’s linearity. Therefore, this paper will emphasize on the linearization techniques for analog multipliers and mixers, which have been a very active research area since 1960s.", "title": "" }, { "docid": "9adaeac8cedd4f6394bc380cb0abba6e", "text": "The goal of this study was to investigate how cognitive factors influence performance in a multi-talker, \"cocktail-party\" like environment in musicians and non-musicians. This was achieved by relating performance in a spatial hearing task to cognitive processing abilities assessed using measures of executive function (EF) and visual attention in musicians and non-musicians. For the spatial hearing task, a speech target was presented simultaneously with two intelligible speech maskers that were either colocated with the target (0° azimuth) or were symmetrically separated from the target in azimuth (at ±15°). EF assessment included measures of cognitive flexibility, inhibition control and auditory working memory. Selective attention was assessed in the visual domain using a multiple object tracking task (MOT). For the MOT task, the observers were required to track target dots (n = 1,2,3,4,5) in the presence of interfering distractor dots. Musicians performed significantly better than non-musicians in the spatial hearing task. For the EF measures, musicians showed better performance on measures of auditory working memory compared to non-musicians. Furthermore, across all individuals, a significant correlation was observed between performance on the spatial hearing task and measures of auditory working memory. This result suggests that individual differences in performance in a cocktail party-like environment may depend in part on cognitive factors such as auditory working memory. Performance in the MOT task did not differ between groups. However, across all individuals, a significant correlation was found between performance in the MOT and spatial hearing tasks. A stepwise multiple regression analysis revealed that musicianship and performance on the MOT task significantly predicted performance on the spatial hearing task. Overall, these findings confirm the relationship between musicianship and cognitive factors including domain-general selective attention and working memory in solving the \"cocktail party problem\".", "title": "" }, { "docid": "f14daee1ddf6bbf4f3d41fe6ef5fcdb6", "text": "A characteristic that will distinguish successful manufacturing enterprises of the next millennium is agility: the ability to respond quickly, proactively, and aggressively to unpredictable change. The use of extended virtual enterprise Supply Chains (SC) to achieve agility is becoming increasingly prevalent. A key problem in constructing effective SCs is the lack of methods and tools to support the integration of processes and systems into shared SC processes and systems. This paper describes the architecture and concept of operation of the Supply Chain Process Design Toolkit (SCPDT), an integrated software system that addresses the challenge of seamless and efficient integration. The SCPDT enables the analysis and design of Supply Chain (SC) processes. SCPDT facilitates key SC process engineering tasks including 1) AS-IS process base-lining and assessment, 2) collaborative TO-BE process requirements definition, 3) SC process integration and harmonization, 4) TO-BE process design trade-off analysis, and 5) TO-BE process planning and implementation.", "title": "" }, { "docid": "3874d10936841f59647d73f750537d96", "text": "The number of studies comparing nutritional quality of restrictive diets is limited. Data on vegan subjects are especially lacking. It was the aim of the present study to compare the quality and the contributing components of vegan, vegetarian, semi-vegetarian, pesco-vegetarian and omnivorous diets. Dietary intake was estimated using a cross-sectional online survey with a 52-items food frequency questionnaire (FFQ). Healthy Eating Index 2010 (HEI-2010) and the Mediterranean Diet Score (MDS) were calculated as indicators for diet quality. After analysis of the diet questionnaire and the FFQ, 1475 participants were classified as vegans (n = 104), vegetarians (n = 573), semi-vegetarians (n = 498), pesco-vegetarians (n = 145), and omnivores (n = 155). The most restricted diet, i.e., the vegan diet, had the lowest total energy intake, better fat intake profile, lowest protein and highest dietary fiber intake in contrast to the omnivorous diet. Calcium intake was lowest for the vegans and below national dietary recommendations. The vegan diet received the highest index values and the omnivorous the lowest for HEI-2010 and MDS. Typical aspects of a vegan diet (high fruit and vegetable intake, low sodium intake, and low intake of saturated fat) contributed substantially to the total score, independent of the indexing system used. The score for the more prudent diets (vegetarians, semi-vegetarians and pesco-vegetarians) differed as a function of the used indexing system but they were mostly better in terms of nutrient quality than the omnivores.", "title": "" }, { "docid": "03a39c98401fc22f1a376b9df66988dc", "text": "A highly efficient wireless power transfer (WPT) system is required in many applications to replace the conventional wired system. The high temperature superconducting (HTS) wires are examined in a WPT system to increase the power-transfer efficiency (PTE) as compared with the conventional copper/Litz conductor. The HTS conductors are naturally can produce higher amount of magnetic field with high induced voltage to the receiving coil. Moreover, the WPT systems are prone to misalignment, which can cause sudden variation in the induced voltage and lead to rapid damage of the resonant capacitors connected in the circuit. Hence, the protection or elimination of resonant capacitor is required to increase the longevity of WPT system, but both the adoptions will operate the system in nonresonance mode. The absence of resonance phenomena in the WPT system will drastically reduce the PTE and correspondingly the future commercialization. This paper proposes an open bifilar spiral coils based self-resonant WPT method without using resonant capacitors at both the sides. The mathematical modeling and circuit simulation of the proposed system is performed by designing the transmitter coil using HTS wire and the receiver with copper coil. The three-dimensional modeling and finite element simulation of the proposed system is performed to analyze the current density at different coupling distances between the coil. Furthermore, the experimental results show the PTE of 49.8% under critical coupling with the resonant frequency of 25 kHz.", "title": "" }, { "docid": "18136fba311484e901282c31c9d206fd", "text": "New demands, coming from the industry 4.0 concept of the near future production systems have to be fulfilled in the coming years. Seamless integration of current technologies with new ones is mandatory. The concept of Cyber-Physical Production Systems (CPPS) is the core of the new control and automation distributed systems. However, it is necessary to provide the global production system with integrated architectures that make it possible. This work analyses the requirements and proposes a model-based architecture and technologies to make the concept a reality.", "title": "" }, { "docid": "7ebaee3df1c8ee4bf1c82102db70f295", "text": "Small cells such as femtocells overlaying the macrocells can enhance the coverage and capacity of cellular wireless networks and increase the spectrum efficiency by reusing the frequency spectrum assigned to the macrocells in a universal frequency reuse fashion. However, management of both the cross-tier and co-tier interferences is one of the most critical issues for such a two-tier cellular network. Centralized solutions for interference management in a two-tier cellular network with orthogonal frequency-division multiple access (OFDMA), which yield optimal/near-optimal performance, are impractical due to the computational complexity. Distributed solutions, on the other hand, lack the superiority of centralized schemes. In this paper, we propose a semi-distributed (hierarchical) interference management scheme based on joint clustering and resource allocation for femtocells. The problem is formulated as a mixed integer non-linear program (MINLP). The solution is obtained by dividing the problem into two sub-problems, where the related tasks are shared between the femto gateway (FGW) and femtocells. The FGW is responsible for clustering, where correlation clustering is used as a method for femtocell grouping. In this context, a low-complexity approach for solving the clustering problem is used based on semi-definite programming (SDP). In addition, an algorithm is proposed to reduce the search range for the best cluster configuration. For a given cluster configuration, within each cluster, one femto access point (FAP) is elected as a cluster head (CH) that is responsible for resource allocation among the femtocells in that cluster. The CH performs sub-channel and power allocation in two steps iteratively, where a low-complexity heuristic is proposed for the sub-channel allocation phase. Numerical results show the performance gains due to clustering in comparison to other related schemes. Also, the proposed correlation clustering scheme offers performance, which is close to that of the optimal clustering, with a lower complexity.", "title": "" }, { "docid": "88afb98c0406d7c711b112fbe2a6f25e", "text": "This paper provides a new metric, knowledge management performance index (KMPI), for assessing the performance of a firm in its knowledge management (KM) at a point in time. Firms are assumed to have always been oriented toward accumulating and applying knowledge to create economic value and competitive advantage. We therefore suggest the need for a KMPI which we have defined as a logistic function having five components that can be used to determine the knowledge circulation process (KCP): knowledge creation, knowledge accumulation, knowledge sharing, knowledge utilization, and knowledge internalization. When KCP efficiency increases, KMPI will also expand, enabling firms to become knowledgeintensive. To prove KMPI’s contribution, a questionnaire survey was conducted on 101 firms listed in the KOSDAQ market in Korea. We associated KMPI with three financial measures: stock price, price earnings ratio (PER), and R&D expenditure. Statistical results show that the proposed KMPI can represent KCP efficiency, while the three financial performance measures are also useful. # 2004 Elsevier B.V. All rights reserved.", "title": "" }, { "docid": "8ca0edf4c51b0156c279fcbcb1941d2b", "text": "The good fossil record of trilobite exoskeletal anatomy and ontogeny, coupled with information on their nonbiomineralized tissues, permits analysis of how the trilobite body was organized and developed, and the various evolutionary modifications of such patterning within the group. In several respects trilobite development and form appears comparable with that which may have characterized the ancestor of most or all euarthropods, giving studies of trilobite body organization special relevance in the light of recent advances in the understanding of arthropod evolution and development. The Cambrian diversification of trilobites displayed modifications in the patterning of the trunk region comparable with those seen among the closest relatives of Trilobita. In contrast, the Ordovician diversification of trilobites, although contributing greatly to the overall diversity within the clade, did so within a narrower range of trunk conditions. Trilobite evolution is consistent with an increased premium on effective enrollment and protective strategies, and with an evolutionary trade-off between the flexibility to vary the number of trunk segments and the ability to regionalize portions of the trunk. 401 A nn u. R ev . E ar th P la ne t. Sc i. 20 07 .3 5: 40 143 4. D ow nl oa de d fr om a rj ou rn al s. an nu al re vi ew s. or g by U N IV E R SI T Y O F C A L IF O R N IA R IV E R SI D E L IB R A R Y o n 05 /0 2/ 07 . F or p er so na l u se o nl y. ANRV309-EA35-14 ARI 20 March 2007 15:54 Cephalon: the anteriormost or head division of the trilobite body composed of a set of conjoined segments whose identity is expressed axially Thorax: the central portion of the trilobite body containing freely articulating trunk segments Pygidium: the posterior tergite of the trilobite exoskeleton containing conjoined segments INTRODUCTION The rich record of the diversity and development of the trilobite exoskeleton (along with information on the geological occurrence, nonbiomineralized tissues, and associated trace fossils of trilobites) provides the best history of any Paleozoic arthropod group. The retention of features that may have characterized the most recent common ancestor of all living arthropods, which have been lost or obscured in most living forms, provides insights into the nature of the evolutionary radiation of the most diverse metazoan phylum alive today. Studies of phylogenetic stem-group taxa, of which Trilobita provide a prominent example, have special significance in the light of renewed interest in arthropod evolution prompted by comparative developmental genetics. Although we cannot hope to dissect the molecular controls operative within trilobites, the evolutionary developmental biology (evo-devo) approach permits a fresh perspective from which to examine the contributions that paleontology can make to evolutionary biology, which, in the context of the overall evolutionary history of Trilobita, is the subject of this review. TRILOBITES: BODY PLAN AND ONTOGENY Trilobites were a group of marine arthropods that appeared in the fossil record during the early Cambrian approximately 520 Ma and have not been reported from rocks younger than the close of the Permian, approximately 250 Ma. Roughly 15,000 species have been described to date, and although analysis of the occurrence of trilobite genera suggests that the known record is quite complete (Foote & Sepkoski 1999), many new species and genera continue to be established each year. The known diversity of trilobites results from their strongly biomineralized exoskeletons, made of two layers of low magnesium calcite, which was markedly more durable than the sclerites of most other arthropods. Because the exoskeleton was rich in morphological characters and was the only body structure preserved in the vast majority of specimens, skeletal form has figured prominently in the biological interpretation of trilobites.", "title": "" }, { "docid": "221c59b8ea0460dac3128e81eebd6aca", "text": "STUDY DESIGN\nA prospective self-assessment analysis and evaluation of nutritional and radiographic parameters in a consecutive series of healthy adult volunteers older than 60 years.\n\n\nOBJECTIVES\nTo ascertain the prevalence of adult scoliosis, assess radiographic parameters, and determine if there is a correlation with functional self-assessment in an aged volunteer population.\n\n\nSUMMARY OF BACKGROUND DATA\nThere exists little data studying the prevalence of scoliosis in a volunteer aged population, and correlation between deformity and self-assessment parameters.\n\n\nMETHODS\nThere were 75 subjects in the study. Inclusion criteria were: age > or =60 years, no known history of scoliosis, and no prior spine surgery. Each subject answered a RAND 36-Item Health Survey questionnaire, a full-length anteroposterior standing radiographic assessment of the spine was obtained, and nutritional parameters were analyzed from blood samples. For each subject, radiographic, laboratory, and clinical data were evaluated. The study population was divided into 3 groups based on frontal plane Cobb angulation of the spine. Comparison of the RAND 36-Item Health Surveys data among groups of the volunteer population and with United States population benchmark data (age 65-74 years) was undertaken using an unpaired t test. Any correlation between radiographic, laboratory, and self-assessment data were also investigated.\n\n\nRESULTS\nThe mean age of the patients in this study was 70.5 years (range 60-90). Mean Cobb angle was 17 degrees in the frontal plane. In the study group, 68% of subjects met the definition of scoliosis (Cobb angle >10 degrees). No significant correlation was noted among radiographic parameters and visual analog scale scores, albumin, lymphocytes, or transferrin levels in the study group as a whole. Prevalence of scoliosis was not significantly different between males and females (P > 0.03). The scoliosis prevalence rate of 68% found in this study reveals a rate significantly higher than reported in other studies. These findings most likely reflect the targeted selection of an elderly group. Although many patients with adult scoliosis have pain and dysfunction, there appears to be a large group (such as the volunteers in this study) that has no marked physical or social impairment.\n\n\nCONCLUSIONS\nPrevious reports note a prevalence of adult scoliosis up to 32%. In this study, results indicate a scoliosis rate of 68% in a healthy adult population, with an average age of 70.5 years. This study found no significant correlations between adult scoliosis and visual analog scale scores or nutritional status in healthy, elderly volunteers.", "title": "" }, { "docid": "9d2a73c8eac64ed2e1af58a5883229c3", "text": "Tetyana Sydorenko Michigan State University This study examines the effect of input modality (video, audio, and captions, i.e., onscreen text in the same language as audio) on (a) the learning of written and aural word forms, (b) overall vocabulary gains, (c) attention to input, and (d) vocabulary learning strategies of beginning L2 learners. Twenty-six second-semester learners of Russian participated in this study. Group one (N = 8) saw video with audio and captions (VAC); group two (N = 9) saw video with audio (VA); group three (N = 9) saw video with captions (VC). All participants completed written and aural vocabulary tests and a final questionnaire.", "title": "" }, { "docid": "428ecd77262fc57c5d0d19924a10f02a", "text": "In an identity based encryption scheme, each user is identified by a unique identity string. An attribute based encryption scheme (ABE), in contrast, is a scheme in which each user is identified by a set of attributes, and some function of those attributes is used to determine decryption ability for each ciphertext. Sahai and Waters introduced a single authority attribute encryption scheme and left open the question of whether a scheme could be constructed in which multiple authorities were allowed to distribute attributes [SW05]. We answer this question in", "title": "" }, { "docid": "d1756aa5f0885157bdad130d96350cd3", "text": "In this paper, we describe the winning approach for the RecSys Challenge 2015. Our key points are (1) two-stage classification, (2) massive usage of categorical features, (3) strong classifiers built by gradient boosting and (4) threshold optimization based directly on the competition score. We describe our approach and discuss how it can be used to build scalable personalization systems.", "title": "" }, { "docid": "59f022a6e943f46e7b87213f651065d8", "text": "This paper presents a procedure to design a robust switching strategy for the basic Buck-Boost DC-DC converter utilizing switched systems' theory. The converter dynamic is described in the framework of linear switched systems and then sliding-mode controller is developed to ensure the asymptotic stability of the desired equilibrium point for the switched system with constant external input. The inherent robustness of the sliding-mode switching rule leads to efficient regulation of the output voltage under load variations. Simulation results are presented to demonstrate the outperformance of the proposed method compared to a rival scheme in the literature.", "title": "" }, { "docid": "d49fc093d43fa3cdf40ecfa3f670e165", "text": "As a result of the increase in robots in various fields, the mechanical stability of specific robots has become an important subject of research. This study is concerned with the development of a two-wheeled inverted pendulum robot that can be applied to an intelligent, mobile home robot. This kind of robotic mechanism has an innately clumsy motion for stabilizing the robot’s body posture. To analyze and execute this robotic mechanism, we investigated the exact dynamics of the mechanism with the aid of 3-DOF modeling. By using the governing equations of motion, we analyzed important issues in the dynamics of a situation with an inclined surface and also the effect of the turning motion on the stability of the robot. For the experiments, the mechanical robot was constructed with various sensors. Its application to a two-dimensional floor environment was confirmed by experiments on factors such as balancing, rectilinear motion, and spinning motion.", "title": "" }, { "docid": "a9fc5418c0b5789b02dd6638a1b61b5d", "text": "As the homeostatis characteristics of nerve systems show, artificial neural networks are considered to be robust to variation of circuit components and interconnection faults. However, the tolerance of neural networks depends on many factors, such as the fault model, the network size, and the training method. In this study, we analyze the fault tolerance of fixed-point feed-forward deep neural networks for the implementation in CMOS digital VLSI. The circuit errors caused by the interconnection as well as the processing units are considered. In addition to the conventional and dropout training methods, we develop a new technique that randomly disconnects weights during the training to increase the error resiliency. Feed-forward deep neural networks for phoneme recognition are employed for the experiments.", "title": "" }, { "docid": "1bdf1bfe81bf6f947df2254ae0d34227", "text": "We investigate the problem of incorporating higher-level symbolic score-like information into Automatic Music Transcription (AMT) systems to improve their performance. We use recurrent neural networks (RNNs) and their variants as music language models (MLMs) and present a generative architecture for combining these models with predictions from a frame level acoustic classifier. We also compare different neural network architectures for acoustic modeling. The proposed model computes a distribution over possible output sequences given the acoustic input signal and we present an algorithm for performing a global search for good candidate transcriptions. The performance of the proposed model is evaluated on piano music from the MAPS dataset and we observe that the proposed model consistently outperforms existing transcription methods.", "title": "" }, { "docid": "497e2ed6d39ad6c09210b17ce137c45a", "text": "PURPOSE\nThe purpose of this study is to develop a model of Hospital Information System (HIS) user acceptance focusing on human, technological, and organizational characteristics for supporting government eHealth programs. This model was then tested to see which hospital type in Indonesia would benefit from the model to resolve problems related to HIS user acceptance.\n\n\nMETHOD\nThis study used qualitative and quantitative approaches with case studies at four privately owned hospitals and three government-owned hospitals, which are general hospitals in Indonesia. The respondents involved in this study are low-level and mid-level hospital management officers, doctors, nurses, and administrative staff who work at medical record, inpatient, outpatient, emergency, pharmacy, and information technology units. Data was processed using Structural Equation Modeling (SEM) and AMOS 21.0.\n\n\nRESULTS\nThe study concludes that non-technological factors, such as human characteristics (i.e. compatibility, information security expectancy, and self-efficacy), and organizational characteristics (i.e. management support, facilitating conditions, and user involvement) which have level of significance of p<0.05, significantly influenced users' opinions of both the ease of use and the benefits of the HIS. This study found that different factors may affect the acceptance of each user in each type of hospital regarding the use of HIS. Finally, this model is best suited for government-owned hospitals.\n\n\nCONCLUSIONS\nBased on the results of this study, hospital management and IT developers should have more understanding on the non-technological factors to better plan for HIS implementation. Support from management is critical to the sustainability of HIS implementation to ensure HIS is easy to use and provides benefits to the users as well as hospitals. Finally, this study could assist hospital management and IT developers, as well as researchers, to understand the obstacles faced by hospitals in implementing HIS.", "title": "" }, { "docid": "2923e6f0760006b6a049a5afa297ca56", "text": "Six years ago in this journal we discussed the work of Arthur T. Murray, who endeavored to explore artificial intelligence using the Forth programming language [1]. His creation, which he called MIND.FORTH, was interesting in its ability to understand English sentences in the form: subject-verb-object. It also had the capacity to learn new things and to form mental associations between recent experiences and older memories. In the intervening years, Mr. Murray has continued to develop his MIND.FORTH: he has translated it into Visual BASIC, PERL and Javascript, he has written a book [2] on the subject, and he maintains a wiki web site where anyone may suggest changes or extensions to his design [3]. MIND.FORTH is necessarily complex and opaque by virtue of its functionality; therefore it may be challenging for a newcomer to grasp. However, the more dedicated student will find much of value in this code. Murray himself has become quite a controversial figure.", "title": "" }, { "docid": "369ed2ef018f9b6a031b58618f262dce", "text": "Natural language processing has increasingly moved from modeling documents and words toward studying the people behind the language. This move to working with data at the user or community level has presented the field with different characteristics of linguistic data. In this paper, we empirically characterize various lexical distributions at different levels of analysis, showing that, while most features are decidedly sparse and non-normal at the message-level (as with traditional NLP), they follow the central limit theorem to become much more Log-normal or even Normal at the userand county-levels. Finally, we demonstrate that modeling lexical features for the correct level of analysis leads to marked improvements in common social scientific prediction tasks.", "title": "" } ]
scidocsrr
95f1316a21e769dad881f9d5fcd4cc41
Optimal solutions for multi-unit combinatorial auctions: branch and bound heuristics
[ { "docid": "f263617643066212a5c2cd62b432adaf", "text": "There is interest in designing simultaneous auctions for situations such as the recent FCC radio spectrum auctions, in which the value of assets to a bidder depends on which other assets he or she wins. In such auctions, bidders may wish to submit bids for combinations of assets. When this is allowed, the problem of determining the revenue maximizing set of nonconflicting bids can be difficult. We analyze this problem, identifying several different structures of permitted combinational bids for which computational tractability is constructively demonstrated and some structures for which computational tractability cannot be guaranteed. (Spectrum Auctions; Combinatorial Auctions; Multi-Item Simultaneous Auctions; Bidding with Synergies; Computational Complexity)", "title": "" }, { "docid": "6bfe2c22978c99e31b655a41e1eaf670", "text": "Some important classical mechanisms considered in Microeconomics and Game Theory require the solution of a difficult optimization problem. This is true of mechanisms for combinatorial auctions, which have in recent years assumed practical importance, and in particular of the gold standard for combinatorial auctions, the Generalized Vickrey Auction (GVA). Traditional analysis of these mechanisms in particular, their truth revelation properties assumes that the optimization problems are solved precisely. In reality, these optimization problems can usually be solved only in an approximate fashion. We investigate the impact on such mechanisms of replacing exact solutions by approximate ones. Specifically, we look at a particular greedy optimization method, which has empirically been shown to perform well. We show that the GVA payment scheme does not provide for a truth revealing mechanism. We introduce another scheme that does guarantee truthfulness for a restricted class of players. We demonstrate the latter property by identifying sufficient conditions for a combinatorial auction to be truth-revealing, conditions which have applicability beyond the specific auction studied here.", "title": "" } ]
[ { "docid": "80ee31f4a87774348b8ea990538ee0fa", "text": "This report describes and documents Moody's version of its RiskCalc default model for private firms. RiskCalc analyzes financial statement data to produce default probability predictions for corporate obligors — particularly those in the middle market. We discuss the model's derivation in detail, analyze its accuracy, and provide context for its application. The model's key advantage derives from Moody's unique and proprietary middle market private firm financial statement and default database (Credit Research Database), which comprises 28,104 companies and 1,604 defaults. Our main insights and conclusions are:", "title": "" }, { "docid": "8e7adfab46fa21202e7ff7311d11b51d", "text": "In this paper we describe a joint effort by the City University of New York (CUNY), University of Illinois at Urbana-Champaign (UIUC) and SRI International at participating in the mono-lingual entity linking (MLEL) and cross-lingual entity linking (CLEL) tasks for the NIST Text Analysis Conference (TAC) Knowledge Base Population (KBP2011) track. The MLEL system is based on a simple combination of two published systems by CUNY (Chen and Ji, 2011) and UIUC (Ratinov et al., 2011). Therefore, we mainly focus on describing our new CLEL system. In addition to a baseline system based on name translation, machine translation and MLEL, we propose two novel approaches. One is based on a cross-lingual name similarity matrix, iteratively updated based on monolingual co-occurrence, and the other uses topic modeling to enhance performance. Our best systems placed 4th in mono-lingual track and 2nd in cross-lingual track.", "title": "" }, { "docid": "0fc23421a84ec954e9c85018b49b748c", "text": "A microvascular coupling system was developed and introduced for clinical application to facilitate fast and safe anastomosis of small vessels. However, operators often encounter some difficulty, particularly in pinning the vascular wall onto the ring-pins. To overcome the difficulty, the authors developed the \"push down\" technique and made newly-designed micro-forceps. These forceps have been used in 111 venous couplings involving 96 critical anastomoses. This study reports herein the patency results showing effectiveness and safety of the \"push down\" technique using a prototype micro-forceps in the pinning procedure in a microvascular coupling system.", "title": "" }, { "docid": "afa3aba4f7edfecd4e632f856c2b7c01", "text": "Ruminants make efficient use of diets that are poor in true protein content because microbes in the rumen are able to synthesize a large proportion of the animal’s required protein. The amino acid (AA) pattern of this protein is of better quality than nearly all of the dietary ingredients commonly fed to domestic ruminants (Broderick, 1994; Schwab, 1996). In addition, ruminal microbial utilization of ammonia allows the feeding of nonprotein N (NPN) compounds, such as urea, as well as the capture of recycled urea N that would otherwise be excreted in the urine. Many studies have shown that lactating dairy cows use feed crude protein (CP; N x 6.25) more efficiently than other ruminant livestock. However, dairy cows still excrete 2-3 times more N in manure than they secrete in milk, even under conditions of optimal nutrition and management. Inefficient N utilization necessitates feeding supplemental protein, increasing milk production costs and contributing to environmental N pollution. One of our major objectives in protein nutrition of lactating ruminants must be to maximize ruminal formation of this high quality microbial protein and minimize feeding of costly protein supplements under all feeding regimes.", "title": "" }, { "docid": "d0bed363ed62f2bb90f4fe2271749f91", "text": "In this study, we propose a novel deep learning-based method to predict an optimized structure for a given boundary condition and optimization setting without using any iterative scheme. For this purpose, first, using open-source topology optimization code, datasets of the optimized structures paired with the corresponding information on boundary conditions and optimization settings are generated at low (32  32) and high (128  128) resolutions. To construct the artificial neural network for the proposed method, a convolutional neural network (CNN)-based encoder and decoder network is trained using the training dataset generated at low resolution. Then, as a two-stage refinement, the conditional generative adversarial network (cGAN) is trained with the optimized structures paired at both low and high resolutions, and is connected to the trained CNN-based encoder and decoder network. The performance evaluation results of the integrated network demonstrate that the proposed method can determine a nearoptimal structure in terms of pixel values and compliance with negligible computational time.", "title": "" }, { "docid": "c0ef15616ba357cb522b828e03a5298c", "text": "This paper introduces the compact genetic algorithm (cGA) which represents the population as a probability distribution over the set of solutions and is operationally equivalent to the order-one behavior of the simple GA with uniform crossover. It processes each gene independently and requires less memory than the simple GA. The development of the compact GA is guided by a proper understanding of the role of the GA’s parameters and operators. The paper clearly illustrates the mapping of the simple GA’s parameters into those of an equivalent compact GA. Computer simulations compare both algorithms in terms of solution quality and speed. Finally, this work raises important questions about the use of information in a genetic algorithm, and its ramifications show us a direction that can lead to the design of more efficient GA’s.", "title": "" }, { "docid": "b447aec2deaa67788560efe1d136be31", "text": "This paper addresses the design, construction and control issues of a novel biomimetic robotic dolphin equipped with mechanical flippers, based on an engineered propulsive model. The robotic dolphin is modeled as a three-segment organism composed of a rigid anterior body, a flexible rear body and an oscillating fluke. The dorsoventral movement of the tail produces the thrust and bending of the anterior body in the horizontal plane enables turning maneuvers. A dualmicrocontroller structure is adopted to drive the oscillating multi-link rear body and the mechanical flippers. Experimental results primarily confirm the effectiveness of the dolphin-like movement in propulsion and maneuvering.", "title": "" }, { "docid": "49acaae4a0fdf5bbb7acfbb3bdc449df", "text": "In recent years, lighter-weight virtualization solutions have begun to emerge as an alternative to virtual machines. Because these solutions are still in their infancy, however, several research questions remain open in terms of how to effectively manage computing resources. One important problem is the management of resources in the event of overutilization. For some applications, overutilization can severely affect performance. We provide a solution to this problem by extending the concept of timeslicing to the level of virtualization container. Through this approach we can control and mitigate some of the more detrimental performance effects oversubscription. Our results show significant improvement over standard scheduling with Docker.", "title": "" }, { "docid": "8be94cf3744cf18e29c4f41b727cc08a", "text": "A printed dipole with an integrated balun features a broad operating bandwidth. The feed point of conventional balun structures is fixed at the top of the integrated balun, which makes it difficult to match to a 50-Omega feed. In this communication, we demonstrate that it is possible to directly match with the 50-Omega feed by adjusting the position of the feed point of the integrated balun. The printed dipole with the hereby presented adjustable integrated balun maintains the broadband performance and exhibits flexibility for the matching to different impedance values, which is extremely important for the design of antenna arrays since the mutual coupling between antenna elements commonly changes the input impedance of each single element. An equivalent-circuit analysis is presented for the understanding of the mechanism of the impedance match. An eight-element linear antenna array is designed as a benchmarking topology for broadband wireless base stations.", "title": "" }, { "docid": "9f84630422777d869edd7167ff6da443", "text": "Video surveillance, closed-circuit TV and IP-camera systems became virtually omnipresent and indispensable for many organizations, businesses, and users. Their main purpose is to provide physical security, increase safety, and prevent crime. They also became increasingly complex, comprising many communication means, embedded hardware and non-trivial firmware. However, most research to date focused mainly on the privacy aspects of such systems, and did not fully address their issues related to cyber-security in general, and visual layer (i.e., imagery semantics) attacks in particular. In this paper, we conduct a systematic review of existing and novel threats in video surveillance, closed-circuit TV and IP-camera systems based on publicly available data. The insights can then be used to better understand and identify the security and the privacy risks associated with the development, deployment and use of these systems. We study existing and novel threats, along with their existing or possible countermeasures, and summarize this knowledge into a comprehensive table that can be used in a practical way as a security checklist when assessing cyber-security level of existing or new CCTV designs and deployments. We also provide a set of recommendations and mitigations that can help improve the security and privacy levels provided by the hardware, the firmware, the network communications and the operation of video surveillance systems. We hope the findings in this paper will provide a valuable knowledge of the threat landscape that such systems are exposed to, as well as promote further research and widen the scope of this field beyond its current boundaries.", "title": "" }, { "docid": "0bf22c8dadaca2cc46d57d8baf3df7e3", "text": "THE IDYLL has been going on for decades. DevOps, the synergy between software development and IT operations, was an open secret before it became a mass movement. Passionate programmers were often also closet system administrators—sometimes literally so, by nurturing recycled hardware in their home’s closet. These same programmers were also drawn to the machine room, chatting with the administrators about disk-partitioning schemes, backup strategies, and new OS releases. Not to be outdone, zealous administrators would nd endless excuses to develop all sorts of nifty software: deployment automation, monitoring, provisioning, and reporting tools. Many factors are propelling the increased adoption of DevOps. First, software is increasingly being offered over the Internet as a service instead of being developed as an organization’s bespoke system or a shrinkwrapped product. This makes operations an integral part of the offering, driving demands for service quality. Then there’s the agile movement. Its emphasis on cooperation between all stakeholders has helped formalize the relationship between development and operations. Its acceptance of change has driven demand for processes and tools that will let systems respond to change swiftly and ef ciently. Another enabler has been the availability of powerful and plentiful hardware. It has allowed the abstraction of system infrastructure and its expression as code amenable to established software development practices. Resource virtualization and cloud computing have provided the required building blocks. In many IT sectors, DevOps is here to stay, helping deliver higherquality services more ef ciently. How can you, as a software practitioner, embrace DevOps to increase your organization’s effectiveness?", "title": "" }, { "docid": "1943e91837f854a6e8e797a5297abed3", "text": "Counterfactual Regret Minimization and variants (e.g. Public Chance Sampling CFR and Pure CFR) have been known as the best approaches for creating approximate Nash equilibrium solutions for imperfect information games such as poker. This paper introduces CFR, a new algorithm that typically outperforms the previously known algorithms by an order of magnitude or more in terms of computation time while also potentially requiring less memory.", "title": "" }, { "docid": "eb972bb7d972c28d3d740758b59f49b6", "text": "An ultra-low-leakage power-rail ESD clamp circuit, composed of the SCR device and new ESD detection circuit, has been proposed with consideration of gate current to reduce the standby leakage current. By controlling the gate current of the devices in the ESD detection circuit under a specified bias condition, the whole power-rail ESD clamp circuit can achieve an ultra-low standby leakage current. The new proposed circuit has been fabricated in a 1 V 65 nm CMOS process for experimental verification. The new proposed power-rail ESD clamp circuit can achieve 7 kV HBM and 325 V MM ESD levels while consuming only a standby leakage current of 96 nA at 1 V bias in room temperature and occupying an active area of only 49 m 21 m.", "title": "" }, { "docid": "529ec9e4dcafd1079e71b6111c25dfa4", "text": "This paper present a novel algorithm for cartoon image segmentation based on the simple linear iterative clustering (SLIC) superpixels and adaptive region propagation merging. To break the limitation of the original SLIC algorithm in confirming to image boundaries, this paper proposed to improve the quality of the superpixels generation based on the connectivity constraint. To achieve efficient segmentation from the superpixels, this paper employed an adaptive region propagation merging algorithm to obtain independent segmented object. Compared with the pixel-based segmentation algorithms and other superpixel-based segmentation methods, the method proposed in this paper is more effective and more efficient by determining the propagation center adaptively. Experiments on abundant cartoon images showed that our algorithm outperforms classical segmentation algorithms with the boundary-based and region-based criteria. Furthermore, the final cartoon image segmentation results are also well consistent with the human visual perception.", "title": "" }, { "docid": "ee2a02e8b791f3ffabfbc9bf0f524d80", "text": "Omnidirectional wheels used on Omniclimber inspection robot and in other robots enable a holonomic drive and a good maneuverability. On the other hand, they have a poor wheel traction and suffer from vertical and horizontal vibration, decreasing the trajectory following accuracy of the robot. In this study, we address this problem by integrating an orientation estimation and correction algorithm in the Omniclimber control by integration of an accelerometer. Moreover, since the Omniclimber chassis adapts to curved structures, the kinematics of the robot change when moving on a curved surface. We integrated an additional algorithm which corrects the robot's kinematics based on the curvature diameter and the current robot orientation. By integrating these two algorithms we could make remarkable improvements on the path following accuracy of the Omniclimber on flat and curved structures.", "title": "" }, { "docid": "7539c44b888e21384dc266d1cf397be0", "text": "Deep learning has become a ubiquitous technology to improve machine intelligence. However, most of the existing deep models are structurally very complex, making them difficult to be deployed on the mobile platforms with limited computational power. In this paper, we propose a novel network compression method called dynamic network surgery, which can remarkably reduce the network complexity by making on-the-fly connection pruning. Unlike the previous methods which accomplish this task in a greedy way, we properly incorporate connection splicing into the whole process to avoid incorrect pruning and make it as a continual network maintenance. The effectiveness of our method is proved with experiments. Without any accuracy loss, our method can efficiently compress the number of parameters in LeNet-5 and AlexNet by a factor of 108× and 17.7× respectively, proving that it outperforms the recent pruning method by considerable margins. Code and some models are available at https://github.com/yiwenguo/Dynamic-Network-Surgery.", "title": "" }, { "docid": "3c315e5cbf13ffca10f4199d094d2f34", "text": "Object tracking under complex circumstances is a challenging task because of background interference, obstacle occlusion, object deformation, etc. Given such conditions, robustly detecting, locating, and analyzing a target through single-feature representation are difficult tasks. Global features, such as color, are widely used in tracking, but may cause the object to drift under complex circumstances. Local features, such as HOG and SIFT, can precisely represent rigid targets, but these features lack the robustness of an object in motion. An effective method is adaptive fusion of multiple features in representing targets. The process of adaptively fusing different features is the key to robust object tracking. This study uses a multi-feature joint descriptor (MFJD) and the distance between joint histograms to measure the similarity between a target and its candidate patches. Color and HOG features are fused as the tracked object of the joint representation. This study also proposes a self-adaptive multi-feature fusion strategy that can adaptively adjust the joint weight of the fused features based on their stability and contrast measure scores. The mean shift process is adopted as the object tracking framework with multi-feature representation. The experimental results demonstrate that the proposed MFJD tracking method effectively handles background clutter, partial occlusion by obstacles, scale changes, and deformations. The novel method performs better than several state-of-the-art methods in real surveillance scenarios.", "title": "" }, { "docid": "9e722237e6bf8b046a02d1c43f82327a", "text": "For the alarming growth in consumer credit in recent years, consumer credit scoring is the term used to describe methods of classifying credits’ applicants as `good' and `bad' risk classes.. In the current paper, we use the logistic regression as well as the discriminant analysis in order to develop predictive models allowing to distinguish between “good” and “bad” borrowers. The data have been collected from a commercial Tunisian bank over a 3-year period, from 2010 to 2012. These data consist of four selected and ordered variables. By comparing the respective performances of the Logistic Regression (LR) and the Discriminant Analysis (DA), we notice that the LR model yields a 89% good classification rate in predicting customer types and then, a significantly low error rate (11%), as compared with the DA approach (where the good classification rate is only equal to 68.49%, leading to a significantly high error rate, i.e. 31.51%). © 2016 AESS Publications. All Rights Reserved.", "title": "" }, { "docid": "da7c8d0643e4fadee91188497d97b52a", "text": "In current systems, memory accesses to a DRAM chip must obey a set of minimum latency restrictions specified in the DRAM standard. Such timing parameters exist to guarantee reliable operation. When deciding the timing parameters, DRAM manufacturers incorporate a very large margin as a provision against two worst-case scenarios. First, due to process variation, some outlier chips are much slower than others and cannot be operated as fast. Second, chips become slower at higher temperatures, and all chips need to operate reliably at the highest supported (i.e., worst-case) DRAM temperature (85° C). In this paper, we show that typical DRAM chips operating at typical temperatures (e.g., 55° C) are capable of providing a much smaller access latency, but are nevertheless forced to operate at the largest latency of the worst-case. Our goal in this paper is to exploit the extra margin that is built into the DRAM timing parameters to improve performance. Using an FPGA-based testing platform, we first characterize the extra margin for 115 DRAM modules from three major manufacturers. Our results demonstrate that it is possible to reduce four of the most critical timing parameters by a minimum/maximum of 17.3%/54.8% at 55°C without sacrificing correctness. Based on this characterization, we propose Adaptive-Latency DRAM (AL-DRAM), a mechanism that adoptively reduces the timing parameters for DRAM modules based on the current operating condition. AL-DRAM does not require any changes to the DRAM chip or its interface. We evaluate AL-DRAM on a real system that allows us to reconfigure the timing parameters at runtime. We show that AL-DRAM improves the performance of memory-intensive workloads by an average of 14% without introducing any errors. We discuss and show why AL-DRAM does not compromise reliability. We conclude that dynamically optimizing the DRAM timing parameters can reliably improve system performance.", "title": "" }, { "docid": "f31dddb905b4e3fbf20a54bdba48ca36", "text": "Word similarity computation is a fundamental task for natural language processing. We organize a semantic campaign of Chinese word similarity measurement at NLPCC-ICCPOL 2016. This task provides a benchmark dataset of Chinese word similarity (PKU-500 dataset), including 500 word pairs with their similarity scores. There are 21 teams submitting 24 systems in this campaign. In this paper, we describe clearly the data preparation and word similarity annotation, make an in-depth analysis on the evaluation results and give a brief introduction to participating systems.", "title": "" } ]
scidocsrr
d3e92c38f71a24ca8cca43a639a00ca5
An Empirical Investigation of Systematic Reviews in Software Engineering
[ { "docid": "04c52aa382cf53c3ab208bd3c0fc5354", "text": "This article is the last of our series of articles on survey research. In it, we discuss how to analyze survey data. We provide examples of correct and incorrect analysis techniques used in software engineering surveys.", "title": "" } ]
[ { "docid": "ebf6caae5106f0328ac39fb5e0052d9c", "text": "William James’ theory of emotion has been controversial since its inception, and a basic analysis of Cannon’s (1927) critique is provided. Research on the impact of facial expressions, expressive behaviors, and visceral responses on emotional feelings are each reviewed. A good deal of evidence supports James’ theory that these types of bodily feedback, along with perceptions of situational cues, are each important parts of emotional feelings. Extensions to James’ theory are also reviewed, including evidence of individual differences in the effect of bodily responses on emotional experience.", "title": "" }, { "docid": "780bcf4241b412b7ed2fe428bc566120", "text": "Although chatbots have been very popular in recent years, they still have some serious weaknesses which limit the scope of their applications. One major weakness is that they cannot learn new knowledge during the conversation process, i.e., their knowledge is fixed beforehand and cannot be expanded or updated during conversation. In this paper, we propose to build a general knowledge learning engine for chatbots to enable them to continuously and interactively learn new knowledge during conversations. As time goes by, they become more and more knowledgeable and better and better at learning and conversation. We model the task as an open-world knowledge base completion problem and propose a novel technique called lifelong interactive learning and inference (LiLi) to solve it. LiLi works by imitating how humans acquire knowledge and perform inference during an interactive conversation. Our experimental results show LiLi is highly promising.", "title": "" }, { "docid": "c9dca9b27abe9ebabeff7c7e3814dcae", "text": "The Internet of Things (IoT) can be defined as an environment where internet capabilities are applied to everyday objects that have earlier not been considered as computers to provide a network connectivity that will enable these objects to generate, exchange and consume data. According to a forecast given by the Ericsson Mobility report issued in June 2016, there will be as many as 16 billion connected devices that will get Internet of Things (IoT) technology-enabled by 2021. Apart from having its uses in personal well-being and comfort, IoT will be a key factor in the planning of smart cities specially in the time when governments are focussed on the development of smart cities. This technology can be implemented not just for communication networks but also for sanitation, transportation, healthcare, energy use and much more.", "title": "" }, { "docid": "beea84b0d96da0f4b29eabf3b242a55c", "text": "Recent years have seen a growing interest in creating virtual agents to populate the cast of characters for interactive narrative. A key challenge posed by interactive characters for narrative environments is devising expressive dialogue generators. To be effective, character dialogue generators must be able to simultaneously take into account multiple sources of information that bear on dialogue, including character attributes, plot development, and communicative goals. Building on the narrative theory of character archetypes, we propose an archetype-driven character dialogue generator that uses a probabilistic unification framework to generate dialogue motivated by character personality and narrative history to achieve communicative goals. The generator’s behavior is illustrated with character dialogue generation in a narrative-centered learning environment, CRYSTAL ISLAND.", "title": "" }, { "docid": "dc323eabca83c4e9381539832dbb7f63", "text": "We present the main freight transportation planning and management issues, briefly review the associated literature, describe a number of major developments, and identify trends and challenges. In order to keep the length of the paper within reasonable limits, we focus on long-haul, intercity, freight transportation. Optimization-based operations research methodologies are privileged. The paper starts with an overview of freight transportation systems and planning issues and continues with models which attempt to analyze multimodal, multicommodity transportation systems at the regional, national or global level. We then review location and network design formulations which are often associated with the long-term evolution of transportation systems and also appear prominently when service design issues are considered as described later on. Operational models and methods, particularly those aimed at the allocation and repositioning of resources such as empty vehicles, are then described. To conclude, we identify a number of interesting problems and challenges.", "title": "" }, { "docid": "5e240ad1d257a90c0ca414ce8e7e0949", "text": "Improving Cloud Security using Secure Enclaves by Jethro Gideon Beekman Doctor of Philosophy in Engineering – Electrical Engineering and Computer Sciences University of California, Berkeley Professor David Wagner, Chair Internet services can provide a wealth of functionality, yet their usage raises privacy, security and integrity concerns for users. This is caused by a lack of guarantees about what is happening on the server side. As a worst case scenario, the service might be subjected to an insider attack. This dissertation describes the unalterable secure service concept for trustworthy cloud computing. Secure services are a powerful abstraction that enables viewing the cloud as a true extension of local computing resources. Secure services combine the security benefits one gets locally with the manageability and availability of the distributed cloud. Secure services are implemented using secure enclaves. Remote attestation of the server is used to obtain guarantees about the programming of the service. This dissertation addresses concerns related to using secure enclaves such as providing data freshness and distributing identity information. Certificate Transparency is augmented to distribute information about which services exist and what they do. All combined, this creates a platform that allows legacy clients to obtain security guarantees about Internet services.", "title": "" }, { "docid": "b169a813dcaa659555f082911bcc843f", "text": "Pharmacogenomics studies the impact of genetic variation of patients on drug responses and searches for correlations between gene expression or Single Nucleotide Polymorphisms (SNPs) of patient's genome and the toxicity or efficacy of a drug. SNPs data, produced by microarray platforms, need to be preprocessed and analyzed in order to find correlation between the presence/absence of SNPs and the toxicity or efficacy of a drug. Due to the large number of samples and the high resolution of instruments, the data to be analyzed can be very huge, requiring high performance computing. The paper presents the design and experimentation of Cloud4SNP, a novel Cloud-based bioinformatics tool for the parallel preprocessing and statistical analysis of pharmacogenomics SNP microarray data. Experimental evaluation shows good speed-up and scalability. Moreover, the availability on the Cloud platform allows to face in an elastic way the requirements of small as well as very large pharmacogenomics studies.", "title": "" }, { "docid": "1fa02640e2a85c4a99ecc228e3ca6eac", "text": "An aerobic microorganism with an ability to utilize phenol as sole carbon and energy source was isolated from phenol-contaminated wastewater samples. The isolate was identified as Bacillus amyloliquefaciens strain WJDB-1 based on morphological, physiological, and biochemical characteristics, and 16S rDNA sequence analysis. Strain WJDB-1 immobilized in alginate–chitosan–alginate (ACA) microcapsules could degrade 200 mg/l phenol completely within 36 h. The concentration of phenol was determined using differential pulse voltammetry (DPV) at glassy carbon electrode (GCE) with a linear relationship between peak current and phenol concentration ranging from 2.0 to 20.0 mg/l. Cells immobilized in ACA microcapsules were found to be superior to the free suspended ones in terms of improving the tolerance to the environmental loadings. The optimal conditions to prepare microcapsules for achieving higher phenol degradation rate were investigated by changing the concentrations of sodium alginate, calcium chloride, and chitosan. Furthermore, the efficiency of phenol degradation was optimized by adjusting various processing parameters, such as the number of microcapsules, pH value, temperature, and the initial concentration of phenol. This microorganism has the potential for the efficient treatment of organic pollutants in wastewater.", "title": "" }, { "docid": "7fef9bfd0e71a08d5574affb91d0c9ed", "text": "This paper presents a novel 3D indoor Laser-aided Inertial Navigation System (L-INS) for the visually impaired. An Extended Kalman Filter (EKF) fuses information from an Inertial Measurement Unit (IMU) and a 2D laser scanner, to concurrently estimate the six degree-of-freedom (d.o.f.) position and orientation (pose) of the person and a 3D map of the environment. The IMU measurements are integrated to obtain pose estimates, which are subsequently corrected using line-to-plane correspondences between linear segments in the laser-scan data and orthogonal structural planes of the building. Exploiting the orthogonal building planes ensures fast and efficient initialization and estimation of the map features while providing human-interpretable layout of the environment. The L-INS is experimentally validated by a person traversing a multistory building, and the results demonstrate the reliability and accuracy of the proposed method for indoor localization and mapping.", "title": "" }, { "docid": "e566bb3425c986c22e76f78183eb2bb7", "text": "A blog site consists of many individual blog postings. Current blog search services focus on retrieving postings but there is also a need to identify relevant blog sites. Blog site search is similar to resource selection in distributed information retrieval, in that the target is to find relevant collections of documents. We introduce resource selection techniques for blog site search and evaluate their performance. Further, we propose a \"diversity factor\" that measures the topic diversity of each blog site. Our results show that the appropriate combination of the resource selection techniques and the diversity factor can achieve significant improvements in retrieval performance compared to baselines. We also report results using these techniques on the TREC blog distillation task.", "title": "" }, { "docid": "917fe14b2afa245d0048c4b98702e8a9", "text": "• Basic components of Solar PV system and its merits and demerits. • Involvement of power electronic devices in Solar PV components. • MATLAB/SIMULINK model of different control strategies of power conditioning unit. • Importance of MATLAB/SIMULINK model in improving the efficiency of the overall solar PV system. • Characteristics of Solar PV panel and its MATLAB/SIMULINK model. • Characteristics and MATLAB/SIMULINK model of Solar PV power conditioning unit.", "title": "" }, { "docid": "abc160fc578bb40935afa7aea93cf6ca", "text": "This study investigates the effect of leader and follower behavior on employee voice, team task responsibility and team effectiveness. This study distinguishes itself by including both leader and follower behavior as predictors of team effectiveness. In addition, employee voice and team task responsibility are tested as potential mediators of the relationship between task-oriented behaviors (informing, directing, verifying) and team effectiveness as well as the relationship between relation-oriented behaviors (positive feedback, intellectual stimulation, individual consideration) and team effectiveness. This cross-sectional exploratory study includes four methods: 1) inter-reliable coding of leader and follower behavior during staff meetings; 2) surveys of 57 leaders; 3) surveys of643 followers; 4) survey of 56 lean coaches. Regression analyses showed that both leaders and followers display more task-oriented behaviors opposed to relation-oriented behaviors during staff meetings. Contrary to the hypotheses, none of the observed leader behaviors positively influences employee voice, team task responsibility or team effectiveness. However, all three task-oriented follower behaviors indirectly influence team effectiveness. The findings from this research illustrate that follower behaviors has more influence on team effectiveness compared to leader behavior. Practical implications, strengths and limitations of the research are discussed. Moreover, future research directions including the mediating role of culture and psychological safety are proposed as well.", "title": "" }, { "docid": "6633bf4bf80c4c0a9ceb6024297476ce", "text": "Software Testing In The Real World provides the reader with a tool-box for effectively improving the software testing process. The book gives the practicing. Improving software practices, delivering more customer value, and. The outsourcing process, Martin shares a real-life case study, including a.This work offers a toolbox for the practical implementation of the software testing process and how to improve it. Based on real-world issues and examples.Software Testing in the Real World provides the reader with a tool-box for effectively improving the software testing process. The book contains many testing.Software testing is a process, or a series of processes, designed to make sure. From working with this example, that thoroughly testing a complex, real-world.", "title": "" }, { "docid": "2f7d487059a77b582c3e0a33fd5d38af", "text": "Disturbance regimes are changing rapidly, and the consequences of such changes for ecosystems and linked social-ecological systems will be profound. This paper synthesizes current understanding of disturbance with an emphasis on fundamental contributions to contemporary landscape and ecosystem ecology, then identifies future research priorities. Studies of disturbance led to insights about heterogeneity, scale, and thresholds in space and time and catalyzed new paradigms in ecology. Because they create vegetation patterns, disturbances also establish spatial patterns of many ecosystem processes on the landscape. Drivers of global change will produce new spatial patterns, altered disturbance regimes, novel trajectories of change, and surprises. Future disturbances will continue to provide valuable opportunities for studying pattern-process interactions. Changing disturbance regimes will produce acute changes in ecosystems and ecosystem services over the short (years to decades) and long-term (centuries and beyond). Future research should address questions related to (1) disturbances as catalysts of rapid ecological change, (2) interactions among disturbances, (3) relationships between disturbance and society, especially the intersection of land use and disturbance, and (4) feedbacks from disturbance to other global drivers. Ecologists should make a renewed and concerted effort to understand and anticipate the causes and consequences of changing disturbance regimes.", "title": "" }, { "docid": "780d67867f770f61cf1e9d02cfc12935", "text": "In this correspondence, an improvement to the realization of the linear-phase IIR filters is described. It is based on the rearrangement of the numerator polynomials of the IIR filter functions that are used in the real-time realizations recently proposed in literature. The new realization has better total harmonic distortion when sine input is used, and it has smaller phase and group delay errors due to finite section length.", "title": "" }, { "docid": "ec7590c04dc31b1c6065ef4e15148dfc", "text": "No thesis - no graduation. Academic writing poses manifold challenges to students, instructors and institutions alike. High labor costs, increasing student numbers, and the Bologna Process (which has reduced the period after which undergraduates in Europe submit their first thesis and thus the time available to focus on writing skills) all pose a threat to students’ academic writing abilities. This situation gave rise to the practical goal of this study: to determine if, and to what extent, academic writing and its instruction can be scaled (i.e., designed more efficiently) using a technological solution, in this case Thesis Writer (TW), a domain-specific, online learning environment for the scaffolding of student academic writing, combined with an online editor optimized for producing academic text. Compared to existing automated essay scoring and writing evaluation tools, TW is not focusing on feedback but on instruction, planning, and genre mastery. While most US-based tools, particularly those also used in secondary education, are targeting on the essay genre, TW is tailored to the needs of theses and research article writing (IMRD scheme). This mixed-methods paper reports data of a test run with a first-year course of 102 business administration students. A technology adoption model served as a frame of reference for the research design. From a student’s perspective, problems posed by the task of writing a research proposal as well as the use, usability, and usefulness of TW were studied through an online survey and focus groups (explanatory sequential design). Results seen were positive to highly positive – TW is being used, and has been deemed supportive by students. In particular, it supports the scaling of writing instruction in group assignment settings.", "title": "" }, { "docid": "6eaa7702ddb25afb5615b3b4c30c691a", "text": "Computer forensics is a relatively new, but growing, field of study at the undergraduate college and university level. This paper describes some of the course design aspects of teaching computer forensics in an online environment. The learning theories and pedagogies that provide the guiding principles for course design are presented, along with specific issues related to adult education. The paper then presents a detailed description of the design of an introductory computer forensics course, with particular attention to the issue of hands-on assignments in the online environment. Finally, a small study about the efficacy of the online courses is presented", "title": "" }, { "docid": "b53e5d6054b684990e9c5c1e5d2b6b7d", "text": "Automatic Dependent Surveillance-Broadcast (ADS-B) is one of the key technologies for future “e-Enabled” aircrafts. ADS-B uses avionics in the e-Enabled aircrafts to broadcast essential flight data such as call sign, altitude, heading, and other extra positioning information. On the one hand, ADS-B brings significant benefits to the aviation industry, but, on the other hand, it could pose security concerns as channels between ground controllers and aircrafts for the ADS-B communication are not secured, and ADS-B messages could be captured by random individuals who own ADS-B receivers. In certain situations, ADS-B messages contain sensitive information, particularly when communications occur among mission-critical civil airplanes. These messages need to be protected from any interruption and eavesdropping. The challenge here is to construct an encryption scheme that is fast enough for very frequent encryption and that is flexible enough for effective key management. In this paper, we propose a Staged Identity-Based Encryption (SIBE) scheme, which modifies Boneh and Franklin's original IBE scheme to address those challenges, that is, to construct an efficient and functional encryption scheme for ADS-B system. Based on the proposed SIBE scheme, we provide a confidentiality framework for future e-Enabled aircraft with ADS-B capability.", "title": "" }, { "docid": "a1f60b03cf3a7dde3090cbf0a926a7e9", "text": "Secondary analyses of Revised NEO Personality Inventory data from 26 cultures (N = 23,031) suggest that gender differences are small relative to individual variation within genders; differences are replicated across cultures for both college-age and adult samples, and differences are broadly consistent with gender stereotypes: Women reported themselves to be higher in Neuroticism, Agreeableness, Warmth, and Openness to Feelings, whereas men were higher in Assertiveness and Openness to Ideas. Contrary to predictions from evolutionary theory, the magnitude of gender differences varied across cultures. Contrary to predictions from the social role model, gender differences were most pronounced in European and American cultures in which traditional sex roles are minimized. Possible explanations for this surprising finding are discussed, including the attribution of masculine and feminine behaviors to roles rather than traits in traditional cultures.", "title": "" }, { "docid": "ff5d3f4ef4431c7144c12f5da563e347", "text": "Ankle inversion-eversion compliance is an important feature of conventional prosthetic feet, and control of inversion, or roll, in robotic prostheses could improve balance for people with amputation. We designed a tethered ankle-foot prosthesis with two independently-actuated toes that are coordinated to provide plantarflexion and inversion-eversion torques. This configuration allows a simple lightweight structure with a total mass of 0.72 kg. Strain gages on the toes measure torque with less than 2.7% RMS error, while compliance in the Bowden cable tether provides series elasticity. Benchtop tests demonstrated a 90% rise time of less than 33 ms and peak torques of 180 N·m in plantarflexion and ±30 N·m in inversion-eversion. The phase-limited closedloop torque bandwidth is 20 Hz with a 90 N·m amplitude chirp in plantarflexion, and 24 Hz with a 20 N·m amplitude chirp in inversion-eversion. The system has low sensitivity to toe position disturbances at frequencies of up to 18 Hz. Walking trials with five values of constant inversion-eversion torque demonstrated RMS torque tracking errors of less than 3.7% in plantarflexion and less than 5.9% in inversion-eversion. These properties make the platform suitable for haptic rendering of virtual devices in experiments with humans, which may reveal strategies for improving balance or allow controlled comparisons of conventional prosthesis features. A similar morphology may be effective for autonomous devices.", "title": "" } ]
scidocsrr
140a5c004763a4a7ec90331f9a069f2c
LBP-based degraded document image binarization
[ { "docid": "6779d20fd95ff4525404bdd4d3c7df4b", "text": "A new method is presented for adaptive document image binarization, where the page is considered as a collection of subcomponents such as text, background and picture. The problems caused by noise, illumination and many source type-related degradations are addressed. Two new algorithms are applied to determine a local threshold for each pixel. The performance evaluation of the algorithm utilizes test images with ground-truth, evaluation metrics for binarization of textual and synthetic images, and a weight-based ranking procedure for the \"nal result presentation. The proposed algorithms were tested with images including di!erent types of document components and degradations. The results were compared with a number of known techniques in the literature. The benchmarking results show that the method adapts and performs well in each case qualitatively and quantitatively. ( 1999 Pattern Recognition Society. Published by Elsevier Science Ltd. All rights reserved.", "title": "" } ]
[ { "docid": "ab10b0dd6a9161222a5db4275a698bc5", "text": "BACKGROUND\nPseudomonas aeruginosa is a common cause of community-acquired and nosocomial-acquired pneumonia. The development of resistance of P. aeruginosa to antibiotics is increasing globally due to the overuse of antibiotics. This article examines, retrospectively, the antibiotic resistance in patients with community-acquired versus nosocomial-acquired pneumonia caused by P. aeruginosa or multidrug-resistant (MDR) P. aeruginosa.\n\n\nMETHODS\nData from patients with community-acquired and nosocomial-acquired pneumonia caused by P. aeruginosa and MDR P. aeruginosa were collected from the hospital charts at the HELIOS Clinic, Witten/Herdecke University, Wuppertal, Germany, between January 2004 and August 2014. An antibiogram was created from all study patients with community-acquired and nosocomial-acquired pneumonia caused by P. aeruginosa or MDR P. aeruginosa.\n\n\nRESULTS\nA total of 168 patients with mean age 68.1 ± 12.8 (113 [67.3% males and 55 [32.7%] females) were identified; 91 (54.2%) had community-acquired and 77 (45.8%) had nosocomial-acquired pneumonia caused by P. aeruginosa. Patients with community-acquired versus nosocomial-acquired pneumonia had a mean age of 66.4 ± 13.8 vs. 70.1 ± 11.4 years [59 vs. 54 (64.8% vs. 70.1%) males and 32 vs. 23 (35.2% vs. 29.9%) females]. They included 41 (24.4%) patients with pneumonia due to MDR P. aeruginosa: 27 (65.9%) community-acquired and 14 (34.1%) nosocomial-acquired cases. P. aeruginosa and MDR P. aeruginosa showed a very high resistance to fosfomycin (community-acquired vs. nosocomial-acquired) (81.0% vs. 84.2%; 0 vs. 85.7%). A similar resistance pattern was seen with ciprofloxacin (35.2% vs. 24.0%; 70.4% vs. 61.5%), levofloxacin (34.6% vs. 24.5%; 66.7% vs. 64.3%), ceftazidime (15.9% vs. 30.9; 33.3% vs. 61.5%), piperacillin (24.2% vs. 29.9%; 44.4% vs. 57.1%), imipenem (28.6% vs. 27.3%; 55.6% vs. 50.0%), piperacillin and tazobactam (23.1% vs. 28.6%; 44.4% vs. 50.0%), tobramycin (28.0% vs. 17.2%; 52.0% vs. 27.3%), gentamicin (26.4% vs. 18.2%; 44.4% vs. 21.4%), and meropenem (20.2% vs. 20.3%; 42.3% vs. 50.0%). An elevated resistance of P. aeruginosa and MDR P. aeruginosa was found for cefepime (11.1% vs. 23.3%; 25.9% vs. 50.0%), and amikacin (10.2% vs. 9.1%; 27.3% vs. 9.1%). Neither pathogen was resistant to colistin (P = 0.574).\n\n\nCONCLUSION\nWhile P. aeruginosa and MDR P. aeruginosa were resistant to a variety of commonly used antibiotics, they were not resistant to colistin in the few isolates recovered from patients with pneumonia.", "title": "" }, { "docid": "1ca6e4d73ec39aebd7cafed73a322b77", "text": "Manufacturing of powder-based products is a focus of increasing research in the recent years. The main reason is the lack of predictive process models connecting process parameters and material properties to product quality attributes. Moreover, the trend towards continuous manufacturing for the production of multiple pharmaceutical products increases the need for model-based process and product design. This work aims to identify the challenges in flowsheet model development and simulation for solid-based pharmaceutical processes and show its application and advantages for the integrated simulation and sensitivity analysis of two tablet manufacturing case studies: direct compaction and dry granulation. harmaceutical manufacturing", "title": "" }, { "docid": "9eedeec21ab380c0466ed7edfe7c745d", "text": "In this paper, we study the effect of using-grams (sequences of words of length n) for text categorization. We use an efficient algorithm for gener ating suchn-gram features in two benchmark domains, the 20 newsgroups data set and 21,578 REU TERS newswire articles. Our results with the rule learning algorithm R IPPER indicate that, after the removal of stop words, word sequences of length 2 or 3 are most useful. Using l o er sequences reduces classification performance.", "title": "" }, { "docid": "972abdbc8667c24ae080eb2ffb7835e9", "text": "Two important cues to female physical attractiveness are body mass index (BMI) and shape. In front view, it seems that BMI may be more important than shape; however, is it true in profile where shape cues may be stronger? There is also the question of whether men and women have the same perception of female physical attractiveness. Some studies have suggested that they do not, but this runs contrary to mate selection theory. This predicts that women will have the same perception of female attractiveness as men do. This allows them to judge their own relative value, with respect to their peer group, and match this value with the value of a prospective mate. To clarify these issues we asked 40 male and 40 female undergraduates to rate a set of pictures of real women (50 in front-view and 50 in profile) for attractiveness. BMI was the primary predictor of attractiveness in both front and profile, and the putative visual cues to BMI showed a higher degree of view-invariance than shape cues such as the waist-hip ratio (WHR). Consistent with mate selection theory, there were no significant differences in the rating of attractiveness by male and female raters.", "title": "" }, { "docid": "f5eb1355dd1511bd647ec317d0336cd7", "text": "Cloud Computing holds the potential to eliminate the requirements for setting up of highcost computing infrastructure for the IT-based solutions and services that the industry uses. It promises to provide a flexible IT architecture, accessible through internet for lightweight portable devices. This would allow many-fold increase in the capacity or capabilities of the existing and new software. In a cloud computing environment, the entire data reside over a set of networked resources, enabling the data to be accessed through virtual machines. Since these data centres may lie in any corner of the world beyond the reach and control of users, there are multifarious security and privacy challenges that need to be understood and taken care of. Also, one can never deny the possibility of a server breakdown that has been witnessed, rather quite often in the recent times. There are various issues that need to be dealt with respect to security and privacy in a cloud computing scenario. This extensive survey paper aims to elaborate and analyze the numerous unresolved issues threatening the Cloud computing adoption and diffusion affecting the various stake-holders linked to it.", "title": "" }, { "docid": "398c506a2fbc1738d3d70f0507334096", "text": "Preprocessing To prepare the images for the network, each of the training images was resized to 192 pixels by 192 pixels. To create additional training images, each of the training images was elastically distorted. For each of the original training images, four randomly generated elastic distorted images were generated and then resized down to 192 by 192 pixels. In addition, each training image was also rotated 90 degrees and additional elastic distortions were applied to the rotated images.", "title": "" }, { "docid": "435307df5495b497ff9065e9d98af044", "text": "Recent breakthroughs in word representation methods have generated a new spark of enthusiasm amidst the computational linguistic community, with methods such as Word2Vec have indeed shown huge potential to compress insightful information on words’ contextual meaning in lowdimensional vectors. While the success of these representations has mainly been harvested for traditional NLP tasks such as word prediction or sentiment analysis, recent studies have begun using these representations to track the dynamics of language and meaning over time. However, recent works have also shown these embeddings to be extremely noisy and training-set dependent, thus considerably restricting the scope and significance of this potential application. In this project, building upon the work presented by [1] in 2015, we thus propose to investigate ways of defining interpretable embeddings, and as well as alternative ways of assessing the dynamics of semantic changes so as to endow more statistical power to the analysis. 1 Problem Statement, Motivation and Prior Work The recent success of Neural-Network-generated word embeddings (word2vec, Glove, etc.) for traditional NLP tasks such as word prediction or text sentiment analysis has motivated the scientific community to use these representations as a way to analyze language itself. Indeed, if these low-dimensional word representations have proven to successfully carry both semantic and syntactic information, such a successful information compression could thus potentially be harvested to tackle more complex linguistic problems, such as monitoring language dynamics over time or space. In particular, in [1], [5], and [7], word embeddings are used to capture drifts of word meanings over time through the analysis of the temporal evolution of any given word’ closest neighbors. Other studies [6] use them to relate semantic shifts to geographical considerations. However, as highlighted by Hahn and Hellrich in [3], the inherent randomness of the methods used to encode these representations results in the high variability of any given word’s closest neighbors, thus considerably narrowing the statistical power of the study: how can we detect real semantic changes from the ambient jittering inherent to the embeddings’ representations? Can we try to provide a perhaps more interpretable and sounder basis of comparison than the neighborhoods to detect these changes? Building upon the methodology developed by Hamilton and al [1] to study language dynamics and the observations made by Hahn and Hellrich [3], we propose to tackle this problem from a mesoscopic scale: the intuition would be that if local neighborhoods are too unstable, we should thus look at information contained in the overall embedding matrix to build our statistical framework. In particular, a first idea is that we should try to evaluate the existence of a potentially ”backbone” structure of the embeddings. Indeed, it would seem intuitive that if certain words –such as “gay” or “asylum” (as observed by Hamilton et al) have exhibited important drifts in meaning throughout the 20th century, another large set of words – such as “food”,“house” or “people” – have undergone very little semantic change over time. As such, we should expect the relative distance between atoms in this latter set (as defined by the acute angle between their respective embeddings) to remain relatively constant from decade to decade. Hence, one could try to use this stable backbone graph as a way to triangulate the movement of the other word vectors over time, thus hopefully inducing more interpretable changes over time. Such an approach could also be used to answer the question of assessing the validity of our embeddings for linguistic purposes: how well do these embeddings capture similarity and nuances between words? A generally", "title": "" }, { "docid": "d931f6f9960e8688c2339a27148efe74", "text": "Most knowledge on the Web is encoded as natural language text, which is convenient for human users but very difficult for software agents to understand. Even with increased use of XML-encoded information, software agents still need to process the tags and literal symbols using application dependent semantics. The Semantic Web offers an approach in which knowledge can be published by and shared among agents using symbols with a well defined, machine-interpretable semantics. The Semantic Web is a “web of data” in that (i) both ontologies and instance data are published in a distributed fashion; (ii) symbols are either ‘literals’ or universally addressable ‘resources’ (URI references) each of which comes with unique semantics; and (iii) information is semi-structured. The Friend-of-a-Friend (FOAF) project (http://www.foafproject.org/) is a good application of the Semantic Web in which users publish their personal profiles by instantiating the foaf:Personclass and adding various properties drawn from any number of ontologies. The Semantic Web’s distributed nature raises significant data access problems – how can an agent discover, index, search and navigate knowledge on the Semantic Web? Swoogle (Dinget al. 2004) was developed to facilitate webscale semantic web data access by providing these services to both human and software agents. It focuses on two levels of knowledge granularity: URI based semantic web vocabulary andsemantic web documents (SWDs), i.e., RDF and OWL documents encoded in XML, NTriples or N3. Figure 1 shows Swoogle’s architecture. The discovery component automatically discovers and revisits SWDs using a set of integrated web crawlers. The digest component computes metadata for SWDs and semantic web terms (SWTs) as well as identifies relations among them, e.g., “an SWD instantiates an SWT class”, and “an SWT class is the domain of an SWT property”. The analysiscomponent uses cached SWDs and their metadata to derive analytical reports, such as classifying ontologies among SWDs and ranking SWDs by their importance. The s rvicecomponent sup-", "title": "" }, { "docid": "ba39f3a2b5ed9af6cdf4530176039e05", "text": "Survival analysis can be applied to build models fo r time to default on debt. In this paper we report an application of survival analysis to model default o n a large data set of credit card accounts. We exp lore the hypothesis that probability of default is affec ted by general conditions in the economy over time. These macroeconomic variables cannot readily be inc luded in logistic regression models. However, survival analysis provides a framework for their in clusion as time-varying covariates. Various macroeconomic variables, such as interest rate and unemployment rate, are included in the analysis. We show that inclusion of these indicators improves model fit and affects probability of default yielding a modest improvement in predictions of def ault on an independent test set.", "title": "" }, { "docid": "de6e139d0b5dc295769b5ddb9abcc4c6", "text": "1 Abd El-Moniem M. Bayoumi is a graduate TA at the Department of Computer Engineering, Cairo University. He received his BS degree in from Cairo University in 2009. He is currently an RA, working for a research project on developing an innovative revenue management system for the hotel business. He was awarded the IEEE CIS Egypt Chapter’s special award for his graduation project in 2009. Bayoumi is interested to research in machine learning and business analytics; and he is currently working on his MS on stock market prediction.", "title": "" }, { "docid": "149ffd270f39a330f4896c7d3aa290be", "text": "The pathogenesis underlining many neurodegenerative diseases remains incompletely understood. The lack of effective biomarkers and disease preventative medicine demands the development of new techniques to efficiently probe the mechanisms of disease and to detect early biomarkers predictive of disease onset. Raman spectroscopy is an established technique that allows the label-free fingerprinting and imaging of molecules based on their chemical constitution and structure. While analysis of isolated biological molecules has been widespread in the chemical community, applications of Raman spectroscopy to study clinically relevant biological species, disease pathogenesis, and diagnosis have been rapidly increasing since the past decade. The growing number of biomedical applications has shown the potential of Raman spectroscopy for detection of novel biomarkers that could enable the rapid and accurate screening of disease susceptibility and onset. Here we provide an overview of Raman spectroscopy and related techniques and their application to neurodegenerative diseases. We further discuss their potential utility in research, biomarker detection, and diagnosis. Challenges to routine use of Raman spectroscopy in the context of neuroscience research are also presented.", "title": "" }, { "docid": "683e496bd08fe3a55c63ba8788481184", "text": "Ubicomp products have become more important in providing emotional experiences as users increasingly assimilate these products into their everyday lives. In this paper, we explored a new design perspective by applying a pet dog analogy to support emotional experience with ubicomp products. We were inspired by pet dogs, which are already intimate companions to humans and serve essential emotional functions in daily live. Our studies involved four phases. First, through our literature review, we articulated the key characteristics of pet dogs that apply to ubicomp products. Secondly, we applied these characteristics to a design case, CAMY, a mixed media PC peripheral with a camera. Like a pet dog, it interacts emotionally with a user. Thirdly, we conducted a user study with CAMY, which showed the effects of pet-like characteristics on users' emotional experiences, specifically on intimacy, sympathy, and delightedness. Finally, we presented other design cases and discussed the implications of utilizing a pet dog analogy to advance ubicomp systems for improved user experiences.", "title": "" }, { "docid": "0db3dab283d054f806780b2251e50c60", "text": "This article introduces a novel representation for three-dimensional (3D) objects in terms of local affine-invariant descriptors of their images and the spatial relationships between the corresponding surface patches. Geometric constraints associated with different views of the same patches under affine projection are combined with a normalized representation of their appearance to guide matching and reconstruction, allowing the acquisition of true 3D affine and Euclidean models from multiple unregistered images, as well as their recognition in photographs taken from arbitrary viewpoints. The proposed approach does not require a separate segmentation stage, and it is applicable to highly cluttered scenes. Modeling and recognition results are presented.", "title": "" }, { "docid": "9233195d4f25e21a4de1a849d8f47932", "text": "For the first time, the DRAM device composed of 6F/sup 2/ open-bit-line memory cell with 80nm feature size is developed. Adopting 6F/sup 2/ scheme instead of customary 8F/sup 2/ scheme made it possible to reduce chip size by up to nearly 20%. However, converting the cell scheme to 6F/sup 2/ accompanies some difficulties such as decrease of the cell capacitance, and more compact core layout. To overcome this strict obstacles which are originally stemming from the conversion of cell scheme to 6F/sup 2/, TIT structure with AHO (AfO/AlO/AfO) is adopted for higher cell capacitance, and bar-type contact is adopted for adjusting to compact core layout. Moreover, to lower cell V/sub th/ so far as suitable for characteristic of low power operation, the novel concept, S-RCAT (sphere-shaped-recess-channel-array transistor) is introduced. It is the improved scheme of RCAT used in 8F/sup 2/ scheme. By adopting S-RCAT, V/sub th/ can be lowered, SW, DIBL are improved. Additionally, data retention time characteristic can be improved.", "title": "" }, { "docid": "90ca045940f1bc9517c64bd93fd33d37", "text": "We present a new algorithm for encoding low dynamic range images into fixed-rate texture compression formats. Our approach provides orders of magnitude improvements in speed over existing publicly-available compressors, while generating high quality results. The algorithm is applicable to any fixed-rate texture encoding scheme based on Block Truncation Coding and we use it to compress images into the OpenGL BPTC format. The underlying technique uses an axis-aligned bounding box to estimate the proper partitioning of a texel block and performs a generalized cluster fit to compute the endpoint approximation. This approximation can be further refined using simulated annealing. The algorithm is inherently parallel and scales with the number of processor cores. We highlight its performance on low-frequency game textures and the high frequency Kodak Test Image Suite.", "title": "" }, { "docid": "87eafc3005bc936c0d6765285295f37e", "text": "A microbial fuel cell (MFC) is a bioreactor that converts chemical energy in the chemical bonds in organic compounds to electrical energy through catalytic reactions of microorganisms under anaerobic conditions. It has been known for many years that it is possible to generate electricity directly by using bacteria to break down organic substrates. The recent energy crisis has reinvigorated interests in MFCs among academic researchers as a way to generate electric power or hydrogen from biomass without a net carbon emission into the ecosystem. MFCs can also be used in wastewater treatment facilities to break down organic matters. They have also been studied for applications as biosensors such as sensors for biological oxygen demand monitoring. Power output and Coulombic efficiency are significantly affected by the types of microbe in the anodic chamber of an MFC, configuration of the MFC and operating conditions. Currently, real-world applications of MFCs are limited because of their low power density level of several thousand mW/m2. Efforts are being made to improve the performance and reduce the construction and operating costs of MFCs. This article presents a critical review on the recent advances in MFC research with emphases on MFC configurations and performances.", "title": "" }, { "docid": "021243b584395d190e191e0713fe4a5c", "text": "Convolutional neural networks (CNNs) have achieved remarkable performance in a wide range of computer vision tasks, typically at the cost of massive computational complexity. The low speed of these networks may hinder real-time applications especially when computational resources are limited. In this paper, an efficient and effective approach is proposed to accelerate the test-phase computation of CNNs based on low-rank and group sparse tensor decomposition. Specifically, for each convolutional layer, the kernel tensor is decomposed into the sum of a small number of low multilinear rank tensors. Then we replace the original kernel tensors in all layers with the approximate tensors and fine-tune the whole net with respect to the final classification task using standard backpropagation. \\\\ Comprehensive experiments on ILSVRC-12 demonstrate significant reduction in computational complexity, at the cost of negligible loss in accuracy. For the widely used VGG-16 model, our approach obtains a 6.6$\\times$ speed-up on PC and 5.91$\\times$ speed-up on mobile device of the whole network with less than 1\\% increase on top-5 error.", "title": "" }, { "docid": "7c16d1675e6a041117ffaa5a7a29fe40", "text": "Pakistan hosts a competitive and fluid telecommunication market and for a company to sustain, create customer value and increase economic efficiency, it needs to better understand its customers. The purpose of clustering or customer segmentation is to deliver actionable results for marketing, product development and business planning. In this paper, we focus on customer segmentation using clustering algorithms on real data of a telecommunication company in Pakistan. After choosing appropriate attributes for clustering, we used the two-step clustering algorithm in order to create different customer segments. Moreover, the insights obtained from each segment were analyzed before suggesting marketing strategies for up-selling and better targeted campaigns.", "title": "" }, { "docid": "0a7601bd874d898386a9ecf23634fc75", "text": "The combined effort of the Universiti Kebangsaan Malaysia and the Kyushu Institute of Technology (KYUTECH) to develop a small-satellite antenna is presented in this paper. Microstrip antennas offer an ideal solution to satellite communication requirements due to their light weight and low profile. In this paper, a compact single-layer coaxial-probe-fed circularly polarized high-gain patch antenna designed for HORYU-IV nanosatellite S-band communication is presented. HORYU-IV aims to acquire data about high-voltage discharge phenomena in low Earth orbit (LEO). This will enhance the understanding of satellite charging, and overall satellite reliability can be improved for future high-power space programs. The proposed antenna consists of four asymmetric V-shaped slits, i.e., one at each corner of a rectangular patch, and a parasitic rectangular strip. The proposed antenna achieves a sufficient beamwidth for LEO satellite application and less than 3-dB axial ratio for the entire field of view. A prototype of the antenna was developed with a 1.57-mm-thick singlelayer Rogers substrate with a relative permittivity of 2.2, and the measured results are consistent with the simulation.", "title": "" }, { "docid": "7db1b370d0e14e80343cbc7718bbb6c9", "text": "T free-riding problem occurs if the presales activities needed to sell a product can be conducted separately from the actual sale of the product. Intuitively, free riding should hurt the retailer that provides that service, but the author shows analytically that free riding benefits not only the free-riding retailer, but also the retailer that provides the service when customers are heterogeneous in terms of their opportunity costs for shopping. The service-providing retailer has a postservice advantage, because customers who have resolved their matching uncertainty through sales service incur zero marginal shopping cost if they purchase from the service-providing retailer rather than the free-riding retailer. Moreover, allowing free riding gives the free rider less incentive to compete with the service provider on price, because many customers eventually will switch to it due to their own free riding. In turn, this induced soft strategic response enables the service provider to charge a higher price and enjoy the strictly positive profit that otherwise would have been wiped away by head-to-head price competition. Therefore, allowing free riding can be regarded as a necessary mechanism that prevents an aggressive response from another retailer and reduces the intensity of price competition.", "title": "" } ]
scidocsrr
04423df5477b846c897658f5b1fa3a8b
Optimal Features Set for Extractive Automatic Text Summarization
[ { "docid": "8921cffb633b0ea350b88a57ef0d4437", "text": "This paper addresses the problem of identifying likely topics of texts by their position in the text. It describes the automated training and evaluation of an Optimal Position Policy, a method of locating the likely positions of topic-bearing sentences based on genre-speci c regularities of discourse structure. This method can be used in applications such as information retrieval, routing, and text summarization.", "title": "" } ]
[ { "docid": "aada9722cb54130151657a84417d14a1", "text": "Classical theories of sensory processing view the brain as a passive, stimulus-driven device. By contrast, more recent approaches emphasize the constructive nature of perception, viewing it as an active and highly selective process. Indeed, there is ample evidence that the processing of stimuli is controlled by top–down influences that strongly shape the intrinsic dynamics of thalamocortical networks and constantly create predictions about forthcoming sensory events. We discuss recent experiments indicating that such predictions might be embodied in the temporal structure of both stimulus-evoked and ongoing activity, and that synchronous oscillations are particularly important in this process. Coherence among subthreshold membrane potential fluctuations could be exploited to express selective functional relationships during states of expectancy or attention, and these dynamic patterns could allow the grouping and selection of distributed neuronal responses for further processing.", "title": "" }, { "docid": "9a7e491e4d4490f630b55a94703a6f00", "text": "Learning generic and robust feature representations with data from multiple domains for the same problem is of great value, especially for the problems that have multiple datasets but none of them are large enough to provide abundant data variations. In this work, we present a pipeline for learning deep feature representations from multiple domains with Convolutional Neural Networks (CNNs). When training a CNN with data from all the domains, some neurons learn representations shared across several domains, while some others are effective only for a specific one. Based on this important observation, we propose a Domain Guided Dropout algorithm to improve the feature learning procedure. Experiments show the effectiveness of our pipeline and the proposed algorithm. Our methods on the person re-identification problem outperform stateof-the-art methods on multiple datasets by large margins.", "title": "" }, { "docid": "98b2f0b348116f1207cb4dd53622d51c", "text": "Measuring the performance of solar energy and heat transfer systems requires a lot of time, economic cost and manpower. Meanwhile, directly predicting their performance is challenging due to the complicated internal structures. Fortunately, a knowledge-based machine learning method can provide a promising prediction and optimization strategy for the performance of energy systems. In this Chapter, the authors will show how they utilize the machine learning models trained from a large experimental database to perform precise prediction and optimization on a solar water heater (SWH) system. A new energy system optimization strategy based on a high-throughput screening (HTS) process is proposed. This Chapter consists of: i) Comparative studies on varieties of machine learning models (artificial neural networks (ANNs), support vector machine (SVM) and extreme learning machine (ELM)) to predict the performances of SWHs; ii) Development of an ANN-based software to assist the quick prediction and iii) Introduction of a computational HTS method to design a high-performance SWH system.", "title": "" }, { "docid": "7bbcae95715a5628d598c5cba04e0ab0", "text": "The influence maximization problem aims at finding a subset of seed users who can maximize the spread of influence in online social networks (OSNs). Existing works mostly focus on one single homogenous network. However, in the real world, OSNs (1) are usually heterogeneous, via which users can influence each others in multiple channels; and (2) share common users, via whom information could propagate across networks. In this paper, for the first time we study the influence maximization problem in multiple partially aligned heterogenous OSNs. A new model, multi-aligned multi-relational network influence maximizer (M&M), is proposed to address this problem. M&M extracts multi-aligned multirelational networks (MMNs) from aligned heterogeneous OSNs based on a set of inter and intra network social meta paths. Besides, M&M extends traditional linear threshold (LT) model to depict the information diffusion across MMNs. In addition, M&M, which selects seed users greedily, is proved to achieve a (1 − 1 e )-approximation of the optimal solution. Extensive experiments conducted on two real-world partially aligned heterogeneous OSNs demonstrate its effectiveness.", "title": "" }, { "docid": "921b024ca0a99e3b7cd3a81154d70c66", "text": "Image quality assessment (IQA) aims to use computational models to measure the image quality consistently with subjective evaluations. The well-known structural similarity index brings IQA from pixel- to structure-based stage. In this paper, a novel feature similarity (FSIM) index for full reference IQA is proposed based on the fact that human visual system (HVS) understands an image mainly according to its low-level features. Specifically, the phase congruency (PC), which is a dimensionless measure of the significance of a local structure, is used as the primary feature in FSIM. Considering that PC is contrast invariant while the contrast information does affect HVS' perception of image quality, the image gradient magnitude (GM) is employed as the secondary feature in FSIM. PC and GM play complementary roles in characterizing the image local quality. After obtaining the local quality map, we use PC again as a weighting function to derive a single quality score. Extensive experiments performed on six benchmark IQA databases demonstrate that FSIM can achieve much higher consistency with the subjective evaluations than state-of-the-art IQA metrics.", "title": "" }, { "docid": "debb6ac09ab841987733ef83e4620d52", "text": "One of the traditional problems in the walking and climbing robot moving in the 3D environment is how to negotiate the boundary of two plain surfaces such as corners, which may be convex or concave. In this paper a practical gait planning algorithm in the transition region of the boundary is proposed in terms of a geometrical view. The trajectory of the body is derived from the geometrical analysis of the relationship between the robot and the environment. And the position of each foot is determined by using parameters associated with the hip and the ankle of the robot. In each case of concave or convex boundaries, the trajectory that the robot moves along is determined in advance and the foot positions of the robot associated with the trajectory are computed, accordingly. The usefulness of the proposed method is confirmed through simulations and demonstrations with a walking and climbing robot.", "title": "" }, { "docid": "3c4e1c7fd5dbdf5ea50eeed1afe23ff9", "text": "Power management is an important concern in sensor networks, because a tethered energy infrastructure is usually not available and an obvious concern is to use the available battery energy efficiently. However, in some of the sensor networking applications, an additional facility is available to ameliorate the energy problem: harvesting energy from the environment. Certain considerations in using an energy harvesting source are fundamentally different from that in using a battery, because, rather than a limit on the maximum energy, it has a limit on the maximum rate at which the energy can be used. Further, the harvested energy availability typically varies with time in a nondeterministic manner. While a deterministic metric, such as residual battery, suffices to characterize the energy availability in the case of batteries, a more sophisticated characterization may be required for a harvesting source. Another issue that becomes important in networked systems with multiple harvesting nodes is that different nodes may have different harvesting opportunity. In a distributed application, the same end-user performance may be achieved using different workload allocations, and resultant energy consumptions at multiple nodes. In this case, it is important to align the workload allocation with the energy availability at the harvesting nodes. We consider the above issues in power management for energy-harvesting sensor networks. We develop abstractions to characterize the complex time varying nature of such sources with analytically tractable models and use them to address key design issues. We also develop distributed methods to efficiently use harvested energy and test these both in simulation and experimentally on an energy-harvesting sensor network, prototyped for this work.", "title": "" }, { "docid": "59375cb8654df781e88c033f24fdb94f", "text": "Cultural Heritage represents a world wide resource of inestimable value, attracting millions of visitors every year to monuments, museums and art exhibitions. A fundamental aspect of this resource is represented by its fruition and promotion. Indeed, to achieve a fruition of a cultural space that is sustainable, it is necessary to realize smart solutions for visitors' interaction to enrich their visiting experience. In this paper we present a service-oriented framework aimed to transform indoor Cultural Heritage sites in smart environments, which enforces a set of multimedia and communication services to support the changing of these spaces in an indispensable dynamic instrument for knowledge, fruition and growth for all the people. Following the Internet of Things paradigm, the proposed framework relies on the integration of a Wireless Sensor Network (WSN) with Wi-Fi and Bluetooth technologies to identify, locate and support visitors equipped with their own mobile devices.", "title": "" }, { "docid": "807c801c3e8db65d9479f769c291e3ac", "text": "In this paper we analyze topic evolution over time within bioinformatics to uncover the underlying dynamics of that field, focusing on the recent developments in the 2000s. We select 33 bioinformatics related conferences indexed in DBLP from 2000 to 2011. The major reason for choosing DBLP as the data source instead of PubMed is that DBLP retains most bioinformatics related conferences, and to study dynamics of the field, conference papers are more suitable than journal papers. We divide a period of a dozen years into four periods: period 1 (2000–2002), period 2 (2003–2005), period 3 (2006–2008) and period 4 (2009–2011). To conduct topic evolution analysis, we employ three major procedures, and for each procedure, we develop the following novel technique: the Markov Random Field-based topic clustering, automatic cluster labeling, and topic similarity based on Within-Period Cluster Similarity and Between-Period Cluster Similarity. The experimental results show that there are distinct topic transition patterns between different time periods. From period 1 to period 3, new topics seem to have emerged and expanded, whereas from period 3 to period 4, topics are merged and display more rigorous interaction with each other. This trend is confirmed by the collaboration pattern over time.", "title": "" }, { "docid": "87ae6c0b8bd90bde0cb4876352e222b4", "text": "This study examined the developmental trajectories of three frequently postulated executive function (EF) components, Working Memory, Shifting, and Inhibition of responses, and their relation to performance on standard, but complex, neuropsychological EF tasks, the Wisconsin Card Sorting Task (WCST), and the Tower of London (ToL). Participants in four age groups (7-, 11-, 15-, and 21-year olds) carried out nine basic experimental tasks (three tasks for each EF), the WCST, and the ToL. Analyses were done in two steps: (1) analyses of (co)variance to examine developmental trends in individual EF tasks while correcting for basic processing speed, (2) confirmatory factor analysis to extract latent variables from the nine basic EF tasks, and to explain variance in the performance on WCST and ToL, using these latent variables. Analyses of (co)variance revealed a continuation of EF development into adolescence. Confirmatory factor analysis yielded two common factors: Working Memory and Shifting. However, the variables assumed to tap Inhibition proved unrelated. At a latent level, again correcting for basic processing speed, the development of Shifting was seen to continue into adolescence, while Working Memory continued to develop into young-adulthood. Regression analyses revealed that Working Memory contributed most strongly to WCST performance in all age groups. These results suggest that EF component processes develop at different rates, and that it is important to recognize both the unity and diversity of EF component processes in studying the development of EF.", "title": "" }, { "docid": "3830c568e6b9b56bab1c971d2a99757c", "text": "Lagrangian theory provides a diverse set of tools for continuous motion analysis. Existing work shows the applicability of Lagrangian method for video analysis in several aspects. In this paper we want to utilize the concept of Lagrangian measures to detect violent scenes. Therefore we propose a local feature based on the SIFT algorithm that incooperates appearance and Lagrangian based motion models. We will show that the temporal interval of the used motion information is a crucial aspect and study its influence on the classification performance. The proposed LaSIFT feature outperforms other state-of-the-art local features, in particular in uncontrolled realistic video data. We evaluate our algorithm with a bag-of-word approach. The experimental results show a significant improvement over the state-of-the-art on current violent detection datasets, i.e. Crowd Violence, Hockey Fight.", "title": "" }, { "docid": "c3782fb81ebb5c7aee910922d4accce0", "text": "A physically-motivated model for earthquake recurrence based on the Brownian relaxation oscillator is introduced. The renewal process defining this point process model can be described by the steady rise of a state variable from the ground state to failure threshold as modulated by Brownian motion. Failure times in this model follow the Brownian passage time (BPT) distribution, which is specified by the mean time to failure, μ, and the aperiodicity of the mean, α (equivalent to the familiar coefficient of variation). Analysis of 37 series of recurrent earthquakes, M -0.7 to 9.2, suggests a provisional generic value of α = 0.5. For this value of α, the hazard function (instantaneous failure rate of survivors) exceeds the mean rate for times > μ⁄2, and is ∼∼ 2 ⁄ μ for all times > μ. Application of this model to the next M 6 earthquake on the San Andreas fault at Parkfield, California suggests that the annual probability of the earthquake is between 1:10 and 1:13.", "title": "" }, { "docid": "3e421ee43916a02afeb4987844d12b4f", "text": "s from all researchers who are engaged with the seriously ill, frail elderly. Authors: John Muscedere1 MD, Sarah Grace Bebenek2 MSc, Denise Stockley PhD2, Laura Kinderman2 PhD, and Carol Barrie1 CPA, CA. 1Canadian Frailty Network, 2Queen’s University. Ultrasound of Thigh Muscle Can Predict Frailty in Elderly Patients S. Salim, L. Warkentin, A. Gallivan, T. Churchill, V. Baracos, R. Khadaroo. University of Alberta, Edmonton, AB, Canada. Background: Sarcopenia, defined as loss of muscle mass and function, has been associated with high morbidity and mortality in patients over 65 years. Yet, it is not part of the routine screening process in geriatric care. Computed tomography (CT) scan has been used as the gold-standard tool to identify sarcopenia. Unfortunately, the high cost, limited availability, and radiation exposure limits the use of CT scans. Thigh muscle ultrasound (US) may provide a feasible diagnostic modality to identify frail older patients. We hypothesize that thigh ultrasound is predictive of frailty and post-operative complications in high-risk elderly patients. Methods: Thirty-eight patients above the age of 65 years referred to Acute Care Surgery service were recruited. Using ultrasound, thigh muscle thickness was standardized to patient height. CT scan images at L3 were analyzed and the skeletal muscle index was calculated. Sarcopenia was defined as skeletal muscle index < 41cm2/m2 for females and <43cm2/m2 or < 53cm2/m2 for males (with BMI 25kg/ m2, respectively). Rockwood Clinical Frailty score (1-3 non-frail, >4 frail) was used to assess patient condition. Results: The mean age of our preliminary study group was 78 ± 8 years and 68% (n=26) were females. Sarcopenia was identified in 69% of the patients via CT. Sarcopenic patients had a greater number of in-hospital complications (48% vs. 16.6% in non-sarcopenic, p=.0001). There was no difference in duration of stay between sarcopenic and non-sarcopenic patients (14 vs. 11 days, p=.06). There were significant differences between sarcopenic and non-sarcopenic females in skeletal muscle surface area (113 ± 9 versus 91 ± 10 cm2, p < .001), and skeletal muscle index (35.2 versus 46.3 cm2/ m2, p< .001). CT scan skeletal muscle index of sarcopenic patients showed significant correlation with frailty score (r2=0.21, p<.05). US of rectus femoris in all females was significantly associated with frailty score (r2=0.19, p=.008). The receiver-operating characteristic (ROC) for thigh ultrasound was not able to distinguish sarcopenic patients (area ROC curve=0.6, p=.8). Conclusion: CT identified sarcopenia was associated with high-risk frail patients. US measured muscle thickness was predictive of frailty but not of CT identified sarcopenia. Validity and Reliability Testing of Two Acute Care Nutrition Support Tools J. McCullough1, H. Keller2, E. Vesnaver3, H. Marcus4, T. Lister5, R. Nasser6, L. Belley7. 1University of Waterloo, Waterloo, ON, Canada; 2Department of Kinesiology, University of Waterloo, Waterloo, ON, Canada; SchlegelUniversity of Waterloo, Research Institute for Aging, Waterloo, ON, Canada; 3Department of Family Relations and Applied Nutrition, University of Guelph, Guelph, ON, Canada; 4Grand River Hospital, Kitchener, ON, Canada; 5Vancouver Island Health Authority, Vancouver, BC, Canada; 6Regina Qu’Appelle Health Region, Regina, SK, Canada; 7Centre hospitalier de l’Université de Montréal, Montreal, QC, Canada. Abstract: Poor food intake is common with patients in acute care, which can affect their recovery. Research describes that many barriers to food intake and poor intake is associated with a longer hospital stay. Thus, identifying problems and intervening as soon as possible is important. The aim of this project was to test the validity and reliability of recently developed tools designed to monitor food intake and barriers experienced by patients. 120 patients over the age of 65 were recruited at four hospitals. Patients reported their food intake for a single meal on the My Meal Intake Tool (M-MIT) and reported mealtime barriers at a single meal on the Mealtime Audit Tool (MAT). Validity of the M-MIT was determined by comparing patient completed M-MIT with food intake estimations conducted by on-site dietitians. Sensitivity (SE) and specificity (SP) for solid food and individual fluid intake (≤ 50% vs. > 50%) was adequate (solids: SE 76%, SP 74%; juice: SE 74.1%, SP 88.1%; coffee/ tea: SE 70.6%, SP 97.0%; milk: SE 64.3%, SP 83.3%). According to the MAT, the mean number of food intake barriers that patients experienced across the four hospitals was 2.93 ± 1.58 out of 18 potential barriers. Some of the most common barriers experienced included: meal tray not looking/smelling appetizing, food not served hot, tray not set up for patient, patient not provided snacks between meals, and the patient being disturbed during the meal. Inter-rater reliability testing of the MAT was conducted at Poor food intake is common with patients in acute care, which can affect their recovery. Research describes that many barriers to food intake and poor intake is associated with a longer hospital stay. Thus, identifying problems and intervening as soon as possible is important. The aim of this project was to test the validity and reliability of recently developed tools designed to monitor food intake and barriers experienced by patients. 120 patients over the age of 65 were recruited at four hospitals. Patients reported their food intake for a single meal on the My Meal Intake Tool (M-MIT) and reported mealtime barriers at a single meal on the Mealtime Audit Tool (MAT). Validity of the M-MIT was determined by comparing patient completed M-MIT with food intake estimations conducted by on-site dietitians. Sensitivity (SE) and specificity (SP) for solid food and individual fluid intake (≤ 50% vs. > 50%) was adequate (solids: SE 76%, SP 74%; juice: SE 74.1%, SP 88.1%; coffee/ tea: SE 70.6%, SP 97.0%; milk: SE 64.3%, SP 83.3%). According to the MAT, the mean number of food intake barriers that patients experienced across the four hospitals was 2.93 ± 1.58 out of 18 potential barriers. Some of the most common barriers experienced included: meal tray not looking/smelling appetizing, food not served hot, tray not set up for patient, patient not provided snacks between meals, and the patient being disturbed during the meal. Inter-rater reliability testing of the MAT was conducted at", "title": "" }, { "docid": "7b1a6768cc6bb975925a754343dc093c", "text": "In response to the increasing volume of trajectory data obtained, e.g., from tracking athletes, animals, or meteorological phenomena, we present a new space-efficient algorithm for the analysis of trajectory data. The algorithm combines techniques from computational geometry, data mining, and string processing and offers a modular design that allows for a user-guided exploration of trajectory data incorporating domain-specific constraints and objectives.", "title": "" }, { "docid": "4c1e240af3543473e6f08beda06f8245", "text": "As the worlds of commerce, entertainment, travel, and Internet technology become more inextricably linked, new types of business data become available for creative use and formal analysis. Indeed, this paper provides a study of exploiting online travel information for personalized travel package recommendation. A critical challenge along this line is to address the unique characteristics of travel data, which distinguish travel packages from traditional items for recommendation. To this end, we first analyze the characteristics of the travel packages and develop a Tourist-Area-Season Topic (TAST) model, which can extract the topics conditioned on both the tourists and the intrinsic features (i.e. locations, travel seasons) of the landscapes. Based on this TAST model, we propose a cocktail approach on personalized travel package recommendation. Finally, we evaluate the TAST model and the cocktail approach on real-world travel package data. The experimental results show that the TAST model can effectively capture the unique characteristics of the travel data and the cocktail approach is thus much more effective than traditional recommendation methods for travel package recommendation.", "title": "" }, { "docid": "d4cd0dabcf4caa22ad92fab40844c786", "text": "NA", "title": "" }, { "docid": "bccae9fdf10b1d0a16eab20278aeef3b", "text": "This paper is related to the development of an innovative multimodal biometric identification system. Unimodal biometric systems often face significant limitations due to sensitivity to noise intraclass variability and other factors. Multimodal biometric identification systems aim to fuse two or more physical or behavioral traits to provide optimal False Acceptance Rate (FAR) and False Rejection Rate (FRR), thus improving system accuracy and dependability. In greater detail, a Multimodal Biometric Identification System Based On Iris & Fingerprint. Both biometric traits (Iris & Fingerprint) are processed individually through all steps like segmentation ,feature extraction & matching. The multimodal system is fused using match level fusion at the verification stage on obtained matching score of iris and fingerprint. The performance of the biometric system shows improvement in the False Acceptance Rate (FAR) and False Reject Rate (FRR) .The proposed multimodal system achieves interesting results with several commonly used databases.", "title": "" }, { "docid": "51963c2f8c88681cccd90d4bd6225803", "text": "Wearable sensor technology continues to advance and provide significant opportunities for improving personalized healthcare. In recent years, advances in flexible electronics, smart materials, and low-power computing and networking have reduced barriers to technology accessibility, integration, and cost, unleashing the potential for ubiquitous monitoring. This paper discusses recent advances in wearable sensors and systems that monitor movement, physiology, and environment, with a focus on applications for Parkinson's disease, stroke, and head and neck injuries.", "title": "" }, { "docid": "44282b367af09bff0f7cf44446d600f8", "text": "In a recent paper, Parikh and Boyd describe a method for solving a convex optimization problem, where each iteration involves evaluating a proximal operator and projection onto a subspace. In this paper we address the critical practical issues of how to select the proximal parameter in each iteration, and how to scale the original problem variables, so as the achieve reliable practical performance. The resulting method has been implemented as an open-source software package called POGS (Proximal Graph Solver), that targets multi-core and GPU-based systems, and has been tested on a wide variety of practical problems. Numerical results show that POGS can solve very large problems (with, say, more than a billion coefficients in the data), to modest accuracy in a few tens of seconds. As just one example, a radiation treatment planning problem with around 100 million coefficients in the data can be solved in a few seconds, as compared to around one hour with an interior-point method.", "title": "" }, { "docid": "05540e05370b632f8b8cd165ae7d1d29", "text": "We describe FreeCam a system capable of generating live free-viewpoint video by simulating the output of a virtual camera moving through a dynamic scene. The FreeCam sensing hardware consists of a small number of static color video cameras and state-of-the-art Kinect depth sensors, and the FreeCam software uses a number of advanced GPU processing and rendering techniques to seamlessly merge the input streams, providing a pleasant user experience. A system such as FreeCam is critical for applications such as telepresence, 3D video-conferencing and interactive 3D TV. FreeCam may also be used to produce multi-view video, which is critical to drive newgeneration autostereoscopic lenticular 3D displays.", "title": "" } ]
scidocsrr